Shared Secret-based Steganography for Protecting Medical Data

被引:0
|
作者
Ahmad, Tohari [1 ]
Studiawan, Hudan [1 ]
Ahmad, Hafidh Sholihuddin [1 ]
Ijtihadie, Royyana M. [1 ]
Wibisono, Waskitho [1 ]
机构
[1] Inst Teknol Sepuluh Nopember ITS, Dept Informat, Surabaya, Indonesia
关键词
Steganography; security; shared-secret; data protection; IMAGES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Medical data (i.e., medical image and medical record) is private which should be protected before being transferred or stored. There have been some methods proposed by implementing various algorithms, such as steganography. It is sometimes combined with the shared secret method, so that, the reconstruction of the original data must be done by some users. It is believed that this method increases the security of the data. However, there is still a need to make the stego data (i.e, stego image) has an as good as possible quality. This means that the stego image has high similarity to the cover (carrier) image. In this paper, we propose methods to protect the medical data by using the shared secret mechanism and steganography for 2 and 1 bit LSB. The experimental results show that they produce relatively good quality (similarity) in terms of PSNR.
引用
收藏
页码:87 / 92
页数:6
相关论文
共 50 条
  • [21] Secret image sharing based on cellular automata and steganography
    Eslami, Z.
    Razzaghi, S. H.
    Ahmadabadi, J. Zarepour
    PATTERN RECOGNITION, 2010, 43 (01) : 397 - 404
  • [22] A Lossless Secret Image Sharing Scheme Based on Steganography
    Li, Li
    Abd El-Latif, Ahmed A.
    Yan, Xuehu
    Wang, Shen
    Niu, Xiamu
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1247 - 1250
  • [23] A robust steganography method for HEVC based on secret sharing
    Liu, Shuyang
    Xu, Degang
    COGNITIVE SYSTEMS RESEARCH, 2020, 59 : 207 - 220
  • [24] Protecting medical data for analyses
    Brumen, B
    Welzer, T
    Druzovec, M
    Golob, I
    Jaakkola, H
    PROCEEDINGS OF THE 15TH IEEE SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, 2002, : 102 - 107
  • [25] SHARED DATA SYSTEMS - CONGRESS, SECRET SHARER
    KORPER, SP
    CONNECTICUT MEDICINE, 1978, 42 (02) : 119 - 122
  • [26] Image steganography for securing secret data using hybrid hiding model
    Sumeet Kaur
    Savina Bansal
    Rakesh Kumar Bansal
    Multimedia Tools and Applications, 2021, 80 : 7749 - 7769
  • [27] Randomly Hiding Secret Data using Dynamic Programming for Image Steganography
    Khandelwal, Pulkit
    Bisht, Neha
    Thanikaiselvan, V
    2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 777 - 783
  • [28] Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography
    N. N. Shenets
    Automatic Control and Computer Sciences, 2023, 57 : 886 - 893
  • [29] Securing Medical Data Transmission Systems Based on Integrating Algorithm of Encryption and Steganography
    Hashim, M. M.
    Taha, Mustafa Sabah
    Aman, Azana Hafizah Mohd
    Hashim, Ai Sha Hassan Abdalla
    Rahim, Mohd Shafry Mohd
    Islam, Shayla
    2019 7TH INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING (ICOM), 2019, : 48 - 53
  • [30] A pixel contrast based medical image steganography to ensure and secure patient data
    Hashim, Mohammed Mahdi
    Mahmood, Ali A.
    Mohammed, Mohammed Q.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 1885 - 1904