Real-Time Implementation of Steganography in Medical Images using Integer Wavelet Transform

被引:0
作者
Lavania, Shubham [1 ]
Matey, Palash Sushil [1 ]
Thanikaiselvan, V [1 ]
机构
[1] VIT Univ, Sch Elect Engn, Vellore 632014, Tamil Nadu, India
来源
2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC) | 2014年
关键词
Steganography; IWT (Integer Wavelet Transform); Real time application; LSB(Least Significant Bit) substitution;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A method is presented to hide data within an medical image for the real time application using the Integer Wavelength Transform (IWT) technique in the transform domain with the help of steganography. IWT is an image compression technique wherein the output is in the form of integers thus consuming less memory space. Steganography is done intelligently such that it is difficult for an adversary to detect the existence of a hidden message in the otherwise innocuous data. This united with integer wavelet transform allows high quality data hiding and image compression. To transmit many such images over a network, sometimes over low-capacity phone lines to remote sites, or to store large numbers of images over a long period of time as part of the medical records for patients, the need for image compression arises to alleviate these large demands for image data storage and transmission capacity. The secret information is hidden in cover image using IWT implementation which has been coded in C language to ensure easy realization in real-time applications. The PSNR and execution time for the different images using IWT technique have been computed.
引用
收藏
页码:270 / 274
页数:5
相关论文
共 19 条
  • [1] Amirtharajan Rengarajan, IEEEXPLORE, DOI [10.1109/IMSAA.2009.5439438, DOI 10.1109/IMSAA.2009.5439438]
  • [2] [Anonymous], INT C CONTR AUT COMM
  • [3] [Anonymous], 2010, INT J COMPUTER APPL, DOI DOI 10.5120/644-900
  • [4] [Anonymous], 2013, INT J ENG SCI, V2, P31
  • [5] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [6] Wavelet transforms that map integers to integers
    Calderbank, AR
    Daubechies, I
    Sweldens, W
    Yeo, BL
    [J]. APPLIED AND COMPUTATIONAL HARMONIC ANALYSIS, 1998, 5 (03) : 332 - 369
  • [7] Chen P.Y., 2006, INT J APPL SCI ENG, V4, P275, DOI DOI 10.6703/IJASE/2006.4(3).275
  • [8] Fazli S., 2010, 2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2010), P377, DOI 10.1109/ICUMT.2010.5676610
  • [9] Katzenbeisser S, 2000, DIGITAL WATERMARKING, P2
  • [10] Reversible image watermarking based on integer-to-integer wavelet transform
    Lee, Sunil
    Yoo, Chang D.
    Kalker, Ton
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (03) : 321 - 330