Neutrosophic and Information Fusion NIF 2836-7863 10.54216/NIF https://www.americaspg.com/journals/show/3080 2023 2023 Design and Implementation of Fuzzy Logic-Based Key Exchange Protocol in Medical Image Cryptographic Protection Scheme Faculty of Information Technology and Robotics, Vitebsk State Technological University, Belarus Erina Erina Images may be protected from hackers and attackers with the use of steganography. The rapid expansion of the internet has led to the widespread distribution of vast quantities of multimedia content, including photos, movies, and audio files, via various online platforms. To ensure the safety of sensitive information while it is in transit and upon receipt, a high degree of security is required. During the patient scanning procedure, hospitals and scan centers save many pictures of patients on personal computers. Protection from strangers who may see the patients' scanned photos would be necessary for this. Therefore, scan centers and hospitals all over the globe rely heavily on medical image security. The proposed technique includes Fuzzy Logic-Based Key Exchange Protocol in Medical Image Cryptographic Protection Scheme.  To provide the utmost protection for the medical pictures, the cover image incorporates the secret image. At the outset, we standardize the cover and hidden photos. The cover image for this thesis might be a picture of nature or a benchmark; the hidden image, on the other hand, is a medical image in grayscale or binary format. After that, the normalized picture is processed using DWT. The hidden picture is embedded into the cover image using a fuzzy-based edge-related steganography approach, which uses these altered coefficients. To get the stego image, the embedded picture is normalized in the reverse direction. Additionally, this study suggests DT-CWT transform based picture security. Part one of the suggested approach to picture security is image steganography, and part two is picture cryptography. Module 1 uses the DT-CWT transform to fuse the coefficients of the cover picture with the hidden image. After that, the steganography picture is subjected to module 2, which is based on the IE calculation. Analysis of experimental data for the suggested picture security approach revealed improved outcomes for encrypted communication. 2024 2024 22 31 10.54216/NIF.040104 https://www.americaspg.com/articleinfo/39/show/3080