Practical Approaches:
The Practical Approaches main core are summarized as below:
In-patient /Out-Patient (Including patients from different countries who are coming for treatment must be registered their profile in the gateway of staging server (SS).
Then based on this disease reported the records of primary reports if any are considered for further examination of the patient and the flow of records pass from Hospital SS to Hospital Main server, then data’s gets permanently stored in database server. Now a backup server in the hospital which runs round the clock to support the main server lagging activities if occurs any. The Hospital also facilitated with the Hospital Record Service there by Doctors can get the details of the patients for treatment and if any update in the records are to be done it is must again thro’ SS and not directly to Hospital main server. Only upon authentication only all the records are stored in the Hospital main servers. Both side from public accessing to hospital, the data flow path is empowered with key agreement scenario of encryption and decryption with a combination of powerful tromino tiling algorithm that mapped with each image and data that are exchanged with several hot spots. On the other side if the patient comes from other country all the records must be centralized with Medical Council Association of both countries where cloud architecture supports the data transmission as illustrated in the diagram. Both ended are completely engulfed with firewall for perfect security implementation strongly supported with IDS and IPS scenario. Also, a venerability scanner acts as a watchdog that monitors round the clock to support the perfect system action to Data Transmission Layer and Network Packet Layer.
Theoretical Aspect
Hospital servers acts as an isolation mode for the security concerns and from the left side of architecture patients enter for the treatment where they are channelized for the treatment centre. The treatment centre commonly known as doctors bay treat the patient update the records and the record gets stored in the main server. Several intermediatory process flow are occurring where it is completely explained in the practical approach.
Case Study (Business Model) – MVC Layout
Tier 1: Gateway of Staging Server (SS) – Controller (for Processing data)
Tier 2: Hospital Record Service/Server – View (Presentation Side)
Tier 3: Hospital Main database, Hospital Backup Servers, Database Servers, Cloud Services – Model. (Data structure part)
Implementation
Algorithm Implementation
TROMINO TILING ENCRYPTION DECRYPTION ALGORITHM
% Clear space
clc; clear all; close all;
% Get the File image
[filename,pathname,fileindex] = uigetfile('*.jpg','Pls select a jpg file');
% Read in picture
% rgb = imread('*.jpg');
rgb = imread('Chest X-ray.jpg');
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
figure(1);
imshow(rgb);
title('The original image');
sizeM = size(rgb);
nn = sizeM(1);
mm = sizeM(2);
% Transpose the Fractals
rgb0 = reshape(rgb,nn,mm*3,1)';
rgb1 = reshape(rgb0,nn,mm,3);
rgb2 = rgb1;
% Prepare the L shapes
medium = mean(mean(mean(rgb2)));
ceilin = round(sqrt((255-medium)*medium));
% This is the password
key1 = round(rand*25+4);
key2 = 2*key1;
% Process RGB in a loop
for ic = 1:3
for ii = 1:nn
for jj = 1:mm
if mod(ii,key2*ic) < key1*ic
rgb2(ii,jj,ic) = mod(jj,ceilin);
if mod(jj,key2*ic) < key1*ic
rgb2(ii,jj,ic) = mod(ii,ceilin);
else
rgb2(ii,jj,ic) = mod(ceilin-ii,ceilin);
end
else
rgb2(ii,jj,ic) = mod(ceilin-jj,ceilin);
end
end
end
end
% Encrypt the image
figure(2);
imshow(rgb2);
title('The fractal tromino ');
rgb3 = bitxor(rgb1,rgb2);
figure(3);
imshow(rgb3);
title('The encrypted image');
% Decrypt the image
figure(4);
rgb4 = bitxor(rgb3,rgb2);
rgb5 = reshape(rgb4,mm*3,nn,1)';
rgb6 = reshape(rgb5,nn,mm,3);
imshow(rgb6);
title('The decrypted image');
SECURITY IMPLIMENTATION USING MATLAB SOFTWARE
ORIGINAL IMAGE