Medical image protection using diffusion, substitution and reversible data hiding based on prediction
by L. Mancy; S. Maria Celestin Vigila
International Journal of Security and Networks (IJSN), Vol. 14, No. 4, 2019

Abstract: Owing to the expanding benefit for tele-health amenities have developed awareness in the practice of medicinal image protection expertise. It mostly condensed with patient report that are cautious and must only offered to allowable personality. So the medicinal image safety becomes a very great complexity when victim data are fetched through the open system. At first, the secret key of 128 bit size is generated by image histogram and the medical image is encrypted by diffusion and substitution process. Then the secret key is embedded within the cipher image by the process of steganography to obtain key embedded cipher image. At last, the patient details are embedded into the key embedded cipher image and later on, the patient details and the key is extracted. Finally, using the extracted key, decryption operation is performed to get the original image.

Online publication date: Mon, 21-Oct-2019

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Security and Networks (IJSN):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com