Abstract
In this paper our main aim is to protect medical research information, when data either images or information shared via internet or stored on hard drive 3rd person can’t access without authentication. As needs be, there has been an expanded enthusiasm for ongoing years to upgrade the secrecy of patients’ data. For this we combined different techniques to provide more security. Our approach is a combination of cryptography, Steganography & digital watermarking we named this technique as Next Gen. We used cryptography for encrypting the patient’s information even if they find image is stegonized and digital watermarking for authenticity and for Steganography we used most popular least significant bit algorithm (LSB). The experimental outcomes with various inputs show that the proposed technique gives a decent tradeoff between security, implanting limit and visual nature of the stego pictures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mahalakshmi, V., Satheeshkumar, S., Sivakumar, S.: Performance of steganographic methods in medical imaging. IJCAM 12(1), (2017). ISSN 1819-4966
Ashwin, S., Ramesh, J., Kumar, S.A., Gunavathi, K.: Novel and secure encoding and hiding techniques using image steganography: a survey. In: Emerging Trends in ICETEEEM (2012)
Hemalatha, S., Acharya, U.D., Renuka, A.: Audio data hiding technique using integer wavelet transform. Int. J. Electron. Sec. Digit. Forensics 8, 131–147 (2016)
Samanta, D., Podder, S.K.: Level of green computing based management practices for digital revolution and New India. Int. J. Eng. Adv. Technol. (IJEAT) 8(3S), (2019). ISSN 2249-8958
Sivakumar, P., Nagaraju, R., Samanta, D., Sivaram, M., HindiaIraj, N., Amiri, S.: A novel free space communication system using nonlinear InGaAsP microsystem resonators for enabling power-control toward smart cities. Wirel. Netw. J. Mob. Commun. Comput. Inf. (2019). ISSN 1022-0038
Mahua, B., Podder, S.K., Shalini, R., Samanta, D.: Factors that influence sustainable education with respect to innovation and statistical science. Int. J. Recent Technol. Eng. 8(3), (2019). ISSN 2277-3878
Praveen, B., Umarani, N., Anand, T., Samanta, D.: Cardinal digital image data fortification expending steganography. Int. J. Recent Technol. Eng. 8(3), (2019). ISSN 2277-3878
Dhanush, V., Mahendra, A.R., Kumudavalli, M.V., Samanta, D.: Application of deep learning technique for automatic data exchange with Air-Gapped Systems and its Security Concerns. In: Proceedings of IEEE International Conference on Computing Methodologies and Communication, Erode, 18–19 July 2017 (2017)
Kumar, R., Rishabh, K., Samanta, D., Paul, M., Vijaya Kumar, C.M.: A combining approach using DFT and FIR filter to enhance impulse response. In: Proceedings of IEEE International Conference on Computing Methodologies and Communication, Erode, 18–19 July 2017 (2017)
Ghosh, G., Samanta, D., Paul, M., Kumar Janghel, N.: Hiding based message communication techniques depends on divide and conquer approach. In: Proceedings of IEEE International Conference on Computing Methodologies and Communication, Erode, 18–19 July 2017 (2017)
Singh, R.K., Begum, T., Borah, L., Samanta, D.: Text encryption: character jumbling. In: Proceedings of IEEE International Conference on Inventive Systems and Control, Coimbatore, 19–20 January 2017. IEEE (2017)
Chugh, G.: Image steganography techniques (2013)
Jain, M., Lenka, S.K.: Diagonal queue medical image steganography with Rabin cryptosystem. Brain Inform. 3, 39 (2016)
Hossain, Md.A., Samanta, D., Sanyal, G.: A novel approach to extract panic facial expression based on mutation. In: Proceedings of International Conference on Advanced Communication Control and Computing Technologies, ICACCCT 2012, Tamil Nadu, India, 23–25 August 2012. IEEE (2012)
Hossain, Md.A., Samanta, D., Sanyal, G.: Statistical approach for extraction of panic expression. In: Proceedings of International Conference on Computational Intelligence and Communication Networks (CICN 2012), Mathura, India, 3–5 November 2012, pp. 420–424. IEEE (2012)
Hossain, Md.A., Samanta, D., Sanyal, G.: Automated smiley face extraction based on genetic algorithm. In: Proceedings of the International Workshop on Signal Image Processing and Multimedia (SIPM-2012), India, 13-15 July 2012, pp. 31–37 (2012)
Hossain, Md.A., Samanta, D., Sanyal, G.: Extraction of panic expression depending on lip detection. In: Proceedings of the International Conference on Computing Sciences (ICCS), 14–15 September 2012, pp. 473–477. IEEE (2012)
Hossain, Md.A., Samanta, D., Sanyal, G.: A novel approach to extract region from facial expression based on mutation. In: Proceedings of the Second International Conference on Advances in Computing, Control and Communication (CCN-2012), Delhi NCR, India, 16–17 June 2012, pp 15–18. https://doi.org/10.3850/978-981-07-2579-2 CCN-390. ISBN 978-981-07-2579-2
Hossain, Md.A., Samanta, D., Sanyal, G.: Extraction of panic expression from human face based on histogram approach. In: Venugopal, K.R., Patnaik, L.M. (eds.) Proceedings of Sixth International Conference on Information Processing, ICIP 2012, CCIS 292, 10–12 August 2012, pp. 411–418 (2012). Springer, Heidelberg (2012)
Samanta, D., Ghosh, A.: Automatic obstacle detection based on Gaussian function in RoboCar. In: Proceedings of International Conference on Competitiveness and Innovativeness in Engineering, Management and Information Technology (ICCIEMI-2012), 29 January 2012, Haryana, India (2012)
Samanta, D., Sanyal, G.: A novel approach of SAR image classification using color space clustering and watersheds. In: Proceedings of International Conference on Computational Intelligence and Communication Networks (CICN 2012), Mathura, India, 3–5 November 2012, pp. 237–240. IEEE (2012)
Samanta, D., Sanyal, G.: Novel Shannon’s entropy based segmentation technique for SAR images. In: Venugopal, K.R., Patnaik, L.M. (eds.) Proceedings of Sixth International Conference on Information Processing, ICIP 2012, CCIS 292, 10–12 August 2012, pp. 193–199. Springer, Heidelberg (2012)
Samanta, D., Sanyal, G.: Segmentation technique of SAR imagery based on fuzzy C-means clustering. In: Proceedings of the IEEE International Conference on Advances in Engineering, Science and Management (IEEE-ICAESM 2012), Nagapattinam, India, 30–31 March 2012, pp. 610–612. IEEE (2012). ISBN 978-81-909042-2-3
Samanta, D., Sanyal, G.: SAR image segmentation based on higher order moments. In: Proceedings of International Conference on Systemics, Cybernetics and Informatics (ICSCI - 2012), Andhra Pradesh, India, 15–18 February 2012, pp. 323–326 (2012)
Samanta, D., Sanyal, G.: A novel approach of SAR image processing based on Hue, Saturation and Brightness (HSB). In: Proceedings of the 2nd International Conference on Computer, Communication, Control and Information Technology (C3IT-2012), West Bengal, India, 25–26 February 2012. Procedia Technology (2012). ISSN 2212-0173
Chakrabarti, S., Samanta, D.: Image steganography using priority-based neural network and pyramid. In: Emerging Research in Computing, Information, Communication and Applications, pp. 163–172 (2016). https://doi.org/10.1007/978-981-10-0287-8_15
Ghosh, G., Samanta, D., Paul, M.: Approach of message communication based on twisty “Zig-Zag”. In: 2016 International Conference on Emerging Technological Trends (ICETT) (2016). https://doi.org/10.1109/icett.2016.7873676
Hossain, M.A., Samanta, D., Sanyal, G.: Extraction of panic expression depending on lip detection. In: 2012 International Conference on Computing Sciences (2012). https://doi.org/10.1109/iccs.2012.35
Hossain, M.A., Samanta, D., Sanyal, G.: Statistical approach for extraction of panic expression. In: 2012 Fourth International Conference on Computational Intelligence and Communication Networks (2012). https://doi.org/10.1109/cicn.2012.189
Khadri, S.K.A., Samanta, D., Paul, M.: Approach of message communication using Fibonacci series: in cryptology. In: Lecture Notes on Information Theory (2014). https://doi.org/10.12720/lnit.2.2.168-171
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Praveen, B., Samanta, D., Prasad, G., Ranjith Kumar, C., Prasad, M.L.M. (2020). Protecting Medical Research Data Using Next Gen Steganography Approach. In: Jain, L., Peng, SL., Alhadidi, B., Pal, S. (eds) Intelligent Computing Paradigm and Cutting-edge Technologies. ICICCT 2019. Learning and Analytics in Intelligent Systems, vol 9. Springer, Cham. https://doi.org/10.1007/978-3-030-38501-9_34
Download citation
DOI: https://doi.org/10.1007/978-3-030-38501-9_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38500-2
Online ISBN: 978-3-030-38501-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)