Friendly Medical Image Sharing Scheme
|
|
|
- Aron Alexander
- 10 years ago
- Views:
Transcription
1 Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer Science and Communication Engineering Army Academy R.O.C. No.750, Longdong Rd., Zhongli City, Taoyuan County 320, Taiwan Tsung-Ming Lo Department of Computer and Communication Engineering China University of Technology No.530, Sec.3, Zhong-Shan Rd., Hukou, Hsinchu, Taiwan Wei-Kuei Chen Department of Computer Science and Information Engineering Chien Hsin University of Science and Technology Chungli, Taoyuan 320, Taiwan Received September, 2013; revised January, 2014 Abstract. In recent years, visual sharing technique has drawn much attention for researchers due to the characteristics of security and simpleness. We can utilize visual sharing technique to divide a secret image into meaningless shares and one of them cannot reveal any information about the secret image unless superimposing the shares by the authorized users. However, the meaningless shares are difficult to identify and manage. In the applications of military and medical images, the constructed shares should be meaningful ones that are easier for users to manage and identify them. In the paper, a frily visual sharing scheme is proposed to protect the security of the medical images. First the random-grid algorithm is utilized to construct two meaningless shares. Then a frily pattern is superimposed on the shares that can make the users manage and identify them easily. No one can obtain the information about patients images by observing the appearance of the shares. Therefore, the medical images cannot be abused and patients privacy can be assured. Experimental results can show the feasibility of the proposed scheme.mance discussion, we can prove that our method does not only to provide the improved embedding capacity but also to maintain good stego image quality. Keywords: Visual sharing, medical images, frily sharing, pixel expansion, random grid. 1. Introduction. The development of computer network can make us transmit digital data to far relatives and fris rapidly. Therefore we can save much precious time than traditional deliver modes. Businesses can also save a lot of expenses by selling their products to customers in networks. Furthermore, the establishment of medical information system gives us a lot of convenience. When a patient is transferred to another hospital, the digitized medical information, such as patients diagnosis reports and x-ray images, can be transmitted to another hospital through networks. In this case, patient and hospital both can save lots of expenses in photographing 367
2 368 H. K. Tso, T. M. Lo and W. K. Chen When everyone is enjoying the convenient life environment, some crackers int to intrude businesses and hospitals computers and steal the important information. How to prevent unauthorized people accessing the sensitive information has become a very important work. Two well-known technologies that are cryptography and data hiding can be utilized to protect the security of the important information. Cryptography technique has been utilized in many applications of daily life, such as smart card, E-commerce and data encryption. By encrypting the secret information into disordering codes, the unauthorized users cannot observe the original secret information unless the key is obtained. Data hiding technique is also extensively discussed in recent years due to the characteristic of imperceptibility. Therefore we can further combine data hiding and cryptography techniques to achieve the goal of protecting information. Another well-known technique is visual sharing firstly proposed by Naor and Shamir [1] in Simpleness and security are the main characteristics. We can utilize visual sharing technique to encode a secret image into n meaningless shares and transmit them to n participators. Unauthorized users cannot observe the original information from one of the meaningless shares unless superimposing greater than or equal to m (m n) shares. In the applications of medical images, visual sharing can be applied to protect patients diagnosis reports and images. If one of the shares is disappeared, the original information can still be recovered from other participators. Fig. 1 shows the example of the (2, 2) visual sharing technique. By utilizing the predesigned codebook (as shown in Table 1), we can encode a secret image (Fig. 1(a)) into two expanded meaningless shares shown as Fig. 1(b)-(c). From one of the shares, we cannot recover any information about the secret image. Furthermore, the secret image can be revealed (Fig. 1(d)) by superimposing two shares. Table 1. The codebook of (2,2) visual sharing Lukac and Plataniotis [2] exted the above-mentioned concept and proposed a visual sharing method using bit-level decomposition. In the sharing process, a gray-scale image is first decomposed into bit planes where each plane can be viewed as a binary image. Then each plane is encoded into two images by using the codebook proposed by Naor and Shamir. By stacking the images, two gray-scale shares can be constructed. The recovery process is the reversion of the sharing process. Experimental results show that the original gray-scale image can be recovered without distortion. The two methods mentioned above have the common disadvantages. That is to say, the constructed shares are expanded and
3 Frily Medical Image Sharing Scheme 369 Figure 1. The example of the (2, 2) visual sharing technique. secret image, (b)-(c) the shares, (d) the revealed image. (a) the meaningless ones which are difficult to manage and can occupy lots of storage space for participators. To improve the problem of pixel expansion, the non-expanded sharing techniques based on random grid [3] have been proposed in recent years [4-9]. The three methods of random grid can be described as follows. [Method 1] 1. Generate a sharing image R1 as a random grid, where R1 consists of random value of 0 or For every pixel of the image S: for i = 1 to m; for j = 1 to n; if S(i, j) == 0; R2(i, j) = R1(i, j); else R2(i, j) = R1(i, j); [Method 2] 1. Generate a sharing image R1 as a random grid, where R1 consists of random value of 0 or For every pixel of the image S: for i = 1 to m; for j = 1 to n; if S(i, j) == 0; R2(i, j) = R1(i, j); else R2(i, j) = Random pixel(0, 1); Where Random pixel(0, 1) indicates the function that consists of random value of 0 or 1. [Method 3] 1. Generate a sharing image R1 as a random grid, where R1 consists of random value of 0 or For every pixel of the image S: for i = 1 to m;
4 370 H. K. Tso, T. M. Lo and W. K. Chen for j = 1 to n; if S(i, j) == 0; R2(i, j) = Random pixel(0, 1); else R2(i, j) = R1(i, j); Shyu [4] utilized the random grid to construct the non-expanded shares in We take a gray-scale image as an example. First a gray-scale image is transformed into halftone image. Then the halftone image is encoded into two shares by utilizing the algorithm of the random grid. Chen and Tsao [5] also proposed a threshold visual sharing method based on random grid. They utilize the algorithm of the random grid to encode a binary image into n shares. Less than k (k n) shares cannot reveal the information of the secret image unless greater than or equal to k shares are superimposed. The common disadvantages of the two methods mentioned above include: (1) The constructed shares are meaningless ones that are difficult to manage them for users. (2) The secret images cannot be completely recovered which can affect the users judgments, especially in the applications of military and medical images. As you see, meaningless shares will cause the difficulty in management and identification. To solve the problem, many frily sharing methods have been proposed in recent years [10-14]. Frily sharing means that the constructed shares are meaningful images which can be identified quickly and managed conveniently. Fang [11] utilized a cover image to construct the frily shares. First a secret image is expanded to the same size as the cover image. Then the expanded secret image and the cover image are encoded into n frily shares by utilizing the pre-designed codebook. Owing to the appearance of frily shares, participators are more convenient to manage them. Furthermore, the secret image can be completely recovered by superimposing all of the shares. The disadvantage of the method is that the constructed shares have the problem of pixel expansion. Yang et al. [12] proposed a frily sharing method by using polynomial. They first modify the secret image by calculating the differences between neighbor pixels of current block and embedding the indicators of the prime number to the pixels of previous block. Then the polynomial function is utilized to construct the shares where the constructed shares are the shrunken version of the secret image. However, the quality of the reconstructed image must be improved. Chan et al. [13] proposed a frily sharing method by utilizing JPEG-LS predictor to improve the disadvantage of Yang et al. method [12]. Chan et al. firstly utilize the JPEG-LS predictor that is the latest standard for lossless and close lossless image compression to predict the differences between neighbor pixels in a block. Then the polynomial function is utilized to construct the shares as Yang et al. method. Although the experimental results show that the quality of the reconstructed image has improved, the original image cannot be completely recovered. To improve the above-mentioned disadvantages, the paper proposes a frily visual sharing method to protect the security of the medical image. The rest of the paper is organized as follows. The proposed sharing method is drawn in Section 2. Experimental results are shown in Section 3. Discussions are illustrated in Section 4. Conclusions are given in Section The proposed method. The proposed visual sharing method consists of two stages: sharing and recovery stages. In the sharing stage, the random-grid algorithm is utilized to construct two meaningless shares. Then a frily pattern is superimposed on the
5 Frily Medical Image Sharing Scheme 371 shares that can make the users manage and identify them easily. In the recovery stage, performing Exclusive-OR operation between the shares, the secret image can be recovered without distortion. The detailed processes are described as follows Sharing stage. Input: A medical image M I and meaningful binary pattern P with size of m by n. Output: Two shares S 1 and S 2 with size of m by n. Step 1: Utilize a pseudo random number generator to generate a random grid RG1 with size of m by n, where the range of the value is [1, 2 B ] and B represents bit level. Step 2: Decompose the medical image MI and random grid RG1 into bit planes, where MI and RG1 can be represented as follows. MI (i,j) = 2 b MI b (i,j) + 2 b 1 MI b 1 (i,j) MI 2 (i,j) MI 1 (i,j), (1) RG1 (i,j) = 2 b RG1 b (i,j) + 2 b 1 RG1 b 1 (i,j) RG1 2 (i,j) RG1 1 (i,j), (2) Where b = 1... B. Step 3: Sequentially take the results of Step 2 into Eq. (3) to construct B random images. RG2 b (i,j) = Where RG1 b (i,j) represents the complement of RG1b (i,j). { RG1 b (i,j), if MI b (i,j) = 0 RG1 b (i,j), if MIb (i,j) = 1, (3) Step 4: Separatelly superimpose B random images and the meaningful pattern P to construct two frily shares, described as follows. S 1 (i,j) = 2 b+1 P + 2 b RG1 b (i,j) + 2 b 1 RG1 b 1 (i,j) RG1 2 (i,j) RG1 1 (i,j). (4) S 2 (i,j) = 2 b+1 P + 2 b RG2 b (i,j) + 2 b 1 RG2 b 1 (i,j) RG2 2 (i,j) RG2 1 (i,j). (5) Step 5: Stop Recovery stage. Input: Two shares S 1 and S 2 with size of m by n. Output: The recovered medical image with size of m by n. Step 1: Decompose the shares S 1 and S 2 into bit planes as Eq. (6) and Eq. (7). S 1 (i,j) = 2 b+1 P + 2 b RG1 b (i,j) + 2 b 1 RG1 b 1 (i,j) RG1 2 (i,j) RG1 1 (i,j). (6) S 2 (i,j) = 2 b+1 P + 2 b RG2 b (i,j) + 2 b 1 RG2 b 1 (i,j) RG2 2 (i,j) RG2 1 (i,j). (7) Step 2: Extract RG1 and RG2 from the results of Step 1 as Eq. (8) and Eq. (9). RG1 (i,j) = 2 b RG1 b (i,j) + 2 b 1 RG1 b 1 (i,j) RG1 2 (i,j) RG1 1 (i,j), (8) RG2 (i,j) = 2 b RG2 b (i,j) + 2 b 1 RG2 b 1 (i,j) RG2 2 (i,j) RG2 1 (i,j). (9) Step 3: Perform Exclusive-OR operations between bit planes of RG1 b and RG2 b as Eq.(10).
6 372 H. K. Tso, T. M. Lo and W. K. Chen MI (i,j)b = RG1 b RG2 b (i,j). (10) Step 4: Sequentially superimpose bit planes of Step 3 to recover the medical image as Eq. (1). Step 5: Stop. 3. The experimental results. The experiments will show the feasibility of the proposed method. In the first experiment, the 12-bit medical image Ankle with size of 512 by 512 is utilized to be the test image shown as Fig. 2(a). The meaningful pattern is utilized to be the frily share shown as Fig. 2(b). First we utilize a pseudo random number generator to generate the random grid RG1 with size of 512 by 512 shown as Fig. 2(c). Then the medical image and random grid RG1 are sequentially decomposed into bit planes as shown in Fig. 3 and Fig. 4. Figure 2. The experimental images. (a) the test image, (b) the meaningful pattern, (c) random grid RG1. By performing the algorithm of the random grid as Eq. (3), we can obtain 12 random images with size of 512 by 512 that are similar to Fig. 4. The above 12 random images can be constructed into random grid RG2 with size of 512 by 512 as shown in Fig 5(a). To easily manage the shares, the meaningful pattern (Fig. 2(b)) is superimposed on random grid RG1 to construct the frily share S 1 with size of 512 by 512 shown as Fig. Figure 3. The bit planes of the medical image. (a)-(l) bit plane 1 to 12.
7 Frily Medical Image Sharing Scheme 373 Figure 4. The bit planes of the random grid RG1. (a)-(l) bit plane 1 to 12. Figure 5. The experimental results. (a) the random grid RG2, (b) and (c) the shares S 1 and S 2,(d) the recovered medical image. 5(b). Furthermore, the meaningful pattern is also superimposed on random grid RG2 to construct another frily share S 2 with size of 512 by 512 shown as Fig. 5(c). As you see, the frily shares are easier to manage for doctors and hospitals. Furthermore, one of shares cannot reveal the original information about the medical image. Therefore, the security of the medical image will be greatly increased. To recover the medical image, we first decompose the shares S 1 and S 2 and obtain the random grids RG1 and RG2. Then by performing Exclusive-OR operations between bit planes of the random grids RG1 and RG2, bit planes of the medical image will be recovered. Finally, the original medical image can be completely recovered (shown as Fig. 5 (d)) by sequentially superimposing the above-mentioned bit planes. The evaluation method of the recovered image is mean square error (MSE) that can be represented as Eq. (11). m n 1 2 M SE = [M I(i, j) M I (i, j)]. M N i=1 j=1 (11) Where M I and M I represent the original and retrieved images respectively. After taking the original and retrieved images into Eq. (11), the obtained M SE is 0 that represents the retrieved image is lossless. In the following experiment, The 12-bit medical image Brain with size of 512 by 512 is utilized to be the test image and another meaningful pattern is utilized to be the frily
8 374 H. K. Tso, T. M. Lo and W. K. Chen share shown as Fig. 6(a) and Fig. 6(b). Fig. 6(c) shows the random grid RG1 with size of 512 by 512 generated by utilizing the pseudo random number generator. First we decompose random grid RG1 and the medical image Brain into bit planes. Fig. 7(a)-(l) show the 12 bit planes of the medical image. Then the algorithm of the random grid is utilized to construct the random grid RG2 with size of 512 by 512 as shown in Fig. 8(a). Finally the meaningful pattern is superimposed on random grids RG1 and RG2 to construct the frily shares S 1 and S 2 with size of 512 by 512 shown as Fig. 8(b) and Fig. 8(c) Figure 6. The experimental images. (a) the test image, (b) the meaningful pattern, (c) random grid RG1. To recover the medical image, the recovery process is similar to the first experiment. Fig 8 (d) shows the recovered medical image. The obtained M SE is 0 that represents the retrieved image is lossless. As you see, the two experimental results show that the frily shares have no the disadvantage of pixel expansion and the recovered medical images cannot cause the fault judgment of the doctors. Furthermore, the experimental results also show that the proposed method can effectively protect patients privacy and prevent the abuse of the medical images. Figure 7. The bit planes of the medical image. (a)-(l) bit plane 1 to 12. In the third experiment, The 10-bit medical image Chest with size of 440 by 440 is utilized to be the test image and another meaningful pattern is utilized to be the frily share shown as Fig. 9(a) and Fig. 9(b). Fig. 9(c) shows the random grid RG1 with size of 440 by 440 generated by utilizing the pseudo random number generator. Fig. 10(a)-(j)
9 Frily Medical Image Sharing Scheme 375 Figure 8. The experimental results. (a) the random grid RG2, (b) and (c) the shares S 1 and S 2, (d) the recovered medical image. show the 10 bit planes of the medical image. Fig. 11(a)-(c) shows the random grids RG2 and two frily shares with size of 440 by 440 respectively. The retrieved medical image is shown in Fig. 11(d). The obtained MSE is 0 that represents the retrieved image is lossless. Figure 9. The experimental images. (a) the test image, (b) the meaningful pattern, (c) random grid RG1. Figure 10. The bit planes of the medical image. (a)-(j) bit plane 1 to 10. If authenticators wrongly put two same shares together, that is only using the share S 1 or S 2, the recovered results can be the black images as shown in Figs. 12(a) and 12(b). Furthermore, if authenticators superimpose two incorrect shares, for example, Figs 5(b) and 8(c) or Figs 5(c) and 8(b), the recovered images can be the noise images that cannot be recognized as shown in Figs. 12(c) and 12(d).
10 376 H. K. Tso, T. M. Lo and W. K. Chen Figure 11. The experimental results. (a) the random grid RG2, (b) and (c) the shares S 1 and S 2, (d) the recovered medical image. Figure 12. The experimental results. (a) the recovered results of S 1 and S 1, (b) the recovered results of S 2 and S 2, (c) the recovered results of Figs 5(b) and 8(c), (d) the recovered results of Figs 5(c) and 8(b). 4. Discussions. In the paper, a frily sharing method is proposed to protect the security of medical images. The advantages of the proposed method can be summarized as follows. (1) Non-expanded shares. Traditional visual cryptography based on codebook has the disadvantage of pixel expansion. The proposed method based on random grid removes the above-mentioned problem, which can save lots of storage space.(2) Frily shares. Many published methods encode the secret images into meaningless shares. As you can see, the meaningless shares are difficult to manage and identify. The proposed frily sharing method can construct the secret images into meaningful shares that are easier for users to manage and identify them. (3) Computation cost. Several published methods based on polynomial [12-14] must take much computation time to construct the shares. The proposed schemes only decompose the medical image and random grid into bit planes (similarly to the Lukac-Plataniotis method [2]) and perform Exclusive-OR operations in the sharing and recovery stages. For example, in the first and second experiments, the size of 12-bit images is 512 by 512. By using the computer with Intel Pentium Dual CPU T3200 2GHZ and memory 2GB to implement the method, the execution time is second from constructing random grids to performing Exclusive-OR operations. The constructed shares are about 426KB. In the third experiment, the size of 10-bit image is 440 by 440. The execution time is second. The constructed shares are about 266KB. Therefore, the scheme is still feasible when the size of images is increasing.(4) Lossless recovery. In the applications of military and medical images, the lossy images can cause the fault judgement for users. The proposed method ustilizes Exclusive-OR operations to achieve the lossless recovery. As you can see, the proposed method improves the disadvantages of pixel expansion, meaningless sharing and lossy recovery. The comparison results between some published methods and the proposed method are shown as Table 2.
11 Frily Medical Image Sharing Scheme 377 Table 2. The comparison between the published and the proposed methods. 5. Conclusions. Visual sharing method has been extensively discussed in recent years due to the characteristics of security and simpleness. In the paper, a frily visual sharing method based on random grid is proposed to protect the security of the medical images. Frily sharing can help users manage the shares easily. That is to say, users can easily identify the shares and correctly recover the original images. The original images can be completely recovered without distortion that is helpful to doctors judgment. Furthermore, the experimental results show that no one can obtain the original information by observing the appearance of the shares. Therefore, the security of the medical images can be greatly increased. Compared with other published methods, the superiority of the proposed method can be revealed. In the future, the threshold sharing method and progressive recovery will be the main research directions. Acknowledgment. The authors would like to thank the anonymous referees and the editor for their valuable opinions. This research was partially supported by National Science Council of the Republic of China under grants NSC E REFERENCES [1] M. Naor, and A. Shamir, Visual cryptography, Proc. of Advances in Cryptology-EUROCRYPT 94, Workshop on the Theory and Application of Cryptographic Techniques, LNCS 950, Springer, pp. 1-12, [2] R. Lukac, and K. N. Plataniotis, Bit-level based secret sharing for image encryption, Journal of Pattern Recognition, Vol. 38, no. 5, pp , [3] O. Kafri, and E. Keren, Encryption of pictures and shapes by random grids, Optics Letters, vol. 12, no. 6, pp , [4] S. J. Shyu, Image encryption by random grids, Pattern Recognition, vol. 40, no. 3, pp , [5] T. H. Chen, and K. H. Tsao, Threshold visual secret sharing by random grids, Journal of System and Software, vol. 84, no. 7, pp , [6] T. H. Chen, and K. H. Tsao, Visual secret sharing by random grids revisited, Pattern Recognition, vol. 42, no. 9, pp , [7] H. K. Tso, and D. C. Lou, Sharing secret image based on random grids, Proc. of The 2nd International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems, Workshop on Computer Science and Its Applications, pp , [8] W. P. Fang, Non-expansion visual secret sharing in reversible style, International Journal of Computer Science and Network Security, vol. 9, no. 2, pp , 2009.
12 378 H. K. Tso, T. M. Lo and W. K. Chen [9] Z. H. Wang, M. S. Pizzolatti, and C. C. Chang, Reversible visual secret sharing based on randomgrids for two-image encryption, International Journal of Innovative Computing, Information and Control, vol. 9, no. 4, pp , [10] C. C. Thien, and J. C. Lin, An image-sharing method with user-frily shadow images, IEEE Trans. Circuits and System for Video Technology, vol. 13, no. 12, pp , [11] W. P. Fang, Frily progressive visual secret sharing, Pattern Recognition, vol. 41, no. 4, pp , [12] C. N. Yang, K. H. Yu, and R. Lukac, User-frily image sharing using polynomials with different primes, International Journal of Imaging Systems and Technology, vol. 17, no. 1, pp. 40V47, [13] C. S. Chan, C. C. Chang, and P. V. Hung, A user-frily image sharing scheme using JPEG-LS median edge predictor, Journal of Information Hiding and Multimedia Signal Process, vol. 3, no. 4, pp , [14] P. VO. Hung, A user-frily image sharing scheme using JPEG-LS prediction and LSB matching function, International Journal of Modern Engineering Research, vol. 3, no. 1, pp , 2013.
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
An Application of Visual Cryptography To Financial Documents
An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
Secured Lossless Medical Image Compression Based On Adaptive Binary Optimization
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IV (Mar-Apr. 2014), PP 43-47 Secured Lossless Medical Image Compression Based On Adaptive Binary
Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes
International Journal of Network Security, Vol.10, No.1, PP.1 10, Jan. 2010 1 Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control
Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme
www.ijcsi.org 182 Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme Harinandan Tunga 1 and Soumen Mukherjee 2 1 Department
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
Reversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
Circle Object Recognition Based on Monocular Vision for Home Security Robot
Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang
FCE: A Fast Content Expression for Server-based Computing
FCE: A Fast Content Expression for Server-based Computing Qiao Li Mentor Graphics Corporation 11 Ridder Park Drive San Jose, CA 95131, U.S.A. Email: qiao [email protected] Fei Li Department of Computer Science
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
WATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
Feasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment
Feasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment JongGeun Jeong, ByungRae Cha, and Jongwon Kim Abstract In this paper, we sketch the idea
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur,
Secret Communication through Web Pages Using Special Space Codes in HTML Files
International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
International Language Character Code
, pp.161-166 http://dx.doi.org/10.14257/astl.2015.81.33 International Language Character Code with DNA Molecules Wei Wang, Zhengxu Zhao, Qian Xu School of Information Science and Technology, Shijiazhuang
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
Steganography and Visual Cryptography in Computer Forensics
2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering Steganography and Visual Cryptography in Computer Forensics George Abboud Department of Computer Engineering and
Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- [email protected] Objective: A study, implementation and comparison of
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
Security in Offloading Computations in Mobile Systems Using Cloud Computing
Security in Offloading Computations in Mobile Systems Using Cloud Computing S.Masiperiyannan 1,C.M.Mehathaf Begum 2,I.Mohammed Farook Ali 3,G.Mayuri Priya 4,S.Sudhakar 5 UG Student, Dept. of CSE, K S R
Parametric Comparison of H.264 with Existing Video Standards
Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj
Triple Security of Information Using Stegnography and Cryptography
Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all
The Dynamic Background Generation Scheme Using an Image Frame
The Dynamic Background Generation Scheme Using an Image Frame Statistical Comparison Method *1, Corresponding Author Wen-Yuan Chen, Department of Electronic Engineering, National Chin-Yi University of
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
A Concept of Digital Picture Envelope for Internet Communication
A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding C. SARAVANAN [email protected] Assistant Professor, Computer Centre, National Institute of Technology, Durgapur,WestBengal,
Combating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
A Hybrid Load Balancing Policy underlying Cloud Computing Environment
A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349
Ranked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
Cloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA [email protected] K.
PageX: An Integrated Document Processing and Management Software for Digital Libraries
PageX: An Integrated Document Processing and Management Software for Digital Libraries Hanchuan Peng, Zheru Chi, Wanchi Siu, and David Dagan Feng Department of Electronic & Information Engineering The
Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar
----------------------------------------------------------------------------- An Efficient Bit Plane X-ORing Algorithm for Irreversible Image Steganography -----------------------------------------------------------------------------
Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images
Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images Sergio Vicente D. Pamboukian 1, Hae Yong Kim 2 1 Universidade Presbiteriana Mackenzie, Brazil. 2 Universidade de São
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
encoding compression encryption
encoding compression encryption ASCII utf-8 utf-16 zip mpeg jpeg AES RSA diffie-hellman Expressing characters... ASCII and Unicode, conventions of how characters are expressed in bits. ASCII (7 bits) -
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Data Storage 3.1. Foundations of Computer Science Cengage Learning
3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how
Parallelization of video compressing with FFmpeg and OpenMP in supercomputing environment
Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 1. pp. 231 237 doi: 10.14794/ICAI.9.2014.1.231 Parallelization of video compressing
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
Hybrid Lossless Compression Method For Binary Images
M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering
CHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
Study and Implementation of Video Compression standards (H.264/AVC, Dirac)
Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Colour Image Encryption and Decryption by using Scan Approach
Colour Image Encryption and Decryption by using Scan Approach, Rinkee Gupta,Master of Engineering Scholar, Email: [email protected] Jaipal Bisht, Asst. Professor Radharaman Institute Of Technology
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
An Implementation of a High Capacity 2D Barcode
An Implementation of a High Capacity 2D Barcode Puchong Subpratatsavee 1 and Pramote Kuacharoen 2 Department of Computer Science, Graduate School of Applied Statistics National Institute of Development
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Gamil R. S. Qaid 1, Sanjay N. Talbar 2 1 Research Student, Electronics & Telecommunications Dept.,S.G.G.S. institute
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
Medical Image Segmentation of PACS System Image Post-processing *
Medical Image Segmentation of PACS System Image Post-processing * Lv Jie, Xiong Chun-rong, and Xie Miao Department of Professional Technical Institute, Yulin Normal University, Yulin Guangxi 537000, China
THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM
THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM Iuon Chang Lin Department of Management Information Systems, National Chung Hsing University, Taiwan, Department of Photonics and Communication Engineering,
Saving Mobile Battery Over Cloud Using Image Processing
Saving Mobile Battery Over Cloud Using Image Processing Khandekar Dipendra J. Student PDEA S College of Engineering,Manjari (BK) Pune Maharasthra Phadatare Dnyanesh J. Student PDEA S College of Engineering,Manjari
International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS
PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, [email protected]; Third C.
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM
IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh
A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments
A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments Faraz Fatemi Moghaddam ([email protected]) Omidreza Karimi ([email protected]) Dr. Ma en T. Alrashdan ([email protected])
Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography
502 Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography 1 Vinay Wadekar, 2 Ajinkya Jadhavrao, 3 Sharad Ghule, 4 Akshay Kapse 1,2,3,4 Computer Engineering, University Of Pune, Pune,
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.
Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud
Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud K.S. Aswathy 1, G. Venifa Mini 2 1 M.E. Student, 2 Assistant Professor, Computer Science and Engineering, Noorul
Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences
Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences Byoung-moon You 1, Kyung-tack Jung 2, Sang-kook Kim 2, and Doo-sung Hwang 3 1 L&Y Vision Technologies, Inc., Daejeon,
SECURING VOIP COMMUNICATIONS IN AN OPEN NETWORK
SECURING VOIP COMMUNICATIONS IN AN OPEN NETWORK Mukund Sarma 1 1 Dept. of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Amrita School of Engineering, Amritanagar, Coimbatore, India, 641112.
Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:
Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how
Research on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582
1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, [email protected] 2. Assistant Professor, [email protected]
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia [email protected]
Application of Neural Network in User Authentication for Smart Home System
Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
