SlideShare a Scribd company logo
1 of 5
Download to read offline
G. Ramachandran et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1826-1830

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

DFRFT Domain Digital Watermarking On Medical Images for
Wireless Networks
K. Jayaram M.E., MISTE1, G. Ramachandran M.Tech, MISTE 2, S. Kannan
M.E MISTE 3, L. Vasanth M.E MISTE 4, P.M Murali M.E MISTE 5
Assistant Professor, Electronics and Communication Engineering
1
Madurai Institute of Engineering & Technology, Madurai.
2,3,5
VMKV Engineering College, Salem.
4
Tejaa Shakthi Institute of Technolgy, Coimbatore

ABSTRACT
The wireless networks have been increasingly used both inside hospitals and in patients homes to transmit
medical information. In general, wireless networks endure from decreased security.In this work, combining
wireless transmission and digital watermarking technologies to better secure the transmission of medical images
within and outside the hospital. This system is capable of enhancing the security during the transmission of
medical images through a wireless channel, in two ways: initially by using the default IEEE 802.11 security,
WEP and additionally by applying DFRFT domain digital watermarking to the medical images before
transmitting them through the wireless channel. The DFRFT digital watermarking provides two additional
freedom like DFRFT powers and watermark location that results in the possibility to embed more number of
watermark bits than watermarking domains. The DFRFT powers and watermark location can be used as secret
keys for such type watermarking technique. The integration of the watermarking functionality in a wireless
network not only allows for additional information to be embedded in the patient’s image, but also enables the
receiving end to identify both whether the image has been tampered and whether the source of the image is an
authenticated one. This system can enhance security during the transmission of medical images through a
wireless channel.

I.

INTRODUCTION

The medical world is no exception: an
increasing number of medical applications rely on the
treating physician and=or the patient using wireless
means to deliver or acquire medical information.
Wireless networks are the status quo in modern
hospitals and have helped speed up procedures,
deliver medical expertise, and manage time and space
much more efficiently.1.Unfortunately, nothing good
comes without a price: an increasing concern has
been raised lately about the security of wireless
networks.Both patients and physicians feel that since
the range of the network is not fixed, anyone outside
the hospital’s grounds can gain access to the network
and tamper with the data sent. Understandably, this is
a grim scenario because such an action may have a
severe impact on the patients’ lives and their
privacy.2The wireless networks industry suggested
various ways of encrypting data sent in a wireless
channel and also controlling the user access in that
channel. These included Wired Equivalent Privacy
(WEP),3 Wi-Fi Protected Access, use of RADIUS
servers, and IPSec, with WEP being the simplest and
most commonly used method of encryption.4 There
are, however, increasingly publicized concerns about
the effectiveness of the above-mentioned algorithms
and especially that of WEP, the industry’s default
wireless security standard.5 Exploiting vulnerabilities
www.ijera.com

in the implementation of the security algorithms or
even performing brute force attacks can lead to an
intruder taking control of the channel and
compromising security. In addition, wireless networks
present a number of drawbacks,such as quality of
service as compared with other means of electronic
communication (namely, utilizing the fixed
infrastructure), increased packet loss, increased
latency, and jitter. Nevertheless, it is not the purpose
of this article to go into depth regarding these issues,
as they have been analyzed in other network-oriented
and non-healthcare oriented publications. In this
context, there is a critical need to resort to
complementary measures to effectively address
increasing security threats in the healthcare sector.
Digital watermarking is a promising research area that
can be exploited toward this direction. Among its
numerous applications, ranging from copyright
protection to integrity control,its value-added role in
healthcare systems only recently started to be
realized.6–8 Digital watermarking involves insertion
of additional information directly into the data; from a
healthcare perspective, this attribute can be explored
by means of inserting (1) patient’s sensitive
information into his=her examination data for
increased security, (2) physician’s and=or medical
device identification number for authentication,(3)
1826 | P a g e
G. Ramachandran et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1826-1830
keywords (e.g., patient’s unique identifier and
examination or diagnostic codes) for efficient data
indexing, archiving,and retrieval, and (4) control
arrays for integrity check.9In this context, it would
make sense to introduce an integrated system that
would be able to combine the security strengths of
digital watermarking with the ease of use of wireless
networks in medical scenarios. Such a system should
be easy to use by both medical personnel and patients,
secure
enough to
transfer
vital
medical
information,integratable into standard pieces of
software, and expandable to accommodate future
needs and developments.
This article presents a compact and
integrated system that helps to ensure the safe
transmission and receipt of medical images in a
hospital environment that is run under wireless links.
This has been achieved by combining the current
wireless networking security (WEP) with an
additional level of security provided by digital
watermarking. As far as the authors are aware of, the
concept of using digital watermarking
as a complementary security solution in this context is
still in its infancy, and its implementation in an
integrated WEP-based security system has not yet
been realized.

II.

METHODS

The suggested system essentially comprises
two different units that are eventually combined
together: (1) the wireless network that is partially
secured using WEP encryption, and (2) the digital
watermarking module that provides an additional
level of security by enabling the insertion of
patient=examination-specific information directly
into the image, as well as the verification of the
integrity of the image itself.

III.

WIRELESS NETWORK

A lightweight laptop, connected with a highquality camcorder, which in turn had the ability to
connect to a variety of other medical equipment
around the A&E area through their video-out
connectors, was mounted on a light trolley, and by
having been connected to the WLAN, it was
considered a part of the hospital’s network.2For
compatibility purposes, WEP, being the default
802.11b=g encryption, was utilized. WEP supports
48-, 64-, or 128-bit encryption key. Unfortunately,
owing to the implementation of its security algorithm
(RC4), the overall security is compromised: improper
use of the initialization vectors leaks out information
about the key regardless of its length. An attacker can
calculate the key by gathering and analyzing a
sufficient number of packets. Using an 128-bit key
would only linearly extend the attacking period,
which nowadays takes no longer than 15–30 min,
according to the distance of the attacker from the
AP.3 Using the above-mentioned trolley, the treating
doctor could use any of the system’s input (camera,
www.ijera.com

www.ijera.com

video-in, etc.) to capture high-quality medical images,
and apply the watermarking sequence before the
image is transmitted through the wireless channel.
The image would normally be directly transmitted to
another site—in most cases a site where a medical
consultant resides. As proof of concept, the authors
utilized the high-quality camcorder to capture the
dermatological images, whereas the other modalities
were retrieved from the laptop’s hard drive.
Nevertheless, the same procedure was applicable for
these modalities as well.

IV.

DIGITAL WATERMARKING

The implemented digital watermarking
module has a twofold role: on the one hand, it allows
embedding of additional data regarding the patient,
the examination, and the like, directly into the image;
on the other hand, it enables verification of the image
itself. As far as verification is concerned, the digital
watermarking module generates an image-specific
authentication code, which is embedded along with
the additional patient’s personal and examination data
into the image during the embedding procedure.This
authentication code may include a secure hash value
or alternatively a digital signature, as well as a timestamp, and is retrieved at the watermark extraction
site for image verification. In addition, for security
reasons, a secret key string is used during both
watermark embedding and extraction, to allow for the
retrieval of the embedded information by authorized
users only. During the customization of the
watermarking module for the tests described in this
article, the graphical user interface (GUI) was set to
enable embedding of the following sequence of data
in each image: (1) patient’s first and last name,
father’s name, date of birth, and residence (street,
municipality, city, and country), (2) image modality,
(3) image time-stamp, (4) institute=clinic, and (5)
general comments. The GUI was utilized to embed
the four different character sequences (160, 480, 960,
and 2,000 characters) in sets of images of six different
modalities, comprising computed tomography (CT),
magnetic resonance angiography (MRA), magnetic
resonance
imaging
(MRI),
dermatological,
radiological, and ultrasound images.
After the transmission of the watermarked
image and its reception at the consultant’s site, the
consultant utilizes the same GUI and inserts the secret
key string to extract both the data and the
authentication code for image verification.

1827 | P a g e
G. Ramachandran et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1826-1830

www.ijera.com

where, Kp (x, u) is the kernel function of the FRFT,
and is given
as:

where p is the FRFT order or power, α is the FRFT
rotation angle. The relationship between p and α is
given as α = pπ/2. The inverse of an FRFT with an
order p is the FRFT with order p.
Fig-Combining Wired Equivalent Privacy (WEP)
encryption with digital watermarking to enhance
security in wireless medical image transmission.

VI.
Each Digital watermarking is a technology
of protecting multimedia contents from intellectual
piracy. It is achieved by embedding some
information, called watermark, into original host
media with minimum perceptual degradation. The
watermark is detected or extracted to prove the
ownership of multimedia content when an ownership
dispute occurs.A watermarking algorithm is
implemented for gray-scale images using 2D-DFRFT.
A normal distributed random sequence is used as a
watermark. This watermark is used to modify the
DFRFT coefficients of an image for various locations
and various length of watermark. . Then the inverse
DFRFT is applied to give the watermarked image.
The detection of watermark is performed through
same transform operation. Then we compute the
detection value from the DFRFT coefficients of
watermarked image. We also find threshold value
from some randomly generated sequences. Then
comparison between the detection value and the
threshold value is performed. It is decided that a
watermark has been detected if the detection value is
larger than the threshold value. There is a criterion
given in [3] that a watermark has been detected if the
detection value i.e. computed value of d is larger than
a threshold, which is set to E [d]/2.

V.

OVERVIEW OF DFRFT

The Fractional Fourier transform (FRFT) is
the generalized form of the classical Fourier
transform (FT). The FRFT is a powerful and potential
tool for time-varying and non-stationary signal
processing [4-6]. The FT corresponds to a rotation in
the time-frequency plane over an angle equal to α =
π/2. But, the FRFT corresponds to a rotation over
some arbitrary angle i.e. α = pπ/2. The pth order
FRFT of a signal f (x) is defined as

WATERMARK EMBEDDING

Digital image watermarking in DFRFT
domain was also attempted earlier in [3]. In our
digital image watermarking technique, first the
DFRFT of the host image is computed. Then the
DFRFT coefficients are sorted according to their
magnitude in ascending order and the sorted array is
denoted as Zi=Xi+jYi. Then the watermark is
embedded into the DFRFT coefficients Zi, i =L+1, …
, L+M. The watermark itself is a normal distributed
random sequence of M complex numbers.
Embedding of watermark modifies the sorted vector
Zi as:

Then the modified array Ziw is rearranged in
the original 2D array and the watermarked image is
obtained by computing the inverse DFRFT.

VII.

WATERMARK DETECTION

Watermarked image is first transformed by
using DFRFT with same powers, and DFRFT
coefficients are put in the same order as was used for
embedding. Next the detection value (d) from the
DFRFT coefficients of the watermarked image is
computed as:

The expected value of d is given as

The presence or absence of the watermark is
decided based on the decision whether the computed
value of d is greater/smaller than threshold, which is
set to E[d]/2 [3]. This seems reasonable since an
image without a watermark has E [d] =0. The value d
www.ijera.com

1828 | P a g e
G. Ramachandran et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1826-1830

www.ijera.com

for the correct watermark should stand out above this
average. Here stand out can be defined as being larger
than τ= μ+ 4σ.

VIII.

RESULTS AND DISCUSSION

Parameters used in watermark embedding
and detection are DFRFT powers (p), watermark
location (L), watermark length (M), and watermark
variance (σ2). Parameters used for performance
measurement of this algorithm are PSNR and
imperceptibility.
PSNR: PSNR is used to measure the objective quality
of watermarked images. It is defined as

Where MSE is the mean square error of watermarked
image with host image. MSE is defined as

Especially in the case of medical images
being subjected to watermarking, it must be ensured
that the watermarking process does not induce any
degradation to them that would result in loss of
diagnostic information and thus in the risk of
misdiagnosis. Therefore, apart from addressing the
issue of image quality evaluation based on the abovementioned quality metrics, the watermarked images
need to be evaluated by physicians as well. In the
context of the work presented in this article, a blind
review process took place; namely, two radiologists
were provided with both the original and the
watermarked images, without knowing which of them
were the original ones, and were asked to evaluate
their diagnostic information.The radiologists viewed
the images in two ways before proceeding with their
evaluation: for each medical modality test set, they
first viewed the corresponding images, that is, the
original images and the ones conveying watermarks
of different sizes, individually, sequentially, and in a
random order; then, they viewed them side by
side on flat-panel, 20-inch LCD monitors, with a
resolution equal to 1,600 · 1,200. They were asked to
report whether they were able to notice any difference
among them, which would mean different diagnostic
findings, or whether they would extract the same
diagnosis regardless of the image that it would be
based on. Given that the radiologists did not know
which the original images were, they overcame the
possibility of biased evaluation.

www.ijera.com

(a) Original computed tomography test image.
(b) Watermarked computed tomography test image.

IX.

DISCUSSION

Regarding the wireless transmission, the
proposed integrated system presented reasonable
stability and its performance was comparable to that
of a wired network. This system is capable of
enhancing the security during the transmission of
medical images through a wireless channel, in two
ways: initially by using the default IEEE 802.11
security, WEP, and additionally by watermarking the
medical images before transmitting them through the
wireless channel. The integration of the watermarking
functionality in a wireless network not only allows for
additional information to be embedded in the patient’s
image, but also enables the receiving end to identify
both whether the image has been tampered and
whether the source of the image is an authenticated
one. The proposed system is modular and easy to use:
a GUI interface accepts two inputs, that is, image and
data, and incorporates them into the wireless stream.
The results of the tests showed the efficiency of the
system in terms of both performance and image
1829 | P a g e
G. Ramachandran et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1826-1830
quality preservation. Future work involves large-scale
tests of the proposed approach, using bigger and more
representative data sets of different medical
modalities commonly used in clinical practice.
Further, more extended blind studies should take
place regarding the radiologists’ ability to reach an
accurate diagnosis regardless of the watermarking
process, before such an approach could be adopted in
a clinical environment.

[11]

[12]

REFERENCES
[1]

[2]

[3]

[4]

[5]

[6]

[7]

[8]

[9]

[10]

Tachakra S, Banitsas KA, Tachakra F.
Performance of a wireless telemedicine
system: MedLAN. J Telemed Telecare
2004;12:298–302.
Banitsas KA, Tachakra S, Istepanian RSH.
Operational parameters of a medical wireless
LAN: Security, range and interference
issues. Conf Proc IEEE Eng Med Biol Soc
2002;1889–1890.
Earle AE. Wireless LAN security. In:
Wireless security handbook. Boca Raton,
FL:Auerbach Publications, 2006:181–226.
IEEE Standard 802.11–1999. Part 11:
Wireless LAN medium access control
(MAC) and physical layer (PHY)
specifications. Los Alamitos, CA: IEEE,
1999.
Fluhrer S, Mantin I, Shamir A. Weaknesses
in the key scheduling algorithm of RC4. In:
Vandenay S, Youssef AM, eds. Selected
areas in cryptography: 8th Annual
International
Workshop;
Revised
Papers=SAC 2001. London:Springer-Verlag,
2001:1–24.
Giakoumaki A, Pavlopoulos S, Koutsouris
D. Multiple image watermarking applied to
health information management. IEEE Trans
Inf Technol Biomed 2006;10:722–732.
Coatrieux G, Lecornu L, Sankur B, Roux C.
A review of image watermarking
applications in healthcare. Conf Proc IEEE
Eng Med Biol Soc 2006;4691–4694.
Giakoumaki A, Pavlopoulos S, Koutsouris
D. Secure and efficient health data
management through multiple watermarking
on medical images. Med Bio Eng Comput
2006;44:619–631.
Giakoumaki A, Perakis K, Tagaris A,
Koutsouris D. Digital watermarking in
telemedicine
applications—towards
enhanced
data
security
and
accessibility.Conf Proc IEEE Eng Med Biol
Soc 2006;6328–6331.
10.X. Huang, Y. Luo, M. Tan, and D. Lin,
―A Image Digital Watermarking based on
DWT in Invariant Wavelet Domain,‖
Proceedings
of
IEEE
International
Conference on Images and Graphics, ICIG
2007, pp. 329-336, 22-24 Aug.2007.

www.ijera.com

[13]

[14]

[15]

www.ijera.com

G. Gui, L. Jiang, and C. He, ―A New
Watermarking System for Joint Ownership
Verification,‖
Proceedings
of
IEEE
International Symposium on Circuits and
Systems, ISCAS 2006, Page(s): 4 pp. 21-24
May 2006.
I. Djurovic, S. Stankovic, and I. Pitas,
―Digital Watermarking in the Fractional
Fourier Transformation Domain,‖ Journal of
Network and Computer Applications,
Vol.24, pp. 167-173, 2001.
S.C. Pei and M.H. Yeh, ―A Novel Method
for Discrete Fractional Fourier Transform
Computation,‖ Proceedings of IEEE
International Symposium on Circuits and
Systems, ISCAS 2001, Vol. 2, pp. 585-588,
6-9 May 2001.
C. Candon, M.A. Kutty, and H.M. Ozaktas,
―The
Discrete
Fractional
Fourier
Transform,‖ IEEE Transaction on Signal
Processing, Vol. 48, No. 5, pp. 1329-1337,
May 2000.
F.Q.Yu, Z.K. Zhang, and M.H. Xu, ―A
Digital Watermarking Algorithm for Image
Based on Fractional Fourier Transform,‖
Proceedings of 1st IEEE International
Conference on Industrial Electronics and
Applications, ICIEA 2006, pp. 1-5, 2006.

1830 | P a g e

More Related Content

What's hot

Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Editor IJCATR
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET Journal
 
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...AIRCC Publishing Corporation
 
Interenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare NetworkInterenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare NetworkIstabraq M. Al-Joboury
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...AIRCC Publishing Corporation
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksAIRCC Publishing Corporation
 
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET Journal
 
Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...IJECEIAES
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
 
Wireless Sensor Network for Patient Health Monitoring System
Wireless Sensor Network for Patient Health Monitoring SystemWireless Sensor Network for Patient Health Monitoring System
Wireless Sensor Network for Patient Health Monitoring SystemIRJET Journal
 
Embedding and Extraction Techniques for Medical Images-Issues and Challenges
Embedding and Extraction Techniques for Medical Images-Issues and Challenges Embedding and Extraction Techniques for Medical Images-Issues and Challenges
Embedding and Extraction Techniques for Medical Images-Issues and Challenges csandit
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improvingIJMIT JOURNAL
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET Journal
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
An efficient data masking for securing medical data using DNA encoding and ch...
An efficient data masking for securing medical data using DNA encoding and ch...An efficient data masking for securing medical data using DNA encoding and ch...
An efficient data masking for securing medical data using DNA encoding and ch...IJECEIAES
 

What's hot (20)

Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
 
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
 
Interenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare NetworkInterenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare Network
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing Attacks
 
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
 
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAINPATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
 
Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
 
Wireless Sensor Network for Patient Health Monitoring System
Wireless Sensor Network for Patient Health Monitoring SystemWireless Sensor Network for Patient Health Monitoring System
Wireless Sensor Network for Patient Health Monitoring System
 
Embedding and Extraction Techniques for Medical Images-Issues and Challenges
Embedding and Extraction Techniques for Medical Images-Issues and Challenges Embedding and Extraction Techniques for Medical Images-Issues and Challenges
Embedding and Extraction Techniques for Medical Images-Issues and Challenges
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improving
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
 
P045068488
P045068488P045068488
P045068488
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
An efficient data masking for securing medical data using DNA encoding and ch...
An efficient data masking for securing medical data using DNA encoding and ch...An efficient data masking for securing medical data using DNA encoding and ch...
An efficient data masking for securing medical data using DNA encoding and ch...
 

Viewers also liked (20)

Ke3617561763
Ke3617561763Ke3617561763
Ke3617561763
 
Kz3618761878
Kz3618761878Kz3618761878
Kz3618761878
 
Kl3617891796
Kl3617891796Kl3617891796
Kl3617891796
 
Ky3618721875
Ky3618721875Ky3618721875
Ky3618721875
 
Kn3618041809
Kn3618041809Kn3618041809
Kn3618041809
 
Kq3618201825
Kq3618201825Kq3618201825
Kq3618201825
 
Kk3617861788
Kk3617861788Kk3617861788
Kk3617861788
 
Ki3617781782
Ki3617781782Ki3617781782
Ki3617781782
 
Lb3618831892
Lb3618831892Lb3618831892
Lb3618831892
 
La3618791882
La3618791882La3618791882
La3618791882
 
Kh3617741777
Kh3617741777Kh3617741777
Kh3617741777
 
Ks3618311836
Ks3618311836Ks3618311836
Ks3618311836
 
Km3617971803
Km3617971803Km3617971803
Km3617971803
 
Kp3618151819
Kp3618151819Kp3618151819
Kp3618151819
 
Kj3617831785
Kj3617831785Kj3617831785
Kj3617831785
 
Pengenalan Angka
Pengenalan AngkaPengenalan Angka
Pengenalan Angka
 
Las webs
Las webs Las webs
Las webs
 
Dockerin10mins
Dockerin10minsDockerin10mins
Dockerin10mins
 
Trabajo 3
Trabajo 3Trabajo 3
Trabajo 3
 
Isabel
IsabelIsabel
Isabel
 

Similar to Kr3618261830

Medical image encryption techniques: a technical survey and potential challen...
Medical image encryption techniques: a technical survey and potential challen...Medical image encryption techniques: a technical survey and potential challen...
Medical image encryption techniques: a technical survey and potential challen...IJECEIAES
 
Private & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptxPrivate & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptxKomal526846
 
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...suherashaik2003
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET Journal
 
Doctor’s Appointment and E-Prescription Access Management System
Doctor’s Appointment and E-Prescription Access Management SystemDoctor’s Appointment and E-Prescription Access Management System
Doctor’s Appointment and E-Prescription Access Management SystemIRJET Journal
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataIRJET Journal
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud SolutionIRJET Journal
 
Secure and efficient transmission of medical images
Secure and efficient transmission of medical imagesSecure and efficient transmission of medical images
Secure and efficient transmission of medical imageseSAT Publishing House
 
A lightweight and secure multilayer authentication scheme for wireless body a...
A lightweight and secure multilayer authentication scheme for wireless body a...A lightweight and secure multilayer authentication scheme for wireless body a...
A lightweight and secure multilayer authentication scheme for wireless body a...IJECEIAES
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET Journal
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...IRJET Journal
 
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIntrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIRJET Journal
 
A secure telemedicine electronic platform based on lightweight cryptographic ...
A secure telemedicine electronic platform based on lightweight cryptographic ...A secure telemedicine electronic platform based on lightweight cryptographic ...
A secure telemedicine electronic platform based on lightweight cryptographic ...TELKOMNIKA JOURNAL
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionIRJET Journal
 
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...IJERA Editor
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEAIRCC Publishing Corporation
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUIRJET Journal
 

Similar to Kr3618261830 (20)

journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
 
Medical image encryption techniques: a technical survey and potential challen...
Medical image encryption techniques: a technical survey and potential challen...Medical image encryption techniques: a technical survey and potential challen...
Medical image encryption techniques: a technical survey and potential challen...
 
Private & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptxPrivate & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptx
 
Medical
MedicalMedical
Medical
 
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
 
Doctor’s Appointment and E-Prescription Access Management System
Doctor’s Appointment and E-Prescription Access Management SystemDoctor’s Appointment and E-Prescription Access Management System
Doctor’s Appointment and E-Prescription Access Management System
 
Secret key generation
Secret key generationSecret key generation
Secret key generation
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
Secure and efficient transmission of medical images
Secure and efficient transmission of medical imagesSecure and efficient transmission of medical images
Secure and efficient transmission of medical images
 
A lightweight and secure multilayer authentication scheme for wireless body a...
A lightweight and secure multilayer authentication scheme for wireless body a...A lightweight and secure multilayer authentication scheme for wireless body a...
A lightweight and secure multilayer authentication scheme for wireless body a...
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
 
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIntrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine Learning
 
A secure telemedicine electronic platform based on lightweight cryptographic ...
A secure telemedicine electronic platform based on lightweight cryptographic ...A secure telemedicine electronic platform based on lightweight cryptographic ...
A secure telemedicine electronic platform based on lightweight cryptographic ...
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 

Recently uploaded

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Kr3618261830

  • 1. G. Ramachandran et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1826-1830 RESEARCH ARTICLE www.ijera.com OPEN ACCESS DFRFT Domain Digital Watermarking On Medical Images for Wireless Networks K. Jayaram M.E., MISTE1, G. Ramachandran M.Tech, MISTE 2, S. Kannan M.E MISTE 3, L. Vasanth M.E MISTE 4, P.M Murali M.E MISTE 5 Assistant Professor, Electronics and Communication Engineering 1 Madurai Institute of Engineering & Technology, Madurai. 2,3,5 VMKV Engineering College, Salem. 4 Tejaa Shakthi Institute of Technolgy, Coimbatore ABSTRACT The wireless networks have been increasingly used both inside hospitals and in patients homes to transmit medical information. In general, wireless networks endure from decreased security.In this work, combining wireless transmission and digital watermarking technologies to better secure the transmission of medical images within and outside the hospital. This system is capable of enhancing the security during the transmission of medical images through a wireless channel, in two ways: initially by using the default IEEE 802.11 security, WEP and additionally by applying DFRFT domain digital watermarking to the medical images before transmitting them through the wireless channel. The DFRFT digital watermarking provides two additional freedom like DFRFT powers and watermark location that results in the possibility to embed more number of watermark bits than watermarking domains. The DFRFT powers and watermark location can be used as secret keys for such type watermarking technique. The integration of the watermarking functionality in a wireless network not only allows for additional information to be embedded in the patient’s image, but also enables the receiving end to identify both whether the image has been tampered and whether the source of the image is an authenticated one. This system can enhance security during the transmission of medical images through a wireless channel. I. INTRODUCTION The medical world is no exception: an increasing number of medical applications rely on the treating physician and=or the patient using wireless means to deliver or acquire medical information. Wireless networks are the status quo in modern hospitals and have helped speed up procedures, deliver medical expertise, and manage time and space much more efficiently.1.Unfortunately, nothing good comes without a price: an increasing concern has been raised lately about the security of wireless networks.Both patients and physicians feel that since the range of the network is not fixed, anyone outside the hospital’s grounds can gain access to the network and tamper with the data sent. Understandably, this is a grim scenario because such an action may have a severe impact on the patients’ lives and their privacy.2The wireless networks industry suggested various ways of encrypting data sent in a wireless channel and also controlling the user access in that channel. These included Wired Equivalent Privacy (WEP),3 Wi-Fi Protected Access, use of RADIUS servers, and IPSec, with WEP being the simplest and most commonly used method of encryption.4 There are, however, increasingly publicized concerns about the effectiveness of the above-mentioned algorithms and especially that of WEP, the industry’s default wireless security standard.5 Exploiting vulnerabilities www.ijera.com in the implementation of the security algorithms or even performing brute force attacks can lead to an intruder taking control of the channel and compromising security. In addition, wireless networks present a number of drawbacks,such as quality of service as compared with other means of electronic communication (namely, utilizing the fixed infrastructure), increased packet loss, increased latency, and jitter. Nevertheless, it is not the purpose of this article to go into depth regarding these issues, as they have been analyzed in other network-oriented and non-healthcare oriented publications. In this context, there is a critical need to resort to complementary measures to effectively address increasing security threats in the healthcare sector. Digital watermarking is a promising research area that can be exploited toward this direction. Among its numerous applications, ranging from copyright protection to integrity control,its value-added role in healthcare systems only recently started to be realized.6–8 Digital watermarking involves insertion of additional information directly into the data; from a healthcare perspective, this attribute can be explored by means of inserting (1) patient’s sensitive information into his=her examination data for increased security, (2) physician’s and=or medical device identification number for authentication,(3) 1826 | P a g e
  • 2. G. Ramachandran et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1826-1830 keywords (e.g., patient’s unique identifier and examination or diagnostic codes) for efficient data indexing, archiving,and retrieval, and (4) control arrays for integrity check.9In this context, it would make sense to introduce an integrated system that would be able to combine the security strengths of digital watermarking with the ease of use of wireless networks in medical scenarios. Such a system should be easy to use by both medical personnel and patients, secure enough to transfer vital medical information,integratable into standard pieces of software, and expandable to accommodate future needs and developments. This article presents a compact and integrated system that helps to ensure the safe transmission and receipt of medical images in a hospital environment that is run under wireless links. This has been achieved by combining the current wireless networking security (WEP) with an additional level of security provided by digital watermarking. As far as the authors are aware of, the concept of using digital watermarking as a complementary security solution in this context is still in its infancy, and its implementation in an integrated WEP-based security system has not yet been realized. II. METHODS The suggested system essentially comprises two different units that are eventually combined together: (1) the wireless network that is partially secured using WEP encryption, and (2) the digital watermarking module that provides an additional level of security by enabling the insertion of patient=examination-specific information directly into the image, as well as the verification of the integrity of the image itself. III. WIRELESS NETWORK A lightweight laptop, connected with a highquality camcorder, which in turn had the ability to connect to a variety of other medical equipment around the A&E area through their video-out connectors, was mounted on a light trolley, and by having been connected to the WLAN, it was considered a part of the hospital’s network.2For compatibility purposes, WEP, being the default 802.11b=g encryption, was utilized. WEP supports 48-, 64-, or 128-bit encryption key. Unfortunately, owing to the implementation of its security algorithm (RC4), the overall security is compromised: improper use of the initialization vectors leaks out information about the key regardless of its length. An attacker can calculate the key by gathering and analyzing a sufficient number of packets. Using an 128-bit key would only linearly extend the attacking period, which nowadays takes no longer than 15–30 min, according to the distance of the attacker from the AP.3 Using the above-mentioned trolley, the treating doctor could use any of the system’s input (camera, www.ijera.com www.ijera.com video-in, etc.) to capture high-quality medical images, and apply the watermarking sequence before the image is transmitted through the wireless channel. The image would normally be directly transmitted to another site—in most cases a site where a medical consultant resides. As proof of concept, the authors utilized the high-quality camcorder to capture the dermatological images, whereas the other modalities were retrieved from the laptop’s hard drive. Nevertheless, the same procedure was applicable for these modalities as well. IV. DIGITAL WATERMARKING The implemented digital watermarking module has a twofold role: on the one hand, it allows embedding of additional data regarding the patient, the examination, and the like, directly into the image; on the other hand, it enables verification of the image itself. As far as verification is concerned, the digital watermarking module generates an image-specific authentication code, which is embedded along with the additional patient’s personal and examination data into the image during the embedding procedure.This authentication code may include a secure hash value or alternatively a digital signature, as well as a timestamp, and is retrieved at the watermark extraction site for image verification. In addition, for security reasons, a secret key string is used during both watermark embedding and extraction, to allow for the retrieval of the embedded information by authorized users only. During the customization of the watermarking module for the tests described in this article, the graphical user interface (GUI) was set to enable embedding of the following sequence of data in each image: (1) patient’s first and last name, father’s name, date of birth, and residence (street, municipality, city, and country), (2) image modality, (3) image time-stamp, (4) institute=clinic, and (5) general comments. The GUI was utilized to embed the four different character sequences (160, 480, 960, and 2,000 characters) in sets of images of six different modalities, comprising computed tomography (CT), magnetic resonance angiography (MRA), magnetic resonance imaging (MRI), dermatological, radiological, and ultrasound images. After the transmission of the watermarked image and its reception at the consultant’s site, the consultant utilizes the same GUI and inserts the secret key string to extract both the data and the authentication code for image verification. 1827 | P a g e
  • 3. G. Ramachandran et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1826-1830 www.ijera.com where, Kp (x, u) is the kernel function of the FRFT, and is given as: where p is the FRFT order or power, α is the FRFT rotation angle. The relationship between p and α is given as α = pπ/2. The inverse of an FRFT with an order p is the FRFT with order p. Fig-Combining Wired Equivalent Privacy (WEP) encryption with digital watermarking to enhance security in wireless medical image transmission. VI. Each Digital watermarking is a technology of protecting multimedia contents from intellectual piracy. It is achieved by embedding some information, called watermark, into original host media with minimum perceptual degradation. The watermark is detected or extracted to prove the ownership of multimedia content when an ownership dispute occurs.A watermarking algorithm is implemented for gray-scale images using 2D-DFRFT. A normal distributed random sequence is used as a watermark. This watermark is used to modify the DFRFT coefficients of an image for various locations and various length of watermark. . Then the inverse DFRFT is applied to give the watermarked image. The detection of watermark is performed through same transform operation. Then we compute the detection value from the DFRFT coefficients of watermarked image. We also find threshold value from some randomly generated sequences. Then comparison between the detection value and the threshold value is performed. It is decided that a watermark has been detected if the detection value is larger than the threshold value. There is a criterion given in [3] that a watermark has been detected if the detection value i.e. computed value of d is larger than a threshold, which is set to E [d]/2. V. OVERVIEW OF DFRFT The Fractional Fourier transform (FRFT) is the generalized form of the classical Fourier transform (FT). The FRFT is a powerful and potential tool for time-varying and non-stationary signal processing [4-6]. The FT corresponds to a rotation in the time-frequency plane over an angle equal to α = π/2. But, the FRFT corresponds to a rotation over some arbitrary angle i.e. α = pπ/2. The pth order FRFT of a signal f (x) is defined as WATERMARK EMBEDDING Digital image watermarking in DFRFT domain was also attempted earlier in [3]. In our digital image watermarking technique, first the DFRFT of the host image is computed. Then the DFRFT coefficients are sorted according to their magnitude in ascending order and the sorted array is denoted as Zi=Xi+jYi. Then the watermark is embedded into the DFRFT coefficients Zi, i =L+1, … , L+M. The watermark itself is a normal distributed random sequence of M complex numbers. Embedding of watermark modifies the sorted vector Zi as: Then the modified array Ziw is rearranged in the original 2D array and the watermarked image is obtained by computing the inverse DFRFT. VII. WATERMARK DETECTION Watermarked image is first transformed by using DFRFT with same powers, and DFRFT coefficients are put in the same order as was used for embedding. Next the detection value (d) from the DFRFT coefficients of the watermarked image is computed as: The expected value of d is given as The presence or absence of the watermark is decided based on the decision whether the computed value of d is greater/smaller than threshold, which is set to E[d]/2 [3]. This seems reasonable since an image without a watermark has E [d] =0. The value d www.ijera.com 1828 | P a g e
  • 4. G. Ramachandran et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1826-1830 www.ijera.com for the correct watermark should stand out above this average. Here stand out can be defined as being larger than τ= μ+ 4σ. VIII. RESULTS AND DISCUSSION Parameters used in watermark embedding and detection are DFRFT powers (p), watermark location (L), watermark length (M), and watermark variance (σ2). Parameters used for performance measurement of this algorithm are PSNR and imperceptibility. PSNR: PSNR is used to measure the objective quality of watermarked images. It is defined as Where MSE is the mean square error of watermarked image with host image. MSE is defined as Especially in the case of medical images being subjected to watermarking, it must be ensured that the watermarking process does not induce any degradation to them that would result in loss of diagnostic information and thus in the risk of misdiagnosis. Therefore, apart from addressing the issue of image quality evaluation based on the abovementioned quality metrics, the watermarked images need to be evaluated by physicians as well. In the context of the work presented in this article, a blind review process took place; namely, two radiologists were provided with both the original and the watermarked images, without knowing which of them were the original ones, and were asked to evaluate their diagnostic information.The radiologists viewed the images in two ways before proceeding with their evaluation: for each medical modality test set, they first viewed the corresponding images, that is, the original images and the ones conveying watermarks of different sizes, individually, sequentially, and in a random order; then, they viewed them side by side on flat-panel, 20-inch LCD monitors, with a resolution equal to 1,600 · 1,200. They were asked to report whether they were able to notice any difference among them, which would mean different diagnostic findings, or whether they would extract the same diagnosis regardless of the image that it would be based on. Given that the radiologists did not know which the original images were, they overcame the possibility of biased evaluation. www.ijera.com (a) Original computed tomography test image. (b) Watermarked computed tomography test image. IX. DISCUSSION Regarding the wireless transmission, the proposed integrated system presented reasonable stability and its performance was comparable to that of a wired network. This system is capable of enhancing the security during the transmission of medical images through a wireless channel, in two ways: initially by using the default IEEE 802.11 security, WEP, and additionally by watermarking the medical images before transmitting them through the wireless channel. The integration of the watermarking functionality in a wireless network not only allows for additional information to be embedded in the patient’s image, but also enables the receiving end to identify both whether the image has been tampered and whether the source of the image is an authenticated one. The proposed system is modular and easy to use: a GUI interface accepts two inputs, that is, image and data, and incorporates them into the wireless stream. The results of the tests showed the efficiency of the system in terms of both performance and image 1829 | P a g e
  • 5. G. Ramachandran et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1826-1830 quality preservation. Future work involves large-scale tests of the proposed approach, using bigger and more representative data sets of different medical modalities commonly used in clinical practice. Further, more extended blind studies should take place regarding the radiologists’ ability to reach an accurate diagnosis regardless of the watermarking process, before such an approach could be adopted in a clinical environment. [11] [12] REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] Tachakra S, Banitsas KA, Tachakra F. Performance of a wireless telemedicine system: MedLAN. J Telemed Telecare 2004;12:298–302. Banitsas KA, Tachakra S, Istepanian RSH. Operational parameters of a medical wireless LAN: Security, range and interference issues. Conf Proc IEEE Eng Med Biol Soc 2002;1889–1890. Earle AE. Wireless LAN security. In: Wireless security handbook. Boca Raton, FL:Auerbach Publications, 2006:181–226. IEEE Standard 802.11–1999. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. Los Alamitos, CA: IEEE, 1999. Fluhrer S, Mantin I, Shamir A. Weaknesses in the key scheduling algorithm of RC4. In: Vandenay S, Youssef AM, eds. Selected areas in cryptography: 8th Annual International Workshop; Revised Papers=SAC 2001. London:Springer-Verlag, 2001:1–24. Giakoumaki A, Pavlopoulos S, Koutsouris D. Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 2006;10:722–732. Coatrieux G, Lecornu L, Sankur B, Roux C. A review of image watermarking applications in healthcare. Conf Proc IEEE Eng Med Biol Soc 2006;4691–4694. Giakoumaki A, Pavlopoulos S, Koutsouris D. Secure and efficient health data management through multiple watermarking on medical images. Med Bio Eng Comput 2006;44:619–631. Giakoumaki A, Perakis K, Tagaris A, Koutsouris D. Digital watermarking in telemedicine applications—towards enhanced data security and accessibility.Conf Proc IEEE Eng Med Biol Soc 2006;6328–6331. 10.X. Huang, Y. Luo, M. Tan, and D. Lin, ―A Image Digital Watermarking based on DWT in Invariant Wavelet Domain,‖ Proceedings of IEEE International Conference on Images and Graphics, ICIG 2007, pp. 329-336, 22-24 Aug.2007. www.ijera.com [13] [14] [15] www.ijera.com G. Gui, L. Jiang, and C. He, ―A New Watermarking System for Joint Ownership Verification,‖ Proceedings of IEEE International Symposium on Circuits and Systems, ISCAS 2006, Page(s): 4 pp. 21-24 May 2006. I. Djurovic, S. Stankovic, and I. Pitas, ―Digital Watermarking in the Fractional Fourier Transformation Domain,‖ Journal of Network and Computer Applications, Vol.24, pp. 167-173, 2001. S.C. Pei and M.H. Yeh, ―A Novel Method for Discrete Fractional Fourier Transform Computation,‖ Proceedings of IEEE International Symposium on Circuits and Systems, ISCAS 2001, Vol. 2, pp. 585-588, 6-9 May 2001. C. Candon, M.A. Kutty, and H.M. Ozaktas, ―The Discrete Fractional Fourier Transform,‖ IEEE Transaction on Signal Processing, Vol. 48, No. 5, pp. 1329-1337, May 2000. F.Q.Yu, Z.K. Zhang, and M.H. Xu, ―A Digital Watermarking Algorithm for Image Based on Fractional Fourier Transform,‖ Proceedings of 1st IEEE International Conference on Industrial Electronics and Applications, ICIEA 2006, pp. 1-5, 2006. 1830 | P a g e