Reversible dynamic secure steganography for medical image using graph coloring
Citations
273 citations
Cites methods from "Reversible dynamic secure steganogr..."
...The algorithm is proved to be better in terms of robustness of stego image against affine transformation embedding rate and reversibility [60]....
[...]
85 citations
49 citations
33 citations
Cites background or methods from "Reversible dynamic secure steganogr..."
...Algorithms Navas [77] Bremnavas [78] Thiyagarajan [2] Al-Dmour [33] Proposed Embedding Domain IWT Spatial Spatial Spatial Spatial Embedding Technique Difference between coefficients in LH and HL sub-bands LSB LSB LSB with Hamming code LSBM with STC or Hamming code Encryption Yes Yes NO No Yes ROI Yes No Yes, RONI is the background region using Canny method Yes Yes Shape of ROI Rectangular No Irregular Irregular Rectangular Ellipse Embedding Rate 8500 bits 13% Patient record around 20 bytes (650−1850) bits (2323−32300) bits (3−49)% (3251−32600) bits (5−50)% Key Yes No Yes No Yes ExtractionProcess Blind Blind Blind Blind Blind Shared Info NA NA NA Coordinates of ROI Threshold Coordinates of ROI operations....
[...]
...Algorithms Navas [77] Bremnavas [78] Thiyagarajan [2] Al-Dmour [33] Proposed Embedding Domain IWT Spatial Spatial Spatial Spatial...
[...]
...Table 9 shows a comparison with an existing medical information hiding methods (Navas [77], Bremnavas [78], Thiyagarajan [2], Al-Dmour [33]), in term of embedding process, embedding capacity and encryption process....
[...]
...Evaluation of the proposed method with state of the art Table 9 shows a comparison with an existing medical information hiding methods (Navas [77], Bremnavas [78], Thiyagarajan [2], Al-Dmour [33]), in term of embedding process, embedding capacity and encryption process....
[...]
...and health care where the Internet has become the backbone for data exchanging and sharing [1, 2]....
[...]
23 citations
References
3,948 citations
"Reversible dynamic secure steganogr..." refers methods in this paper
...The four most popular methods in frequency domain image steganography are Discrete Cosine Transform (DCT) [5–8], Discrete Fourier Transform (DFT) [9,10], Discrete Wavelet Transform (DWT) [11–13] and Contourlet transform (CT) [14–16]....
[...]
2,561 citations
"Reversible dynamic secure steganogr..." refers background or methods in this paper
...Generally information hiding is achieved through steganography and watermarking [3]....
[...]
...hiding technique [3]—steganography which uses key generated from graph 3 coloring problem....
[...]
761 citations
Additional excerpts
...Fragile steganography system embeds the digital signature or cryptographic hash value [21] of the sensitive data in the image and its correctness is verified on the receiver side....
[...]
548 citations
"Reversible dynamic secure steganogr..." refers methods in this paper
...The invisible spatial domain watermarking method described in [22] uses longer m-sequence in two dimensional blocks....
[...]
502 citations