A Secure Sharing and Retrieval of Image in an Untrusted Cloud Environment
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
Sharing of Medical reports and scan images of patients are helpful to take quick and perfect decisions among doctors for collaborative treatment. This will help to provide maximum care for the patients who are in long distance where the specialist doctors are not available to give treatment at the correct time. Therefore, Medical images are transmitted in the format of Digital Imaging and Communications in Medicine (DICOM) images which provides a secured communication for effective referrals among peers without affecting the privacy of patients. To provide this security for sharing of medical images, we are combining three cryptic schemes namely Latin Square Image Cipher (LSIC), Arnold Transform and Rubik’s encryption as three different layers. Each encryption techniques have a unique characteristics and properties. In that, LSIC provides shuffling of the image blocks, better substitution and confusion; Arnold Transform provides randomness, erotic and sensibility and also tamper proofing; Rubik Cube basically has the property of permutation of image pixels. These algorithms are developed, implemented and tested in the MATLAB software environment. The testing can be done with various estimated metrics such as Additive White Gaussian Noise (AWGN), Unified Average Changing Intensity (UACI), Number of Pixels Change Rate (NPCR), correlation values and histograms.
Authors and Affiliations
D. Brinda Devi, Dr. S. Selva Kumar
slugA Semantic Concept Detection for Video Based on Regularized Extreme Learning Machine
This paper explains the concept detection based on the proposed method regularized extreme learning machine. In regularized extreme learning machine deals with the modification of the extreme...
A Novel Work for Improving Security and Challenges using Fuzzy Logic Approach in VANETS
Vehicular AdHoc networks are the most emerging technologies in now-a-days. VANETs have many challenges like security and time latency when users are travelling in the roadways. There are many techniques available to ove...
Case Study Of "Neera Devdhar" Canal Seepage Losses and Canal Lining
In india canal irrigation is a major source of artificial irrigation. Many canals are unlined and due to that major seepage is found in unlined canal.50 to 60 % seepage is found in unlined canal. Concrete, shortcrete, s...
Cloud Computing
“Cloud” computing – a relatively recent term, defines the paths ahead in computer science world. Being built on decades of research it utilizes all recent achievements in virtualization, distributed computing, utility c...
Analysis Of Different Utility Mining Methodologies In Transactional Databases
Utility Mining may be delineated as an motion that analyze the data and draws out a few new nontrivial information from the big amount of databases. traditional data mining methods have focused on finding the statistica...