Skip to main content

Energy Efficient Secured Sharing of Intraoral Gingival Information in Digital Way (EESS-IGI)

  • Conference paper
  • First Online:
Social Transformation – Digital Way (CSI 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 836))

Included in the following conference series:

Abstract

This paper presents a novel cryptographic scheme for sharing intraoral information secretly where key is used to encrypt the secret Gingivitis image and then the secret is shared among ‘\( n \)’ number of experts. Periodontal diseases are almost a frequent disease in human body. The early stage of gingival inflammations with gum bleeding is called Gingivitis. If this disease is not diagnosed properly then it spreads to advanced Periodontotitis. Secured online transmission for such intraoral images is more significant factor in the advanced medicinal domain. An intraoral image is partially shared with ‘\( n \)’ number of recipients including patient for better expert opinions by applying encryption algorithm. While transmitting such vital images, the patients’ confidential secrets are preserved in such a way that minimum ‘k’ number of recipients can only reconstruct without change of visual appearance. This scheme is valid for various types of Gingivitis with independent number of shares and threshold value. Different parametric tests have been done and results are compared with some existing classical techniques, which show comparable results for the proposed technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cryptography key (cryptography). http://en.wikipedia.org/wiki/Key_. Accessed 06 Aug 2017

  2. Diffie, W., Hellman, M.: Multi-user cryptographic techniques. In: Proceedings of the AFIPS, vol. 45, pp. 109–112, 8 June 1976

    Google Scholar 

  3. Kahn, D.: Cryptology goes public. Foreign Aff. 58(1(Fall, 1979)), 141–159 (1979)

    Article  Google Scholar 

  4. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inform. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  5. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978). Previously released as an MIT Technical Memo in April 1977, and published in Martin Gardner’s Scientific American Mathematical recreations column

    Article  MathSciNet  Google Scholar 

  6. Sfyroeras, G.S., Roussas, N., Saleptsis, V.G., Argyriou, C., Giannoukas, A.D.: Association between periodontal disease and stroke. J. Vasc. Surg. 55(4), 1178–1184 (2012)

    Article  Google Scholar 

  7. Shamir, A.: How to share a secret? Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  8. G.R. Blakley: Safeguarding cryptographic keys. In: Proceedings of AFIPS International Workshop on Managing Requirements Knowledge, p. 313 (1979)

    Google Scholar 

  9. Praveenkumar, P., Catherine Priya, P., Avila, J., et al.: Wirel. Pers. Commun. 97, 5573–5595 (2017). https://doi.org/10.1007/s11277-017-4795-x. Springer, US. Print ISSN 0929-6212, Online ISSN 1572-834X

    Article  Google Scholar 

  10. Anusudha, K., Venkateswaran, N., Valarmathi, J.: Multimed Tools Appl. 76(2), 2911–2932 (2017). https://doi.org/10.1007/s11042-015-3213-1. Springer, US. Print ISSN 1380-7501, Online ISSN 1573-7721

    Article  Google Scholar 

  11. Al-Haj, A., Mohammad, A., Amer, A.: J. Digit. Imaging 30(1), 26–38 (2017). https://doi.org/10.1007/s10278-016-9901-1

    Article  Google Scholar 

  12. Sarkar, A., Mandal, J.K.: Computational science guided soft computing based cryptographic technique using ant colony intelligence for wireless communication (ACICT). Int. J. Comput. Sci. Appl. (IJCSA) 4(5), 61–73 (2014). https://doi.org/10.5121/ijcsa.2014.4505. ISSN 2200 - 0011

    Article  Google Scholar 

  13. Sarkar, A., Mandal, J.K.: Intelligent soft computing based cryptographic technique using chaos synchronization for wireless communication (CSCT). Int. J. Ambient Syst. Appl. (IJASA) 2(3), 11–20 (2014). https://doi.org/10.5121/ijasa.2014.2302. ISSN 2321 - 6344

    Article  Google Scholar 

  14. Sarkar, A., Mandal, J.K.: Secured transmission through multi layer perceptron in wireless communication (STMLP). International Journal of Mobile Network Communications & Telematics (IJMNCT) 4(4), 1–16 (2014). ISSN 1839 – 5678

    Article  Google Scholar 

  15. Sarkar, A., Mandal, J.K.: Cryptanalysis of key exchange method using computational intelligence guided multilayer perceptron in wireless communication (CKEMLP). Adv. Comput. Intell. Int. J. (ACII) 1(1), 1–9 (2014). ISSN 2317 – 4113

    Google Scholar 

  16. Sarkar, A., Mandal, J.K.: Neuro Genetic Key Based Recursive Modulo-2 Substitution Using Mutated Character for Online Wireless Communication (NGKRMSMC). Int. J. Comput. Sci. Inf. Technol. (IJCSITY) 1(4), 49–59 (2014). ISSN 2320 - 8457

    Google Scholar 

  17. Sarkar, A., Chongder, J.: Cycle formation and hopfield network based key tuning and enciphering. In: Proceedings of the Third International Conference on Computing and Systems (ICCS-2016), 21–22 January 2016, Department of Computer Science, The University of Burdwan, WB, India, pp. 114–119 (2016). ISBN 978-93-85777-13-4

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arindam Sarkar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sarkar, A., Dey, J., Bhowmik, A., Mandal, J.K., Karforma, S. (2018). Energy Efficient Secured Sharing of Intraoral Gingival Information in Digital Way (EESS-IGI). In: Mandal, J., Sinha, D. (eds) Social Transformation – Digital Way. CSI 2018. Communications in Computer and Information Science, vol 836. Springer, Singapore. https://doi.org/10.1007/978-981-13-1343-1_49

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1343-1_49

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1342-4

  • Online ISBN: 978-981-13-1343-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics