Skip to main content

Protecting Medical Research Data Using Next Gen Steganography Approach

  • Conference paper
  • First Online:
Intelligent Computing Paradigm and Cutting-edge Technologies (ICICCT 2019)

Abstract

In this paper our main aim is to protect medical research information, when data either images or information shared via internet or stored on hard drive 3rd person can’t access without authentication. As needs be, there has been an expanded enthusiasm for ongoing years to upgrade the secrecy of patients’ data. For this we combined different techniques to provide more security. Our approach is a combination of cryptography, Steganography & digital watermarking we named this technique as Next Gen. We used cryptography for encrypting the patient’s information even if they find image is stegonized and digital watermarking for authenticity and for Steganography we used most popular least significant bit algorithm (LSB). The experimental outcomes with various inputs show that the proposed technique gives a decent tradeoff between security, implanting limit and visual nature of the stego pictures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mahalakshmi, V., Satheeshkumar, S., Sivakumar, S.: Performance of steganographic methods in medical imaging. IJCAM 12(1), (2017). ISSN 1819-4966

    Google Scholar 

  2. Ashwin, S., Ramesh, J., Kumar, S.A., Gunavathi, K.: Novel and secure encoding and hiding techniques using image steganography: a survey. In: Emerging Trends in ICETEEEM (2012)

    Google Scholar 

  3. Hemalatha, S., Acharya, U.D., Renuka, A.: Audio data hiding technique using integer wavelet transform. Int. J. Electron. Sec. Digit. Forensics 8, 131–147 (2016)

    Article  Google Scholar 

  4. Samanta, D., Podder, S.K.: Level of green computing based management practices for digital revolution and New India. Int. J. Eng. Adv. Technol. (IJEAT) 8(3S), (2019). ISSN 2249-8958

    Google Scholar 

  5. Sivakumar, P., Nagaraju, R., Samanta, D., Sivaram, M., HindiaIraj, N., Amiri, S.: A novel free space communication system using nonlinear InGaAsP microsystem resonators for enabling power-control toward smart cities. Wirel. Netw. J. Mob. Commun. Comput. Inf. (2019). ISSN 1022-0038

    Google Scholar 

  6. Mahua, B., Podder, S.K., Shalini, R., Samanta, D.: Factors that influence sustainable education with respect to innovation and statistical science. Int. J. Recent Technol. Eng. 8(3), (2019). ISSN 2277-3878

    Google Scholar 

  7. Praveen, B., Umarani, N., Anand, T., Samanta, D.: Cardinal digital image data fortification expending steganography. Int. J. Recent Technol. Eng. 8(3), (2019). ISSN 2277-3878

    Google Scholar 

  8. Dhanush, V., Mahendra, A.R., Kumudavalli, M.V., Samanta, D.: Application of deep learning technique for automatic data exchange with Air-Gapped Systems and its Security Concerns. In: Proceedings of IEEE International Conference on Computing Methodologies and Communication, Erode, 18–19 July 2017 (2017)

    Google Scholar 

  9. Kumar, R., Rishabh, K., Samanta, D., Paul, M., Vijaya Kumar, C.M.: A combining approach using DFT and FIR filter to enhance impulse response. In: Proceedings of IEEE International Conference on Computing Methodologies and Communication, Erode, 18–19 July 2017 (2017)

    Google Scholar 

  10. Ghosh, G., Samanta, D., Paul, M., Kumar Janghel, N.: Hiding based message communication techniques depends on divide and conquer approach. In: Proceedings of IEEE International Conference on Computing Methodologies and Communication, Erode, 18–19 July 2017 (2017)

    Google Scholar 

  11. Singh, R.K., Begum, T., Borah, L., Samanta, D.: Text encryption: character jumbling. In: Proceedings of IEEE International Conference on Inventive Systems and Control, Coimbatore, 19–20 January 2017. IEEE (2017)

    Google Scholar 

  12. Chugh, G.: Image steganography techniques (2013)

    Google Scholar 

  13. Jain, M., Lenka, S.K.: Diagonal queue medical image steganography with Rabin cryptosystem. Brain Inform. 3, 39 (2016)

    Article  Google Scholar 

  14. Hossain, Md.A., Samanta, D., Sanyal, G.: A novel approach to extract panic facial expression based on mutation. In: Proceedings of International Conference on Advanced Communication Control and Computing Technologies, ICACCCT 2012, Tamil Nadu, India, 23–25 August 2012. IEEE (2012)

    Google Scholar 

  15. Hossain, Md.A., Samanta, D., Sanyal, G.: Statistical approach for extraction of panic expression. In: Proceedings of International Conference on Computational Intelligence and Communication Networks (CICN 2012), Mathura, India, 3–5 November 2012, pp. 420–424. IEEE (2012)

    Google Scholar 

  16. Hossain, Md.A., Samanta, D., Sanyal, G.: Automated smiley face extraction based on genetic algorithm. In: Proceedings of the International Workshop on Signal Image Processing and Multimedia (SIPM-2012), India, 13-15 July 2012, pp. 31–37 (2012)

    Google Scholar 

  17. Hossain, Md.A., Samanta, D., Sanyal, G.: Extraction of panic expression depending on lip detection. In: Proceedings of the International Conference on Computing Sciences (ICCS), 14–15 September 2012, pp. 473–477. IEEE (2012)

    Google Scholar 

  18. Hossain, Md.A., Samanta, D., Sanyal, G.: A novel approach to extract region from facial expression based on mutation. In: Proceedings of the Second International Conference on Advances in Computing, Control and Communication (CCN-2012), Delhi NCR, India, 16–17 June 2012, pp 15–18. https://doi.org/10.3850/978-981-07-2579-2 CCN-390. ISBN 978-981-07-2579-2

  19. Hossain, Md.A., Samanta, D., Sanyal, G.: Extraction of panic expression from human face based on histogram approach. In: Venugopal, K.R., Patnaik, L.M. (eds.) Proceedings of Sixth International Conference on Information Processing, ICIP 2012, CCIS 292, 10–12 August 2012, pp. 411–418 (2012). Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  20. Samanta, D., Ghosh, A.: Automatic obstacle detection based on Gaussian function in RoboCar. In: Proceedings of International Conference on Competitiveness and Innovativeness in Engineering, Management and Information Technology (ICCIEMI-2012), 29 January 2012, Haryana, India (2012)

    Google Scholar 

  21. Samanta, D., Sanyal, G.: A novel approach of SAR image classification using color space clustering and watersheds. In: Proceedings of International Conference on Computational Intelligence and Communication Networks (CICN 2012), Mathura, India, 3–5 November 2012, pp. 237–240. IEEE (2012)

    Google Scholar 

  22. Samanta, D., Sanyal, G.: Novel Shannon’s entropy based segmentation technique for SAR images. In: Venugopal, K.R., Patnaik, L.M. (eds.) Proceedings of Sixth International Conference on Information Processing, ICIP 2012, CCIS 292, 10–12 August 2012, pp. 193–199. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  23. Samanta, D., Sanyal, G.: Segmentation technique of SAR imagery based on fuzzy C-means clustering. In: Proceedings of the IEEE International Conference on Advances in Engineering, Science and Management (IEEE-ICAESM 2012), Nagapattinam, India, 30–31 March 2012, pp. 610–612. IEEE (2012). ISBN 978-81-909042-2-3

    Google Scholar 

  24. Samanta, D., Sanyal, G.: SAR image segmentation based on higher order moments. In: Proceedings of International Conference on Systemics, Cybernetics and Informatics (ICSCI - 2012), Andhra Pradesh, India, 15–18 February 2012, pp. 323–326 (2012)

    Google Scholar 

  25. Samanta, D., Sanyal, G.: A novel approach of SAR image processing based on Hue, Saturation and Brightness (HSB). In: Proceedings of the 2nd International Conference on Computer, Communication, Control and Information Technology (C3IT-2012), West Bengal, India, 25–26 February 2012. Procedia Technology (2012). ISSN 2212-0173

    Article  Google Scholar 

  26. Chakrabarti, S., Samanta, D.: Image steganography using priority-based neural network and pyramid. In: Emerging Research in Computing, Information, Communication and Applications, pp. 163–172 (2016). https://doi.org/10.1007/978-981-10-0287-8_15

    Google Scholar 

  27. Ghosh, G., Samanta, D., Paul, M.: Approach of message communication based on twisty “Zig-Zag”. In: 2016 International Conference on Emerging Technological Trends (ICETT) (2016). https://doi.org/10.1109/icett.2016.7873676

  28. Hossain, M.A., Samanta, D., Sanyal, G.: Extraction of panic expression depending on lip detection. In: 2012 International Conference on Computing Sciences (2012). https://doi.org/10.1109/iccs.2012.35

  29. Hossain, M.A., Samanta, D., Sanyal, G.: Statistical approach for extraction of panic expression. In: 2012 Fourth International Conference on Computational Intelligence and Communication Networks (2012). https://doi.org/10.1109/cicn.2012.189

  30. Khadri, S.K.A., Samanta, D., Paul, M.: Approach of message communication using Fibonacci series: in cryptology. In: Lecture Notes on Information Theory (2014). https://doi.org/10.12720/lnit.2.2.168-171

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Praveen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Praveen, B., Samanta, D., Prasad, G., Ranjith Kumar, C., Prasad, M.L.M. (2020). Protecting Medical Research Data Using Next Gen Steganography Approach. In: Jain, L., Peng, SL., Alhadidi, B., Pal, S. (eds) Intelligent Computing Paradigm and Cutting-edge Technologies. ICICCT 2019. Learning and Analytics in Intelligent Systems, vol 9. Springer, Cham. https://doi.org/10.1007/978-3-030-38501-9_34

Download citation

Publish with us

Policies and ethics