SlideShare a Scribd company logo
International Journal of Science and Research (IJSR) 
ISSN (Online): 2319-7064 
Impact Factor (2012): 3.358 
A QR-Code Authentication for Medical Image 
Access Environment 
Inakollu Ramesh1, K. B. V. Rama Narasimham2 
1, 2Computer Science Engineering, Guntur Engineering College, Guntur, India 
Abstract: Quick Response Code(QR-Code) an 2D barcode are simply the fastest and most effective method to reach, interact with and 
get information out about your product or service. As the Mobile Application Development has seen many emerging areas one such is 
Hospital Management and Patient information Systems, in this paper we propose an framework combining the most powerful Android 
operating system and QR-Code in Data and Image Retrieval Application. 
Keywords: 2D barcode, Hospital Management, Image Retrieval, QR Code, Android 
1. Introduction 
2. Related Work 
The millions of medical images generated each year 
We designed an application based on Android Operating 
represent an enormous challenge for healthcare organizations 
System [8], which can make doctor to retrieve medical 
as they struggle to manage, access and share this data while 
images of patient after doctor authenticates identity. The 
trying to reduce costs [1]. Medical images storing and 
identity procedure has two ways to authenticate, that are 
retrieving domain terminology represented as Picture 
typing identity information and scanning the QR-Code of 
Archive and Communication Systems (PACS) are crucial 
identity. The QR-Code is not only used to authenticate but 
management systems for diagnosing image research that are 
also used in the searching patient number (every patient has 
potentially used in hospitals and health information care 
their own QR-Code which is their patient number). Because 
systems. It is essential for PACS to be an integrated part of 
of the information security reason, the code is encrypted by 
the total hospital electronic information system in order to be 
Advanced Encryption Standard (AES) [9]. 
maximally effective [2]. The PACS application is changed 
with advanced technology, and it not only can be used at 
hospital but also makes medical image can be used at 
everywhere via mobile device and internet which has already 
been acknowledged and well established [3]. 
Since the inception of cloud computing storage in the cloud 
seem to be a solution to many problems we face today for 
highly potential medical image archives [3], Tengs’ al et.[4] 
proposed medical image interchange and management 
framework based on industry standards and leading cloud 
computing platform, which developed for mobile medical 
imaging devices and applications to securely communicate 
Figure 1: The System Architecture 
with a cloud-based image storage and management service 
using standard DICOM protocol. The mobile application is 
developed using Google’s Android OS and provides 
management of patient health records and medical images 
[5]. 
In this paper, we proposed a prototype of medical image 
(DICOM [6]) retrieval Application with Quick Response 
Code (QR-Code) [7] authentication based on Android 
operating system, which can help personal clinics and 
clinicians in the remote area develop their own mobile 
retrieval system by the lower cost way. 
At the server, there is an application program interface (API) 
which is used to communicate application with server. It 
handles up all requesting, responding information and 
encoding it to JSON [10] format between mobile application 
and server. The API is coding in PHP [11], which is a 
popular general-purpose scripting language that is especially 
suited to web development. With processing medical image 
(DICOM), this paper uses the DCMTK tools [12] for extracts 
tags and image. DCMTK is a collection of libraries and 
applications implementing large parts the DICOM standard. 
It includes software for examining, constructing and 
converting DICOM image files, handling offline media, 
sending and receiving images over a network connection, as 
well as demonstrative image storage and work list servers. 
DCMTK is written in a mixture of ANSI C and C++, and it 
comes in complete source code and is made available as open 
source software. Fig. 1 is the proposed system architecture. 
Volume 3 Issue 10, October 2014 
www.ijsr.net 
Paper ID: 08101402 1347 
Licensed Under Creative Commons Attribution CC BY
International Journal of Science and Research (IJSR) 
ISSN (Online): 2319-7064 
Impact Factor (2012): 3.358 
Figure 2: The flow chart of Android application 
The System Architecture has contained the following 
sections: 
2.1 Android application 
There functions are authenticating identity; authenticate 
identity by QR-Code, searching identity of patient, searching 
identity of patient by QR-Code and daily logging. The 
connection between application and server is using in 
transport layer security (TLS) [16], that is currently used to 
protect data during transportation. The flow chart of Android 
application is shown in Fig. 2. 
2.2 Server and Database 
We built and simulated data on own private cloud based on 
Apache server [13]. DCMTK tools will be executed and 
extract information when user requests information by API. 
Fig. 3 is data flow chart of API, which is explaining for 
requesting and responding information. For example, the API 
will respond medical image and tags of DICOM from 
Database and DCMTK tools when user is searching identity 
of patient. 
2.3 Back end Management Interface 
The manager of organization can create user, delete user, 
building the QR-Code of identity with AES encrypt, loading 
medical image of patient to database and check out daily 
logging. The daily logging contains following schemas: user, 
date, time, and type of access and International Mobile 
Equipment Identity number (IMEI). IMEI is a unique 15 
digit code upon production on mobile device and it can 
checked all known information regarding manufacturer, 
model type, and country of approval of a handset. 
Figure 3: The Data Flow Chart of API 
Volume 3 Issue 10, October 2014 
www.ijsr.net 
Paper ID: 08101402 1348 
Licensed Under Creative Commons Attribution CC BY
International Journal of Science and Research (IJSR) 
ISSN (Online): 2319-7064 
Impact Factor (2012): 3.358 
Figure 4: The QR-Code of identity and The QR-Code of patient identity. (a) Sample of patient identity (b) Sample of doctor 
identity 
There is a problem during the system encodes cipher to QR-Code 
with AES encrypt, that the cipher cannot be decrypt 
after decode the QR-Code, because the cipher contains the 
character which is out of code list, and we used Base64 
encoding [17] to solve the problem. Base64 encoding is a 
group of similar binary-to-text encoding schemes that 
represent binary data in an ASCII string format by translating 
it into a radix-64 representation. The method of encryption is 
following: 
Cipher = AES_Encrypt (Information); 
Base64_C = Base64_Encode (Cipher); 
QR-Code = QR-Code_Encode (Base64_C); 
3. Implementation and Result 
We set up the QR-Code of identity which is shown in Fig. 4, 
and the application screens are shown in Fig. 5. The 
application is named “D’s Viewer”. The personal 
information of patient has replaced QR-Code, and it only can 
be read by application because it has encrypted by AES. The 
cipher is encoded in Base64 before encoding QR-Code. It 
makes sure to protect privacy of patient in the ward, and the 
key of AES is set on the server. It are presented 
authentication, searching patient and showing list of result 
that screens in Fig. 5, and user can use button of QR-Code 
for application both in first and second screen. The third 
screen is showing list of result, that contains medical image, 
name of patient and date. After tapping one of third screen 
item, then application will show up the fourth screen and it 
shows medical image of patient which is selected. 
Privacy and information security are very important, we 
possibly make system accord the Health Insurance 
Portability and Accountability Act (HIPAA) [15]. For above 
problems already concern in our system that using TLS 
between application server of connection, encrypted QR-Code 
Volume 3 Issue 10, October 2014 
www.ijsr.net 
Licensed Under Creative Commons Attribution CC BY 
and daily logging. 
4. Conclusion 
HIS health information system with QR-Code authentication 
framework based on Android OS and cloud is being 
proposed, the prototype can be useful to hospital Information 
related persons in the rural areas develop their mobile 
retrieval system, and it will also improve proprietary mobile 
devices with existing HIS systems. Integration of mobile and 
cloud systems will lead to better clinical decision makings. 
future work can be extended towards creating more quality 
environment and steps towards 3D/4D Images retrieval over 
smart phones and extensive user graphics will full fill the 
medical image workstation. 
References 
[1] Frost & Sullivan, 2004 Healthcare Storage Report, 2004 
[2] Maureen N. Hood, Hugh Scott, ” Introduction to Picture 
Archive and Communication Systems”, Journal of 
Radiology Nursing Vol. 25, Issue 3, Pages 69-74 
[3] Maglogiannis I., Doukas C., Kormentzas G., Pliakas T., 
"Wavelet- Based Compression With ROI Coding 
Support for Mobile Access to DICOM Images Over 
Heterogeneous Radio Networks", IEEE Transactions on 
Information Technology in Biomedicine, vol.13, no.4, 
p.458-466, July 2009. 
[4] BJ. Liu, F. Cao, M.Z. Zhou, G. Mogel, L. Documet, 
"Trends in PACS image storage and archive", 
Computerized Medical Imaging and Graphics 
[5] Charalampos Doukas, “Mobile Healthcare Information 
Management utilizing Cloud Computing and Android 
OS” 32nd Annual International Conference of the IEEE 
EMBS, Buenos Aires, Argentina, August 31 - 
September 4, 2010 
[6] Charalampos Doukas, Thomas Pliakas, Ilias 
Maglogiannis. “Mobile Healthcare Information 
Management utilizing Cloud Computing and Android 
OS”, 32nd Annual International Conference of the IEEE 
EMBS Buenos Aires, Argentina, August 31 – September 
4, 2010 
Paper ID: 08101402 1349
International Journal of Science and Research (IJSR) 
ISSN (Online): 2319-7064 
Impact Factor (2012): 3.358 
[7] The Digital Imaging and Communications in Medicine 
(DICOM) standard, http://medical.nema.org/ 
[8] Denso-Wave. Archived from the original, 
Volume 3 Issue 10, October 2014 
www.ijsr.net 
Licensed Under Creative Commons Attribution CC BY 
http://www.qrcode.com/en/ 
[9] The Android Operating System, 
http://www.android.com/ 
[10]Andrey Bogdanov, Dmitry Khovratovich, Christian 
echberger, “Biclique cryptanalysis of the full AES”, 
ASIACRYPT'11 Proceedings of the 17th international 
conference on The Theory and Application of 
Cryptology and Information Security Pages 344-371 
[11]JSON (JavaScript Object Notation), 
http://www.json.org/ 
[12] PHP: Hypertext Preprocessor, http://php.net/ 
[13]DCMTK Tools, http://dcmtk.org/dcmtk.php.en 
[14]Apache Software, http://www.apache.org/ 
[15]DICOM sample image sets, 
http://www.osirixviewer.com/datasets/ 
[16] U.S. Department of Health & Human Service, “Health 
Information Privacy”, http://www.hhs.gov/ocr/privacy/ 
[17] Techsoup.org, “An Introduction to Transport Layer 
Security”, http://www.techsoup.org/support/articles-and-howtos/ 
introduction-to-transport-layer-security 
[18] S. Josefsson, “The Base16, Base32, and Base64 Data 
Encodings.” IETF. October 2006. RFC 4648. Retrieved 
March 18, 2010 
Author Profile 
Inakollu Ramesh Obtained the B.Tech degree in 
Computer Science and Engineering (CSE) from 
Chalapathi Institute of Technology, Mothadaka, 
Guntur District. At present I am perusing the M.Tech 
in Computer Science and Engineering (CSE) 
Department at Guntur Engineering College, Yanamadala, Guntur. 
K. B. V. Rama Narasimham obtained the M.C.A 
Degree from Madras University in 1999 and M.Tech 
(CSE) from JNTU, Kakinada in 2013. At present 
pursuing Ph. D (CSE) in K. L. University. He has 8 
years of teaching experience and working in Computer 
Science and Engineering (CSE) Department at Guntur Engineering 
College, Yanamadala, Guntur. 
Paper ID: 08101402 1350

More Related Content

What's hot

Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010
Yahoo Developer Network
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
IJERA Editor
 
IRJET - Remote Health Monitoring System using IoT
IRJET - Remote Health Monitoring System using IoTIRJET - Remote Health Monitoring System using IoT
IRJET - Remote Health Monitoring System using IoT
IRJET Journal
 
Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...
IJECEIAES
 
Biometrics in India
Biometrics in IndiaBiometrics in India
Biometrics in India
Kshitij Behl
 
Ijsrdv7 i10842
Ijsrdv7 i10842Ijsrdv7 i10842
Ijsrdv7 i10842
aissmsblogs
 
Security for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsSecurity for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIs
idescitation
 
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET -  	  Centralized Data for Transport Automation System using Android St...IRJET -  	  Centralized Data for Transport Automation System using Android St...
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET Journal
 
Paper id 24201494
Paper id 24201494Paper id 24201494
Paper id 24201494
IJRAT
 
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT SERVER AND MYSQLDATABASE
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT  SERVER AND MYSQLDATABASENEXTGEN’S HOSPILOGICS USING APACHE TOMCAT  SERVER AND MYSQLDATABASE
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT SERVER AND MYSQLDATABASE
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Facial Recognition and Detection Technical Review
Facial Recognition and Detection Technical ReviewFacial Recognition and Detection Technical Review
Facial Recognition and Detection Technical Review
Tkeyah Anderson
 
IRJET - Audio Guide for Patient Regarding Doctor’s Prescription
IRJET - Audio Guide for Patient Regarding Doctor’s PrescriptionIRJET - Audio Guide for Patient Regarding Doctor’s Prescription
IRJET - Audio Guide for Patient Regarding Doctor’s Prescription
IRJET Journal
 
Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...
IJECEIAES
 
Iaetsd techno-hospital
Iaetsd techno-hospitalIaetsd techno-hospital
Iaetsd techno-hospital
Iaetsd Iaetsd
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applications
theijes
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
iosrjce
 
Scirj p1220830(3)
Scirj p1220830(3)Scirj p1220830(3)
Semantic open io t service platform technology
Semantic open io t service platform technologySemantic open io t service platform technology
Semantic open io t service platform technology
Poornima E.G.
 
IRJET- Magnetic Resonance Imaging (MRI) – Digital Transformation Journey Util...
IRJET- Magnetic Resonance Imaging (MRI) – Digital Transformation Journey Util...IRJET- Magnetic Resonance Imaging (MRI) – Digital Transformation Journey Util...
IRJET- Magnetic Resonance Imaging (MRI) – Digital Transformation Journey Util...
IRJET Journal
 

What's hot (19)

Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
 
IRJET - Remote Health Monitoring System using IoT
IRJET - Remote Health Monitoring System using IoTIRJET - Remote Health Monitoring System using IoT
IRJET - Remote Health Monitoring System using IoT
 
Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...
 
Biometrics in India
Biometrics in IndiaBiometrics in India
Biometrics in India
 
Ijsrdv7 i10842
Ijsrdv7 i10842Ijsrdv7 i10842
Ijsrdv7 i10842
 
Security for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsSecurity for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIs
 
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET -  	  Centralized Data for Transport Automation System using Android St...IRJET -  	  Centralized Data for Transport Automation System using Android St...
IRJET - Centralized Data for Transport Automation System using Android St...
 
Paper id 24201494
Paper id 24201494Paper id 24201494
Paper id 24201494
 
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT SERVER AND MYSQLDATABASE
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT  SERVER AND MYSQLDATABASENEXTGEN’S HOSPILOGICS USING APACHE TOMCAT  SERVER AND MYSQLDATABASE
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT SERVER AND MYSQLDATABASE
 
Facial Recognition and Detection Technical Review
Facial Recognition and Detection Technical ReviewFacial Recognition and Detection Technical Review
Facial Recognition and Detection Technical Review
 
IRJET - Audio Guide for Patient Regarding Doctor’s Prescription
IRJET - Audio Guide for Patient Regarding Doctor’s PrescriptionIRJET - Audio Guide for Patient Regarding Doctor’s Prescription
IRJET - Audio Guide for Patient Regarding Doctor’s Prescription
 
Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...
 
Iaetsd techno-hospital
Iaetsd techno-hospitalIaetsd techno-hospital
Iaetsd techno-hospital
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applications
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
Scirj p1220830(3)
Scirj p1220830(3)Scirj p1220830(3)
Scirj p1220830(3)
 
Semantic open io t service platform technology
Semantic open io t service platform technologySemantic open io t service platform technology
Semantic open io t service platform technology
 
IRJET- Magnetic Resonance Imaging (MRI) – Digital Transformation Journey Util...
IRJET- Magnetic Resonance Imaging (MRI) – Digital Transformation Journey Util...IRJET- Magnetic Resonance Imaging (MRI) – Digital Transformation Journey Util...
IRJET- Magnetic Resonance Imaging (MRI) – Digital Transformation Journey Util...
 

Viewers also liked

An Investigation to Establish the Presence, Quality and Rank of Coal from Par...
An Investigation to Establish the Presence, Quality and Rank of Coal from Par...An Investigation to Establish the Presence, Quality and Rank of Coal from Par...
An Investigation to Establish the Presence, Quality and Rank of Coal from Par...
International Journal of Science and Research (IJSR)
 
Wireless Sensor Networks for Monitoring Physiological Signals of Multiple Pat...
Wireless Sensor Networks for Monitoring Physiological Signals of Multiple Pat...Wireless Sensor Networks for Monitoring Physiological Signals of Multiple Pat...
Wireless Sensor Networks for Monitoring Physiological Signals of Multiple Pat...
International Journal of Science and Research (IJSR)
 
Md iw mtu3odi=
Md iw mtu3odi=Md iw mtu3odi=
T0 numtq0odu=
T0 numtq0odu=T0 numtq0odu=
U0 vqmtq3m tc=
U0 vqmtq3m tc=U0 vqmtq3m tc=
U0 vqmt qyodk=
U0 vqmt qyodk=U0 vqmt qyodk=
U0 vqmt qymza=
U0 vqmt qymza=U0 vqmt qymza=
Performance Analysis of Various Video Compression Techniques
Performance Analysis of Various Video Compression TechniquesPerformance Analysis of Various Video Compression Techniques
Performance Analysis of Various Video Compression Techniques
International Journal of Science and Research (IJSR)
 
T0 numtq0nzm=
T0 numtq0nzm=T0 numtq0nzm=
Transfer function and Impulse Response Simulation of Power Line Channel
Transfer function and Impulse Response Simulation of Power Line ChannelTransfer function and Impulse Response Simulation of Power Line Channel
Transfer function and Impulse Response Simulation of Power Line Channel
International Journal of Science and Research (IJSR)
 
Controller Area Network for Monitoring and Controlling the Industrial Paramet...
Controller Area Network for Monitoring and Controlling the Industrial Paramet...Controller Area Network for Monitoring and Controlling the Industrial Paramet...
Controller Area Network for Monitoring and Controlling the Industrial Paramet...
International Journal of Science and Research (IJSR)
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
International Journal of Science and Research (IJSR)
 
A Distributed Geospatial Information System for Managing Elections: A Case St...
A Distributed Geospatial Information System for Managing Elections: A Case St...A Distributed Geospatial Information System for Managing Elections: A Case St...
A Distributed Geospatial Information System for Managing Elections: A Case St...
International Journal of Science and Research (IJSR)
 
Agri-Preneurs: A Case Study of Dharmapuri Farmers
Agri-Preneurs: A Case Study of Dharmapuri FarmersAgri-Preneurs: A Case Study of Dharmapuri Farmers
Agri-Preneurs: A Case Study of Dharmapuri Farmers
International Journal of Science and Research (IJSR)
 
Black Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy LogicBlack Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy Logic
International Journal of Science and Research (IJSR)
 
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
International Journal of Science and Research (IJSR)
 
Barriers to Effective Integration of Information and Communication Technology...
Barriers to Effective Integration of Information and Communication Technology...Barriers to Effective Integration of Information and Communication Technology...
Barriers to Effective Integration of Information and Communication Technology...
International Journal of Science and Research (IJSR)
 
Design of Bagasse Dryer to Recover Energy of Water Tube Boiler in a Sugar Fac...
Design of Bagasse Dryer to Recover Energy of Water Tube Boiler in a Sugar Fac...Design of Bagasse Dryer to Recover Energy of Water Tube Boiler in a Sugar Fac...
Design of Bagasse Dryer to Recover Energy of Water Tube Boiler in a Sugar Fac...
International Journal of Science and Research (IJSR)
 
Perceived Competence of Zimbabwean Academics in the Use of Information Techno...
Perceived Competence of Zimbabwean Academics in the Use of Information Techno...Perceived Competence of Zimbabwean Academics in the Use of Information Techno...
Perceived Competence of Zimbabwean Academics in the Use of Information Techno...
International Journal of Science and Research (IJSR)
 

Viewers also liked (19)

An Investigation to Establish the Presence, Quality and Rank of Coal from Par...
An Investigation to Establish the Presence, Quality and Rank of Coal from Par...An Investigation to Establish the Presence, Quality and Rank of Coal from Par...
An Investigation to Establish the Presence, Quality and Rank of Coal from Par...
 
Wireless Sensor Networks for Monitoring Physiological Signals of Multiple Pat...
Wireless Sensor Networks for Monitoring Physiological Signals of Multiple Pat...Wireless Sensor Networks for Monitoring Physiological Signals of Multiple Pat...
Wireless Sensor Networks for Monitoring Physiological Signals of Multiple Pat...
 
Md iw mtu3odi=
Md iw mtu3odi=Md iw mtu3odi=
Md iw mtu3odi=
 
T0 numtq0odu=
T0 numtq0odu=T0 numtq0odu=
T0 numtq0odu=
 
U0 vqmtq3m tc=
U0 vqmtq3m tc=U0 vqmtq3m tc=
U0 vqmtq3m tc=
 
U0 vqmt qyodk=
U0 vqmt qyodk=U0 vqmt qyodk=
U0 vqmt qyodk=
 
U0 vqmt qymza=
U0 vqmt qymza=U0 vqmt qymza=
U0 vqmt qymza=
 
Performance Analysis of Various Video Compression Techniques
Performance Analysis of Various Video Compression TechniquesPerformance Analysis of Various Video Compression Techniques
Performance Analysis of Various Video Compression Techniques
 
T0 numtq0nzm=
T0 numtq0nzm=T0 numtq0nzm=
T0 numtq0nzm=
 
Transfer function and Impulse Response Simulation of Power Line Channel
Transfer function and Impulse Response Simulation of Power Line ChannelTransfer function and Impulse Response Simulation of Power Line Channel
Transfer function and Impulse Response Simulation of Power Line Channel
 
Controller Area Network for Monitoring and Controlling the Industrial Paramet...
Controller Area Network for Monitoring and Controlling the Industrial Paramet...Controller Area Network for Monitoring and Controlling the Industrial Paramet...
Controller Area Network for Monitoring and Controlling the Industrial Paramet...
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
 
A Distributed Geospatial Information System for Managing Elections: A Case St...
A Distributed Geospatial Information System for Managing Elections: A Case St...A Distributed Geospatial Information System for Managing Elections: A Case St...
A Distributed Geospatial Information System for Managing Elections: A Case St...
 
Agri-Preneurs: A Case Study of Dharmapuri Farmers
Agri-Preneurs: A Case Study of Dharmapuri FarmersAgri-Preneurs: A Case Study of Dharmapuri Farmers
Agri-Preneurs: A Case Study of Dharmapuri Farmers
 
Black Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy LogicBlack Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy Logic
 
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
 
Barriers to Effective Integration of Information and Communication Technology...
Barriers to Effective Integration of Information and Communication Technology...Barriers to Effective Integration of Information and Communication Technology...
Barriers to Effective Integration of Information and Communication Technology...
 
Design of Bagasse Dryer to Recover Energy of Water Tube Boiler in a Sugar Fac...
Design of Bagasse Dryer to Recover Energy of Water Tube Boiler in a Sugar Fac...Design of Bagasse Dryer to Recover Energy of Water Tube Boiler in a Sugar Fac...
Design of Bagasse Dryer to Recover Energy of Water Tube Boiler in a Sugar Fac...
 
Perceived Competence of Zimbabwean Academics in the Use of Information Techno...
Perceived Competence of Zimbabwean Academics in the Use of Information Techno...Perceived Competence of Zimbabwean Academics in the Use of Information Techno...
Perceived Competence of Zimbabwean Academics in the Use of Information Techno...
 

Similar to M dgx mde0mdi=

IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
IRJET Journal
 
A blind steganography approach for hiding privacy details in images of digit...
A blind steganography approach for hiding privacy details in  images of digit...A blind steganography approach for hiding privacy details in  images of digit...
A blind steganography approach for hiding privacy details in images of digit...
IJECEIAES
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
 
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
ChereCheek752
 
E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...
IOSR Journals
 
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docxSPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
rosiecabaniss
 
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
IJCSEA Journal
 
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
IJCSEA Journal
 
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
IJCSEA Journal
 
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
IJCSEA Journal
 
Wireless Biometric Fingerprint Attendance System using Arduino and Mysql Data...
Wireless Biometric Fingerprint Attendance System using Arduino and Mysql Data...Wireless Biometric Fingerprint Attendance System using Arduino and Mysql Data...
Wireless Biometric Fingerprint Attendance System using Arduino and Mysql Data...
IJCSEA Journal
 
Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...
IJECEIAES
 
Sub1590
Sub1590Sub1590
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
IRJET Journal
 
Secure and efficient transmission of medical images
Secure and efficient transmission of medical imagesSecure and efficient transmission of medical images
Secure and efficient transmission of medical images
eSAT Publishing House
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
Conference Papers
 
Sharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-Code
Sharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-CodeSharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-Code
Sharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-Code
IRJET Journal
 
A cloud solution for medical image processing
A cloud solution for medical image processingA cloud solution for medical image processing
A cloud solution for medical image processing
IJERA Editor
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance system
IJECEIAES
 

Similar to M dgx mde0mdi= (20)

IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
A blind steganography approach for hiding privacy details in images of digit...
A blind steganography approach for hiding privacy details in  images of digit...A blind steganography approach for hiding privacy details in  images of digit...
A blind steganography approach for hiding privacy details in images of digit...
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
 
E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...
 
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docxSPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
 
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
 
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
 
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
 
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
 
Wireless Biometric Fingerprint Attendance System using Arduino and Mysql Data...
Wireless Biometric Fingerprint Attendance System using Arduino and Mysql Data...Wireless Biometric Fingerprint Attendance System using Arduino and Mysql Data...
Wireless Biometric Fingerprint Attendance System using Arduino and Mysql Data...
 
Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...
 
Sub1590
Sub1590Sub1590
Sub1590
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 
Secure and efficient transmission of medical images
Secure and efficient transmission of medical imagesSecure and efficient transmission of medical images
Secure and efficient transmission of medical images
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
 
Sharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-Code
Sharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-CodeSharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-Code
Sharing of PHR on Cloud Using Attribute Based Encryption and Access by QR-Code
 
A cloud solution for medical image processing
A cloud solution for medical image processingA cloud solution for medical image processing
A cloud solution for medical image processing
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance system
 

More from International Journal of Science and Research (IJSR)

Innovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart FailureInnovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart Failure
International Journal of Science and Research (IJSR)
 
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverterDesign and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
International Journal of Science and Research (IJSR)
 
Polarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material systemPolarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material system
International Journal of Science and Research (IJSR)
 
Image resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fittingImage resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fitting
International Journal of Science and Research (IJSR)
 
Ad hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo sAd hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo s
International Journal of Science and Research (IJSR)
 
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
International Journal of Science and Research (IJSR)
 
Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...
International Journal of Science and Research (IJSR)
 
An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...
International Journal of Science and Research (IJSR)
 
Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...
International Journal of Science and Research (IJSR)
 
Comparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brainComparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brain
International Journal of Science and Research (IJSR)
 
T s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusionsT s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusions
International Journal of Science and Research (IJSR)
 
Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...
International Journal of Science and Research (IJSR)
 
Grid computing for load balancing strategies
Grid computing for load balancing strategiesGrid computing for load balancing strategies
Grid computing for load balancing strategies
International Journal of Science and Research (IJSR)
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
International Journal of Science and Research (IJSR)
 
Main physical causes of climate change and global warming a general overview
Main physical causes of climate change and global warming   a general overviewMain physical causes of climate change and global warming   a general overview
Main physical causes of climate change and global warming a general overview
International Journal of Science and Research (IJSR)
 
Performance assessment of control loops
Performance assessment of control loopsPerformance assessment of control loops
Performance assessment of control loops
International Journal of Science and Research (IJSR)
 
Capital market in bangladesh an overview
Capital market in bangladesh an overviewCapital market in bangladesh an overview
Capital market in bangladesh an overview
International Journal of Science and Research (IJSR)
 
Faster and resourceful multi core web crawling
Faster and resourceful multi core web crawlingFaster and resourceful multi core web crawling
Faster and resourceful multi core web crawling
International Journal of Science and Research (IJSR)
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
International Journal of Science and Research (IJSR)
 
Parallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errorsParallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errors
International Journal of Science and Research (IJSR)
 

More from International Journal of Science and Research (IJSR) (20)

Innovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart FailureInnovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart Failure
 
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverterDesign and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
 
Polarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material systemPolarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material system
 
Image resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fittingImage resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fitting
 
Ad hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo sAd hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo s
 
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
 
Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...
 
An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...
 
Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...
 
Comparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brainComparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brain
 
T s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusionsT s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusions
 
Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...
 
Grid computing for load balancing strategies
Grid computing for load balancing strategiesGrid computing for load balancing strategies
Grid computing for load balancing strategies
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
Main physical causes of climate change and global warming a general overview
Main physical causes of climate change and global warming   a general overviewMain physical causes of climate change and global warming   a general overview
Main physical causes of climate change and global warming a general overview
 
Performance assessment of control loops
Performance assessment of control loopsPerformance assessment of control loops
Performance assessment of control loops
 
Capital market in bangladesh an overview
Capital market in bangladesh an overviewCapital market in bangladesh an overview
Capital market in bangladesh an overview
 
Faster and resourceful multi core web crawling
Faster and resourceful multi core web crawlingFaster and resourceful multi core web crawling
Faster and resourceful multi core web crawling
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
 
Parallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errorsParallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errors
 

M dgx mde0mdi=

  • 1. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358 A QR-Code Authentication for Medical Image Access Environment Inakollu Ramesh1, K. B. V. Rama Narasimham2 1, 2Computer Science Engineering, Guntur Engineering College, Guntur, India Abstract: Quick Response Code(QR-Code) an 2D barcode are simply the fastest and most effective method to reach, interact with and get information out about your product or service. As the Mobile Application Development has seen many emerging areas one such is Hospital Management and Patient information Systems, in this paper we propose an framework combining the most powerful Android operating system and QR-Code in Data and Image Retrieval Application. Keywords: 2D barcode, Hospital Management, Image Retrieval, QR Code, Android 1. Introduction 2. Related Work The millions of medical images generated each year We designed an application based on Android Operating represent an enormous challenge for healthcare organizations System [8], which can make doctor to retrieve medical as they struggle to manage, access and share this data while images of patient after doctor authenticates identity. The trying to reduce costs [1]. Medical images storing and identity procedure has two ways to authenticate, that are retrieving domain terminology represented as Picture typing identity information and scanning the QR-Code of Archive and Communication Systems (PACS) are crucial identity. The QR-Code is not only used to authenticate but management systems for diagnosing image research that are also used in the searching patient number (every patient has potentially used in hospitals and health information care their own QR-Code which is their patient number). Because systems. It is essential for PACS to be an integrated part of of the information security reason, the code is encrypted by the total hospital electronic information system in order to be Advanced Encryption Standard (AES) [9]. maximally effective [2]. The PACS application is changed with advanced technology, and it not only can be used at hospital but also makes medical image can be used at everywhere via mobile device and internet which has already been acknowledged and well established [3]. Since the inception of cloud computing storage in the cloud seem to be a solution to many problems we face today for highly potential medical image archives [3], Tengs’ al et.[4] proposed medical image interchange and management framework based on industry standards and leading cloud computing platform, which developed for mobile medical imaging devices and applications to securely communicate Figure 1: The System Architecture with a cloud-based image storage and management service using standard DICOM protocol. The mobile application is developed using Google’s Android OS and provides management of patient health records and medical images [5]. In this paper, we proposed a prototype of medical image (DICOM [6]) retrieval Application with Quick Response Code (QR-Code) [7] authentication based on Android operating system, which can help personal clinics and clinicians in the remote area develop their own mobile retrieval system by the lower cost way. At the server, there is an application program interface (API) which is used to communicate application with server. It handles up all requesting, responding information and encoding it to JSON [10] format between mobile application and server. The API is coding in PHP [11], which is a popular general-purpose scripting language that is especially suited to web development. With processing medical image (DICOM), this paper uses the DCMTK tools [12] for extracts tags and image. DCMTK is a collection of libraries and applications implementing large parts the DICOM standard. It includes software for examining, constructing and converting DICOM image files, handling offline media, sending and receiving images over a network connection, as well as demonstrative image storage and work list servers. DCMTK is written in a mixture of ANSI C and C++, and it comes in complete source code and is made available as open source software. Fig. 1 is the proposed system architecture. Volume 3 Issue 10, October 2014 www.ijsr.net Paper ID: 08101402 1347 Licensed Under Creative Commons Attribution CC BY
  • 2. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358 Figure 2: The flow chart of Android application The System Architecture has contained the following sections: 2.1 Android application There functions are authenticating identity; authenticate identity by QR-Code, searching identity of patient, searching identity of patient by QR-Code and daily logging. The connection between application and server is using in transport layer security (TLS) [16], that is currently used to protect data during transportation. The flow chart of Android application is shown in Fig. 2. 2.2 Server and Database We built and simulated data on own private cloud based on Apache server [13]. DCMTK tools will be executed and extract information when user requests information by API. Fig. 3 is data flow chart of API, which is explaining for requesting and responding information. For example, the API will respond medical image and tags of DICOM from Database and DCMTK tools when user is searching identity of patient. 2.3 Back end Management Interface The manager of organization can create user, delete user, building the QR-Code of identity with AES encrypt, loading medical image of patient to database and check out daily logging. The daily logging contains following schemas: user, date, time, and type of access and International Mobile Equipment Identity number (IMEI). IMEI is a unique 15 digit code upon production on mobile device and it can checked all known information regarding manufacturer, model type, and country of approval of a handset. Figure 3: The Data Flow Chart of API Volume 3 Issue 10, October 2014 www.ijsr.net Paper ID: 08101402 1348 Licensed Under Creative Commons Attribution CC BY
  • 3. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358 Figure 4: The QR-Code of identity and The QR-Code of patient identity. (a) Sample of patient identity (b) Sample of doctor identity There is a problem during the system encodes cipher to QR-Code with AES encrypt, that the cipher cannot be decrypt after decode the QR-Code, because the cipher contains the character which is out of code list, and we used Base64 encoding [17] to solve the problem. Base64 encoding is a group of similar binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64 representation. The method of encryption is following: Cipher = AES_Encrypt (Information); Base64_C = Base64_Encode (Cipher); QR-Code = QR-Code_Encode (Base64_C); 3. Implementation and Result We set up the QR-Code of identity which is shown in Fig. 4, and the application screens are shown in Fig. 5. The application is named “D’s Viewer”. The personal information of patient has replaced QR-Code, and it only can be read by application because it has encrypted by AES. The cipher is encoded in Base64 before encoding QR-Code. It makes sure to protect privacy of patient in the ward, and the key of AES is set on the server. It are presented authentication, searching patient and showing list of result that screens in Fig. 5, and user can use button of QR-Code for application both in first and second screen. The third screen is showing list of result, that contains medical image, name of patient and date. After tapping one of third screen item, then application will show up the fourth screen and it shows medical image of patient which is selected. Privacy and information security are very important, we possibly make system accord the Health Insurance Portability and Accountability Act (HIPAA) [15]. For above problems already concern in our system that using TLS between application server of connection, encrypted QR-Code Volume 3 Issue 10, October 2014 www.ijsr.net Licensed Under Creative Commons Attribution CC BY and daily logging. 4. Conclusion HIS health information system with QR-Code authentication framework based on Android OS and cloud is being proposed, the prototype can be useful to hospital Information related persons in the rural areas develop their mobile retrieval system, and it will also improve proprietary mobile devices with existing HIS systems. Integration of mobile and cloud systems will lead to better clinical decision makings. future work can be extended towards creating more quality environment and steps towards 3D/4D Images retrieval over smart phones and extensive user graphics will full fill the medical image workstation. References [1] Frost & Sullivan, 2004 Healthcare Storage Report, 2004 [2] Maureen N. Hood, Hugh Scott, ” Introduction to Picture Archive and Communication Systems”, Journal of Radiology Nursing Vol. 25, Issue 3, Pages 69-74 [3] Maglogiannis I., Doukas C., Kormentzas G., Pliakas T., "Wavelet- Based Compression With ROI Coding Support for Mobile Access to DICOM Images Over Heterogeneous Radio Networks", IEEE Transactions on Information Technology in Biomedicine, vol.13, no.4, p.458-466, July 2009. [4] BJ. Liu, F. Cao, M.Z. Zhou, G. Mogel, L. Documet, "Trends in PACS image storage and archive", Computerized Medical Imaging and Graphics [5] Charalampos Doukas, “Mobile Healthcare Information Management utilizing Cloud Computing and Android OS” 32nd Annual International Conference of the IEEE EMBS, Buenos Aires, Argentina, August 31 - September 4, 2010 [6] Charalampos Doukas, Thomas Pliakas, Ilias Maglogiannis. “Mobile Healthcare Information Management utilizing Cloud Computing and Android OS”, 32nd Annual International Conference of the IEEE EMBS Buenos Aires, Argentina, August 31 – September 4, 2010 Paper ID: 08101402 1349
  • 4. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358 [7] The Digital Imaging and Communications in Medicine (DICOM) standard, http://medical.nema.org/ [8] Denso-Wave. Archived from the original, Volume 3 Issue 10, October 2014 www.ijsr.net Licensed Under Creative Commons Attribution CC BY http://www.qrcode.com/en/ [9] The Android Operating System, http://www.android.com/ [10]Andrey Bogdanov, Dmitry Khovratovich, Christian echberger, “Biclique cryptanalysis of the full AES”, ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security Pages 344-371 [11]JSON (JavaScript Object Notation), http://www.json.org/ [12] PHP: Hypertext Preprocessor, http://php.net/ [13]DCMTK Tools, http://dcmtk.org/dcmtk.php.en [14]Apache Software, http://www.apache.org/ [15]DICOM sample image sets, http://www.osirixviewer.com/datasets/ [16] U.S. Department of Health & Human Service, “Health Information Privacy”, http://www.hhs.gov/ocr/privacy/ [17] Techsoup.org, “An Introduction to Transport Layer Security”, http://www.techsoup.org/support/articles-and-howtos/ introduction-to-transport-layer-security [18] S. Josefsson, “The Base16, Base32, and Base64 Data Encodings.” IETF. October 2006. RFC 4648. Retrieved March 18, 2010 Author Profile Inakollu Ramesh Obtained the B.Tech degree in Computer Science and Engineering (CSE) from Chalapathi Institute of Technology, Mothadaka, Guntur District. At present I am perusing the M.Tech in Computer Science and Engineering (CSE) Department at Guntur Engineering College, Yanamadala, Guntur. K. B. V. Rama Narasimham obtained the M.C.A Degree from Madras University in 1999 and M.Tech (CSE) from JNTU, Kakinada in 2013. At present pursuing Ph. D (CSE) in K. L. University. He has 8 years of teaching experience and working in Computer Science and Engineering (CSE) Department at Guntur Engineering College, Yanamadala, Guntur. Paper ID: 08101402 1350