Enhancing Medical Image Security through Steganography and Ensemble Deep Authentication

被引:1
作者
Judy, S. [1 ]
Khilar, Rashmita [1 ]
机构
[1] Saveetha Sch Engn, Dept Informat Technol, Chennai, Tamil Nadu, India
来源
2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024 | 2024年
关键词
Medical Image Security; Image Pre-processing; Steganography; Authentication; Deep Learning;
D O I
10.1109/ACCAI61061.2024.10601968
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Medical images often contain personally identifiable information (PII) of patients. Safeguarding the privacy and preventing unauthorized access to PII of patients is paramount as it involves sensitive data that demands protection. Steganography can contribute to enhancing the confidentiality and privacy of PII by adding an extra layer of protection. Authentication mechanisms ensures that only authorized individuals have access to view or manipulate these images, authentication mechanisms serve as a safeguard against unauthorized disclosure of sensitive medical information. This proactive approach reduces the potential risks associated with identity theft and other privacy breaches, fostering a secure environment for handling patient data. The proposed model provides an Integrated approach of Steganography and Ensemble Deep Authentication. The cover image is pre-processed for creating a better storage for hiding the secret image. The Ensemble Deep Authentication consists of feature extraction and feature visualization using Deep Learning. According to Ensemble Deep Authentication, the retrieved image at the recipient end is authenticated if the histograms of the original and the retrieved image match. The suggested model exhibits significant achievement, achieving an outstanding maximum PSNR (Peak Signal-to-Noise Ratio) value of 73.84.
引用
收藏
页数:8
相关论文
共 24 条
[1]  
Aliyu A., 2023, Data Security Using Steganography, DOI [10.5281/zenodo.7607083, DOI 10.5281/ZENODO.7607083]
[2]   Blind image-variant based authentication method [J].
Alzahir, Saif ;
Islam, Wahedul .
MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (17) :51899-51923
[3]   Information hiding using steganography [J].
Amin, MM ;
Salleh, M ;
Ibrahim, S ;
Katmin, MR ;
Shamsuddin, MZI .
4TH NATIONAL CONFERENCE ON TELECOMMUNICATION TECHNOLOGY, PROCEEDINGS, 2003, :21-25
[4]   A secure secret image sharing with steganography and authentication by Hamming code (15,11) for compressed images [J].
Charoghchi, Sara ;
Mashhadi, Samaneh .
MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (11) :31933-31955
[5]   A perceptual entanglement-based image authentication with tamper localisation [J].
Dahmane, Mohamed .
MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (13) :38193-38208
[6]   Integrity Verification in Medical Image Retrieval Systems using Spread Spectrum Steganography [J].
Eze, Peter ;
Parampalli, Udaya ;
Evans, Robin ;
Liu, Dongxi .
ICMR'19: PROCEEDINGS OF THE 2019 ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA RETRIEVAL, 2019, :53-57
[7]  
Forgac R., 2021, IEEE Xplore
[8]  
Ghosh Bibek Ranjan, 2023, Lecture notes in networks and systems, P147, DOI [10.1007/978-981-99- 4433-0_13, DOI 10.1007/978-981-99-4433-0_13]
[9]  
Hashim Mohammed Mahdi, 2020, IOP Conference Series: Materials Science and Engineering, V881, DOI [10.1088/1757-899x/881/1/012120, 10.1088/1757-899X/881/1/012120]
[10]  
Jaiswal S, 2023, International Journal for Research in Applied Science and Engineering Technology, V11, P3941, DOI [10.22214/ijraset.2023.52462, 10.22214/ijraset.2023.52462, DOI 10.22214/IJRASET.2023.52462]