Medical image protection using diffusion, substitution and reversible data hiding based on prediction Online publication date: Mon, 21-Oct-2019
by L. Mancy; S. Maria Celestin Vigila
International Journal of Security and Networks (IJSN), Vol. 14, No. 4, 2019
Abstract: Owing to the expanding benefit for tele-health amenities have developed awareness in the practice of medicinal image protection expertise. It mostly condensed with patient report that are cautious and must only offered to allowable personality. So the medicinal image safety becomes a very great complexity when victim data are fetched through the open system. At first, the secret key of 128 bit size is generated by image histogram and the medical image is encrypted by diffusion and substitution process. Then the secret key is embedded within the cipher image by the process of steganography to obtain key embedded cipher image. At last, the patient details are embedded into the key embedded cipher image and later on, the patient details and the key is extracted. Finally, using the extracted key, decryption operation is performed to get the original image.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Security and Networks (IJSN):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com