scispace - formally typeset
Proceedings ArticleDOI

A cost effective approach for securing medical X-ray images using Chebyshev map

Reads0
Chats0
TLDR
An approach for embedding the patient's information in the medical X-ray image utilizing the chaotic maps is done, which shields the patient confidentiality, and increase the protection in medical images.
Abstract
Recent times, several deceitful attacks towards life/health insurances by providing faux health data measure is in increase. Transmission and storage of patient's medical records require high degree of confidentiality concerning the privacy of the beholder for medical insurance claim. Therefore there's a necessity for security of the medical images sent by the health professional caregiver to the insurance provider. One of the approaches for protection is to make use of steganography to include the patient's details and encryption of the image to secure the transmission. In existing approaches, steganography or water marking strengthen the medical images security; however these techniques can't assure sturdy security on transmission. In this paper, an approach for embedding the patient's information in the medical X-ray image utilizing the chaotic maps is done. This shields the patient confidentiality, and increase the protection in medical images. The chaotic maps generate discrete and random numbers that are used to assign the location of the embedded information in the medical image. This approach gives the smaller key size and as the amount of information to be inserted is less, the information loss is at minimum. Chaotic maps namely, Henon and Chebyshev maps are adopted for stego-image. In this work, database of ten X-ray images are used for performance analysis using the metrics PSNR, MSE and coefficient of correlation.

read more

Citations
More filters
Journal ArticleDOI

2D Logistic-Adjusted-Chebyshev map for visual color image encryption

TL;DR: Wang et al. as discussed by the authors proposed Logistic-Adjusted-Chebyshev map (2D-LACM), which enlarges the range of chaotic control parameter, and expands the ranges of surjection to the entire control parameter interval to make the distribution of the sequence more uniform.
Journal ArticleDOI

A novel priority based document image encryption with mixed chaotic systems using machine learning approach

TL;DR: The K-Nearest Neighbor (K-NN) method of image classification technique is used for classifying the query Document with trained set of features obtained from the Document database, based on the feature extraction, for color images.
References
More filters
Journal ArticleDOI

Review: Digital image steganography: Survey and analysis of current methods

TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Journal ArticleDOI

Hide and seek: an introduction to steganography

TL;DR: This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis and discusses the practical application of detection algorithms and the mechanisms for getting around them.
Proceedings Article

An overview of image steganography.

TL;DR: This paper intends to give an overview of image steganography, its uses and techniques, and attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which Steganographic techniques are more suitable for which applications.
Proceedings ArticleDOI

Image encryption based on chaotic maps

TL;DR: It is shown how to adapt certain invertible chaotic 2D maps on a torus or on a square to create new symmetric block encryption schemes, especially useful for encryption of large amounts of data, such as digital images or electronic databases.
Journal ArticleDOI

Hiding data in images by optimal moderately-significant-bit replacement

TL;DR: A data hiding technique for the storage and transmission of important data is proposed, which embeds the important data in the moderately-significant-bit of an image, and applies a global substitution step and a local pixel adjustment process to reduce any image degradation.
Related Papers (5)