Skip to main content

Data Hiding Techniques for Integrity Verification of Medical Images

  • Chapter
  • First Online:
  • 435 Accesses

Part of the book series: SpringerBriefs in Applied Sciences and Technology ((BRIEFSAPPLSCIENCES))

Abstract

This chapter presents various data hiding techniques in hybrid, transform domain and spatial domain for integrity verification of medical image. These techniques are designed using various image transforms such as DCT, SVD, FDCuT, NSCT, and CS-based encryption. Finally, simulation results of these techniques are demonstrated in this chapter.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Bibliography

  1. Thanki R, Borra S, Dwivedi V, Borisagar K (2017) A steganographic approach for secure communication of medical images based on DCT-SVD and compressed sensing (CS) theory. Imaging Sci J 65(8):457–467

    Article  Google Scholar 

  2. MedPix™ Medical Image Database available at: http://rad.usuhs.mil/medpix/medpix.html, https://medpix.nlm.nih.gov/home

  3. The University of South Carolina SIPI Image Database: http://sipi.usc.edu/database/database.php

  4. Sreedhanya AV, Soman KP (2013) Ensuring security to the compressed sensing data using a steganographic approach. Bonfr Int J Adv Image Process 3(1):1–7

    Article  Google Scholar 

  5. Borra S, Thanki R, Dey N, Borisagar K (2018) Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing. Smart Health.

    Google Scholar 

  6. Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digital Signal Process 38:77–94

    Article  Google Scholar 

  7. Singh S, Singh R, Singh A, Siddiqui T (2018) SVD-DCT based medical image watermarking in NSCT domain. In: Hassanien AE, Elhoseny M, Kacprzyk J (eds) Quantum computing: an environment for intelligent large scale real application. Springer, Cham, pp 467–488

    Chapter  Google Scholar 

  8. Thanki R, Borra S, Dwivedi V, Borisagar K (2017) A RONI based visible watermarking approach for medical image authentication. J Med Syst 41:143

    Article  Google Scholar 

  9. Biswas D, Das P, Maji P, Dey N, Chaudhuri SS (2013) Visible watermarking within the region of non-interest of medical images based on fuzzy C-means and Harris corner detection. In: Computer science & information technology, pp 161–168

    Google Scholar 

  10. Santoyo-Garcia H, Fragoso-Navarro E, Reyes-Reyes R, Cruz-Ramos C, Nakano-Miyatake M (2017) Visible watermarking technique based on human visual system for single sensor digital cameras. Secur Commun Netw 2017:18

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s), under exclusive license to Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Thanki, R., Borra, S. (2019). Data Hiding Techniques for Integrity Verification of Medical Images. In: Medical Imaging and its Security in Telemedicine Applications. SpringerBriefs in Applied Sciences and Technology. Springer, Cham. https://doi.org/10.1007/978-3-319-93311-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93311-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93310-8

  • Online ISBN: 978-3-319-93311-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics