Abstract
The use of medical imaging in telemedicine insurance and other applications has grown significantly in recent years. imaging techniques used in medicine, such as ultrasound, X-rays, computed tomography, and magnetic resonance imaging (MRI). plays a crucial part in the diagnosis of numerous illnesses. The internet has quickly advanced in terms of sharing and transferring large volumes of data. Medical image transmission can be impacted by a variety of attacks and medical image kinds. putting forth a medical data security strategy and outlining the various obstacles that it faces. This strategy attains a high degree of security and withstands many attacks over an extended period of time. A thorough analysis of security methods, including steganography, encryption, and compression, is presented along with a comprehensive assessment of current studies. Ensuring the security of medical images during transmission is crucial in safeguarding patient privacy. Steganography and cryptography are needed for secure transmission in order to maintain data integrity and confidentiality. An application to embed a video or audio content in another file is the project's development. Its focus is on securely and robustly embedding information under a seemingly innocent shroud. This system uses the ideas of cryptography and steganography to make the data more secure. Using an encryption technique that is resilient to various attacks over time is essential for improving the cryptography portion of the system. The paper's goal is to provide an overview and evaluation of each approach's various algorithms using several metrics, including PSNR, MSE, BER, and NC.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Research Journal on Advanced Engineering Hub (IRJAEH)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.