Medical Image Encryption by Using Modification of SomdipDey Advanced Encryption Image Technique

Al Farissi, Agung Wahyu Nugroho, Megah Mulya

Abstract


The rapid growth of technology led the security ofdata becomes a very important issue, in particular data onmedical field. Therefore the security of data need to beconsidered. This research will focus on the security of medicalimage. The appropriate technologies to increase the security ofmedical image is the image encryption. This research, applied atechnique that can encrypt a medical image, it is SompdipDeyAdvanced Encryption Image Technique. This technique hasthree phases, namely Bits Rotation and Reversal, Extended HillCipher and Modified MSA Randomization. This research wasalso conducted on a modification of the stage Extended HillCipher that produces a better result so that the security ofmedical data will be increased.

Keywords


Medical Image, Image Encryption, Modification, SD-AEI, Hill Cipher;

References


Bibhudendra. A., Panigrahy. S. K., Patra. S. K. andPanda. G., ―Image Encryption Using Advanced Hill Cipher Algorithm‖, International Journal of Recent Trends in Engineering, Vol.1, No. 1, May 2009, pp. 663-667.

Dey, S, ―SD-AEI: An advanced encryption technique for images,‖ Digital Information Processing and Communications (ICDIPC), 2012 Second International Conference on, 10-12 July 2012 2012a. 68-73.

Saroj K. P,Acharya. B. andJena. D, ―ImageEncryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm‖,1stInternational Conference on Advances in Computing, Chikhli, India,21-22 February 2008.

Yicong, Z., Panetta, K. andAgaian, S, ―A lossless encryption method for medical images using edge maps,‖ Engineering in Medicine and Biology Society, 2009. EMBC 2009. Annual International Conference of the IEEE, 3-6 Sept. 2009 2009. 3707-3710.

(2013) The NEJM website. [Online]. Available: http://www.nejm.org/doi/full/10.1056/NEJMp1215258

Dey, S, ―SD-EI: A Cryptographic Technique To Encrypt Images‖,Proceedings of ―The International Conference on Cyber Security,CyberWarfare and Digital Forensic (CyberSec 2012)‖, held at KualaLumpur, Malaysia, 2012, pp. 28-32.

Nath, A, Chatterjee, T, Das T, Nath J andShayanDey, ―Symmetric key cryptosystem using combined cryptographicalgorithms - Generalized modified Vernam Cipher method, MSAmethod and NJJSAA method: TTJSA algorithm‖, Proceedings of―Information and Communication Technologies (WICT), 2011 ― held atMumbai, 11th – 14th Dec, 2011, Pages:1175-1180.


Full Text: PDF

Refbacks

  • There are currently no refbacks.