Skip to main content

Implementing Steganocryptography in Scanner and Angio-Scanner Medical Images

  • Conference paper
  • First Online:
Mobile Networks for Biometric Data Analysis

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 392))

  • 565 Accesses

Abstract

Telemedicine is a field of research in modern telecommunication and information technologies. It provides remote clinical care to help many people. Communication through internet and its services are becoming less expensive every day. This aspect of a positive growth of internet communication brings more possibilities to intercept and have access into the information as well. Data privacy and integrity are the main aims in data communication, nowadays. Many methods exist to keep secure the data that are transmitted through internet but none of them is perfect. To increase the efficiency of data protection, different methods and combinations are used. This paper analyzes the amount of hidden information by combining the data encryption and steganography techniques in medical images. The images taken into account are obtained from scanner and angio-scanner. The patient data are encrypted previously, then included in the scanner and angio-scanner images substituting the image LSBs. The results of the experiment are assessed by doctors, they admit that there is no visual difference between the original and the cover images. This paper analyses the sum in percentage of intensities, SSD and PSNR of the images used. The results show that this method achieves a higher performance in the scanner images than in the angio-scanner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Maheu MM, Whitten P, Allen A (2001) E-Health, Telehealth, and Telemedicine: a guide to startup and success, Jossey-Bass Inc. A Wiley Company

    Google Scholar 

  2. Rao HN, Pandya M, Prasad KMVV (2013) An evaluation of data security for telemedicine application development. Int J Comput Appl 79(1): 0975–8887

    Google Scholar 

  3. Frye L et al Network management of a wireless sensor networkwww.lehigh.edu/images/userImages/jgs2/Page_7287/LU-CSE-07-.pdf

  4. Katz J (2010) Digital Signatures, Springer

    Google Scholar 

  5. Mortazavian P, Jahangiri M, Fatemizadeh E (2001) A low-degradation steganography model for data hiding in medical images. In: Proceedings of the fourth IASTED international conference Visalization, Imaging, And Image Processing September 6–8, Marbella, Spain

    Google Scholar 

  6. Sampaio RA, JackowskiMP Assessment of steganographic methods in medical imaging. (Online). Available http://www.ucsp.edu.pe/sibgrapi2013/eproceedings/wuw/115732_1.pdf

  7. Keerthana L., Venkataramanaiah B (2014) Ecg steganography based privacy protection of medical datas for telemedicine application. IOSR J VLSI and Signal Process (IOSR-JVSP) 4(2), 46–51 e-ISSN: 2319–4200, p-ISSN No: 2319–4197

    Google Scholar 

  8. Thomas SE, Philip ST, Nazar S, Mathew A, Joseph N (2012) Advanced cryptographic steganography using multimedia files. In: International Conference on Electrical Engineering and Computer Science (ICEECS-2012), Trivendum, ISBN Number: 978-93-81693-58-2

    Google Scholar 

  9. Pandey V, Singh A, Shrivastava M (2012) Medical image protection by using cryptography data-hiding and steganography. Int J Emerg Technol Adv Eng 2(1), Website: www.ijetae.com ISSN 2250-2459

  10. ORTI J Advanced JPEG steganography & detection. (Online) Available https://www.blackhat.com/docs/asia-14/materials/Ortiz/Asia-14-Ortiz-Advanced-JPEG-Steganography-And-Detection.pdf

  11. Jokay M, Moravcik T (2010) Image-based JPEG steganography. (Online) Available https://www.sav.sk/journals/uploads/0317153109jo-mo.pdf

  12. Chugh G, Yadav R, Saini R (2014) A new image steganographic approach based on mod factor for RGB images. Int J Sig Process, Image Process and Pattern Recogn. 7(3)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Indrit Enesi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Enesi, I., Zanaj, B. (2016). Implementing Steganocryptography in Scanner and Angio-Scanner Medical Images. In: Conti, M., Martínez Madrid, N., Seepold, R., Orcioni, S. (eds) Mobile Networks for Biometric Data Analysis. Lecture Notes in Electrical Engineering, vol 392. Springer, Cham. https://doi.org/10.1007/978-3-319-39700-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-39700-9_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-39698-9

  • Online ISBN: 978-3-319-39700-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics