CFP last date
20 December 2024
Reseach Article

An Authenticated Two-Tier Security on Transmission of Medical Image using Codebase Cryptosystem over Teeming Channel

by Deo Brat Ojha, Ajay Sharma, Abhishek Dwivedi, Bhupendra Kumar, Amit Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 9
Year of Publication: 2011
Authors: Deo Brat Ojha, Ajay Sharma, Abhishek Dwivedi, Bhupendra Kumar, Amit Kumar
10.5120/1710-2287

Deo Brat Ojha, Ajay Sharma, Abhishek Dwivedi, Bhupendra Kumar, Amit Kumar . An Authenticated Two-Tier Security on Transmission of Medical Image using Codebase Cryptosystem over Teeming Channel. International Journal of Computer Applications. 12, 9 ( January 2011), 22-26. DOI=10.5120/1710-2287

@article{ 10.5120/1710-2287,
author = { Deo Brat Ojha, Ajay Sharma, Abhishek Dwivedi, Bhupendra Kumar, Amit Kumar },
title = { An Authenticated Two-Tier Security on Transmission of Medical Image using Codebase Cryptosystem over Teeming Channel },
journal = { International Journal of Computer Applications },
issue_date = { January 2011 },
volume = { 12 },
number = { 9 },
month = { January },
year = { 2011 },
issn = { 0975-8887 },
pages = { 22-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume12/number9/1710-2287/ },
doi = { 10.5120/1710-2287 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:01:14.154444+05:30
%A Deo Brat Ojha
%A Ajay Sharma
%A Abhishek Dwivedi
%A Bhupendra Kumar
%A Amit Kumar
%T An Authenticated Two-Tier Security on Transmission of Medical Image using Codebase Cryptosystem over Teeming Channel
%J International Journal of Computer Applications
%@ 0975-8887
%V 12
%N 9
%P 22-26
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we present an efficient and authentic transmission scheme without digital signature on an algebraic coding theory based public key cryptosystem of medical information like Image, Audio, Video etc. via the combination of stegnographic and cryptographic approach. Stegnographic approach facilitates data hiding, McEliece public-key cryptosystem to encrypts the data,.lossless compression provides us integrity and Fuzzy error correction provides error less message over noisy channel.

References
  1. R.J.McEliece, “ A public-key cryptosystem based on algebraic coding theory,” DSN Progress Report,42-44,1978,pp.114-116.
  2. E.R.Berlekemp, R.J.McEliece, and H.C.A. vanTilborg, “ On the inherent intractability of certain coding problems,” IEEE Transactions on Information Theory, vol.24, No.5, 1978, pp.384-386.
  3. G. Lo-varco,W. Puech, and M. Dumas. “Dct-based watermarking method using error correction codes”, In ICAPR’03, International Conference on Advances inPattern Recognition, Calcutta, India, pages 347–350, 2003.
  4. R. Norcen, M. Podesser, A. Pommer, H.P. Schmidt, and A. Uhl. “Confidential storage and transmission of medical image data”, Computers in Biology and Medicine, 33:277–292, 2003.
  5. Diego F. de Carvalho, Rafael Chies, Andre P. Freire, Luciana A. F. Martimiano and Rudinei Goularte, “Video Steganography for Confidential Documents: Integrity, Privacy and Version Control” , University of Sao Paulo – ICMC, Sao Carlos, SP, Brazil, State University of Maringa, Computing Department, Maringa, PR, Brazil.
  6. Nameer N. EL-Emam, “Hiding a Large Amount of Data with High Security Using Steganography Algorithm” Applied Computer Science Department, Faculty of Information Technology, Philadelphia University, Jordan
  7. Borie J., Puech W., and Dumas M., “Crypto-Compression System for Secure Transfer of Medical Images”, 2nd International Conference on Advances in Medical Signal and Information Processing (MEDSIP 2004), September 2004.
  8. N.Walkinshaw, S.Afshan, P.McMinn ”Using Compression Algorithms to Support the Comprehension of Program Traces” Proceedings of the International Workshop on Dynamic Analysis (WODA 2010) Trento, Italy, July 2010.
  9. Johannes Buchmann, Carlos Coronado, Martin D¨oring, Daniela Engelbert,Christoph Ludwig, Raphael Overbeck, Arthur Schmidt ,Ulrich Vollmer, Ralf-Philipp Weinmann , “Post- Quantum Signatures”,eprint.iacr.org/2004/297.
  10. Canteaut and N. Sendrier, “Cryptanalysis of the original McEliece Cryptosystem, Advances in Cryptology” - ASIACRYPT ’98 Proceedings, Springer-Verlag ,1998, pp.187–199.
  11. “Health Insurance Portability and Accountability Act (HIPAA) and Its Impact on IT Security,” Regulatory Compliance Series 3 of 6, Apani Networks White Paper Compliance Series. May 12, 2005. http://www.apani.com.
  12. V.Pless, “ Introduction to theory of Error Correcting Codes”, Wiley , New York 1982.
  13. Ajay Sharma, Deo Brat Ojha , “Application of coding theory in Fuzzy Commitment Scheme” in Middle-East Journal of Scientific Research 5 (6) 445-448, 2010
  14. Nameer N. EL-Emam, Hiding a Large Amount of Data with High Security Using Steganography Algorithm Applied Computer Science Department, Faculty of Information Technology, Philadelphia University, Jordan
  15. Alain C. Brainos, A Study Of Steganography And The Art Of Hiding Information, East Carolina University, http://www.infosecwriters.com/text_resources/pdf/steganographyDTEC6823.pdf
  16. Niels Provos, Peter Honeyman, Hide and Seek: Introduction to Steganography, IEEE Security and Privacy, Volume 1 , Issue 3 (May 2003), Pages: 32 - 44
Index Terms

Computer Science
Information Sciences

Keywords

McEliece cryptosystem Cryptography Stegnography Compression Image File Error Correction Code SEQUITUR