scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

A cost effective approach for securing medical X-ray images using Chebyshev map

19 Sep 2016-pp 1-5
TL;DR: An approach for embedding the patient's information in the medical X-ray image utilizing the chaotic maps is done, which shields the patient confidentiality, and increase the protection in medical images.
Abstract: Recent times, several deceitful attacks towards life/health insurances by providing faux health data measure is in increase. Transmission and storage of patient's medical records require high degree of confidentiality concerning the privacy of the beholder for medical insurance claim. Therefore there's a necessity for security of the medical images sent by the health professional caregiver to the insurance provider. One of the approaches for protection is to make use of steganography to include the patient's details and encryption of the image to secure the transmission. In existing approaches, steganography or water marking strengthen the medical images security; however these techniques can't assure sturdy security on transmission. In this paper, an approach for embedding the patient's information in the medical X-ray image utilizing the chaotic maps is done. This shields the patient confidentiality, and increase the protection in medical images. The chaotic maps generate discrete and random numbers that are used to assign the location of the embedded information in the medical image. This approach gives the smaller key size and as the amount of information to be inserted is less, the information loss is at minimum. Chaotic maps namely, Henon and Chebyshev maps are adopted for stego-image. In this work, database of ten X-ray images are used for performance analysis using the metrics PSNR, MSE and coefficient of correlation.
Citations
More filters
Journal ArticleDOI
01 Aug 2021
TL;DR: Wang et al. as discussed by the authors proposed Logistic-Adjusted-Chebyshev map (2D-LACM), which enlarges the range of chaotic control parameter, and expands the ranges of surjection to the entire control parameter interval to make the distribution of the sequence more uniform.
Abstract: With the increasing requirements of the performance in secure communication filed based on chaos, chaotic systems have been gradually developed into higher dimensions. Because the sequence generated by one-dimension chaos, such as Chebyshev map has the problem of weak chaotic properties and uneven distribution, a new two-dimensional chaotic map, called Logistic-Adjusted-Chebyshev map (2D-LACM), is proposed in this paper which enlarges the range of chaotic control parameter, and expands the range of surjection to the entire control parameter interval to make the distribution of the sequence more uniform. Compared with other improved chaotic maps, the proposed 2D-LACM in this paper has more complex chaotic properties and better ergodicity. Next, a visualized image encryption algorithm based on 2D-LACM is proposed (LACM-VIEA), which can encrypt the plain image into a noisy image, and then embed it into a cover image of the same size. In order to demonstrate the security of LACM-VIEA, the algorithm is analyzed in detail from the aspects of key, histogram, visual effect, robustness and anti-plaintext attacks, etc. The final analysis results show that LACM-VIEA has good security performance.

9 citations

Journal ArticleDOI
TL;DR: The K-Nearest Neighbor (K-NN) method of image classification technique is used for classifying the query Document with trained set of features obtained from the Document database, based on the feature extraction, for color images.
Abstract: Document images containing different types of information are required to be encrypted with different levels of security. In this paper, the image classification is carried out based on the feature extraction, for color images. The K-Nearest Neighbor (K-NN) method of image classification technique is used for classifying the query Document with trained set of features obtained from the Document database. Optical Character Recognition (OCR) technique is used to check for the presence as well as location of text/numerals in the Documents and to identify the Document type. Priority level is assigned in accordance with the Document type. Document images with different priorities are encrypted with different multi-dimensional chaotic maps. The Documents with different priority levels are diffused with different techniques. Document with highest priority are encrypted with highest level of security but Documents with lower priority levels are encrypted with lesser security levels. The proposed work was experimented for different document types with more number of image features for a large trained database. The results reveals a high speed of encryption for a set of document pages with priorities is more effective in comparison with a uniform method of encryption for all document types. The National Institute of Standards and Technology (NIST) statistical tests are also conducted to check for the randomness of the sequence and achieved good randomness. The proposed work also ensures security against the various statistical and differential attacks .

3 citations


Cites background from "A cost effective approach for secur..."

  • ...Henon map: In discrete time dynamic systems, Henon map [19] exhibit good...

    [...]

References
More filters
Journal ArticleDOI
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.

1,572 citations

Journal ArticleDOI
01 May 2003
TL;DR: This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis and discusses the practical application of detection algorithms and the mechanisms for getting around them.
Abstract: Although people have hidden secrets in plain sight-now called steganography-throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today's security techniques. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium's redundant bits (those that can be modified without destroying that medium's integrity). The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message. This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis. Here, we present recent research and discuss the practical application of detection algorithms and the mechanisms for getting around them.

1,245 citations


"A cost effective approach for secur..." refers background in this paper

  • ...In medical images, steganography [1, 2] and digital watermarking are primarily used for the safety, which is able to hide the patient details within the medical image....

    [...]

Proceedings Article
01 Jan 2005
TL;DR: This paper intends to give an overview of image steganography, its uses and techniques, and attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which Steganographic techniques are more suitable for which applications.
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.

538 citations

Proceedings ArticleDOI
12 Oct 1997
TL;DR: It is shown how to adapt certain invertible chaotic 2D maps on a torus or on a square to create new symmetric block encryption schemes, especially useful for encryption of large amounts of data, such as digital images or electronic databases.
Abstract: In this paper, it is shown how to adapt certain invertible chaotic 2D maps on a torus or on a square to create new symmetric block encryption schemes. The schemes are especially useful for encryption of large amounts of data, such as digital images or electronic databases. A chaotic map is first generalized by introducing parameters and then discretized to a finite square lattice of points which represent pixels or some other data items. Although the discretized map is a permutation and thus cannot be chaotic, it shares certain sensitivity and mixing properties with its continuous counterpart as long as the number of iterations remains small. It is shown that for the 2D baker map the permutations behave as typical random permutations. The discretized map is further extended to 3D and composed with a simple diffusion mechanism. As a result, a block product encryption scheme is obtained. To encrypt an N/spl times/N image, the ciphering map is iteratively applied to the image. This paper is an extension of the work of Pichler and Scharinger (1994, 1996) who first introduced encryption schemes based on 2D baker map.

269 citations


"A cost effective approach for secur..." refers background in this paper

  • ...Discrete non-linear systems [9, 10] are complicated in structure and dynamic in nature....

    [...]

Journal ArticleDOI
TL;DR: A data hiding technique for the storage and transmission of important data is proposed, which embeds the important data in the moderately-significant-bit of an image, and applies a global substitution step and a local pixel adjustment process to reduce any image degradation.
Abstract: A data hiding technique for the storage and transmission of important data is proposed. It embeds the important data in the moderately-significant-bit of an image, and applies a global substitution step and a local pixel adjustment process to reduce any image degradation. Experimental results show that the visual quality of the resulting image is acceptable.

140 citations


"A cost effective approach for secur..." refers methods in this paper

  • ...In this method, the message is converted to binary bits and later inserted into LSB of the pixel values [6] of the image....

    [...]