Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions

Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions

S. Manimurugan, C. Narmatha
Copyright: © 2015 |Pages: 25
DOI: 10.4018/IJDCF.2015010102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Exchanging a medical image via network from one place to another place or storing a medical image in a particular place in a secure manner has become a challenge. To overwhelm this, secure medical image Lossless Compression (LC) schemes have been proposed. The original input grayscale medical images are encrypted by Tailored Visual Cryptography Encryption Process (TVCE) which is a proposed encryption system. To generate these encrypted images, four types of processes are adopted which play a vital role. These processes are Splitting Process, Converting Process, Pixel Process and Merging process. The encrypted medical image is compressed by proposed compression algorithms, i.e Pixel Block Short algorithm (PBSA) and one conventional Lossless Compression (LC) algorithm has been adopted (JPEG 2000LS). The above two compression methods are used to separate compression for encrypted medical images. And also, decompressions have been done in a separate manner. The encrypted output image which is generated from decompression of the proposed compression algorithm, JPEG 2000LS are decrypted by the Tailored Visual Cryptography Decryption Process (TVCD). To decrypt the encrypted grayscale medical images, four types of processes are involved. These processes are Segregation Process, Inverse Pixel Process, 8-Bit into Decimal Conversion Process and Amalgamate Process. However, this paper is focused on the proposed visual cryptography only. From these processes, two original images have been reconstructed which are given by two compression algorithms. Ultimately, two combinations are compared with each other based on the various parameters. These techniques can be implemented in the field for storing and transmitting medical images in a secure manner. The Confidentiality, Integrity and Availability (CIA property) of a medical image have also been proved by the experimental results. In this paper we have focused on only proposed visual cryptography scheme.
Article Preview
Top

Introduction

Chung-Ping (2005), Shortt .A.E (2006) and Cheng .H (2000) discussed a secret sharing scheme suitable for encrypting colour images and the required colour shares were obtained during encryption by operating at the bit-levels . Perfect reconstruction was achieved by the decryption module using only logical operations. The author paper has invented two approaches for integrating encryption with multimedia compression systems which included selective encryption and modified entropy coders with multiple statistical models. This can be examined for the limitations of selective encryption using cryptanalysis, and provide examples that use selective encryption successfully. Martin .K., (2009), Qiu-Hua Lin (2002) and Zuo-Dian Chen (1999) have been presented a biometric encryption system that addressed the privacy concern in the deployment of the face recognition technology in real-world systems. In particular, they focused on a self-exclusion scenario (a special application of watch-list) of face recognition and proposed a novel design of a biometric encryption system deployed with a face recognition system under constrained conditions. Shujun Li (2008) and Sudharsanan, (2005) have proposed a system which uncovers a new image scrambling (i.e., encryption) scheme without bandwidth expansion which is based on two-dimensional discrete prolate spheroidal sequences. A comprehensive crypt-analysis was given on that image scrambling scheme, showing that it is not sufficiently secure against various crypto graphical attacks including cipher text-only attack, known/chosen-plaintext attack, and chosen-cipher text attack. Detailed cryptanalytic results suggested that the image scrambling scheme could be used to realize perceptual encryption but not to provide content protection for digital images.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing