CFP last date
20 January 2025
Reseach Article

A Robust Medical Image Authentication Technique using QR Code and DWT

by Sirshendu Hore, Tanmay Bhattacharya, S. R. Bhadra Chaudhuri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 16
Year of Publication: 2013
Authors: Sirshendu Hore, Tanmay Bhattacharya, S. R. Bhadra Chaudhuri
10.5120/14534-2950

Sirshendu Hore, Tanmay Bhattacharya, S. R. Bhadra Chaudhuri . A Robust Medical Image Authentication Technique using QR Code and DWT. International Journal of Computer Applications. 83, 16 ( December 2013), 21-26. DOI=10.5120/14534-2950

@article{ 10.5120/14534-2950,
author = { Sirshendu Hore, Tanmay Bhattacharya, S. R. Bhadra Chaudhuri },
title = { A Robust Medical Image Authentication Technique using QR Code and DWT },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 16 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number16/14534-2950/ },
doi = { 10.5120/14534-2950 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:59:35.434813+05:30
%A Sirshendu Hore
%A Tanmay Bhattacharya
%A S. R. Bhadra Chaudhuri
%T A Robust Medical Image Authentication Technique using QR Code and DWT
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 16
%P 21-26
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image authentication plays a vital role in safeguarding the originality as well as helps to retain the integrity of the data. It is also used as proof in case of content delivery. This paper proposes an efficient and effective medical image authentication technique by embedding information of a patient and doctor through corresponding QR codes in selected DWT sub-band of that image. At the receiver end QR codes are extracted and information containing in the QR codes are retrieved using Smart Phone or through standard QR Code Reader.

References
  1. G. L. Friedman, "The trustworthy digital camera: Restoring credibility to the photographic image", IEEE Trans. Consumer Electron. vol. 39, pp. 905–910, Nov. 1993.
  2. S. Walton, "Image Authentication for a Slippery New Age" Dr. Dobb's J. , pp. 18–26, April 1995.
  3. N. F. Johnson and S. Katzenbeisser," . A survey of steganographic techniques", in S. Katzenbeisser and F. Peticolas (Eds. ): Information Hiding, pp. 43-78. Artech House, Norwood, MA, 2000.
  4. Lou, D. C. and Liu, J. L. 2002. "Steganography Method for Secure Communications". Elsevier Science on Computers& Security, 21, 5: 449-460.
  5. J. Fridrich and M. Goljan, ". Practical steganalysis of digital images-state of the art". , Proc. SPIE Photonics West, Vol. 4675, pp. 1-13, San Jose, California, Jan. 2002.
  6. Chan, C. K. and Cheng, L. M. 2003. "Hiding data in image by simple LSB substitution". Pattern Recognition, 37:469-474.
  7. Iwata, M. , Miyake, K. and Shiozaki, A. 2004. "Digital Steganography Utilizing Features of JPEG Images", IEICE Transfusion Fundamentals, E87-A, 4:929-936.
  8. Po-Yueh Chen* and Hung-Ju Lin, "A DWT Based Approach for Image Steganography", International Journal of Applied Science and Engineering 2006. 4, 3: 275-290
  9. Ali Al-Ataby and Fawzi Al-Naima, "A Modified High Capacity Image Steganography Technique Based on Wavelet Transform", The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010.
  10. Blossom Kaur, Amandeep Kaur, Jasdeep Singh, Steganographic Approach for Hiding Image in DCT Domain", International Journal of Advances in Engineering & Technology, July 2011.
  11. Denso-Wave, "QR Code Standardization", QR Code. com. Archived from the original on 2012-09-15, Retrieved 23 April 2009.
  12. Denso-Wave. "QR Code features", Archived from the original on 2012-09-15. Retrieved 3rd October 2011.
  13. Tanmay Bhattacharya, Nilanjan Dey and S. R. Bhadra Chaudhuri, "A Session based Multiple Image Hiding Technique using DWT and DCT", International Journal of Computer Applications (IJCA), (0975 – 8887) Volume 38 – No. 5, pp 18-21, January 2012.
  14. Tanmay Bhattacharya, Sirshendu Hore and S. R. Bhadra Chaudhuri, "An Image Authentication Technique by Handwritten Signature Verification using DWT and ANN", International Journal of Computer Applications (IJCA), Volume 47– No. 21, pp 35-40, 21 June 2012.
  15. Denso ADC, "QR Code Essentials", 2011, Retrieved 12 March 2013.
Index Terms

Computer Science
Information Sciences

Keywords

DWT QR Code PSNR Medical Imaging