Virtual Cryptopgraphic Technique and Bit-plane Segmentation Stegnegography for Security in Bioinformatics and Biomedical Applications
The security techniques are very important in all modern applications since most of the applications of science and engineering are using digital media and processing. There are sevral security techniques for protection of various types of data, such as biometrics, cryptograpy, watermarking etc. This paper discussses about cryptographic methods only and virtual cryptopgraphy has been implemented successfuly with considerable improvement in signal quality.The importance of the virtual cryptography is empahsized that can be used to protect and secure various types of data invloved in bioinformatics and biomedical applications. The bit-plane segmentation stagenography enhances the security and also helps in better ptrotection of data
2. Sinha, G.R., Thakur, K. and Vyas, P., 2017. Research Impact of Astronomical Image Processing, International Journal of Luminescence and Applications, 7(3-4), pp. 503-506, October-December.
3. Kashyap, N., and Sinha G.R., 2012. Image watermarking using 2-level DWT, Advances in Computational Research, 4(1), pp.-42-45.
4. Joppe W, Bos, K. Lauter, Jake L., and Naehrig, M. 2013. Improved security for a ring-based fully homomorphic encryption scheme. In Cryptography and Coding, pages 45–64, Springer.
5. Joppe W Bos, Kristin Lauter, and Naehrig, M. 2014. Private predictive analysis on encrypted medical data. Journal of biomedical informatics, 50:234–243.
6. Brakerski, Z. 2012. Fully homomorphic encryption without modulus switching from classical GapSVP. In Reihaneh SafaviNaini and Ran Canetti, editors, CRYPTO, volume 7417 of Lecture Notes in Computer Science, pages 868–886. Springer.
7. Brakerski, Z., Gentry, C. and Halevi, S., 2013. Packed ciphertexts in lwe-based homomorphic encryption. In Public Key Cryptography–PKC 2013, pages 1–13. Springer.
8. Sinha, G.R., Thakur, K. and Kowar, M.K. Speckle reduction in Ultrasound Image processing, Journal of Acoustical. Society of India, 35(1), pp. 36-39.
9. Sinha, G.R., Thakur, K. and Kowar, M.K. (2008). Contrast Enhancement of Underwater Images, Journal of Acoustical. Society of India, 35(1), pp. 33-35.
10. Sinha, G.R. 2015. A Chapter on Fuzzy based Medical Image Processing, A volume in the Advances in Medical Technologies and Clinical Practice (AMTCP) Book Series, pp. 45-61, IGI Global Publishers, USA, IGI Global Copyright.
11. Brakerski, Z., Gentry, Craig and Vaikuntanathan, V., 2012. Fully homomorphic encryption without bootstrapping, In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pages 309–325. ACM.
12. Brakerski, Z., 2013. Adeline Langlois, Chris Peikert, Oded Regev, and Damien Stehle, Classical hardness of learning with errors, In Proceedings of the forty-fifth annual ACM symposium on Theory of computing, pages 575–584. ACM.
13. Wang, Z. and Yu, Z., 2011.Index-based symmetric DNA encryption algorithm, Proceedings of the 4th International Congress on Image and Signal Processing, 15-17 October, Shanghai, pp.2290-2294.
14. Zhang, Y., Fu, B. and Zhang, X., 2012. DNA cryptography based on DNA fragment assembly, Proceedings of the IEEE International Conference on Information Science and Digital Content Technology, Vol. 1, 26-28 June, Jeju, pp.179-182.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The Copyright Notice will appear in About the Journal. It should describe for readers and authors whether the copyright holder is the author, journal, or a third party. It should include additional licensing agreements (e.g. CREATIVE COMMONS licenses) that grant rights to readers (see EXAMPLES), and it should provide the means for securing permissions, if necessary, for the use of the journal's content