Multi Secure and Robustness for Medical Image Based Steganography Scheme

被引:0
作者
Prabakaran, G. [1 ]
Bhavani, R. [1 ]
Rajeswari, P. S. [1 ]
机构
[1] Annamalai Univ, Dept Comp Sci & Engn, Annamalainagar, Tamil Nadu, India
来源
PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013) | 2013年
关键词
Medical Image System (MIS); steganography; Arnold transform; Integer Wavelet Transform (IWT); Magnetic Resonance Imaging(MRI); PSNR;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Medical records are extremely sensitive patient information and require uncompromising security during both storage and transmission. In this paper a multi secure and robustness of medical image based steganography scheme is proposed. The proposed technique provides an efficient and storage security mechanism for the protection of digital medical images. We proposed a viable steganography technique using Integer Wavelet Transform (IWT) to protect the MRI medical image into a single container image. The container image was taken and flip left was applied and the dummy container image was obtained. Then the patient's medical diagnosis image was taken as secret image and Arnold transform was applied and scrambled secret image was obtained. In the first case, the scrambled secret image was embedded into the dummy container image and Inverse IWT was taken to get a dummy secret image. In the second case, the container image was taken and fused with the dummy secret image and stego image was obtained. The quality of the recovered medical image showed acceptable visual quality. lt is observed that the quality parameters are improved with acceptable PSNR compared to the existing algorithms.
引用
收藏
页码:1188 / 1193
页数:6
相关论文
共 10 条
[1]  
Bhattacharyya Souvik, 2010, Proceedings of the 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC 2010), P173, DOI 10.1109/ITC.2010.68
[2]   Adaptive digital audio steganography based on integer wavelet transform [J].
Delforouzi, Ahmad ;
Pooyan, Mohammad .
CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2008, 27 (02) :247-259
[3]  
Khare Ahkil, 2010, J INFORM KNOWLEDGE R, V10
[4]  
Luo Z., 2010, IEEE T INF FOREN SEC, V5, P187, DOI DOI 10.1109/TIFS.2009.2035975
[5]  
Manjunatha Reddy H. S., 2011, P INT C COMP EL EL M, P042
[6]  
Sakkara Sumanth, 2012, INT J COMPUTER APPL, V48
[7]  
Suneja Mamta, 2009, IEEE INT C ADV REC T, P302
[8]  
Thanikaiselvan V, INT C COMP COMM EL T
[9]  
Tolbal M. F., 2004, IJICIS, V4
[10]  
Younes MAB, 2008, INT J COMPUT SCI NET, V8, P247