Abstract

With the rapid development of the electronic medical information systems and Internet technology, the frequency of electronic medical records (EMRs) and electronic patient information (EPIs) transmitted over the Internet and shared among authorized medical parties is gradually increased. Reversible data hiding in medical images is an efficient technique to embed an EPI or EMR into a medical image, such as X-ray, MRI etc. In this paper, a reversible data hiding scheme by using enhanced neighbor mean interpolation (ENMI) technology is proposed to expand each <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$2 \times 2$ </tex-math></inline-formula> block in the original image to a <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$3\times 3$ </tex-math></inline-formula> block. The four original pixels remaining at the four corners in each expanded block. Five derived pixels by using the ENMI interpolation algorithm are used to carry 4-bits secret data and a 1-bit authentication code with our proposed efficient data hiding strategy. Experimental results confirm that the detection performance and the robustness of the hidden data with our proposed scheme are significantly higher than that of the Geeth & Geeth scheme and other six representative schemes.

Highlights

  • In the last two decades, data hiding techniques have drawn more research attention because security is increasingly important as transmitted data grows exponentially

  • RELATED WORK Based on the experimental results demonstrated in [11], we found the estimated pixel values derived from the enhanced neighbor mean interpolation (ENMI) can provide a relatively high image quality in stego images

  • For five pixels derived by the ENMI interpolation algorithm, a simple data hiding strategy is designed with pixel concentration in each secret-bit range

Read more

Summary

Introduction

In the last two decades, data hiding techniques have drawn more research attention because security is increasingly important as transmitted data grows exponentially. Data hiding techniques successfully use meaningful cover media, such as an image, audio, video and text, to carry the secret message [2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29]. Data hiding techniques have been explored with various approaches, and its application has expanded to the medical domain

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.