Skip to main content
Top

2019 | OriginalPaper | Chapter

4. Data Hiding Techniques for Integrity Verification of Medical Images

Authors : Rohit Thanki, Surekha Borra

Published in: Medical Imaging and its Security in Telemedicine Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter presents various data hiding techniques in hybrid, transform domain and spatial domain for integrity verification of medical image. These techniques are designed using various image transforms such as DCT, SVD, FDCuT, NSCT, and CS-based encryption. Finally, simulation results of these techniques are demonstrated in this chapter.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Thanki R, Borra S, Dwivedi V, Borisagar K (2017) A steganographic approach for secure communication of medical images based on DCT-SVD and compressed sensing (CS) theory. Imaging Sci J 65(8):457–467CrossRef Thanki R, Borra S, Dwivedi V, Borisagar K (2017) A steganographic approach for secure communication of medical images based on DCT-SVD and compressed sensing (CS) theory. Imaging Sci J 65(8):457–467CrossRef
4.
go back to reference Sreedhanya AV, Soman KP (2013) Ensuring security to the compressed sensing data using a steganographic approach. Bonfr Int J Adv Image Process 3(1):1–7CrossRef Sreedhanya AV, Soman KP (2013) Ensuring security to the compressed sensing data using a steganographic approach. Bonfr Int J Adv Image Process 3(1):1–7CrossRef
5.
go back to reference Borra S, Thanki R, Dey N, Borisagar K (2018) Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing. Smart Health. Borra S, Thanki R, Dey N, Borisagar K (2018) Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing. Smart Health.
6.
go back to reference Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digital Signal Process 38:77–94CrossRef Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digital Signal Process 38:77–94CrossRef
7.
go back to reference Singh S, Singh R, Singh A, Siddiqui T (2018) SVD-DCT based medical image watermarking in NSCT domain. In: Hassanien AE, Elhoseny M, Kacprzyk J (eds) Quantum computing: an environment for intelligent large scale real application. Springer, Cham, pp 467–488CrossRef Singh S, Singh R, Singh A, Siddiqui T (2018) SVD-DCT based medical image watermarking in NSCT domain. In: Hassanien AE, Elhoseny M, Kacprzyk J (eds) Quantum computing: an environment for intelligent large scale real application. Springer, Cham, pp 467–488CrossRef
8.
go back to reference Thanki R, Borra S, Dwivedi V, Borisagar K (2017) A RONI based visible watermarking approach for medical image authentication. J Med Syst 41:143CrossRef Thanki R, Borra S, Dwivedi V, Borisagar K (2017) A RONI based visible watermarking approach for medical image authentication. J Med Syst 41:143CrossRef
9.
go back to reference Biswas D, Das P, Maji P, Dey N, Chaudhuri SS (2013) Visible watermarking within the region of non-interest of medical images based on fuzzy C-means and Harris corner detection. In: Computer science & information technology, pp 161–168 Biswas D, Das P, Maji P, Dey N, Chaudhuri SS (2013) Visible watermarking within the region of non-interest of medical images based on fuzzy C-means and Harris corner detection. In: Computer science & information technology, pp 161–168
10.
go back to reference Santoyo-Garcia H, Fragoso-Navarro E, Reyes-Reyes R, Cruz-Ramos C, Nakano-Miyatake M (2017) Visible watermarking technique based on human visual system for single sensor digital cameras. Secur Commun Netw 2017:18CrossRef Santoyo-Garcia H, Fragoso-Navarro E, Reyes-Reyes R, Cruz-Ramos C, Nakano-Miyatake M (2017) Visible watermarking technique based on human visual system for single sensor digital cameras. Secur Commun Netw 2017:18CrossRef
Metadata
Title
Data Hiding Techniques for Integrity Verification of Medical Images
Authors
Rohit Thanki
Surekha Borra
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-319-93311-5_4