Int. J. Advanced Networking and Applications 841 Volume: 02, Issue: 05, Pages: 841-845 (2011) An Authenticated Transmission of Medical Image with Codebase Cryptosystem over Noisy Channel Deo Brat Ojha Department of Mathematics, Raj Kumar Goel Institute of Technology Ghaziabad, U.P. (India)-201003 Email: ojhdb@yahoo.co.in Ajay Sharma Research Scholar, Singhania University, Jhunjhunu, Rajsthan, India Abhishek Dwivedi Research Scholar, Singhania University,Jhunjhunu,Rajsthan,India Nitin Pandey Research Scholar, Mewar University, Chittorgarh, Rajsthan, India Amit Kumar Research Scholar, Mewar University,Chittorgarh, Rajsthan, India ----------------------------------------------------------------------ABSTRACT-------------------------------------------------------------- In this paper attempt has been made to explain an authentic transmission without digital signature on an algebraic coding theory based public key cryptosystem which relay on the difficulty of decoding and proposed by McEliece, and also provide us an error less integrated secure transmission of medical information like Image, Audio, Video etc. We also use lossless compression technique like Sequitur for efficient utilization of communication channel. Keywords-McEliece Cryptosystem, SEQUITUR Algorithm, Encryption, Decryption, Error Correction Code, Quantization. ---------------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 20 November 2010 Date of Acceptance: 12 January 2011 ---------------------------------------------------------------------------------------------------------------------------------------------------------- 1. INTRODUCTION The necessity of authentic and secure diagnosis is vital in the medical world to save the life of world creature. Nowadays, the transmission of images is a daily routine and it is necessary to find an efficient way to transmit them over the net [3,4,5]. For image transmission, two different approaches of technologies have been developed. The first approach is based on content protection through encryption [1], [2]. In this approach, proper decryption of data requires a key. The second approach bases the protection on digital watermarking or data hiding, aimed at secretly embedding a message into the data. In the current era, the transmission of Image over internet is so much challenging over the internet. In this manner, the better way to transmit the image over internet is encryption. Using the cryptography we secure the image as well as also better utilization of the communication channel with compression technique. Cryptography is a tool of security that aims to provide security in the ciphers of any kind of messages. Cryptographic algorithms use encryption keys, which are the elements that turn a general encryption algorithm into a specific method of encryption. The data integrity aims to verify the validity of data contained in a given document. [2] McEliece proposed the first public-key cryptosystem (the McEliece Scheme) based on algebraic coding theory in 1978[1]. The idea behind McEliece public-key cryptosystem is based on the fact that the decoding problem of an arbitrary linear code is an NP-hard problem [2].The McEliece scheme has the advantage of high speed encryption and decryption and this system employs probabilistic encryption [1,2], which is better than other type of deterministic encryption[9] in preventing the elimination of any information leaked through public-key cryptography. It is point of remark [9] that the security comparison is made here for classical attackers. The picture changes drastically to the advantage of the McEliece system if we consider two systems to offer the same level of security if breaking them requires quantum computers with the same number of qubits. This cryptosystem cannot be used for authentication because the encryption is not one to one and total algorithm is truly asymmetric. In this current article, we describe SEQUITUR, an algorithm that infers a hierarchical structure from a sequence of discrete symbols. The ability to deal easily with long sequences has greatly extended the range of SEQUITUR’s application. By introducing McEliece cryptosystem and SEQUITUR algorithm, an errorless image transmission with compression and encryption can be achieved. We estimate the errors which are generated during transmission and correct these errors through fuzzy error correcting code. This arrangement distributes in different phases and each phase plays an important role in manner.