Advertisement

Enhanced Techniques to Secure Medical Image and Data Transit

  • S. Uma MaheswariEmail author
  • C. Vasanthanayaki
Conference paper
Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB, volume 30)

Abstract

This paper displays the work related to the secured medical picture transmission in light of watermarking and encryption. Client particular watermark is installed into the LSB of unique picture. Implanting watermark in LSB does not influence the nature of picture. This watermarked picture is then encoded by utilizing a pixel repositioning calculation. Every pixel is repositioned in light of the rest of after division by number 10. This leftover portion lattice goes about as encryption key and is required at the season of unscrambling as well. Comprehensive analyses are completed on proposed approach. The outcomes demonstrate that the watermark inserted is intangible and can be effectively separated at the recipient. Likewise, the encoded picture has no visual importance with the first picture and histogram of scrambled picture is changed. Encoded picture can be decoded with no loss of data from the picture. From this decoded picture watermark can be removed which endures no misfortune in the watermark. PSNR esteems for an arrangement of medicinal pictures are fulfilling.

Keywords

Restorative imaging Digital Watermark LSB PSNR 

References

  1. 1.
    Yang Z-H, Li A-H, Yu L-L, Kang S-J, Han M-J, Ding Q (2015) An improved AES encryption algorithm based on chaos theory in wireless communication networks. In: Third international conference on robot, vision and signal processingGoogle Scholar
  2. 2.
    Patel K, Ragha L (2015) Binary image steganography in wavelet domain. In: International conference on industrial instrumentation and control (ICIC)Google Scholar
  3. 3.
    Jyoti RH, Neginal J (2015) A new secure image transmission technique via secret-fragment-visible mosaic image. Int J Adv Res Comput Eng Technol (IJARCET) 4(5)Google Scholar
  4. 4.
    Tasneem SF, DurgaBhvni S (2014) Secure data transmission using cryptography and steganography. Int J Emerg Trends Electr Electron 10(9)Google Scholar
  5. 5.
    Saraf KR, Jagtap VP, Mishra AK (2014) Text and image encryption decryption using advanced encryption standard. Int J Emerg Trends Technol Comput Sci (IJETTCS) 3(3)Google Scholar
  6. 6.
    Maitri PV, Sarawade RV, Deokate ST, Patil MP (2014) Secure file transmission using byte rotation algorithm in network security. In: International conference for convergence of technologyGoogle Scholar
  7. 7.
    Khandelwal P, Sahu B (2014) Novel technique data-hiding scheme for digital imageGoogle Scholar
  8. 8.
    Singh P, Singh K (2013) Image encryption and decryption using blowfish algorithm in MATLAB. Int J Sci Eng Res 4(7)Google Scholar
  9. 9.
    Jesima Banu A, Velayutham R (2013) Secure communication in wireless sensor networks using AES algorithm with delay efficient sleep scheduling. In: 2013 IEEE international conference on emerging trends in computing, communication and nanotechnology (ICECCN 2013)Google Scholar
  10. 10.
    Buslim N, Ahmad SS Steganography for inserting message on digital image using least significant bit and AES cryptographic algorithmGoogle Scholar
  11. 11.
    Tang H, Jin G, Wu C, Song P (2009) A new image encryption and steganography scheme. In: 2009 international conference on computer and communications securityGoogle Scholar
  12. 12.
    Rad NB, Shah-Hosseini H (2008) GBHE: Grid-based cryptography with AES algorithm. In: 2008 international conference on computer and electrical engineeringGoogle Scholar
  13. 13.
    Balamurugan G, Senthil M (2016) A fingerprint based reversible watermarking system for the security of medical informationGoogle Scholar
  14. 14.
    Nemade H, Kelkar V (2016) Reversible watermarking for colored medical image using histrogram shifting methodGoogle Scholar
  15. 15.
    Kaur S, Lal M (2015) An invisible watermarking scheme based on Modified Fast Haar Wavelet Transform and RSGWPT. IEEEGoogle Scholar
  16. 16.
    Paul A, Sunitha EV (2015) Distortion less watermarking of relational databases based on circular histogram modulation. In: 2015 international conference on circuit, power and computing technologiesGoogle Scholar
  17. 17.
    Kumar A, Gupta M (2015) Semi visible watermarking scheme based on DWT and PCA. IEEEGoogle Scholar
  18. 18.
    Boland FM, Kuannitlh JJ (2007) Watermarking digital images for copyright protection. Image Processing and Its Applications, 4–6 July 2007Google Scholar
  19. 19.
    Chang C-C, Lu T-C (2007) Noise features for image tampering detection and steganalysis. IEEEGoogle Scholar
  20. 20.
    Shukla RJ (2014) Platform independent real time copyright protection embedding and extraction algorithms on android and embedded framework. IEEEGoogle Scholar
  21. 21.
    Mathon B et al (2011) A parametric solution for optimal overlapped block motion compensation. IEEEGoogle Scholar
  22. 22.
    Peng J (2011) The research on digital watermarking algorithm based on neural networks and singular value decomposition. IEEEGoogle Scholar
  23. 23.
    Kamran M, Farooq M (2009) A new spatial decomposition scheme for image content-based watermarking. IEEEGoogle Scholar
  24. 24.
    Kishor PP, Yankat N (2014) Medical image watermarking using RSA encryption in wavelet domain. IEEEGoogle Scholar
  25. 25.
    Dragoi I-C, Coltuc D (2014) Local-prediction-based difference expansion reversible watermarking. IEEE Trans Image Process 23:1779–1790MathSciNetCrossRefGoogle Scholar
  26. 26.
    Su P-C, Wu C-Y et al (2013) Geometrically resilient digital image watermarking by using interest point extraction and extended pilot signals. IEEE Trans Inf Forensics Secur 8:1897–1908CrossRefGoogle Scholar
  27. 27.
    Panyavaraporn J (2013) QR code watermarking algorithm based on wavelet Symposium transform. In: 2013 13th international symposium on communications and information technologies (ISCIT), Sept 2013Google Scholar
  28. 28.
    Abdallah HA, Hadhoud MM, Abdalla Hameed (2011) Blind wavelet based image watermarking. Int J Signal Process Image Process Patter Recogn 4(1)Google Scholar
  29. 29.
    Lin Y-H, Wu J-L (2011) A digital blind watermarking for depth-image-based rendering 3D images. IEEE Trans Broadcast 57:602–611CrossRefGoogle Scholar
  30. 30.
    Zhang F et al (2011) Spread spectrum image watermarking based on perceptual quality metric. IEEE Trans Image Process 20:3207–3218MathSciNetCrossRefGoogle Scholar
  31. 31.
    Tang C-W, Hang H-M (2003) A feature-based robust digital image watermarking scheme. IEEE Trans Signal Process 51:950–959MathSciNetCrossRefGoogle Scholar
  32. 32.
    Guerrini F, Okuda M, Adami N, Leonardi R (2011) High dynamic range image watermarking robust against tone-mapping operators. IEEE Trans Inf Forensics Secur 6:283–295CrossRefGoogle Scholar
  33. 33.
    Sundari M, Revathi PB, Sumesh S (2015) Secure communication using digital watermarking with encrypted text hidden into an imageGoogle Scholar
  34. 34.
    Patel P, Patel Y (2015) Secure and authentic DCT image steganography through DWT—SVD based Digital watermarking with RSA encryption. In: 2015 fifth international conference on communication systems and network technologiesGoogle Scholar
  35. 35.
    Gayathri R, Nagarajan V (2015) Secure data hiding using Steganographic technique with Visual Cryptography and Watermarking Scheme. In: IEEE ICCSP 2015 conferenceGoogle Scholar
  36. 36.
    Kishor PV, Venkatraman N, Reddy SS (2014) Medical image watermarking using RSA encryption in wavelet domain. IEEEGoogle Scholar
  37. 37.
    Suganya G, Amudha K (2013) Medical image integrity control using join encryption and watermarking techniques. IEEEGoogle Scholar
  38. 38.
    Dong L, Bai H (2012) Medical image watermarking algorithm with encryption by DCT and logistic. IEEEGoogle Scholar
  39. 39.
    Farah T, Hermassi H, Rhoouma R, Belghith S (2012) Watermarking and encryption scheme to secure multimedia information. IEEEGoogle Scholar
  40. 40.
    Khan MI, Jeoti V, Malik AS, Khan MF ( 2011) A joint watermarking and encryption scheme for DCT based codecs. In: 2011 17th Asia-Pacific conference on communications (APCC)Google Scholar
  41. 41.
    Bouslimi D, Coatrieux G, Roux C (2011) A joint watermarking/encryption algorithm for verifying medical image integrity and authenticity in both encrypted and spatial domainsGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of CSEKumaraguru College of TechnologyCoimbatoreIndia
  2. 2.Department of ECEGovernment College of TechnologyCoimbatoreIndia

Personalised recommendations