Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/366538
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial155
dc.date.accessioned2022-03-03T09:50:33Z-
dc.date.available2022-03-03T09:50:33Z-
dc.identifier.urihttp://hdl.handle.net/10603/366538-
dc.description.abstractBecause of the expanding interest for telemedicine administrations has brought enthusiasm up in the utilization of clinical image insurance innovation. Clinical application manage patient s information that are private and should just be open to approved staff. The extraordinary larger part of clinical images currently exist in electronic arrangement for simple stockpiling, support and recovery. Clinical image security turns into a significant issue, when quiet data is communicated across open system. newlineVarious classified realities, for example, open minded name, date of birth, sexual orientation, and lenient character with insights concerning where the image was taken. So it is important from the lenient thought of sight is to keep the above confirmation in cryptic. So the insurance of medicinal images can be accomplished through mystery, usability, consistency and affirmation. newlineTo make sure about the clinical image, the mystery key of 128 piece size is created by methods for image histogram and the clinical image is scrambled by utilizing diffusion and substitution process. At that point the mystery key is inserted inside the cipher image by the procedure of steganography, lastly the key implanted cipher image is effectively acquired. Execution investigation, for example, measurable examination, relationship examination, key affectability investigation and encryption speed assigns that the proposed cipher image is safer. newlineData hiding is a strategy to intangibly embed essential realities into a standard which could bear the cost of a image to watermark. The information hidden image is called as a covert image. All in all, the covert image is similar as the novel image. At the point when information are covered up into a image, the specific image might be twisted. When all is said in done, as we implant more information, the more images are misshaped. Thus, an astounding information installing technique must ready to conceal various messages and revise the covert image. Here the fulfilled owner encodes the nove
dc.format.extent1689Kb
dc.languageEnglish
dc.relation140
dc.rightsuniversity
dc.titleMedical Image Security Using Diffusion Substitution with Reversible Data Hiding and Consent Based Access Control
dc.title.alternative
dc.creator.researcherMancy L.
dc.subject.keywordComputer Science
dc.subject.keywordEngineering and Technology
dc.subject.keywordImaging Science and Photographic Technology
dc.description.note
dc.contributor.guideS. Maria Celestin Vigila
dc.publisher.placeKanyakumari
dc.publisher.universityNoorul Islam Centre for Higher Education
dc.publisher.institutionDepartment of Computer Science and Engineering
dc.date.registered2014
dc.date.completed2021
dc.date.awarded2021
dc.format.dimensionsA4
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File358.7 kBAdobe PDFView/Open
certificate.pdf222.08 kBAdobe PDFView/Open
chapter 1.pdf569.43 kBAdobe PDFView/Open
chapter 2.pdf245.52 kBAdobe PDFView/Open
chapter 3.pdf618.08 kBAdobe PDFView/Open
chapter 4.pdf734.32 kBAdobe PDFView/Open
chapter 5.pdf423.23 kBAdobe PDFView/Open
chapter 6.pdf65.55 kBAdobe PDFView/Open
list of publications based on thesis.pdf84.34 kBAdobe PDFView/Open
references.pdf122.04 kBAdobe PDFView/Open
table of contents.pdf93.58 kBAdobe PDFView/Open
title page.pdf120.05 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: