Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/366538
Title: | Medical Image Security Using Diffusion Substitution with Reversible Data Hiding and Consent Based Access Control |
Researcher: | Mancy L. |
Guide(s): | S. Maria Celestin Vigila |
Keywords: | Computer Science Engineering and Technology Imaging Science and Photographic Technology |
University: | Noorul Islam Centre for Higher Education |
Completed Date: | 2021 |
Abstract: | Because of the expanding interest for telemedicine administrations has brought enthusiasm up in the utilization of clinical image insurance innovation. Clinical application manage patient s information that are private and should just be open to approved staff. The extraordinary larger part of clinical images currently exist in electronic arrangement for simple stockpiling, support and recovery. Clinical image security turns into a significant issue, when quiet data is communicated across open system. newlineVarious classified realities, for example, open minded name, date of birth, sexual orientation, and lenient character with insights concerning where the image was taken. So it is important from the lenient thought of sight is to keep the above confirmation in cryptic. So the insurance of medicinal images can be accomplished through mystery, usability, consistency and affirmation. newlineTo make sure about the clinical image, the mystery key of 128 piece size is created by methods for image histogram and the clinical image is scrambled by utilizing diffusion and substitution process. At that point the mystery key is inserted inside the cipher image by the procedure of steganography, lastly the key implanted cipher image is effectively acquired. Execution investigation, for example, measurable examination, relationship examination, key affectability investigation and encryption speed assigns that the proposed cipher image is safer. newlineData hiding is a strategy to intangibly embed essential realities into a standard which could bear the cost of a image to watermark. The information hidden image is called as a covert image. All in all, the covert image is similar as the novel image. At the point when information are covered up into a image, the specific image might be twisted. When all is said in done, as we implant more information, the more images are misshaped. Thus, an astounding information installing technique must ready to conceal various messages and revise the covert image. Here the fulfilled owner encodes the nove |
Pagination: | 1689Kb |
URI: | http://hdl.handle.net/10603/366538 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
80_recommendation.pdf | Attached File | 358.7 kB | Adobe PDF | View/Open |
certificate.pdf | 222.08 kB | Adobe PDF | View/Open | |
chapter 1.pdf | 569.43 kB | Adobe PDF | View/Open | |
chapter 2.pdf | 245.52 kB | Adobe PDF | View/Open | |
chapter 3.pdf | 618.08 kB | Adobe PDF | View/Open | |
chapter 4.pdf | 734.32 kB | Adobe PDF | View/Open | |
chapter 5.pdf | 423.23 kB | Adobe PDF | View/Open | |
chapter 6.pdf | 65.55 kB | Adobe PDF | View/Open | |
list of publications based on thesis.pdf | 84.34 kB | Adobe PDF | View/Open | |
references.pdf | 122.04 kB | Adobe PDF | View/Open | |
table of contents.pdf | 93.58 kB | Adobe PDF | View/Open | |
title page.pdf | 120.05 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: