Abstract
This paper presents a novel cryptographic scheme for sharing intraoral information secretly where key is used to encrypt the secret Gingivitis image and then the secret is shared among ‘\( n \)’ number of experts. Periodontal diseases are almost a frequent disease in human body. The early stage of gingival inflammations with gum bleeding is called Gingivitis. If this disease is not diagnosed properly then it spreads to advanced Periodontotitis. Secured online transmission for such intraoral images is more significant factor in the advanced medicinal domain. An intraoral image is partially shared with ‘\( n \)’ number of recipients including patient for better expert opinions by applying encryption algorithm. While transmitting such vital images, the patients’ confidential secrets are preserved in such a way that minimum ‘k’ number of recipients can only reconstruct without change of visual appearance. This scheme is valid for various types of Gingivitis with independent number of shares and threshold value. Different parametric tests have been done and results are compared with some existing classical techniques, which show comparable results for the proposed technique.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cryptography key (cryptography). http://en.wikipedia.org/wiki/Key_. Accessed 06 Aug 2017
Diffie, W., Hellman, M.: Multi-user cryptographic techniques. In: Proceedings of the AFIPS, vol. 45, pp. 109–112, 8 June 1976
Kahn, D.: Cryptology goes public. Foreign Aff. 58(1(Fall, 1979)), 141–159 (1979)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inform. Theory 22(6), 644–654 (1976)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978). Previously released as an MIT Technical Memo in April 1977, and published in Martin Gardner’s Scientific American Mathematical recreations column
Sfyroeras, G.S., Roussas, N., Saleptsis, V.G., Argyriou, C., Giannoukas, A.D.: Association between periodontal disease and stroke. J. Vasc. Surg. 55(4), 1178–1184 (2012)
Shamir, A.: How to share a secret? Commun. ACM 22(11), 612–613 (1979)
G.R. Blakley: Safeguarding cryptographic keys. In: Proceedings of AFIPS International Workshop on Managing Requirements Knowledge, p. 313 (1979)
Praveenkumar, P., Catherine Priya, P., Avila, J., et al.: Wirel. Pers. Commun. 97, 5573–5595 (2017). https://doi.org/10.1007/s11277-017-4795-x. Springer, US. Print ISSN 0929-6212, Online ISSN 1572-834X
Anusudha, K., Venkateswaran, N., Valarmathi, J.: Multimed Tools Appl. 76(2), 2911–2932 (2017). https://doi.org/10.1007/s11042-015-3213-1. Springer, US. Print ISSN 1380-7501, Online ISSN 1573-7721
Al-Haj, A., Mohammad, A., Amer, A.: J. Digit. Imaging 30(1), 26–38 (2017). https://doi.org/10.1007/s10278-016-9901-1
Sarkar, A., Mandal, J.K.: Computational science guided soft computing based cryptographic technique using ant colony intelligence for wireless communication (ACICT). Int. J. Comput. Sci. Appl. (IJCSA) 4(5), 61–73 (2014). https://doi.org/10.5121/ijcsa.2014.4505. ISSN 2200 - 0011
Sarkar, A., Mandal, J.K.: Intelligent soft computing based cryptographic technique using chaos synchronization for wireless communication (CSCT). Int. J. Ambient Syst. Appl. (IJASA) 2(3), 11–20 (2014). https://doi.org/10.5121/ijasa.2014.2302. ISSN 2321 - 6344
Sarkar, A., Mandal, J.K.: Secured transmission through multi layer perceptron in wireless communication (STMLP). International Journal of Mobile Network Communications & Telematics (IJMNCT) 4(4), 1–16 (2014). ISSN 1839 – 5678
Sarkar, A., Mandal, J.K.: Cryptanalysis of key exchange method using computational intelligence guided multilayer perceptron in wireless communication (CKEMLP). Adv. Comput. Intell. Int. J. (ACII) 1(1), 1–9 (2014). ISSN 2317 – 4113
Sarkar, A., Mandal, J.K.: Neuro Genetic Key Based Recursive Modulo-2 Substitution Using Mutated Character for Online Wireless Communication (NGKRMSMC). Int. J. Comput. Sci. Inf. Technol. (IJCSITY) 1(4), 49–59 (2014). ISSN 2320 - 8457
Sarkar, A., Chongder, J.: Cycle formation and hopfield network based key tuning and enciphering. In: Proceedings of the Third International Conference on Computing and Systems (ICCS-2016), 21–22 January 2016, Department of Computer Science, The University of Burdwan, WB, India, pp. 114–119 (2016). ISBN 978-93-85777-13-4
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sarkar, A., Dey, J., Bhowmik, A., Mandal, J.K., Karforma, S. (2018). Energy Efficient Secured Sharing of Intraoral Gingival Information in Digital Way (EESS-IGI). In: Mandal, J., Sinha, D. (eds) Social Transformation – Digital Way. CSI 2018. Communications in Computer and Information Science, vol 836. Springer, Singapore. https://doi.org/10.1007/978-981-13-1343-1_49
Download citation
DOI: https://doi.org/10.1007/978-981-13-1343-1_49
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1342-4
Online ISBN: 978-981-13-1343-1
eBook Packages: Computer ScienceComputer Science (R0)