Next Article in Journal
Optimized CSIDH Implementation Using a 2-Torsion Point
Previous Article in Journal
Privacy Protection in Real Time HEVC Standard Using Chaotic System
Open AccessArticle

Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems

1
Laboratoire des Sciences et Techniques de l’Information, de la Communication et de la Connaissance (Lab-STICC), Centre National de la Recherche Scientifique (CNRS), Université de Brest, 29238 Brest, France
2
Institute of Computer Engineering, University of Lübeck, 23562 Lübeck, Germany
3
Institute of Computer and Network Engineering, Technical University of Braunschweig, 38106 Braunschweig, Germany
4
Laboratoire de Recherche, Signal, Image et Technologie de l’Information (LR-SITI), Ecole Nationale d’Ingénieurs de Tunis (ENIT), Le Belvédère 1002, Tunisie
*
Author to whom correspondence should be addressed.
Cryptography 2020, 4(3), 19; https://doi.org/10.3390/cryptography4030019
Received: 22 April 2020 / Revised: 16 June 2020 / Accepted: 19 June 2020 / Published: 6 July 2020
Telemedicine applications are more and more used due to the rapid development of digital imaging and information and communication technologies. Medical information which include digital medical images and patient’s information are extracted and transmitted over insecure networks for clinical diagnosis and treatments. Digital watermarking is one of the main approaches used to ensure the security of medical images. Nevertheless, in some cases, the only use of digital watermarking is not sufficient to reach a high level of security. Indeed, the watermark could carry essential patient information and needs to be protected. In such cases, cryptography may be used to protect the watermark and to improve the overall secured management in the medical environment. In this paper, we propose a clone-resistant watermarking approach combining a difference expansion watermarking technique with a cryptographic technique based on secret keys generated by a clone-resistant device called Secret Unknown Ciphers (SUCs). The use of SUCs to sign the watermark enforces the security of medical images during their transfer and storage. Experimental results show that the system provides a high level of security against various forms of attacks. View Full-Text
Keywords: watermarking; cryptography; security; authentication; secret unknown ciphers (SUCs); telemedicine; medical images watermarking; cryptography; security; authentication; secret unknown ciphers (SUCs); telemedicine; medical images
Show Figures

Figure 1

MDPI and ACS Style

Tayachi, M.; Mulhem, S.; Adi, W.; Nana, L.; Pascu, A.; Benzarti, F. Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems. Cryptography 2020, 4, 19.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop