Abstract
This paper displays the work related to the secured medical picture transmission in light of watermarking and encryption. Client particular watermark is installed into the LSB of unique picture. Implanting watermark in LSB does not influence the nature of picture. This watermarked picture is then encoded by utilizing a pixel repositioning calculation. Every pixel is repositioned in light of the rest of after division by number 10. This leftover portion lattice goes about as encryption key and is required at the season of unscrambling as well. Comprehensive analyses are completed on proposed approach. The outcomes demonstrate that the watermark inserted is intangible and can be effectively separated at the recipient. Likewise, the encoded picture has no visual importance with the first picture and histogram of scrambled picture is changed. Encoded picture can be decoded with no loss of data from the picture. From this decoded picture watermark can be removed which endures no misfortune in the watermark. PSNR esteems for an arrangement of medicinal pictures are fulfilling.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yang Z-H, Li A-H, Yu L-L, Kang S-J, Han M-J, Ding Q (2015) An improved AES encryption algorithm based on chaos theory in wireless communication networks. In: Third international conference on robot, vision and signal processing
Patel K, Ragha L (2015) Binary image steganography in wavelet domain. In: International conference on industrial instrumentation and control (ICIC)
Jyoti RH, Neginal J (2015) A new secure image transmission technique via secret-fragment-visible mosaic image. Int J Adv Res Comput Eng Technol (IJARCET) 4(5)
Tasneem SF, DurgaBhvni S (2014) Secure data transmission using cryptography and steganography. Int J Emerg Trends Electr Electron 10(9)
Saraf KR, Jagtap VP, Mishra AK (2014) Text and image encryption decryption using advanced encryption standard. Int J Emerg Trends Technol Comput Sci (IJETTCS) 3(3)
Maitri PV, Sarawade RV, Deokate ST, Patil MP (2014) Secure file transmission using byte rotation algorithm in network security. In: International conference for convergence of technology
Khandelwal P, Sahu B (2014) Novel technique data-hiding scheme for digital image
Singh P, Singh K (2013) Image encryption and decryption using blowfish algorithm in MATLAB. Int J Sci Eng Res 4(7)
Jesima Banu A, Velayutham R (2013) Secure communication in wireless sensor networks using AES algorithm with delay efficient sleep scheduling. In: 2013 IEEE international conference on emerging trends in computing, communication and nanotechnology (ICECCN 2013)
Buslim N, Ahmad SS Steganography for inserting message on digital image using least significant bit and AES cryptographic algorithm
Tang H, Jin G, Wu C, Song P (2009) A new image encryption and steganography scheme. In: 2009 international conference on computer and communications security
Rad NB, Shah-Hosseini H (2008) GBHE: Grid-based cryptography with AES algorithm. In: 2008 international conference on computer and electrical engineering
Balamurugan G, Senthil M (2016) A fingerprint based reversible watermarking system for the security of medical information
Nemade H, Kelkar V (2016) Reversible watermarking for colored medical image using histrogram shifting method
Kaur S, Lal M (2015) An invisible watermarking scheme based on Modified Fast Haar Wavelet Transform and RSGWPT. IEEE
Paul A, Sunitha EV (2015) Distortion less watermarking of relational databases based on circular histogram modulation. In: 2015 international conference on circuit, power and computing technologies
Kumar A, Gupta M (2015) Semi visible watermarking scheme based on DWT and PCA. IEEE
Boland FM, Kuannitlh JJ (2007) Watermarking digital images for copyright protection. Image Processing and Its Applications, 4–6 July 2007
Chang C-C, Lu T-C (2007) Noise features for image tampering detection and steganalysis. IEEE
Shukla RJ (2014) Platform independent real time copyright protection embedding and extraction algorithms on android and embedded framework. IEEE
Mathon B et al (2011) A parametric solution for optimal overlapped block motion compensation. IEEE
Peng J (2011) The research on digital watermarking algorithm based on neural networks and singular value decomposition. IEEE
Kamran M, Farooq M (2009) A new spatial decomposition scheme for image content-based watermarking. IEEE
Kishor PP, Yankat N (2014) Medical image watermarking using RSA encryption in wavelet domain. IEEE
Dragoi I-C, Coltuc D (2014) Local-prediction-based difference expansion reversible watermarking. IEEE Trans Image Process 23:1779–1790
Su P-C, Wu C-Y et al (2013) Geometrically resilient digital image watermarking by using interest point extraction and extended pilot signals. IEEE Trans Inf Forensics Secur 8:1897–1908
Panyavaraporn J (2013) QR code watermarking algorithm based on wavelet Symposium transform. In: 2013 13th international symposium on communications and information technologies (ISCIT), Sept 2013
Abdallah HA, Hadhoud MM, Abdalla Hameed (2011) Blind wavelet based image watermarking. Int J Signal Process Image Process Patter Recogn 4(1)
Lin Y-H, Wu J-L (2011) A digital blind watermarking for depth-image-based rendering 3D images. IEEE Trans Broadcast 57:602–611
Zhang F et al (2011) Spread spectrum image watermarking based on perceptual quality metric. IEEE Trans Image Process 20:3207–3218
Tang C-W, Hang H-M (2003) A feature-based robust digital image watermarking scheme. IEEE Trans Signal Process 51:950–959
Guerrini F, Okuda M, Adami N, Leonardi R (2011) High dynamic range image watermarking robust against tone-mapping operators. IEEE Trans Inf Forensics Secur 6:283–295
Sundari M, Revathi PB, Sumesh S (2015) Secure communication using digital watermarking with encrypted text hidden into an image
Patel P, Patel Y (2015) Secure and authentic DCT image steganography through DWT—SVD based Digital watermarking with RSA encryption. In: 2015 fifth international conference on communication systems and network technologies
Gayathri R, Nagarajan V (2015) Secure data hiding using Steganographic technique with Visual Cryptography and Watermarking Scheme. In: IEEE ICCSP 2015 conference
Kishor PV, Venkatraman N, Reddy SS (2014) Medical image watermarking using RSA encryption in wavelet domain. IEEE
Suganya G, Amudha K (2013) Medical image integrity control using join encryption and watermarking techniques. IEEE
Dong L, Bai H (2012) Medical image watermarking algorithm with encryption by DCT and logistic. IEEE
Farah T, Hermassi H, Rhoouma R, Belghith S (2012) Watermarking and encryption scheme to secure multimedia information. IEEE
Khan MI, Jeoti V, Malik AS, Khan MF ( 2011) A joint watermarking and encryption scheme for DCT based codecs. In: 2011 17th Asia-Pacific conference on communications (APCC)
Bouslimi D, Coatrieux G, Roux C (2011) A joint watermarking/encryption algorithm for verifying medical image integrity and authenticity in both encrypted and spatial domains
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Uma Maheswari, S., Vasanthanayaki, C. (2019). Enhanced Techniques to Secure Medical Image and Data Transit. In: Pandian, D., Fernando, X., Baig, Z., Shi, F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and Biomechanics, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-030-00665-5_40
Download citation
DOI: https://doi.org/10.1007/978-3-030-00665-5_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00664-8
Online ISBN: 978-3-030-00665-5
eBook Packages: EngineeringEngineering (R0)