Open Access   Article Go Back

A Survey on Visual Cryptography Techniques used in Medical Images Encryption

C. Punithadevi1 , G. Shanmugasundaram2 , B. Thenmozhi3 , G. Raga4 , Kreethika Jain5

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 363-370, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.363370

Online published on Mar 31, 2019

Copyright © C. Punithadevi, G. Shanmugasundaram, B. Thenmozhi, G. Raga, Kreethika Jain . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: C. Punithadevi, G. Shanmugasundaram, B. Thenmozhi, G. Raga, Kreethika Jain, “A Survey on Visual Cryptography Techniques used in Medical Images Encryption,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.363-370, 2019.

MLA Style Citation: C. Punithadevi, G. Shanmugasundaram, B. Thenmozhi, G. Raga, Kreethika Jain "A Survey on Visual Cryptography Techniques used in Medical Images Encryption." International Journal of Computer Sciences and Engineering 7.3 (2019): 363-370.

APA Style Citation: C. Punithadevi, G. Shanmugasundaram, B. Thenmozhi, G. Raga, Kreethika Jain, (2019). A Survey on Visual Cryptography Techniques used in Medical Images Encryption. International Journal of Computer Sciences and Engineering, 7(3), 363-370.

BibTex Style Citation:
@article{Punithadevi_2019,
author = {C. Punithadevi, G. Shanmugasundaram, B. Thenmozhi, G. Raga, Kreethika Jain},
title = {A Survey on Visual Cryptography Techniques used in Medical Images Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {363-370},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3846},
doi = {https://doi.org/10.26438/ijcse/v7i3.363370}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.363370}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3846
TI - A Survey on Visual Cryptography Techniques used in Medical Images Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - C. Punithadevi, G. Shanmugasundaram, B. Thenmozhi, G. Raga, Kreethika Jain
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 363-370
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
471 269 downloads 169 downloads
  
  
           

Abstract

Medical pictures and patient`s data are exchanged between various teams to be investigated and assessed by experts who are topographically separated. Any illicit alteration in this data or the event of information loss during the transmission over an uncertain channel may prompt wrong presumptions which may cause an unfavorable impact on patients. Hence, the security of medical images is always been a concern. This security can be provided by the concepts of cryptography. When it is the case of images, an effective security can be provided by using various methods in the domain of Visual Cryptography. In this paper, the various methods used in encrypting the medical images, their efficiency and drawbacks are discussed. A relative analysis based on the performance metrics utilized in these procedures is provided. This article also explores the various key factors and challenges faced in Visual cryptography techniques.

Key-Words / Index Term

Medical images Encryption, Visual Cryptography, Visual Cryptography Techniques, Medical data security

References

[1] M. Naor and A. Shamir, ”Visual cryptography. Advances in Cryptology” EUROCRYPT ’94. Lecture Notes in Computer Science, pp:1–12, 1995
[2] R.Youmaran et al.., “An Improved Visual Cryptography Scheme for Secret Hiding” 23rd Biennial Symposium on Communications, 2007
[3] Shruti M. Rakhunde Manisha Gedam, “ Survey on Visual Cryptography: Techniques, Advantages and Applications”, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661
[4] Anjney Pandey and Subhranil Som “ Applications and Usage of Visual Cryptography: A Review” ICRITO, Vol.978, Issue.1, pp.5090-1489-7, 2016
[5] Alowolodu et al.., “Medical image security using quantum cryptography. Issues in Informing Science and Information Technology”, Vol.15, pp.57-67, 2018
[6] Digvijay Singh, Pratibha Sharma “ Comparison of various Error Diffusion Algorithms Used in Visual Cryptography with Raster scan” IJEDR, Vol. 5, Issue 2 , ISSN 2321-9939, 2017
[7] Nikhil C. Mhalal et al.., “ Randomised visual secret sharing scheme for grey-scale and colour images”, ISSN 1751-9659 Accepted on 29th October 2017 E-First on 9th January 2018
[8] Kirti Rawat, “An Approach for Grey Scale Image in Visual Cryptography Using Error Diffusion Method” IJCST – Vol. 5 Issue 3, ISSN: 2347-8578, 2017
[9] Nisha Menon K, Minu Kuriakose “A novel visual cryptographic scheme using Floyd Steinberg halftoning and block replacement algorithms” IJARBEST journal Vol. 1, Issue 1, 2015
[10] Pranesh Kulkarni, Girish Kulkarni “ Visual Cryptography based Grayscale Image Watermarking in DWT domain” Proceedings of the 2nd ICECA, ISBN:978-1-5386-0965-1, 2018
[11] Ahmed a. Abd el-latif et al.., “ Robust Encryption of Quantum Medical Images ”, IEEE Vol. 6, pp. 2169-3536, 2018
[12] Ranjith Kumar M and Viswanath MK “ A symmetric medical image encryption scheme based on irrational numbers ” Biomedical Research; Special Issue: S494-S498 ISSN 0970-938X, 2018
[13] Jamal N. Bani Salameh “ A Secure Transmission Approach for Medical Images and Patient’s Information by Using Cryptography and Steganography ” IJCSN - International Journal of Computer Science and Network, Vol. 7, Issue 5, ISSN: 2277-5420, 2018
[14] Rajinder Kaur et al.., “ Comparative Analysis and Implementation of Image Encryption Algorithms”, IJCSMC, Vol. 2, Issue. 4, pg.170 – 176, ISSN 2320–088X, 2013
[15] M. Mary Shanthi Rani and G. Germine Mary, “Particle Swarm Optimization Based Image Enhancement of Visual Cryptography Shares”, Springer International Publishing Switzerland, Vol. 14, No. 9, ISSN 1947-5500, 2017
[16] Surya Sarathi Das et al.., “A Simple Visual Secret Sharing Scheme Employing Particle Swarm Optimization”, CIEC, Vol.978, Issue.1, pp.4799-2044-0, 2014
[17] D. Oliva and E. Cuevas, “Advances and Applications of Optimised Algorithms in Image Processing”, Springer International Publishing AG 2017. doi 10.1007/978-3-319-48550-8_2
[18] K. K. Mishra and Shailesh Tiwari and A. K. Misra, “A Bio Inspired Algorithm for Solving Optimization Problems”, ICCCT, Vol.978, Issue.1, pp.4577-1386-611, 2011
[19] Noor Elaiza Abdul Khalid et al.., “ A Review of Bio-inspired Algorithms as Image Processing Techniques”, ICSECS, Part I, CCIS 179, pp. 660–673, 2011