Devisha Tiwari

Work place: Department of Computer Science and Engineering, National Institute of Technology, Ashok Rajpath, Patna, 800005, Bihar, India

E-mail: devishaarunadevitiwari@gmail.com

Website:

Research Interests: Information Security, Cryptography

Biography

Devisha Tiwari has received M. Tech in CSE and B.E in Computer Technology from Rashtrasant Tukodoji Maharaj Nagpur University. She is an Axelos Certified Project Manager and has a qualified master’s in data Scientist from Purdue University. Her research interest includes cryptography and information security for secure transmission of images. She has been serving as an Assistant Professor in Computer Science and Engineering, Master in Computer Application, faculty in Master of Business Analytics and faculty in Master of Data Science Program from more than 10 years.

Author Articles
Fast Encryption Scheme for Secure Transmission of e-Healthcare Images

By Devisha Tiwari Bhaskar Mondal Anil Singh

DOI: https://doi.org/10.5815/ijigsp.2023.05.07, Pub. Date: 8 Oct. 2023

E-healthcare systems (EHSD), medical communications, digital imaging (DICOM) things have gained popularity over the past decade as they have become the top contenders for interoperability and adoption as a global standard for transmitting and communicating medical data. Security is a growing issue as EHSD and DICOM have grown more usable on any-to-any devices. The goal of this research is to create a privacy-preserving encryption technique for EHSD rapid communication with minimal storage. A new 2D logistic-sine chaotic map (2DLSCM) is used to design the proposed encryption method, which has been developed specifically for peer-to-peer communications via unique keys. Through the 3D Lorenz map which feeds the initial values to it, the 2DLSCM is able to provide a unique keyspace of 2544 bits (2^544bits) in each go of peer-to-peer paired transmission. Permutation-diffusion design is used in the encryption process, and 2DLSCM with 3DLorenz system are used to generate unique initial values for the keys. Without interfering with real-time medical transmission, the approach can quickly encrypt any EHSD image and DICOM objects. To assess the method, five distinct EHSD images of different kinds, sizes, and quality are selected. The findings indicate strong protection, speed, and scalability when compared to existing similar methods in literature.

[...] Read more.
Other Articles