CR Assisted IE Guarded Authenticated Biomedical Image Transactions

In this android era, the word spectrum is connected with trillion faces. The underutilization problem of the spectrum in most of the applications results in the paucity of this scarce resource. Cognitive radio (CR) is an astute technology implemented for the opportunistic usage of idle spectrum reso...

Full description

Bibliographic Details
Main Authors: K. Revathy, K. Thenmozhi, Rengarajan Amirtharajan, Padmapriya Praveenkumar
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Photonics Journal
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8488566/
Description
Summary:In this android era, the word spectrum is connected with trillion faces. The underutilization problem of the spectrum in most of the applications results in the paucity of this scarce resource. Cognitive radio (CR) is an astute technology implemented for the opportunistic usage of idle spectrum resource dynamically. This paper focuses on sensing of the vacant channels, and it is pre-owned for the transmission of encrypted DICOM information. The proposed algorithm involves encryption schemes like RC5, latin square image cipher, deoxyribo nucleic acid, and discrete Gould transform (DGT) to render confusion, diffusion, and permutation operations. Further, the uncorrelated cipher image is transmitted via the identified unused licensed spectrum. The proposed scheme guarantees the authorised transactions among the stack holders like patients, doctors, and hospital management systems. It also ascertains and enhances the validation of the cipher biomedical interactions among peers by assuring tamper proofing using DGT. Simulations have been conceded over universal software radio peripheral to validate the biomedical data transactions after sensing the unused spectrum. Metrics like global-local entropies, correlation coefficients, key sensitivity, chi-square tests, cropping attacks and differential attack analysis were estimated to authenticate the robustness of the projected encryption scheme.
ISSN:1943-0655