Abstract
This paper presents an advanced method of graphical data protection. The novelty of the proposed method consists in the use of bits correspondence scheme, Huffman tree, and specific data encoding based on variable length of color hue code. The steganographic stability evaluation of the proposed method is presented and discussed in the paper. The application of the method to the technology of archive medical image processing is discussed as well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cummins, J., Diskin, P., Lau, S., Parlett, R.: Steganography and Digital Watermarking. School of Computer Science, The University of Birmingham, London (2004)
French-Baidoo, R., Asamoah, D., Oppong, S.O.: Achieving confidentiality in electronic health records using cloud systems. Int. J. Comput. Netw. Inform. Secur. (IJCNIS) 10(1), 18–25 (2018). https://doi.org/10.5815/ijcnis.2018.01.03
Alfonse, M., Aref, M.M., Salem, A.-B.M.: An ontology-based system for cancer diseases knowledge management. Int. J. Inf. Eng. Electron. Bus. (IJIEEB) 6(6), 55–63 (2014). https://doi.org/10.5815/ijieeb.2014.06.07
Adebayo, K.J., Ofoegbu, E.O.: Issues on E-health adoption in Nigeria. Int. J. Mod. Educ. Comput. Sci. (IJMECS) 6(9), 36–46 (2014). https://doi.org/10.5815/ijmecs.2014.09.06
Mwammenywa, I.A., Kaijage, S.F.: Towards enhancing access of HIV/AIDS healthcare information in Tanzania: is a mobile application platform a way forward? Int. J. Inf. Technol. Comput. Sci. (IJITCS) 10(7), 31–38 (2018). https://doi.org/10.5815/ijitcs.2018.07.04
Hu, Z., Dychka, I., Sulema, Y., Radchenko, Y.: Graphical data steganographic protection method based on bits correspondence scheme. Int. J. Intell. Syst. Appl. (IJISA) 9(8), 34–40 (2017). https://doi.org/10.5815/ijisa.2017.08.04
Radchenko, Y., Sulema, Y.: Graphical data steganographic protection method based on bits correspondence scheme and cover visual properties analysis. In: The 6th International Conference on Methods and Means of Information Coding, Protection and Compression, pp. 51–53. Ukraine (2017)
Morkel, T., Eloff, J.H.P., Olivier, M.S.: An overview of image steganography. In: The Fifth Annual Information Security South Africa Conference (ISSA2005). Sandton, South Africa (2005)
Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans. Signal Process. 51, 1995–2007 (2003). https://doi.org/10.1109/tsp.2003.812753
Malik, A., Sikka, G., Verma, H.K.: A modified pixel-value differencing image steganographic scheme with least significant bit substitution method. Int. J. Image Graph. Signal Process. (IJIGSP) 7(4), 68–74 (2015). https://doi.org/10.5815/ijigsp.2015.04.08
Divya, E., Kumar, P.R.: Steganographic data hiding using modified APSO. Int. J. Intell. Syst. Appl. (IJISA) 8(7), 37–45 (2016). https://doi.org/10.5815/ijisa.2016.07.04
Seyyedi, S.A., Ivanov, N.: Statistical image classification for image steganographic techniques. Int. J. Image Graph. Signal Process. (IJIGSP) 6(8), 19–24 (2014). https://doi.org/10.5815/ijigsp.2014.08.03
Sulema, Y., Shyrochyn, S.: Image protection method based on palette encryption. Her. Khmelnytskyi Natl. Univ. 3, 114–119 (2014)
Yaremchuk, Y., Karpinets, V.: The digital watermarks usage for copyright protection in the images. Legal Norm. Metrol. Provis. Inf. Prot. Syst. Ukr. 2, 63–70 (2006)
Pascale, D.: A Review of RGB Color Spaces … from xyY to R’G’B’. BabelColor Company, Montreal, Canada (2003)
Ibraheem, N.A., Hasan, M.M., Khan, R.Z., Mishra, P.K.: Understanding color models: a review. ARPN J. Sci. Technol. 2, 265–275 (2012)
Huffman, D.A.: A method for the construction of minimum-redundancy codes. Inst. Radio Eng. 40, 1098–1101 (1952)
Adak, C.: Robust steganography using LSB-XOR and image sharing. In: International Conference on Computation and Communication Advancement (IC3A), pp. 97–102. West Bengal, India (2013)
Korolyov, V., Polinovskyy, V., Gerasymenko, V.: RS-Seoanalysis. Principles of work, disadvantages and the concept of the method bypass. Her. Vinnytsky Polytech. Inst. 6, 66–71 (2010)
Sulema, Y., Shkurat, O.: Information system for archival medical images automated processing. In: The 3rd International Conference Health Technology Management (HTM-2016), p. 72. Chisinau, Moldova (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Radchenko, Y., Dychka, I., Sulema, Y., Suschuk-Sliusarenko, V., Shkurat, O. (2020). Steganographic Protection Method Based on Huffman Tree. In: Hu, Z., Petoukhov, S., He, M. (eds) Advances in Artificial Systems for Medicine and Education II. AIMEE2018 2018. Advances in Intelligent Systems and Computing, vol 902. Springer, Cham. https://doi.org/10.1007/978-3-030-12082-5_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-12082-5_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12081-8
Online ISBN: 978-3-030-12082-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)