Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/366538
Title: Medical Image Security Using Diffusion Substitution with Reversible Data Hiding and Consent Based Access Control
Researcher: Mancy L.
Guide(s): S. Maria Celestin Vigila
Keywords: Computer Science
Engineering and Technology
Imaging Science and Photographic Technology
University: Noorul Islam Centre for Higher Education
Completed Date: 2021
Abstract: Because of the expanding interest for telemedicine administrations has brought enthusiasm up in the utilization of clinical image insurance innovation. Clinical application manage patient s information that are private and should just be open to approved staff. The extraordinary larger part of clinical images currently exist in electronic arrangement for simple stockpiling, support and recovery. Clinical image security turns into a significant issue, when quiet data is communicated across open system. newlineVarious classified realities, for example, open minded name, date of birth, sexual orientation, and lenient character with insights concerning where the image was taken. So it is important from the lenient thought of sight is to keep the above confirmation in cryptic. So the insurance of medicinal images can be accomplished through mystery, usability, consistency and affirmation. newlineTo make sure about the clinical image, the mystery key of 128 piece size is created by methods for image histogram and the clinical image is scrambled by utilizing diffusion and substitution process. At that point the mystery key is inserted inside the cipher image by the procedure of steganography, lastly the key implanted cipher image is effectively acquired. Execution investigation, for example, measurable examination, relationship examination, key affectability investigation and encryption speed assigns that the proposed cipher image is safer. newlineData hiding is a strategy to intangibly embed essential realities into a standard which could bear the cost of a image to watermark. The information hidden image is called as a covert image. All in all, the covert image is similar as the novel image. At the point when information are covered up into a image, the specific image might be twisted. When all is said in done, as we implant more information, the more images are misshaped. Thus, an astounding information installing technique must ready to conceal various messages and revise the covert image. Here the fulfilled owner encodes the nove
Pagination: 1689Kb
URI: http://hdl.handle.net/10603/366538
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File358.7 kBAdobe PDFView/Open
certificate.pdf222.08 kBAdobe PDFView/Open
chapter 1.pdf569.43 kBAdobe PDFView/Open
chapter 2.pdf245.52 kBAdobe PDFView/Open
chapter 3.pdf618.08 kBAdobe PDFView/Open
chapter 4.pdf734.32 kBAdobe PDFView/Open
chapter 5.pdf423.23 kBAdobe PDFView/Open
chapter 6.pdf65.55 kBAdobe PDFView/Open
list of publications based on thesis.pdf84.34 kBAdobe PDFView/Open
references.pdf122.04 kBAdobe PDFView/Open
table of contents.pdf93.58 kBAdobe PDFView/Open
title page.pdf120.05 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: