Transmission of Large Information through KAP Using Non-Abelian Group

Anyone can send a confidential message by just using public information, but the message can only be decrypted with a private key, which is in the sole possession of the intended recipient. It is really appreciable method to provide high security to the medical image or patient’s information. Which provide us integrated secure transmission of medical information like Image, Audio, Video etc. with a common key. We also use lossless compression technique like SEQUITUR for efficient utilization of communication channel. The combination of encryption with compression provides confidentiality in the transmission.

[1]  Nameer N. El-Emam Hiding a Large Amount of Data with High Security Using Steganography Algorithm , 2007 .

[2]  Alfred Menezes,et al.  Key Agreement Protocols and Their Security Analysis , 1997, IMACC.

[3]  Alfred Menezes,et al.  An Efficient Protocol for Authenticated Key Agreement , 2003, Des. Codes Cryptogr..

[4]  Ratna Dutta,et al.  Pairing-Based Cryptographic Protocols : A Survey , 2004, IACR Cryptol. ePrint Arch..

[5]  E. Artin The theory of braids. , 1950, American scientist.

[6]  André Pimenta Freire,et al.  Video steganography for confidential documents: integrity, privacy and version control , 2008, SIGDOC '08.

[7]  Andreas Uhl,et al.  Confidential storage and transmission of medical image data , 2003, Comput. Biol. Medicine.

[8]  William Puech,et al.  DCT-Based Watermarking Method using Error Correction Coding , 2003 .

[9]  V. Pless Introduction to the Theory of Error-Correcting Codes , 1991 .

[10]  Abhishek Dwivedi,et al.  A NON-REPUDIABLE BIASED BITSTRING KEY-AGREEMENT PROTOCOL WITHROOT PROBLEM IN NON-ABELIAN GROUP , 2010 .

[11]  Atul Chaturvedi,et al.  An Authenticated Key Agreement Protocol Using Conjugacy Problem in Braid Groups , 2008, Int. J. Netw. Secur..

[12]  Raphael Overbeck,et al.  Post-Quantum Signatures , 2004, IACR Cryptol. ePrint Arch..

[13]  William Puech,et al.  Crypto-Compression System for Secure Tranfer of Medical Images , 2004 .

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[15]  Jung Hee Cheon,et al.  New Public-Key Cryptosystem Using Braid Groups , 2000, CRYPTO.

[16]  Mihir Bellare,et al.  Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..

[17]  Sheeva Afshan,et al.  Using compression algorithms to support the comprehension of program traces , 2010, WODA '10.