scholarly journals Medical Image Security Using Quantum Cryptography

10.28945/3968 ◽  
2018 ◽  

[This Proceedings paper was revised and published in the 2018 issue of the journal Issues in Informing Science and Information Technology, Volume 15] Medical images are very sensitive data that are being transferred here and there either for referral cases or consultation. Since these images are very sensitive, they have to be kept securely. Since the advent of the internet, transferring of these images is being done on the network in the form of data. Data security applications have drawn lots of interest over time. Unauthorized users daily derive ways to gain access to sensitive information while application programmers continue to devise new methods of keeping information safe. One of the best ways to which data could be kept secured is through the use of cryptography. Not just Cryptography, there are new applications of the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secured communication. As a result of these new developments, it is now possible to construct cryptographic communication systems which keep transferred data safe and secure. Therefore, in this paper, a reliable and dependable way of securing medical image using Darpa Quantum Network that delivers end to end network security via high-speed Quantum Key Distribution, and testing the Network against sophisticated eavesdropping attacks is being proposed.

2019 ◽  
Vol 11 (4) ◽  
pp. 89 ◽  
Author(s):  
Fatima Salahdine ◽  
Naima Kaabouch

The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Communication systems are vulnerable and can easily be penetrated by malicious users through social engineering attacks. These attacks aim at tricking individuals or enterprises into accomplishing actions that benefit attackers or providing them with sensitive data such as social security number, health records, and passwords. Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust. This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures.


2009 ◽  
Vol E92-C (7) ◽  
pp. 922-928 ◽  
Author(s):  
Kikuo MAKITA ◽  
Kazuhiro SHIBA ◽  
Takeshi NAKATA ◽  
Emiko MIZUKI ◽  
Sawaki WATANABE

Author(s):  
Teodor Narytnik ◽  
Vladimir Saiko

The technical aspects of the main promising projects in the segments of medium and low-orbit satellite communication systems are considered, as well as the project of the domestic low-orbit information and telecommunications system using the terahertz range, which is based on the use of satellite platforms of the micro- and nanosatellite class and the distribution of functional blocks of complex satellite payloads more high-end on multiple functionally related satellites. The proposed system of low-orbit satellite communications represents the groupings of low-orbit spacecraft (LEO-system) with the architecture of a "distributed satellite", which include the groupings of the root (leading) satellites and satellite repeaters (slaves). Root satellites are interconnected in a ring network by high-speed links between the satellites. The geometric size of the “distributed satellite” is the area around the root satellite with a radius of about 1 km. The combination of beams, which are formed by the repeater satellites, make up the service area of the LEO system. The requirements for the integrated service area of the LEO system (geographical service area) determine the requirements for the number of distributed satellites in the system as a whole. In the proposed system to reduce mutual interference between the grouping of the root (leading) satellites and repeater satellites (slaves) and, accordingly, minimizing distortions of the information signal when implementing inter-satellite communication, this line (radio channel) was created in an unlicensed frequency (e.g., in the terahertz 140 GHz) range. In addition, it additionally allows you to minimize the size of the antennas of such a broadband channel and simplify the operation of these satellite systems.


Author(s):  
A. Suresh Babu ◽  
B. Anand

: A Linear Feedback Shift Register (LFSR) considers a linear function typically an XOR operation of the previous state as an input to the current state. This paper describes in detail the recent Wireless Communication Systems (WCS) and techniques related to LFSR. Cryptographic methods and reconfigurable computing are two different applications used in the proposed shift register with improved speed and decreased power consumption. Comparing with the existing individual applications, the proposed shift register obtained >15 to <=45% of decreased power consumption with 30% of reduced coverage area. Hence this proposed low power high speed LFSR design suits for various low power high speed applications, for example wireless communication. The entire design architecture is simulated and verified in VHDL language. To synthesis a standard cell library of 0.7um CMOS is used. A custom design tool has been developed for measuring the power. From the results, it is obtained that the cryptographic efficiency is improved regarding time and complexity comparing with the existing algorithms. Hence, the proposed LFSR architecture can be used for any wireless applications due to parallel processing, multiple access and cryptographic methods.


2019 ◽  
Vol 0 (0) ◽  
Author(s):  
I. S. Amiri ◽  
P. G. Kuppusamy ◽  
Ahmed Nabih Zaki Rashed ◽  
P. Jayarajan ◽  
M. R. Thiyagupriyadharsan ◽  
...  

AbstractHigh-speed single-mode fiber-optic communication systems have been presented based on various hybrid multiplexing schemes. Refractive index step and silica-doped germanium percentage parameters are also preserved during their technological boundaries of attention. It is noticed that the connect design parameters suffer more nonlinearity with the number of connects. Two different propagation techniques have been used to investigate the transmitted data rates as a criterion to enhance system performance. The first technique is soliton propagation, where the control parameters lead to equilibrium between the pulse spreading due to dispersion and the pulse shrinking because of nonlinearity. The second technique is the MTDM technique where the parameters are adjusted to lead to minimum dispersion. Two cases are investigated: no dispersion cancellation and dispersion cancellation. The investigations are conducted over an enormous range of the set of control parameters. Thermal effects are considered through three basic quantities, namely the transmission data rates, the dispersion characteristics, and the spectral losses.


2019 ◽  
Vol 0 (0) ◽  
Author(s):  
Festus Idowu Oluwajobi ◽  
Nguyen Dong-Nhat ◽  
Amin Malekmohammadi

AbstractIn this paper, the performance of a novel multilevel signaling based on Manchester code namely four-level Manchester Coding (4-MC) technique is investigated for next generation high-speed optical fiber communication links. The performance of 4-MC is studied and compared with conventional Manchester modulation and four-level pulse amplitude modulation (4-PAM) formats in terms of receiver sensitivity, spectral efficiency and dispersion tolerance at the bit rate of 40 Gb/s. The bit error rate (BER) calculation model for the proposed multilevel scheme has also been developed. The calculated receiver sensitivity and the chromatic dispersion tolerance at the BER of 10–9 of the proposed scheme are −22 dBm and 67.5 ps/nm, respectively. It is observed that, 4-MC scheme is superior in comparison to 4-PAM by 3.5 dB in terms of receiver sensitivity in back-to-back scenario. Therefore, the proposed scheme can be considered as an alternative to current 4-PAM system.


Sign in / Sign up

Export Citation Format

Share Document