Skip to main content
Top
Published in: International Journal of Machine Learning and Cybernetics 5/2017

09-05-2016 | Original Article

RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem

Authors: Mamta Jain, Anil Kumar

Published in: International Journal of Machine Learning and Cybernetics | Issue 5/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper presents the novelty in sensitive data transmission of patient medical records. The secret medical data is hidden inside scanned grey medical image or magnetic resonance image using the red, green, blue, and alpha (RGBA) image and with the help of decision tree. In this technique, alpha channel will be separated from the RGBA image and merged to the medical grey image to improve the hiding capacity. RSA cryptosystem is used to encrypt the medical data, and divided into various blocks using dynamic key. In steganography process, organize the grey-alpha channel medical cover image into various blocks using dynamic key. Secret cipher blocks are assigned to grey-alpha channel medical cover image blocks using Breadth First Search and decision tree, for data embedding. Performance analysis is observed using various performance measure parameters between various medical stego and cover images.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
5.
go back to reference Wu DC, Tsai WH (2003) A steganograhic method for images by pixel value differencing. Pattern Recogn Lett 24(9-10):1613–1626CrossRefMATH Wu DC, Tsai WH (2003) A steganograhic method for images by pixel value differencing. Pattern Recogn Lett 24(9-10):1613–1626CrossRefMATH
6.
go back to reference Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25(12):331–339CrossRef Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25(12):331–339CrossRef
7.
go back to reference Chang CC, Tseng HW (2004) A steganographic method for digital images using side match. Pattern Recogn Lett 25(12):1431–1437CrossRef Chang CC, Tseng HW (2004) A steganographic method for digital images using side match. Pattern Recogn Lett 25(12):1431–1437CrossRef
8.
go back to reference Martin A, Sapiro G, Seroussi G (2005) Is image steganography natural. IEEE Trans Image Process 14(12):2040–2050CrossRef Martin A, Sapiro G, Seroussi G (2005) Is image steganography natural. IEEE Trans Image Process 14(12):2040–2050CrossRef
9.
go back to reference Wang R, Chen Y (2006) High payload image steganography using two-way block matching. IEEE Signal Process Lett 13(3):161–164CrossRef Wang R, Chen Y (2006) High payload image steganography using two-way block matching. IEEE Signal Process Lett 13(3):161–164CrossRef
10.
go back to reference Kumar PM, Roopa D (2007) An image steganography framework with improved tamper proofing. Asian J Inf Technol 6(10):1023–1029 Kumar PM, Roopa D (2007) An image steganography framework with improved tamper proofing. Asian J Inf Technol 6(10):1023–1029
11.
go back to reference Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. Secur Privacy Mag IEEE 1(3):32–44CrossRef Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. Secur Privacy Mag IEEE 1(3):32–44CrossRef
12.
go back to reference Cheddad A et al (2010) Digital image steganography survey and analysis of current methods. Signal Process 90:727–752CrossRefMATH Cheddad A et al (2010) Digital image steganography survey and analysis of current methods. Signal Process 90:727–752CrossRefMATH
16.
go back to reference Juneja M, Sandhu PS (2009) Designing of robust steganography technique based on LSB insertion and encryption. In: Proceedings of international conference on advances in recent technologies in communication and computing (ISBN: 978-0-7695-38457), pp 302–305. Available at http://www.dl.acm.org/citation.cfm?id=1673335 Juneja M, Sandhu PS (2009) Designing of robust steganography technique based on LSB insertion and encryption. In: Proceedings of international conference on advances in recent technologies in communication and computing (ISBN: 978-0-7695-38457), pp 302–305. Available at http://​www.​dl.​acm.​org/​citation.​cfm?​id=​1673335
20.
go back to reference Ross J, Anderson F, Petitcolas AP (1998) On the limits of steganography. In: IEEE Journal of selected Areas in communication, Special Issue on Copyright & Privacy protection (ISSN: 0733-8716), 6(4):474–481 Ross J, Anderson F, Petitcolas AP (1998) On the limits of steganography. In: IEEE Journal of selected Areas in communication, Special Issue on Copyright & Privacy protection (ISSN: 0733-8716), 6(4):474–481
21.
go back to reference Swain G, Lenka SK (2012) LSB array based image steganography technique by exploring the four least significant bits. Springer, In: Proceedings of 4th international conference, Obcom 2011, CCIS (ISBN: 978-3-642-29216-3), 2(270):479–488 Swain G, Lenka SK (2012) LSB array based image steganography technique by exploring the four least significant bits. Springer, In: Proceedings of 4th international conference, Obcom 2011, CCIS (ISBN: 978-3-642-29216-3), 2(270):479–488
23.
go back to reference Wang XZ, Ashfaq RAR, Fu AM (2015) Fuzziness based sample categorization for classifier performance improvement. J Intell Fuzzy Syst 29(3):1185–1196MathSciNetCrossRef Wang XZ, Ashfaq RAR, Fu AM (2015) Fuzziness based sample categorization for classifier performance improvement. J Intell Fuzzy Syst 29(3):1185–1196MathSciNetCrossRef
24.
go back to reference Wang XZ (2015) Uncertainty in learning from big data-editorial. J Intell Fuzzy Syst 28(5):2329–2330CrossRef Wang XZ (2015) Uncertainty in learning from big data-editorial. J Intell Fuzzy Syst 28(5):2329–2330CrossRef
25.
go back to reference Lu SX, Wang XZ, Zhang GQ, Zhou X (2015) Effective algorithms of the Moore–Penrose inverse matrices for extreme learning machine. Intell Data Anal 19(4):743–760CrossRef Lu SX, Wang XZ, Zhang GQ, Zhou X (2015) Effective algorithms of the Moore–Penrose inverse matrices for extreme learning machine. Intell Data Anal 19(4):743–760CrossRef
Metadata
Title
RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem
Authors
Mamta Jain
Anil Kumar
Publication date
09-05-2016
Publisher
Springer Berlin Heidelberg
Published in
International Journal of Machine Learning and Cybernetics / Issue 5/2017
Print ISSN: 1868-8071
Electronic ISSN: 1868-808X
DOI
https://doi.org/10.1007/s13042-016-0542-y

Other articles of this Issue 5/2017

International Journal of Machine Learning and Cybernetics 5/2017 Go to the issue