Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/338605
Title: | Authentication and privacy verification of medical image through visual cryptography |
Researcher: | Alif Siddiqua Begum, A |
Guide(s): | Nirmala, S |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems Visual cryptography Image processing |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | Nowadays, multimedia applications are ubiquitous and it is emerging as an inevitable technique for human to tackle the daily life routines effectively. It appears in various forms such as text, video, and image etc. These are frequently transmitted through the internet. The multimedia data nowadays play a vital role in many fields including medical, education and military. With multimedia technique, information about the certain thing can be understand and utilized effectively. It provides clear information than traditional techniques. Multimedia data is quiet effective than normal text. In recent days, multimedia application is essential one in medical field in order to diagnose the patient s disease. Therefore, the transmission of multi-media medical content is necessary for providing effective treatment. However, patient s confidentiality is questionable in transferring the medical data via unsecured and open networks. So, ensuring the security of the data is becomes vital than utilizing the medical resources. Hence, many researchers pay more attention on data security in order to achieve the secure data transmission in medical domain. Cryptographic technique is an effective technique to prevent data from hacking by means of encryption and decryption concept. However, normal cryptographic technique cannot deal with multimedia contents therefore; visual cryptographic technique is emerged for securing medical image. Traditional visual cryptographic techniques cannot provide good efficiency on noise and blur image. Therefore, optimal secure visual cryptography for medical image is proposed for providing the effective secure system. This will make such images inaccessible by unauthorized person and also ensures confidentiality. In this technique medical image is selected as an input from the database and the selected input medical image is incorporated with the discrete wavelet transform for partitioning the image into blocks. To select the optimal position of every block, proposed method makes use of gaussian based cuckoo search algorithm. Proposed technique creates the dual shares from the secret image. Secret image is converted into number of sheets/shares and utilized for decryption of image. Finally, the shares are embedded to the optimal position in the blocks. After embedding, the extraction operation is carried out. Medical image authentication and verification is done using visual cryptographic design. The target database is utilized for the purpose of authentication and verification of medical image where secret images are registered in the target database. Based on this optimal secure visual cryptography method the user s authentication newline |
Pagination: | Xii,130 p. |
URI: | http://hdl.handle.net/10603/338605 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.1 kB | Adobe PDF | View/Open |
02_certificates.pdf | 434.8 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 799.2 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 132.98 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 300.09 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 590.97 kB | Adobe PDF | View/Open | |
07_contents.pdf | 188.2 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 181.73 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 183.33 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 209.91 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 712.47 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 403.59 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 589.66 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 424.13 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 519.88 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 310.98 kB | Adobe PDF | View/Open | |
17_references.pdf | 341.82 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 301.67 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 108.15 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: