integrated merits of information technology (IT) and
telecommunication, telemedicine information (i.e.,
patient data) always required a se curity and
transmission over internet for the purpose of fast
and reliable delivery. Thus, watermarking and
steganography techniques are suggested that
provided security for medical images [1].
Table 1 shows the number of attacks and common
vulnerabilities that mainly resided in the informative
networks [6]. Like others’, images are also
accounted as unsecured form of information and
will require a security solution that protect them
from the networks adversaries. Chae Hongseok el
at., proposed a cryptography based security
mechanism that further distributed in main three
algorithms, such as AES, RSA and SHA-2, for the
information protection [6]. Puech et al., also
analyzed the weaker security level of information
and then proposed two security dimensions that
keep the information of digital images and videos’
to be secured. The first dimension focus to keep the
information secured against the outside attackers
that would become a parts of normal processing,
while second dimension classified the main
cryptograph algorithms and their use for multimedia
contents (protections) [7, 8].
2 Proposed work and Implementation
To keep the information secure that is in the form of
images, the potential security mechanisms are
proposed that will have significance measurements
against network adversaries [9—12]. In first
security mechanism, the cryptography algorithms,
AES and SHA-512, are employed to secure the
images that planned to transmit over the open
networks or internet. AES is a symmetric algorithm
of cryptography and has same security key that
shared between two participated nodes and provides
security parameters against the confidentiality and
authentication attacks. The AES security key or
secret key is first generated and then shared with the
target node via secure channel that ensured its
uniqueness and security [9]. Therefore, at the both
sides a same shared secret key will be employed
during encryption and decryption processes.
Algorithm 1 shows the panoramic image’s deployed
security via symmetric AES algorithm
2.1 Algorithm 1: Security Development via
Symmetric AES
i. Select the random size panoramic image or
images and designated as ‘Img’.
ii. Generate a secret key, and shared this key
between the participated nodes.
iii. Use step i and deployed the AES algorithm
for encryption process at sender (S) side.
Then transmits it to the target (T) side.
iv. At target side, use step i and ii for
decryption process.
v. Ensure the information, and test the
confidentiality and authentication security
goals.
vi. End of algorithm.
The SHA-512 algorithm generates a fixed size short
code for the desired information (i.e., panoramic
images) that is ready to transmit over the internet or
networks and is a part of cryptography. This
algorithm is deployed to secure the information
against integrity based adversaries and has been
accounted as a m ost efficient and convenient
algorithm due to its merits. Algorithm 2 shows the
panoramic image’s deployed security via SHA-512
cryptography algorithm.
2.2 Algorithm 2: Security Development via
SHA-512 Hashing
i. Select the random size panoramic image
or images and designated as ‘Img’.
ii. Generate a fixed size hash value (H) or
hash digest (H) for selected image (Img),
then transmits it to the target (T) side.
iii. At target side, repeat step i and then
compares with sender hash digest.
iv. Check and ensure the comparison output,
and test the information for integrity
security goals.
v. End of algorithm
As the cryptography based mechanisms are
considered as costly and complex solutions, but
have strong security paradigms against potential
networks adversaries. Therefore, a solution is
proposed to utilize the best performs of cryptograph,
the AES symmetric algorithm and SHA-512 hashing
algorithm are deployed together that will measure
the more efficient security performances for
panoramic images (against adversaries). Moreover,
this security solution will also be optimal due to the
used of both algorithms (such as AES and SHA-
512). Algorithm 3 shows the panoramic image’s
WSEAS TRANSACTIONS on COMPUTERS
DOI: 10.37394/23205.2022.21.11
Aamir Shahzad, Sungho Kim,
Yongsung Kim, Malrey Lee,
Hyangran Lee, Gisung Jeong