5 research outputs found

    A Naïve Visual Cryptographic Algorithm for the Transfer of Compressed Medical Images

    Get PDF
    The transmission of a suitably compressed image over a bandwidth, over long distances, gives rise towards a new era in the field of information technology. A gradual increase in this appending scenic application, involving the transfer of the images securely over the Ethernet has become an increasingly important aspect to be addressed during thou phenomenon, especially in the transfer of the digital medical images vividly, encapsulated with abundant information related to these images. The compressed medical images of the DICOM format contain certain amount of confidential data, pertaining to a clinical research or to an individual, and the confidentiality of the same has to be preserved from various security threats and eves-dropping. With a widespread applications among various multimedia applicative systems, telemedicine, medical imaging, military and certain safety-critical applications, inter-net and intra-net communicative applications, etc, a reliable transfer of suitable information, efficiently & securely is considered as one of the revolutionary aims in today’s communication technology and visual cryptographic methodologies. Real-time applications as such detailed above majorly is concerned with the security measures and many algorithms have been developed as a proof for various visual cryptographic methodologies. In this paper we propose an efficient and a reliable visual cryptographic methodology which focuses on the encryption and decryption of the two-dimensional DICOM standard compressed medical image, effectively.  This paper discusses an efficient design of 192 bit encoder using AES Rijndael Algorithm with the decomposition of an image into square image size blocks and the image blocks are shuffled using 2D CAT map. The shuffling of the image blocks/pixels employs a Logistic map of these image pixels coupled with 2D mapping of the pixels of the DICOM standard medical image, generated randomly, being the control parameter thereby creating a confusion between the cipher and the plain image, gradually increasing the resistive factor against the significant attacks. This paper proposes various analytical metrics such as correlation analysis, entropy analysis, homogeneity analysis, energy analysis, contrast and mean of absolute deviation analysis, to evaluate the proposed algorithm, and their suitability in image encryption applications

    Brief Communications- Detection of breast cancer by mammogram image segmentation

    No full text
    An important approach for describing a region is to quantify its structure content. In this paper the use of functions for computing texture based on statistical measures is pescribed.MPM ( Maximizer of the posterior margins) algorithm is employed.The segmentation based on texture feature would classify the breast tissue under various categories. The algorithm evaluates the region properties of the mammogram image and thereby would classify the image into important segments.Images from mini-MIAS data base (Mammogram Image Analysis Society database(UK)) have been considered to conduct our experiments. The segmentation thus obtained is comparatively better than the other normal methods .The validation of the work has been done by visual inspection of the segmented image by an expert radiologist.This is our basic step for developing a computer aided detection (CAD)system for early detection of breast cancer

    A Survey on Different Levels of Fusion in Multimodal Biometrics

    No full text
    corecore