Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions
S. Manimurugan and
Additional contact information
S. Manimurugan: Department of Computer Science and Engineering, MBC College of Engineering and Technology, Kerala, India
C. Narmatha: Department of Electronics and Communication Engineering, Karpagam University, Coimbatore, India
International Journal of Digital Crime and Forensics (IJDCF), 2015, vol. 7, issue 1, 26-50
Exchanging a medical image via network from one place to another place or storing a medical image in a particular place in a secure manner has become a challenge. To overwhelm this, secure medical image Lossless Compression (LC) schemes have been proposed. The original input grayscale medical images are encrypted by Tailored Visual Cryptography Encryption Process (TVCE) which is a proposed encryption system. To generate these encrypted images, four types of processes are adopted which play a vital role. These processes are Splitting Process, Converting Process, Pixel Process and Merging process. The encrypted medical image is compressed by proposed compression algorithms, i.e Pixel Block Short algorithm (PBSA) and one conventional Lossless Compression (LC) algorithm has been adopted (JPEG 2000LS). The above two compression methods are used to separate compression for encrypted medical images. And also, decompressions have been done in a separate manner. The encrypted output image which is generated from decompression of the proposed compression algorithm, JPEG 2000LS are decrypted by the Tailored Visual Cryptography Decryption Process (TVCD). To decrypt the encrypted grayscale medical images, four types of processes are involved. These processes are Segregation Process, Inverse Pixel Process, 8-Bit into Decimal Conversion Process and Amalgamate Process. However, this paper is focused on the proposed visual cryptography only. From these processes, two original images have been reconstructed which are given by two compression algorithms. Ultimately, two combinations are compared with each other based on the various parameters. These techniques can be implemented in the field for storing and transmitting medical images in a secure manner. The Confidentiality, Integrity and Availability (CIA property) of a medical image have also been proved by the experimental results. In this paper we have focused on only proposed visual cryptography scheme.
References: Add references at CitEc
Citations: Track citations by RSS feed
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJDCF.2015010102 (application/pdf)
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
Persistent link: https://EconPapers.repec.org/RePEc:igg:jdcf00:v:7:y:2015:i:1:p:26-50
Access Statistics for this article
More articles in International Journal of Digital Crime and Forensics (IJDCF) from IGI Global
Bibliographic data for series maintained by Journal Editor ().