Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Positional Based Encryption and Compression of Medical Images

Author : Deepika B Banagar 1 Mamtha Mohan 2

Date of Publication :25th May 2017

Abstract: The expanding selection of data frameworks in social insurance has prompted a situation where understanding data security is increasingly being viewed as a basic issue. Permitting quiet data to be in danger may prompt hopeless harm, physically, ethically, and socially to the patient, conceivably shaking the validity of the medicinal services foundation. Therapeutic images play a the urgent part in such setting, given their significance in analysis, treatment, and research. In this paper the the compresssion of encrypted medical images is performed in order to provide the security and reduce the storage capacity. The positional based encryption is performed and arithmetic compression is used to compress the encrypted image

Reference :

    1. J. Zhou, X. Liu, and O. C. Au, “On the design of an efficient encryption-then-compression system,” in Proc. ICASSP, 2013, pp. 2872–2876.
    2. T. Bianchi, A. Piva, and M. Barni, “On the implementation of the discrete Fourier transform in the encrypted domain,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 86–97, Mar. 2009.
    3. T. Bianchi, A. Piva, and M. Barni, “Encrypted domain DCT based on homomorphic cryptosystems,” EURASIP J. Inf. Security, 2009, Article ID 716357.
    4. T. Bianchi, A. Piva, and M. Barni, “Composite signal representation for fast and storage-efficient processing of encrypted signals,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180–187, Mar. 2010.
    5. M. Barni, P. Failla, R. Lazzeretti, A.-R. Sadeghi, and T. Schneider, “Privacy-preserving ECG classification with branching programs and neural networks,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, 452–468, Jun. 2011.
    6.  Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, “Generating pri-vate recommendations efficiently using homomorphic encryption and data packing,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp.1053–1066, Jun. 2012.
    7. M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.
    8.  D. Schonberg, S. C. Draper, and K. Ramchandran, “On blind compres-sion of encrypted correlated data approaching the source entropy rate,” in Proc. 43rd Annu. Allerton Conf., 2005, pp. 1–3.
    9.  D. Schonberg, S. C. Draper, and K. Ramchandran, “On compression of encrypted images,” in Proc. IEEE Int. Conf. Image Process., Oct. 2006, pp. 269–272

Recent Article