CR Assisted IE Guarded Authenticated Biomedical Image Transactions

In this android era, the word spectrum is connected with trillion faces. The underutilization problem of the spectrum in most of the applications results in the paucity of this scarce resource. Cognitive radio (CR) is an astute technology implemented for the opportunistic usage of idle spectrum reso...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE photonics journal 2018-10, Vol.10 (5), p.1-13
Hauptverfasser: Revathy, K., Thenmozhi, K., Amirtharajan, Rengarajan, Praveenkumar, Padmapriya
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 13
container_issue 5
container_start_page 1
container_title IEEE photonics journal
container_volume 10
creator Revathy, K.
Thenmozhi, K.
Amirtharajan, Rengarajan
Praveenkumar, Padmapriya
description In this android era, the word spectrum is connected with trillion faces. The underutilization problem of the spectrum in most of the applications results in the paucity of this scarce resource. Cognitive radio (CR) is an astute technology implemented for the opportunistic usage of idle spectrum resource dynamically. This paper focuses on sensing of the vacant channels, and it is pre-owned for the transmission of encrypted DICOM information. The proposed algorithm involves encryption schemes like RC5, latin square image cipher, deoxyribo nucleic acid, and discrete Gould transform (DGT) to render confusion, diffusion, and permutation operations. Further, the uncorrelated cipher image is transmitted via the identified unused licensed spectrum. The proposed scheme guarantees the authorised transactions among the stack holders like patients, doctors, and hospital management systems. It also ascertains and enhances the validation of the cipher biomedical interactions among peers by assuring tamper proofing using DGT. Simulations have been conceded over universal software radio peripheral to validate the biomedical data transactions after sensing the unused spectrum. Metrics like global-local entropies, correlation coefficients, key sensitivity, chi-square tests, cropping attacks and differential attack analysis were estimated to authenticate the robustness of the projected encryption scheme.
doi_str_mv 10.1109/JPHOT.2018.2872160
format Article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_proquest_journals_2121920122</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8488566</ieee_id><doaj_id>oai_doaj_org_article_c9646b0f5a824bb5bb2a7fb4a593c120</doaj_id><sourcerecordid>2121920122</sourcerecordid><originalsourceid>FETCH-LOGICAL-c405t-68aaec2b324a8c46729b94905924c2490c0bfb607a76cc405fa8774e975efa7b3</originalsourceid><addsrcrecordid>eNo9kE9PAjEQxTdGExH9AnrZxPNi2-3fIxAEDAnG4LmZli4uAYrt7sFvb2EJp3nTznsz-WXZM0YDjJF6-_icLVcDgrAcECkI5ugm62FFywJxKm6vmrH77CHGLUJcYaZ62Wj8lQ9jrGPj1vl8kk9bCOskh23z4w5NbeH0Mar93q1Ts8vne9i4fBXgEME2tT_Ex-yugl10T5faz77fJ6vxrFgsp_PxcFFYilhTcAngLDEloSAt5YIoo6hCTBFqSRIWmcpwJEBwe7JUIIWgTgnmKhCm7GfzLnftYauPod5D-NMean1-8GGjIaSLd05bxSk3qGIgCTWGGUNAVIYCU6XFBKWs1y7rGPxv62Kjt74Nh3S-JphglUgSkqZIN2WDjzG46roVI33irs_c9Ym7vnBPppfOVDvnrgZJpWScl_8TUnzx</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2121920122</pqid></control><display><type>article</type><title>CR Assisted IE Guarded Authenticated Biomedical Image Transactions</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Revathy, K. ; Thenmozhi, K. ; Amirtharajan, Rengarajan ; Praveenkumar, Padmapriya</creator><creatorcontrib>Revathy, K. ; Thenmozhi, K. ; Amirtharajan, Rengarajan ; Praveenkumar, Padmapriya</creatorcontrib><description>In this android era, the word spectrum is connected with trillion faces. The underutilization problem of the spectrum in most of the applications results in the paucity of this scarce resource. Cognitive radio (CR) is an astute technology implemented for the opportunistic usage of idle spectrum resource dynamically. This paper focuses on sensing of the vacant channels, and it is pre-owned for the transmission of encrypted DICOM information. The proposed algorithm involves encryption schemes like RC5, latin square image cipher, deoxyribo nucleic acid, and discrete Gould transform (DGT) to render confusion, diffusion, and permutation operations. Further, the uncorrelated cipher image is transmitted via the identified unused licensed spectrum. The proposed scheme guarantees the authorised transactions among the stack holders like patients, doctors, and hospital management systems. It also ascertains and enhances the validation of the cipher biomedical interactions among peers by assuring tamper proofing using DGT. Simulations have been conceded over universal software radio peripheral to validate the biomedical data transactions after sensing the unused spectrum. Metrics like global-local entropies, correlation coefficients, key sensitivity, chi-square tests, cropping attacks and differential attack analysis were estimated to authenticate the robustness of the projected encryption scheme.</description><identifier>ISSN: 1943-0655</identifier><identifier>EISSN: 1943-0647</identifier><identifier>DOI: 10.1109/JPHOT.2018.2872160</identifier><identifier>CODEN: PJHOC3</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Biomedical data ; Biomedical imaging ; Ciphers ; Cognitive radio ; Cognitive security ; Computer simulation ; Correlation coefficients ; dicom ; DNA ; Encryption ; image encryption ; Image transmission ; Management systems ; Medical imaging ; Permutations ; Physicians ; Sensitivity analysis ; Sensors ; Software radio ; USRP</subject><ispartof>IEEE photonics journal, 2018-10, Vol.10 (5), p.1-13</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c405t-68aaec2b324a8c46729b94905924c2490c0bfb607a76cc405fa8774e975efa7b3</citedby><cites>FETCH-LOGICAL-c405t-68aaec2b324a8c46729b94905924c2490c0bfb607a76cc405fa8774e975efa7b3</cites><orcidid>0000-0003-1574-3045 ; 0000-0001-8483-1538</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8488566$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2102,27633,27924,27925,54933</link.rule.ids></links><search><creatorcontrib>Revathy, K.</creatorcontrib><creatorcontrib>Thenmozhi, K.</creatorcontrib><creatorcontrib>Amirtharajan, Rengarajan</creatorcontrib><creatorcontrib>Praveenkumar, Padmapriya</creatorcontrib><title>CR Assisted IE Guarded Authenticated Biomedical Image Transactions</title><title>IEEE photonics journal</title><addtitle>JPHOT</addtitle><description>In this android era, the word spectrum is connected with trillion faces. The underutilization problem of the spectrum in most of the applications results in the paucity of this scarce resource. Cognitive radio (CR) is an astute technology implemented for the opportunistic usage of idle spectrum resource dynamically. This paper focuses on sensing of the vacant channels, and it is pre-owned for the transmission of encrypted DICOM information. The proposed algorithm involves encryption schemes like RC5, latin square image cipher, deoxyribo nucleic acid, and discrete Gould transform (DGT) to render confusion, diffusion, and permutation operations. Further, the uncorrelated cipher image is transmitted via the identified unused licensed spectrum. The proposed scheme guarantees the authorised transactions among the stack holders like patients, doctors, and hospital management systems. It also ascertains and enhances the validation of the cipher biomedical interactions among peers by assuring tamper proofing using DGT. Simulations have been conceded over universal software radio peripheral to validate the biomedical data transactions after sensing the unused spectrum. Metrics like global-local entropies, correlation coefficients, key sensitivity, chi-square tests, cropping attacks and differential attack analysis were estimated to authenticate the robustness of the projected encryption scheme.</description><subject>Algorithms</subject><subject>Biomedical data</subject><subject>Biomedical imaging</subject><subject>Ciphers</subject><subject>Cognitive radio</subject><subject>Cognitive security</subject><subject>Computer simulation</subject><subject>Correlation coefficients</subject><subject>dicom</subject><subject>DNA</subject><subject>Encryption</subject><subject>image encryption</subject><subject>Image transmission</subject><subject>Management systems</subject><subject>Medical imaging</subject><subject>Permutations</subject><subject>Physicians</subject><subject>Sensitivity analysis</subject><subject>Sensors</subject><subject>Software radio</subject><subject>USRP</subject><issn>1943-0655</issn><issn>1943-0647</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNo9kE9PAjEQxTdGExH9AnrZxPNi2-3fIxAEDAnG4LmZli4uAYrt7sFvb2EJp3nTznsz-WXZM0YDjJF6-_icLVcDgrAcECkI5ugm62FFywJxKm6vmrH77CHGLUJcYaZ62Wj8lQ9jrGPj1vl8kk9bCOskh23z4w5NbeH0Mar93q1Ts8vne9i4fBXgEME2tT_Ex-yugl10T5faz77fJ6vxrFgsp_PxcFFYilhTcAngLDEloSAt5YIoo6hCTBFqSRIWmcpwJEBwe7JUIIWgTgnmKhCm7GfzLnftYauPod5D-NMean1-8GGjIaSLd05bxSk3qGIgCTWGGUNAVIYCU6XFBKWs1y7rGPxv62Kjt74Nh3S-JphglUgSkqZIN2WDjzG46roVI33irs_c9Ym7vnBPppfOVDvnrgZJpWScl_8TUnzx</recordid><startdate>20181001</startdate><enddate>20181001</enddate><creator>Revathy, K.</creator><creator>Thenmozhi, K.</creator><creator>Amirtharajan, Rengarajan</creator><creator>Praveenkumar, Padmapriya</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7U5</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-1574-3045</orcidid><orcidid>https://orcid.org/0000-0001-8483-1538</orcidid></search><sort><creationdate>20181001</creationdate><title>CR Assisted IE Guarded Authenticated Biomedical Image Transactions</title><author>Revathy, K. ; Thenmozhi, K. ; Amirtharajan, Rengarajan ; Praveenkumar, Padmapriya</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c405t-68aaec2b324a8c46729b94905924c2490c0bfb607a76cc405fa8774e975efa7b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Algorithms</topic><topic>Biomedical data</topic><topic>Biomedical imaging</topic><topic>Ciphers</topic><topic>Cognitive radio</topic><topic>Cognitive security</topic><topic>Computer simulation</topic><topic>Correlation coefficients</topic><topic>dicom</topic><topic>DNA</topic><topic>Encryption</topic><topic>image encryption</topic><topic>Image transmission</topic><topic>Management systems</topic><topic>Medical imaging</topic><topic>Permutations</topic><topic>Physicians</topic><topic>Sensitivity analysis</topic><topic>Sensors</topic><topic>Software radio</topic><topic>USRP</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Revathy, K.</creatorcontrib><creatorcontrib>Thenmozhi, K.</creatorcontrib><creatorcontrib>Amirtharajan, Rengarajan</creatorcontrib><creatorcontrib>Praveenkumar, Padmapriya</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE photonics journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Revathy, K.</au><au>Thenmozhi, K.</au><au>Amirtharajan, Rengarajan</au><au>Praveenkumar, Padmapriya</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>CR Assisted IE Guarded Authenticated Biomedical Image Transactions</atitle><jtitle>IEEE photonics journal</jtitle><stitle>JPHOT</stitle><date>2018-10-01</date><risdate>2018</risdate><volume>10</volume><issue>5</issue><spage>1</spage><epage>13</epage><pages>1-13</pages><issn>1943-0655</issn><eissn>1943-0647</eissn><coden>PJHOC3</coden><abstract>In this android era, the word spectrum is connected with trillion faces. The underutilization problem of the spectrum in most of the applications results in the paucity of this scarce resource. Cognitive radio (CR) is an astute technology implemented for the opportunistic usage of idle spectrum resource dynamically. This paper focuses on sensing of the vacant channels, and it is pre-owned for the transmission of encrypted DICOM information. The proposed algorithm involves encryption schemes like RC5, latin square image cipher, deoxyribo nucleic acid, and discrete Gould transform (DGT) to render confusion, diffusion, and permutation operations. Further, the uncorrelated cipher image is transmitted via the identified unused licensed spectrum. The proposed scheme guarantees the authorised transactions among the stack holders like patients, doctors, and hospital management systems. It also ascertains and enhances the validation of the cipher biomedical interactions among peers by assuring tamper proofing using DGT. Simulations have been conceded over universal software radio peripheral to validate the biomedical data transactions after sensing the unused spectrum. Metrics like global-local entropies, correlation coefficients, key sensitivity, chi-square tests, cropping attacks and differential attack analysis were estimated to authenticate the robustness of the projected encryption scheme.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/JPHOT.2018.2872160</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0003-1574-3045</orcidid><orcidid>https://orcid.org/0000-0001-8483-1538</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1943-0655
ispartof IEEE photonics journal, 2018-10, Vol.10 (5), p.1-13
issn 1943-0655
1943-0647
language eng
recordid cdi_proquest_journals_2121920122
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Algorithms
Biomedical data
Biomedical imaging
Ciphers
Cognitive radio
Cognitive security
Computer simulation
Correlation coefficients
dicom
DNA
Encryption
image encryption
Image transmission
Management systems
Medical imaging
Permutations
Physicians
Sensitivity analysis
Sensors
Software radio
USRP
title CR Assisted IE Guarded Authenticated Biomedical Image Transactions
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T06%3A05%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=CR%20Assisted%20IE%20Guarded%20Authenticated%20Biomedical%20Image%20Transactions&rft.jtitle=IEEE%20photonics%20journal&rft.au=Revathy,%20K.&rft.date=2018-10-01&rft.volume=10&rft.issue=5&rft.spage=1&rft.epage=13&rft.pages=1-13&rft.issn=1943-0655&rft.eissn=1943-0647&rft.coden=PJHOC3&rft_id=info:doi/10.1109/JPHOT.2018.2872160&rft_dat=%3Cproquest_doaj_%3E2121920122%3C/proquest_doaj_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2121920122&rft_id=info:pmid/&rft_ieee_id=8488566&rft_doaj_id=oai_doaj_org_article_c9646b0f5a824bb5bb2a7fb4a593c120&rfr_iscdi=true