Volume 7, Issue 4, August 2018, Page: 38-41
Medical Image Authentication Using Quartic Digital Signature Algorithm
Santhosh Babu, Department of Telecommunication Engineering, Siddaganga Institute of Technology, Tumkur, India
Viswanath Kapinaiah, Department of Telecommunication Engineering, Siddaganga Institute of Technology, Tumkur, India
Received: Dec. 11, 2018;       Accepted: Jan. 15, 2019;       Published: Jan. 31, 2019
DOI: 10.11648/j.ijiis.20180704.11      View  268      Downloads  21
Abstract
The transmission of medical data in remote places using telemedicine technology requires secured and authenticated data transmission. In this paper, a novel technique is proposed to address authenticated mode of transmission using digital signature which incorporates curve coordinate system. The authentication functions and hash codes are used in the proposed algorithm and the keys are generated for secure transmission. The use of Quartic Digital Signature Algorithm (QDSA) provides authenticity and integrity. The Signature generated encapsulated in the DICOM header and transmitted to the receiver for verification. The proposed technique is demonstrated and evaluated using different modalities of DICOM images.
Keywords
DSA, Medical Image, DICOM, Devil’s Curve
To cite this article
Santhosh Babu, Viswanath Kapinaiah, Medical Image Authentication Using Quartic Digital Signature Algorithm, International Journal of Intelligent Information Systems. Vol. 7, No. 4, 2018, pp. 38-41. doi: 10.11648/j.ijiis.20180704.11
Copyright
Copyright © 2018 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Reference
[1]
Santhosh B, Dr. K Viswanath, “Review on Medical Image Processing”, Volume 435 of the series Advances in Intelligent Systems and Computing, pp 531-537, Springer, Jan2016.
[2]
Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan3, Nii Narku Quaynor “A Security Technique for Authentication and Security of Medical Images” in Health Information Systems.
[3]
William Stallings, "Cryptographyand Network Security" in Principles and Practices, Prentice Hall, 2003.
[4]
Kamal kumar Agrawal, Ruchi Patira, Kapil Madhur,” A Digital Signature Algorithm based on xth Root Problem”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 2, Issue 11, November 2012.
[5]
Vanstone, S. A., 2003. Next generation security for wireless: elliptic curve cryptography. Computers and Security, vol.22, No. 5.
[6]
Aqeel Khalique, Kuldip Singh, Sandeep Sood” Implementation of Elliptic Curve Digital Signature Algorithm” International Journal of Computer Applications (0975 – 8887) Volume 2 – No.2, May 2010.
[7]
A. Umamageswari I, G. R. Suresh,” Novel Algorithms for Secure Medical Image Communication Using Digital Signature with Various Attacks”, Fifth IEEE International Conference on Advanced Computing (ICoAC) 2013.
[8]
Cundy, H. and Rollett, A. Mathematical Models, 3rd ed. Stradbroke, England: Tarquin Pub., p. 71, 1989.
[9]
Gray, A. Modern Differential Geometry of Curves and Surfaces with Mathematica, 2nd ed. Boca Raton, FL: CRC Press, pp. 92-93, 1997.
[10]
Aqeel Khalique, Kuldip Singh, Sandeep Sood,” Implementation of Elliptic Curve Digital Signature Algorithm, International Journal of Computer Applications (0975 – 8887) Volume 2 – No.2, May 2010.
[11]
http://www.2dcurves.com/quartic/quarticd.html.
[12]
Cramer, G. Introduction a l'analyse des lignes courbes algébriques. Geneva, p. 19, 1750.
[13]
Interpolation and approximation of polynomials by Philips, G. M. ISBN: 978-0-387-00215-6http://www. springer.com/978-0-387-00215-6.
[14]
Ali Al-Haj1, Gheith Abandah, Noor Hussein,”Crypto-based algorithms for secured medical image transmission”, IET journal, ISSN 1751-8709.
Browse journals by subject