Skip to main content

ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 09 Issue: 05 | May 2022

www.irjet.net

e-ISSN: 2395-0056 p-ISSN: 2395-0072

ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE Prof. H. P. Bhabad*1, Kirtan Patel*2, Pranav Mankar*3, Pradhyum Khairnar*4 Department Of Computer Engineering Sandip Institute Of Engineering And Management, Nashik, India. ---------------------------------------------------------------------***--------------------------------------------------------------------*1,2,3,4

Abstract - Digital data, especially when transmitted

journals which discuss some of the most significant applications of visual cryptography, we have gained an understanding of four different application areas of visual cryptography in this article.

through insecure methods/streams, is becoming increasingly vulnerable in the modern world. In order to prevent patients' medical data and information from being manipulated, medical data and information should be kept confidential. Patients are put at risk when they send sensitive data via the internet or other means. Our next thought was to use encryption and decryption techniques to encrypt and decrypt data, which then could be transmitted to the receiver. With images, it can encrypt the data and send it to the receiver. Key Words: Visual Cryptography, Decryption, AES, LSB, Security.

2. Using a novel approach to hide secret data programs in files: A large amount of documentation files is generated as a result of all software development projects and large-size programs, regardless of their application. Documentation is a very important aspect of fall styles for software and programs. It gives other programmers an idea of what the program does, how it works, and what it does for them. Your work is better understood by others and your team members through documentation. Through this work, we will study a system for hiding important and confidential information in software documents and programs with different layers of security. In this way, the stego file is undoubtedly capable of being sent anywhere via any channel. Experimental results indicate that the proposed method is usable and feasible.

Encryption,

1. INTRODUCTION The purpose of steganography is to hide sensitive or secret information from prying eyes within digital media in order to maintain security. The information is converted into an incoherent or scrambled form so that it cannot be understood by anyone but the intended recipient, who holds the key to decipher it. Data is reticulated in a clear media to prevent intruders from seeing it. Steganography and cryptography are combined as part of this paper's dual-layer security mechanisms. A cover image is a picture in which data is hidden, and a Stego image is a picture that contains encrypted secret data. Data is hidden largely so that uninvited individuals cannot discover the existence of the message.

3. Using Random Grids to hide Recursive Data: This article presents the strategy of recursive data hiding of secret images by using random grids, which hides the extra secret data within the shares of the comparatively larger secret in an exceedingly recursive way. Data conveyed per bit as a result of the proposed method is nearly a hundred percent higher and the size of each tiny share is the same as the size of the original secret image without requiring any expansion. Compared to large shares, the shares are much more suitable for further processing, such as storage and distribution. Visual Cryptography Scheme (VCS), which breaks a secret image into shared images after encrypting it using recursive visual cryptography, may be a perfectly secure method that allows authenticating images using recursive visual cryptography. The advantage and uniqueness of VCS is that they can be decoded without complex computational methods and hardware. By applying the recursive image clipping scheme to a recursive VCS (RVCS) Grant decode aguruparan and Kak reinforced the embedding information efficiency of the key near hundred percent by concealing the key images, as explained in the previous article.

2. LITERATURE SURVEY 1. Implementation and usage of visual cryptography: By encrypting visual information in some way, visual cryptography makes it possible to decrypt it without using a computer, thus enabling visual cryptography to be used without a computer. Poorly designed systems and protocols, as well as procedures, do not protect against cryptography's vulnerabilities. Our paper looked at the various applications of Visual Cryptography and how they can be fixed through proper mechanical design and defensive infrastructure settings. Message digests and hashing algorithms are used in visual cryptography to ensure the integrity of data. From research papers and

© 2022, IRJET

|

Impact Factor value: 7.529

|

ISO 9001:2008 Certified Journal

|

Page 3555


Turn static files into dynamic content formats.

Create a flipbook