A Secure Fast 2D-Discrete Fractional Fourier Transform Based Medical Image Compression Using SPIHT Algorithm with Huffman Encoder
(*) Corresponding author
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)
The arrival of CT and MRI imaging in the last two decades used for analysis of various diseases in medical field. Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) sequences have become essential in healthcare systems and an integral segment of a patient’s medical record. Such medical image data needed a huge amount of resources for storage and transmission. Compression of medical images for efficient use of storage space and transmission bit rate has become a necessity. A quasigroup successfully creates an astronomical number of keys which is used to confuse the hackers in determining the original data. However, quasi group encryption is not capable in diffusing the information of the plain text. Hence, in this paper the DICOM images are encrypted using a chained Hadamard transforms and Number Theoretic Transforms to introduce diffusion along with the quasigroup transformation. A secure Fast Two Dimensional Discrete Fractional Fourier Transform (DFRFT) and a SPIHT Algorithm with Huffman Encoder is used for compress the image and it provides a secure compression of medical images as compared to the other transform. The experimental results evaluate the performance of the proposed encryption approach based on the PSNR and MSE it shows the proposed approach gives better results.
Copyright © 2013 Praise Worthy Prize - All rights reserved.
D.-G. Kim, L.-K. Choi, S.-S. Lee, and J.-H. Kim. Requirements for Internet Media Guides on Internet Protocol Television Services. Draft, IETF, 2005.
Sehoon Yeaa, Sungdae Chob and William A. Pearlman, “Integrated lossy, Near-Lossless and lossless compression of Medical volumetric data”, SPIE Image and Video Communication processing, Vol.5685, pp.151-159, 2005.
A. Olyaei and R. Genov, “Mixed-Signal Haar Wavelet compression Image Architecture”, In Proc.of the Midwest symposium on circuits and systems (MWSCAS ’05), Cincinnati, Vol.3, pp 153-169, 2005.
Muna F. Al- Sammraie and Faisal G. Khamis, "Adaptive Image Compression Based Wavelet using Space-Frequency Segmentation", in proc. of Research Journal on Applied Sciences, vol. 3, no. 6, pp. 421- 430, 2008.
Jacob Strom and Pamela C. Cosman, “Medical image compression with lossless regions of interest”, Elsevier: Signal Processing, Vol.59, No.2, pp.155-171, June 1997.
S. E. Ghrare, M. A. M. Ali, M. Ismail and K. Jumari, "The Effect of Image Data Compression on the Clinical Information Quality of Compressed Computed Tomography Images for Teleradiology Applications", European Journal of Scientific Research ISSN 1450-216X, Vol.23 No.1, pp.6-12, 2008.
Andrew B. Watson, “Image Compression Using the Discrete Cosine Transform”, Mathematica Journal, 4(1), 1994, p. 81-88.
M. Nelson and J. L. Gailly, “The Data Compression Book”, 2nd ed. Newyork, M & T Books, 1996.
Y. Lin, I. Jan, P. Ko, Y. Chen, J.Wong, and G. Jan, “A wireless PDA-based physiological monitoring system for patient transport,” IEEE Trans. Inf.Technol. Biomed., vol. 8, no. 4, pp. 439–447, Dec. 2004.
X. Kai, Y. Jie, Z. Y. Min, and L. X. Liang, “HVS-based medical image compression,” Eur. J. Radiol., vol. 55, no. 1, pp. 139–145, Jul. 2005.
S. Bacchelli and S. Papi, “Image denoising using principal component analysis in the wavelet domain,” J. Comput. Appl. Math.,vol. 189, no. 1, pp. 601–621, Jun. 2005.
G. Sun, X. Dong, and G. Xu, “Tumor tissue identification based on gene expression data using DWT feature extraction and PNN classifier,” Neuro computing, vol. 69, no. 4–6, pp. 387–402.
B. Ramakrishnan, N. Sriraam, “Internet transmission of DICOM images with effective low bandwidth utilization”, Journal of Digital Signal Process, Vol.16, pp. 825–831,2006.
Coatrieux G, Quantin C, Montagner J, Fassa M, Allaert FA, Roux Ch: Watermarking medical images with anonymous patient identification to verify authenticity. Journal of Studies in Health Technology and Informatics 2008, 136:667-672.
Zain JM, Fauzi AR, Aziz A: Clinical evaluation of watermarked medical images. Proc. 28th IEEE EMBS Annual International Conference, New York City, USA 2006, 5459-5462.
Guo X, Zhuang T: A lossless watermarking scheme for enhancing security of medical data in PACS. Proc. SPIE Medical Imaging: PACS and Integrated Medical Information Systems: Design and Evaluation, CA, United States, 2003, 5033:350-359.
Muhammad Azhar Iqbal, Muhammad Younus Javed, Usman Qayyum, 2007."Curvelet-Based Image Compression with SPIHT", Proceedings of the 2007 International Conference on Convergence Information Technology, pp. 961-965.
Banu Diri, Songul Albayrak, 2006. "Color image compression using self organizing feature map", Proceedings of the 24th IASTED international conference on Artificial intelligence and applications, Austria, pp. 162 - 166.
Sharma, Dinesh K.; Gaur, Loveleen, 2007. "Image compression and feature extraction using Kohonen's self-organizing map neural network", Journal of Strategic E-Commerce.
J. Hoffstein, J. Pipher, J.H. Silverman, An Introduction to Mathematical Cryptography. Springer, 2010.
R.S.Reddy, Encryption of binary and non-binary data using chained Hadamard transforms.arXiv:1012.4452.
Ulman, L.J. “Computation of the Hadamard Transform and the R-Transform in Ordered Form”, IEEE Transactions on Computers, Volume: C-19, Issue: 4, Page(s): 359 – 360, 1970.
Ce Zhu and Bing Xiong, “Transform-Exempted Calculation of Sum of Absolute Hadamard Transformed Differences”, IEEE Transactions on Circuits and Systems for Video Technology, Volume: 19 , Issue: 8, Page(s): 1183 – 1188, 2009.
V.Godavarty, Using Quasigroups for Generating Pseudorandom Numbers.arXiv:1112.1048.
B.Goldburg, S.Sridharan, E.Dawson, “Design and cryptanalysis of transform-based analog speech scramblers”, Journal of Selected Areas in Communications 11:735-744, 1993.
S. Kak, Classification of random binary sequences using Walsh-Fourier analysis.IEEE Trans on Electromagnetic Compatibility EMC-13, pp. 74-77, 1971.
M.Satti and S.Kak, Multilevel indexed quasigroup encryption for data and speech.IEEE Trans on Broadcasting 55: 270-281, 2009.
- There are currently no refbacks.
Please send any question about this web site to email@example.com
Copyright © 2005-2023 Praise Worthy Prize