Skip to main content
main-content
Top

About this book

This book introduces medical imaging, its security requirements, and various security mechanisms using data hiding approaches. The book in particular provides medical data hiding techniques using various advanced image transforms and encryption methods. The book focuses on two types of data hiding techniques: steganography and watermarking for medical images. The authors show how these techniques are used for security and integrity verification of medical images and designed for various types of medical images such as grayscale image and color image. The implementation of techniques are done using discrete cosine transform (DCT), discrete wavelet transform (DWT), singular value decomposition (SVD), redundant DWT (RDWT), fast discrete curvelet transform (FDCuT), finite ridgelet transform (FRT) and non-subsampled contourlet transform (NSCT). The results of these techniques are also demonstrated after description of each technique. Finally, some future research directions are provided for security of medical images in telemedicine application.

Table of Contents

Frontmatter

Chapter 1. Introduction

Abstract
This chapter presents the basic background of a medical imaging and its types. The requirements of security of medical images along with various types of data hiding techniques and the motivation are given in this chapter.
Rohit Thanki, Surekha Borra

Chapter 2. Technical Information

Abstract
This chapter presents various image transforms which are used in the present research work. This chapter also describes different encryption methods such as compressive sensing (CS)-based encryption and Arnold scrambling. Finally, some noise sequences used in the presented technique are described.
Rohit Thanki, Surekha Borra

Chapter 3. Data Hiding Techniques for Security of Medical Images

Abstract
This chapter presents various data hiding techniques for security of medical image. These techniques are designed using various image transforms such as FDCuT, DCT, FRT, NSCT, and various encryption methods such as Arnold scrambling and compressive sensing (CS) theory. Finally, simulation results of these techniques are demonstrated in this chapter.
Rohit Thanki, Surekha Borra

Chapter 4. Data Hiding Techniques for Integrity Verification of Medical Images

Abstract
This chapter presents various data hiding techniques in hybrid, transform domain and spatial domain for integrity verification of medical image. These techniques are designed using various image transforms such as DCT, SVD, FDCuT, NSCT, and CS-based encryption. Finally, simulation results of these techniques are demonstrated in this chapter.
Rohit Thanki, Surekha Borra

Chapter 5. Conclusions

Abstract
This chapter concludes this book with a brief summary of presented research work for security medical images in telemedicine application. The future directions of related research work are also discussed in this chapter.
Rohit Thanki, Surekha Borra

Backmatter

Additional information