Neural soft computing based secured transmission of intraoral gingivitis image in e-health care
In this paper, a key based soft computing transmission of intraoral gingivitis image has been proposed without the exchange of common key in between the nodes. Gingivitis has been a type of periodontal disease caused due to bacterial colonization inside the mouth, having the early signs of gum blee...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2019-04-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02776 am a22003373u 4500 | ||
---|---|---|---|
001 | ijeecs15497_11908 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Sarkar, Arindam |e author |
100 | 1 | 0 | |a None |e contributor |
700 | 1 | 0 | |a Dey, Joydeep |e author |
700 | 1 | 0 | |a Chatterjee, Minakshi |e author |
700 | 1 | 0 | |a Bhowmik, Anirban |e author |
700 | 1 | 0 | |a Karforma, Sunil |e author |
245 | 0 | 0 | |a Neural soft computing based secured transmission of intraoral gingivitis image in e-health care |
260 | |b Institute of Advanced Engineering and Science, |c 2019-04-01. | ||
500 | |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/15497 | ||
520 | |a In this paper, a key based soft computing transmission of intraoral gingivitis image has been proposed without the exchange of common key in between the nodes. Gingivitis has been a type of periodontal disease caused due to bacterial colonization inside the mouth, having the early signs of gum bleeding and inflammations in human beings. In E-health care strata, online transmission of such intraoral images with secured encryption technique is needed. Session key based neural soft computing transmission by the dentists has been proposed in this paper with an eye to preserve patients' confidentiality factor. To resist the data distortion by the eavesdroppers while on the transmission path, secured transmission in a group of tree parity machines was carried out. Topologically same tree parity machines with equal seed values were used by all users of that specified group. A common session key synchronization method was applied in that group. Intraoral image has been encrypted to generate multiple secret shares. Multiple secrets were transmitted to individual nodes in that group. The original gingivitis image can only be reconstructed upon the merging of threshold number of shares. Regression statistics along with ANOVA analysis were carried out on the result set obtained from the proposed technique. The outcomes of such tests were satisfactory for acceptance. | ||
540 | |a Copyright (c) 2019 Institute of Advanced Engineering and Science | ||
540 | |a http://creativecommons.org/licenses/by-nc/4.0 | ||
546 | |a eng | ||
690 | |a Computer and Informatics | ||
690 | |a Gingivitis; Secret shares; Tree Parity Machine | ||
655 | 7 | |a info:eu-repo/semantics/article |2 local | |
655 | 7 | |a info:eu-repo/semantics/publishedVersion |2 local | |
655 | 7 | |2 local | |
786 | 0 | |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 14, No 1: April 2019; 178-184 | |
786 | 0 | |n 2502-4760 | |
786 | 0 | |n 2502-4752 | |
786 | 0 | |n 10.11591/ijeecs.v14.i1 | |
787 | 0 | |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/15497/11908 | |
856 | 4 | 1 | |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/15497/11908 |z Get fulltext |