SlideShare a Scribd company logo
1 of 6
Download to read offline
Sirshendu Hore et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2042-2047

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

A Sustainable Medical Image Authentication Technique in
Spatial Domain Using Multiple QR Code
Sirshendu Hore*, Tanmay Bhattacharya**, S. R. Bhadra Chaudhuri***
*(Department of Computer Science, HETC, WB, INDIA)
** (Department of Information Technology, JIS College of Engineering, WB, INDIA)
*** (Department of E&TCE, BSEU, WB, INDIA)

ABSTRACT
Nowadays there is a need to protect our health related information for authentication and privacy purpose. In the
proposed work multiple QR codes are watermarked inside a single color medical image using Variable Bit
Replacement (VBR) technique. Three different 128 bit session keys are used to watermark QR Codes in three
different color components (R, G and B) of a single color medical image. The QR Code is embedded in between
moderately significant bit (MdSB) and least significant bit (LSB). The watermarked extraction process
determines an invisible watermark in the image by reversing the embedding process. Results show that the
process is robust against different attacks and imperceptibility is quite good.
Keywords - QR Code, VBR, Session based, Multiple Keys, DCT, Image Watermark
I.
INTRODUCTION
Health related information is always very sensitive
and private to all of us. Maintaining the integrity and
protecting such information is a challenging area in
the field health related service. The rapid development
in the field of information technology in recent years
has made the situation worse as data can be tampered
very easily, since most of our health related
information are now stored in digital image format.
Therefore, through some well defined method we need
to authenticate those images and make sure the image
belongs to the intended patient hence the image‟s
integrity is maintained. Thus call for a good and
strong authentication system. Security researchers in
this field are looking for a better way to meet the
stated challenge.
Digital watermark [1, 2, 3] is one of the
appropriate solutions to meet those problems and
challenges. In Digital watermark the main objective is
to communicate securely so that the sensitive
information is not exposed to the observer or viewer.
The most two important issue related to digital
watermark are:
Imperceptibility: The visibility of the secret and
sensitive information to the human eyes.
Capacity: Volume of secret and sensitive information
that can be embedded inside the medical image.

through the use of medical imaging. Fig 1 illustrated
the hepatic portal venous gas of a patient.

figure 1: A Hepatic portal venous gas of a patient.
(800 X 600)
I.II QR Code: [4, 5, 6]. records information of an item
in the form of a machine-readable label which is
encoded and can be attached to that item. Message
with in a QR Code can be known through standard QR
Code reader or by using the smart phone. To store or
encoded information within a QR code we can make
use of four standardized modes of data such as
alphanumeric, byte or binary, numeric and kanji.

I.1 Medical Imaging: In order to monitor, diagnose, or
treat medical condition for human body we used
medical imaging. Numerous diverse technologies are
used in medical imaging to provide different
information related to the area of the body being
studied or treated. Thus one can easily measure the
effectiveness of medical treatment, injury, disease etc
figure 2: QR Code
www.ijera.com

2042 | P a g e
Sirshendu Hore et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2042-2047

www.ijera.com

Advantage: The QR Code system has
become popular due to its fast readability and greater
storage capacity compared to standard UPC barcodes.
Limitation: If the size of the QR Code is
about 100 characters or more, it seems likely that most
smart phones or reader will have trouble while reading
QR Code.

II.

LITERATURE REVIEW

Spatial Domain Model: In spatial domain
technique, the embedding of secret messages is done
directly. Some of the popular spatial domain
embedding methods is:
II.1 Least Significant Bit (LSB)
LSB [7] replacement scheme is the simplest
method which is capable of communicating large
payloads and imperceptible to human eye. Limitation
of LSB is that it can be easily detected by the
histogram analysis or if the watermarked image is
distorted by means of noise
II.II Bit Plane Complexity Steganography (BPCS)
BPCS [8] was proposed by Rosanne English
which is much more efficient than the LSB technique.
In this scheme the image is initially decomposed into
eight different layers. Based on complexity, every
block is further subdivided into noisy, artificially
informative or naturally informative layers.
Embedding is done from the lowest layers towards the
highest ones. The BPCS scheme can defy statistical
attacks in a enhanced way.

figure 3: QR Code generation Process.
III.II Session Key Generation Process:
Step I: A Session based password is taken from
the user (say “SHore") for Red color component
Step II: 32 character key has been generated from
the password using MD5 hash algorithm.( “Say
2de46b5a62fad83f47d528e6f541d5f4”)
Step III: 128 bit sequence has been generated
from 32 characters key.
Step IV: Afterwards 64 digit (consisting of 0,
1,2and 3) key is generated from the 128 bit
sequence by combining the adjacent value.
Step V: Steps I to IV are repeated for both Blue
and Green component also.
Fig 4 illustrated the session based key generation
process.

II.III Variable bit replacement (VBR)
In the variable bit replacement technique [9]
the information is embedded within the host image at
variable positions. The information‟s are embedded
between LSB and MdSB [10]. At the time of
extraction of secret information is extracted by
reversing the embedding process

III.

THE PROPOSED SCHEME

In the proposed scheme we are going to hide
multiple QR Codes in different color component of a
medical image. The total process is divided into 4
major steps: QR Code generation from the patient
information, Session key generation process, Secret
QR Code embedding process and secret QR Code
extraction process.
III.I QR Code Generation Process
Three QR Codes (200 X 200) are generated consist of
patient personal and sensitive information. Fig. 3
illustrated the QR Code generation process from
patient personal information

www.ijera.com

figure 4: Session Key Generation process
III.III Secret QR Code Embedding Process
The secret QR Code embedding process
consists of following steps.
Step I: A color medical image (800 X 600) is
taken.
Step II: Then the color medical image is sub
divided into three color components, red, green
and blue.
Step III. Three sessional passwords for three
components (R, G and B) are taken from the user.

2043 | P a g e
Sirshendu Hore et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2042-2047
Step IV. QR Codes which are generated earlier in
QR Code Generation process is now converted into
binary numbers and finally reshape into 1D Vector.
Step V. Three 64 digit keys are generated from the
passwords for three color components, as stated in
the session key generation process. These Keys
indicate the position of the color medical image
where QR Codes are to be embedded. For a
sequence of binary number 00, 01, 10 and 11 the
decimal values are 0 1, 2 and 3. Here 0 indicates
last bit, 1 indicates 2nd last bit, 2 indicates 3rd last
bit and 3 indicates 4th last bit.
Step VI: QR Codes are then embedded within
color components (R, G and B) of the medical
image by the help of the 64 digit key in a cyclic
manner.
Step VII: Each of the components are combined to
form a final watermarked medical image
Fig 5 illustrated the watermarked medical image
generation process.

www.ijera.com

Fig 6 illustrated the QR Codes extraction process

figure 6: Secret QR code extraction process

IV.

figure 5: Generation of watermarked medical image
III.IV Secret QR Code Extraction Process
The secret QR Code extraction process
consists of following steps.
.
Step I: The watermarked medical image (800 X
600) is taken.
Step II: Then the watermarked color medical
image is sub divided into three color components,
red, green and blue.
. Step III: Three session based passwords for three
components (R, G and B) are taken from the
receiver.
Step IV: QR Codes are extracted from
watermarked image by reversing the embedding
process
Step V: Personal information of patient is retrieved
through QR Codes reader.
www.ijera.com

RESULTS AND DISCUSSION

The
proposed
approach
has
been
implemented in MATLAB 7.5.0. Fig 7&8 shows color
medical image and corresponding watermarked
medical image. TABLE 1 shows patient
information(Patient Details, Patient Address, Patient
Symptom),TABLE 2 depicts QR Code against
respective patient information, TABLE 3 shows
retrieved QR Code from watermarked medical image,
TABLE 4 illustrated PSNR value for imperceptibility,
TABLE 5 illustrated robustness against various
attacks(Salt& Pepper, Cropping and Compression by
converting watermarked medical image in „.PNG‟ and
„.TIFF‟ format) QR Codes containing patient
information are generated from http://www.theqrcode-generator.com.
Medical image: 800 X 600 (color)
Patient Personal Information
QR Codes: Three Monochromes (each 200 X 200)

figure 7: Color Doppler Cardio Image(800 X 600)

2044 | P a g e
Sirshendu Hore et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2042-2047
Table 1: Patient Information
Patient
Patient
Details
Address
Sirshendu Hore
Age:30
Sex:Male
Blood Group: A+

Address:
Hooghly,
West Bengal,
India

www.ijera.com

Patient
Symptom
Symptoms:
High BP
Chest Pain

Table 2: QR Code of Patient information
First
Third
Second
QR
QR
QR

figure 8: Watermarked Medical Image(800 X 600)
Table 3: Retrieved QR Code from watermarked
medical image
Retrieved
Retrieved
Retrieved
First QR
Second QR
Third QR

Table 4: PSNR value
Original image
and
Watermarked image

www.ijera.com

PSNR
40.23

2045 | P a g e
Sirshendu Hore et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2042-2047

www.ijera.com

Table 5: Sustainability against various attacks
Attacked
watermarked image

Attack

Recovered
First QR

Recovered
Second QR

Recovered
Third QR

Noise
(Salt &
Pepper,
20%)

Cropping
(25%)

Compression
(Converted
to .PNG
format)

Compression
(Converted
to .TIF
format)

V.

CONCLUSION

The work successfully authenticate legitimate
user by preserving the useful information within the
QR Codes against different attacks. In this work a QR
code is made of textual information and watermarked
is performed in spatial domain. The work can be
further extended by using an image instead of textual
data which is larger than the specified percentage of
error correction and watermark can be performed
either in the spatial domain or in the frequency
domain.

[2]

[3]

[4]
VI.
ACKNOWLEDGEMENTS
This work was supported by JISCE.
REFERENCES
[1]
Hsu, C.-T., Wu, J.-L, "Multiresolution
Watermarking for Digital images", in IEEE
Transactions on Circuits and Systems - II:
www.ijera.com

[5]

Analog and Digital Signal Processing, vol.
45, no. 8, pp. 1097-1101, 1998.
G. Langelaar, I. Setyawan, R.L. Lagendijk,
"Watermarking Digital Image and Video
Data", in IEEE Signal Processing Magazine,
vol 17, pp. 20-43, 2000
Gengming
Zhu,
and
Nong
Sang,
"Watermarking Algorithm Research and
Implementation Based on DCT Block",
World Academy of Science, Engineering and
Technology 45, 2008.
ISO/IEC
18004:2000(E),
"Information
technology Automatic identification and data
capture techniques Bar code symbology QR
Code", 2000.
S. Rungraungsilp and S. Vongpradhip, "QR
code using invisible watermarking in
frequency domain," IEEE Int. Conf. on ICT
and Knowledge Engineering (ICT &
2046 | P a g e
Sirshendu Hore et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2042-2047

[6]
[7]

[8]

[9]

[10]

www.ijera.com

Knowledge
Engineering),
2011
9th
International conference ,pp. 47-52 , January
2012
QR code, http://www.qrcode.Com/ en /
Dr. H. B. Kekre, Ms. Archana A. Athawale,
“Information Hiding using LSB Technique
with Increased Capacity”, International
Journal of Cryptography and Security,
special issue on Steganography, 2008
Rosanne English. Comparison of High
Capacity Steganography Techniques, IEEE
2010, pp.448
Tanmay Bhattacharya, Sandeep Bhowmik &
S. R. Bhadra Chaudhuri, “A steganographic
Approach by using Session Based StegoKey, Genetic Algorithm and Variable Bit
Replacement Technique” Proceedings IEEE
2008 International Conference on Computer
and Electrical Engineering (ICCEE-2008)
Thailand, Phuket, pp 51-55,2008.
Ran-Zan Wang, Chi-Fang Lin and Ja-Chen
Lin:
“Hiding data in images by optimal
moderately significant-bit replacement”
ELECTRONICS LETTERS 7th December
2000 Vol. 36 No. 25

www.ijera.com

2047 | P a g e

More Related Content

What's hot

Biometrics in India
Biometrics in IndiaBiometrics in India
Biometrics in India
Kshitij Behl
 
[IJET V2I3P6] Authors: Ajeeth, Sandhya raani M
[IJET V2I3P6] Authors:  Ajeeth, Sandhya raani M[IJET V2I3P6] Authors:  Ajeeth, Sandhya raani M
[IJET V2I3P6] Authors: Ajeeth, Sandhya raani M
IJET - International Journal of Engineering and Techniques
 
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
IAEME Publication
 
Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...
IAEME Publication
 
Report on smartcard lalsivaraj
Report on smartcard lalsivarajReport on smartcard lalsivaraj
Report on smartcard lalsivaraj
Lal Sivaraj
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...
Editor Jacotech
 

What's hot (19)

BLIND ASSISTANT SERVICE
BLIND ASSISTANT SERVICEBLIND ASSISTANT SERVICE
BLIND ASSISTANT SERVICE
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
 
Review: Biometric and GSM Security for Lockers
Review: Biometric and GSM Security for LockersReview: Biometric and GSM Security for Lockers
Review: Biometric and GSM Security for Lockers
 
IRJET - Audio Guide for Patient Regarding Doctor’s Prescription
IRJET - Audio Guide for Patient Regarding Doctor’s PrescriptionIRJET - Audio Guide for Patient Regarding Doctor’s Prescription
IRJET - Audio Guide for Patient Regarding Doctor’s Prescription
 
R01754129132
R01754129132R01754129132
R01754129132
 
Biometrics in India
Biometrics in IndiaBiometrics in India
Biometrics in India
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint Authentication
 
[IJET V2I3P6] Authors: Ajeeth, Sandhya raani M
[IJET V2I3P6] Authors:  Ajeeth, Sandhya raani M[IJET V2I3P6] Authors:  Ajeeth, Sandhya raani M
[IJET V2I3P6] Authors: Ajeeth, Sandhya raani M
 
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
 
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
 
Finger print based security system
Finger print based security systemFinger print based security system
Finger print based security system
 
Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...
 
Security Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage DevicesSecurity Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage Devices
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pcLow cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pc
 
Report on smartcard lalsivaraj
Report on smartcard lalsivarajReport on smartcard lalsivaraj
Report on smartcard lalsivaraj
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...
 

Viewers also liked

Lockbourne aaf, ohio jan. 7, 1948
Lockbourne aaf, ohio jan. 7, 1948Lockbourne aaf, ohio jan. 7, 1948
Lockbourne aaf, ohio jan. 7, 1948
Clifford Stone
 

Viewers also liked (20)

Lz3620532059
Lz3620532059Lz3620532059
Lz3620532059
 
Mk3621242127
Mk3621242127Mk3621242127
Mk3621242127
 
Lq3620002008
Lq3620002008Lq3620002008
Lq3620002008
 
Lw3620362041
Lw3620362041Lw3620362041
Lw3620362041
 
Lu3620212028
Lu3620212028Lu3620212028
Lu3620212028
 
Mb3620672070
Mb3620672070Mb3620672070
Mb3620672070
 
Lr3620092012
Lr3620092012Lr3620092012
Lr3620092012
 
Mc3620712075
Mc3620712075Mc3620712075
Mc3620712075
 
Lo3619861992
Lo3619861992Lo3619861992
Lo3619861992
 
Ls3620132016
Ls3620132016Ls3620132016
Ls3620132016
 
Ly3620482052
Ly3620482052Ly3620482052
Ly3620482052
 
Lp3619931999
Lp3619931999Lp3619931999
Lp3619931999
 
Ma3620602066
Ma3620602066Ma3620602066
Ma3620602066
 
Cd4301458461
Cd4301458461Cd4301458461
Cd4301458461
 
Inteligensia muslim dan kuasa
Inteligensia muslim dan kuasaInteligensia muslim dan kuasa
Inteligensia muslim dan kuasa
 
Clinical audit
Clinical audit Clinical audit
Clinical audit
 
Lockbourne aaf, ohio jan. 7, 1948
Lockbourne aaf, ohio jan. 7, 1948Lockbourne aaf, ohio jan. 7, 1948
Lockbourne aaf, ohio jan. 7, 1948
 
Qué es un blog
Qué es un blogQué es un blog
Qué es un blog
 
Miercoles 5 nov. a
Miercoles 5 nov. aMiercoles 5 nov. a
Miercoles 5 nov. a
 
Daffodil principle
Daffodil principleDaffodil principle
Daffodil principle
 

Similar to Lx3620422047

Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
IOSR Journals
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
ZiadAlqady
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
ZiadAlqady
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
ZiadAlqady
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance system
IJECEIAES
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 

Similar to Lx3620422047 (20)

M dgx mde0mdi=
M dgx mde0mdi=M dgx mde0mdi=
M dgx mde0mdi=
 
A blind steganography approach for hiding privacy details in images of digit...
A blind steganography approach for hiding privacy details in  images of digit...A blind steganography approach for hiding privacy details in  images of digit...
A blind steganography approach for hiding privacy details in images of digit...
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
 
Secure E- Health Care Model
Secure E- Health Care ModelSecure E- Health Care Model
Secure E- Health Care Model
 
Survey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcodeSurvey on information hiding techniques using qr barcode
Survey on information hiding techniques using qr barcode
 
Iris images encryption based on QR code and chaotic map
Iris images encryption based on QR code and chaotic mapIris images encryption based on QR code and chaotic map
Iris images encryption based on QR code and chaotic map
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance system
 
A04820104
A04820104A04820104
A04820104
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
 
7 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-857 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-85
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Lx3620422047

  • 1. Sirshendu Hore et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2042-2047 RESEARCH ARTICLE www.ijera.com OPEN ACCESS A Sustainable Medical Image Authentication Technique in Spatial Domain Using Multiple QR Code Sirshendu Hore*, Tanmay Bhattacharya**, S. R. Bhadra Chaudhuri*** *(Department of Computer Science, HETC, WB, INDIA) ** (Department of Information Technology, JIS College of Engineering, WB, INDIA) *** (Department of E&TCE, BSEU, WB, INDIA) ABSTRACT Nowadays there is a need to protect our health related information for authentication and privacy purpose. In the proposed work multiple QR codes are watermarked inside a single color medical image using Variable Bit Replacement (VBR) technique. Three different 128 bit session keys are used to watermark QR Codes in three different color components (R, G and B) of a single color medical image. The QR Code is embedded in between moderately significant bit (MdSB) and least significant bit (LSB). The watermarked extraction process determines an invisible watermark in the image by reversing the embedding process. Results show that the process is robust against different attacks and imperceptibility is quite good. Keywords - QR Code, VBR, Session based, Multiple Keys, DCT, Image Watermark I. INTRODUCTION Health related information is always very sensitive and private to all of us. Maintaining the integrity and protecting such information is a challenging area in the field health related service. The rapid development in the field of information technology in recent years has made the situation worse as data can be tampered very easily, since most of our health related information are now stored in digital image format. Therefore, through some well defined method we need to authenticate those images and make sure the image belongs to the intended patient hence the image‟s integrity is maintained. Thus call for a good and strong authentication system. Security researchers in this field are looking for a better way to meet the stated challenge. Digital watermark [1, 2, 3] is one of the appropriate solutions to meet those problems and challenges. In Digital watermark the main objective is to communicate securely so that the sensitive information is not exposed to the observer or viewer. The most two important issue related to digital watermark are: Imperceptibility: The visibility of the secret and sensitive information to the human eyes. Capacity: Volume of secret and sensitive information that can be embedded inside the medical image. through the use of medical imaging. Fig 1 illustrated the hepatic portal venous gas of a patient. figure 1: A Hepatic portal venous gas of a patient. (800 X 600) I.II QR Code: [4, 5, 6]. records information of an item in the form of a machine-readable label which is encoded and can be attached to that item. Message with in a QR Code can be known through standard QR Code reader or by using the smart phone. To store or encoded information within a QR code we can make use of four standardized modes of data such as alphanumeric, byte or binary, numeric and kanji. I.1 Medical Imaging: In order to monitor, diagnose, or treat medical condition for human body we used medical imaging. Numerous diverse technologies are used in medical imaging to provide different information related to the area of the body being studied or treated. Thus one can easily measure the effectiveness of medical treatment, injury, disease etc figure 2: QR Code www.ijera.com 2042 | P a g e
  • 2. Sirshendu Hore et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2042-2047 www.ijera.com Advantage: The QR Code system has become popular due to its fast readability and greater storage capacity compared to standard UPC barcodes. Limitation: If the size of the QR Code is about 100 characters or more, it seems likely that most smart phones or reader will have trouble while reading QR Code. II. LITERATURE REVIEW Spatial Domain Model: In spatial domain technique, the embedding of secret messages is done directly. Some of the popular spatial domain embedding methods is: II.1 Least Significant Bit (LSB) LSB [7] replacement scheme is the simplest method which is capable of communicating large payloads and imperceptible to human eye. Limitation of LSB is that it can be easily detected by the histogram analysis or if the watermarked image is distorted by means of noise II.II Bit Plane Complexity Steganography (BPCS) BPCS [8] was proposed by Rosanne English which is much more efficient than the LSB technique. In this scheme the image is initially decomposed into eight different layers. Based on complexity, every block is further subdivided into noisy, artificially informative or naturally informative layers. Embedding is done from the lowest layers towards the highest ones. The BPCS scheme can defy statistical attacks in a enhanced way. figure 3: QR Code generation Process. III.II Session Key Generation Process: Step I: A Session based password is taken from the user (say “SHore") for Red color component Step II: 32 character key has been generated from the password using MD5 hash algorithm.( “Say 2de46b5a62fad83f47d528e6f541d5f4”) Step III: 128 bit sequence has been generated from 32 characters key. Step IV: Afterwards 64 digit (consisting of 0, 1,2and 3) key is generated from the 128 bit sequence by combining the adjacent value. Step V: Steps I to IV are repeated for both Blue and Green component also. Fig 4 illustrated the session based key generation process. II.III Variable bit replacement (VBR) In the variable bit replacement technique [9] the information is embedded within the host image at variable positions. The information‟s are embedded between LSB and MdSB [10]. At the time of extraction of secret information is extracted by reversing the embedding process III. THE PROPOSED SCHEME In the proposed scheme we are going to hide multiple QR Codes in different color component of a medical image. The total process is divided into 4 major steps: QR Code generation from the patient information, Session key generation process, Secret QR Code embedding process and secret QR Code extraction process. III.I QR Code Generation Process Three QR Codes (200 X 200) are generated consist of patient personal and sensitive information. Fig. 3 illustrated the QR Code generation process from patient personal information www.ijera.com figure 4: Session Key Generation process III.III Secret QR Code Embedding Process The secret QR Code embedding process consists of following steps. Step I: A color medical image (800 X 600) is taken. Step II: Then the color medical image is sub divided into three color components, red, green and blue. Step III. Three sessional passwords for three components (R, G and B) are taken from the user. 2043 | P a g e
  • 3. Sirshendu Hore et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2042-2047 Step IV. QR Codes which are generated earlier in QR Code Generation process is now converted into binary numbers and finally reshape into 1D Vector. Step V. Three 64 digit keys are generated from the passwords for three color components, as stated in the session key generation process. These Keys indicate the position of the color medical image where QR Codes are to be embedded. For a sequence of binary number 00, 01, 10 and 11 the decimal values are 0 1, 2 and 3. Here 0 indicates last bit, 1 indicates 2nd last bit, 2 indicates 3rd last bit and 3 indicates 4th last bit. Step VI: QR Codes are then embedded within color components (R, G and B) of the medical image by the help of the 64 digit key in a cyclic manner. Step VII: Each of the components are combined to form a final watermarked medical image Fig 5 illustrated the watermarked medical image generation process. www.ijera.com Fig 6 illustrated the QR Codes extraction process figure 6: Secret QR code extraction process IV. figure 5: Generation of watermarked medical image III.IV Secret QR Code Extraction Process The secret QR Code extraction process consists of following steps. . Step I: The watermarked medical image (800 X 600) is taken. Step II: Then the watermarked color medical image is sub divided into three color components, red, green and blue. . Step III: Three session based passwords for three components (R, G and B) are taken from the receiver. Step IV: QR Codes are extracted from watermarked image by reversing the embedding process Step V: Personal information of patient is retrieved through QR Codes reader. www.ijera.com RESULTS AND DISCUSSION The proposed approach has been implemented in MATLAB 7.5.0. Fig 7&8 shows color medical image and corresponding watermarked medical image. TABLE 1 shows patient information(Patient Details, Patient Address, Patient Symptom),TABLE 2 depicts QR Code against respective patient information, TABLE 3 shows retrieved QR Code from watermarked medical image, TABLE 4 illustrated PSNR value for imperceptibility, TABLE 5 illustrated robustness against various attacks(Salt& Pepper, Cropping and Compression by converting watermarked medical image in „.PNG‟ and „.TIFF‟ format) QR Codes containing patient information are generated from http://www.theqrcode-generator.com. Medical image: 800 X 600 (color) Patient Personal Information QR Codes: Three Monochromes (each 200 X 200) figure 7: Color Doppler Cardio Image(800 X 600) 2044 | P a g e
  • 4. Sirshendu Hore et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2042-2047 Table 1: Patient Information Patient Patient Details Address Sirshendu Hore Age:30 Sex:Male Blood Group: A+ Address: Hooghly, West Bengal, India www.ijera.com Patient Symptom Symptoms: High BP Chest Pain Table 2: QR Code of Patient information First Third Second QR QR QR figure 8: Watermarked Medical Image(800 X 600) Table 3: Retrieved QR Code from watermarked medical image Retrieved Retrieved Retrieved First QR Second QR Third QR Table 4: PSNR value Original image and Watermarked image www.ijera.com PSNR 40.23 2045 | P a g e
  • 5. Sirshendu Hore et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2042-2047 www.ijera.com Table 5: Sustainability against various attacks Attacked watermarked image Attack Recovered First QR Recovered Second QR Recovered Third QR Noise (Salt & Pepper, 20%) Cropping (25%) Compression (Converted to .PNG format) Compression (Converted to .TIF format) V. CONCLUSION The work successfully authenticate legitimate user by preserving the useful information within the QR Codes against different attacks. In this work a QR code is made of textual information and watermarked is performed in spatial domain. The work can be further extended by using an image instead of textual data which is larger than the specified percentage of error correction and watermark can be performed either in the spatial domain or in the frequency domain. [2] [3] [4] VI. ACKNOWLEDGEMENTS This work was supported by JISCE. REFERENCES [1] Hsu, C.-T., Wu, J.-L, "Multiresolution Watermarking for Digital images", in IEEE Transactions on Circuits and Systems - II: www.ijera.com [5] Analog and Digital Signal Processing, vol. 45, no. 8, pp. 1097-1101, 1998. G. Langelaar, I. Setyawan, R.L. Lagendijk, "Watermarking Digital Image and Video Data", in IEEE Signal Processing Magazine, vol 17, pp. 20-43, 2000 Gengming Zhu, and Nong Sang, "Watermarking Algorithm Research and Implementation Based on DCT Block", World Academy of Science, Engineering and Technology 45, 2008. ISO/IEC 18004:2000(E), "Information technology Automatic identification and data capture techniques Bar code symbology QR Code", 2000. S. Rungraungsilp and S. Vongpradhip, "QR code using invisible watermarking in frequency domain," IEEE Int. Conf. on ICT and Knowledge Engineering (ICT & 2046 | P a g e
  • 6. Sirshendu Hore et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2042-2047 [6] [7] [8] [9] [10] www.ijera.com Knowledge Engineering), 2011 9th International conference ,pp. 47-52 , January 2012 QR code, http://www.qrcode.Com/ en / Dr. H. B. Kekre, Ms. Archana A. Athawale, “Information Hiding using LSB Technique with Increased Capacity”, International Journal of Cryptography and Security, special issue on Steganography, 2008 Rosanne English. Comparison of High Capacity Steganography Techniques, IEEE 2010, pp.448 Tanmay Bhattacharya, Sandeep Bhowmik & S. R. Bhadra Chaudhuri, “A steganographic Approach by using Session Based StegoKey, Genetic Algorithm and Variable Bit Replacement Technique” Proceedings IEEE 2008 International Conference on Computer and Electrical Engineering (ICCEE-2008) Thailand, Phuket, pp 51-55,2008. Ran-Zan Wang, Chi-Fang Lin and Ja-Chen Lin: “Hiding data in images by optimal moderately significant-bit replacement” ELECTRONICS LETTERS 7th December 2000 Vol. 36 No. 25 www.ijera.com 2047 | P a g e