Skip to main content

Part of the book series: Lecture Notes in Computational Vision and Biomechanics ((LNCVB,volume 30))

  • 1703 Accesses

Abstract

This paper displays the work related to the secured medical picture transmission in light of watermarking and encryption. Client particular watermark is installed into the LSB of unique picture. Implanting watermark in LSB does not influence the nature of picture. This watermarked picture is then encoded by utilizing a pixel repositioning calculation. Every pixel is repositioned in light of the rest of after division by number 10. This leftover portion lattice goes about as encryption key and is required at the season of unscrambling as well. Comprehensive analyses are completed on proposed approach. The outcomes demonstrate that the watermark inserted is intangible and can be effectively separated at the recipient. Likewise, the encoded picture has no visual importance with the first picture and histogram of scrambled picture is changed. Encoded picture can be decoded with no loss of data from the picture. From this decoded picture watermark can be removed which endures no misfortune in the watermark. PSNR esteems for an arrangement of medicinal pictures are fulfilling.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yang Z-H, Li A-H, Yu L-L, Kang S-J, Han M-J, Ding Q (2015) An improved AES encryption algorithm based on chaos theory in wireless communication networks. In: Third international conference on robot, vision and signal processing

    Google Scholar 

  2. Patel K, Ragha L (2015) Binary image steganography in wavelet domain. In: International conference on industrial instrumentation and control (ICIC)

    Google Scholar 

  3. Jyoti RH, Neginal J (2015) A new secure image transmission technique via secret-fragment-visible mosaic image. Int J Adv Res Comput Eng Technol (IJARCET) 4(5)

    Google Scholar 

  4. Tasneem SF, DurgaBhvni S (2014) Secure data transmission using cryptography and steganography. Int J Emerg Trends Electr Electron 10(9)

    Google Scholar 

  5. Saraf KR, Jagtap VP, Mishra AK (2014) Text and image encryption decryption using advanced encryption standard. Int J Emerg Trends Technol Comput Sci (IJETTCS) 3(3)

    Google Scholar 

  6. Maitri PV, Sarawade RV, Deokate ST, Patil MP (2014) Secure file transmission using byte rotation algorithm in network security. In: International conference for convergence of technology

    Google Scholar 

  7. Khandelwal P, Sahu B (2014) Novel technique data-hiding scheme for digital image

    Google Scholar 

  8. Singh P, Singh K (2013) Image encryption and decryption using blowfish algorithm in MATLAB. Int J Sci Eng Res 4(7)

    Google Scholar 

  9. Jesima Banu A, Velayutham R (2013) Secure communication in wireless sensor networks using AES algorithm with delay efficient sleep scheduling. In: 2013 IEEE international conference on emerging trends in computing, communication and nanotechnology (ICECCN 2013)

    Google Scholar 

  10. Buslim N, Ahmad SS Steganography for inserting message on digital image using least significant bit and AES cryptographic algorithm

    Google Scholar 

  11. Tang H, Jin G, Wu C, Song P (2009) A new image encryption and steganography scheme. In: 2009 international conference on computer and communications security

    Google Scholar 

  12. Rad NB, Shah-Hosseini H (2008) GBHE: Grid-based cryptography with AES algorithm. In: 2008 international conference on computer and electrical engineering

    Google Scholar 

  13. Balamurugan G, Senthil M (2016) A fingerprint based reversible watermarking system for the security of medical information

    Google Scholar 

  14. Nemade H, Kelkar V (2016) Reversible watermarking for colored medical image using histrogram shifting method

    Google Scholar 

  15. Kaur S, Lal M (2015) An invisible watermarking scheme based on Modified Fast Haar Wavelet Transform and RSGWPT. IEEE

    Google Scholar 

  16. Paul A, Sunitha EV (2015) Distortion less watermarking of relational databases based on circular histogram modulation. In: 2015 international conference on circuit, power and computing technologies

    Google Scholar 

  17. Kumar A, Gupta M (2015) Semi visible watermarking scheme based on DWT and PCA. IEEE

    Google Scholar 

  18. Boland FM, Kuannitlh JJ (2007) Watermarking digital images for copyright protection. Image Processing and Its Applications, 4–6 July 2007

    Google Scholar 

  19. Chang C-C, Lu T-C (2007) Noise features for image tampering detection and steganalysis. IEEE

    Google Scholar 

  20. Shukla RJ (2014) Platform independent real time copyright protection embedding and extraction algorithms on android and embedded framework. IEEE

    Google Scholar 

  21. Mathon B et al (2011) A parametric solution for optimal overlapped block motion compensation. IEEE

    Google Scholar 

  22. Peng J (2011) The research on digital watermarking algorithm based on neural networks and singular value decomposition. IEEE

    Google Scholar 

  23. Kamran M, Farooq M (2009) A new spatial decomposition scheme for image content-based watermarking. IEEE

    Google Scholar 

  24. Kishor PP, Yankat N (2014) Medical image watermarking using RSA encryption in wavelet domain. IEEE

    Google Scholar 

  25. Dragoi I-C, Coltuc D (2014) Local-prediction-based difference expansion reversible watermarking. IEEE Trans Image Process 23:1779–1790

    Article  MathSciNet  MATH  Google Scholar 

  26. Su P-C, Wu C-Y et al (2013) Geometrically resilient digital image watermarking by using interest point extraction and extended pilot signals. IEEE Trans Inf Forensics Secur 8:1897–1908

    Article  Google Scholar 

  27. Panyavaraporn J (2013) QR code watermarking algorithm based on wavelet Symposium transform. In: 2013 13th international symposium on communications and information technologies (ISCIT), Sept 2013

    Google Scholar 

  28. Abdallah HA, Hadhoud MM, Abdalla Hameed (2011) Blind wavelet based image watermarking. Int J Signal Process Image Process Patter Recogn 4(1)

    Google Scholar 

  29. Lin Y-H, Wu J-L (2011) A digital blind watermarking for depth-image-based rendering 3D images. IEEE Trans Broadcast 57:602–611

    Article  Google Scholar 

  30. Zhang F et al (2011) Spread spectrum image watermarking based on perceptual quality metric. IEEE Trans Image Process 20:3207–3218

    Article  MathSciNet  MATH  Google Scholar 

  31. Tang C-W, Hang H-M (2003) A feature-based robust digital image watermarking scheme. IEEE Trans Signal Process 51:950–959

    Article  MathSciNet  MATH  Google Scholar 

  32. Guerrini F, Okuda M, Adami N, Leonardi R (2011) High dynamic range image watermarking robust against tone-mapping operators. IEEE Trans Inf Forensics Secur 6:283–295

    Article  Google Scholar 

  33. Sundari M, Revathi PB, Sumesh S (2015) Secure communication using digital watermarking with encrypted text hidden into an image

    Google Scholar 

  34. Patel P, Patel Y (2015) Secure and authentic DCT image steganography through DWT—SVD based Digital watermarking with RSA encryption. In: 2015 fifth international conference on communication systems and network technologies

    Google Scholar 

  35. Gayathri R, Nagarajan V (2015) Secure data hiding using Steganographic technique with Visual Cryptography and Watermarking Scheme. In: IEEE ICCSP 2015 conference

    Google Scholar 

  36. Kishor PV, Venkatraman N, Reddy SS (2014) Medical image watermarking using RSA encryption in wavelet domain. IEEE

    Google Scholar 

  37. Suganya G, Amudha K (2013) Medical image integrity control using join encryption and watermarking techniques. IEEE

    Google Scholar 

  38. Dong L, Bai H (2012) Medical image watermarking algorithm with encryption by DCT and logistic. IEEE

    Google Scholar 

  39. Farah T, Hermassi H, Rhoouma R, Belghith S (2012) Watermarking and encryption scheme to secure multimedia information. IEEE

    Google Scholar 

  40. Khan MI, Jeoti V, Malik AS, Khan MF ( 2011) A joint watermarking and encryption scheme for DCT based codecs. In: 2011 17th Asia-Pacific conference on communications (APCC)

    Google Scholar 

  41. Bouslimi D, Coatrieux G, Roux C (2011) A joint watermarking/encryption algorithm for verifying medical image integrity and authenticity in both encrypted and spatial domains

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Uma Maheswari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Uma Maheswari, S., Vasanthanayaki, C. (2019). Enhanced Techniques to Secure Medical Image and Data Transit. In: Pandian, D., Fernando, X., Baig, Z., Shi, F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and Biomechanics, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-030-00665-5_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00665-5_40

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00664-8

  • Online ISBN: 978-3-030-00665-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics