Shared Secret-based Steganography for Protecting Medical Data

被引:0
|
作者
Ahmad, Tohari [1 ]
Studiawan, Hudan [1 ]
Ahmad, Hafidh Sholihuddin [1 ]
Ijtihadie, Royyana M. [1 ]
Wibisono, Waskitho [1 ]
机构
[1] Inst Teknol Sepuluh Nopember ITS, Dept Informat, Surabaya, Indonesia
关键词
Steganography; security; shared-secret; data protection; IMAGES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Medical data (i.e., medical image and medical record) is private which should be protected before being transferred or stored. There have been some methods proposed by implementing various algorithms, such as steganography. It is sometimes combined with the shared secret method, so that, the reconstruction of the original data must be done by some users. It is believed that this method increases the security of the data. However, there is still a need to make the stego data (i.e, stego image) has an as good as possible quality. This means that the stego image has high similarity to the cover (carrier) image. In this paper, we propose methods to protect the medical data by using the shared secret mechanism and steganography for 2 and 1 bit LSB. The experimental results show that they produce relatively good quality (similarity) in terms of PSNR.
引用
收藏
页码:87 / 92
页数:6
相关论文
共 50 条
  • [31] Image steganography for securing secret data using hybrid hiding model
    Kaur, Sumeet
    Bansal, Savina
    Bansal, Rakesh Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (05) : 7749 - 7769
  • [32] Approach for Protecting Mobile Device User's Data Based on Multifactor Authentication, Visual Cryptography, and Steganography
    Shenets, N. N.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2023, 57 (08) : 886 - 893
  • [33] Secure Bit-Plane Based Steganography for Secret Communication
    Bui, Cong-Nguyen
    Lee, Hae-Yeoun
    Joo, Jeong-Chun
    Lee, Heung-Kyu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (01): : 79 - 86
  • [34] Secret Key-Based Image Steganography in Spatial Domain
    Gajabe, Rajashree
    Ali, Syed Taqi
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2022, 22 (02)
  • [35] Constructive Texture Steganography Based on Compression Mapping of Secret Messages
    Li, Fengyong
    Yu, Zongliang
    Qin, Chuan
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2020, 124 (01): : 393 - 410
  • [36] Hiding Secret Information Using LSB Based Audio Steganography
    Binny, Anu
    Koilakuntla, Maddulety
    2014 INTERNATIONAL CONFERENCE ON SOFT COMPUTING & MACHINE INTELLIGENCE ISCMI 2014, 2014, : 56 - 59
  • [37] Fast Database Joins and PSI for Secret Shared Data
    Mohassel, Payman
    Rindal, Peter
    Rosulek, Mike
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1271 - 1287
  • [38] Protecting User Privacy Based on Secret Sharing with Fault Tolerance for Big Data in Smart Grid
    Guan, Zhitao
    Si, Guanlin
    Du, Xiaojiang
    Liu, Peng
    Zhang, Zijian
    Zhou, Zhenyu
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [39] Image Based Steganography to Facilitate Improving Counting-Based Secret Sharing
    Gutub, Adnan
    Al-Ghamdi, Maimoona
    3D RESEARCH, 2019, 10 (01):
  • [40] Secret Data Sharing in Cloud Environment Using Steganography and Encryption Using GA
    Mandal, Subhasish
    Bhattacharyya, Souvik
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1469 - 1474