Research Article

Security in Telemedicine using DWT-CDCS

by  Kulkarni Pratibha C., Bhatia S.K.
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 136 - Issue 7
Published: February 2016
Authors: Kulkarni Pratibha C., Bhatia S.K.
10.5120/ijca2016908486
PDF

Kulkarni Pratibha C., Bhatia S.K. . Security in Telemedicine using DWT-CDCS. International Journal of Computer Applications. 136, 7 (February 2016), 11-15. DOI=10.5120/ijca2016908486

                        @article{ 10.5120/ijca2016908486,
                        author  = { Kulkarni Pratibha C.,Bhatia S.K. },
                        title   = { Security in Telemedicine using DWT-CDCS },
                        journal = { International Journal of Computer Applications },
                        year    = { 2016 },
                        volume  = { 136 },
                        number  = { 7 },
                        pages   = { 11-15 },
                        doi     = { 10.5120/ijca2016908486 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2016
                        %A Kulkarni Pratibha C.
                        %A Bhatia S.K.
                        %T Security in Telemedicine using DWT-CDCS%T 
                        %J International Journal of Computer Applications
                        %V 136
                        %N 7
                        %P 11-15
                        %R 10.5120/ijca2016908486
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Copyright protection of digital media is the very first application that comes to mind for digital watermarking. In the past, duplicating artwork was quite complicated and requires great efforts to create the work looks just like the original. However, in present digital world it is very simple for anyone to duplicate or manipulate digital data. The digital image watermarking allows the watermark to be embedded visibly or invisibly in the original image for identification of the owner. This concept can also be used for other media, such as digital video and audio. Telemedicine is a well-known application of digital watermarking. In this application security & authentication for medical data is very important. Hiding the data into the medical image provide the security over the public network. Authentication verifies whether the image certainly belongs to the right patient Authentication of medical data used for further diagnosis and reference. This paper focused on the methods of medical image data hiding for security and authentication. High capacity data hiding is achieved with CDCS (Class Dependent Coding Scheme). As well as data is effectively hided with discrete wavelet transform. Embedding watermarks in RONI (region of non interest) protects the ROI (region of interest) of medical image, which is diagnostically important part of medical images. Segmentation plays an important role in medical image processing for separating the ROI from medical image.

References
  • Sunita V. Dhavale1, and Suresh N. Mali, ‘‘High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Checking’’, International J. of Recent Trends in Engineering and Technology, vol. 3, no. 2, May 2010
  • Rodriguez-Colin Raul, Feregrino-Uribe Claudia, Trinidad-Blas Gershom de J. ‘‘Data Hiding Scheme for Medical Images’’ IEEE 7th International Conference on Electronics, Communication and Computers,0-7695-2799-X/07,2007
  • Aggeliki Giakoumaki,, Sotiris Pavlopoulos, and Dimitris Koutsouris, “ Multiple Image Watermarking Applied To Health Information Management ” IEEE Transaction on information technology on Biomedicine ,vol. 10, no. 4, pp. 722–732,Oct 2006.
  • K. Solanki, N. Jacobsen, U. Madhow, B. S .Manjunath and S. Chandrashekhar, “ Robust Image-Adaptive Data hiding using Erasure and Error Correction,” IEEE Transactions on image processing, vol. 13,(2004)1627–1639.
  • R.O.EI Safy, H. H. Zayed, A.EI Dessouki, “An Adaptive Steganographic Technique Based on Integer Wavelet Transform” IEEE Transaction on Image Processing vol. 978, no. 1, pp. 3778–4244-8/9, 2009.
  • K. A. Navas, S. A. Thampy, and M. Sasikumar, “EPR Hiding in medical images for telemedicine,” International Journal of Biomedical Sciences vol. 3.1 (2008) 44– 47
  • Min. Wu , ”Joint Security and Robustness Enhancement for Quantization Embedding”, IEEE Transactions On Circuit And Systems For Video Technology vol. 13,no.8 August 2003
  • Deepthi Anand", U.C. Niranjan, ‘‘Watermarking Medical Images with Patient Information’’, Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, vol. 20, no. 2,1998
  • Kurato Maeno, Qibin Sun, Shih-Fu Chang,Masayuki Suto, ‘‘New Semi-Fragile Image Authentication Watermarking Techniques Using Random Bias And Nonuniform Quantization’’ IEEE Transactions on Multimedia, vol. 8, no. 1, February 2006
  • Neil F. Johnson Sushil Jajodia, ‘‘Exploring Steganography: Seeing the Unseen’’, IEEE Computer, vol.31, Issue 2, 1998
  • Yiwei Wang, John F. Doherty, Robert E. Van Dyck, ‘‘A Wavelet-Based Watermarking Algorithm for Ownership Verification of Digital Images’’, IEEE Transactions on Image Processing, vol. 11, no. 2, February 2002
  • Preeti Aggarwal, Renu Vig, Sonali Bhadoria, and C.G.Dethe , "Role of Segmentation in Medical Imaging: A Comparative Study", International Journal of Computer Applications (0975 8887), vol. 29 no.1, September 2011
  • Gonzalo Alvarez1, Shujun Li and Luis Hernandez,“Analysis of security problems in a medical image encryption system,” Computers in Biology and Medicine, vol. 37 (2007) 424–427.
  • Gurpreet Kaur, Kamaljeet Kaur “Image Watermarking Using LSB (Least Significant Bit)”, in International Journal of Advanced Research in Computer Science and Software Engineering vol. 3, Issue 4, April 2013.
  • Jasni Zain and Malcolm Clarke, ‘‘Security in Telemedicine: Issues in Watermarking Medical Images’’, 3rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 27-31, 2005
  • B. Planitz and A. Maeder, ‘‘Medical Image Watermarking: A Study on Image Degradation’’, Australian Pattern Recognition Society Workshop on Digital Image Computing, WDIC 2005, Brisbane, Australia 2005
  • Pouria Mortazavian, Mohammad Jahangiri And Emad Fatemizadeh, ‘‘A Low-Degradation Steganography Model For Data Hiding In Medical Images’’,Proc. 4th IASTED Intenational Conference Visualization, Imaging And Image Processing Sep 2004
  • Gaurav Chawla, Ravi Saini, Kamaldeep, Rajkumar Yadav, ‘‘Classification of Watermarking Based upon Various Parameters’’, International Journal of Computer Applications & Information Technology vol. I, Issue II, September 2012
  • Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal, ‘‘Implementation of Image Steganography Using 2-Level DWT Technique’’, International Journal of Computer Science and Business Informatics, vol.1, no.1 May 2013
  • M. Fallahpour and M. H. Sedaaghi, ‘‘High capacity lossless Data hiding based on histogram modification”, IEICE Electron. Express, vol. 4, no. 7, 2007
  • Mahmoud El-Gayyar, “Watermarking Techniques Spatial Domain Digital Rights Seminar”, in Media Informatics, University of Bonn, Germany, May 2006
  • S. Voloshynovskiy, S. Pereira, T. Pun, J.J. Eggers and J.K. Su, “Attacks on Digital Watermarks: Classification, Estimation-based Attacks and Benchmarks’’, IEEE Communication Magazine, August 2001
  • A White paper on “Digital Watermarking: A Technology Overview”, Wipro Technologies, pp. 2 – 8. Aug. 2003.
  • W.R. Hendee, ‘‘Medical Imaging Physics’’ 2002
  • Syed Ali Khayam, "The Discrete Cosine Transform (DCT): Theory and Application", Michigan State University March 2003
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

CDCS data hiding medical image ROI

Powered by PhDFocusTM