Provisioning of Compression and Secure Management Services for Healthcare Data in Cloud Computing
|
|
|
- Poppy Black
- 10 years ago
- Views:
Transcription
1 Provisioning of Compression and Secure Management Services for Healthcare Data in Cloud Computing Suhasini Kalki 1, Jayashree Agarkhed 2 1 PG Student, Computer Science & Engg Department, P.D.A College of Engg, Kalaburagi, India 2 Professor, Computer Science & Engg Department, P.D.A College of Engg, Kalaburagi, India Abstract: Cloud computing is the use of computing resources that are delivered as a service over a network. Cloud computing entrusts remote services with a user s data, software and computation. Cloud computing encompasses three main concepts: pay-as-you-go, ondemand and on the Net. Several studies show that the lack of access to resources and shared data is one of the main causes of errors in the healthcare sector. Therefore in this work we propose a novel cloud based image compression technique using digital watermarking which enables embedding one image behind another. We also show that patient s information can also be stored along with the image without annotation which helps preserving the quality of the image. We further compare the proposed technique s performance for both medical and non medical images and prove that the method is more suitable for medical images due to gray scale nature of the image data. Keyword: SaaS cloud, Healthcare, Medical imaging, Lossless compression, Big Data. 1. Introduction Cloud computing has recently emerged as a new platform for deploying, managing and provisioning large-scale services through an Internet based infrastructure. Cloud computing refers to both the applications delivered as services over the Internet, hardware and systems software in the data centers that provide those services The data centre hardware and software can be called as cloud. When a cloud is made available in a pay-as-you-go manner to the general public, it is a public cloud and the service being sold is utility computing. The term private cloud refers to internal data centers of a business or other organizations which are not made available to the general public. Cloud computing has several benefits such as convenience of accessing the data from anywhere when connected to the internet, security by encrypting the outsourced data onto the cloud, backups the data when local computer crashes and collaboration so that the others can access, view, and modify documents, with permission. With the cloud, one can access to unlimited storage capability and scalability and it takes fewer resources to cloud compute, thus saving energy [1]. The digital images becoming increasingly important in healthcare environment, since they are more and more used in medical and medical related applications. Several different digital imaging technologies may simultaneously produce huge amount of data for each patient therefore, their management may be considered as an typical big-data problem. In particular, medical images can be very large in size they may not be suitable for devices with relatively limited display capabilities, storage, processing power as well as slow network access. For this reason the efficient transmission of such images, mainly in modern networkcentric environments, requires complex network protocols, along with advanced compression and security techniques. In particular data compression is essential for efficient transmission and storage. At the same time, visual quality of such images is required to be high, in order to ensure correct and effective analysis resulting in correct diagnoses. In previous work they have not considered dynamic and adaptive compression for medical images and security issues regarding to those images in terms of encryption and decryption of images. In previous work they have considered the static cloud computing environment, which is not able to evolve itself in response to the changes in both network topology and conditions. But here the authors have used the virtual cloud environment [2]. 2. Related Work Extensive works have been done by many researchers but existing problem of compression of image along with patient information and hiding of one image behind another image as well as security for the images are left open. This Section mainly focuses on the literature review that has been carried out for the healthcare management. Several studies show that the lack of access to resources, that is some devices does not provides access to medical images and some provides only storage capacity to the medical images and other devices are provides processing of medical images. and shared data is one of the main causes of errors in the healthcare sector. The problem addressed in [3] is the inefficient usage of resources as well as the shared data in the field of healthcare. The medical images are processed using large number of devices and high network protocols due to complicated nature of medical images. Implementations of these medical images are based on advanced compression and security techniques. The authors have proposed a method for dynamic and adaptive compression of medical images and also for security used digital invisible watermarking procedure. The overall architecture uses Software as a Service (SaaS) in hybrid cloud environment. The result Paper ID: SUB
2 contains heterogeneous hardware and software capabilities which are virtualized to the end users in the cloud system. The 3D medical images are securely managed using virtual infrastructure-less cloud solution system. The main advantage of this work includes scalability, adaptivity and data integrity issues. The different security methods endorsed are public-key cryptography, private-key cryptography and message authentication codes. The issue left open is they have considered only medical images not considered the embedding of patient information along with patient diseased images, so that the doctor may get confusion with the patient records. In [4] the author presented a 3D rendering approach using cloud computing system for the optimization of scalability and operational cost issues for different environments. The system architecture used is Microsoft Azure cloud platform which comprises of storage service for data storage and compute service for major computation issues. The 3D algorithm has been implemented using Graphics Processing Units (GPU) and Central Processing Units (CPU) computation services. The performance measures of the system is provided by the size of Virtual Machines for computation service. The dynamic optimization of system scalability as well as cost of cloud in distributed environment is considered in a network infrastructure. In [5] the authors proposed an data compression approach for 3D images to reduce the volume of images and their efficient storage along with relative transmission time through internet or any other ad-hoc systems like Picture Archiving and Communication System (PACS), telerediology etc. Since these images are often stored in system vulnerable from the security point of view, because they contain sensitive data. The attack can be made by altering medical image and then may alter the relative diagnosis. The proposed solution is twofold: the first method is a low complexity approach is used for compression of 3D medical images and the second method is to insert invisible digital watermarks during the compression process. This is the hybrid approach that handles simultaneously and efficiently both compression and security to 3D images. In [6] the authors proposed an approach for lossless compression of continuous tone images, the context modeling is an extensively used parameter for the compression. The new techniques for context modeling of Differential Pulse Code Modulation (DPCM) errors are introduced that can exploit context dependent DPCM error structures for the benefit of compression. To reduce the context dilution, time and space complexities they have proposed techniques of forming and quantizing modeling contexts. This results the improved coding efficiency at low computational cost. In [7] the authors proposed a new low complexity algorithm for hyper spectral image compression, they have proposed two novel approaches to lossless coding of Airborne Visible/Infrared Imaging Spectrometer (AVIRIS) data. One is based on an inter band, linear predictor and the other is based on an inter band, least squares optimized predictor. Both algorithms are coupled to a simple entropy coder. In [8] the authors proposed a single-pass adaptive algorithm that uses context classification and multiple linear predictors and this is optimized on a pixel-by-pixel basis. The locality is also exploited in the entropy coding of the prediction error. The computational complexity can be substantially reduced without sacrificing the performance by using alternative methods for the optimization of predictors and also complexity is reduced by replacing the arithmetic coder with Golomb-Rice codes. In [9] the authors proposed a framework for the implementation of large-scale distributed data processing scheme for multiple clusters using MapReduce programming model. A MapReduce framework technique called as G-Hadoop for large-scale data computing among multiple clusters are used. The Gfarm file system method is used and MapReduce task model executes among multiple clusters in cloud. The G-Hadoop system makes use of parallel processing issues for considering large data sets using MapReduce technique. The G-Hadoop architecture consists of master/slave communication model using HDFS file system along with Gfarm file system for large datasets. In [10] the authors proposed a cloud monitoring approach for optimizing the Quality of Service (QoS) for the hosted applications. It involves dynamically tracking the QoS parameters to virtualized services such as the physical resources which they share and applications running on them. The monitoring techniques are used by the cloud provider or application developer in the following matters, Keeping the cloud services and hosted applications operating at peak efficiency. Detecting variations in service and application performance. Accounting the SLA violations of certain QoS parameters. Tracking of leave and join operations of cloud services due to failures and other dynamic configuration changes. 3. Proposed System Figure 1: System Architecture of Healthcare management system The Fig 1 depicts the overall architecture of proposed system, which consists of five different techniques namely watermarking based compression of the medical images, downscaling based compression of the images, encryption and decryption of images using AES technique and embedding of information along with the patient information. First the image is compressed by using watermarking based compression. Second the patient information is embedded along with the image by using Embedding of Message module. Third the image is encrypted by using AES technique. Fourth the encrypted image is storing on to the cloud. 3.1 Watermarking Based Compression: Digital watermarking has been proposed as a way to claim the ownership of the source and owner. Unlike encryption, watermarking does not restrict access to the data. Once the Paper ID: SUB
3 encrypted data is decrypted, the intellectual property rights are no longer protected. Over the past few years, the technology of the digital watermarking has gained prominence and emerged as a leading candidate that could solve the fundamental problems of legal ownership and content authentications for digital multimedia data. A great deal of research efforts has been focused on digital image watermarking in recent years. The techniques proposed so far can be divided into two groups according to the embedding domain. Algorithm 1: Watermark Based Compression Technique (WBCT ) Step 1: The cover image f (i, j) is decomposed into low pass image and directional sub bands by using CT decomposition. Step 2: The low pass image f lo(i, j) lo coefficients are quantized using the following rule z = mod( f lo(i, j),q) Step 2.1: If w(i, j) = 0 & z < Q/ 2 No modification in f lo (i, j) Step 2.2: If w(i, j) = 0 & z >= Q/ 2 f lo(i, j) = f lo (i, j)-q/ 2 Step 2.3: If w(i, j) = 1& z >= Q/ 2 No modification in f lo (i, j) Step 2.4: If w(i, j) = 1& z < Q/ 2 f lo (i, j) lo = f lo (i, j) +Q/ 2 In Step 1 image f(i, j) is decomposed into low pass image and by using Contourlet Transform (CT)the directions of the image are obtained. In Step 2 the low pass image flo(i,j) is quantized by using the rule. In Step the Q is quantization coefficient and may be selected based the experimentation on cover image. This is usually a trial and error process. After modifying flo(i, j), inverse CT is applied with the modified flo(i, j) and the watermarked image f lo(i, j)' is obtained. The image watermarking extraction algorithm is as follows. Step 1: The watermarked image f (i, j)' is decomposed into low pass image and directional sub bands by using CT decomposition. The watermark image is extracted by using the following rule. Step 2: z'= mod( f lo(i, j)',q) Step 2.1: If z < Q/ 2, w(i, j) = 0 Step 2.2: If z >= Q/ 2, w(i, j) = 1 In step 1 the watermarked image f(i,j) is decomposed into low pass image and by using CT once again obtain the various directions of the image. In step the watermarked image is extracted. 3.2 Encryption and decryption of the Images: The Advanced Encryption Standard (AES), also referenced as Rijndael (its original name), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in Rijndael is a family of ciphers with different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. Algorithm 2: Advanced Encryption Standard Technique (AEST) Step 1: KeyExpansions round keys are derived from the cipher key using Rijndael's key schedule. AES requires a separate 128-bit round key block for each round plus one more. Step 2: InitialRound- AddRoundKey each byte of the state is combined with a block of the round key using bitwise xor. Step 3: Rounds SubBytes a non-linear substitution step where each byte is replaced with another according to a lookup table. ShiftRows a transposition step where the last three rows of the state are shifted cyclically a certain number of steps. MixColumns a mixing operation which operates on the columns of the state, combining the four bytes in each column. AddRoundKey Step 4: Final Round (no MixColumns) SubBytes ShiftRows AddRoundKey. 3.3 Message Embedding: In this concept the information about the patient like, name of the patient, disease of the patient and other details of the patient are embedded along with the image by using the key. Fig 2: Message Embedding Algorithm 3: Data Embedding technique using Genetic Algorithm (DEGA) Step 1: Obtain the size of the authenticating image m x n. Step 2: For each authenticating message/image,read source image block of size 3x3 in row Major order. Extract authenticating message/image bit one by one. Replace the authenticating message/image bit in the rightmost 4 bits within the block, four bit in each byte. Paper ID: SUB
4 Step 3: Read one character/ pixel of the authenticating message/ image at a time. Step 4: Repeat step 2 and 3 for the whole, authenticating message/ image size, content. Step 5: Perform mutation operation for the whole embedded image. For mutation rightmost 3 bits from each bytes is taken. A consecutive bitwise XOR is performed on it for the 3 steps. It will form a triangular form and first bit from each step is taken Step 6: A bit handling method is performed on the embedded image. If the difference between the host and embedded image is ±16 the 16 will be added to the embedded image to keep intact the visibility of the embedded image. 4. Result Analysis Figure 4: Compression performance of medical images. The Fig 4 shows the compression ratio for the medical images, this is defined as, Compression Ratio = Uncompressed / Compressed (3) The space saving can be calculated by, Space Saving=1- Uncompressed Size/ Compressed Size (4) 5. Conclusion Figure 3: PSNR results by embedding two images. The PSNR is the ratio between the maximum possible power of a signal and the power of corrupting noise that affects the fidelity of its representation. PSNR is usually expressed in terms of the logarithmic decibel scale. The signal in this case is the original data and the noise is the error introduced by compression. PSNR is most easily defined via the Mean Squared Error (MSE). Given the noise free M N monochrome image I and its noise approximation K. MSE = 1 mn [I i, j K i, j ]2 (1) The PSNR (in db) is defined as, PSNR = 10 log 10 (MAX 2 I)/MSE (2) MAX i is the maximum possible pixel value of the image, when the pixels are represented using 8-bits per sample, this is 255. When samples are represented using linear PCM with B bits per sample, MAX i is 2 B-1. PSNR and MSE are used to comparing the squared error between the original image and the reconstructed image. PSNR is high means good quality and low means bad quality. PSNR is using a term MSE in the denominator, so low the error, high will be the PSNR. PSNR depends on MSE between original and processed image. Theoretically, PSNR can be infinite if MSE is zero. MSE is zero when there is no difference between original and processed image. The sharing of medical information resources is a key factor playing a fundamental role towards the effective and rapid medical diagnosis, especially when doctors are faced with new clinical cases or whether they should take into account diseases that are not properly part of their domain of competence or their own specialization. In this work we presented a Virtual infrastructure-less Cloud solution for secure management of 3D medical images, which operates in an almost completely transparent manner, regardless of computational and networking capabilities which users can avail in any given moment. References [1] Alexa Huth and James Cebula, The Basics of cloud computing, Carnegie Mellon University, US-CERT, [2] Mohammed M. Abd-Edayen, proposed security technique based on watermarking and encryption for digital image and communication in medicine, Egyptian Journal, Vol-14, Isuue-1, March 2013, Pages [3] A.Castiglione et al, cloud based adaptive compression, Future Generation Computer Systems, [4] K.Dorn, V.Ukis, T.Frise, A cloud-deployed 3D medical Imaging system with dynamically optimized scalability and cloud cost, In proceedings of th Euro Micro Conference on Software Engineering applications, IEEE, 2011, pp [5] Rafffaele Pizzolante et. Al, A secure low complexity approach for compression and transmission of 3D medical images, th International conference on broadband, IEEE,2013. [6] Xiaolin wu et al. lossless compression of continuoustone images vi context selection, quantization and modeling, IEEE Transactions on Image Processing, vol-6, No-5, May1997, pp [7] F. Rizzo,et al, Low-complexity lossless compres sion of hyperspectral imagery via linear prediction, IEEE Paper ID: SUB
5 Sig nal Processing letters, Vol-12, No-2, February 2005, [8] G. Motta et al, Lossless image coding via adaptive linear prediction and classification, Proceedings of. IEEE, Vol-88, No-11, November [9] Lizhe Wang et al, Map reduce across distributed clusters for data-intensive applications, IEEE 26 th International Parallel and distributed processing Symposium workshops and PhD Forum, 2012 DOI /IPDPSW PP [10] Alhamazani et.al, cloud monitoring of opti mizing the QoS of hosted applications, IEEE 4 th Inter national Conference on cloud computing Technology and science, [11] Khalid Alhamazani et.al, CLAMS: Cross layer multicloud application monitoring-as-a-service framework, IEEE International conference on services computing, 2014, DOI /SCC, 2014,45 PP [12] John G. Cleary et al, Data Compression using adaptive coding and partial string matching, IEEE Transactions on Communications, Vol-32, No-4, April- 1984, pp Paper ID: SUB
IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2
Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 5 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography
502 Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography 1 Vinay Wadekar, 2 Ajinkya Jadhavrao, 3 Sharad Ghule, 4 Akshay Kapse 1,2,3,4 Computer Engineering, University Of Pune, Pune,
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL 1 N. Radhika, 2 Obili Ramesh, 3 Priyadarshini, 3 Asst.Profosser, 1,2 M.Tech ( Digital Systems & Computer Electronics), 1,2,3,
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
Online Mobile Cloud Based Compiler
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 2 February 2015, Page No. 10400-10403 Online Mobile Cloud Based Compiler Miss. Pooja D. Pawar, Miss.
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
SeChat: An AES Encrypted Chat
Name: Luis Miguel Cortés Peña GTID: 901 67 6476 GTG: gtg683t SeChat: An AES Encrypted Chat Abstract With the advancement in computer technology, it is now possible to break DES 56 bit key in a meaningful
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
Implementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
The Advanced Encryption Standard: Four Years On
The Advanced Encryption Standard: Four Years On Matt Robshaw Reader in Information Security Information Security Group Royal Holloway University of London September 21, 2004 The State of the AES 1 The
Efficient Software Implementation of AES on 32-bit Platforms
Efficient Software Implementation of AES on 32-bit Platforms Guido Bertoni, Luca Breveglieri Politecnico di Milano, Milano - Italy Pasqualina Lilli Lilli Fragneto AST-LAB of ST Microelectronics, Agrate
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
(C) Global Journal of Engineering Science and Research Management
DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
Monitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
Multimedia Data Transmission over Wired/Wireless Networks
Multimedia Data Transmission over Wired/Wireless Networks Bharat Bhargava Gang Ding, Xiaoxin Wu, Mohamed Hefeeda, Halima Ghafoor Purdue University Website: http://www.cs.purdue.edu/homes/bb E-mail: [email protected]
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002
Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support
Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan
Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan Abstract AES is an encryption algorithm which can be easily implemented on fine grain many core systems.
Security Based Data Transfer and Privacy Storage through Watermark Detection
Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM
PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM Rohan Ashok Mandhare 1, Pragati Upadhyay 2,Sudha Gupta 3 ME Student, K.J.SOMIYA College of Engineering, Vidyavihar, Mumbai, Maharashtra,
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
A Secure Data Transmission By Integrating Cryptography And Video Steganography
A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India [email protected] Abstract Advances
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding
An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding Stebin Sunny 1, Chinju Jacob 2, Justin Jose T 3 1 Final Year M. Tech. (Cyber Security), KMP College
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
Hybrid Cryptographic Framework for Multimedia Data Storage over Cloud
680 Hybrid Cryptographic Framework for Multimedia Data Storage over Cloud 1 Ramandeep Kaur, 2 Gurjot Kaur 1 Department of Computer Engineering Chandigarh University, Gharuan 2 Assistant Professor, Department
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
Protect Integrity of Data in Cloud Assisted Privacy Preserving Mobile Health Monitoring
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1329-1334 International Research Publications House http://www. irphouse.com Protect Integrity
6367(Print), ISSN 0976 6375(Online) Volume 4, Issue 3, May June (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology (IJCET), ENGINEERING ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
A Secure and Efficient Client-Side Encryption Scheme in Cloud Computing
I.J. Wireless and Microwave Technologies, 2016, 1, 23-33 Published Online January 2016 in MECS(http://www.mecs-press.net) DOI: 10.5815/ijwmt.2016.01.03 Available online at http://www.mecs-press.net/ijwmt
Reversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue, Ver. III (Jan - Feb. 205), PP 0- e-issn: 239 4200, p-issn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
CHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
A Novel Security Scheme for Secret Data using Cryptography and Steganography
I. J. Computer Network and Information Security, 2012, 2, 36-42 Published Online March 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.02.06 A Novel Security Scheme for Secret Data using
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Introduction to image coding
Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Mobility Management in Mobile Cloud Computing
Mobility Management in Mobile Cloud Computing Karan Mitra Luleå University of Technology Skellefteå, Sweden [email protected] https://karanmitra.me 19/06/2015, Nancy, France Agenda Introduction M2C2:
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
Design and Implementation of Asymmetric Cryptography Using AES Algorithm
Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0020 ISSN (Online): 2279-0039 International
Design of Distributed Pharmaceutical Retail Management System Based on Advanced Encryption Standard Algorithm
, pp. 35-42 http://dx.doi.org/10.14257/ijsia.2015.9.6.04 Design of Distributed Pharmaceutical Retail System Based on Advanced Encryption Standard Algorithm Jingjing Yang, Yuanqiang Wang and Xiao Zhang*
Implementing Enhanced AES for Cloud based Biometric SaaS on Raspberry Pi as a Remote Authentication Node
Implementing Enhanced AES for Cloud based Biometric SaaS on Raspberry Pi as a Remote Authentication Node Dhvani. K. Shah Information Technology Thakur College of Engineering and Technology. Vinayak Bharadi,
Preface Introduction
Preface Introduction Cloud computing is revolutionizing all aspects of technologies to provide scalability, flexibility and cost-effectiveness. It has become a challenge to ensure the security of cloud
Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Proof of Retrivability: A Third Party Auditor Using Cloud Computing
Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry
Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software
Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Ya Ling Huang, Chung Huang Yang Graduate Institute of Information & Computer Education, National Kaohsiung Normal University
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
A Layered Signcryption Model for Secure Cloud System Communication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Network Security. Omer Rana
Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
Security Issues with Implementation of RSA and Proposed Dual Security Algorithm for Cloud Computing
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. V (Feb. 2014), PP 43-47 Security Issues with Implementation of RSA and
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Gamil R. S. Qaid 1, Sanjay N. Talbar 2 1 Research Student, Electronics & Telecommunications Dept.,S.G.G.S. institute
IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
Internet Video Streaming and Cloud-based Multimedia Applications. Outline
Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, [email protected] Ling Guan, [email protected] 1 Outline Internet video streaming Overview Video coding Approaches for video
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Grid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs
Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Said Aminzou 1, Brahim ER-RAHA 2, Youness Idrissi Khamlichi 3, Mustapha Machkour 4, Karim
Hardware Implementation of AES Encryption and Decryption System Based on FPGA
Send Orders for Reprints to [email protected] The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based
Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- [email protected] Objective: A study, implementation and comparison of
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of
A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud
Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA
Journal of Computer Science Original Research Paper CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA 1 Velayutham, R. and 2 D. Manimegalai
Performance Gathering and Implementing Portability on Cloud Storage Data
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering
How To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
DCT-JPEG Image Coding Based on GPU
, pp. 293-302 http://dx.doi.org/10.14257/ijhit.2015.8.5.32 DCT-JPEG Image Coding Based on GPU Rongyang Shan 1, Chengyou Wang 1*, Wei Huang 2 and Xiao Zhou 1 1 School of Mechanical, Electrical and Information
http://www.paper.edu.cn
5 10 15 20 25 30 35 A platform for massive railway information data storage # SHAN Xu 1, WANG Genying 1, LIU Lin 2** (1. Key Laboratory of Communication and Information Systems, Beijing Municipal Commission
A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA
A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA ABSTRACT Obaida Mohammad Awad Al-Hazaimeh Department of Information Technology, Al-balqa Applied University, AL-Huson University College, Irbid,
Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung
Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Database Migration over Network
Database Migration over Network Kanimozhi N 1, Thresphine J. R 2 1 M.TECH (Computer Science & Eng), PRIST University, Pondicherry India 2 Assistant Professor (Computer Science & Eng), PRIST University,
