Shared Secret-based Steganography for Protecting Medical Data

被引:0
|
作者
Ahmad, Tohari [1 ]
Studiawan, Hudan [1 ]
Ahmad, Hafidh Sholihuddin [1 ]
Ijtihadie, Royyana M. [1 ]
Wibisono, Waskitho [1 ]
机构
[1] Inst Teknol Sepuluh Nopember ITS, Dept Informat, Surabaya, Indonesia
关键词
Steganography; security; shared-secret; data protection; IMAGES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Medical data (i.e., medical image and medical record) is private which should be protected before being transferred or stored. There have been some methods proposed by implementing various algorithms, such as steganography. It is sometimes combined with the shared secret method, so that, the reconstruction of the original data must be done by some users. It is believed that this method increases the security of the data. However, there is still a need to make the stego data (i.e, stego image) has an as good as possible quality. This means that the stego image has high similarity to the cover (carrier) image. In this paper, we propose methods to protect the medical data by using the shared secret mechanism and steganography for 2 and 1 bit LSB. The experimental results show that they produce relatively good quality (similarity) in terms of PSNR.
引用
收藏
页码:87 / 92
页数:6
相关论文
共 50 条
  • [1] A shared secret-based algorithm for securing the OLSR routing protocol
    Alia Fourati
    Khaldoun Al Agha
    Telecommunication Systems, 2006, 31 : 213 - 226
  • [2] A shared secret-based algorithm for securing the OLSR routing protocol
    Fourati, A
    Al Agha, K
    TELECOMMUNICATION SYSTEMS, 2006, 31 (2-3) : 213 - 226
  • [3] An Enhanced Steganography Network for Concealing and Protecting Secret Image Data
    Chen, Feng
    Xing, Qinghua
    Sun, Bing
    Yan, Xuehu
    Cheng, Jingwen
    ENTROPY, 2022, 24 (09)
  • [4] An experimental comparison of secret-based user authentication technologies
    Irakleous, I.
    Furnell, S.M.
    Dowland, P.S.
    Papadaki, M.
    Information Management and Computer Security, 2002, 10 (2-3): : 100 - 108
  • [5] A Dynamic Secret-Based Encryption Scheme for Smart Grid Wireless Communication
    Liu, Ting
    Liu, Yang
    Mao, Yashan
    Sun, Yao
    Guan, Xiaohong
    Gong, Weibo
    Xiao, Sheng
    IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (03) : 1175 - 1182
  • [6] Steganography for Confidential Communication and Secret Data storage
    Chaudhary, Dev Kumar
    Srivastava, Sandeep
    Choudhury, Tanupriya
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT 2018), 2018, : 461 - 465
  • [7] Health data and shared secret
    不详
    MEDECINE & DROIT, 2011, (107): : 130 - 130
  • [8] Steganography and Hiding Data with Indicators-based LSB Using a Secret Key
    Saqer, Wesam
    Barhoom, Tawfiq
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2016, 6 (03) : 1013 - 1017
  • [9] Tree-based Secure Comparison of Secret Shared Data
    Morita, Hiraku
    Attrapadung, Nuttapong
    Ohata, Satsuya
    Yamada, Shota
    Nuida, Koji
    Hanaoka, Goichiro
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 525 - 529
  • [10] A Hybrid Approach for Video Steganography by Stretching the Secret Data
    Karthikeyan, B.
    Raj, M. M. Anishin
    Yuvaraj, D.
    Sundar, K. Joseph Abraham
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 1081 - 1087