Advertisement

Data Hiding Techniques for Integrity Verification of Medical Images

  • Rohit Thanki
  • Surekha Borra
Chapter
Part of the SpringerBriefs in Applied Sciences and Technology book series (BRIEFSAPPLSCIENCES)

Abstract

This chapter presents various data hiding techniques in hybrid, transform domain and spatial domain for integrity verification of medical image. These techniques are designed using various image transforms such as DCT, SVD, FDCuT, NSCT, and CS-based encryption. Finally, simulation results of these techniques are demonstrated in this chapter.

Keywords

Steganography Integrity Authentication Encryption Non-blind Compressive Sensing Fragile Visible 

Bibliography

  1. 1.
    Thanki R, Borra S, Dwivedi V, Borisagar K (2017) A steganographic approach for secure communication of medical images based on DCT-SVD and compressed sensing (CS) theory. Imaging Sci J 65(8):457–467CrossRefGoogle Scholar
  2. 2.
    MedPix™ Medical Image Database available at: http://rad.usuhs.mil/medpix/medpix.html, https://medpix.nlm.nih.gov/home
  3. 3.
    The University of South Carolina SIPI Image Database: http://sipi.usc.edu/database/database.php
  4. 4.
    Sreedhanya AV, Soman KP (2013) Ensuring security to the compressed sensing data using a steganographic approach. Bonfr Int J Adv Image Process 3(1):1–7CrossRefGoogle Scholar
  5. 5.
    Borra S, Thanki R, Dey N, Borisagar K (2018) Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing. Smart Health.Google Scholar
  6. 6.
    Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digital Signal Process 38:77–94CrossRefGoogle Scholar
  7. 7.
    Singh S, Singh R, Singh A, Siddiqui T (2018) SVD-DCT based medical image watermarking in NSCT domain. In: Hassanien AE, Elhoseny M, Kacprzyk J (eds) Quantum computing: an environment for intelligent large scale real application. Springer, Cham, pp 467–488CrossRefGoogle Scholar
  8. 8.
    Thanki R, Borra S, Dwivedi V, Borisagar K (2017) A RONI based visible watermarking approach for medical image authentication. J Med Syst 41:143CrossRefGoogle Scholar
  9. 9.
    Biswas D, Das P, Maji P, Dey N, Chaudhuri SS (2013) Visible watermarking within the region of non-interest of medical images based on fuzzy C-means and Harris corner detection. In: Computer science & information technology, pp 161–168Google Scholar
  10. 10.
    Santoyo-Garcia H, Fragoso-Navarro E, Reyes-Reyes R, Cruz-Ramos C, Nakano-Miyatake M (2017) Visible watermarking technique based on human visual system for single sensor digital cameras. Secur Commun Netw 2017:18CrossRefGoogle Scholar

Copyright information

© The Author(s), under exclusive license to Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Rohit Thanki
    • 1
  • Surekha Borra
    • 2
  1. 1.C. U. Shah UniversityWadhwan CityIndia
  2. 2.Department of Electronics & Communication EngineeringK.S. Institute of TechnologyBengaluruIndia

Personalised recommendations