| Literature DB >> 33426424 |
Joydeep Dey1, Arindam Sarkar2, Sunil Karforma3.
Abstract
This paper presents an efficient mechanism for secured encryption of intraoral information in the emerging field of Teledental. Due to global rapid surge in the (Coronavirus Disease) COVID patients, the services of Teledental are best suited in the newer post-COVID era. A devised perceptron has been intelligently embedded with de-multiplexing ability to transmit data to the dentists has been proposed. Exact session key has been developed through learning rules applied on the perceptrons by both the patient and dentist. For simplicity, gingivitis data is highly recommended to transmit in a highly secured manner with patients' data integrity. Gingivitis is an important dental disease which is primarily caused by the bacterial colonization. It shows gum bleeding and inflammations in the gingiva. Encrypted transmission is required to the Dentist for early diagnosis and treatment in Teledental system in this pandemic context. Gingivitis data are then broken into parts by the demultiplexer followed by individual proposed header generation. It is predominantly done to confuse the intruders about the originality of the intraoral data. Chi-square, Avalanche, Strict Avalanche, etc. were carried on the proposed partial shares to generate good outcomes when compared to classical algorithms. To confuse the intruders, character frequency, floating frequency, and autocorrelation were tested extensively. It is a newer approach to avail the secured Teledental features in post-COVID time. © Bharati Vidyapeeth's Institute of Computer Applications and Management 2021.Entities:
Keywords: COVID; Demultiplexing; Gingivitis; Perceptron; Teledental
Year: 2021 PMID: 33426424 PMCID: PMC7776307 DOI: 10.1007/s41870-020-00562-1
Source DB: PubMed Journal: Int J Inf Technol ISSN: 2511-2104
Fig. 1Single layer feed forward perceptron
Fig. 2Gingivitis caused due to diabetes
Comparisons of average values on different files
| Encryption method | Avalanche | Strict Avalanche | Bit independence |
|---|---|---|---|
| Proposed technique | 0.9548012 | 0.9230287 | 0.4589960 |
| RSA | 0.9647844 | 0.9889471 | 0.5148289 |
| 3DES | 0.9741924 | 0.9357021 | 0.5897012 |
| AES | 0.9012571 | 0.9597460 | 0.6004871 |
Fig. 3Character frequency of plain intraoral file
Comparisons of Chi-square average values
| Source intraoral file (in bytes) | Proposed technique | 3DES | AES |
|---|---|---|---|
| 4,253,896 | 8,217,448 | 8,610,871 | 9,701,812 |
| 4,305,096 | 8,614,499 | 8,104,951 | 8,780,754 |
| 5,454,656 | 9,112,610 | 9,004,784 | 9,258,012 |
| 5,455,680 | 10,109,597 | 10,188,500 | 11,947,410 |
| 5,457,728 | 10,127,300 | 10,228,374 | 12,579,598 |
Comparative study w.r.t. existing algorithms
| Sl. no. | Attributes | 3DES | AES | Proposed technique |
|---|---|---|---|---|
| 1 | Size of blocks | 64 | 128 | 128 |
| 2 | Size of key | 168 | 128/192/256 | 128 |
| 3 | Key space size | 2168 | 2128/2192/2256 | 2128 |
| 4 | Secret key exchange | Yes | Yes | No |
| 5 | Cipher type | Symmetric block | Symmetric block | Sequential symmetric block |
| 6 | Core algorithm used | Fiestel network | Substitution permutation network | Neural perceptrons |
| 7 | Data vulnerabilities | Brute force attacks | Side channel attacks | Considerably Secured |
| 8 | Processing speed | Very slow | Fast | Considerably fast |
Fig. 4Character frequency of plain intraoral file by proposed encryption
Fig. 5Floating frequency of plain intraoral file
Fig. 6Floating frequency of plain intraoral file by proposed encryption
Fig. 7Autocorrelation of plain intraoral file
Fig. 8Autocorrelation of plain intraoral file by proposed encryption