Bala B. K, Kumar A. B. The Combination of Steganography and Cryptography for Medical Image Applications. Biomed Pharmacol J 2017;10(4).
Manuscript received on :October 28, 2017
Manuscript accepted on :November 15, 2017
Published online on: --
How to Cite    |   Publication History
Views  Views: 
Visited 2,435 times, 1 visit(s) today
 
Downloads  PDF Downloads: 
1007

B. Kiran Bala1 and A. Bala Kumar2

1Department of Computer Science and Engineering, K.Ramakrishnan College of Engineering, Trichy, Tamil Nadu, India-621112.

2Department of Electronics andCommunication Engineering, K.Ramakrishnan College of Engineering, Trichy, Tamil Nadu, India-621112.

Corresponding Author E-mail: kiranit2010@gmail.com

DOI : https://dx.doi.org/10.13005/bpj/1294

Abstract

To give more security for the biomedical images for the patient betterment as well privacy for the patient highly confidently patient image report can be placed in database. If unknown persons like hospital staffs, relatives and third parties like intruder trying to see the report it has in the form of hidden state in another image. The patient detail like MRI image has been converted into any form of steganography. Then, encrypt those images by using proposed cryptography algorithm and place in the database.

Keywords

Authentication Cryptography; Mammogram Image; Steganography;

Download this article as: 
Copy the following to cite this article:

Bala B. K, Kumar A. B. The Combination of Steganography and Cryptography for Medical Image Applications. Biomed Pharmacol J 2017;10(4).

Copy the following to cite this URL:

Bala B. K, Kumar A. B. The Combination of Steganography and Cryptography for Medical Image Applications. Biomed Pharmacol J 2017;10(4). Available from: http://biomedpharmajournal.org/?p=17791

Introduction

The security is the very big issue in present technology to overcome those issue in various field day by day so many new proposed technique is released every day but in the field of medical the security is very much important to give privacy and security for the patient details to avoid data hacking and data surfing in the hospital database even though hospital staff should not directly see the without permission of patient as well as doctor. The Proposed system deals with the MRI scan image for the patient and it should be pre-processed and then convert into steganography technique it is in the form of two things first one is in image form another type is in form of text form each time MRI image has been converted into text or image form.4-5

The next step for the proposed system is from that using the proposed cryptography algorithm just convert those unknown form into another form for the purpose of security aspect to give privacy and authentication for the patient as well as hospital for high quality of service. MIAS database is used for the proposed system from that database the entire process has been carried out for the better result for the present technology result. The proposed system is not deals with the diagnosis of the disease from the image but the system is mainly focus on the security aspect of the system.2,3 Partitioning and segment the sample image is also a process of technique to calculate and hide the data in the sample stego-image is possible.8,9

 Figure 1: Basic Diagram for proposed system Figure 1: Basic Diagram for proposed system

 

 

Click here to View figure

 

The proposed system is having two modules namely steganography form and cryptography module from the input image random chosen of image or text from the proposed system and then by using image conversion means MRI image has been converted into binary form and then plain image from the proposed algorithm identify the unused space from the plain image insert the MRI image into the plain image and now the MRI image is in unknown form and then encrypt the image into cipher text and store in the database. Likewise, if MRI image can also be convert into text and encrypt into cipher text and finally store into database.6

Methodologies and Results

Initial Process for Image

The First and foremost process in the proposed system after getting the MRI image the system will random conversion of image or text from of the MRI image.3

 Figure 2: Random Conversion for steganography process Figure 2: Random Conversion for steganography process

 

 

Click here to View figure

 

 Figure 3: Basic diagram of image for Steganography process Figure 3: Basic diagram of image for Steganography process

 

 

Click here to View figure

 

 Figure 4: Basic diagram of Text for Steganography process Figure 4: Basic diagram of Text for Steganography process

 

 

Click here to View figure

The figure 3 & figure 4 for the process of steganography has been shown in the figures and finally store in the database of the proposed system.1 In addition to that partition and segment can be made for the better result in order to give efficient result like to avoid FAR and FRR.8

Results and Discussion

The Proposed system has implementation of the entire process and which has process and execution time, accuracy, FAR and FRR has been discussed in the system.8

Table 1: Implementation Result of Proposed system in time wise

Image Type Time (in sec)
JPEG 0.001
MPEG 0.001
BMP 0.002
PNG 0.001
GIF 0.001
PNM 0.001
BAT 0.003
BPG 0.001

 

 Figure 5: Graph for Image type & time taken for conversion Figure 5: Graph for Image type & time taken for conversion

 

 

Click here to View figure

Table 2: Implementation Result of Proposed system in accuracy wise

Image Type Accuracy (in %)
JPEG 99.3
MPEG 99.4
BMP 99.5
PNG 99.5
GIF 99.4
PNM 99.5
BAT 99.3
BPG 99.4

 

 Figure 6: Graph for Image type & Accuracy from the conversion Figure 6: Graph for Image type & Accuracy from the conversion

 

 

Click here to View figure

Table 3: Implementation Result of Proposed system in FAR wise

Image Type FAR (in %)
JPEG 99.7
MPEG 99.1
BMP 99.2
PNG 98.8
GIF 99.9
PNM 99.1
BAT 99.3
BPG 99.5

 

 Figure 7: Graph for Image type & FAR from the conversion Figure 7: Graph for Image type & FAR from the conversion

 

 

Click here to View figure

Table 4: Implementation Result of Proposed system in FRR wise

Image Type FRR (in %)
JPEG 99.4
MPEG 99.1
BMP 99.2
PNG 99.1
GIF 99.5
PNM 99.3
BAT 99.2
BPG 99.1

From the implementation part the discussion has been made that the input image converted and result as well as graphs are available in the figure 5, figure 6, figure 7 & figure 8 for the proposed system.

 Figure 8: Graph for Image type & FRR from the conversion Figure 8: Graph for Image type & FRR from the conversion

 

 

Click here to View figure

Conclusion

The experimental results reported in this paper shown in the figure 5 & figure 6 for the processing and efficiency of the entire proposed system is possible the justification shown in the implementation part is available. The proposed system deals with security of the present technology and which gives the input for the issues in the present system and solution to the issues of the present technology for the biomedical application for the medical sector for privacy and highly confidentially data of the patient.

References

  1. Kiran B.B. A Novel Approach to Generate a Key for Cryptographic Algorithm. Journal of Chemical and Pharmaceutical Sciences, Special. 2017 February;2:229-231.
    CrossRef
  2. Kiran B.B.  A Novel Approach to Identify the Micro calcification Images. Journal of Chemical and Pharmaceutical Sciences, Special. 2017 February;2:190-192.
    CrossRef
  3. Kiran B.B.  Biometrics for Mobile Banking. International Journal of Technology and Engineering System. 2011;2(1):95-97.
  4. http://www. mammoimage. Org / databases/
  5. Kiran B.B, Sasikumar R. Identification Of Cancer From The Mammogram Images By Using Frequency Domain Approaches.International Journal of ChemTech Research. 2017 April;10:5.
  6. Kiran B.B, nithya T.m. Remedy For Disease Affected Iris In Iris Recognition. International Journal of Research in Engineering and Technology. ISSN: 2319–1163, 2012;332-334.
  7. Kiran B.B, Lourdu J. Multimodal Biometrics using Cryptographic Algorithm. European Journal of dAcaemic Essays. 2014;6-10.
  8. Yand K, Ramaniah G.V  A Novel Method Avoids the Fall-Off Boundaries by Using Try-Way Pixel Value Difference and Modulus Function in Image Steganography. International journal of computer science and Mechatronics. 2015;1(1 ):7-11.
  9.  Kakade R, Kasar N, Kulkarni S,  Kumbalpuri S, Patil S. Image Steganography and Data hiding in QR Code. International Research Journal of Engineering and Technology. 2017;4(5):2926-2928.
Share Button
Visited 2,435 times, 1 visit(s) today

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.