Skip to main content

Secure Medical Diagnosis Using Rule Based Mining

  • Conference paper
Advances in Information Technology (IAIT 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 114))

Included in the following conference series:

Abstract

Security is the governing dynamics of all walks of life. Here we propose a secured medical diagnosis system. Certain specific rules are specified implicitly by the designer of the expert system and then symptoms for the diseases are obtained from the users and by using the pre defined confidence and support values we extract a threshold value which is used to conclude on a particular disease and the stage using Rule Mining. “THINK” CAPTCHA mechanism is used to distinguish between the human and the robots thereby eliminating the robots and preventing them from creating fake accounts and spam’s. A novel image encryption mechanism is designed using genetic algorithm to encrypt the medical images thereby storing and sending the image data in a secured manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Discovering human understandable fuzzy diagnostic rules from medical data Giovanna Castellano, Anna Maria Fanelli and Corrado Mencar Department of Computer Science University of Bari

    Google Scholar 

  2. Saftoiu, A., Vilmann, P., Hassan, H., Gorunescu, F.: Analysis of endoscopic ultrasound elastography used for characterization and differentiation of benign and malignant lymph nodes. Ultraschall in der Medizin (European Journal of Ultrasound) 27(6), 535–542 (2006)

    Article  Google Scholar 

  3. Tsakonas, A., Dounias, G., Jantzen, J., Axer, H.: Evolving rule based systems in two medical domains using genetic programming. Artificial Intelligence of Medicine- Elsevier Journal 32, 195–216 (2004)

    Article  Google Scholar 

  4. Alsultanny, Y.A.: Image encryption by Cipher Feedback Mode, Computer Engineering Department Applied Science University, Amman 11931, Jordan. International Journal of Innovative Computing, Information and Control 3(3) (June 2007)

    Google Scholar 

  5. Zheng, W.M., Lu, Z.M., Burkhardt, H.: Color image retrieval schemes using index histograms based on various spatial-domain vector quantizers. International Journal of Innovative, Computing, Information & Control 2(6), 1317–1327 (2006)

    Google Scholar 

  6. Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Prentice-Hall, Inc., Englewood Cliffs (2002)

    Google Scholar 

  7. Yahya, A.A., Abdalla, A.M.: A Shuffle Image-Encryption Algorithm Department of Computer Science, Al-Zaytoonah University of Jordan, Amman 11733, Jordan

    Google Scholar 

  8. Jablon, D.: Strong password-only authenticated key exchange. Computer Communication Review 265, 5 (1996)

    Article  Google Scholar 

  9. Srikanth, V., Vishwanathan, C., Asati, U., Sriman Narayana Iyengar, N.C.: THINK (Testifying Human Based On Intelligence and Knowledge). In: Proceedings of ICAC 2009, Mumbai, Maharashtra, India, January 23-24 (2009) Copyright 2009 ACM 978-1-60558-351-8

    Google Scholar 

  10. Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: Proceedings of the 1992 IEEE Computer Society Conference on Research in Security and Privacy, pp. 72–84 (1992)

    Google Scholar 

  11. Gong, L., Lomas, M.A., Needham, R., Saltzer, J.: Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications 115, 648–656 (1993)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saleem Durai, M.A., Sriman Narayana Iyengar, N.C. (2010). Secure Medical Diagnosis Using Rule Based Mining. In: Papasratorn, B., Lavangnananda, K., Chutimaskul, W., Vanijja, V. (eds) Advances in Information Technology. IAIT 2010. Communications in Computer and Information Science, vol 114. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16699-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16699-0_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16698-3

  • Online ISBN: 978-3-642-16699-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics