Abstract
The number of medical images is increasing exponentially day-by-day. This comes with increase in the security measures to be taken. All these medical images need to be shared among the doctors and the hospitals, so we have to take special care about the patient’s privacy not being exploited. Thus, digital steganography is a good way to protect the patient’s privacy. The quality of the image can’t be compromised. The information of the patient embedded in the image should be easily retrievable, and the process should not decompose the image in any manner. The steganography must be robust. So, only the authorized person can know about the existence of some hidden data. This paper aims at steganography discrete cosine transform (DCT), and the stimulated outputs we got.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ram B (2013) Digital image watermarking technique using discrete wavelet transform and discrete cosine transform. Int J Adv Res Technol 2(4):19–27
Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 32–44
Ozer VAS, Ozturk S (2009) Improving the performance of DCT based fragile watermarking using intelligent algorithms. Opt Commun 282(14):2806–2817
Zain JM, Clarke M (2007) Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. IJCSNS Int J Comput Sci Netw Secur 7(9):19–28
Wu N-I, Hwang M-S (2007) Data hiding current status and key issues. Int J Netw Secur 4(1):1–9
Solachidis V, Pitas L (2001) Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans Image Process 10(11):1741–1753
Haj Ali A, Hanhan AHAM (2011) Digital image watermarking, vol 1. Faculty of Engineering Electrical Engineering Department, AN-Najah National University, pp 1–47
Cedillo-Hernandez M, Garcia-Ugalde F, Nakano-Miyatake M, Perez-Meana H (2015) Robust watermarking method in DFT domain for effective management of medical imaging. SIViP 9(5):1163–1178
Muharemagic E Furht B (2006) Survey of watermarking techniques and applications, pp 1–30
Amirtharajan R, Akila R, Deepika Chowdavarapu P (2010) A comparative analysis of image steganography. Int J Comput Appl 2:975-8887
Biradar RL, Umashetty A (2016) A survey paper on steganography techniques. Int J Innovative Res Comput Commun Eng 4(1):721–730
Jantan A, Younes MAB (2008) A new steganography approach for image encryption exchange by using LSB insertion. Int J Comput Sci Netw Secur 8:247–254
Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727–752
Hyung-Kyo L, Hee-Jung K, Ki-Ryong K, Jong-Keuk L (2005) ROI medical image watermarking using DWT and bit-plane. In: 2005 Asia-Pacific conference on communications, Perth, Western Australia, pp 512–515
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Keshava Murthy, N., Sharma, S., Jasmine Pemeena Priyadarsini, M., Ranjan, R., Sarkar, S., Sardar Basha, N. (2021). Image Steganography Using Discrete Cosine Transform Algorithm for Medical Images. In: Komanapalli, V.L.N., Sivakumaran, N., Hampannavar, S. (eds) Advances in Automation, Signal Processing, Instrumentation, and Control. i-CASIC 2020. Lecture Notes in Electrical Engineering, vol 700. Springer, Singapore. https://doi.org/10.1007/978-981-15-8221-9_219
Download citation
DOI: https://doi.org/10.1007/978-981-15-8221-9_219
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8220-2
Online ISBN: 978-981-15-8221-9
eBook Packages: EngineeringEngineering (R0)