International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)

IJTEEE >> Volume 3 - Issue 9, September 2015 Edition

International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289

Application Of LSB In Medical Images

[Full Text]



Archana Gupta



Keywords : LSB,Bit,Pixel,Images,String.



ABSTRACT: To easily access of medical information,maintain electronic record and high fidelity and also avoid misinterpreted tele-diagnosis we are adopt a steganographic technique of Least Significant Bit for embed the string in the digital medical image.While uses of medical image offer distinct opportunities of improving healthcare access,delivery and standards,security protection of the imag-es.Experimenal results show that proposed schemes provide us large data hiding capacities along with very high PSNR values as compare to exiting data hiding technique.Critically ill or injured patients can be treated locally by effective and secured communication between remote hospital and distance specialist.



[1] S.Mahato, D.K.Yadav and D. A.Khan,” A modified ap-proach to text steganography using hypertext markup language,” Advanced computing and Communication technologies (ACCT), 2013 3rd International Conference on 6-7 April 2013, page(s): 40-44.

[2] M..K..Ramaiya ,N.Hemrajani,”and A.K. Saxena, ”Improvisation of security aspect in steganography applying DES ,” Communication systems and network technologies (CSNT), 2013 International Conference on 6-8,April 2013,page(s): 431-436.

[3] Dr. D. Samidha and D. Agrawal,”Random image ste-ganography is spatial domain,”Emerging trends in VLSI, embedded system,nano electronics and telecommunication system(ICEVENT), 2013 International Conference on 7-9Jan 2013,page(s): 1-3.

[4] S.F. Mare,M.Vladutiu and L.Prodan ,”High capacity steganographic algorithm based on payload adaptation and optimization,’Applied computational intelligence and informatics (SACI) ,2012 7th International Symposium on 24-26 May 2012,page(s) : 87-92.

[5] T.Pevny,J. Fridrich and A.D. Ker,”From blind to quanti-tative steganalysis,”Information forensics and security,IEEE transcations on (Vol:7,Issues:2) April 2012,page(s):445-454.

[6] A.Sanchez , A.conci,E.Zeljkovic,N.Behlilovic and V.Karahodzic ,’A new approach to relatively short mes-sage steganogra-phy,”Telecommunications(BIHTEL),2012, IX International Symposium on 25-27 Oct.2012,page(s):1-4.

[7] G.K.Selvi,L.Mariadhasan and K.L.Shunmuganathan,”Steganography using edge adaptive image ,:Computing , Electronics and Electrical Techonologies (ICCEET), 2012 International Conference on 10-12 Oct. . 2012,page(s): 1023-1027.

[8] Y.Zheng , F.Liu,X.Luo and C.Yang ,”A method based on feature matching to identify steganography soft-ware,”Multimedia information networking and security (MINES) , 2012 4th International Conference on 2-4 Nov. 2012,page(s): 99-994.