Abstract
Normally, steganography is used to increase the security during data transmission. While medial data transfer from one hospital to another hospital, video steganography in medical imaging system increases the security level. Steganography system mainly focuses and verifies the information confidentiality, integrity and authenticity. Steganography algorithm in medical imaging system mainly focused on other than the doctor diagnosis area because diagnosis area must not be affected. Based on this, this paper presents video steganography in medical imaging system to provide confidentiality, authenticity and integrity during medical data transfer. Motion attention index value and variation range is calculated from selected frame in a video and human vision region of interest is chosen based on motion attention index value and variation range. With respect to human vision region of interest, foreground and background object is detected in a video. Then face detection algorithm is applied to detect moving object in a video. Secret information is hiding in background object and, other than the face area of the foreground object. The experimental analysis shows that increases embedding capacity rate and decreases the detectable distortion.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Malde, P.R., Admuthe, L.S.: Data hiding in motion vectors of video. Int. J. Adv. Res. Comput. Commun. Eng. 2(11), 4207–4209 (2013)
Paulpandi, P., Meyyappan, T.: Hiding messages using motion vector technique in video steganography. Int. J. Eng. Trends Technol. 3(3), 361–365 (2012)
Balu, S., Barjana, L.P., Kavitha, T., Nithya, K.: Video steganographic system for secure and efficient data transmission. Int. J. Adv. Innov. Res. 6(3), 159–162 (2017)
Balu, S., Amudha, K., Nelson Kennedy Babu, C.: Human visual sensitivity guided bit embedding for video steganography. J. Comput. Sci. 9, 928–934 (2013)
Mostafa, S.A.K., Tolba, A.S., Abdelkader, F.M., Elhindy, H.M.: Video watermarking scheme based on principal component analysis and wavelet transform. Int. J. Comput. Sci. Netw. Secur. 9(8), 45–52 (2009)
Gupta, V., Sharma, D.: A study of various face detection methods. Int. J. Adv. Res. Comput. Commun. Eng. 3(5), 6694–6697 (2014)
Amudha, K., Nelson Kennedy Babu, C., Balu, S.: Hybrid baker map with AES in cipher block chaining mode in medical images. Int. Res. J. Pharm. 8(4), 67–73 (2016)
Amudha, K., Nelson Kennedy Babu, C., Balu, S.: Effectual reversible watermarking method for hide the patient details in brain tumor image. Int. J. Comput., Electr., Autom., Control Inf. Eng. 9(7), 1713–1717 (2016)
Kamal, Preet, Jindal, Gagandeep: Review of different steganographic techniques on medical images regarding their efficiency. Int. J. Innov. Eng. Technol. 2(2), 176–180 (2013)
Sumathi, C.P., Santanam, T., Umamaheswari, G.: A study of various steganographic techniques used for information hiding. Int. J. Comput. Sci. Eng. Surv. 4(6), 9–25 (2013)
Santhi, B., Dheeptha, B.: A novel edge based embedding in medical images based on unique key generated using sudoku puzzle design, pp. 1–16. Springer, Berlin (2016)
Pal, S., Bandyopadhyay, S.K.: A survey of analyzing data embedding technique in image staganography. Int. J. Latest Trends Eng. Technol. 7(2), 553–559 (2016)
Pandey, V., Shrivastava, M.: Medical image protection using steganography by crypto-image as cover image. Int. J. Adv. Comput. Res. 2(3), 45–48 (2012)
Razzaq, M.A., Baig, M.A., Shaikh, R.A., Memon, A.A.: Digital image security: fusion of encryption, steganography and watermarking. Int. J. Adv. Comput. Sci. Appl. 8(5), 224–228 (2017)
Atta, R., Ghanbari, M.: A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set. J. Vis. Commun. Image Represent. 53, 42–54 (2018)
Wu, H.-T., Tanga, S., Huang, J., Shic, Y.-Q.: A novel reversible data hiding method with image contrast enhancement. Signal Process. Image Commun. 62, 64–73 (2018)
Suresh, A., Varatharajan, R.: Competent resource provisioning and distribution techniques for cloud computing environment. Clust. Comput. (2017). https://doi.org/10.1007/s10586-017-1293-6
Chinnasamy, A., Sivakumar, B., Selvakumari, P., Suresh, A.: Minimum connected dominating set based RSU allocation for smartCloud vehicles in VANET. Clust. Comput. (2018). https://doi.org/10.1007/s10586-018-1760-8
Kannan, N., Sivasubramanian, S., Kaliappan, M., Vimal, S., Suresh, A.: Predictive big data analytic on demonetization data using support vector machine. Comput, Clust (2018). https://doi.org/10.1007/s10586-018-2384-8
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Balu, S., Babu, C.N.K. & Amudha, K. Secure and efficient data transmission by video steganography in medical imaging system. Cluster Comput 22 (Suppl 2), 4057–4063 (2019). https://doi.org/10.1007/s10586-018-2639-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2639-4