Skip to main content

Image Steganography Using Discrete Cosine Transform Algorithm for Medical Images

  • Conference paper
  • First Online:
Advances in Automation, Signal Processing, Instrumentation, and Control (i-CASIC 2020)

Abstract

The number of medical images is increasing exponentially day-by-day. This comes with increase in the security measures to be taken. All these medical images need to be shared among the doctors and the hospitals, so we have to take special care about the patient’s privacy not being exploited. Thus, digital steganography is a good way to protect the patient’s privacy. The quality of the image can’t be compromised. The information of the patient embedded in the image should be easily retrievable, and the process should not decompose the image in any manner. The steganography must be robust. So, only the authorized person can know about the existence of some hidden data. This paper aims at steganography discrete cosine transform (DCT), and the stimulated outputs we got.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ram B (2013) Digital image watermarking technique using discrete wavelet transform and discrete cosine transform. Int J Adv Res Technol 2(4):19–27

    Google Scholar 

  2. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 32–44

    Google Scholar 

  3. Ozer VAS, Ozturk S (2009) Improving the performance of DCT based fragile watermarking using intelligent algorithms. Opt Commun 282(14):2806–2817

    Article  Google Scholar 

  4. Zain JM, Clarke M (2007) Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. IJCSNS Int J Comput Sci Netw Secur 7(9):19–28

    Google Scholar 

  5. Wu N-I, Hwang M-S (2007) Data hiding current status and key issues. Int J Netw Secur 4(1):1–9

    Google Scholar 

  6. Solachidis V, Pitas L (2001) Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans Image Process 10(11):1741–1753

    Google Scholar 

  7. Haj Ali A, Hanhan AHAM (2011) Digital image watermarking, vol 1. Faculty of Engineering Electrical Engineering Department, AN-Najah National University, pp 1–47

    Google Scholar 

  8. Cedillo-Hernandez M, Garcia-Ugalde F, Nakano-Miyatake M, Perez-Meana H (2015) Robust watermarking method in DFT domain for effective management of medical imaging. SIViP 9(5):1163–1178

    Article  Google Scholar 

  9. Muharemagic E Furht B (2006) Survey of watermarking techniques and applications, pp 1–30

    Google Scholar 

  10. Amirtharajan R, Akila R, Deepika Chowdavarapu P (2010) A comparative analysis of image steganography. Int J Comput Appl 2:975-8887

    Google Scholar 

  11. Biradar RL, Umashetty A (2016) A survey paper on steganography techniques. Int J Innovative Res Comput Commun Eng 4(1):721–730

    Google Scholar 

  12. Jantan A, Younes MAB (2008) A new steganography approach for image encryption exchange by using LSB insertion. Int J Comput Sci Netw Secur 8:247–254

    Google Scholar 

  13. Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727–752

    Google Scholar 

  14. Hyung-Kyo L, Hee-Jung K, Ki-Ryong K, Jong-Keuk L (2005) ROI medical image watermarking using DWT and bit-plane. In: 2005 Asia-Pacific conference on communications, Perth, Western Australia, pp 512–515

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nikhitha Keshava Murthy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Keshava Murthy, N., Sharma, S., Jasmine Pemeena Priyadarsini, M., Ranjan, R., Sarkar, S., Sardar Basha, N. (2021). Image Steganography Using Discrete Cosine Transform Algorithm for Medical Images. In: Komanapalli, V.L.N., Sivakumaran, N., Hampannavar, S. (eds) Advances in Automation, Signal Processing, Instrumentation, and Control. i-CASIC 2020. Lecture Notes in Electrical Engineering, vol 700. Springer, Singapore. https://doi.org/10.1007/978-981-15-8221-9_219

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-8221-9_219

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-8220-2

  • Online ISBN: 978-981-15-8221-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics