A Secure Sharing and Retrieval of Image in an Untrusted Cloud Environment
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
Sharing of Medical reports and scan images of patients are helpful to take quick and perfect decisions among doctors for collaborative treatment. This will help to provide maximum care for the patients who are in long distance where the specialist doctors are not available to give treatment at the correct time. Therefore, Medical images are transmitted in the format of Digital Imaging and Communications in Medicine (DICOM) images which provides a secured communication for effective referrals among peers without affecting the privacy of patients. To provide this security for sharing of medical images, we are combining three cryptic schemes namely Latin Square Image Cipher (LSIC), Arnold Transform and Rubik’s encryption as three different layers. Each encryption techniques have a unique characteristics and properties. In that, LSIC provides shuffling of the image blocks, better substitution and confusion; Arnold Transform provides randomness, erotic and sensibility and also tamper proofing; Rubik Cube basically has the property of permutation of image pixels. These algorithms are developed, implemented and tested in the MATLAB software environment. The testing can be done with various estimated metrics such as Additive White Gaussian Noise (AWGN), Unified Average Changing Intensity (UACI), Number of Pixels Change Rate (NPCR), correlation values and histograms.
Authors and Affiliations
D. Brinda Devi, Dr. S. Selva Kumar
Accident Vehicle Number Tracking System Using GSM And RFID
Trace out the accident vehicle number and auto informing system by using GSM and RFID technology is used to recognize the location of the accident and easily to reach the location and also to record the vehicle number w...
Application of Non-Singular Matrices in Encryption and Decryption text of Cryptography
Cryptography, the science of encrypting messages in secret codes, has played an important role in securing information since past times. The basic idea of cryptography is that information can be encoded using an encrypt...
Estimation of Software Development Effort Using Back Propagation Neural Network for COCOMOII Dataset
Software cost estimation is an important phase in software development. It predicts the amount of effort and development time required to build a software system. It is one of the most critical tasks and an accurate est...
LTE Advanced: The Next Generation Wireless Technology
LTE-Advanced (LTE-A) is the project name of the evolved version of LTE that is being developed by 3GPP. LTE-A will meet or exceed the requirements of the International Telecommunication Union (ITU) for the fourth genera...
Performance of STATCOM Incorporating Supеrcapacitor
Power system consist of three different processes i.e. generation, transmission and distribution. In this system the important factor is efficiency as well as reactive power improvement. Reactive power is rеquirеd to ma...