Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/13427
Title: | Medical image transmission through web using secured network |
Researcher: | Mohamed Junaid, K.A. |
Guide(s): | Ravindran, G |
Keywords: | Medical image transmission, Direct Cosine Transformation technique, secured network, computed tomography, joint photographic expert group |
Upload Date: | 28-Nov-2013 |
University: | Anna University |
Completed Date: | |
Abstract: | With the rapid development of communications technology, various methods of medical image transmission are investigated. Transmission of medical images over a distance using telecommunication means provides expert based medical care to any place that requires health care. In this research, medical image transmission through web is implemented in which the medical images are transmitted in a client server architecture in a compressed form using Direct Cosine Transformation (DCT) method. The server compresses the image file using DCT technique. In the client side, the decompressed image is obtained using inverse DCT. After an elaborate survey on existing systems, it seems that there are possibilities for improvement in processing speed for image compression using Field Programmable Gate Array (FPGA) as coprocessor with Digital Signal Processor (DSP). To find the optimum transformation technique suitable for image transmission with less storage space and low band width requirements, Computed tomography (CT) images are compressed using Joint Photographic Expert Group (JPEG) and Discrete wavelet Transformation (DWT) method. In the Security of the Medical image during transmission from physician to another physician, there is a possibility of leakage of medical information due to intruders and will lead to altering of medical image details. It also changes the line of treatment and diagnosis. Hence to provide security in the network, the use of Genetic Algorithm newline(GA) based intrusion detection system (IDS) has been explored and it also detects the new anomalies generated time to time. GA is executed using crossover and mutation by selecting the best rule and these rules are stored in the data base. Identification of anomalies is clearly defined by set of rules with various attributes. To achieve this, GA based IDS has been implemented and tested with specific simulated anomalies in a local network and new rules are created due to time evolving nature of GA to detect the new anomalies. newline newline newline |
Pagination: | xxiii, 196 |
URI: | http://hdl.handle.net/10603/13427 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 49.61 kB | Adobe PDF | View/Open |
02_certificates.pdf | 860.71 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 20.95 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 13.52 kB | Adobe PDF | View/Open | |
05_contents.pdf | 46.72 kB | Adobe PDF | View/Open | |
06_chapter 1.pdf | 56.81 kB | Adobe PDF | View/Open | |
07_chapter 2.pdf | 64.64 kB | Adobe PDF | View/Open | |
08_chapter 3.pdf | 782.78 kB | Adobe PDF | View/Open | |
09_chapter 4.pdf | 664.45 kB | Adobe PDF | View/Open | |
10_chapter 5.pdf | 860.28 kB | Adobe PDF | View/Open | |
11_chapter 6.pdf | 471.97 kB | Adobe PDF | View/Open | |
12_chapter 7.pdf | 475.33 kB | Adobe PDF | View/Open | |
13_references.pdf | 66.93 kB | Adobe PDF | View/Open | |
14_publications.pdf | 13.09 kB | Adobe PDF | View/Open | |
15_vitae.pdf | 13.14 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: