Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/421928
Title: | Contemporary attack resilient hybrid crypto stegano model for secure health care data communication |
Researcher: | Madhusudhan K N |
Guide(s): | Sakthivel P |
Keywords: | Health care Data transmission Cryptography and steganography model |
University: | Anna University |
Completed Date: | 2021 |
Abstract: | Considering the significance of the secure health care data newlinetransmission, this research primarily emphasized on developing a solution with newlineenhanced cryptography and steganography model. Noticeably, cryptosystem newlinefacilitates lightweight cipher generation involvement. However, attack newlineproneness remains a matter of concern. On contrary steganography newlineincorporates data hiding paradigm to secure targeted information. newlineUnfortunately, quality loss, increased entropy and computational complexity newlineremains a challenge. Recalling the cryptosystem enhancement where the newlineauthors have made effort to enhance classical cryptography algorithm with newlinehigher bit of computation or hybrid crypto design though its computational newlinecomplexity at both transmitter and receiver cannot be ignored. Observing above newline-ste newlineoptimistically design having better balance amongst computational overhead, newlineinput quality and augmented level of security can be of atmost significance. It newlinecan be considered as the motivation behind the current study. newlineSince this research primarily focused on designing a novel security newlinesolution for health care data transmission over an uncertain network or channels newlinelike cloud computing environment retaining medical data quality, computation newlineand security is a must. With this motive in this research a highly robust security newlinesolution with enhanced cryptosystem and steganography model is developed. newlineUnlike, classical researchers where authors have merely designed or proposed newlinecrypto or stegano solution without considering contemporary attack newlineprobability. |
Pagination: | xvi,177p. |
URI: | http://hdl.handle.net/10603/421928 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 21.88 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 2.86 MB | Adobe PDF | View/Open | |
03_content.pdf | 209.92 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 231.25 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 1.03 MB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 640.98 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 2.25 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 1.15 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 1.41 MB | Adobe PDF | View/Open | |
10_annexures.pdf | 3.08 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 140.31 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: