Abstract

The transmission of a suitably compressed image over a bandwidth, over long distances, gives rise towards a new era in the field of information technology. A gradual increase in this appending scenic application, involving the transfer of the images securely over the Ethernet has become an increasingly important aspect to be addressed during thou phenomenon, especially in the transfer of the digital medical images vividly, encapsulated with abundant information related to these images. The compressed medical images of the DICOM format contain certain amount of confidential data, pertaining to a clinical research or to an individual, and the confidentiality of the same has to be preserved from various security threats and eves-dropping. With a widespread applications among various multimedia applicative systems, telemedicine, medical imaging, military and certain safety-critical applications, inter-net and intra-net communicative applications, etc, a reliable transfer of suitable information, efficiently & securely is considered as one of the revolutionary aims in today’s communication technology and visual cryptographic methodologies. Real-time applications as such detailed above majorly is concerned with the security measures and many algorithms have been developed as a proof for various visual cryptographic methodologies.
 In this paper we propose an efficient and a reliable visual cryptographic methodology which focuses on the encryption and decryption of the two-dimensional DICOM standard compressed medical image, effectively.
 This paper discusses an efficient design of 192 bit encoder using AES Rijndael Algorithm with the decomposition of an image into square image size blocks and the image blocks are shuffled using 2D CAT map.
 The shuffling of the image blocks/pixels employs a Logistic map of these image pixels coupled with 2D mapping of the pixels of the DICOM standard medical image, generated randomly, being the control parameter thereby creating a confusion between the cipher and the plain image, gradually increasing the resistive factor against the significant attacks. This paper proposes various analytical metrics such as correlation analysis, 
 entropy analysis, homogeneity analysis, energy analysis, contrast and mean of absolute deviation analysis, to evaluate the proposed algorithm, and their suitability in image encryption applications.

Highlights

  • Among the wide range of applications that claim to be multimedia, with diverse target areas as E-magazines, Video-On-Demand (VOD), distance learning, WAN virtual reality, telemedicine, health monitoring systems, etc., these applications are sorted into categories such as Information Systems: An exhaustive multimedia application category wherein the main purpose of all the systems in this category is the provision of the information to the user

  • In this paper we propose an efficient and a reliable visual cryptographic methodology which focuses on the encryption and decryption of the two-dimensional DICOM standard compressed medical image, effectively

  • Remote Systems: The application involving multimedia wherein the systems are represented such that the users are at a remote location and the services are provided to such users

Read more

Summary

INTRODUCTION

Among the wide range of applications that claim to be multimedia, with diverse target areas as E-magazines, Video-On-Demand (VOD), distance learning, WAN virtual reality, telemedicine, health monitoring systems, etc., these applications are sorted into categories such as. Remote Systems: The application involving multimedia wherein the systems are represented such that the users are at a remote location and the services are provided to such users. Visual cryptography is a methodology or a technique which involves various multimedia such as audio, video, images, text, etc., being encrypted (converted to another suitable format), to maintain the authenticity of the multimedia content during its transmission over a suitable bandwidth. The concept of cryptography in multimedia application, confirms the security content in communication, involving the process of encryption which places an important role in encoding the messages or the information contained in a suitable multimedia content, in a way wherein only the authenticated users are liable to access the information thou contained. The vibrant multimedia communication techniques require such efficient encryption and decryption methodologies in converging the data privacy

SURVEY OF THE LITERATURE
PROPOSED METHODOLOGY
Logistic Mapping
The modification is done with the S-Box obtained as
CHAOTIC MAPPINGS
CAT Mapping
AES ALGORITHM
Methodology involved in the design of 192 bit Encoder
SubWord
Affine Transformation
ANALYTICAL RESULTS
Correlation coefficients Analysis
Time Analysis
VIII. CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.