The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this article, a novel technique about secure medical information transmission of patient inside medical cover image is presented by concealing data using decision tree concept. Decision tree shows a robust mechanism by providing decisions for secret information concealing location in medical carrier image using secret information mapping concept. RSA encryption algorithm is being used for patient's...
Biometric could play an essential role in the future authentication system. So the security of biometric data is becoming a challenging problem now a days. We are proposing a cryptographic algorithm for securing biometric template using double hill cipher with the random permutation of pixels locations and self-invertible key matrix. The random permutation creates diffusion by permuting the location...
Ciphering is a main technique to secure the confidentiality of Biometric data at that time when biometric template is send to source to destination via non secure channel. Nowadays biometric is used for providing the better verification system in different field so it is essential to secure the biometric data from illegal access. Proposed paper, we using an AES as a cryptographic algorithm with scrambling...
The transmission of important medical diagnostic, MRI (Magnetic Resonance Imaging) images are vulnerable to third party hackers who does spoofing and they are able to introduce faulty and noisy data that damage the transmission data, which hinders the proper medical diagnostics, research and credibility of labs and doctors, there is a clear lack of awareness and lack of proper security measures taken...
It can be observed from the past ten years, remarkable progress has been made in the field of science and technology in terms of speed, throughput and computation. Scientists gained the ability to elucidate information from any given advanced computing systems with the help of technology. Efforts have been put forth for a new ciphering scheme with common division and genetic algorithm for image encryption...
Teleradiology allows transmission of medical images for clinical data interpretation to provide improved e-health care access, delivery, and standards. The remote transmission raises various ethical and legal issues like image retention, fraud, privacy, malpractice liability, etc. A joint FED watermarking system means a joint fingerprint/encryption/dual watermarking system is proposed for addressing...
Security has become an inseparable issue even in the field of space technology. Visual Cryptography is the study of mathematical techniques related aspects of Information Security which allows Visual information to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.