CFP last date
20 December 2024
Reseach Article

Security in Telemedicine using DWT-CDCS

by Kulkarni Pratibha C., Bhatia S.K.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 136 - Number 7
Year of Publication: 2016
Authors: Kulkarni Pratibha C., Bhatia S.K.
10.5120/ijca2016908486

Kulkarni Pratibha C., Bhatia S.K. . Security in Telemedicine using DWT-CDCS. International Journal of Computer Applications. 136, 7 ( February 2016), 11-15. DOI=10.5120/ijca2016908486

@article{ 10.5120/ijca2016908486,
author = { Kulkarni Pratibha C., Bhatia S.K. },
title = { Security in Telemedicine using DWT-CDCS },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 136 },
number = { 7 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 11-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume136/number7/24164-2016908486/ },
doi = { 10.5120/ijca2016908486 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:37:06.548327+05:30
%A Kulkarni Pratibha C.
%A Bhatia S.K.
%T Security in Telemedicine using DWT-CDCS
%J International Journal of Computer Applications
%@ 0975-8887
%V 136
%N 7
%P 11-15
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Copyright protection of digital media is the very first application that comes to mind for digital watermarking. In the past, duplicating artwork was quite complicated and requires great efforts to create the work looks just like the original. However, in present digital world it is very simple for anyone to duplicate or manipulate digital data. The digital image watermarking allows the watermark to be embedded visibly or invisibly in the original image for identification of the owner. This concept can also be used for other media, such as digital video and audio. Telemedicine is a well-known application of digital watermarking. In this application security & authentication for medical data is very important. Hiding the data into the medical image provide the security over the public network. Authentication verifies whether the image certainly belongs to the right patient Authentication of medical data used for further diagnosis and reference. This paper focused on the methods of medical image data hiding for security and authentication. High capacity data hiding is achieved with CDCS (Class Dependent Coding Scheme). As well as data is effectively hided with discrete wavelet transform. Embedding watermarks in RONI (region of non interest) protects the ROI (region of interest) of medical image, which is diagnostically important part of medical images. Segmentation plays an important role in medical image processing for separating the ROI from medical image.

References
  1. Sunita V. Dhavale1, and Suresh N. Mali, ‘‘High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Checking’’, International J. of Recent Trends in Engineering and Technology, vol. 3, no. 2, May 2010
  2. Rodriguez-Colin Raul, Feregrino-Uribe Claudia, Trinidad-Blas Gershom de J. ‘‘Data Hiding Scheme for Medical Images’’ IEEE 7th International Conference on Electronics, Communication and Computers,0-7695-2799-X/07,2007
  3. Aggeliki Giakoumaki,, Sotiris Pavlopoulos, and Dimitris Koutsouris, “ Multiple Image Watermarking Applied To Health Information Management ” IEEE Transaction on information technology on Biomedicine ,vol. 10, no. 4, pp. 722–732,Oct 2006.
  4. K. Solanki, N. Jacobsen, U. Madhow, B. S .Manjunath and S. Chandrashekhar, “ Robust Image-Adaptive Data hiding using Erasure and Error Correction,” IEEE Transactions on image processing, vol. 13,(2004)1627–1639.
  5. R.O.EI Safy, H. H. Zayed, A.EI Dessouki, “An Adaptive Steganographic Technique Based on Integer Wavelet Transform” IEEE Transaction on Image Processing vol. 978, no. 1, pp. 3778–4244-8/9, 2009.
  6. K. A. Navas, S. A. Thampy, and M. Sasikumar, “EPR Hiding in medical images for telemedicine,” International Journal of Biomedical Sciences vol. 3.1 (2008) 44– 47
  7. Min. Wu , ”Joint Security and Robustness Enhancement for Quantization Embedding”, IEEE Transactions On Circuit And Systems For Video Technology vol. 13,no.8 August 2003
  8. Deepthi Anand", U.C. Niranjan, ‘‘Watermarking Medical Images with Patient Information’’, Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, vol. 20, no. 2,1998
  9. Kurato Maeno, Qibin Sun, Shih-Fu Chang,Masayuki Suto, ‘‘New Semi-Fragile Image Authentication Watermarking Techniques Using Random Bias And Nonuniform Quantization’’ IEEE Transactions on Multimedia, vol. 8, no. 1, February 2006
  10. Neil F. Johnson Sushil Jajodia, ‘‘Exploring Steganography: Seeing the Unseen’’, IEEE Computer, vol.31, Issue 2, 1998
  11. Yiwei Wang, John F. Doherty, Robert E. Van Dyck, ‘‘A Wavelet-Based Watermarking Algorithm for Ownership Verification of Digital Images’’, IEEE Transactions on Image Processing, vol. 11, no. 2, February 2002
  12. Preeti Aggarwal, Renu Vig, Sonali Bhadoria, and C.G.Dethe , "Role of Segmentation in Medical Imaging: A Comparative Study", International Journal of Computer Applications (0975 8887), vol. 29 no.1, September 2011
  13. Gonzalo Alvarez1, Shujun Li and Luis Hernandez,“Analysis of security problems in a medical image encryption system,” Computers in Biology and Medicine, vol. 37 (2007) 424–427.
  14. Gurpreet Kaur, Kamaljeet Kaur “Image Watermarking Using LSB (Least Significant Bit)”, in International Journal of Advanced Research in Computer Science and Software Engineering vol. 3, Issue 4, April 2013.
  15. Jasni Zain and Malcolm Clarke, ‘‘Security in Telemedicine: Issues in Watermarking Medical Images’’, 3rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 27-31, 2005
  16. B. Planitz and A. Maeder, ‘‘Medical Image Watermarking: A Study on Image Degradation’’, Australian Pattern Recognition Society Workshop on Digital Image Computing, WDIC 2005, Brisbane, Australia 2005
  17. Pouria Mortazavian, Mohammad Jahangiri And Emad Fatemizadeh, ‘‘A Low-Degradation Steganography Model For Data Hiding In Medical Images’’,Proc. 4th IASTED Intenational Conference Visualization, Imaging And Image Processing Sep 2004
  18. Gaurav Chawla, Ravi Saini, Kamaldeep, Rajkumar Yadav, ‘‘Classification of Watermarking Based upon Various Parameters’’, International Journal of Computer Applications & Information Technology vol. I, Issue II, September 2012
  19. Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal, ‘‘Implementation of Image Steganography Using 2-Level DWT Technique’’, International Journal of Computer Science and Business Informatics, vol.1, no.1 May 2013
  20. M. Fallahpour and M. H. Sedaaghi, ‘‘High capacity lossless Data hiding based on histogram modification”, IEICE Electron. Express, vol. 4, no. 7, 2007
  21. Mahmoud El-Gayyar, “Watermarking Techniques Spatial Domain Digital Rights Seminar”, in Media Informatics, University of Bonn, Germany, May 2006
  22. S. Voloshynovskiy, S. Pereira, T. Pun, J.J. Eggers and J.K. Su, “Attacks on Digital Watermarks: Classification, Estimation-based Attacks and Benchmarks’’, IEEE Communication Magazine, August 2001
  23. A White paper on “Digital Watermarking: A Technology Overview”, Wipro Technologies, pp. 2 – 8. Aug. 2003.
  24. W.R. Hendee, ‘‘Medical Imaging Physics’’ 2002
  25. Syed Ali Khayam, "The Discrete Cosine Transform (DCT): Theory and Application", Michigan State University March 2003
Index Terms

Computer Science
Information Sciences

Keywords

CDCS data hiding medical image ROI