Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions

Exchanging a medical image via network from one place to another place or storing a medical image in a particular place in a secure manner has become a challenge. To overwhelm this, secure medical image Lossless Compression LC schemes have been proposed. The original input grayscale medical images are encrypted by Tailored Visual Cryptography Encryption Process TVCE which is a proposed encryption system. To generate these encrypted images, four types of processes are adopted which play a vital role. These processes are Splitting Process, Converting Process, Pixel Process and Merging process. The encrypted medical image is compressed by proposed compression algorithms, i.e Pixel Block Short algorithm PBSA and one conventional Lossless Compression LC algorithm has been adopted JPEG 2000LS. The above two compression methods are used to separate compression for encrypted medical images. And also, decompressions have been done in a separate manner. The encrypted output image which is generated from decompression of the proposed compression algorithm, JPEG 2000LS are decrypted by the Tailored Visual Cryptography Decryption Process TVCD. To decrypt the encrypted grayscale medical images, four types of processes are involved. These processes are Segregation Process, Inverse Pixel Process, 8-Bit into Decimal Conversion Process and Amalgamate Process. However, this paper is focused on the proposed visual cryptography only. From these processes, two original images have been reconstructed which are given by two compression algorithms. Ultimately, two combinations are compared with each other based on the various parameters. These techniques can be implemented in the field for storing and transmitting medical images in a secure manner. The Confidentiality, Integrity and Availability CIA property of a medical image have also been proved by the experimental results. In this paper we have focused on only proposed visual cryptography scheme.

[1]  Ja-Chen Lin,et al.  Visual cryptography with extra ability of hiding confidential data , 2006, J. Electronic Imaging.

[2]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[3]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[4]  Giovanni Di Crescenzo,et al.  Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.

[5]  Subramania Sudharsanan Shared key encryption of JPEG color images , 2005, IEEE Transactions on Consumer Electronics.

[6]  J.-C. Yeo,et al.  Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation , 2000 .

[7]  K. Porkumaran,et al.  The new block pixel sort algorithm for TVC-encrypted medical image , 2014 .

[8]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[9]  Weisi Lin,et al.  Modeling visual attention's modulatory aftereffects on visual sensitivity and quality evaluation , 2005, IEEE Transactions on Image Processing.

[10]  Feng Liu,et al.  Step Construction of Visual Cryptography Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[11]  John C. Zubeck,et al.  Implementing Reuse with RAD Tools' Native Objects , 1997, Computer.

[12]  Zhe Chen,et al.  Performance evaluation of functional medical imaging compression via optimal sampling schedule designs and cluster analysis , 2005, IEEE Transactions on Biomedical Engineering.

[13]  S-F Tua,et al.  Design of visual cryptographic methods with smoothlooking decoded images of invariant size for grey-level images , 2007 .

[14]  Hsien-Chu Wu,et al.  Color Visual Cryptography Scheme Using Meaningful Shares , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[15]  Y. Chu,et al.  New data hiding scheme using pixel swapping for halftone images , 2008 .

[16]  Hossain Shahriar,et al.  Hijacking of Clicks: Attacks and Mitigation Techniques , 2015 .

[17]  Lynn Batten,et al.  Hypothesis generation and testing in event profiling for digital forensic investigations , 2013 .

[18]  B. Javidi,et al.  Compression of Optically Encrypted Digital Holograms Using Artificial Neural Networks , 2006, Journal of Display Technology.

[19]  Fu-Liang Yin,et al.  Blind source separation applied to image cryptosystems with dual encryption , 2002 .

[20]  Yung-Gi Wu,et al.  Medical image compression by sampling DCT coefficients , 2002, IEEE Trans. Inf. Technol. Biomed..

[21]  U. Rajendra Acharya,et al.  Compact storage of medical images with patient information , 2001, IEEE Transactions on Information Technology in Biomedicine.

[22]  Xiaofei Wang,et al.  Visual Cryptography for General Access Structure Using Pixel-block Aware Encoding , 2008, J. Comput..

[23]  Min Zhang,et al.  T-matrix and its applications in image processing , 2004 .

[24]  A. Kh. Al Jabri,et al.  Secure progressive transmission of compressed images , 1996 .

[25]  N. Bourbakis,et al.  SCAN-Based Compression-Encryption-Hiding for Video on Demand , 2003, IEEE Multim..

[26]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[27]  Chuohao Yeo,et al.  Toward Compression of Encrypted Images and Video Sequences , 2008, IEEE Transactions on Information Forensics and Security.

[28]  Tzung-Her Chen,et al.  Friendly Color Visual Secret Sharing by Random Grids , 2009, Fundam. Informaticae.

[29]  Heung-Kyu Lee,et al.  Color Extended Visual Cryptography Using Error Diffusion , 2011, IEEE Transactions on Image Processing.

[30]  Sotiris Ioannidis,et al.  Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data , 2013, Int. J. Digit. Crime Forensics.

[31]  Guanrong Chen,et al.  Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[32]  W. Kuo,et al.  Adaptive predictive multiplicative autoregressive model for medical image compression. , 1999, IEEE transactions on medical imaging.

[33]  Der-Chyuan Lou,et al.  A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares , 2011, Displays.

[34]  Shen-Chuan Tai,et al.  Medical image compression by discrete cosine transform spectral similarity strategy , 2001, IEEE Transactions on Information Technology in Biomedicine.

[35]  D. S. Guru,et al.  An Approach for Hand Vein Representation and Indexing , 2011, Int. J. Digit. Crime Forensics.

[36]  M. Cruz-cunha,et al.  Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance , 2014 .

[37]  H. K. Huang,et al.  Authenticity and integrity of digital mammography images , 2001, IEEE Transactions on Medical Imaging.

[38]  Juan Carlos De Martin,et al.  Perception-based partial encryption of compressed speech , 2002, IEEE Trans. Speech Audio Process..

[39]  Haiping Lu,et al.  A Biometric Encryption System for the Self-Exclusion Scenario of Face Recognition , 2009, IEEE Systems Journal.