Secure Medical Image Steganography with RSA Cryptography using Decision Tree

被引:0
作者
Jain, Mamta [1 ]
Choudhary, Rishabh Charan [2 ]
Kumar, Anil [1 ]
机构
[1] MUST, Dept CSE, Coll Engn & Technol, Lakshmangarh, Rajasthan, India
[2] Univ Maryland, Sch Med, Dept Neuro Surg, Baltimore, MD 21201 USA
来源
PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I) | 2016年
关键词
decision tree; steganography; cryptography; encryption; decryption; embedding;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, a novel technique about secure medical information transmission of patient inside medical cover image is presented by concealing data using decision tree concept. Decision tree shows a robust mechanism by providing decisions for secret information concealing location in medical carrier image using secret information mapping concept. RSA encryption algorithm is being used for patient's unique information enciphering. The outcome of the RSA is structured into various equally distributed blocks. In steganography, secret cipher blocks are assigned to carrier image for data inserting by mapping mechanism using breadth first search. Receiver gets hidden secret medical information of patient using RSA decryption, so only authorized recipient can recognize the plain text. Performance is analyzed and measured using numerous parameters between medical stego and carrier images. Results are analyzed and compared with many of existing algorithms.
引用
收藏
页码:291 / 295
页数:5
相关论文
共 13 条
[1]  
Gandharba S., 2012, P 4 INT C OB 2011 CC, V2, P479
[2]  
Jain M., 2016, INT J MACHINE LEARNI, DOI [10.1007/s13042-016-0542-y, DOI 10.1007/S13042-016-0542-Y,2016]
[3]   Diagonal queue medical image steganography with Rabin cryptosystem [J].
Jain M. ;
Lenka S.K. .
Brain Informatics, 2016, 3 (1) :39-51
[4]   Overview of Information Security Using Genetic Algorithm and Chaos [J].
Kumar, Anil ;
Ghose, M. K. .
INFORMATION SECURITY JOURNAL, 2009, 18 (06) :306-315
[5]   Extended substitution-diffusion based image cipher using chaotic standard map [J].
Kumar, Anil ;
Ghose, M. K. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (01) :372-382
[6]  
Kumar P. Mohan, 2007, ASIAN J INFORM TECHN, V6, P1023
[7]  
Nag A, 2011, COMM COM INF SC, V191, P620
[8]  
Rajpal N., 2004, STEGNAOGRAPHY USING, P117
[9]  
S United, 2000, SUMM HIPAA PRIV RUL, P1
[10]   Reversible dynamic secure steganography for medical image using graph coloring [J].
Thiyagarajan, P. ;
Aghila, G. .
HEALTH POLICY AND TECHNOLOGY, 2013, 2 (03) :151-161