A new secure transmission scheme between senders and receivers using HVCHC without any loss
This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale medical images have been considered as a secret image and split into different shares by visual cryptography (VC) encryption proce...
Saved in:
Published in | EURASIP journal on wireless communications and networking Vol. 2019; no. 1; pp. 1 - 15 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Cham
Springer International Publishing
05.04.2019
Springer Nature B.V SpringerOpen |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale medical images have been considered as a secret image and split into different shares by visual cryptography (VC) encryption process. The split shares are once again encoded by Hill cipher (HC) encode process for improving the efficiency of the proposed method. In this process, the encrypted medical image (shares) pixels are converted as characters based on the character determination (CD) and lookup tables. In result, a secret image is converted into characters. These characters are sent to the receiver/authenticated person for the reconstruction process. In receiver side, the ciphertext has been decoded by HC decode process for reconstructing the shares. The reconstructed shares are decrypted by the VC decryption process for retaining the original secret medical image. The proposed algorithm has provided better CC, less execution time, higher confidentiality, integrity, and authentication (CIA). Therefore, using this proposed method, cent percent of the original secret medical image can be obtained and the secret image can be prevented from the interception of intruders/third parties. |
---|---|
AbstractList | Abstract This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale medical images have been considered as a secret image and split into different shares by visual cryptography (VC) encryption process. The split shares are once again encoded by Hill cipher (HC) encode process for improving the efficiency of the proposed method. In this process, the encrypted medical image (shares) pixels are converted as characters based on the character determination (CD) and lookup tables. In result, a secret image is converted into characters. These characters are sent to the receiver/authenticated person for the reconstruction process. In receiver side, the ciphertext has been decoded by HC decode process for reconstructing the shares. The reconstructed shares are decrypted by the VC decryption process for retaining the original secret medical image. The proposed algorithm has provided better CC, less execution time, higher confidentiality, integrity, and authentication (CIA). Therefore, using this proposed method, cent percent of the original secret medical image can be obtained and the secret image can be prevented from the interception of intruders/third parties. This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale medical images have been considered as a secret image and split into different shares by visual cryptography (VC) encryption process. The split shares are once again encoded by Hill cipher (HC) encode process for improving the efficiency of the proposed method. In this process, the encrypted medical image (shares) pixels are converted as characters based on the character determination (CD) and lookup tables. In result, a secret image is converted into characters. These characters are sent to the receiver/authenticated person for the reconstruction process. In receiver side, the ciphertext has been decoded by HC decode process for reconstructing the shares. The reconstructed shares are decrypted by the VC decryption process for retaining the original secret medical image. The proposed algorithm has provided better CC, less execution time, higher confidentiality, integrity, and authentication (CIA). Therefore, using this proposed method, cent percent of the original secret medical image can be obtained and the secret image can be prevented from the interception of intruders/third parties. |
ArticleNumber | 88 |
Author | S, Manimurugan Almutairi, Saad Aborokbah, Majed |
Author_xml | – sequence: 1 givenname: Saad surname: Almutairi fullname: Almutairi, Saad organization: Department of Computer Science, Faculty of Computers and Information Technology, University of Tabuk – sequence: 2 givenname: Manimurugan orcidid: 0000-0003-1837-6797 surname: S fullname: S, Manimurugan email: smanimurugan@yahoo.co.in organization: Department of Computer Engineering, Faculty of Computers and Information Technology, University of Tabuk – sequence: 3 givenname: Majed surname: Aborokbah fullname: Aborokbah, Majed organization: Department of Computer Science, Faculty of Computers and Information Technology, University of Tabuk |
BookMark | eNp9UUtrVDEYDdKCff0AdwHXV_O6jyzLoE6h0I266SLk8WWaYSapSa5D--vNeKWKoKvvwTnne5xzdBJTBITeUPKO0ml4Xygf-NQRKjvKpeyeX6EzOkxjR4WUJ3_kr9F5KVtCOBeSnaH7axzhgAvYOQOuWceyD6WEFHGxD7AHbKAeAFoJ0UEuWEeHM1gI34_VXELc4PXX1XqFD6E-pLk2xBPepVIu0anXuwJXv-IF-vLxw-fVuru9-3Szur7trGB97SSwEYSRdiCeesYF4Y5TL6ZBmt5pLiZiBmaI9cZ77nrmLeXAnTaC9457foFuFl2X9FY95rDX-UklHdTPRsobpXMNdgdqon1vDTFWGyMG57XgjNixHyhtHaKb1ttF6zGnbzOUqrZpzrGtrxgjnPGxp6Sh6IKyud2Zwb9MpUQd_VCLH6r5oY5-qOfGGf_i2FB1bZ9uXw-7_zLZwixtStxA_r3Tv0k_ABATotg |
CitedBy_id | crossref_primary_10_1016_j_bspc_2021_102465 crossref_primary_10_1007_s12652_021_02990_8 crossref_primary_10_1007_s11227_021_03928_9 crossref_primary_10_1016_j_comnet_2024_110501 crossref_primary_10_1155_2023_5881769 crossref_primary_10_1007_s11277_021_09013_x crossref_primary_10_32628_CSEIT2490214 crossref_primary_10_1016_j_micpro_2020_103261 crossref_primary_10_1142_S0218488523400081 |
Cites_doi | 10.1007/s10623-003-6741-z 10.1016/j.protcy.2012.05.016 10.1007/s11042-015-2770-7 10.1007/s11042-015-2779-y 10.4018/IJDCF.2016070106 10.1080/00029890.1929.11986963 10.1016/j.ijleo.2015.07.117 10.1016/j.tcs.2015.09.016 10.1093/comjnl/bxh152 10.1016/j.procs.2010.11.031 10.1016/j.tcs.2013.09.005 10.1080/00029890.1931.11987161 10.1016/j.tcs.2007.01.006 10.9790/0661-1121014 10.1016/j.image.2016.09.001 10.4018/IJDCF.2015010102 10.1016/j.ipl.2004.10.011 10.21833/ijaas.2017.02.010 |
ContentType | Journal Article |
Copyright | The Author(s). 2019 EURASIP Journal on Wireless Communications and Networking is a copyright of Springer, (2019). All Rights Reserved. © 2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: The Author(s). 2019 – notice: EURASIP Journal on Wireless Communications and Networking is a copyright of Springer, (2019). All Rights Reserved. © 2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | C6C AAYXX CITATION 3V. 7SC 7SP 7XB 8AL 8FD 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U DOA |
DOI | 10.1186/s13638-019-1399-z |
DatabaseName | Springer Nature OA Free Journals CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts Electronics & Communications Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology collection ProQuest One ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
DatabaseTitleList | Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: C6C name: Springer Nature OA Free Journals url: http://www.springeropen.com/ sourceTypes: Publisher – sequence: 2 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 3 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1687-1499 |
EndPage | 15 |
ExternalDocumentID | oai_doaj_org_article_8155cb0bcabb46dfa4320c75611abb0a 10_1186_s13638_019_1399_z |
GroupedDBID | -A0 .4S .DC 0R~ 29G 2WC 3V. 4.4 40G 5GY 5VS 6OB 8FE 8FG 8R4 8R5 AAFWJ AAJSJ AAKKN AAKPC ABDBF ABEEZ ABFTD ABUWG ACACY ACGFS ACUHS ACULB ADBBV ADDVE ADINQ ADMLS AENEX AFGXO AFKRA AFPKN AHBYD AHYZX ALMA_UNASSIGNED_HOLDINGS AMKLP ARAPS ARCSS AZQEC BCNDV BENPR BGLVJ BPHCQ C24 C6C CCPQU CS3 DU5 DWQXO E3Z EAD EAP EAS EBLON EBS EDO EJD EMK ESX GNUQQ GROUPED_DOAJ HCIFZ HZ~ I-F K6V K7- KQ8 M0N M~E OK1 P2P P62 PIMPY PQQKQ PROAC Q2X RHU RNS RSV SEG SOJ TUS U2A XSB AASML AAYXX CITATION OVT PHGZM PHGZT 7SC 7SP 7XB 8AL 8FD 8FK JQ2 L7M L~C L~D PKEHL PQEST PQGLB PQUKI PRINS Q9U PUEGO |
ID | FETCH-LOGICAL-c425t-9e27e4b9c60f1f23403d31f4869b5da3480b62b0cfbff3d52fc13e3dab435d3f3 |
IEDL.DBID | BENPR |
ISSN | 1687-1499 1687-1472 |
IngestDate | Wed Aug 27 01:26:02 EDT 2025 Fri Jul 25 03:03:36 EDT 2025 Thu Apr 24 23:11:01 EDT 2025 Tue Jul 01 00:40:54 EDT 2025 Fri Feb 21 02:35:33 EST 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Hill cipher Visual cryptography Medical images Character conversion Transmission |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c425t-9e27e4b9c60f1f23403d31f4869b5da3480b62b0cfbff3d52fc13e3dab435d3f3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-1837-6797 |
OpenAccessLink | https://www.proquest.com/docview/2203237510?pq-origsite=%requestingapplication% |
PQID | 2203237510 |
PQPubID | 237293 |
PageCount | 15 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_8155cb0bcabb46dfa4320c75611abb0a proquest_journals_2203237510 crossref_primary_10_1186_s13638_019_1399_z crossref_citationtrail_10_1186_s13638_019_1399_z springer_journals_10_1186_s13638_019_1399_z |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2019-04-05 |
PublicationDateYYYYMMDD | 2019-04-05 |
PublicationDate_xml | – month: 04 year: 2019 text: 2019-04-05 day: 05 |
PublicationDecade | 2010 |
PublicationPlace | Cham |
PublicationPlace_xml | – name: Cham – name: New York |
PublicationTitle | EURASIP journal on wireless communications and networking |
PublicationTitleAbbrev | J Wireless Com Network |
PublicationYear | 2019 |
Publisher | Springer International Publishing Springer Nature B.V SpringerOpen |
Publisher_xml | – name: Springer International Publishing – name: Springer Nature B.V – name: SpringerOpen |
References | NaorMShamirAVisual cryptography, in: advances in cryptology, EUROCRYPT’94, in: LNCS1994112 YanXWangSNiuXThreshold progressive visual cryptography construction with unexpanded sharesMultimed. Tools Appl.2016758657867410.1007/s11042-015-2779-y Suman ChandrasekharAHPAdarshKSasiSA secure encryption technique based on advanced Hill cipher for a public key cryptosystemIOSR J. Comput. Eng.2013112101410.9790/0661-1121014 KrishnaAVNMadhuravaniKA Modified Hill cipher using randomized approachInt. J. Comput. Netw. Inf. Secur.201255662 AcharyaBSharmaMDTiwariSMinzVKPrivacy protection of biometric traits using modified Hill cipher with Involutory key and robust cryptosystemProcedia Comput. Sci.2010224224710.1016/j.procs.2010.11.031 WangGLiuFYanWQBasic visual cryptography using brailleInt. J. Digit. Crime Forensics201683859310.4018/IJDCF.2016070106 MishraDCSharmaRKRanjanRHanmandluMSecurity of RGB image data by affine hill cipher over SLn(Fq) and Mn(Fq) domains with Arnold transformOptik20151263812382210.1016/j.ijleo.2015.07.117 ManimuruganSNarmathaCPorkumaranKThe new approach of visual cryptography scheme for protecting the grayscale medical imagesJ. Theor. Appl. Inf. Technol.2014693552561 S. Cimato, R. De Prisco, A. De Santis, Visual cryptography for color images, in: visual cryptography and secret image sharing (CRC Press, London, 2012), pp. 31–56 ISBN 978–1–4398-3721-4. HillLSConcerning certain linear transformation apparatus of cryptographyAm. Math. Mon.193138135154152220110.1080/00029890.1931.11987161 RahmanMNAAbidinAFAYusofMKUsopNSMCryptography: a new approach of classical Hill cipherInt. J. Secur. Its Appl.201372179190 CimatoSDe SantisAFerraraALMasucciBIdeal contrast visual cryptography schemes with reversingInf. Process. Letter200593199206211061110.1016/j.ipl.2004.10.011 ManimuruganSPorkumaranKNarmathaC“The new block pixel Sort algorithm for TVC encrypted medical image”, imaging scienceJournal2014628403414 CimatoSDe PriscoRDe SantisAColored visual cryptography without color darkeningTheor. Comput. Sci.2007374261276231748410.1016/j.tcs.2007.01.006 ShaoZShangYZengRShuHCoatrieuxGWuJRobust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptographySignal Process. Image Commun.201648122110.1016/j.image.2016.09.001 ReddyKAVishnuvardhanBMadhuviswanathamKrishnaAVNA modified Hill cipher based on circulant matricesProcedia Technol2012411411810.1016/j.protcy.2012.05.016 ManimuruganSPorkumaranKFast and efficient secure medical image compression schemesEur. J. Sci Res2011562139150 CimatoSDe PriscoRDe SantisAProbabilistic visual cryptography schemesComput. J.2006499710710.1093/comjnl/bxh152 AmiriTMoghaddamMEA new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover imagesMultimed. Tools Appl.2016758527854310.1007/s11042-015-2770-7 De PriscoRDe SantisAColor visual cryptography schemes for black and white secret imagesTheor. Comput. Sci.20135106286312221210.1016/j.tcs.2013.09.005 SharmaNChirgaiyaSA novel approach to Hill cipherInt. J. Comput. Appl.2014108113437 ManimuruganSNarmathaCSecure and efficient medical image transmission by new tailored visual cryptography scheme with LS compressionsInt. J. Digit. Crime Forensics201571265010.4018/IJDCF.2015010102 Al-MutairiSManimuruganSAn efficient secret image transmission scheme using Dho-encryption techniqueInt. J. Comput. Sci. Inf. Secur20161410446460 ManimuruganSPorkumaranKSecure medical image compression using block pixel Sort algorithmEur. J. Sci. Res.2011562129138 Al-MutairiSManimuruganSThe clandestine image transmission scheme to prevent from the intrudersInt. J. Adv. Appl. Sci.201742526010.21833/ijaas.2017.02.010 CimatoSDe PriscoRDe SantisAOptimal colored threshold visual cryptography schemesDes. Codes Cryptography200535311335215086610.1007/s10623-003-6741-z YangC-NSunL-ZCaiS-RExtended color visual cryptography for black and white secret imageTheor. Comput. Sci.2016609143161342694610.1016/j.tcs.2015.09.016 HillLSCryptography in an algebraic alphabetAm. Math. Mon.1929366306312152175910.1080/00029890.1929.11986963 C-N Yang (1399_CR11) 2016; 609 S Cimato (1399_CR6) 2006; 49 S Manimurugan (1399_CR20) 2014; 62 T Amiri (1399_CR14) 2016; 75 KA Reddy (1399_CR27) 2012; 4 S Manimurugan (1399_CR13) 2011; 56 G Wang (1399_CR16) 2016; 8 S Al-Mutairi (1399_CR19) 2017; 4 MNA Rahman (1399_CR24) 2013; 7 LS Hill (1399_CR2) 1929; 36 AVN Krishna (1399_CR22) 2012; 5 S Manimurugan (1399_CR17) 2015; 7 S Al-Mutairi (1399_CR18) 2016; 14 X Yan (1399_CR15) 2016; 75 S Cimato (1399_CR5) 2005; 35 AHP Suman Chandrasekhar (1399_CR23) 2013; 11 N Sharma (1399_CR28) 2014; 108 LS Hill (1399_CR3) 1931; 38 S Cimato (1399_CR7) 2005; 93 B Acharya (1399_CR26) 2010; 2 M Naor (1399_CR1) 1994 1399_CR9 S Manimurugan (1399_CR21) 2014; 69 S Manimurugan (1399_CR12) 2011; 56 DC Mishra (1399_CR25) 2015; 126 R Prisco De (1399_CR10) 2013; 510 Z Shao (1399_CR4) 2016; 48 S Cimato (1399_CR8) 2007; 374 |
References_xml | – reference: SharmaNChirgaiyaSA novel approach to Hill cipherInt. J. Comput. Appl.2014108113437 – reference: CimatoSDe PriscoRDe SantisAProbabilistic visual cryptography schemesComput. J.2006499710710.1093/comjnl/bxh152 – reference: KrishnaAVNMadhuravaniKA Modified Hill cipher using randomized approachInt. J. Comput. Netw. Inf. Secur.201255662 – reference: ManimuruganSNarmathaCSecure and efficient medical image transmission by new tailored visual cryptography scheme with LS compressionsInt. J. Digit. Crime Forensics201571265010.4018/IJDCF.2015010102 – reference: CimatoSDe PriscoRDe SantisAOptimal colored threshold visual cryptography schemesDes. Codes Cryptography200535311335215086610.1007/s10623-003-6741-z – reference: HillLSCryptography in an algebraic alphabetAm. Math. Mon.1929366306312152175910.1080/00029890.1929.11986963 – reference: CimatoSDe PriscoRDe SantisAColored visual cryptography without color darkeningTheor. Comput. Sci.2007374261276231748410.1016/j.tcs.2007.01.006 – reference: S. Cimato, R. De Prisco, A. De Santis, Visual cryptography for color images, in: visual cryptography and secret image sharing (CRC Press, London, 2012), pp. 31–56 ISBN 978–1–4398-3721-4. – reference: MishraDCSharmaRKRanjanRHanmandluMSecurity of RGB image data by affine hill cipher over SLn(Fq) and Mn(Fq) domains with Arnold transformOptik20151263812382210.1016/j.ijleo.2015.07.117 – reference: AcharyaBSharmaMDTiwariSMinzVKPrivacy protection of biometric traits using modified Hill cipher with Involutory key and robust cryptosystemProcedia Comput. Sci.2010224224710.1016/j.procs.2010.11.031 – reference: WangGLiuFYanWQBasic visual cryptography using brailleInt. J. Digit. Crime Forensics201683859310.4018/IJDCF.2016070106 – reference: Al-MutairiSManimuruganSThe clandestine image transmission scheme to prevent from the intrudersInt. J. Adv. Appl. Sci.201742526010.21833/ijaas.2017.02.010 – reference: HillLSConcerning certain linear transformation apparatus of cryptographyAm. Math. Mon.193138135154152220110.1080/00029890.1931.11987161 – reference: YangC-NSunL-ZCaiS-RExtended color visual cryptography for black and white secret imageTheor. Comput. Sci.2016609143161342694610.1016/j.tcs.2015.09.016 – reference: ManimuruganSPorkumaranKNarmathaC“The new block pixel Sort algorithm for TVC encrypted medical image”, imaging scienceJournal2014628403414 – reference: ManimuruganSNarmathaCPorkumaranKThe new approach of visual cryptography scheme for protecting the grayscale medical imagesJ. Theor. Appl. Inf. Technol.2014693552561 – reference: RahmanMNAAbidinAFAYusofMKUsopNSMCryptography: a new approach of classical Hill cipherInt. J. Secur. Its Appl.201372179190 – reference: ReddyKAVishnuvardhanBMadhuviswanathamKrishnaAVNA modified Hill cipher based on circulant matricesProcedia Technol2012411411810.1016/j.protcy.2012.05.016 – reference: YanXWangSNiuXThreshold progressive visual cryptography construction with unexpanded sharesMultimed. Tools Appl.2016758657867410.1007/s11042-015-2779-y – reference: De PriscoRDe SantisAColor visual cryptography schemes for black and white secret imagesTheor. Comput. Sci.20135106286312221210.1016/j.tcs.2013.09.005 – reference: Suman ChandrasekharAHPAdarshKSasiSA secure encryption technique based on advanced Hill cipher for a public key cryptosystemIOSR J. Comput. Eng.2013112101410.9790/0661-1121014 – reference: NaorMShamirAVisual cryptography, in: advances in cryptology, EUROCRYPT’94, in: LNCS1994112 – reference: ShaoZShangYZengRShuHCoatrieuxGWuJRobust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptographySignal Process. Image Commun.201648122110.1016/j.image.2016.09.001 – reference: ManimuruganSPorkumaranKSecure medical image compression using block pixel Sort algorithmEur. J. Sci. Res.2011562129138 – reference: CimatoSDe SantisAFerraraALMasucciBIdeal contrast visual cryptography schemes with reversingInf. Process. Letter200593199206211061110.1016/j.ipl.2004.10.011 – reference: AmiriTMoghaddamMEA new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover imagesMultimed. Tools Appl.2016758527854310.1007/s11042-015-2770-7 – reference: Al-MutairiSManimuruganSAn efficient secret image transmission scheme using Dho-encryption techniqueInt. J. Comput. Sci. Inf. Secur20161410446460 – reference: ManimuruganSPorkumaranKFast and efficient secure medical image compression schemesEur. J. Sci Res2011562139150 – volume: 35 start-page: 311 year: 2005 ident: 1399_CR5 publication-title: Des. Codes Cryptography doi: 10.1007/s10623-003-6741-z – volume: 108 start-page: 34 issue: 11 year: 2014 ident: 1399_CR28 publication-title: Int. J. Comput. Appl. – volume: 4 start-page: 114 year: 2012 ident: 1399_CR27 publication-title: Procedia Technol doi: 10.1016/j.protcy.2012.05.016 – volume: 14 start-page: 446 issue: 10 year: 2016 ident: 1399_CR18 publication-title: Int. J. Comput. Sci. Inf. Secur – ident: 1399_CR9 – volume: 75 start-page: 8527 year: 2016 ident: 1399_CR14 publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-015-2770-7 – volume: 69 start-page: 552 issue: 3 year: 2014 ident: 1399_CR21 publication-title: J. Theor. Appl. Inf. Technol. – volume: 5 start-page: 56 year: 2012 ident: 1399_CR22 publication-title: Int. J. Comput. Netw. Inf. Secur. – volume: 7 start-page: 179 issue: 2 year: 2013 ident: 1399_CR24 publication-title: Int. J. Secur. Its Appl. – volume: 75 start-page: 8657 year: 2016 ident: 1399_CR15 publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-015-2779-y – volume: 62 start-page: 403 issue: 8 year: 2014 ident: 1399_CR20 publication-title: Journal – volume: 8 start-page: 85 issue: 3 year: 2016 ident: 1399_CR16 publication-title: Int. J. Digit. Crime Forensics doi: 10.4018/IJDCF.2016070106 – volume: 36 start-page: 306 issue: 6 year: 1929 ident: 1399_CR2 publication-title: Am. Math. Mon. doi: 10.1080/00029890.1929.11986963 – volume: 126 start-page: 3812 year: 2015 ident: 1399_CR25 publication-title: Optik doi: 10.1016/j.ijleo.2015.07.117 – volume: 609 start-page: 143 year: 2016 ident: 1399_CR11 publication-title: Theor. Comput. Sci. doi: 10.1016/j.tcs.2015.09.016 – volume: 49 start-page: 97 year: 2006 ident: 1399_CR6 publication-title: Comput. J. doi: 10.1093/comjnl/bxh152 – volume: 56 start-page: 139 issue: 2 year: 2011 ident: 1399_CR13 publication-title: Eur. J. Sci Res – volume: 2 start-page: 242 year: 2010 ident: 1399_CR26 publication-title: Procedia Comput. Sci. doi: 10.1016/j.procs.2010.11.031 – volume: 510 start-page: 62 year: 2013 ident: 1399_CR10 publication-title: Theor. Comput. Sci. doi: 10.1016/j.tcs.2013.09.005 – volume: 38 start-page: 135 year: 1931 ident: 1399_CR3 publication-title: Am. Math. Mon. doi: 10.1080/00029890.1931.11987161 – volume: 374 start-page: 261 year: 2007 ident: 1399_CR8 publication-title: Theor. Comput. Sci. doi: 10.1016/j.tcs.2007.01.006 – volume: 11 start-page: 10 issue: 2 year: 2013 ident: 1399_CR23 publication-title: IOSR J. Comput. Eng. doi: 10.9790/0661-1121014 – volume: 48 start-page: 12 year: 2016 ident: 1399_CR4 publication-title: Signal Process. Image Commun. doi: 10.1016/j.image.2016.09.001 – volume: 7 start-page: 26 issue: 1 year: 2015 ident: 1399_CR17 publication-title: Int. J. Digit. Crime Forensics doi: 10.4018/IJDCF.2015010102 – volume: 93 start-page: 199 year: 2005 ident: 1399_CR7 publication-title: Inf. Process. Letter doi: 10.1016/j.ipl.2004.10.011 – start-page: 1 volume-title: Visual cryptography, in: advances in cryptology, EUROCRYPT’94, in: LNCS year: 1994 ident: 1399_CR1 – volume: 4 start-page: 52 issue: 2 year: 2017 ident: 1399_CR19 publication-title: Int. J. Adv. Appl. Sci. doi: 10.21833/ijaas.2017.02.010 – volume: 56 start-page: 129 issue: 2 year: 2011 ident: 1399_CR12 publication-title: Eur. J. Sci. Res. |
SSID | ssj0033492 |
Score | 2.3794072 |
Snippet | This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver. The... Abstract This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and... |
SourceID | doaj proquest crossref springer |
SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1 |
SubjectTerms | Algorithms Character conversion Coding Communications Engineering Cryptography Encryption Engineering Gray scale Hill cipher Image transmission Information Systems Applications (incl.Internet) Interception Lookup tables Medical images Medical imaging Networks Recent Challenges & Avenues in Wireless Communication through Advance computational Intelligence or Deep learning methods Signal,Image and Speech Processing Transmission Visual cryptography |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07SwQxEA5ipYX4xPNFCislmE2y2Wyph3IIWnkiWIQ8bfQUdy301zvJ7ukpqI1tNgvDzCTzzWT4BqF9Q6k1JXOE06gI4H9DTFkxwo1kxqRCQ24ev7iUo7E4vylvZkZ9pZ6wjh64U9yRgoDnLLXOWCukj0ZwRl0FYb-AFZqhEcS8aTLV3cE8ce71b5iFkkdNwcHPIG2uCSCemrx9iUKZrP8Lwvz2KJpjzdkyWupBIj7uhFtBc2GyihZnqAPX0O0xBkCMm1QuD7hNEQcslkpfGPLV8BBw34GFmzwsrsFm4jFcbyE3YuDU736HR9fD0RCnWuzjSws7XvE9iLuOxmenV8MR6QclEAdHriV1YFUQtnaSxiIyLij3vIhCydqW3nChqJXMUhdtjNyXLLpU_PTGAljyPPINND95nIRNhEOUhapjWXnnBXMB4AlXyiihODfKmgGiU8Vp17OIp2EW9zpnE0rqTtcadK2TrvXbAB18_PLUUWj8tvkkWeNjY2K_zgvgE7r3Cf2XTwzQztSWuj-SjWZpVjyv4A4aoMOpfT8__yjR1n9ItI0WWPK-1PJT7qD59vkl7AKaae1edtx3igfxfQ priority: 102 providerName: Directory of Open Access Journals – databaseName: SpringerLink dbid: C24 link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9wwELYKvZQDaguoC0vlQ0-tLBzbcZwjXbFaIdFTqZB6sPzkQncrEg7l1zPjTWhBBYlrMpasGc_4m4dnCPnkOPeuFoFJng0D_O-YqxvBpNPCOQw0lOLxs296ca5OL-qL4R13N1a7jynJYqmLWht91FUSzgq4vi0D1NKy2w3yukbXHTO0-MRhbX4lttsb0pf_XfbgAip9-h-Ay0f50HLNzN-S7QEf0uO1QN-RV2n5nmz90zVwh_w8poCFaYeR8kR7vGxAWBj1ouCqpl-JDsVXtCtz4jrqlpGCZUulBoNiqfslXfyYLWYUw7Crmx4o_tAr2O4uOZ-ffJ8t2DAjgQXQtp61STRJ-TZonqsspOIyyioro1tfRyeV4V4Lz0P2OctYixww7hmdB5wUZZZ7ZHO5WqYPhKasK9PmuokhKhESIBNpjDPKSOmMdxPCR8bZMDQQxzkWV7Y4EkbbNa8t8Noir-3thHy-X_J73T3jOeKvKI17Qmx8XT6sri_toEfWAP4JnvvgvFc6Zqek4KEBFFjBFw6bnI6ytIM2dlbgmHjZgPmZkC-jfP_-fnJH-y-iPiBvBB4zLOupp2Szv75Jh4BYev-xnNA7R0vlDQ priority: 102 providerName: Springer Nature |
Title | A new secure transmission scheme between senders and receivers using HVCHC without any loss |
URI | https://link.springer.com/article/10.1186/s13638-019-1399-z https://www.proquest.com/docview/2203237510 https://doaj.org/article/8155cb0bcabb46dfa4320c75611abb0a |
Volume | 2019 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LbxMxELZocoED4ikCJfKBE8iq1_Z6vSe0XTVEkagQEFSJg-VnL21SutsD_fWMN96WItHLHBxvZM3L34xHMwi9M5RaUzJHOI2KAP43xJQVI9xIZkxKNAzF45-P5XItViflSU64dbmscvSJg6P2W5dy5AcsjfrmFajQx4tfJE2NSq-reYTGHpqCC1ZqgqaHR8dfvo6-mKfeeynkkmBKhahYftcslDzoCg66B6F0TQAF1eT6zs00NPC_gzr_eSgd7p_FE_Q4A0fc7CT9FD0Im2fo0V_tBJ-jnw0GkIy7lEIPuE-3EEgxpcMwxLDhPOBclYW7YYBch83GY3B5YSjOwKkG_hQvf7TLFqf87Paqhx2_8Rkc9wVaL46-t0uShycQB2bYkzqwKghbO0ljERkXlHteRKFkbUtvuFDUSmapizZG7ksWXUqIemMBQHke-Us02Ww34RXCIcpC1bGsvPOCuQCQhStllFCcG2XNDNGRcdrlzuJpwMWZHiIMJfWO1xp4rROv9fUMvb_55GLXVuO-zYdJGjcbU0fsYWF7eaqzgWkFwMhZap2xVkgfjeCMugrgYQErFA65P8pSZzPt9K1SzdCHUb63P__3RK_v_7M36CFLepUKfMp9NOkvr8JbwC69naM9QT8BVQug06ZZfVvNs9LCastEorKdD7kBoGvW_AG57vH2 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELZKOQAHxFMsLeADXEBWHdtxnANCZWHZ0sepRZU4GD97Kbttkwq1P4rfyEw2aSkSvfXqOJY1_jz-ZjyeIeS149y7UgQmeTYM-L9jrqwEk04L59DR0AWPb-_o6Z76ul_uL5Hfw1sYDKscdGKnqOM8oI98TWCpb1kBhD4cHTOsGoW3q0MJjQUsNtPZLzDZmvcbn2B93wgx-bw7nrK-qgALgM-W1UlUSfk6aJ6LLKTiMsoiK6NrX0YnleFeC89D9jnLWIoc0FMYnQdmEWWWMO4tcltJOMnxZfrky6D5JWb6QwNPw8YtVCX6W9TC6LWmkIB0MNxrBpyrZudXzsGuXMAVjvvPtWx32k0ekPs9TaXrC1w9JEtp9ojc-yt54WPyfZ0CJacNOuwTbfHMA8yg842CxZx-JtrHgNGmK1fXUDeLFBRs6kJBKEbcH9Dpt_F0TNEbPD9toccZPYTpPiF7NyLUp2R5Np-lZ4SmrAtT57KKISoREhAkaYwzykjpjHcjwgfB2dDnMcdyGoe2s2eMtgtZW5C1RVnb8xF5e_HL0SKJx3WdP-JqXHTE_Ntdw_zkwPbb2RqgYcFzH5z3SsfslBQ8VEBGC2jhMMnVYS1trxQaewnhEXk3rO_l5__O6Pn1g70id6a721t2a2Nnc4XcFYgxDC0qV8lye3KaXgBrav3LDqqU_LjpvfEH-2knig |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELbKVkJwQDzFQgEf4AKK1rEdxzkg1G672lJYVYiiShxcP3spu6VJhdqfxq9jJpu0FIneenWcyBp_nvlmPJkh5LVlzNmC-0ywpDPg_zazRckzYRW3FgMNbfL455ma7smP-8X-Cvnd_wuDaZW9TmwVdVh4jJGPOLb6FiVAaJS6tIjdzcmH458ZdpDCm9a-ncYSIjvx7Be4b_X77U3Y6zecT7a-jqdZ12Eg84DVJqsiL6N0lVcs5YkLyUQQeZJaVa4IVkjNnOKO-eRSEqHgyWPUMFgHLCOIJOC7t8hqiV7RgKxubM12v_R2QGDdP3T3FBzjXJa8u1PNtRrVuQDcgxtfZcDAquz8ilVsmwdcYbz_XNK2tm9yn9zrSCtdX6LsAVmJ84fk7l-lDB-R7-sUCDqtMXwfaYMWEBCEoTgK_nP8EWmXEUbrtnldTe08UFC3sU0MoZh_f0in38bTMcXY8OK0gRln9AiW-5js3YhYn5DBfDGPTwmNSeW6SkUZfJDcR6BLQmurpRbCameHhPWCM76rao7NNY5M691oZZayNiBrg7I250Py9uKV42VJj-smb-BuXEzEatztwOLk0HSH22ggZd4x561zUoVkpeDMl0BNcxhhsMi1fi9NpyJqcwnoIXnX7-_l4_-u6Nn1H3tFbsO5MJ-2ZzvPyR2OEMM8o2KNDJqT0_gCKFTjXnZYpeTgpo_HH7GmLRw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+new+secure+transmission+scheme+between+senders+and+receivers+using+HVCHC+without+any+loss&rft.jtitle=EURASIP+journal+on+wireless+communications+and+networking&rft.au=Almutairi%2C+Saad&rft.au=Manimurugan%2C+S&rft.au=Aborokbah%2C+Majed&rft.date=2019-04-05&rft.pub=Springer+Nature+B.V&rft.issn=1687-1472&rft.eissn=1687-1499&rft.volume=2019&rft.issue=1&rft.spage=1&rft.epage=15&rft_id=info:doi/10.1186%2Fs13638-019-1399-z&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1687-1499&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1687-1499&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1687-1499&client=summon |