Medical Image Steganography: Study of Medical Image Quality Degradation when Embedding Data in the Frequency Domain

Full Text (PDF, 1073KB), PP.22-28

Views: 0 Downloads: 0

Author(s)

M.I.Khalil 1,*

1. Princess Nora Bint Abdul Rahman University, Faculty of Computer and Information Sciences, Information Technology Dept., Riyadh, Kingdom of Saudi Arabia

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2017.02.03

Received: 12 Jul. 2016 / Revised: 28 Oct. 2016 / Accepted: 3 Dec. 2016 / Published: 8 Feb. 2017

Index Terms

Medical image, Steganography, Cryptography, Symmetric, Asymmetric, Encryption, Decryption, RSA

Abstract

Steganography is the discipline of invisible communication by hiding the exchanged secret information (message) in another digital information media (image, video or audio). The existence of the message is kept indiscernible in sense that no one, other than the intended recipient, suspects the existence of the message. The majority of steganography techniques are implemented either in spatial domain or in frequency domain of the digital images while the embedded information can be in the form of plain or cipher message. Medical image steganography is classified as a distinctive case of image steganography in such a way that both the image and the embedded information have special requirements such as achieving utmost clarity reading of the medical images and the embedded messages. There is a contention between the amount of hidden information and the caused detectable distortion of image. The current paper studies the degradation of the medical image when undergoes the steganography process in the frequency domain.

Cite This Paper

M.I.Khalil, "Medical Image Steganography: Study of Medical Image Quality Degradation when Embedding Data in the Frequency Domain", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.2, pp.22-28, 2017. DOI:10.5815/ijcnis.2017.02.03

Reference

[1]Jingli Zheng, Zhengbing Hu, Chuiwei Lu, “A Light-weight Symmetric Encryption Algorithm Based on Feistel Cryptosystem Structure”, IJCNIS, Vol. 7, No. 1, December 2014, pp. 16-23.
[2]Mamta. Juneja, and Parvinder S. Sandhu, “A Review of Cryptography Techniques and Implementation of AES for Images”, International Journal of Computer Science and Electronics Engineering (IJCSEE) Volume 1, Issue 4 (2013) ISSN 2320-401X; EISSN 2320-4028.
[3]Koumal Kaushik and Suman, “An Innovative Approach for Video Steganography”, IJCNIS, Vol. 7, No. 11, October 2015, pp. 72-79.
[4]R.Gnanajeyaraman, K.Prasadh , Dr.Ramar, Audio encryption using higher dimensional chaotic map, International Journal of Recent Trends in Engineering, Vol. 1, No. 2, May 2009.
[5]Sheetal Sharma and Lucknesh Kumar, Encryption of an Audio File on Lower Frequency Band for Secure Communication, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013 ISSN: 2277 128X
[6]Ali M. Meligy, Mohammed M. Nasef, Fatma T. Eid, “An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys”, IJCNIS Vol. 7, No. 7, June 2015, pp. 24-29.
[7]M.I.Khalil, Real-Time Encryption/Decryption of Audio Signal”, I. J. Computer Network and Information Security, 2016, 2, 25-31, DOI: 10.5815/ijcnis.2016.02.03.
[8]Fluhrer, S., Mantin, I. and Shamir, A. “Weaknesses in the key scheduling algorithm of RC4” Eighth Annual Workshop on Selected Areas in Cryptography (August 2001)
[9]Matthews, Jr., Donald P. “System and method for a fast hardware implementation of RC4” Compaq Computer Corporation , November 23, 1998 US Patent 6,549,622
[10]Allam Mousa (1) and Ahmad Hamad, “Evaluation of the RC4 Algorithm for Data Encryption”, International Journal of Computer Science &Applications, Vol. 3. No.2, June 2006.
[11]Habutsu T., Nishio Y., Sasase I., and Morio S., “A secret key cryptosystem by iterating chaotic map,” Lect. Notes comput. Sci, Advances in Cryptology-EuroCrypt’91, 1991, vol. 547, page(s): 127-140.
[12]Pichler F. and Scharinger J., “Finite dimensional generalized baker dynamical systems for cryptographic applications,” Lect. Notes in Comput. Sci, 1996, vol. 1030, pp. 465-476.
[13]T. ElGamal, “A prublic key cryptosystem and a signature scheme based on discrete logarithms”, in Advances in Cryptology (CRYPTO ’84), Springer, 1985, vol. 196, pp. 10–18.
[14]Ueli Maurer and Bj?rn Tackmann, “On the Soundness of Authenticate-then-Encrypt: Formalizing the Malleability of Symmetric Encryption”, Proceedings of the 17th ACM Conference on Computer and Communication Security, ACM, pp. 505–515, Oct 2010.
[15]Ueli Maurer and Stefano Tessaro, Basing {PRF}s on Constant-Query Weak {PRF}s: Minimizing Assumptions for Efficient Symmetric Cryptography Advances in Cryptology — ASIACRYPT 2008, Lecture Notes in Computer Science, Springer-Verlag, vol. 5350, pp. 161–178, Dec 2008.
[16]Thiruppathy Kesavan, V, “Secret Key Cryptography based Security Approach for Wireless Sensor Networks”, Recent Advances in Computing and Software Systems (RACSS), 2012 International Conference, IEEE.
[17]Anupam Mondal and Shiladitya Pujari, “A Novel Approach of Image Based Steganography Using Pseudorandom Sequence Generator Function and DCT Coefficients”, IJCNIS Vol. 7, No. 3, February 2015 pp.42-49.