SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
International Journal ofJOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY
   INTERNATIONAL Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
 ISSN 0976 – 6375(Online) Volume 3, Issue 3, (IJCET)
                                             October-December (2012), © IAEME


ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 3, Issue 3, October - December (2012), pp. 09-14
                                                                                  IJCET
© IAEME: www.iaeme.com/ijcet.html
Journal Impact Factor (2012): 3.9580 (Calculated by GISI)                      ©IAEME
www.jifactor.com




                   PROTECTION FOR IMAGES TRANSMISSION
                                         1. Karimella Vikram
                                     Head of the Dept. of CSE
                            Medak College of Engineering & Technology
                               Siddipet, Kondapaka, Meddak, (RR)
                              Email Id: Vikramkarimella@yahoo.com

                                      2. Dr. V. Murali Krishna
                                           Prof.& Principal
                              Murthy Institute of Technology & Science
                               AnkiReddy pally, Kesara, Hyderabad
                                 Email: Vmkrishna99@yahoo.com

                                          3.Dr. Shaik Abdul Muzeer
                                Professor & Director of PG studies
                          Siddhartha Institute of Engineering & Technology
                                      Ibrahimpatnam, R.R.. Dist.
                                 e-mail: bdl_muzeer @ yahoo.co.in

                                        4.Mr. K. Narasimha
                                  Assoc.Professor & HOD of E.C.E.
                                   Murthy Institute of technology
                                 AnkiReddy pally, Kesara, Hyderabad
                                   Email : nrsimha_9@yahoo.com

 ABSTRACT
 Medical image security is the most important issue during its transmission. Watermarking, digital
 fingerprint/signature, encryption, time of coding and encoding are the existing techniques for protecting
 mages. But, all this methods have some drawbacks. Lossless or reversible data embedding – is relatively
 new development, where both image and the message (embedded data) can be recovered in a lossless
 fashion and to verify the integrity and authenticity of DICOM images. Hash value of the whole image and

                                                    9
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

patient information is embedded in the least significant bits of the RONI. If the image has not been altered,
the watermark will be extracted and the original image will be recovered. Hash value of the recovered
image will be compared with the extracted watermark for authentication. The paper outlines that the
present methods, previous work, need for security and requirements for new system and presets an
approach to further research for lossless medical image security. Keywords-Medical image security,
lossless compression, image authenticity and integrity, Information Hiding, DICOM.

Keywords: China insurance industry, Foreign fund, Challenge

I. INTRODUCTION

Medical image sharing is used in a wide variety of applications ranging from telediagnosis to telesurgery,
and it also promotes applications such as remote diagnosis aid and e-learning. Today all business,
government, organizations are connected through internet but it is both fascinating & complex because of
the requirements for security services. Mechanisms to meet those services are quite complex. So the
network security is the most important. Security is the protection from attack [1]. Data embedding is the
most commonly used mechanism for medical images. It is usual that a medical image is diagnosed before
storing the image in the long-term storage, so the significant part of the image is already determined [2].
The significant part is called ROI (Region of Interest). The Health Insurance Portability and
Accountability Act (HIPAA) [3] require that medical providers and insurance companies implement
procedures and policies to protect patient’s medical information. Data embedding applications could be
divided into two groups depending on the relationship between the embedded message and the cover
image [4],[5]. The first group is formed by steganographic applications in which the message has no
relationship to the cover image and the cover image plays the role of a decoy to mask the very presence of
communication. The content of the cover image has no value to the sender or the decoder. The second
group of applications is frequently addressed as digital watermarking. In a typical watermarking
application, the message has a close relationship to the cover image. The message supplies additional
information about the image, such as image caption, ancillary data about the image origin, author
signature, image authentication code, etc. Communication of medical images in a PACS environment is
usually over the internal hospital network that is protected by a firewall from outside intruders. Three
major organizations related to medical image/data security have issued guidelines, mandates, and
standards for image/data security. Conventional Internet Security methods are not sufficient to guarantee
that medical image had not been compromised during data transmission. A reversible watermarking
scheme involves inserting a Watermark into the original image in an invertible manner in that when the
watermark was later extracted, the original image can be recovered completely [6-9]. Medical image
compression is very important in the Present era where the information storage having the highest
concern. While storing the medical images it is also equally important that images should be effectively
compressed by using lossless technique, so that we can reproduce the original medical images without
any loss [10]. The amount of data required to present images at an acceptable level of quality is extremely
large. High quality image data requires large amounts of storage space and transmission band width [11].
One of the possible solutions is to compress the information so that the storage space and transmission
time can be reduced. Image compression address the problem of reducing the amount of data required to

                                                    10
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

represent a digital image with no significant loss of information. The goal of image compression is to
represent an image with a few number of bits as possible while preserving the quality required for the
given application [12].

II. EXISTINGMETHOD

There are four techniques to protect an image. 1) Watermarking 2) Digital Fingerprinting/Signatures 3)
Encryption 1) Watermarking: Watermark is a “secret message” that is embedded into a “cover (original or
host) message”. Digital watermarking is a technique which allows an individual to add hidden copyright
notices or other verification message to digital audio, video or image signals and documents. a) Visible
watermarks: Visible watermarks change the signal altogether such that the watermarked signal is totally
different from actual signal. b) Invisible watermarks: Invisible watermarks change the signal to a
perceptually great extent i.e. there are only minor variations in output signal. 2) Digital
fingerprints/signatures: It is based on the concept of public key encryption. A public key known to
everyone and a private or secret key known only to the recipient of the message. When John wants to
send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her
private key to decrypt it. It is mainly used in transmission of images. 3) Encryption: Plaintext is known as
original message and cipher text is known as coded message. Encryption is the process of converting
plaintext to cipher text to make it unreadable to anyone except those possessing key. Key specifies the
particular transformation. Decryption is the process of restoring the plaintext from cipher text .

III. DRAWBACKS OF EXISTINGMETHODS

a) Major problem with watermarking schemas is that they are not very robust against different types of
image manipulations or attacks. These techniques are quite complicated to implement in real-time.
b)Digital fingerprints: Technological Compatibility, Security Concerns, Legal Issues are the prime
concerns with respect to finger print. c) Encryption: Criminals can use encryption to secure
communications, or to store Incriminating material on electronic devices.

IV. REQUIREMENTS FOR A NEW SYSTEM

a) Lossless: It is the way of compressing the data which is fully reversible. The obtained image is exact
replica of he original image. Therefore it is fully reversible. The word lossless is used to denote a form of
compression that does t degrade the quality of the image being compressed. The decompressed image
is exactly the same as the original mage. In other words, the lossless method is a method of
decompression in which no data is discarded. The image is stored in a noncompressed format. b)
Progressive image: Here first low-resolution version of the image is transmitted, and then, upon the
reviewer’s request, the low resolution can be progressively improved by further transmission. People
don't optimize their images properly, which results in extremely slow loading time. When you intend to
publish your images online, you have to compromise the quality, just face the fact you cannot use a 10MB
image on a website layout. It's not fair to Visitors. A progressive image transmission allows visualization
of a full-sized image even when only a small piece of information has reached the receiver; this full-sized
image is an approximate version of the original image. The greater the amount of data received, the more

                                                     11
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

similar the ecompressed image is to the original one. In a progressive image transmission, every
element of the transmitted data contains information for refining the image globally, instead of locally as
a nonprogressive transmitter does. c) Embedding: The distortion due to embedding can be completely
removed from the watermarked image without accessing any side channel. The lossless data embedding
enables hash insertion while retaining the information content of the image in its entirety. Lossless
embedding is a term for a class of data hiding techniques that are capable of restoring the embedded
image to its original state without accessing any side information. d) Compression: Code in
communications is set of symbols and rules for their manipulation by which the symbols can be made to
carry information. Entropy coding is a special form of lossless data compression. It involves arranging the
image components in a “zigzag " order employing run length encoding (RLE) algorithm that groups
similar frequencies together, inserting length coding zeros, and then using Huffman coding on what is left.

V.   NERALMETHODOLOGY

The following diagram describes a general methodology and principles as listed below: At sender side:
1) Define Area: This will define the ROI where the smallest rectangle is obtained. The size of the
rectangle is the same for all medical images. The case will be different for other image modalities. 2)
HASH value and Patient information: Compute the hash value for the whole image. It is easy to
generate a hash given an image, but virtually impossible to generate the image given a hash value and
patient information. 3) Embed: This will embed the hash value to the RONI in their LSB. LSB is
chosen because of its vulnerability to attack that makes it a perfect candidate for verifying authenticity
and integrity of an image. The exact location where the hash value is atermarked is not important in this
paper because the image quality does not depends on where the watermark is embedded, but how many
pixels have been changed. In our experiment, we determine the area within RONI.

4) Compression: High quality image data requires large amounts of storage space and transmission band
width. One of the possible solutions is to compress the information so that the storage space and
transmission time can be reduced. Image compression address the problem of reducing the amount of data
required to represent a digital image with no significant loss of information. The goal of image
compression is to represent an image with a few numbers of bits as possible while preserving the quality
required for the given application. In this paper, as per the conventions of Huffman, the sequence of
symbols associated with a given message will be called the message code. The entire number of
messages to be transmitted will be called the message ensemble. The amiability between the sender and
receiver about the meaning of the ode for each message of the ensemble will be called the ensemble
code. In the way to formulate the requirements of an ensemble code, the coding symbols will be
represented by numbers. At receiver side: 1) Extraction: At the receiver end, the watermark is extracted
by visiting the back to the watermarking area and read the LSB value. 2) Flipping: The beauty medical
images is that the LSB for all pixels in the RONI are zeroes. The flipping function is not literally means
that. This function resets the corresponding LSBs back to zero. 3) Hash value: In theory, the extracted
image is the same pixel by pixel as the original image. Applying hash value to the extracted image will
give the same hash value to the one produced by the original image. 4) Authentication: This can be
achieved by comparing the extracted hash values with the hash of the extracted image. If they are the

                                                    12
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

same, then the image is authentic and that it has not been tampered with (integrity).
SENDER


                                        Compression


                                       MAC
                        Hash           value
        Image           Function




                                      patent


Figure 1: Sender Side



RECEIVER




                                           Extract


     Embedded
      Image
                                   Extracted Hash &
                                   Patient Info



                                                      Hash
 Pipelining


  Extracted Hash
   Image


 Authenticating Checking
Figure 2: Receiver Side

VI. CONCLUSION
While protection of a patient’s personal data is very crucial it is also important that the patient be
reassured that the data being viewed is that of themselves. We proposed a lossless reversible
scheme being capable of verifying authenticity and integrity of DICOM images. Besides that the

                                                         13
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

original image can be exactly recovered at the receiver site, the whole images integrity can be
strictly verified. We presented our watermarking scheme, including data embedding, extracting
and verifying procedure. Experimental results showed that such scheme could embed large
payload while keeping distortion level very low.
VII. REFERENCES

   2. Asim Banerjee, (2009),“Introduction to Digital Image Processing”, IEEE Workshop on
      Image Processing, pp 120.

   3. Fridrich, M. Goljan and Du R,(2002) "Lossless data embedding-new paradigm in digital
      watermarking," Applied Signal Processing, pp. 185- 196.

   4. Fridrich, M. Goljan and   Du R,(2001) "Invertible authentication," in Security and
      Watermarking of Multimedia Contents III, Jan 22-25 , pp. 197-208.

   5. Celik U, Sharma M, Tekalp A.M. and Saber E,(2002) "Reversible data hiding," pp.
      II-157-II-160 vol.2

   6. Tian,(2003) "High capacity reversible data embedding and content authentication," pp.
      III-517-20 vol.3.

   7. Ghrare S.E, Mohd M.A. Ali, Jumari K and Ismail M(2009), “An Efficient Low
      Complexity Lossless Coding Algorithm for Medical Images,” in American Journal of
      Applied Sciences 6 (8): 1502- 1508,

   8. Fridrich J, Goljan M and Du R, (2002) "Lossless data embedding-new paradigm in digital
      watermarking," Applied Signal Processing, pp. 185- 196,

   9. Celik M.U, Sharma G,        Tekalp A.M and     Saber E,(2002) "Reversible data hiding,"
      pp. II-157-II-160 vol.2.

   10. Tian,J (2003) "High capacity reversible data embedding and content authentication,"
       2003, pp. III-517-20 vol.3.
   11. Ghrare S.E, Mohd. Ali M.A, Jumari K and Ismail M (2009) “An Efficient Low
       Complexity Lossless Coding Algorithm for Medical Images,” in American Journal of
       Applied Sciences 6 (8): 1502- 1508,




                                              14

Weitere ähnliche Inhalte

Was ist angesagt?

Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defense
Dinesh More
 
Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...
TELKOMNIKA JOURNAL
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identification
ijtsrd
 
Final ieee software titles (2012 13)
Final ieee software titles (2012 13)Final ieee software titles (2012 13)
Final ieee software titles (2012 13)
Irissolution
 

Was ist angesagt? (20)

Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
 
50120130406045
5012013040604550120130406045
50120130406045
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing Attacks
 
resume -1-
resume -1-resume -1-
resume -1-
 
Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defense
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...
 
IRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris BiometricsIRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris Biometrics
 
Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...
 
Product Label Reading System for visually challenged people
Product Label Reading System for visually challenged peopleProduct Label Reading System for visually challenged people
Product Label Reading System for visually challenged people
 
IRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance SystemIRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance System
 
IRJET- Navigation and Camera Reading System for Visually Impaired
IRJET- Navigation and Camera Reading System for Visually ImpairedIRJET- Navigation and Camera Reading System for Visually Impaired
IRJET- Navigation and Camera Reading System for Visually Impaired
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identification
 
IRIS SOLUTIONS - IEEE 2012 ENGINEERING PROJECT TITLES FOR CSE, IT
IRIS SOLUTIONS - IEEE 2012 ENGINEERING PROJECT TITLES FOR CSE, IT IRIS SOLUTIONS - IEEE 2012 ENGINEERING PROJECT TITLES FOR CSE, IT
IRIS SOLUTIONS - IEEE 2012 ENGINEERING PROJECT TITLES FOR CSE, IT
 
Final ieee software titles (2012 13)
Final ieee software titles (2012 13)Final ieee software titles (2012 13)
Final ieee software titles (2012 13)
 

Andere mochten auch

A data mining approach for prediction of heart disease using neural networks
A data mining approach for prediction of heart disease using neural networksA data mining approach for prediction of heart disease using neural networks
A data mining approach for prediction of heart disease using neural networks
IAEME Publication
 
C:\users\nachitaypatty\documents\nacha\aspectos fundamentales a considerar al...
C:\users\nachitaypatty\documents\nacha\aspectos fundamentales a considerar al...C:\users\nachitaypatty\documents\nacha\aspectos fundamentales a considerar al...
C:\users\nachitaypatty\documents\nacha\aspectos fundamentales a considerar al...
María Ignacia Zamorano Zuloaga
 
El color morado para el vestuario
El color morado para el vestuarioEl color morado para el vestuario
El color morado para el vestuario
liesel9208
 
Production of nylon 6 fr lever using an injection moulding tool and identific...
Production of nylon 6 fr lever using an injection moulding tool and identific...Production of nylon 6 fr lever using an injection moulding tool and identific...
Production of nylon 6 fr lever using an injection moulding tool and identific...
IAEME Publication
 
Investigation of outdoor path loss models for wireless communication in bhuj
Investigation of outdoor path loss models for wireless communication in bhujInvestigation of outdoor path loss models for wireless communication in bhuj
Investigation of outdoor path loss models for wireless communication in bhuj
IAEME Publication
 
Relevance vector machine based prediction of mrrand sr for electro chemical m...
Relevance vector machine based prediction of mrrand sr for electro chemical m...Relevance vector machine based prediction of mrrand sr for electro chemical m...
Relevance vector machine based prediction of mrrand sr for electro chemical m...
IAEME Publication
 
A study on users of moodle through sarasin model
A study on users of moodle through sarasin modelA study on users of moodle through sarasin model
A study on users of moodle through sarasin model
IAEME Publication
 
Cochlear implant acoustic simulation model based on critical band filters
Cochlear implant acoustic simulation model based on critical band filtersCochlear implant acoustic simulation model based on critical band filters
Cochlear implant acoustic simulation model based on critical band filters
IAEME Publication
 

Andere mochten auch (9)

Presente
PresentePresente
Presente
 
A data mining approach for prediction of heart disease using neural networks
A data mining approach for prediction of heart disease using neural networksA data mining approach for prediction of heart disease using neural networks
A data mining approach for prediction of heart disease using neural networks
 
C:\users\nachitaypatty\documents\nacha\aspectos fundamentales a considerar al...
C:\users\nachitaypatty\documents\nacha\aspectos fundamentales a considerar al...C:\users\nachitaypatty\documents\nacha\aspectos fundamentales a considerar al...
C:\users\nachitaypatty\documents\nacha\aspectos fundamentales a considerar al...
 
El color morado para el vestuario
El color morado para el vestuarioEl color morado para el vestuario
El color morado para el vestuario
 
Production of nylon 6 fr lever using an injection moulding tool and identific...
Production of nylon 6 fr lever using an injection moulding tool and identific...Production of nylon 6 fr lever using an injection moulding tool and identific...
Production of nylon 6 fr lever using an injection moulding tool and identific...
 
Investigation of outdoor path loss models for wireless communication in bhuj
Investigation of outdoor path loss models for wireless communication in bhujInvestigation of outdoor path loss models for wireless communication in bhuj
Investigation of outdoor path loss models for wireless communication in bhuj
 
Relevance vector machine based prediction of mrrand sr for electro chemical m...
Relevance vector machine based prediction of mrrand sr for electro chemical m...Relevance vector machine based prediction of mrrand sr for electro chemical m...
Relevance vector machine based prediction of mrrand sr for electro chemical m...
 
A study on users of moodle through sarasin model
A study on users of moodle through sarasin modelA study on users of moodle through sarasin model
A study on users of moodle through sarasin model
 
Cochlear implant acoustic simulation model based on critical band filters
Cochlear implant acoustic simulation model based on critical band filtersCochlear implant acoustic simulation model based on critical band filters
Cochlear implant acoustic simulation model based on critical band filters
 

Ähnlich wie Protection for images transmission

Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
IAEME Publication
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
IAEME Publication
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
IAESIJEECS
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
dhanyashree11
 
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...
TELKOMNIKA JOURNAL
 

Ähnlich wie Protection for images transmission (20)

An efficient data masking for securing medical data using DNA encoding and ch...
An efficient data masking for securing medical data using DNA encoding and ch...An efficient data masking for securing medical data using DNA encoding and ch...
An efficient data masking for securing medical data using DNA encoding and ch...
 
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
 
Embedding and Extraction Techniques for Medical Images-Issues and Challenges
Embedding and Extraction Techniques for Medical Images-Issues and Challenges Embedding and Extraction Techniques for Medical Images-Issues and Challenges
Embedding and Extraction Techniques for Medical Images-Issues and Challenges
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
 
50120130406038
5012013040603850120130406038
50120130406038
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
 
50120130406010
5012013040601050120130406010
50120130406010
 
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...IRJET-  	  Steganographic Scheme for Outsourced Biomedical Time Series Data u...
IRJET- Steganographic Scheme for Outsourced Biomedical Time Series Data u...
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 
Medical image encryption techniques: a technical survey and potential challen...
Medical image encryption techniques: a technical survey and potential challen...Medical image encryption techniques: a technical survey and potential challen...
Medical image encryption techniques: a technical survey and potential challen...
 
Defenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacksDefenses against large scale online password guessing attacks
Defenses against large scale online password guessing attacks
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
 
Secure and efficient transmission of medical images
Secure and efficient transmission of medical imagesSecure and efficient transmission of medical images
Secure and efficient transmission of medical images
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkPublic key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural network
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
 

Mehr von IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Protection for images transmission

  • 1. International Journal ofJOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY INTERNATIONAL Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, (IJCET) October-December (2012), © IAEME ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 3, Issue 3, October - December (2012), pp. 09-14 IJCET © IAEME: www.iaeme.com/ijcet.html Journal Impact Factor (2012): 3.9580 (Calculated by GISI) ©IAEME www.jifactor.com PROTECTION FOR IMAGES TRANSMISSION 1. Karimella Vikram Head of the Dept. of CSE Medak College of Engineering & Technology Siddipet, Kondapaka, Meddak, (RR) Email Id: Vikramkarimella@yahoo.com 2. Dr. V. Murali Krishna Prof.& Principal Murthy Institute of Technology & Science AnkiReddy pally, Kesara, Hyderabad Email: Vmkrishna99@yahoo.com 3.Dr. Shaik Abdul Muzeer Professor & Director of PG studies Siddhartha Institute of Engineering & Technology Ibrahimpatnam, R.R.. Dist. e-mail: bdl_muzeer @ yahoo.co.in 4.Mr. K. Narasimha Assoc.Professor & HOD of E.C.E. Murthy Institute of technology AnkiReddy pally, Kesara, Hyderabad Email : nrsimha_9@yahoo.com ABSTRACT Medical image security is the most important issue during its transmission. Watermarking, digital fingerprint/signature, encryption, time of coding and encoding are the existing techniques for protecting mages. But, all this methods have some drawbacks. Lossless or reversible data embedding – is relatively new development, where both image and the message (embedded data) can be recovered in a lossless fashion and to verify the integrity and authenticity of DICOM images. Hash value of the whole image and 9
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME patient information is embedded in the least significant bits of the RONI. If the image has not been altered, the watermark will be extracted and the original image will be recovered. Hash value of the recovered image will be compared with the extracted watermark for authentication. The paper outlines that the present methods, previous work, need for security and requirements for new system and presets an approach to further research for lossless medical image security. Keywords-Medical image security, lossless compression, image authenticity and integrity, Information Hiding, DICOM. Keywords: China insurance industry, Foreign fund, Challenge I. INTRODUCTION Medical image sharing is used in a wide variety of applications ranging from telediagnosis to telesurgery, and it also promotes applications such as remote diagnosis aid and e-learning. Today all business, government, organizations are connected through internet but it is both fascinating & complex because of the requirements for security services. Mechanisms to meet those services are quite complex. So the network security is the most important. Security is the protection from attack [1]. Data embedding is the most commonly used mechanism for medical images. It is usual that a medical image is diagnosed before storing the image in the long-term storage, so the significant part of the image is already determined [2]. The significant part is called ROI (Region of Interest). The Health Insurance Portability and Accountability Act (HIPAA) [3] require that medical providers and insurance companies implement procedures and policies to protect patient’s medical information. Data embedding applications could be divided into two groups depending on the relationship between the embedded message and the cover image [4],[5]. The first group is formed by steganographic applications in which the message has no relationship to the cover image and the cover image plays the role of a decoy to mask the very presence of communication. The content of the cover image has no value to the sender or the decoder. The second group of applications is frequently addressed as digital watermarking. In a typical watermarking application, the message has a close relationship to the cover image. The message supplies additional information about the image, such as image caption, ancillary data about the image origin, author signature, image authentication code, etc. Communication of medical images in a PACS environment is usually over the internal hospital network that is protected by a firewall from outside intruders. Three major organizations related to medical image/data security have issued guidelines, mandates, and standards for image/data security. Conventional Internet Security methods are not sufficient to guarantee that medical image had not been compromised during data transmission. A reversible watermarking scheme involves inserting a Watermark into the original image in an invertible manner in that when the watermark was later extracted, the original image can be recovered completely [6-9]. Medical image compression is very important in the Present era where the information storage having the highest concern. While storing the medical images it is also equally important that images should be effectively compressed by using lossless technique, so that we can reproduce the original medical images without any loss [10]. The amount of data required to present images at an acceptable level of quality is extremely large. High quality image data requires large amounts of storage space and transmission band width [11]. One of the possible solutions is to compress the information so that the storage space and transmission time can be reduced. Image compression address the problem of reducing the amount of data required to 10
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME represent a digital image with no significant loss of information. The goal of image compression is to represent an image with a few number of bits as possible while preserving the quality required for the given application [12]. II. EXISTINGMETHOD There are four techniques to protect an image. 1) Watermarking 2) Digital Fingerprinting/Signatures 3) Encryption 1) Watermarking: Watermark is a “secret message” that is embedded into a “cover (original or host) message”. Digital watermarking is a technique which allows an individual to add hidden copyright notices or other verification message to digital audio, video or image signals and documents. a) Visible watermarks: Visible watermarks change the signal altogether such that the watermarked signal is totally different from actual signal. b) Invisible watermarks: Invisible watermarks change the signal to a perceptually great extent i.e. there are only minor variations in output signal. 2) Digital fingerprints/signatures: It is based on the concept of public key encryption. A public key known to everyone and a private or secret key known only to the recipient of the message. When John wants to send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it. It is mainly used in transmission of images. 3) Encryption: Plaintext is known as original message and cipher text is known as coded message. Encryption is the process of converting plaintext to cipher text to make it unreadable to anyone except those possessing key. Key specifies the particular transformation. Decryption is the process of restoring the plaintext from cipher text . III. DRAWBACKS OF EXISTINGMETHODS a) Major problem with watermarking schemas is that they are not very robust against different types of image manipulations or attacks. These techniques are quite complicated to implement in real-time. b)Digital fingerprints: Technological Compatibility, Security Concerns, Legal Issues are the prime concerns with respect to finger print. c) Encryption: Criminals can use encryption to secure communications, or to store Incriminating material on electronic devices. IV. REQUIREMENTS FOR A NEW SYSTEM a) Lossless: It is the way of compressing the data which is fully reversible. The obtained image is exact replica of he original image. Therefore it is fully reversible. The word lossless is used to denote a form of compression that does t degrade the quality of the image being compressed. The decompressed image is exactly the same as the original mage. In other words, the lossless method is a method of decompression in which no data is discarded. The image is stored in a noncompressed format. b) Progressive image: Here first low-resolution version of the image is transmitted, and then, upon the reviewer’s request, the low resolution can be progressively improved by further transmission. People don't optimize their images properly, which results in extremely slow loading time. When you intend to publish your images online, you have to compromise the quality, just face the fact you cannot use a 10MB image on a website layout. It's not fair to Visitors. A progressive image transmission allows visualization of a full-sized image even when only a small piece of information has reached the receiver; this full-sized image is an approximate version of the original image. The greater the amount of data received, the more 11
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME similar the ecompressed image is to the original one. In a progressive image transmission, every element of the transmitted data contains information for refining the image globally, instead of locally as a nonprogressive transmitter does. c) Embedding: The distortion due to embedding can be completely removed from the watermarked image without accessing any side channel. The lossless data embedding enables hash insertion while retaining the information content of the image in its entirety. Lossless embedding is a term for a class of data hiding techniques that are capable of restoring the embedded image to its original state without accessing any side information. d) Compression: Code in communications is set of symbols and rules for their manipulation by which the symbols can be made to carry information. Entropy coding is a special form of lossless data compression. It involves arranging the image components in a “zigzag " order employing run length encoding (RLE) algorithm that groups similar frequencies together, inserting length coding zeros, and then using Huffman coding on what is left. V. NERALMETHODOLOGY The following diagram describes a general methodology and principles as listed below: At sender side: 1) Define Area: This will define the ROI where the smallest rectangle is obtained. The size of the rectangle is the same for all medical images. The case will be different for other image modalities. 2) HASH value and Patient information: Compute the hash value for the whole image. It is easy to generate a hash given an image, but virtually impossible to generate the image given a hash value and patient information. 3) Embed: This will embed the hash value to the RONI in their LSB. LSB is chosen because of its vulnerability to attack that makes it a perfect candidate for verifying authenticity and integrity of an image. The exact location where the hash value is atermarked is not important in this paper because the image quality does not depends on where the watermark is embedded, but how many pixels have been changed. In our experiment, we determine the area within RONI. 4) Compression: High quality image data requires large amounts of storage space and transmission band width. One of the possible solutions is to compress the information so that the storage space and transmission time can be reduced. Image compression address the problem of reducing the amount of data required to represent a digital image with no significant loss of information. The goal of image compression is to represent an image with a few numbers of bits as possible while preserving the quality required for the given application. In this paper, as per the conventions of Huffman, the sequence of symbols associated with a given message will be called the message code. The entire number of messages to be transmitted will be called the message ensemble. The amiability between the sender and receiver about the meaning of the ode for each message of the ensemble will be called the ensemble code. In the way to formulate the requirements of an ensemble code, the coding symbols will be represented by numbers. At receiver side: 1) Extraction: At the receiver end, the watermark is extracted by visiting the back to the watermarking area and read the LSB value. 2) Flipping: The beauty medical images is that the LSB for all pixels in the RONI are zeroes. The flipping function is not literally means that. This function resets the corresponding LSBs back to zero. 3) Hash value: In theory, the extracted image is the same pixel by pixel as the original image. Applying hash value to the extracted image will give the same hash value to the one produced by the original image. 4) Authentication: This can be achieved by comparing the extracted hash values with the hash of the extracted image. If they are the 12
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME same, then the image is authentic and that it has not been tampered with (integrity). SENDER Compression MAC Hash value Image Function patent Figure 1: Sender Side RECEIVER Extract Embedded Image Extracted Hash & Patient Info Hash Pipelining Extracted Hash Image Authenticating Checking Figure 2: Receiver Side VI. CONCLUSION While protection of a patient’s personal data is very crucial it is also important that the patient be reassured that the data being viewed is that of themselves. We proposed a lossless reversible scheme being capable of verifying authenticity and integrity of DICOM images. Besides that the 13
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME original image can be exactly recovered at the receiver site, the whole images integrity can be strictly verified. We presented our watermarking scheme, including data embedding, extracting and verifying procedure. Experimental results showed that such scheme could embed large payload while keeping distortion level very low. VII. REFERENCES 2. Asim Banerjee, (2009),“Introduction to Digital Image Processing”, IEEE Workshop on Image Processing, pp 120. 3. Fridrich, M. Goljan and Du R,(2002) "Lossless data embedding-new paradigm in digital watermarking," Applied Signal Processing, pp. 185- 196. 4. Fridrich, M. Goljan and Du R,(2001) "Invertible authentication," in Security and Watermarking of Multimedia Contents III, Jan 22-25 , pp. 197-208. 5. Celik U, Sharma M, Tekalp A.M. and Saber E,(2002) "Reversible data hiding," pp. II-157-II-160 vol.2 6. Tian,(2003) "High capacity reversible data embedding and content authentication," pp. III-517-20 vol.3. 7. Ghrare S.E, Mohd M.A. Ali, Jumari K and Ismail M(2009), “An Efficient Low Complexity Lossless Coding Algorithm for Medical Images,” in American Journal of Applied Sciences 6 (8): 1502- 1508, 8. Fridrich J, Goljan M and Du R, (2002) "Lossless data embedding-new paradigm in digital watermarking," Applied Signal Processing, pp. 185- 196, 9. Celik M.U, Sharma G, Tekalp A.M and Saber E,(2002) "Reversible data hiding," pp. II-157-II-160 vol.2. 10. Tian,J (2003) "High capacity reversible data embedding and content authentication," 2003, pp. III-517-20 vol.3. 11. Ghrare S.E, Mohd. Ali M.A, Jumari K and Ismail M (2009) “An Efficient Low Complexity Lossless Coding Algorithm for Medical Images,” in American Journal of Applied Sciences 6 (8): 1502- 1508, 14