COMPARATIVE ANALYSIS OF STEGANOGRAPHIC ALGORITHMS INTACTING THE INFORMATION IN THE MEDICAL IMAGES REGARDING THEIR EFFICIENCY
Keywords:
Steganographic techniques, Adaptive SteganographyAbstract
Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the communicated information. The word steganography is derived from the Greek words “stegos” meaning “cover” and “grafia” meaning “writing” defining it as “covered writing”. In image steganography the information is hidden exclusively in images. Three different aspects in information-hiding systems contend with each other: capacity, security, and robustness. Capacity refers to the amount of information that can be hidden in the cover medium, security to an eavesdropper’s inability to detect hidden information, and robustness to the amount of modification the stego medium can withstand before an adversary can destroy hidden information. Adaptive steganography with a high embedding capacity and a low distortion is an attractive topic in the area of information hiding. In digital images, parts with high contrast and noise-like textures have been found to be appropriate locations to hide pseudo-random encrypted messages, due to the statistical similarities between the covert and the selected cover signals . Digital Steganography is the art of invisibly hiding data within data. It conceals the fact that message exists by hiding the actual message. In this, secret data can be hidden inside the image, text, sound clip which can be represented in binary. Digital steganography is propose to increase medical image security, confidentiality and integrity. Medical image steganography is a special subcategory of image steganography in the sense that the images have special requirements. This paper presents a preliminary study on the degradation of medical images when embedded with different different steganographic algorithm, using a variety of popular systems. Image quality is measured with a number of widely used metrics, which is applied elsewhere in image processing. The general conclusion that arises from the results is that typical data embedding can cause numerical and perceptual errors in an image.
References
B. Macq and F. Dewey. Trusted headers for medical images. In DFG VIII-D II Watermarking Workshop, Erlangen, Germany, Oct. 1999.
A. Maeder and M. Eckert. Medical image compression: Quality and performance issues. SPIE: New Approaches in Medical Image Analysis, 3747:93–101, 1999.
M. Nishio, Y. Kawashima, S. Nakamuar, and N. Tsukamoto. Development of a digital watermark method suitable for medical images with error correction. RSNA 2002 Archive Site: http://archive.rsna.org/index.cfm, 2002. accessed 18 January 2005.
Yang, C. H., Weng, C. Y, and S. J. Wang et al., 2008. “Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems,” IEEE Transactions on Information Forensics and Security, 3(3): 488-497.
Ramezani M., and S. Ghaemmaghami, 2010. Towards Genetic Feature Selection in Image Steganalysis,” in 6th IEEE
International Workshop on Digital Rights Management, Las Vegas, USA.
Downloads
Published
Issue
Section
License
Copyright Notice
Submission of an article implies that the work described has not been published previously (except in the form of an abstract or as part of a published lecture or academic thesis), that it is not under consideration for publication elsewhere, that its publication is approved by all authors and tacitly or explicitly by the responsible authorities where the work was carried out, and that, if accepted, will not be published elsewhere in the same form, in English or in any other language, without the written consent of the Publisher. The Editors reserve the right to edit or otherwise alter all contributions, but authors will receive proofs for approval before publication.
Copyrights for articles published in World Scholars journals are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.