Image Steganography Model for Medical Images Using GLM

Authors

  • Joshi K Department of Computer Science and Engineering, U.I.E.T, M. D. University, Rohtak, Haryana, India
  • Allwadhi S Department of Computer Science and Engineering, U.I.E.T, M. D. University, Rohtak, Haryana, India
  • Yadav R Department of Computer Science and Engineering, U.I.E.T, M. D. University, Rohtak, Haryana, India

Keywords:

GLM, PSNR, MSE, MAXERR, MEDICAL IMAGING

Abstract

In this paper, a steganographic model in medical system is proposed using gray level modification method of image steganography. In gray level modification method the data is embedded on the pixel based on its gray value. For making a pixel suitable for adding information bit, +1 or -1 is performed on it. So, the maximum change in the image pixel is one which is admissible. Different medical images are taken for experimental result. Image is passed from one doctor to another after embedding their respective prescription in it. The experiment is performed on the seven medical images and the result is obtained.

References

Jichkar, Samiksha K., and Mahip M. Bartere, (2015). A Comparative Study of Various image Steganographic Techniques Used for Information Hiding."Compusoft 4.5 1730.

Gutub, A. A. A. (2010). Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence, 2(1), 56–64. http://doi.org/10.4304/jetwi.2.1.56-64

Liang, G. L., Wang, S. Z., & Zhang, X. P. (2007). Steganography in binary image by checking data-carrying eligibility of boundary

pixels. Journal of Shanghai University, 11(3), 272–277. http://doi.org/10.1007/s11741-007-0317-2

Pal, A., & Pramanik, T. (2013). Design of an Edge Detection Based Image Steganography with High Embedding Capacity. Quality, Reliability, Security and Robustness in …, 794–800. Retrieved from http://link.springer.com/chapter/10.1007/978-3-642-37949-9_69

Modi, M. R., Islam, S., & Gupta, P. (2013). Edge based steganography on colored images. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7995 LNCS, 593–600. http://doi.org/10.1007/978-3-642-39479-9_69

Jia-Fa, M., Xin-Xin, N., Gang, X., Wei-Guo, S., & Na-Na, Z. (2015). A steganalysis method in the DCT domain. Multimedia Tools and Applications, (180). http://doi.org/10.1007/s11042-015-2708-0

M.M., S., G., S., & S.H., S. (2015). Detection of rapid eye movement behaviour disorder using short time frequency analysis of PSD approach applied on EEG signal (ROC-LOC). Biomedical Research (India), 26(3), 587–593.

Chen, P., & Lin, H. (2006). A DWT Based Approach for Image Steganography, (4), 275–290.

Al-taani, A. T., Al-issa, A. M., & Steganograhy, A. O. (2009). A Novel Steganographic Method for Gray-Level Images. Engineering, 3(3), 5–10.

Puech, W. (2008). Image encryption and compression for medical image security. 2008 1st International Workshops on Image Processing Theory, Tools and Applications, IPTA 2008, 1–3. http://doi.org/10.1109/IPTA.2008.4743800

Al-Dmour(B) and Al-Ani, A Medical Image Steganography Method Based on Integer Wavelet Transform and Overlapping Edge Detection, ICONIP 2015, Part IV, LNCS 9492, pp. 436–444, 2015. DOI: 10.1007/978-3-319-26561-2 52

Jain, M., & Lenka, S. K. (2016). Diagonal queue medical image steganography with Rabin cryptosystem. Brain Informatics, 3(1),

–51. http://doi.org/10.1007/s40708-016-0032-8

Liu, J., Tang, G., & Sun, Y. (2013). A secure steganography for privacy protection in healthcare system. Journal of Medical Systems, 37(2). http://doi.org/10.1007/s10916-012-9918-z

Rao, N. V., & Kumari, V. M. (2011). Watermarking in Medical Imaging for Security and Authentication. Information Security Journal: A Global Perspective, 20(3), 148–155. http://doi.org/10.1080/19393555.2011.561154Bowman, M., Debray, S. K., and Peterson, L. L. 1993. Reasoning about naming systems.

Downloads

Published

2024-02-26

How to Cite

Joshi, K., Allwadhi, S., & Yadav, R. (2024). Image Steganography Model for Medical Images Using GLM. COMPUSOFT: An International Journal of Advanced Computer Technology, 5(05), 2120–2124. Retrieved from https://ijact.in/index.php/j/article/view/371

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.