A Secure Sharing and Retrieval of Image in an Untrusted Cloud Environment
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
Sharing of Medical reports and scan images of patients are helpful to take quick and perfect decisions among doctors for collaborative treatment. This will help to provide maximum care for the patients who are in long distance where the specialist doctors are not available to give treatment at the correct time. Therefore, Medical images are transmitted in the format of Digital Imaging and Communications in Medicine (DICOM) images which provides a secured communication for effective referrals among peers without affecting the privacy of patients. To provide this security for sharing of medical images, we are combining three cryptic schemes namely Latin Square Image Cipher (LSIC), Arnold Transform and Rubik’s encryption as three different layers. Each encryption techniques have a unique characteristics and properties. In that, LSIC provides shuffling of the image blocks, better substitution and confusion; Arnold Transform provides randomness, erotic and sensibility and also tamper proofing; Rubik Cube basically has the property of permutation of image pixels. These algorithms are developed, implemented and tested in the MATLAB software environment. The testing can be done with various estimated metrics such as Additive White Gaussian Noise (AWGN), Unified Average Changing Intensity (UACI), Number of Pixels Change Rate (NPCR), correlation values and histograms.
Authors and Affiliations
D. Brinda Devi, Dr. S. Selva Kumar
Secure Data-Deduplication with Dynamic Ownership Management in Cloud Storage
In cloud storage services, de-duplication technology is commonly used to reduce the space requirements of services by eliminating redundant data and storing single copy of them. When multiple users uploads the same data...
Implementation on Secure Distributed Deduplication Systems with Improved Reliability
Data deduplication is a method for removing multiple copies of same data, and has been widely used in cloud storage to reduce storage space and uploading speed. However, there is only one copy for each file stored in cl...
Site Locating and Insite Exploring Smart Crawers For Deep Web Interfaces
Mobile Android applications typically have access to sensitive knowledge and resources on the user device. Misuse of this knowledge by malicious applications could result in privacy breaches and sensitive data outpourin...
Dual Image Watermarking By Using Hybrid Technique Based on DCT-DWT and SVD
This research presents a novel watermarking technique to embed one or more watermarks into single cover image. This algorithm makes use of the strengths of 1 level Discrete Wavelet Transform (DWT) and Singular Value Dec...
CUDA Implementation of Heart Health Risk Assessment System Using Ontologies
Heart attack is one of the leading causes of death in both developed and developing countries. The abnormal physical activity of the person which leads to heart attack determined using data mining techniques over data g...