Mutual Authentication Using Image Processing and Visual Cryptography Protocol for Patient Database

نویسندگان

  • B. Padmavathi
  • Vishrut Sharma
  • Sungkrityayan Khan
  • Adithya Krishnareddy
چکیده

Online Patient database is a particular type of service rendered by a chain of intercommunicated hospitals. Medical practitioners and clients are able to access their records or look into status of their diagnosis from any of the other or branch hospitals. The principle concern in online patient database is the authenticity of both the doctor and the client. Due to ineluctable intruding of the database on the Internet, it is very hard to rely on any kind of data on the Internet. The propounded approach of ours, based on Image processing technique and Visual Cryptography, the authentication problem is resolved. This particular paper proffers a technique of processing the Endoscopic Ulcer images based on Grow-cut and then divides it into Secret shares based on Random Grid Visual cryptographic Techniques. The total number of shares to be created depends on the strategy selected by the medical practitioner. If two shares are prepared, one of the shares is reposited in the Global Hospital Server, and the other is retained by the client. The client has to produce his/her secret share during the consultation. Client's share is then stacked with the Hospital Server share to obtain the original Endoscopic image. This method of correlation aids in concluding the decision based on espousal or denial of the output and hence confirms the client.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography

Kerberos is an authentication protocol in which client and server can mutually authenticate to each other across an insecure network connection, to ensure data integrity of the message and privacy of channel communications. In this paper, a new novel is proposed to improve Kerberos authentication protocol by using Secret Image. This proposed modification in Kerberos will be modified to yield be...

متن کامل

A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cryptography using Image Processing

Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. In this paper, we studied the cheating problem in VC by malicious adversaries. We considered the attacks of malicious adversaries who may deviate from the sc...

متن کامل

A Robust Three-Way Authentication System using Modified Random Grid based Reversible Style Visual Cryptography

The growing possibilities of modern communications require a special means of confidential and intellectual property protection against unauthorized access and use. Cryptography provides important tools for the protection of information and they are used in many aspects of computer security. This paper makes use of encrypted secret sharing to increases the security level of hidden data and to p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015