Secure visual cryptography for medical image using modified cuckoo search

被引:0
|
作者
A. Alif Siddiqua Begum
S. Nirmala
机构
[1] Anna University,
[2] Muthayammal Engineering College,undefined
[3] Rasipuram,undefined
来源
关键词
Gaussian function; Discrete wavelet transform; Cuckoo search; Mean square error and peak signal to noise ratio;
D O I
暂无
中图分类号
学科分类号
摘要
Optimal secure visual cryptography for brain MRI medical image is proposed in this paper. Initially, the brain MRI images are selected and then discrete wavelet transform is applied to the brain MRI image for partitioning the image into blocks. Then Gaussian based cuckoo search algorithm is utilized to select the optimal position for every block. Next the proposed technique creates the dual shares from the secret image. Then the secret shares are embedded in the corresponding positions of the blocks. After embedding, the extraction operation is carried out. Here visual cryptographic design is used for the purpose of image authentication and verification. The extracted secret image has dual shares, based on that the receiver views the input image. The authentication and verification of medical image are assisted with the help of target database. All the secret images are registered previously in the target database. The performance of the proposed method is estimated by Peak Signal to Noise Ratio (PSNR), Mean square error (MSE) and normalized correlation. The implementation is done by MATLAB platform.
引用
收藏
页码:27041 / 27060
页数:19
相关论文
共 50 条
  • [1] Secure visual cryptography for medical image using modified cuckoo search
    Begum, A. Alif Siddiqua
    Nirmala, S.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (20) : 27041 - 27060
  • [2] Secure Authentication using Image Processing and Visual Cryptography for Banking Applications
    Hegde, Chetana
    Manu, S.
    Shenoy, P. Deepa
    Venugopal, K. R.
    Patnaik, L. M.
    [J]. ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 65 - +
  • [3] Secure Medical Image Steganography with RSA Cryptography using Decision Tree
    Jain, Mamta
    Choudhary, Rishabh Charan
    Kumar, Anil
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 291 - 295
  • [4] Secure Image Transmission using Visual Cryptography Scheme without Changing the Color of the Image
    Johny, Shiji
    Antony, Anil
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICETECH), 2015, : 42 - 44
  • [5] Secure Medical Image-Sharing Mechanism based on Visual Cryptography in EHR system
    Yang, Dana
    Doh, Inshil
    Chae, Kijoon
    [J]. 2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 463 - 467
  • [6] A Secure Image Watermarking Using Visual Cryptography and discrete fractional Fourier transform
    Wang, Hong-Yang
    [J]. APPLIED DECISIONS IN AREA OF MECHANICAL ENGINEERING AND INDUSTRIAL MANUFACTURING, 2014, 577 : 754 - 757
  • [7] Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions
    Manimurugan, S.
    Narmatha, C.
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2015, 7 (01) : 26 - 50
  • [8] Secure Mail using Visual Cryptography (SMVC)
    Ajish, S.
    Rajasree, R.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [9] Fuzzy modified cuckoo search for biomedical image segmentation
    Chakraborty, Shouvik
    Mali, Kalyani
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2022, 64 (04) : 1121 - 1160
  • [10] Modified Cuckoo Search-Based Image Enhancement
    Maurya, Lalit
    Mahapatra, Prasant Kumar
    Saini, Garima
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 625 - 634