scispace - formally typeset
Open AccessJournal ArticleDOI

Secure E-Health using Images Steganography

TLDR
In this article, a combined approach of both encryption and steganography to give security the utmost importance is presented, where the main aim is to secure the medical records by ensuring safe communication between the sender and receiver by adding multiple layers of security.
Abstract
The main aim is to secure the medical records by ensuring safe communication between the sender and the receiver by adding multiple layers of security. This project is a combined approach of both encryption and steganography to give security the utmost importance. In the sender, only the authorized person can send the secret image to the receiver. In the first stage, an image steganography system is processed using confidential medical X-ray images which are hidden under the cover images. The encryption method used is based on Random Number Generator and the pixel indicator, in other words, by moving the position of the pixel in the image to encrypt the image on the transmitting side. Whereas on the receiver side, this project proposes a method to authenticate the receiver by incorporating Email Authentication and OTP Verification to decrypt the encrypted image.

read more

Citations
More filters
Journal ArticleDOI

Double layer security using crypto-stego techniques: a comprehensive review.

TL;DR: In this paper, the authors highlight the pros and cons of the existing image steganography techniques and crypto-stego methods and provide a detailed description of commonly using evaluations parameters for both steganographers and cryptography.
Journal ArticleDOI

A Modified Least Significant Bit Replacement: Steganography Method for Handling Random Noise Effect

TL;DR: The research introduced an improved method of least significant bit replacement to cover secret data using 24 bits bitmap image to handle random noise efficiently so that the Human Visual System (HVS) of intruders will not notice the secret communication.

Bulletin of Electrical Engineering and Informatics

TL;DR: The results showed that the proposed system provides the better results of accuracy to detect the DDos attack in SDN network as 99.90% accuracy of Decision Tree (DT) algorithm.
References
More filters
Journal ArticleDOI

Lung Cancer Detection Using Fuzzy Auto-Seed Cluster Means Morphological Segmentation and SVM Classifier

TL;DR: An effective fuzzy auto-seed cluster means morphological algorithm developed in this work to segment the lung nodules from the consecutive slices of Computer Tomography (CT) images to detect the lung cancer.
Proceedings ArticleDOI

Image encryption and decryption in public key cryptography based on MR

TL;DR: A new image encryption algorithm based on Magic Rectangle (MR) that can successfully encrypt/decrypt the images with separate secret keys, and the algorithm has good encryption effect.
Book ChapterDOI

Lung Cancer Diagnosis from CT Images Using Fuzzy Inference System

TL;DR: A scheme to improve the efficiency of the lung cancer diagnosis system by proposing the segmentation of the suspected lung nodules by region based segmentation and cancer identification by FIS.
Journal ArticleDOI

Adoption of an integrated near field communication and natural language processing system toward improvement of telehealth solutions

TL;DR: A Near Field Communication (NFC) wristband that provides access to the medical details, history and contact details of a patient and developed OCR and NLP integrated software helps the doctor or the health officer to immediately convert it into text format and the unstructured text is quickly organized into the respective fields.
Related Papers (5)