Virtual Cryptopgraphic Technique and Bit-plane Segmentation Stegnegography for Security in Bioinformatics and Biomedical Applications

Authors

  • Abhishek Misal Chhattisgarh Swami Vivekanand Technical University, Newai
  • Tin Mar Kyi Myanmar Institute of Information Technology, Myanmar

DOI:

https://doi.org/10.30732/IJBBB.20190402005

Keywords:

Security, Cryptography, Data, Bioinformatics, Biomedical application

Abstract

The security techniques are very important in all modern applications since most of the applications of science and engineering are using digital media and processing. There are sevral security techniques for protection of various types of data, such as biometrics, cryptograpy, watermarking etc. This paper discussses about cryptographic methods only and virtual cryptopgraphy has been implemented successfuly with considerable improvement in signal quality.The importance of the virtual cryptography is empahsized that can be used to protect and secure various types of data invloved in bioinformatics and biomedical applications. The bit-plane segmentation stagenography enhances the security and also helps in better ptrotection of data

References

1. Sinha, G. R. 2017. Image Processing Tools for Improved Visualization and Analysis of Remotely Sensed Images for Agriculture and Forest Classifications, Agriculture and Forestry Journal, 1(1), pp. 27-32.
2. Sinha, G.R., Thakur, K. and Vyas, P., 2017. Research Impact of Astronomical Image Processing, International Journal of Luminescence and Applications, 7(3-4), pp. 503-506, October-December.
3. Kashyap, N., and Sinha G.R., 2012. Image watermarking using 2-level DWT, Advances in Computational Research, 4(1), pp.-42-45.
4. Joppe W, Bos, K. Lauter, Jake L., and Naehrig, M. 2013. Improved security for a ring-based fully homomorphic encryption scheme. In Cryptography and Coding, pages 45–64, Springer.
5. Joppe W Bos, Kristin Lauter, and Naehrig, M. 2014. Private predictive analysis on encrypted medical data. Journal of biomedical informatics, 50:234–243.
6. Brakerski, Z. 2012. Fully homomorphic encryption without modulus switching from classical GapSVP. In Reihaneh SafaviNaini and Ran Canetti, editors, CRYPTO, volume 7417 of Lecture Notes in Computer Science, pages 868–886. Springer.
7. Brakerski, Z., Gentry, C. and Halevi, S., 2013. Packed ciphertexts in lwe-based homomorphic encryption. In Public Key Cryptography–PKC 2013, pages 1–13. Springer.
8. Sinha, G.R., Thakur, K. and Kowar, M.K. Speckle reduction in Ultrasound Image processing, Journal of Acoustical. Society of India, 35(1), pp. 36-39.
9. Sinha, G.R., Thakur, K. and Kowar, M.K. (2008). Contrast Enhancement of Underwater Images, Journal of Acoustical. Society of India, 35(1), pp. 33-35.
10. Sinha, G.R. 2015. A Chapter on Fuzzy based Medical Image Processing, A volume in the Advances in Medical Technologies and Clinical Practice (AMTCP) Book Series, pp. 45-61, IGI Global Publishers, USA, IGI Global Copyright.
11. Brakerski, Z., Gentry, Craig and Vaikuntanathan, V., 2012. Fully homomorphic encryption without bootstrapping, In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pages 309–325. ACM.
12. Brakerski, Z., 2013. Adeline Langlois, Chris Peikert, Oded Regev, and Damien Stehle, Classical hardness of learning with errors, In Proceedings of the forty-fifth annual ACM symposium on Theory of computing, pages 575–584. ACM.
13. Wang, Z. and Yu, Z., 2011.Index-based symmetric DNA encryption algorithm, Proceedings of the 4th International Congress on Image and Signal Processing, 15-17 October, Shanghai, pp.2290-2294.
14. Zhang, Y., Fu, B. and Zhang, X., 2012. DNA cryptography based on DNA fragment assembly, Proceedings of the IEEE International Conference on Information Science and Digital Content Technology, Vol. 1, 26-28 June, Jeju, pp.179-182.

Downloads

Published

2019-08-30

How to Cite

Misal, A., & Kyi, T. M. (2019). Virtual Cryptopgraphic Technique and Bit-plane Segmentation Stegnegography for Security in Bioinformatics and Biomedical Applications. CSVTU International Journal of Biotechnology, Bioinformatics and Biomedical, 4(2), 59–66. https://doi.org/10.30732/IJBBB.20190402005

Issue

Section

Articles