Abstract
Security is the governing dynamics of all walks of life. Here we propose a secured medical diagnosis system. Certain specific rules are specified implicitly by the designer of the expert system and then symptoms for the diseases are obtained from the users and by using the pre defined confidence and support values we extract a threshold value which is used to conclude on a particular disease and the stage using Rule Mining. “THINK” CAPTCHA mechanism is used to distinguish between the human and the robots thereby eliminating the robots and preventing them from creating fake accounts and spam’s. A novel image encryption mechanism is designed using genetic algorithm to encrypt the medical images thereby storing and sending the image data in a secured manner.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Discovering human understandable fuzzy diagnostic rules from medical data Giovanna Castellano, Anna Maria Fanelli and Corrado Mencar Department of Computer Science University of Bari
Saftoiu, A., Vilmann, P., Hassan, H., Gorunescu, F.: Analysis of endoscopic ultrasound elastography used for characterization and differentiation of benign and malignant lymph nodes. Ultraschall in der Medizin (European Journal of Ultrasound) 27(6), 535–542 (2006)
Tsakonas, A., Dounias, G., Jantzen, J., Axer, H.: Evolving rule based systems in two medical domains using genetic programming. Artificial Intelligence of Medicine- Elsevier Journal 32, 195–216 (2004)
Alsultanny, Y.A.: Image encryption by Cipher Feedback Mode, Computer Engineering Department Applied Science University, Amman 11931, Jordan. International Journal of Innovative Computing, Information and Control 3(3) (June 2007)
Zheng, W.M., Lu, Z.M., Burkhardt, H.: Color image retrieval schemes using index histograms based on various spatial-domain vector quantizers. International Journal of Innovative, Computing, Information & Control 2(6), 1317–1327 (2006)
Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Prentice-Hall, Inc., Englewood Cliffs (2002)
Yahya, A.A., Abdalla, A.M.: A Shuffle Image-Encryption Algorithm Department of Computer Science, Al-Zaytoonah University of Jordan, Amman 11733, Jordan
Jablon, D.: Strong password-only authenticated key exchange. Computer Communication Review 265, 5 (1996)
Srikanth, V., Vishwanathan, C., Asati, U., Sriman Narayana Iyengar, N.C.: THINK (Testifying Human Based On Intelligence and Knowledge). In: Proceedings of ICAC 2009, Mumbai, Maharashtra, India, January 23-24 (2009) Copyright 2009 ACM 978-1-60558-351-8
Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: Proceedings of the 1992 IEEE Computer Society Conference on Research in Security and Privacy, pp. 72–84 (1992)
Gong, L., Lomas, M.A., Needham, R., Saltzer, J.: Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications 115, 648–656 (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Saleem Durai, M.A., Sriman Narayana Iyengar, N.C. (2010). Secure Medical Diagnosis Using Rule Based Mining. In: Papasratorn, B., Lavangnananda, K., Chutimaskul, W., Vanijja, V. (eds) Advances in Information Technology. IAIT 2010. Communications in Computer and Information Science, vol 114. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16699-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-16699-0_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16698-3
Online ISBN: 978-3-642-16699-0
eBook Packages: Computer ScienceComputer Science (R0)