CFP last date
22 April 2024
Reseach Article

An Evaluation of Data Security for Telemedicine Application Development

by Hetal N. Rao, Manoj Pandya, K M V V Prasad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 1
Year of Publication: 2013
Authors: Hetal N. Rao, Manoj Pandya, K M V V Prasad
10.5120/13705-1454

Hetal N. Rao, Manoj Pandya, K M V V Prasad . An Evaluation of Data Security for Telemedicine Application Development. International Journal of Computer Applications. 79, 1 ( October 2013), 21-25. DOI=10.5120/13705-1454

@article{ 10.5120/13705-1454,
author = { Hetal N. Rao, Manoj Pandya, K M V V Prasad },
title = { An Evaluation of Data Security for Telemedicine Application Development },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 1 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number1/13705-1454/ },
doi = { 10.5120/13705-1454 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:53:18.700958+05:30
%A Hetal N. Rao
%A Manoj Pandya
%A K M V V Prasad
%T An Evaluation of Data Security for Telemedicine Application Development
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 1
%P 21-25
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital Communication has made the data transfer and data communication very fast, easy and efficient. In the field of the data security several techniques are used right from the years ago. This includes Cryptography, Steganography and Watermarking techniques. This paper includes the review and comparative analysis of all these three techniques for the field of Image Processing focusing to the Medical Images. As for Healthcare field, security of data is more sensitive and important, we are analyzing for the most suitable technique for this purpose. This review is initial part of the research for developing the application of data security using efficient algorithm that follows the specific and robust transformation technique useful in Telemedicine field.

References
  1. R. Amirathrajan, R. Akila, P. Deepikachowdavarapu, "A Comparative Analysis of Image Steganography", International Journal of Computer Application (IJCA), Vol. 2, Issue-3, pp. 41-47, May 2010.
  2. A. Chaddad, J. Condell, K. Curran, P. MacKevitt, "A Comparative analysis of Staganographic Tools", University of Ulster, UK.
  3. J. Cummins, P. Diskin, S. Lau and R. Parlett, "Steganography and Digital Watermarking", the University of Bermingham, pp. 1-24, 2004.
  4. R. Popa, An Analysis of Steganography Techniques, The "Politehnica" University of Timisoara, Faculty of Automatics and Computers, Department of Computer Science and Software Engineering, http://ad. informatik. unifreiburg. de/mitarbeiter/will/dlib_bookmarks/digital-watermarking/popa/popa. pdf, 1998.
  5. A. J. Raphael and Dr. V. Sundaram, "Cryptography and Steganography- A Survey", IJCTA, Vol. 2, Issue-3, pp. 626-630.
  6. John Wiley & Sons, Network Security, Bible, 2nd edition, "Communication Steganography compared to Cryptography", Safari books online, September 2009.
  7. D. Feng, W. Siu, and H. Zhang, Multimedia Information Retrieval and Management, 1st ed. : Springer, 2003.
  8. Jiang, X. "Digital watermarking and its application in image copyright protection", International Conference on Intelligent Computation Technology and Automation, ICICTA 2010, Changsha, China: IEEE Computer Society, May 2010.
  9. Chapter-13, Steganography and Watermarking, IV054, ppt.
  10. H. V. Desai, "Steganography, Cryptography, Watermarking: A Comparative Study", Journal of Global Research in Computer Science, Vol. 3, Issue-12, pp. 33-35, December- 2012.
  11. E. Praun, H. Hoppe and A. Finkelstein, "Robust Mesh Watermarking", Microsoft Research and Princeton University.
  12. G. C. Kessler, "Steganography: Hiding Data in Data", Windows and . Net magazine, April 2002.
  13. I. J. Cox, M. L. Miller and J. A. Bloom, "Watermarking applications and their properties", International Conference on Information Technology, CiteSeerX?, Las Vegas, 2000.
  14. K. Pal, G. Ghosh and M. Bhattacharya, "A Novel Digital Image Watermarking Scheme for Data Security Using Bit Replacement and Majority Algorithm Technique", InTech, Watermarking, Vol. 1, May 2012.
  15. S. Atawneh, A. Almomani and P. Sumari, "Steganography in Digital Images: Common Approaches and Tools", IETE Technical Review, Vol. 30, Issue-4, Jul- Aug, 2013.
  16. P. Gupta, "Cryptography based digital iamge watermarking algorithm to increase security of watermark data", IJSER, Vol. 3, Issue-9, Sept 2012.
  17. H. Rawat, A. Kumar and S. Kumar, "Robust Digital Image Watermarking Scheme for Copyright Protection", IJCA, Vol. 75, Issue-18, Aug. 2013.
  18. S. Karve and V. Dalal, "Image Steganography using Inverse Embedding Reversible Data Hiding Scheme", International Conference and Workshop on Recent Trends and Technology, IJCA, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Steganography Watermarking Copyright Protections Intellectual Rights