IJTEEE
International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
PREVIOUS PUBLICATIONS



IJTEEE >> Volume 3 - Issue 9, September 2015 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



Application Of Steganography In Medical Images

[Full Text]

 

AUTHOR(S)

Archana Gupta

 

KEYWORDS

Keywords: Data Hiding, Data Embedding,Steganography,Cryptography.

 

ABSTRACT

ABSTRACT: Medical records of patients are extremely sensitive information ,needing uncompromising security during both storage and transmission.In addition , these records often have to be traceable to patient medical data such as X-ray or Scan (CAT,MRI etc.) images.While numerous security tools that hide the information and prevent unauthorized access to the data exits,the possibility of hiding the very existence of these records,using image steanography , in discussed in this paper.An improved version of a high capacity data hiding scheme, called least significant bits(LSB).This paper present securing the transmission of medical images.The presented algorithm will be applied to images. Confidential information are commonly stored in digital media and transmitted via internet due to the rapid growth of internet.If the information in images is altered then this may lead to wrong assumptions.Certain medical applications require information exchange over an insecure network where a small piece of medical information is modified intentionally for certain illegal purpose which may lead to wrong diagnosis.Therefore protection of integrity ,reliability and confidentiality of the secret medical data in images are the important issues.To protect the secret medical information steganography techniques can be used where the secret medical data is altered,even if the attackers get to know the data it was not be of any use without knowing algorithm.

 

REFERENCES

[1] F.I.Alam and M.M.Islam,”An investigation into image hiding steganography with digital signature frame-work,”Informatics, Electronics and Vision (ICIEV), 2013 international conference on 17-1 May 2013, page(s): 1-6.

[2] C.R. Geeth, S.Basavaraju and Dr. C.Puttamadappa,”Variable load image steganography using multiple edge dectection and minimum error replacement method,”Information and Communication Technologies (ICT), 2013 IEEE conference on 11-12 April 2013, page(s):53-58.

[3] Data Hiding under Fingerprint image modified fast Haar Wavelet based transformation June 2013.

[4] R.Jose and G. Abraham,”A separable reversible data hiding in encrypted image with improved perfor-mance,Emerging research areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy (AICERA/ICMICR) 2013 Annual In-ternational Conference on 4-6 June 2013,page(s):1-5.

[5] P.Kadam, A. Kandhare , M. Patil,”Separable reversible encrypted data hiding is encrypted image using AES algorithm and lossy technique,”Pattern recognition ,Informatics and medical engineering (PRIME) 2013 International Conference on 21-22 Feb. 2013, page(s): 312-316.

[6] S. Manoharan,”Steganalysis of synthetic low-color images,”Information theory and its applications (ISITA) 2012 International symposium on 28-31 Oct. 2012, page(s): 784-78.

[7] S.F. Mare, M..Vladutiu and L.Prodan,”High capacity steganographic algorithm based on payload adaption and optimization,”Applied computational intelligence and informatics (SACI), 2012 7th International Symposium on 24-26 May 2012, page(s): 87-92.

[8] T.Penvy, J.Fridrich and A.D.Ker,”From blind to quantitative steganalysis,”Information forensics and security, IEEE transcations on (Vol: 7, Issue:2) April 2012,page(s): 445-454.

[9] F.Zhou, R. Yang, Z.Zheng and J.He, “Steganography in multimedia messaging service of mobile intelligent terminal,”Image and Signal processing (CISP), 2012 5TH International Conference on 16-18 Oct. 2012, page(s): 1340-1343.

[10] J.K.Mandal and S. Ghatak,”Secrect Image/Message Transmission through meaningful shares using (2,2) visual cryptography (SITMSVC),”Recent trends in information technology(ICRTIT),2011 International Conference on 3-5 June 2011,page(s): 263-268.