scispace - formally typeset
Proceedings ArticleDOI: 10.1109/ICCIC.2014.7238344

Real-time implementation of steganography in medical images using integer wavelet transform

01 Nov 2014-pp 1-5
Abstract: A method is presented to hide data within an medical image for the real time application using the Integer Wavelength Transform (IWT) technique in the transform domain with the help of steganography IWT is an image compression technique wherein the output is in the form of integers thus consuming less memory space Steganography is done intelligently such that it is difficult for an adversary to detect the existence of a hidden message in the otherwise innocuous data This united with integer wavelet transform allows high quality data hiding and image compression To transmit many such images over a network, sometimes over low-capacity phone lines to remote sites, or to store large numbers of images over a long period of time as part of the medical records for patients, the need for image compression arises to alleviate these large demands for image data storage and transmission capacity The secret information is hidden in cover image using IWT implementation which has been coded in C language to ensure easy realization in real-time applications The PSNR and execution time for the different images using IWT technique have been computed

...read more

Topics: Steganography tools (61%), Image compression (61%), Steganography (58%) ...read more
Citations
  More

Open accessJournal ArticleDOI: 10.1007/S11045-018-0575-3
Abstract: The recent advancement in computing technologies and resulting vision based applications has given rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices being located remotely. However, to ensure accurate and optimal telemedicine there is the requirement of seamless or flawless biomedical information about patient. On the contrary, medical data transmitted over insecure channel often remains prone to manipulated or corrupted by attackers. The existing cryptosystems alone are not sufficient to deal with these issues and hence in this paper a highly robust reversible image steganography model has been developed for secret information hiding. Unlike traditional wavelet transform techniques, we incorporated Discrete Ripplet Transformation technique for message embedding in the medical cover images. In addition to, ensure seamless communication over insecure channel, a dual cryptosystem model containing proposed steganography scheme and RSA cryptosystem has been developed. One of the key novelties of the proposed research work is the use of adaptive genetic algorithm for optimal pixel adjustment process that enriches data hiding capacity as well as imperceptibility features. The performance assessment reveals that the proposed steganography model outperforms other wavelet transformation based approaches in terms of high PSNR, embedding capacity, imperceptibility etc.

...read more

Topics: Steganography (60%), Cryptosystem (54%), Information hiding (53%) ...read more

14 Citations


Open accessJournal ArticleDOI: 10.1007/S11045-018-0575-3
Abstract: The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices being located remotely. However, to ensure accurate and optimal telemedicine there is the requirement of seamless or flawless biomedical information about patient. On the contrary, medical data transmitted over insecure channel often remains prone to get manipulated or corrupted by attackers. The existing cryptosystems alone are not sufficient to deal with these issues and hence in this paper a highly robust reversible image steganography model has been developed for secret information hiding. Unlike traditional wavelet transform techniques, we incorporated Discrete Ripplet Transformation (DRT) technique for message embedding in the medical cover images. In addition, to assure seamless communication over insecure channel, a dual cryptosystem model containing proposed steganography scheme and RSA cryptosystem has been developed. One of the key novelties of the proposed research work is the use of adaptive genetic algorithm (AGA) for optimal pixel adjustment process (OPAP) that enriches data hiding capacity as well as imperceptibility features. The performance assessment reveals that the proposed steganography model outperforms other wavelet transformation based approaches in terms of high PSNR, embedding capacity, imperceptibility etc.

...read more

Topics: Steganography (60%), Cryptosystem (54%), Information hiding (53%) ...read more

12 Citations


Journal ArticleDOI: 10.1108/IJICC-11-2016-0051
Abstract: Purpose Fueled by the rapid growth of internet, steganography has emerged as one of the promising techniques in the communication system to obscure the data. Steganography is defined as the process of concealing the data or message within media files without affecting the perception of the image. Media files, like audio, video, image, etc., are utilized to embed the message. Nowadays, steganography is also used to transmit the medical information or diagnostic reports. The paper aims to discuss these issues. Design/methodology/approach In this paper, the novel wavelet transform-based steganographic method is proposed for secure data communication using OFDM system. The embedding and extraction process in the proposed steganography method exploits the wavelet transform. Initially, the cost matrix is estimated by the following three aspects: pixel intensity, edge transformation and wavelet transform. The cost estimation matrix provides the location of the cover image where the message is to be entrenched. Then, the wavelet transform is utilized to embed the message into the cover image according to the cost value. Subsequently, in the extraction process, the wavelet transform is applied to the embedded image to retrieve the message efficiently. Finally, in order to transfer the secret information over the channel, the newly developed wavelet-based steganographic method is employed for the OFDM system. Findings The experimental results are evaluated and performance is analyzed using PSNR and MSE parameters and then compared with existing systems. Thus, the outcome of our wavelet transform steganographic method achieves the PSNR of 71.5 dB which ensures the high imperceptibility of the image. Then, the outcome of the OFDM-based proposed steganographic method attains the higher PSNR of 71.07 dB that proves the confidentiality of the message. Originality/value In the authors’ previous work, the embedding and extraction process was done based on the cost estimation matrix. To enhance the security throughout the communication system, the novel wavelet-based embedding and extraction process is applied to the OFDM system in this paper. The idea behind this method is to attain a higher imperceptibility and robustness of the image.

...read more

Topics: Wavelet transform (64%), Lifting scheme (61%), Wavelet (61%) ...read more

4 Citations


Open accessJournal Article
Abstract: Security of secret data has been a major issue of concern from ancient time.Steganography and cryptography are the two techniques which are used to reduce the security threat. Cryptography is an art of converting secret message in other than human readable form. Steganography is an art of hiding the existence of secret message to transmission of confidential data through public channel like Internet. These techniques are required to protect the data over the network. An Advance approach the image security along with compression and encryption used to a high quality of secret message and data. Image compression is used to minimize the amount of memory and fast transmission over internet to represent an image or data. And encryption is used to protect the data over the noise and different attacks.In this paper, proposed an algorithm using chaos on EZW compression technique to provide security along with image compression and chaos encryption used to reduce the negative compression.And also discuss two-level DWT using steganography to used hide information and securely transfer image to receiver side. This technique used to a secure data to narrow bandwidth and unsecure channel to transmit a successfully to receiver side.

...read more

Topics: Image compression (63%), Steganography (63%), Encryption (61%) ...read more

References
  More

Journal ArticleDOI: 10.1147/SJ.353.0313
Abstract: Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of data to be hidden, the need for invariance of these data under conditions where a "host" signal is subject to distortions, e.g., lossy compression, and the degree to which the data must be immune to interception, modification, or removal by a third party. We explore both traditional and novel techniques for addressing the data-hiding process and evaluate these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.

...read more

Topics: Steganography tools (57%), Steganography (56%), Information hiding (55%) ...read more

2,947 Citations


Open accessJournal ArticleDOI: 10.1109/5.771065
01 Jul 1999-
Abstract: Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorized copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity, and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field, of what we know, what works, what does not, and what are the interesting topics for research.

...read more

Topics: Encryption (53%), Military communications (52%), Electronic mail (52%) ...read more

2,476 Citations


Open accessBook
31 Dec 1999-
Abstract: From the Publisher: Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, a description of possible applications, and a survey of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis," methods which can be used to break steganographic communication. This comprehensive resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities and differences to steganography. You gain a working knowledge of watermarking's pros and cons, and you learn the legal implications of watermarking and copyright issues on the Internet.

...read more

Topics: Digital Watermarking Alliance (67%), Steganography tools (67%), Steganography (64%) ...read more

1,725 Citations


Open accessJournal ArticleDOI: 10.1006/ACHA.1997.0238
Abstract: Invertible wavelet transforms that map integers to integers have important applications in lossless coding. In this paper we present two approaches to build integer to integer wavelet transforms. The first approach is to adapt the precoder of Laroiaet al.,which is used in information transmission; we combine it with expansion factors for the high and low pass band in subband filtering. The second approach builds upon the idea of factoring wavelet transforms into so-called lifting steps. This allows the construction of an integer version of every wavelet transform. Finally, we use these approaches in a lossless image coder and compare the results to those given in the literature.

...read more

Topics: Discrete wavelet transform (64%), Wavelet packet decomposition (63%), Lifting scheme (63%) ...read more

1,251 Citations


Journal ArticleDOI: 10.1109/MSECP.2003.1203220
01 May 2003-
Abstract: Although people have hidden secrets in plain sight-now called steganography-throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today's security techniques. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium's redundant bits (those that can be modified without destroying that medium's integrity). The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message. This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis. Here, we present recent research and discuss the practical application of detection algorithms and the mechanisms for getting around them.

...read more

Topics: Steganography tools (56%), Steganalysis (55%), Steganography (52%)

1,190 Citations


Performance
Metrics
No. of citations received by the Paper in previous years
YearCitations
20191
20173
20161
Network Information
Related Papers (5)
01 Jan 2015

Meenakshi Dhaundiyal, Sangita Nikumbh

01 Sep 2015

Sudhanshi Sharma, Umesh Kumar

09 Dec 2011

V. Thanikaiselvan, Pachiyappan Arulmozhivarman +2 more