SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 156 
DESIGN ISSUES AND CHALLENGES OF RELIABLE AND SECURE TRANSMISSION OF MEDICAL IMAGES Mohd.Javed Khan1, Asok Bhattacharyya2, Monuwer Alam3 1Dept. Electronics & Comm. Engg, Integral University, Lucknow, India 2Dept. Electronics & Comm. Engg, Delhi Technical University, Delhi, India 3Dept. Electronics & Comm. Engg, Integral University, Lucknow, India Abstract 
The transmission of digital image data now a day’s become a routine and necessity of our society .The amount of digital medical data is increasing rapidly on internet. Now it is become necessity of the secure and reliable digital image data transfer for the fast and efficient diagnosis in the medical world. A lot of data is to be transferred between hospital where the major portion of the data is the medical images, patient history, and pervious diagnosis record. Digital Imaging and communication in medicine (DICOM) standard are used to solve this problem where the patient records are attached. To make the transmission robust the patient record are embedded in the medical image using digital water marking technique for the reliable and secure transmission. The various type of noise may corrupt the medical image data during transmission and even storage media may also be affected. Using Error Control Coding Techniques to Encode the medical images may one of the possible solutions for this problem. Keywords—DICOM, ECC, Water Marking, Discrete Wavlet Transform 
----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION For the fast and efficient diagnosis a huge amount of data is required to be transmitted over wireless or internet in medical world. The major portions of the data which we have to share between hospitals are the medical images and diagnosis records (i.e. patient history). If the patient basic details and medical images are stored in a separate data base with different file names may lead to mishandling such as unauthorized access. DICOM standard are used to solve the above problem .In DICOM images the header are filled with ASCII character of patient record are normally used in most hospital all over the world. But in this system since there are no security feature the unauthorized access and the loss of header information will create the problem. For the data transmission and storage the digital water marking technique may improve the DICOM standard. In watermarking technique the patient record are embedded in the medical images which will reduce the possibility of unauthorized access and it does not need any separate header information for the patient record which also improves if the header information is lost during transmission. 
Digital watermarking is a technique in which hidden information (also known as watermark) is inserted in to the original data (multimedia data or cover media).Water mark may be in image ,text ,audio or video form .By inserting or embedding the watermark with specific algorithm original data is slightly modified[1-3]. The modified data is known as watermarked media. So there will be little or no perceptible difference between original media and watermarked media content [4]. 
Watermark embedding techniques are divided into two basic categories- 
1.By Embedding the watermark into the cover signal through the LSB (least significant bit ).In it LSB of the cover signal is replaced by the watermark to get the watermarked image .It has less complexity and can be easily implemented but it is not robust to any types of attacks. 2.By Embedding the watermark in to the transform domain of cover image .Transform domain or frequency domain is obtained by taking the DFT(discrete Fourier Transform) or DCT (Discrete Cosine Transform ) or DWT (Discrete Wavelet Transform ).After this low frequency component are modified to obtained the watermarked image. 2. RELATED WORK Watermarking technique is used in compact storage and transmission of patient text information or bio –signals and medical images. In Spatial domain watermarking technique ,patient information is embedded into the medical images[5-6] and Percentage normalized root mean square error (%NRMSE) is computed for original and watermarked images.ECC techniques is used to recover the watermarked image even though it get corrupted during storage and transmission[7-8].
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 157 
In Transform domain watermarking technique ,patient information is embedded into the medical images[8]. Percentage normalized root mean square error (%NRMSE) will be compared in DFT, DCT and DWT domain for medical images. There is a slight loss of information in the original image. The %NRMSE between original image and watermarked image will be computed and analyzed. Reversible watermarking technique is used to embedded patient text information into the medical images. The %NRMSE between original image and watermarked image will be computed for medical images. Then ECC technique is used to encode the watermarked image and recover it even though is corrupted during storage and transmission. 3. PROPOSED METHODOLOY Figure 1 shows the proposed scheme in which patient text information is embedded in medical images and then it is encoded with ECC the technique before transmission. 
Fig-1 Proposed Scheme for the integrated transmission and storage of text information with medical image and extracted patient text information from the watermarked image 
Embedding is done by using spatial (LSB) or by Transform domain (DFT, DCT and DWT) or by reversible watermarking. And to get the patient text information ,transmitted information is first decoded using ECC and then different type of extracting methods are used .Discrete wavelet Transform will be used to solve out the problem of image compression and decompression and Arnold Scrambling algorithm will be used to solve the watermarking problem. And for Error correction Codes Turbo code is used. 
Wavelet compression involves a way of analyzing an uncompressed image in recursive fashion resulting in a series of higher resolution images, each “adding to” the information content in lower resolution image. There are five steps in compression and decompression technique, those are shown in figure 2 and figure 3. 
Fig2 Wavelet based image Compression 
Fig-3 Wavelet based image decompression Lossless or reversible compression refer to compression technique in which reconstructed data exactly matches the original. Lossless compression denotes compression methods, which give the quantitive bounds on the nature of the loss that is introduced. Such compression techniques provide the guarantee that no pixel difference between the original and compressed image is above a given value. There are various Loss-Less Compression methods which are- a. Run-Length encoding b. Entropy coding c. Adaptive dictionary algorithm such as LZW (Lempel- Ziv – Welch ) d. Deflaction In this paper Arnold transform is chosen as pretreatment method for watermark signal as it is simple and periodic. Arnold transformation was proposed by Mathematician Arnold [9] in the study of ergodic theory. If the original image size is N×N, and (x ,y ) is the pixel coordinate, then after the geometric transformation the pixel is moved to ( x', y') . This geometric transformation can be described as follows [10]: [x y] = [x+y x+2y] mod t 
Where “t” is the width (height) of the watermark, Every pixel in the image is transformed in this formula. After traversing all of the pixels in image, a scrambling image is gained. Transforming an image repeatedly can generate different
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 158 
result until reaching the requirement. Due to the Arnold transform periodicity, original image can be recovered. 4. CONCLUSIONS Since in our proposed method the patient text information is interleaved in to the medical images by using Watermarking Technique. This technique will overcome the problem of header loss (Patient basic details) during transmission in conventional DICOM. The watermarking technique also improves the unauthorized access of the data. So the proposed methodology will be suitable for the secure and reliable transmission of medical images, patient history and patient ID over the internet for the fast and efficient diagnosis of patient REFERENCES [1]. Delaigl E J F, Vleeschouwer C D, Macq B.: Watermarking Algorithm Based On A Human Visual Model. J. Signal Processing. 66(5), 319--336(1998). [2]. SWANSON M D, ZU B, TEWF IKA H.: Robust Data Hiding For Images. J. Proc IEEE 7th Digital Signal Processing Workshop (DSP 96). 9, 37--40(1996). [3]. Gu-song Hao, Yang Cai, Zhang Haiyu, Liu Xiaoxia.: One Iimproved Arnold Transformation. J. Henan University (Natural Science). 2, (2009). [4]. Qi Dongxu, Zou Jianchun, Han Xiaoyou.: A New Class of Scrambling Transformation And Its Application In The Image Information Covering. J. Science In China Scrics., 43 (3), 304- -312 (2000). [5]. Baraff D, Witk A, Kass M.: Untangling Cloth. J. ACM Transactions On Graphics. 22(3), 862--870(2003). [6]. Wang Lulu, Zhang Chong.: Arnold Scrambling Based On Digital Image EncryptionTechnique. J. National Defense Technology Base. 10, (2010). [7]. Huang Fangyuan.: Arnold Scrambling Based On Image Scrambling Algorithm And Implementation. J. Gui Zhou University (Natural Science). 25(3), (2008). [8]. Wu Lingling, Zhang Jianwei, Ge qi.: Arnold Transformation And Its Inverse Transformation. J. Micro Computer. 14, (2010). [9]. Huang Liangyong, Xiao Degui.: The Best Scrambling Degree of Arnold Transformation On Binary Images. J. Computer Applications. 2 (2009) [10]. G. Coatrieux, H. Main, B. Sankur, Y. Rolland, and R. Collorec. Relevance of watermarking in medical imaging. In IEEE-embs Information Technology Applications in Biomedicine,pages 250–255, Arlington, USA, Nov. 2000.

More Related Content

What's hot

Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...IJERA Editor
 
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...P singh
 
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeAn improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeiaemedu
 
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMCOMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMsipij
 
Extraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance AngiogramsExtraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance AngiogramsIDES Editor
 
IRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
IRJET - 3D Reconstruction and Modelling of a Brain MRI with TumourIRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
IRJET - 3D Reconstruction and Modelling of a Brain MRI with TumourIRJET Journal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Classification of neovascularization using convolutional neural network model
Classification of neovascularization using convolutional neural network modelClassification of neovascularization using convolutional neural network model
Classification of neovascularization using convolutional neural network modelTELKOMNIKA JOURNAL
 
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...CSCJournals
 
Lossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyIRJET Journal
 
AN ANN BASED BRAIN ABNORMALITY DETECTION USING MR IMAGES
AN ANN BASED BRAIN ABNORMALITY DETECTION USING MR IMAGESAN ANN BASED BRAIN ABNORMALITY DETECTION USING MR IMAGES
AN ANN BASED BRAIN ABNORMALITY DETECTION USING MR IMAGEScscpconf
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
 

What's hot (17)

1674 1677
1674 16771674 1677
1674 1677
 
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
 
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
 
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeAn improved robust and secured image steganographic scheme
An improved robust and secured image steganographic scheme
 
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMCOMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
 
Extraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance AngiogramsExtraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance Angiograms
 
IRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
IRJET - 3D Reconstruction and Modelling of a Brain MRI with TumourIRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
IRJET - 3D Reconstruction and Modelling of a Brain MRI with Tumour
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Classification of neovascularization using convolutional neural network model
Classification of neovascularization using convolutional neural network modelClassification of neovascularization using convolutional neural network model
Classification of neovascularization using convolutional neural network model
 
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
 
Lossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative Study
 
109 115
109 115109 115
109 115
 
AN ANN BASED BRAIN ABNORMALITY DETECTION USING MR IMAGES
AN ANN BASED BRAIN ABNORMALITY DETECTION USING MR IMAGESAN ANN BASED BRAIN ABNORMALITY DETECTION USING MR IMAGES
AN ANN BASED BRAIN ABNORMALITY DETECTION USING MR IMAGES
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
 
40120140505005 2
40120140505005 240120140505005 2
40120140505005 2
 
40120140505005
4012014050500540120140505005
40120140505005
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 

Viewers also liked

Flip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded featuresFlip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded featureseSAT Publishing House
 
Locational marginal pricing framework in secured dispatch scheduling under co...
Locational marginal pricing framework in secured dispatch scheduling under co...Locational marginal pricing framework in secured dispatch scheduling under co...
Locational marginal pricing framework in secured dispatch scheduling under co...eSAT Publishing House
 
Forecasting trip attraction based on commercial land
Forecasting trip attraction based on commercial landForecasting trip attraction based on commercial land
Forecasting trip attraction based on commercial landeSAT Publishing House
 
Optimization of shrinkage and surface roughness of
Optimization of shrinkage and surface roughness ofOptimization of shrinkage and surface roughness of
Optimization of shrinkage and surface roughness ofeSAT Publishing House
 
Investigations on material casualty of plates under
Investigations on material casualty of plates underInvestigations on material casualty of plates under
Investigations on material casualty of plates undereSAT Publishing House
 
Performance comparison of qo s based routing
Performance comparison of qo s based routingPerformance comparison of qo s based routing
Performance comparison of qo s based routingeSAT Publishing House
 
Detection andprevention of fake access point using sensor nodes
Detection andprevention of fake access point using sensor nodesDetection andprevention of fake access point using sensor nodes
Detection andprevention of fake access point using sensor nodeseSAT Publishing House
 
Soft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial wasteSoft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial wasteeSAT Publishing House
 
Growth and characterization of pure and ni2+ doped
Growth and characterization of pure and ni2+ dopedGrowth and characterization of pure and ni2+ doped
Growth and characterization of pure and ni2+ dopedeSAT Publishing House
 
Master slave vector controlled double induction
Master slave vector controlled double inductionMaster slave vector controlled double induction
Master slave vector controlled double inductioneSAT Publishing House
 
Review and calculation of activity co efficient of tea
Review and calculation of activity co efficient of teaReview and calculation of activity co efficient of tea
Review and calculation of activity co efficient of teaeSAT Publishing House
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
Simulation and experimental studies for lateral
Simulation and experimental studies for lateralSimulation and experimental studies for lateral
Simulation and experimental studies for lateraleSAT Publishing House
 
Comparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascadedComparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascadedeSAT Publishing House
 
The influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctionThe influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctioneSAT Publishing House
 
Automatic detection and severity analysis of brain
Automatic detection and severity analysis of brainAutomatic detection and severity analysis of brain
Automatic detection and severity analysis of braineSAT Publishing House
 
A novel way of verifiable redistribution of the secret in a multiuser environ...
A novel way of verifiable redistribution of the secret in a multiuser environ...A novel way of verifiable redistribution of the secret in a multiuser environ...
A novel way of verifiable redistribution of the secret in a multiuser environ...eSAT Publishing House
 
Performance of slope under seismic conditions
Performance of slope under seismic conditionsPerformance of slope under seismic conditions
Performance of slope under seismic conditionseSAT Publishing House
 
Emc model for modern power electronic systems for
Emc model for modern power electronic systems forEmc model for modern power electronic systems for
Emc model for modern power electronic systems foreSAT Publishing House
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
 

Viewers also liked (20)

Flip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded featuresFlip invariant video copy detection using sparse-coded features
Flip invariant video copy detection using sparse-coded features
 
Locational marginal pricing framework in secured dispatch scheduling under co...
Locational marginal pricing framework in secured dispatch scheduling under co...Locational marginal pricing framework in secured dispatch scheduling under co...
Locational marginal pricing framework in secured dispatch scheduling under co...
 
Forecasting trip attraction based on commercial land
Forecasting trip attraction based on commercial landForecasting trip attraction based on commercial land
Forecasting trip attraction based on commercial land
 
Optimization of shrinkage and surface roughness of
Optimization of shrinkage and surface roughness ofOptimization of shrinkage and surface roughness of
Optimization of shrinkage and surface roughness of
 
Investigations on material casualty of plates under
Investigations on material casualty of plates underInvestigations on material casualty of plates under
Investigations on material casualty of plates under
 
Performance comparison of qo s based routing
Performance comparison of qo s based routingPerformance comparison of qo s based routing
Performance comparison of qo s based routing
 
Detection andprevention of fake access point using sensor nodes
Detection andprevention of fake access point using sensor nodesDetection andprevention of fake access point using sensor nodes
Detection andprevention of fake access point using sensor nodes
 
Soft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial wasteSoft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial waste
 
Growth and characterization of pure and ni2+ doped
Growth and characterization of pure and ni2+ dopedGrowth and characterization of pure and ni2+ doped
Growth and characterization of pure and ni2+ doped
 
Master slave vector controlled double induction
Master slave vector controlled double inductionMaster slave vector controlled double induction
Master slave vector controlled double induction
 
Review and calculation of activity co efficient of tea
Review and calculation of activity co efficient of teaReview and calculation of activity co efficient of tea
Review and calculation of activity co efficient of tea
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Simulation and experimental studies for lateral
Simulation and experimental studies for lateralSimulation and experimental studies for lateral
Simulation and experimental studies for lateral
 
Comparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascadedComparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascaded
 
The influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctionThe influence of tree induce suction on soil suction
The influence of tree induce suction on soil suction
 
Automatic detection and severity analysis of brain
Automatic detection and severity analysis of brainAutomatic detection and severity analysis of brain
Automatic detection and severity analysis of brain
 
A novel way of verifiable redistribution of the secret in a multiuser environ...
A novel way of verifiable redistribution of the secret in a multiuser environ...A novel way of verifiable redistribution of the secret in a multiuser environ...
A novel way of verifiable redistribution of the secret in a multiuser environ...
 
Performance of slope under seismic conditions
Performance of slope under seismic conditionsPerformance of slope under seismic conditions
Performance of slope under seismic conditions
 
Emc model for modern power electronic systems for
Emc model for modern power electronic systems forEmc model for modern power electronic systems for
Emc model for modern power electronic systems for
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challenges
 

Similar to Design issues and challenges of reliable and secure transmission of medical images

A N E XQUISITE A PPROACH FOR I MAGE C OMPRESSION T ECHNIQUE USING L OSS...
A N  E XQUISITE  A PPROACH FOR  I MAGE  C OMPRESSION  T ECHNIQUE USING  L OSS...A N  E XQUISITE  A PPROACH FOR  I MAGE  C OMPRESSION  T ECHNIQUE USING  L OSS...
A N E XQUISITE A PPROACH FOR I MAGE C OMPRESSION T ECHNIQUE USING L OSS...ijcsitcejournal
 
DATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSING
DATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSINGDATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSING
DATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSINGcscpconf
 
Embedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPEmbedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPcsijjournal
 
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMSCOMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMScsijjournal
 
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...sipij
 
Final Dessirtation-1 Report
Final Dessirtation-1 ReportFinal Dessirtation-1 Report
Final Dessirtation-1 ReportAnkit Chaudhary
 
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...Dr. Amarjeet Singh
 
Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...
Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...
Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...IRJET Journal
 
dFuse: An Optimized Compression Algorithm for DICOM-Format Image Archive
dFuse: An Optimized Compression Algorithm for DICOM-Format Image ArchivedFuse: An Optimized Compression Algorithm for DICOM-Format Image Archive
dFuse: An Optimized Compression Algorithm for DICOM-Format Image ArchiveCSCJournals
 
Compressed Medical Image Transfer in Frequency Domain
Compressed Medical Image Transfer in Frequency DomainCompressed Medical Image Transfer in Frequency Domain
Compressed Medical Image Transfer in Frequency DomainCSCJournals
 
Reversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approachReversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approachIAEME Publication
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEAIRCC Publishing Corporation
 
An efficient lossless medical image
An efficient lossless medical imageAn efficient lossless medical image
An efficient lossless medical imagecaijjournal
 
3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGES
3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGES3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGES
3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGESijitcs
 
ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...
ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...
ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...IRJET Journal
 
Secure and efficient transmission of medical images
Secure and efficient transmission of medical imagesSecure and efficient transmission of medical images
Secure and efficient transmission of medical imageseSAT Publishing House
 
A novel image encryption scheme based on DCT transform and DNA sequence
A novel image encryption scheme based on DCT transform and  DNA sequenceA novel image encryption scheme based on DCT transform and  DNA sequence
A novel image encryption scheme based on DCT transform and DNA sequencenooriasukmaningtyas
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMijfcstjournal
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform ijfcstjournal
 

Similar to Design issues and challenges of reliable and secure transmission of medical images (20)

A N E XQUISITE A PPROACH FOR I MAGE C OMPRESSION T ECHNIQUE USING L OSS...
A N  E XQUISITE  A PPROACH FOR  I MAGE  C OMPRESSION  T ECHNIQUE USING  L OSS...A N  E XQUISITE  A PPROACH FOR  I MAGE  C OMPRESSION  T ECHNIQUE USING  L OSS...
A N E XQUISITE A PPROACH FOR I MAGE C OMPRESSION T ECHNIQUE USING L OSS...
 
DATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSING
DATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSINGDATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSING
DATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSING
 
Embedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPEmbedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTP
 
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMSCOMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
 
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
 
Final Dessirtation-1 Report
Final Dessirtation-1 ReportFinal Dessirtation-1 Report
Final Dessirtation-1 Report
 
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
 
Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...
Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...
Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...
 
dFuse: An Optimized Compression Algorithm for DICOM-Format Image Archive
dFuse: An Optimized Compression Algorithm for DICOM-Format Image ArchivedFuse: An Optimized Compression Algorithm for DICOM-Format Image Archive
dFuse: An Optimized Compression Algorithm for DICOM-Format Image Archive
 
Compressed Medical Image Transfer in Frequency Domain
Compressed Medical Image Transfer in Frequency DomainCompressed Medical Image Transfer in Frequency Domain
Compressed Medical Image Transfer in Frequency Domain
 
Reversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approachReversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approach
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
 
An efficient lossless medical image
An efficient lossless medical imageAn efficient lossless medical image
An efficient lossless medical image
 
3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGES
3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGES3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGES
3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGES
 
ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...
ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...
ANALYSIS OF LUNG NODULE DETECTION AND STAGE CLASSIFICATION USING FASTER RCNN ...
 
Secure and efficient transmission of medical images
Secure and efficient transmission of medical imagesSecure and efficient transmission of medical images
Secure and efficient transmission of medical images
 
A novel image encryption scheme based on DCT transform and DNA sequence
A novel image encryption scheme based on DCT transform and  DNA sequenceA novel image encryption scheme based on DCT transform and  DNA sequence
A novel image encryption scheme based on DCT transform and DNA sequence
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Recently uploaded (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

Design issues and challenges of reliable and secure transmission of medical images

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 156 DESIGN ISSUES AND CHALLENGES OF RELIABLE AND SECURE TRANSMISSION OF MEDICAL IMAGES Mohd.Javed Khan1, Asok Bhattacharyya2, Monuwer Alam3 1Dept. Electronics & Comm. Engg, Integral University, Lucknow, India 2Dept. Electronics & Comm. Engg, Delhi Technical University, Delhi, India 3Dept. Electronics & Comm. Engg, Integral University, Lucknow, India Abstract The transmission of digital image data now a day’s become a routine and necessity of our society .The amount of digital medical data is increasing rapidly on internet. Now it is become necessity of the secure and reliable digital image data transfer for the fast and efficient diagnosis in the medical world. A lot of data is to be transferred between hospital where the major portion of the data is the medical images, patient history, and pervious diagnosis record. Digital Imaging and communication in medicine (DICOM) standard are used to solve this problem where the patient records are attached. To make the transmission robust the patient record are embedded in the medical image using digital water marking technique for the reliable and secure transmission. The various type of noise may corrupt the medical image data during transmission and even storage media may also be affected. Using Error Control Coding Techniques to Encode the medical images may one of the possible solutions for this problem. Keywords—DICOM, ECC, Water Marking, Discrete Wavlet Transform ----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION For the fast and efficient diagnosis a huge amount of data is required to be transmitted over wireless or internet in medical world. The major portions of the data which we have to share between hospitals are the medical images and diagnosis records (i.e. patient history). If the patient basic details and medical images are stored in a separate data base with different file names may lead to mishandling such as unauthorized access. DICOM standard are used to solve the above problem .In DICOM images the header are filled with ASCII character of patient record are normally used in most hospital all over the world. But in this system since there are no security feature the unauthorized access and the loss of header information will create the problem. For the data transmission and storage the digital water marking technique may improve the DICOM standard. In watermarking technique the patient record are embedded in the medical images which will reduce the possibility of unauthorized access and it does not need any separate header information for the patient record which also improves if the header information is lost during transmission. Digital watermarking is a technique in which hidden information (also known as watermark) is inserted in to the original data (multimedia data or cover media).Water mark may be in image ,text ,audio or video form .By inserting or embedding the watermark with specific algorithm original data is slightly modified[1-3]. The modified data is known as watermarked media. So there will be little or no perceptible difference between original media and watermarked media content [4]. Watermark embedding techniques are divided into two basic categories- 1.By Embedding the watermark into the cover signal through the LSB (least significant bit ).In it LSB of the cover signal is replaced by the watermark to get the watermarked image .It has less complexity and can be easily implemented but it is not robust to any types of attacks. 2.By Embedding the watermark in to the transform domain of cover image .Transform domain or frequency domain is obtained by taking the DFT(discrete Fourier Transform) or DCT (Discrete Cosine Transform ) or DWT (Discrete Wavelet Transform ).After this low frequency component are modified to obtained the watermarked image. 2. RELATED WORK Watermarking technique is used in compact storage and transmission of patient text information or bio –signals and medical images. In Spatial domain watermarking technique ,patient information is embedded into the medical images[5-6] and Percentage normalized root mean square error (%NRMSE) is computed for original and watermarked images.ECC techniques is used to recover the watermarked image even though it get corrupted during storage and transmission[7-8].
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 157 In Transform domain watermarking technique ,patient information is embedded into the medical images[8]. Percentage normalized root mean square error (%NRMSE) will be compared in DFT, DCT and DWT domain for medical images. There is a slight loss of information in the original image. The %NRMSE between original image and watermarked image will be computed and analyzed. Reversible watermarking technique is used to embedded patient text information into the medical images. The %NRMSE between original image and watermarked image will be computed for medical images. Then ECC technique is used to encode the watermarked image and recover it even though is corrupted during storage and transmission. 3. PROPOSED METHODOLOY Figure 1 shows the proposed scheme in which patient text information is embedded in medical images and then it is encoded with ECC the technique before transmission. Fig-1 Proposed Scheme for the integrated transmission and storage of text information with medical image and extracted patient text information from the watermarked image Embedding is done by using spatial (LSB) or by Transform domain (DFT, DCT and DWT) or by reversible watermarking. And to get the patient text information ,transmitted information is first decoded using ECC and then different type of extracting methods are used .Discrete wavelet Transform will be used to solve out the problem of image compression and decompression and Arnold Scrambling algorithm will be used to solve the watermarking problem. And for Error correction Codes Turbo code is used. Wavelet compression involves a way of analyzing an uncompressed image in recursive fashion resulting in a series of higher resolution images, each “adding to” the information content in lower resolution image. There are five steps in compression and decompression technique, those are shown in figure 2 and figure 3. Fig2 Wavelet based image Compression Fig-3 Wavelet based image decompression Lossless or reversible compression refer to compression technique in which reconstructed data exactly matches the original. Lossless compression denotes compression methods, which give the quantitive bounds on the nature of the loss that is introduced. Such compression techniques provide the guarantee that no pixel difference between the original and compressed image is above a given value. There are various Loss-Less Compression methods which are- a. Run-Length encoding b. Entropy coding c. Adaptive dictionary algorithm such as LZW (Lempel- Ziv – Welch ) d. Deflaction In this paper Arnold transform is chosen as pretreatment method for watermark signal as it is simple and periodic. Arnold transformation was proposed by Mathematician Arnold [9] in the study of ergodic theory. If the original image size is N×N, and (x ,y ) is the pixel coordinate, then after the geometric transformation the pixel is moved to ( x', y') . This geometric transformation can be described as follows [10]: [x y] = [x+y x+2y] mod t Where “t” is the width (height) of the watermark, Every pixel in the image is transformed in this formula. After traversing all of the pixels in image, a scrambling image is gained. Transforming an image repeatedly can generate different
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 158 result until reaching the requirement. Due to the Arnold transform periodicity, original image can be recovered. 4. CONCLUSIONS Since in our proposed method the patient text information is interleaved in to the medical images by using Watermarking Technique. This technique will overcome the problem of header loss (Patient basic details) during transmission in conventional DICOM. The watermarking technique also improves the unauthorized access of the data. So the proposed methodology will be suitable for the secure and reliable transmission of medical images, patient history and patient ID over the internet for the fast and efficient diagnosis of patient REFERENCES [1]. Delaigl E J F, Vleeschouwer C D, Macq B.: Watermarking Algorithm Based On A Human Visual Model. J. Signal Processing. 66(5), 319--336(1998). [2]. SWANSON M D, ZU B, TEWF IKA H.: Robust Data Hiding For Images. J. Proc IEEE 7th Digital Signal Processing Workshop (DSP 96). 9, 37--40(1996). [3]. Gu-song Hao, Yang Cai, Zhang Haiyu, Liu Xiaoxia.: One Iimproved Arnold Transformation. J. Henan University (Natural Science). 2, (2009). [4]. Qi Dongxu, Zou Jianchun, Han Xiaoyou.: A New Class of Scrambling Transformation And Its Application In The Image Information Covering. J. Science In China Scrics., 43 (3), 304- -312 (2000). [5]. Baraff D, Witk A, Kass M.: Untangling Cloth. J. ACM Transactions On Graphics. 22(3), 862--870(2003). [6]. Wang Lulu, Zhang Chong.: Arnold Scrambling Based On Digital Image EncryptionTechnique. J. National Defense Technology Base. 10, (2010). [7]. Huang Fangyuan.: Arnold Scrambling Based On Image Scrambling Algorithm And Implementation. J. Gui Zhou University (Natural Science). 25(3), (2008). [8]. Wu Lingling, Zhang Jianwei, Ge qi.: Arnold Transformation And Its Inverse Transformation. J. Micro Computer. 14, (2010). [9]. Huang Liangyong, Xiao Degui.: The Best Scrambling Degree of Arnold Transformation On Binary Images. J. Computer Applications. 2 (2009) [10]. G. Coatrieux, H. Main, B. Sankur, Y. Rolland, and R. Collorec. Relevance of watermarking in medical imaging. In IEEE-embs Information Technology Applications in Biomedicine,pages 250–255, Arlington, USA, Nov. 2000.