Reference Hub33
Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions

Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions

S. Manimurugan, C. Narmatha
Copyright: © 2015 |Volume: 7 |Issue: 1 |Pages: 25
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781466676930|DOI: 10.4018/IJDCF.2015010102
Cite Article Cite Article

MLA

Manimurugan, S., and C. Narmatha. "Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions." IJDCF vol.7, no.1 2015: pp.26-50. http://doi.org/10.4018/IJDCF.2015010102

APA

Manimurugan, S. & Narmatha, C. (2015). Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions. International Journal of Digital Crime and Forensics (IJDCF), 7(1), 26-50. http://doi.org/10.4018/IJDCF.2015010102

Chicago

Manimurugan, S., and C. Narmatha. "Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions," International Journal of Digital Crime and Forensics (IJDCF) 7, no.1: 26-50. http://doi.org/10.4018/IJDCF.2015010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Exchanging a medical image via network from one place to another place or storing a medical image in a particular place in a secure manner has become a challenge. To overwhelm this, secure medical image Lossless Compression (LC) schemes have been proposed. The original input grayscale medical images are encrypted by Tailored Visual Cryptography Encryption Process (TVCE) which is a proposed encryption system. To generate these encrypted images, four types of processes are adopted which play a vital role. These processes are Splitting Process, Converting Process, Pixel Process and Merging process. The encrypted medical image is compressed by proposed compression algorithms, i.e Pixel Block Short algorithm (PBSA) and one conventional Lossless Compression (LC) algorithm has been adopted (JPEG 2000LS). The above two compression methods are used to separate compression for encrypted medical images. And also, decompressions have been done in a separate manner. The encrypted output image which is generated from decompression of the proposed compression algorithm, JPEG 2000LS are decrypted by the Tailored Visual Cryptography Decryption Process (TVCD). To decrypt the encrypted grayscale medical images, four types of processes are involved. These processes are Segregation Process, Inverse Pixel Process, 8-Bit into Decimal Conversion Process and Amalgamate Process. However, this paper is focused on the proposed visual cryptography only. From these processes, two original images have been reconstructed which are given by two compression algorithms. Ultimately, two combinations are compared with each other based on the various parameters. These techniques can be implemented in the field for storing and transmitting medical images in a secure manner. The Confidentiality, Integrity and Availability (CIA property) of a medical image have also been proved by the experimental results. In this paper we have focused on only proposed visual cryptography scheme.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.