Open Access Open Access  Restricted Access Subscription Access

A Comprehensive Compression and Encryption Scheme for Secured Medical Images Communication


Affiliations
1 Department of ECE, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai 600062, Tamil Nadu, India
2 Department of CSE, Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai 600062, Tamil Nadu, India
 

Background/Objectives: Among a gamut of evolving domains in medicine exchange of medicinal data and images amid multiple entities constitutes a pivotal aspect for telemedicine. An effective bandwidth allocation and management scheme is essential to accomplish the telemedicine communication requirements. This necessitates the requisite to develop and implement a compression and encryption scheme for medical images. Methods: This paper recapitulates the diverse transformation techniques employed in compression and identifies the constraints associated with the techniques. This paper summarizes the comparison of encryption methods such as Rivest Cipher 4(RC4), Rivest Cipher 2(RC2) and Data Encryption Standard (DES) in terms of time consumed to complete encryption and decryption operations. Findings: This paper considers Peak Signal-to-Noise Ratio (PSNR) and Compression Ratio (CR) as performance measures and establishes the proposed algorithms's effectiveness over Set Partitioning Hierarchical Trees (SPIHT). Application: This algorithm can be utilized for medical image compression, transfer and archiving operations.

Keywords

Compression Ratio (CR), Data Encryption Standard (DES), Peak Signal-to-Noise Ratio (PSNR), Rivest Cipher 4(RC4), Rivest Cipher (RC2), Set Partitioning Hierarchical Trees (SPIHT)
User

Abstract Views: 167

PDF Views: 0




  • A Comprehensive Compression and Encryption Scheme for Secured Medical Images Communication

Abstract Views: 167  |  PDF Views: 0

Authors

G. Saravana Kumar
Department of ECE, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai 600062, Tamil Nadu, India
V. Parthasarathy
Department of CSE, Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai 600062, Tamil Nadu, India
E. Praveen Kumar
Department of ECE, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai 600062, Tamil Nadu, India
S. Thiyagarajan
Department of ECE, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai 600062, Tamil Nadu, India
S. Siva Saravana Babu
Department of ECE, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai 600062, Tamil Nadu, India
S. Sudhakar
Department of ECE, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai 600062, Tamil Nadu, India

Abstract


Background/Objectives: Among a gamut of evolving domains in medicine exchange of medicinal data and images amid multiple entities constitutes a pivotal aspect for telemedicine. An effective bandwidth allocation and management scheme is essential to accomplish the telemedicine communication requirements. This necessitates the requisite to develop and implement a compression and encryption scheme for medical images. Methods: This paper recapitulates the diverse transformation techniques employed in compression and identifies the constraints associated with the techniques. This paper summarizes the comparison of encryption methods such as Rivest Cipher 4(RC4), Rivest Cipher 2(RC2) and Data Encryption Standard (DES) in terms of time consumed to complete encryption and decryption operations. Findings: This paper considers Peak Signal-to-Noise Ratio (PSNR) and Compression Ratio (CR) as performance measures and establishes the proposed algorithms's effectiveness over Set Partitioning Hierarchical Trees (SPIHT). Application: This algorithm can be utilized for medical image compression, transfer and archiving operations.

Keywords


Compression Ratio (CR), Data Encryption Standard (DES), Peak Signal-to-Noise Ratio (PSNR), Rivest Cipher 4(RC4), Rivest Cipher (RC2), Set Partitioning Hierarchical Trees (SPIHT)



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i16%2F132746