Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4878
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSengupta, Anirbanen_US
dc.contributor.authorRathor, Mahendraen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:51Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:51Z-
dc.date.issued2020-
dc.identifier.citationSengupta, A., & Rathor, M. (2020). Structural obfuscation and crypto-steganography-based secured JPEG compression hardware for medical imaging systems. IEEE Access, 8, 6543-6565. doi:10.1109/ACCESS.2019.2963711en_US
dc.identifier.issn2169-3536-
dc.identifier.otherEID(2-s2.0-85078329351)-
dc.identifier.urihttps://doi.org/10.1109/ACCESS.2019.2963711-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4878-
dc.description.abstractIn modern healthcare technology involving diagnosis through medical imaging systems, compression and data transmission play a pivotal role. Medical imaging systems play an indispensable role in several medical applications where camera/scanners generate compressed images about a patient's internal organ and may further transmit it over the internet for remote diagnosis. However, tampered or corrupted compressed medical images may result in wrong diagnosis of diseases leading to fatal consequences. This paper aims to secure the underlying JPEG compression processor used in medical imaging systems that generates the compressed medical images for diagnosis. The proposed work targets to secure the JPEG compression processor against well-acknowledged threats such as counterfeiting/cloning and Trojan insertion using double line of defense through integration of robust structural obfuscation and hardware steganography. The second line of defense incorporates stego-key based hardware steganography that augments the following: non-linear bit manipulation using S-box (confusion property), diffusion property, alphabetic encryption, alphabet substitution, byte concatenation mode, bit-encoding (converting into stego-constraints) and embedding constraints. The results of the proposed approach achieve robust security in terms of significant strength of obfuscation, strong stego-key size (775 bits for JPEG compression processor and 610 bits for JPEG DCT core) and probability of coincidence of 9.89e-8, at nominal design cost. © 2013 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceIEEE Accessen_US
dc.subjectCryptographyen_US
dc.subjectDiagnosisen_US
dc.subjectHardware securityen_US
dc.subjectImaging systemsen_US
dc.subjectMalwareen_US
dc.subjectMedical applicationsen_US
dc.subjectMedical imagingen_US
dc.subjectNetwork securityen_US
dc.subjectSteganographyen_US
dc.subjectBit manipulationen_US
dc.subjectCompressed imagesen_US
dc.subjectDiffusion propertiesen_US
dc.subjectDouble lineen_US
dc.subjectHealthcare technologyen_US
dc.subjectJPEG compressionen_US
dc.subjectobfuscationen_US
dc.subjectthreatsen_US
dc.subjectImage compressionen_US
dc.titleStructural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging Systemsen_US
dc.typeJournal Articleen_US
dc.rights.licenseAll Open Access, Gold-
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: