Abstract

The main purpose of this work is to provide a novel and efficient method to the image steganography area of research in the field of biomedical, so that the security can be given to the very precious and confidential sensitive data of the patient and at the same time with the implication of the highly reliable algorithms will explode the high security to the precious brain information from the intruders. The patient information such as patient medical records with personal identification information of patients can be stored in both storage and transmission. This paper describes a novel methodology for hiding medical records like HIV reports, baby girl fetus, and patient’s identity information inside their Brain disease medical image files viz. scan image or MRI image using the notion of obscurity with respect to a diagonal queue least significant bit substitution. Data structure queue plays a dynamic role in resource sharing between multiple communication parties and when secret medical data are transferred asynchronously (secret medical data not necessarily received at the same rate they were sent). Rabin cryptosystem is used for secret medical data writing, since it is computationally secure against a chosen-plaintext attack and shows the difficulty of integer factoring. The outcome of the cryptosystem is organized in various blocks and equally distributed sub-blocks. In steganography process, various Brain disease cover images are organized into various blocks of diagonal queues. The secret cipher blocks and sub-blocks are assigned dynamically to selected diagonal queues for embedding. The receiver gets four values of medical data plaintext corresponding to one ciphertext, so only authorized receiver can identify the correct medical data. Performance analysis was conducted using MSE, PSNR, maximum embedding capacity as well as by histogram analysis between various Brain disease stego and cover images.

Highlights

  • The wide applications of various forms of networks and the Internet of the Things (IoT) as well as simultaneously the growing cloud computing architecture with the big data complexity are the remarkable challenge to the image steganography

  • If the histograms are considered, there is a negligible amount of difference between the histogram of the various original Brain disease cover images and their stego images

  • A novel secret transmission scheme has been proposed using the notion of opacity with respect to a diagonal queue least significant bit substitution, which is an extremely effective alternative for transmitting secure medical records and patient’s personal identification information along with the appropriate medical Brain disease image

Read more

Summary

Introduction

The wide applications of various forms of networks and the Internet of the Things (IoT) as well as simultaneously the growing cloud computing architecture with the big data complexity are the remarkable challenge to the image steganography. Various government and private medical organizations are continuously migrating into the cloud and mobile environments with the increasing use of networking services. These systems require largescale medical data centers for medical data storage. The advent of high-speed Internet technology has changed the way patients receive medical care by expediting diagnosis and allowing immediate treatment. This incredible tool comes with a security onus, especially when sensitive patient information is

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.