Secured Transmission of Sensitive Images of Skin Diseases Using Steganography and Cryptography

被引:0
|
作者
Hossain, Kunal [1 ]
Jana, Susovan [1 ]
Mukherjee, Saswati [1 ]
Parekh, Ranjan [1 ]
机构
[1] Jadavpur Univ, Sch Educ Technol, Kolkata, India
关键词
Steganography; LSB; Stego-image; Encrypted image; DCT; Flip; Stego-key; Skin disease;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the evolution of technology, wireless transmission of sensitive images especially images of skin disease has facilitated doctors to obtain updates regarding the current progress of the disease from various experts. But transmission of such images is vulnerable to serious threats and attacks. To protect the sensitive images from intrusion, certain security measures need to be adopted. LSB based encoding method has been proposed in this paper that utilizes DCT and pixel flipping techniques to form the stego-image. Stego-key generation method is also implemented to validate the authorized receiver during retrieval. The image of the skin disease is considered to be both cover image and stego-image. The receiver can retrieve the original image using key-based decryption algorithm, LSB, and pixel flipping method. The extensive experimental analysis is conducted to demonstrate the efficacy of the proposed method with existing ones.
引用
收藏
页码:95 / 99
页数:5
相关论文
共 50 条
  • [31] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [32] A Hybrid Secured Approach Combining LSB Steganography and AES Using Mosaic Images for Ensuring Data Security
    Saralya Roy
    Md. Moinul Islam
    SN Computer Science, 2022, 3 (2)
  • [33] Securing X-Ray Images Into Cover Images Using Hybrid EBS Steganography With Five-Layer Cryptography
    Sharma, Divya
    Prabha, Chander
    Hassan, Md Mehedi
    Abdulla, Shahab
    Bairagi, Anupam Kumar
    Alshathri, Samah
    El-Shafai, Walid
    IEEE ACCESS, 2024, 12 : 165050 - 165067
  • [34] Online Payment System using Steganography and Visual Cryptography
    Roy, Souvik
    Venkateswaran, P.
    2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2014,
  • [35] A Smart Strategy for Data Hiding using Cryptography and Steganography
    Srinivasarao, Tumma
    Yannam, Adilakshmi
    Markapudi, Baburao
    Chaduvula, Kavitha
    Allada, Apparna
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2023, 82 (05): : 546 - 551
  • [36] Two New Approaches for Image Steganography Using Cryptography
    Sharma, Vipul
    Madhusudan
    2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 202 - 207
  • [37] High Payload Capacity using Steganography Combined with Cryptography
    Deepak, Tatavarthi Sai
    Enireddy, Vamsidhar
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1448 - 1453
  • [38] Data hiding on web using combination of Steganography and Cryptography
    Kothari, Lipi
    Thakkar, Rikin
    Khara, Satvik
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 448 - 452
  • [39] An Access Control System using Visual Cryptography and Steganography
    Bhase, Gargee
    Mangrulkar, Ramchandra S.
    2018 FOURTEENTH INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICINPRO) - 2018, 2018, : 49 - 54
  • [40] Hiding Secret Message using Visual Cryptography in Steganography
    Meghrajani, Yogesh K.
    Mazumdar, Himanshu S.
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,