SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
ACEEE Int. J. on Signal & Image Processing, Vol. 02, No. 01, Jan 2011




    High Capacity Robust Medical Image Data Hiding
          using CDCS with Integrity Checking
                                        Sunita V. Dhavale1, and Suresh N. Mali2
1
    Department of Information Technology, Marathwada Mitra Mandal’s College of Engineering, Pune, Maharashtra-411052,
                                                         India.
                                         Email: sunitadhavale75@rediffmail.com
       2
         Department of Computer Engineering, Vishwakarma Institute of Technology, Pune, Maharashtra-411037, India.
                                             Email: snmali@rediffmail.com


Abstract—While transferring electronic patient report (EPR)          EPR data but also increases the perceptual quality of the
data along with corresponding medical images over network,           image for the given data hiding capacity. Before
confidentiality must be assured. This can be achieved by             embedding this encoded EPR data in medical image et al.
embedding EPR data in corresponding medical image itself.            [3], high imperceptibility as well as robustness is achieved
However, as the size of EPR increases, security and                  by adaptively selecting the area of an image in which to
robustness of the embedded information becomes major issue
to monitor. Also checking the integrity of this embedded data
                                                                     hide data using energy thresholding method et al. [2].
must be needed in order to assure that retrieved EPR data is            Further, one must also guarantee that the region in which
original and not manipulated by different types of attacks.          we have embedded sensitive and confidential EPR data is
This paper proposes high capacity, robust secured blind data         not tampered by any malicious manipulations et al. [4].
hiding technique in Discrete Cosine Transform (DCT) domain           Thus there is a need for integrity checking that must assure
along with integrity checking. A new coding technique called         both EPR data and image has not been modified by
Class Dependent Coding Scheme (CDCS) is used to increase             unauthorized person. So secure hash can be calculated over
the embedding capacity. High imperceptibility is achieved by         this sensitive region and these hash bits can be embedded
adaptively selecting the efficient DCT blocks. Even a slight         in diagnostically less important region et al. [4] like border
modification of stego image in embedded region as well as in
ROI (Region of Interest) can be detected at receiver so to
                                                                     (black surrounding) or very low frequency region outside
confirm that attack has been done. The embedding scheme              ROI of medical image using fragile spatial domain
also takes care of ROI which is diagnostically important part        techniques like simple LSB substitution method. So even
of the medical images and generates security key                     simple cutting or cropping the image at border region can
automatically. Experimental results show that the proposed           loose these embedded hash bits and attack can be
scheme exhibits high imperceptibility as well as low                 confirmed. The stego key that is automatically generated
perceptual variations in Stego-images. Security and                  based on embedding factors like randomization,
robustness have been tested against various image                    redundancy, interleaving, energy thresholding and JPEG
manipulation attacks.                                                quality factor provides multiple levels of security.
Index Terms—Medical image, EPR, Data hiding, Stego image,
ROI, Robustness, Security, Integrity Check.                                             II. PROPOSED SYSTEM
                                                                     The proposed embedding scheme consists of text
                      I. INTRODUCTION                                processing phase and image processing phase as shown in
   Telemedicine application requires transferring Electronic         Fig. 1 Text processing phase makes the stream of EPR
Patient Report (EPR) data and corresponding medical                  encoded bits ready for embedding, whereas, image
images over network for further diagnostic purpose. While            processing phase embeds these bits into the corresponding
sharing medical images and EPR in telemedicine et al. [1],           medical image. At the time of execution of these phases the
we need to protect of both medical images and EPR data as            embedding parameters (r, n, w1, w2, seed, QF, x1, y1, x2,
well as to save as much space as possible in order to reduce         y2) are provided as an input that gets reflected in
the cost of storage and increase the speed of transmission.          automatically generated embedding key.
Both these goals can be achieved by effective embedding              A. CDCS
of EPR in corresponding medical image itself.
                                                                     Proposed system assigns fixed codes in CDCS to each
   Aim of proposed EPR data hiding is to increase data
                                                                     character by considering their probability of frequency of
hiding capacity without perceptual degradation of the
                                                                     occurrences as shown in Fig. 2 The EPR characters are
medical image along with integrity checking et al. [2, 7]. A
                                                                     then categorized in three different nonoverlapping special
new CDCS coding scheme has been proposed in this paper
                                                                     classes as Class-A (most frequently appearing character
that will not only reduces the number of bits to represent
                                                                     set), Class-B (Average frequently appearing) and Class-C
                                                                     (Less frequently appearing characters). Further, the number
 Corresponding Author: Mrs. Sunita V. Dhavale, M.E.(CSE-IT),         of bits needed to represent each character in the respective
MMCOE, Pune-411052, India.
                                                                     classes is achieved by assuming only capital letters,
                                                                13
© 2011 ACEEE
DOI: 01.IJSIP.02.01.175
ACEEE Int. J. on Signal & Image Processing, Vol. 02, No. 01, Jan 2011


alphanumeric and few special characters. Based on
Huffman encoding, the variable length class code (CC)
have been designed to represent each class as given in
Table 1.




                                                                                Figure 2. Probability of occurrences for EPR characters

                                                                            Table 1: CDCS: Class CODE with Fixed Code within Each Class
                                                                                     Class A    Class B    Class C    4-Bit Code
                                                                                      CC=1      CC=00      CC=01
                                                                                      (1bit)     (2bits)   (2bits)
                                                                                      Blank        M          0          0000
                                                                                         .         U          1          0001
          Figure 1. Proposed System: Multilevel security
                                                                                        E          G          2          0010
         Any character in each Class will be represented by
                                                                                        T          Y          3          0011
only 4 bits prefixed by CC (1-bit or 2-bit). Therefore, CC
along with 4 bit character code can distinguish 48 different                            A          P          4          0100
characters as shown in Table 1, which are sufficient to                                 O          W          5          0101
represent any EPR. Huffman coding is complex and also                                   N          B          6          0110
assigns codes with more than 32 bits for non repeating
                                                                                        R          V          7          0111
characters whereas ASCII gives fixed length codes for the
characters. The proposed CDCS combines the advantages                                    I         K          8          1000
of both fixed length and variable length coding to get less                             S          X          9          1001
number of bits to represent same information compared to
                                                                                        H           J         (          1010
fixed 7-bit ASCII codes.
If N1, N2 and N3 are the total number of characters                                     D          Q          )          1011
belonging to Class-A, Class-B and Class-C respectively,                                 L          Z          =          1100
Total number of bits to be embedded is given by,                                        F           ,         *          1101

  m = ( N1 + 2 N 2 + 2 N 3 ) + 4 h                                                      C           -         %          1110
                                                              (1)
                                                                                         :         _          +          1111

Where,
       h = N1 + N 2 + N 3 , i.e. total number of
                                                                         C. Energy Thresholding
characters in EPR file.
Percentage Bit Saving (PBS) is given by,                                 A sequence of lower and middle frequency non-zero
         ⎡ ⎛ m ⎞⎤                                                        quantized DCT coefficients of randomly generated valid
              ⎜
   PBS = ⎢1 − ⎜  ⎟⎥ ×100 %
                 ⎟                                                       blocks are used to embed final processed bits. After
         ⎣ ⎝ 7 h ⎠⎦                                           (2)        dividing the image into 8 x 8 non overlapping blocks two
                                                                         dimensional DCT is computed for each block along with its
B. Redundancy and Interleaving
                                                                         energy. The blocks having energy greater than the
         Robustness against various attacks can be
achieved by adding redundancy for each bit prior to                      threshold energy will only be considered for embedding.
embedding et al. [7, 8]. Interleaving of bits will disperse              Energy threshold (Et) is calculated as,
subsequent bits from each other throughout the image.
Hence, even if any block of Stego-image undergoes with                          Et = w ⋅ MVE
                                                                                     ˆ
                                                                                                                   (3)
attack, EPR bits can be successfully recovered from other                where, ŵ = Energy threshold factor and MVE = Mean
blocks. CDCS encryption along with specified number of
                                                                         Value of Energy given by,
redundancy bits added (r) and number of interleaving bits
(n) provides two security levels 1 and 2 as shown in Fig. 1.




                                                                    14
© 2011 ACEEE
DOI: 01.IJSIP.02.01.175
ACEEE Int. J. on Signal & Image Processing, Vol. 02, No. 01, Jan 2011


                     1    z                                             the EPR bits of information, the Stego-images gives PSNR
       MVE =
                     z
                         ∑E
                         k =1
                                k                                       value more than 40dB.
                                               (4)                       G. EPR Data Retrieval
where, z = Number of 8 x 8 non-overlapping blocks of the                   Fig. 3 gives automatically generated embedding key
image and Ek= Energy of kth block which is given by,                    (AGEK) during the process of embedding along with the
             7   7              2                                       respective security levels. This embedding key has to be
     Ek =   ∑∑
            i =1 j =1
                         Cij                                            shared with the receiver through a secret channel. The
                                                                        embedding key has 52 bits (n=4, r=4, seed= 16, ŵ (both w1
                                                    (5)
where Cij = Two dimensional DCT coefficients.                           and w2) = 8, QF = 8, x1-y1= 6 and x2-y2 =6). It is difficult
                                                                        to break the key for particular combination decided by the
Classify the DCT blocks by define two different energy
                                                                        embedding algorithm. The extraction algorithm consists of
thresholds w1 and w2 using (3), in such a way that, w1>>                all the image processing steps that are carried out at the
w2.                                                                     time of embedding final processed bits. Recalculate secure
         As blocks having more energy can embed                         hash of those embedded VB’s as well as ROI blocks.
information bits with minimal distortion et al. [7], all                Extract encrypted hash bits from LSB’s of randomly
blocks having energy more than Et1 (decided by w1) will                 selected pixels of LFBs and decrypt it.
only be considered for embedding and treated as Valid
Blocks (VBs) while blocks having energy lesser than Et2
(decided by w2) are selected as very Low Frequency DCT
Blocks (LFBs) where a small size hash bits can be
embedded safely without causing more distortion to
medical image.
                                        ˆ
D. Adaptive Energy Threshold Factor ( w )
   There is always a trade-off between ŵ and number of
VBs. As the value of ŵ increases, we get less number of
VBs. In this scheme, one can adaptively modify the value
of ŵ by monitoring the PSNR of reconstructed image with
respect to given value of PSNR as shown in Fig. 1. This                                  Figure 3. Bit format of AGEK
embedding parameter ŵ gives security level 3.
                                                                           Compare both hash bits if equal, then image is
E. Randomization, ROI and Quantization                                  authenticated and we can retrieve embedded EPR data
   Security level 4 is achieved by randomly selecting the               safely and EPR information can be reconstructed using
VBs. The random number generator based on a seed is                     CDCS.
used to select random VBs. Diagnostically important area
of medical image can be defined by specifying the diagonal                             III. EXPERIMENTAL RESULTS
indices (X1, Y1) and (X2, Y2). The VBs coming in the                       We used grayscale 512 x 512 L-Spine (Lumbar Spine)
vicinity of ROI will not be considered for embedding.                   medical images as shown in following Fig. 4a for our
These specified indices give security level 5. The randomly             experiments. Experimentation is performed to check
selected VBs are then quantized for the given value of QF.              tamper detection capability of the system under various
After the process of quantization the non-zero predefined               attacks (intentional and unintentional). Fig. 4b shows
DCT coefficients are considered for embedding the data.                 corresponding stego image, when 4 bits of EPR are
The embedding parameter QF gives security level 6.                      embedded per 8 x 8 DCT block. The locations chosen for
F. Embedding and Reconstruction                                         each VB block are (2,2), (3,0), (0,3) and (0,2). The 320 bit
   The embedding is carried out by suitably modifying the               encrypted hash code is embedded in LSBs of 8 pixels per
DCT coefficients of the valid blocks finally selected after             LFB block. The quality factor QF=50 chosen.
the process of quantization. If the bit is logically ‘zero’, the           For a given Et1 (decided by w1) and Et2 (decided by w2)
coefficient is rounded to ‘even’ number, otherwise to ‘odd’             in Table 2, Fig. 5a shows corresponding VB Blocks or
number. Finally stego-image is reconstructed by applying                region of images where EPR data is embedded while Fig.
inverse DCT and combining all 8 x 8 image blocks. Take                  5b shows corresponding LFB Blocks or region of images
secure hash of Embedded VB’s as well as ROI blocks and                  where Hash data is embedded. Here w2 is selected in such
encrypt and embed these hash bits into LSB’s of randomly                a way that all LFBs fall generally in border black region.
selected pixels of LFBs. This hash embedding stage used                 The PSNR observed for the stego images is above 40db.
for integrity checking of both embedded data and ROI                    Any attack like small pixel stains made in VB region or
gives security level 7.                                                 EPR embedded region, which could not be visible by
   Fig. 1 shows all the steps of the proposed embedding                 normal eye is detected at receiver side successfully.
scheme. The experimentation shows that after embedding
                                                                   15
© 2011 ACEEE
DOI: 01.IJSIP.02.01.175
ACEEE Int. J. on Signal & Image Processing, Vol. 02, No. 01, Jan 2011


A. Effect of CDCS                                                             embedded hash bits to guarantee the integrity of the
Table 3 shows comparison of CDCS and ASCII codes for                          medical images transmitted. Proposed CDCS can be used
various number of EPR characters. It can be observed that                     as effective coding scheme for EPR data hiding in medical
increase in data hiding capacity is the result of PBS with                    images which increases the embedding capacity and
proposed CDCS.                                                                provides better perceptual quality of Stego-image.
                                                                              Effective use of redundancy and interleaving enhances the
                         Table 2. Et1 and Et2 choices
                                                                              robustness of the scheme against various attacks like JPEG
 Medical          EPR         w1      w2   PSNR(dB)     PSNR(dB) after        compression, image tampering and image manipulation.
  Image           Bits                                     attack             Seven layered security achieved due to redundancy,
 L-Spine          2534       3705     10     44.65         40.43
                                                                              interleaving, energy thresholding, random-ization, ROI
 Shoulder         2098       1977     10     47.14         46.61
                                                                              quantization and Hash embedding stage makes the
                                                                              proposed system most secured.
                                                                              Also further the stego key generated can be further
                                                                              encrypted using any public key encryption algorithm and
                                                                              can be transmitted in secure way to the receiver along with
                                                                              stego image. Also even slight modification to embedded
                                                                              region and ROI part can be detected unambiguously at
                                                                              receiver side. Thus the proposed system can effectively be
                                                                              used for high volume of EPR data hiding in medical images
        Figure 4. Original and Stego L-Spine Medical Image                    with reasonable robustness and security.

                                                                                                       REFERENCES
                                                                              [1] Gonzalo Alvarez1, Shujun Li and Luis Hernandez, “Analysis
                                                                                   of security problems in a medical image encryption system,”
                                                                                   Computers in Biology and Medicine, vol. 37 (2007) 424–
                                                                                   427.
                                                                              [2] M. Fallahpour and M. H. Sedaaghi, ”High capacity lossless
                          Figure 5. VB and LFB Region                              data hiding based on histogram modification”, IEICE
                                                                                   Electron. Express, Vol. 4, No. 7 (2007) 205–210
        Table 3: Capacity Performance of CDCS over ASCII                      [3] J. Zain and Malcolm Clarke, ”Security in Telemedicine:
              EPR            ASCII bits     CDCS bits   PBS                        Issues in Watermarking Medical Images”, 3rd International
            characters                                   (%)                       Conference : Science of Electronic, Technologies of
               506             3542           2814      20.55                      Information and Telecommunications (2005)
                                                                              [4] B. Planitz, A. Maeder, “Medical Image Watermarking: A
               584             4088           3244      20.65                      Study on Image Degradation”, Proc. Australian Pattern
                                                                                   Recognition Society Workshop on Digital Image Computing,
B. Perceptual Transparency                                                         WDIC 2005, Brisbane, Australia (2005)
                                                                              [5] G. S. Pavlopoulos, D.Koutsouris, ”Multiple            Image
Fig. 4a and Fig. 4b shows original and Stego 512 x 512 ‘L-                         Watermarking Applied to Health Information Management”,
Spine’ images respectively. The locations chosen per block                         IEEE Transactions on Information Technology in
are at (2,2), (3,0), (0,3) and (0,2) to embed 270 EPR                              Biomedicine, vol. 10.4 ( 2006) 722 – 732
characters. The ‘QF =70’ and the EPR data has been                            [6] K. A. Navas, S. A. Thampy, and M. Sasikumar, “EPR
embedded with ‘w1 =0.5’. The PSNR observed for the                                 Hiding in medical images for telemedicine,” International
Stego-image is 47.5982. Proposed scheme shows PSNR                                 Journal of Biomedical Sciences Volume 3.1 (2008) 44– 47
greater than 38 dB for embedding up to 3000 EPR bits in                       [7] K. Solanki, N. Jacobsen, U. Madhow, B.S.Manjunath and S.
‘L-spine’ images.                                                                  Chandrashekhar, ”Robust Image-Adaptive Data hiding using
                                                                                   Erasure and Error Correction,” IEEE Transactions on image
C. Robustness Test                                                                 processing, Volume 13, (2004) 1627–1639.
The proposed system is robust and gives very less Bit Error                   [8] S. N. Mali and R. M. Jalnekar., ”Imperceptible and Robust
                                                                                   Data Hiding using Steganography Against Image
Rate (BER) against JPEG compression attack, image                                  Manipulation,” International Journal of Emerging
tampering attack, image manipulation attack and change in                          Technologies and Applications in Engineering, Technology
contrast value.                                                                    and Sciences, (IJ-ETA-ETS) (2008) 84–91.
                                                                              [9] G. J. Simmons, ”The prisoners’ problem and subliminal
                              CONCLUSIONS                                          channel”, in Advances in Cryptology. Proceedings of Crypto
                                                                                   83 (D. Chaum, ed.), Plenum Press (1984) 51–67.
In this paper, we proposed a method for the secure                            [10] Neil F. Johnson and S. Jajodia, ”Exploring Steganography.
transmission of medical images by using both DCT and                               Seeing Unseen”, IEEE Computer, vol. 31.2 (1998) 26 – 34.
LSB substitution along with new CDCS encoding scheme                          [11] Min. Wu , ”Joint Security and Robustness Enhancement for
for EPR data in order to increase hiding capacity. First we                        Quantization Embedding”, IEEE Transactions 0-7803-7750-
embedded EPR data into the medical images and then we                              8/03(2003)483–486.


                                                                         16
© 2011 ACEEE
DOI: 01.IJSIP.02.01.175

Mais conteúdo relacionado

Mais procurados

Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationeSAT Publishing House
 
Devanagari Character Recognition
Devanagari Character RecognitionDevanagari Character Recognition
Devanagari Character RecognitionPulkit Goyal
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130IJRAT
 
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...CSCJournals
 
IRJET- Sign Language Interpreter using Image Processing and Machine Learning
IRJET- Sign Language Interpreter using Image Processing and Machine LearningIRJET- Sign Language Interpreter using Image Processing and Machine Learning
IRJET- Sign Language Interpreter using Image Processing and Machine LearningIRJET Journal
 
Optical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocrOptical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocrcsandit
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...Editor IJMTER
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationeSAT Journals
 
character recognition: Scope and challenges
 character recognition: Scope and challenges character recognition: Scope and challenges
character recognition: Scope and challengesVikas Dongre
 
IRJET- Neural Network based Script Recognition using Wavelet Features: An App...
IRJET- Neural Network based Script Recognition using Wavelet Features: An App...IRJET- Neural Network based Script Recognition using Wavelet Features: An App...
IRJET- Neural Network based Script Recognition using Wavelet Features: An App...IRJET Journal
 
BrailleOCR: An Open Source Document to Braille Converter Application
BrailleOCR: An Open Source Document to Braille Converter ApplicationBrailleOCR: An Open Source Document to Braille Converter Application
BrailleOCR: An Open Source Document to Braille Converter Applicationpijush15
 
Protein Contact Networks: An Emerging Paradigm in Chemistry
Protein Contact Networks: An Emerging Paradigm in ChemistryProtein Contact Networks: An Emerging Paradigm in Chemistry
Protein Contact Networks: An Emerging Paradigm in ChemistryLe Scienze Web News
 
MATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATA
MATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATAMATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATA
MATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATAVLSICS Design
 
Performance Evaluation of Classifiers used for Identification of Encryption A...
Performance Evaluation of Classifiers used for Identification of Encryption A...Performance Evaluation of Classifiers used for Identification of Encryption A...
Performance Evaluation of Classifiers used for Identification of Encryption A...IDES Editor
 

Mais procurados (20)

585 589
585 589585 589
585 589
 
Morpho
MorphoMorpho
Morpho
 
8086 introduction
8086 introduction8086 introduction
8086 introduction
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentation
 
Devanagari Character Recognition
Devanagari Character RecognitionDevanagari Character Recognition
Devanagari Character Recognition
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130
 
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
 
Assembly language
Assembly languageAssembly language
Assembly language
 
IRJET- Sign Language Interpreter using Image Processing and Machine Learning
IRJET- Sign Language Interpreter using Image Processing and Machine LearningIRJET- Sign Language Interpreter using Image Processing and Machine Learning
IRJET- Sign Language Interpreter using Image Processing and Machine Learning
 
Optical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocrOptical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocr
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentation
 
character recognition: Scope and challenges
 character recognition: Scope and challenges character recognition: Scope and challenges
character recognition: Scope and challenges
 
IRJET- Neural Network based Script Recognition using Wavelet Features: An App...
IRJET- Neural Network based Script Recognition using Wavelet Features: An App...IRJET- Neural Network based Script Recognition using Wavelet Features: An App...
IRJET- Neural Network based Script Recognition using Wavelet Features: An App...
 
BrailleOCR: An Open Source Document to Braille Converter Application
BrailleOCR: An Open Source Document to Braille Converter ApplicationBrailleOCR: An Open Source Document to Braille Converter Application
BrailleOCR: An Open Source Document to Braille Converter Application
 
Protein Contact Networks: An Emerging Paradigm in Chemistry
Protein Contact Networks: An Emerging Paradigm in ChemistryProtein Contact Networks: An Emerging Paradigm in Chemistry
Protein Contact Networks: An Emerging Paradigm in Chemistry
 
MATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATA
MATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATAMATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATA
MATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATA
 
Performance Evaluation of Classifiers used for Identification of Encryption A...
Performance Evaluation of Classifiers used for Identification of Encryption A...Performance Evaluation of Classifiers used for Identification of Encryption A...
Performance Evaluation of Classifiers used for Identification of Encryption A...
 
104 108
104 108104 108
104 108
 
Introduction
IntroductionIntroduction
Introduction
 

Destaque

Extending UML State Diagrams to Model Agent Mobility
Extending UML State Diagrams to Model Agent MobilityExtending UML State Diagrams to Model Agent Mobility
Extending UML State Diagrams to Model Agent MobilityIDES Editor
 
Data oriented and Process oriented Strategies for Legacy Information Systems ...
Data oriented and Process oriented Strategies for Legacy Information Systems ...Data oriented and Process oriented Strategies for Legacy Information Systems ...
Data oriented and Process oriented Strategies for Legacy Information Systems ...IDES Editor
 
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...IDES Editor
 
The Study of MOSFET Parallelism in High Frequency DC/DC Converter
The Study of MOSFET Parallelism in High Frequency DC/DC ConverterThe Study of MOSFET Parallelism in High Frequency DC/DC Converter
The Study of MOSFET Parallelism in High Frequency DC/DC ConverterIDES Editor
 
On-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksOn-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksIDES Editor
 
Customized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration ProtocolCustomized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration ProtocolIDES Editor
 
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...IDES Editor
 
Prototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety ApplicationPrototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety ApplicationIDES Editor
 

Destaque (8)

Extending UML State Diagrams to Model Agent Mobility
Extending UML State Diagrams to Model Agent MobilityExtending UML State Diagrams to Model Agent Mobility
Extending UML State Diagrams to Model Agent Mobility
 
Data oriented and Process oriented Strategies for Legacy Information Systems ...
Data oriented and Process oriented Strategies for Legacy Information Systems ...Data oriented and Process oriented Strategies for Legacy Information Systems ...
Data oriented and Process oriented Strategies for Legacy Information Systems ...
 
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
 
The Study of MOSFET Parallelism in High Frequency DC/DC Converter
The Study of MOSFET Parallelism in High Frequency DC/DC ConverterThe Study of MOSFET Parallelism in High Frequency DC/DC Converter
The Study of MOSFET Parallelism in High Frequency DC/DC Converter
 
On-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksOn-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected Networks
 
Customized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration ProtocolCustomized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration Protocol
 
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
 
Prototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety ApplicationPrototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety Application
 

Semelhante a High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Checking

A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images IJECEIAES
 
Coding and ANN - assisted Pseudo - Noise Sequence Generator for DS / FH Sprea...
Coding and ANN - assisted Pseudo - Noise Sequence Generator for DS / FH Sprea...Coding and ANN - assisted Pseudo - Noise Sequence Generator for DS / FH Sprea...
Coding and ANN - assisted Pseudo - Noise Sequence Generator for DS / FH Sprea...IDES Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
Post-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest CodingPost-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest Codingsipij
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codesidescitation
 
FIR Filter Implementation by Systolization using DA-based Decomposition
FIR Filter Implementation by Systolization using DA-based DecompositionFIR Filter Implementation by Systolization using DA-based Decomposition
FIR Filter Implementation by Systolization using DA-based DecompositionIDES Editor
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain ijcisjournal
 
Embedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPEmbedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPcsijjournal
 
Embedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPEmbedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPcsijjournal
 
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMSCOMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMScsijjournal
 
A novel image encryption scheme based on DCT transform and DNA sequence
A novel image encryption scheme based on DCT transform and  DNA sequenceA novel image encryption scheme based on DCT transform and  DNA sequence
A novel image encryption scheme based on DCT transform and DNA sequencenooriasukmaningtyas
 
DATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSING
DATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSINGDATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSING
DATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSINGcscpconf
 
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...Waqas Tariq
 
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...IJNSA Journal
 

Semelhante a High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Checking (20)

A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 
Coding and ANN - assisted Pseudo - Noise Sequence Generator for DS / FH Sprea...
Coding and ANN - assisted Pseudo - Noise Sequence Generator for DS / FH Sprea...Coding and ANN - assisted Pseudo - Noise Sequence Generator for DS / FH Sprea...
Coding and ANN - assisted Pseudo - Noise Sequence Generator for DS / FH Sprea...
 
40120140505005 2
40120140505005 240120140505005 2
40120140505005 2
 
40120140505005
4012014050500540120140505005
40120140505005
 
40120140505005
4012014050500540120140505005
40120140505005
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
Post-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest CodingPost-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest Coding
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
 
FIR Filter Implementation by Systolization using DA-based Decomposition
FIR Filter Implementation by Systolization using DA-based DecompositionFIR Filter Implementation by Systolization using DA-based Decomposition
FIR Filter Implementation by Systolization using DA-based Decomposition
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Embedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPEmbedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTP
 
Embedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPEmbedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTP
 
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMSCOMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
 
A novel image encryption scheme based on DCT transform and DNA sequence
A novel image encryption scheme based on DCT transform and  DNA sequenceA novel image encryption scheme based on DCT transform and  DNA sequence
A novel image encryption scheme based on DCT transform and DNA sequence
 
DATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSING
DATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSINGDATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSING
DATA COMPRESSION USING NEURAL NETWORKS IN BIO-MEDICAL SIGNAL PROCESSING
 
C010421720
C010421720C010421720
C010421720
 
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
 
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
 
Bj32392395
Bj32392395Bj32392395
Bj32392395
 

Mais de IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mais de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Último

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Último (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Checking

  • 1. ACEEE Int. J. on Signal & Image Processing, Vol. 02, No. 01, Jan 2011 High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Checking Sunita V. Dhavale1, and Suresh N. Mali2 1 Department of Information Technology, Marathwada Mitra Mandal’s College of Engineering, Pune, Maharashtra-411052, India. Email: sunitadhavale75@rediffmail.com 2 Department of Computer Engineering, Vishwakarma Institute of Technology, Pune, Maharashtra-411037, India. Email: snmali@rediffmail.com Abstract—While transferring electronic patient report (EPR) EPR data but also increases the perceptual quality of the data along with corresponding medical images over network, image for the given data hiding capacity. Before confidentiality must be assured. This can be achieved by embedding this encoded EPR data in medical image et al. embedding EPR data in corresponding medical image itself. [3], high imperceptibility as well as robustness is achieved However, as the size of EPR increases, security and by adaptively selecting the area of an image in which to robustness of the embedded information becomes major issue to monitor. Also checking the integrity of this embedded data hide data using energy thresholding method et al. [2]. must be needed in order to assure that retrieved EPR data is Further, one must also guarantee that the region in which original and not manipulated by different types of attacks. we have embedded sensitive and confidential EPR data is This paper proposes high capacity, robust secured blind data not tampered by any malicious manipulations et al. [4]. hiding technique in Discrete Cosine Transform (DCT) domain Thus there is a need for integrity checking that must assure along with integrity checking. A new coding technique called both EPR data and image has not been modified by Class Dependent Coding Scheme (CDCS) is used to increase unauthorized person. So secure hash can be calculated over the embedding capacity. High imperceptibility is achieved by this sensitive region and these hash bits can be embedded adaptively selecting the efficient DCT blocks. Even a slight in diagnostically less important region et al. [4] like border modification of stego image in embedded region as well as in ROI (Region of Interest) can be detected at receiver so to (black surrounding) or very low frequency region outside confirm that attack has been done. The embedding scheme ROI of medical image using fragile spatial domain also takes care of ROI which is diagnostically important part techniques like simple LSB substitution method. So even of the medical images and generates security key simple cutting or cropping the image at border region can automatically. Experimental results show that the proposed loose these embedded hash bits and attack can be scheme exhibits high imperceptibility as well as low confirmed. The stego key that is automatically generated perceptual variations in Stego-images. Security and based on embedding factors like randomization, robustness have been tested against various image redundancy, interleaving, energy thresholding and JPEG manipulation attacks. quality factor provides multiple levels of security. Index Terms—Medical image, EPR, Data hiding, Stego image, ROI, Robustness, Security, Integrity Check. II. PROPOSED SYSTEM The proposed embedding scheme consists of text I. INTRODUCTION processing phase and image processing phase as shown in Telemedicine application requires transferring Electronic Fig. 1 Text processing phase makes the stream of EPR Patient Report (EPR) data and corresponding medical encoded bits ready for embedding, whereas, image images over network for further diagnostic purpose. While processing phase embeds these bits into the corresponding sharing medical images and EPR in telemedicine et al. [1], medical image. At the time of execution of these phases the we need to protect of both medical images and EPR data as embedding parameters (r, n, w1, w2, seed, QF, x1, y1, x2, well as to save as much space as possible in order to reduce y2) are provided as an input that gets reflected in the cost of storage and increase the speed of transmission. automatically generated embedding key. Both these goals can be achieved by effective embedding A. CDCS of EPR in corresponding medical image itself. Proposed system assigns fixed codes in CDCS to each Aim of proposed EPR data hiding is to increase data character by considering their probability of frequency of hiding capacity without perceptual degradation of the occurrences as shown in Fig. 2 The EPR characters are medical image along with integrity checking et al. [2, 7]. A then categorized in three different nonoverlapping special new CDCS coding scheme has been proposed in this paper classes as Class-A (most frequently appearing character that will not only reduces the number of bits to represent set), Class-B (Average frequently appearing) and Class-C (Less frequently appearing characters). Further, the number Corresponding Author: Mrs. Sunita V. Dhavale, M.E.(CSE-IT), of bits needed to represent each character in the respective MMCOE, Pune-411052, India. classes is achieved by assuming only capital letters, 13 © 2011 ACEEE DOI: 01.IJSIP.02.01.175
  • 2. ACEEE Int. J. on Signal & Image Processing, Vol. 02, No. 01, Jan 2011 alphanumeric and few special characters. Based on Huffman encoding, the variable length class code (CC) have been designed to represent each class as given in Table 1. Figure 2. Probability of occurrences for EPR characters Table 1: CDCS: Class CODE with Fixed Code within Each Class Class A Class B Class C 4-Bit Code CC=1 CC=00 CC=01 (1bit) (2bits) (2bits) Blank M 0 0000 . U 1 0001 Figure 1. Proposed System: Multilevel security E G 2 0010 Any character in each Class will be represented by T Y 3 0011 only 4 bits prefixed by CC (1-bit or 2-bit). Therefore, CC along with 4 bit character code can distinguish 48 different A P 4 0100 characters as shown in Table 1, which are sufficient to O W 5 0101 represent any EPR. Huffman coding is complex and also N B 6 0110 assigns codes with more than 32 bits for non repeating R V 7 0111 characters whereas ASCII gives fixed length codes for the characters. The proposed CDCS combines the advantages I K 8 1000 of both fixed length and variable length coding to get less S X 9 1001 number of bits to represent same information compared to H J ( 1010 fixed 7-bit ASCII codes. If N1, N2 and N3 are the total number of characters D Q ) 1011 belonging to Class-A, Class-B and Class-C respectively, L Z = 1100 Total number of bits to be embedded is given by, F , * 1101 m = ( N1 + 2 N 2 + 2 N 3 ) + 4 h C - % 1110 (1) : _ + 1111 Where, h = N1 + N 2 + N 3 , i.e. total number of C. Energy Thresholding characters in EPR file. Percentage Bit Saving (PBS) is given by, A sequence of lower and middle frequency non-zero ⎡ ⎛ m ⎞⎤ quantized DCT coefficients of randomly generated valid ⎜ PBS = ⎢1 − ⎜ ⎟⎥ ×100 % ⎟ blocks are used to embed final processed bits. After ⎣ ⎝ 7 h ⎠⎦ (2) dividing the image into 8 x 8 non overlapping blocks two dimensional DCT is computed for each block along with its B. Redundancy and Interleaving energy. The blocks having energy greater than the Robustness against various attacks can be achieved by adding redundancy for each bit prior to threshold energy will only be considered for embedding. embedding et al. [7, 8]. Interleaving of bits will disperse Energy threshold (Et) is calculated as, subsequent bits from each other throughout the image. Hence, even if any block of Stego-image undergoes with Et = w ⋅ MVE ˆ (3) attack, EPR bits can be successfully recovered from other where, ŵ = Energy threshold factor and MVE = Mean blocks. CDCS encryption along with specified number of Value of Energy given by, redundancy bits added (r) and number of interleaving bits (n) provides two security levels 1 and 2 as shown in Fig. 1. 14 © 2011 ACEEE DOI: 01.IJSIP.02.01.175
  • 3. ACEEE Int. J. on Signal & Image Processing, Vol. 02, No. 01, Jan 2011 1 z the EPR bits of information, the Stego-images gives PSNR MVE = z ∑E k =1 k value more than 40dB. (4) G. EPR Data Retrieval where, z = Number of 8 x 8 non-overlapping blocks of the Fig. 3 gives automatically generated embedding key image and Ek= Energy of kth block which is given by, (AGEK) during the process of embedding along with the 7 7 2 respective security levels. This embedding key has to be Ek = ∑∑ i =1 j =1 Cij shared with the receiver through a secret channel. The embedding key has 52 bits (n=4, r=4, seed= 16, ŵ (both w1 (5) where Cij = Two dimensional DCT coefficients. and w2) = 8, QF = 8, x1-y1= 6 and x2-y2 =6). It is difficult to break the key for particular combination decided by the Classify the DCT blocks by define two different energy embedding algorithm. The extraction algorithm consists of thresholds w1 and w2 using (3), in such a way that, w1>> all the image processing steps that are carried out at the w2. time of embedding final processed bits. Recalculate secure As blocks having more energy can embed hash of those embedded VB’s as well as ROI blocks. information bits with minimal distortion et al. [7], all Extract encrypted hash bits from LSB’s of randomly blocks having energy more than Et1 (decided by w1) will selected pixels of LFBs and decrypt it. only be considered for embedding and treated as Valid Blocks (VBs) while blocks having energy lesser than Et2 (decided by w2) are selected as very Low Frequency DCT Blocks (LFBs) where a small size hash bits can be embedded safely without causing more distortion to medical image. ˆ D. Adaptive Energy Threshold Factor ( w ) There is always a trade-off between ŵ and number of VBs. As the value of ŵ increases, we get less number of VBs. In this scheme, one can adaptively modify the value of ŵ by monitoring the PSNR of reconstructed image with respect to given value of PSNR as shown in Fig. 1. This Figure 3. Bit format of AGEK embedding parameter ŵ gives security level 3. Compare both hash bits if equal, then image is E. Randomization, ROI and Quantization authenticated and we can retrieve embedded EPR data Security level 4 is achieved by randomly selecting the safely and EPR information can be reconstructed using VBs. The random number generator based on a seed is CDCS. used to select random VBs. Diagnostically important area of medical image can be defined by specifying the diagonal III. EXPERIMENTAL RESULTS indices (X1, Y1) and (X2, Y2). The VBs coming in the We used grayscale 512 x 512 L-Spine (Lumbar Spine) vicinity of ROI will not be considered for embedding. medical images as shown in following Fig. 4a for our These specified indices give security level 5. The randomly experiments. Experimentation is performed to check selected VBs are then quantized for the given value of QF. tamper detection capability of the system under various After the process of quantization the non-zero predefined attacks (intentional and unintentional). Fig. 4b shows DCT coefficients are considered for embedding the data. corresponding stego image, when 4 bits of EPR are The embedding parameter QF gives security level 6. embedded per 8 x 8 DCT block. The locations chosen for F. Embedding and Reconstruction each VB block are (2,2), (3,0), (0,3) and (0,2). The 320 bit The embedding is carried out by suitably modifying the encrypted hash code is embedded in LSBs of 8 pixels per DCT coefficients of the valid blocks finally selected after LFB block. The quality factor QF=50 chosen. the process of quantization. If the bit is logically ‘zero’, the For a given Et1 (decided by w1) and Et2 (decided by w2) coefficient is rounded to ‘even’ number, otherwise to ‘odd’ in Table 2, Fig. 5a shows corresponding VB Blocks or number. Finally stego-image is reconstructed by applying region of images where EPR data is embedded while Fig. inverse DCT and combining all 8 x 8 image blocks. Take 5b shows corresponding LFB Blocks or region of images secure hash of Embedded VB’s as well as ROI blocks and where Hash data is embedded. Here w2 is selected in such encrypt and embed these hash bits into LSB’s of randomly a way that all LFBs fall generally in border black region. selected pixels of LFBs. This hash embedding stage used The PSNR observed for the stego images is above 40db. for integrity checking of both embedded data and ROI Any attack like small pixel stains made in VB region or gives security level 7. EPR embedded region, which could not be visible by Fig. 1 shows all the steps of the proposed embedding normal eye is detected at receiver side successfully. scheme. The experimentation shows that after embedding 15 © 2011 ACEEE DOI: 01.IJSIP.02.01.175
  • 4. ACEEE Int. J. on Signal & Image Processing, Vol. 02, No. 01, Jan 2011 A. Effect of CDCS embedded hash bits to guarantee the integrity of the Table 3 shows comparison of CDCS and ASCII codes for medical images transmitted. Proposed CDCS can be used various number of EPR characters. It can be observed that as effective coding scheme for EPR data hiding in medical increase in data hiding capacity is the result of PBS with images which increases the embedding capacity and proposed CDCS. provides better perceptual quality of Stego-image. Effective use of redundancy and interleaving enhances the Table 2. Et1 and Et2 choices robustness of the scheme against various attacks like JPEG Medical EPR w1 w2 PSNR(dB) PSNR(dB) after compression, image tampering and image manipulation. Image Bits attack Seven layered security achieved due to redundancy, L-Spine 2534 3705 10 44.65 40.43 interleaving, energy thresholding, random-ization, ROI Shoulder 2098 1977 10 47.14 46.61 quantization and Hash embedding stage makes the proposed system most secured. Also further the stego key generated can be further encrypted using any public key encryption algorithm and can be transmitted in secure way to the receiver along with stego image. Also even slight modification to embedded region and ROI part can be detected unambiguously at receiver side. Thus the proposed system can effectively be used for high volume of EPR data hiding in medical images Figure 4. Original and Stego L-Spine Medical Image with reasonable robustness and security. REFERENCES [1] Gonzalo Alvarez1, Shujun Li and Luis Hernandez, “Analysis of security problems in a medical image encryption system,” Computers in Biology and Medicine, vol. 37 (2007) 424– 427. [2] M. Fallahpour and M. H. Sedaaghi, ”High capacity lossless Figure 5. VB and LFB Region data hiding based on histogram modification”, IEICE Electron. Express, Vol. 4, No. 7 (2007) 205–210 Table 3: Capacity Performance of CDCS over ASCII [3] J. Zain and Malcolm Clarke, ”Security in Telemedicine: EPR ASCII bits CDCS bits PBS Issues in Watermarking Medical Images”, 3rd International characters (%) Conference : Science of Electronic, Technologies of 506 3542 2814 20.55 Information and Telecommunications (2005) [4] B. Planitz, A. Maeder, “Medical Image Watermarking: A 584 4088 3244 20.65 Study on Image Degradation”, Proc. Australian Pattern Recognition Society Workshop on Digital Image Computing, B. Perceptual Transparency WDIC 2005, Brisbane, Australia (2005) [5] G. S. Pavlopoulos, D.Koutsouris, ”Multiple Image Fig. 4a and Fig. 4b shows original and Stego 512 x 512 ‘L- Watermarking Applied to Health Information Management”, Spine’ images respectively. The locations chosen per block IEEE Transactions on Information Technology in are at (2,2), (3,0), (0,3) and (0,2) to embed 270 EPR Biomedicine, vol. 10.4 ( 2006) 722 – 732 characters. The ‘QF =70’ and the EPR data has been [6] K. A. Navas, S. A. Thampy, and M. Sasikumar, “EPR embedded with ‘w1 =0.5’. The PSNR observed for the Hiding in medical images for telemedicine,” International Stego-image is 47.5982. Proposed scheme shows PSNR Journal of Biomedical Sciences Volume 3.1 (2008) 44– 47 greater than 38 dB for embedding up to 3000 EPR bits in [7] K. Solanki, N. Jacobsen, U. Madhow, B.S.Manjunath and S. ‘L-spine’ images. Chandrashekhar, ”Robust Image-Adaptive Data hiding using Erasure and Error Correction,” IEEE Transactions on image C. Robustness Test processing, Volume 13, (2004) 1627–1639. The proposed system is robust and gives very less Bit Error [8] S. N. Mali and R. M. Jalnekar., ”Imperceptible and Robust Data Hiding using Steganography Against Image Rate (BER) against JPEG compression attack, image Manipulation,” International Journal of Emerging tampering attack, image manipulation attack and change in Technologies and Applications in Engineering, Technology contrast value. and Sciences, (IJ-ETA-ETS) (2008) 84–91. [9] G. J. Simmons, ”The prisoners’ problem and subliminal CONCLUSIONS channel”, in Advances in Cryptology. Proceedings of Crypto 83 (D. Chaum, ed.), Plenum Press (1984) 51–67. In this paper, we proposed a method for the secure [10] Neil F. Johnson and S. Jajodia, ”Exploring Steganography. transmission of medical images by using both DCT and Seeing Unseen”, IEEE Computer, vol. 31.2 (1998) 26 – 34. LSB substitution along with new CDCS encoding scheme [11] Min. Wu , ”Joint Security and Robustness Enhancement for for EPR data in order to increase hiding capacity. First we Quantization Embedding”, IEEE Transactions 0-7803-7750- embedded EPR data into the medical images and then we 8/03(2003)483–486. 16 © 2011 ACEEE DOI: 01.IJSIP.02.01.175