Security System for Safe Transmission of Medical Images
This paper develops an optimised embedding of payload in medical images by using genetic optimisation. The goal is to preserve the region of interest from being distorted because of the watermark. By using this system there is no need to manually define the region of interest by experts as the system will apply the genetic optimisation to select the parts of image that can carry the watermark guaranteeing less distortion. The experimental results assure that genetic based optimisation is useful for performing steganography with less mean square error percentage.
Ajili S, Hajjaji MA, Bouallegue B, Mtibaa A. Joint watermarkingencryption image for safe transmission: Application on medical imaging. In Computer & Information Technology (GSCIT), 2014 Global Summit on 2014 Jun 14 (pp. 1-6). IEEE.
Akter A, Ullah MA. Digital image watermarking based on DWT-DCT: Evaluate for a new embedding algorithm. In Informatics, Electronics & Vision (ICIEV), 2014 International Conference on 2014 May 23 (pp. 1-6). IEEE.
Al-Gindy A. A fragile invertible watermarking technique for the authentication of medical images. InSignal Processing and Information Technology (ISSPIT), 2010 IEEE International Symposium on 2010 Dec 15 (pp. 191-195). IEEE.
Furht B, Kirovski D. Protection of multimedia content in distribution networks. Multimedia watermarking techniques and applications. CRC Press, Taylor and Francis Groups, USA. 2006:1-60.
Paar C, Pelzl J. Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media; 2009 Nov 27.
Chan CK, Cheng LM. Hiding data in images by simple LSB substitution. Pattern Recognit 2004;37(3):469-474.
Pathak Y, Dehariya S. A more secure transmission of medical images by two label DWT and SVD based watermarking technique. In Advances in Engineering and Technology Research (ICAETR), 2014 International Conference on 2014 Aug 1 (pp. 1-5). IEEE.
Bouslimi D, Coatrieux G, Cozic M, Roux C. A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Trans Inf Technol Biomed 2012;16(5):891-899.
El Safy RO, Zayed HH, El Dessouki A. An adaptive steganographic technique based on integer wavelet transform. InNetworking and Media Convergence, 2009. ICNM 2009. International Conference on 2009 Mar 24 (pp. 111-117). IEEE.
Eswaraiah R, Reddy ES. A fragile ROI-based medical image watermarking technique with tamper detection and recovery. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on 2014 Apr 7 (pp. 896-899). IEEE.
Shelly GB, Vermaat ME, Quasney JJ, Sebok SL, Jeffrey J. Multimedia and content sharing. Discovering Computers. 2009:294-297.
Sencar HT, Ramkumar M, Akansu AN. Communication with side information and data hiding. Data hiding fundamentals and applications: content security in digital media. ELSEVIER Academic Press, London, UK. 2004:35-39.
Jafari R, Ziou D, Rashidi MM. Increasing image compression rate using steganography. Expert Syst Appl 2013;40(17):6918-6927.
Gowtham M, Senthur T, Sivasankaran M, Vikram M, Sreeja GB. AES based steganography. Int J Applic Innov Eng Manage (IJAIEM). 2013;2:382-389.
Nilesh R, Ganga H. Securing medical images by watermarking using DWT-DCT-SVD. Int J Comutp Trends Technol 2014;12(2):67-74.
Raja’S A, Al Jaber A. A fragile watermarking algorithm for content authentication. Int J Comput Inform Sci 2004;2(1):27-37.
Sekra S, Balpande S, Mulani K. Steganography using genetic encryption along with visual cryptography. IJCSIS 2014;12(12):24.
Huang W, Ho AT, Pankajakshan V. Watermarking-based content authentication of motion-JPEG sequences in Proc VIE, 2008, p. 813- 818.
Wu CC, Kao SJ, Hwang MS. A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw 2011;84(12):2196-2207.
Duric Z, Jacobs M, Jajodia S. 6-Information Hiding: Steganography and Steganalysis. Handbook Stat 2005;24:171-187.
Fontani M, De Rosa A, Caldelli R, et al. Reversible watermarking for image integrity verification in hierarchical PACS. In Proceedings of the 12th ACM workshop on Multimedia and security 2010 Sep 9 (pp. 161-168). ACM.
Das S, Kundu MK. Effective management of medical information through ROI-lossless fragile image watermarking technique. Comput Methods Programs Biomed 2013;111(3):662-675.
Viswanathan P, Krishna PV. A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology. IEEE J Biomed Health Inform 2014;18(3):753-764.
Morkel T, Eloff JH, Olivier MS. An overview of image steganography. In Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, 2005.
Moerland T. Steganography and steganalysis. Leiden Institute of Advanced Computing Science. 2003.
Liu CL, Liao SR. High-performance JPEG steganography using complementary embedding strategy. Pattern Recognit 2008;41(9):2945-2955.
Mohan M, Anurenjan PR, A Novel Data Hiding Method in Image using Contourlet Transform. Recent Advances in Intelligent Computational Systems (RAICS), 2011:411-415.
Solanki K, Sarkar A, Manjunath BS. YASS: Yet another steganographic scheme that resists blind steganalysis. In International Workshop on Information Hiding 2007 Jun 11 (pp. 16-31). Springer, Berlin, Heidelberg.
Sajedi H, Jamzad M. Adaptive steganography method based on contourlet transform. In Signal Processing, 2008. ICSP 2008. 9th International Conference on 2008 Oct 26 (pp. 745-748). IEEE.
Ghasemi E, Shanbehzadeh J, Fassihi N. High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform. InIntelligent Control and Innovative Computing 2012 (pp. 395-404). Springer US.
Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: Survey and analysis of current methods. Signal Process 2010;90(3):727-752.
Sajedi H, Jamzad M. ContSteg: contourlet-based steganography method. Wireless Sensor Network 2009;1(03):163.
Copyright (c) 2017 Mohammed Jamal Almansor
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.