2016
DOI: 10.1007/s40708-016-0032-8
|View full text |Cite
|
Sign up to set email alerts
|

Diagonal queue medical image steganography with Rabin cryptosystem

Abstract: The main purpose of this work is to provide a novel and efficient method to the image steganography area of research in the field of biomedical, so that the security can be given to the very precious and confidential sensitive data of the patient and at the same time with the implication of the highly reliable algorithms will explode the high security to the precious brain information from the intruders. The patient information such as patient medical records with personal identification information of patient… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(18 citation statements)
references
References 13 publications
0
16
0
Order By: Relevance
“…Applying standard DWT based image decomposition and GA based mapping, authors [32] developed a steganography model that embeds data into DWT coefficients, enriched with OPAP based optimization. Recently, authors [33] derived a steganography model for biomedical purpose. They applied queue data structure for communication where at first they encrypted secret message by means of Rabin Cryptosystem that eventually provided multiple blocks and sub-blocks to be distributed equally.…”
Section: Related Workmentioning
confidence: 99%
“…Applying standard DWT based image decomposition and GA based mapping, authors [32] developed a steganography model that embeds data into DWT coefficients, enriched with OPAP based optimization. Recently, authors [33] derived a steganography model for biomedical purpose. They applied queue data structure for communication where at first they encrypted secret message by means of Rabin Cryptosystem that eventually provided multiple blocks and sub-blocks to be distributed equally.…”
Section: Related Workmentioning
confidence: 99%
“…Jain & lenka [23] 2016 Presented steganographic approach that used Rabin Cryptosystem for encryption of secret data and outputs it into various partitions which are dynamically embedded into diagonal queue.…”
Section: Literature Surveymentioning
confidence: 99%
“…The efficiency of the steganography methods can be calculated by the three valuable specifications: security, capacity, and visual undetectability [ 18 , 19 ].…”
Section: Introductionmentioning
confidence: 99%
“…Satish et al [ 20 ] introduced Logistic map based spread spectrum image steganography. Jain and Lenka [ 19 ] used an asymmetric cryptographic system for secret information hiding in brain images. Jain and Kumar [ 21 ] presented a medical record steganography method based on Rivest–Shamir–Adleman cryptosystem and decision tree for data inclusion.…”
Section: Introductionmentioning
confidence: 99%