Neutrosophic and Information Fusion

Journal DOI

https://doi.org/10.54216/NIF

Submit Your Paper

2836-7863ISSN (Online)

Volume 4 , Issue 1 , PP: 22-31, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Design and Implementation of Fuzzy Logic-Based Key Exchange Protocol in Medical Image Cryptographic Protection Scheme

Erina Kovachiskaya 1 *

  • 1 Faculty of Information Technology and Robotics, Vitebsk State Technological University, Belarus - (EriKovachi98rus@vsu.by)
  • Doi: https://doi.org/10.54216/NIF.040104

    Received: December 14, 2023 Accepted: June 25, 2024
    Abstract

    Images may be protected from hackers and attackers with the use of steganography. The rapid expansion of the internet has led to the widespread distribution of vast quantities of multimedia content, including photos, movies, and audio files, via various online platforms. To ensure the safety of sensitive information while it is in transit and upon receipt, a high degree of security is required. During the patient scanning procedure, hospitals and scan centers save many pictures of patients on personal computers. Protection from strangers who may see the patients' scanned photos would be necessary for this. Therefore, scan centers and hospitals all over the globe rely heavily on medical image security. The proposed technique includes Fuzzy Logic-Based Key Exchange Protocol in Medical Image Cryptographic Protection Scheme.  To provide the utmost protection for the medical pictures, the cover image incorporates the secret image. At the outset, we standardize the cover and hidden photos. The cover image for this thesis might be a picture of nature or a benchmark; the hidden image, on the other hand, is a medical image in grayscale or binary format. After that, the normalized picture is processed using DWT. The hidden picture is embedded into the cover image using a fuzzy-based edge-related steganography approach, which uses these altered coefficients. To get the stego image, the embedded picture is normalized in the reverse direction. Additionally, this study suggests DT-CWT transform based picture security. Part one of the suggested approach to picture security is image steganography, and part two is picture cryptography. Module 1 uses the DT-CWT transform to fuse the coefficients of the cover picture with the hidden image. After that, the steganography picture is subjected to module 2, which is based on the IE calculation. Analysis of experimental data for the suggested picture security approach revealed improved outcomes for encrypted communication.

    Keywords :

    Discrete Wavelet Transform (DWT) , Steganography , Peak Signal to Noise Ratio (PSNR) , Mean Square Error (MSE) and Mean Absolute Error (MAE) , Fuzzy Logic-Based Key Exchange Protocol

    References

    [1]       Razaq, A., Maghrabi, L. A., Ahmad, M., Aslam, F., & Feng, W. (2024). Fuzzy logic-based substitution-box for robust medical image encryption in telemedicine. IEEE Access..

    [2]       Ghazal, T. M., Hasan, M. K., Abdallah, S. N. H., & Abubakkar, K. A. (2022). Secure IoMT pattern recognition and exploitation for multimedia information processing using private blockchain and fuzzy logic. Transactions on Asian and Low-Resource Language Information Processing.

    [3]       Bhattacharjee, S., Gupta, M., & Chatterjee, B. (2023). An Enhanced Security in Medical Image Encryption Using Dynamic Chaotic Fuzzy Based. Journal of Image and Graphics11(4).

    [4]       Kamble, A., Gaikwad, V., & Tembhurne, J. (2023). A provably lightweight mutually authentication and key establishment protocol using extended chaotic map for telecare medicine information system. International Journal of Information Technology15(6), 3211-3227.

    [5]       Shabbir, M., Ahmad, F., Shabbir, A., & Alanazi, S. A. (2022). Cognitively managed multi-level authentication for security using Fuzzy Logic based Quantum Key Distribution. Journal of King Saud University-Computer and Information Sciences34(4), 1468-1485.

    [6]       Gilmolk, A. M. N., & Aref, M. R. (2024). Lightweight Image Encryption Using a Novel Chaotic Technique for the Safe Internet of Things. International Journal of Computational Intelligence Systems17(1), 146.

    [7]       Ali, A., Tin, T., Al-rimy, B., Eisa, T. A. E., Gan, H. S., & Chaw, J. (2023). Revolutionizing Digital Healthcare: Unlocking the Power of Blockchain with an Optimized Fuzzy Logic Approach to Authentication and Key Agreement.

    [8]       Sailaja, R., Rupa, C., & Chakravarthy, A. S. N. (2018). A novel integrated approach using Euclid's and fuzzy logic for secure communication. International Journal of Information Privacy, Security and Integrity3(4), 253-267.

    [9]       Vellingiri, J., Vedhavathy, T. R., Senthil Pandi, S., & Bala Subramanian, C. (2024). Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution. Peer-to-Peer Networking and Applications, 1-19.

    [10]    Das, A. K., Odelu, V., & Goswami, A. (2015). A secure and robust user authenticated key agreement scheme for hierarchical multi-medical server environment in TMIS. Journal of medical systems39, 1-24.

    [11]    Singh, N., & Das, A. K. (2024). TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor. The Journal of Supercomputing80(1), 865-914.

    [12]    Das, A. K., Kalam, S., Sahar, N., & Sinha, D. (2020). UCFL: User categorization using fuzzy logic towards PUF based two-phase authentication of fog assisted IoT devices. Computers & Security97, 101938.

    [13]    Khalid, B., Qureshi, K. N., Ghafoor, K. Z., & Jeon, G. (2023). An improved biometric based user authentication and key agreement scheme for intelligent sensor based wireless communication. Microprocessors and Microsystems96, 104722.

    [14]    Sahu, A. K., Sharma, S., & Nanda, A. (2020). A secure lightweight mutual authentication and key agreement protocol for healthcare systems. In Intelligent Data Security Solutions for e-Health Applications (pp. 293-308). Academic Press.

    [15]    Farzana, S., & Islam, S. (2019). Symmetric key-based patient controlled secured electronic health record management protocol. Journal of High Speed Networks25(3), 221-237.

    [16]    Zenat Mohamed,Mahmoud M. Ismail,Shereen Zaki, The Digital Revolution in Trade Finance: Exploring The Impact of Smart Blockchain-Based Letters of Credit On E-business Transactions, International Journal of Advances in Applied Computational Intelligence, Vol. 3 , No. 1 , (2023) : 53-63 (Doi   :  https://doi.org/10.54216/IJAACI.030105)

    [17]    Hoda K. Mohamed,Ahmed Abdelhafeez,Nariman A. Khalil, Deep Learning Framework of Convolutional Neural Network (CNN) and Attention CNN for Early Diagnosis of Alzheimer's Disease, International Journal of Advances in Applied Computational Intelligence, Vol. 3 , No. 2 , (2023) : 08-17 (Doi   :  https://doi.org/10.54216/IJAACI.030201)

    [18]    Alber S. Aziz,Haitham Rizk Fadlallah, Extreme Gradient Boosting (XGBoost) and Support Vector Machine (SVM) models for Hepatitis C Prediction, International Journal of Advances in Applied Computational Intelligence, Vol. 3 , No. 2 , (2023) : 18-28 (Doi   :  https://doi.org/10.54216/IJAACI.030202)

    [19]    Ayman H. Abdel-aziem,Tamer H. M. Soliman, A Multi-Layer Perceptron (MLP) Neural Networks for Stellar Classification: A Review of Methods and Results, International Journal of Advances in Applied Computational Intelligence, Vol. 3 , No. 2 , (2023) : 29-37 (Doi   :  https://doi.org/10.54216/IJAACI.030203)

    [20]    Alshaimaa A. Tantawy, Linear Regression and K Nearest Neighbors Machine Learning Models for Person Fat Forecasting, International Journal of Advances in Applied Computational Intelligence, Vol. 3 , No. 2 , (2023) : 38-47 (Doi   :  https://doi.org/10.54216/IJAACI.030204).

    Cite This Article As :
    Kovachiskaya, Erina. Design and Implementation of Fuzzy Logic-Based Key Exchange Protocol in Medical Image Cryptographic Protection Scheme. Neutrosophic and Information Fusion, vol. , no. , 2024, pp. 22-31. DOI: https://doi.org/10.54216/NIF.040104
    Kovachiskaya, E. (2024). Design and Implementation of Fuzzy Logic-Based Key Exchange Protocol in Medical Image Cryptographic Protection Scheme. Neutrosophic and Information Fusion, (), 22-31. DOI: https://doi.org/10.54216/NIF.040104
    Kovachiskaya, Erina. Design and Implementation of Fuzzy Logic-Based Key Exchange Protocol in Medical Image Cryptographic Protection Scheme. Neutrosophic and Information Fusion , no. (2024): 22-31. DOI: https://doi.org/10.54216/NIF.040104
    Kovachiskaya, E. (2024) . Design and Implementation of Fuzzy Logic-Based Key Exchange Protocol in Medical Image Cryptographic Protection Scheme. Neutrosophic and Information Fusion , () , 22-31 . DOI: https://doi.org/10.54216/NIF.040104
    Kovachiskaya E. [2024]. Design and Implementation of Fuzzy Logic-Based Key Exchange Protocol in Medical Image Cryptographic Protection Scheme. Neutrosophic and Information Fusion. (): 22-31. DOI: https://doi.org/10.54216/NIF.040104
    Kovachiskaya, E. "Design and Implementation of Fuzzy Logic-Based Key Exchange Protocol in Medical Image Cryptographic Protection Scheme," Neutrosophic and Information Fusion, vol. , no. , pp. 22-31, 2024. DOI: https://doi.org/10.54216/NIF.040104