Abstract
Teleradiology is one of the emerging technologies used for sharing medical images through networks such as LAN, WAN, Cloud, etc. for better treatment, expert suggestions and research purpose. The images and medical related records of a patient are accessed by any physician at any time from any location. Medical field is one of the main areas for privacy violation and security threats. This work aims to protect the privacy of patients, hospitals and centralized server which store the patient’s information by combining both patients image and medical records into a single image file using data hiding. In such a sensitive area data loss is not acceptable. In this paper, a novel method is proposed for solving the above problem which enable us to retrieve original medical image without any data loss. We hide the patient’s details in the medical image and encrypt the cover medical image. Once image is decrypted the concerned person can only extract the patient’s information from the cover medical image. The proposed system uses two keys; one for encryption and another for data hiding. If the third party knows both the keys, the patient’s information can be retrieved. Our proposed method provides double protection and achieves the security in sharing the medical image with patient’s record. This proposed method provides the advantage over other existing method in terms of improved data capacity and zero error rates, and maintains PSNR above 51 dB.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Arjun, K.P., Fepslin Athis Mon, S., Arunvinodh, C.: Reversible data hiding in images with imporved data capacity by duplicating peak pair values. Int. J. Adv. Inf. Sci. Technol. 5(7), 62–67 (2016)
Shi, Y.Q.: Reversible data hiding. In: Cox, I.J., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 1–12. Springer, Heidelberg (2005). doi:10.1007/978-3-540-31805-7_1
Kuo, W.-C., Jiang, D.-J., Huang, Y.-C.: Reversible data hiding based on histogram. In: Huang, D.-S., Heutte, L., Loog, M. (eds.) ICIC 2007. LNCS (LNAI), vol. 4682, pp. 1152–1161. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74205-0_119
Hu, Y., Lee, H.-K., Li, J., Chen, K.: Reversible data hiding using prediction error values embedding. In: Shi, Y.Q., Kim, H.-J., Katzenbeisser, S. (eds.) IWDW 2007. LNCS, vol. 5041, pp. 244–253. Springer, Heidelberg (2008). doi:10.1007/978-3-540-92238-4_19
Thom, H.T.H., Canh, H., Tien, T.N.: Steganalysis for reversible data hiding. In: Ślęzak, D., Kim, T., Zhang, Y., Ma, J., Chung, K. (eds.) DTA 2009. CCIS, vol. 64, pp. 1–8. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10583-8_1
Khodaei, M., Faez, K.: Histogram-based reversible data hiding. In: Qiu, G., Lam, K.M., Kiya, H., Xue, X.-Y., Kuo, C.-C.J., Lew, M.S. (eds.) PCM 2010. LNCS, vol. 6297, pp. 677–684. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15702-8_62
Li, Q., Wu, Y., Bao, F.: A reversible data hiding scheme for JPEG images. In: Qiu, G., Lam, K.M., Kiya, H., Xue, X.-Y., Kuo, C.-C.J., Lew, M.S. (eds.) PCM 2010. LNCS, vol. 6297, pp. 653–664. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15702-8_60
Huang, H.-C., Huang, K.-Y., Chang, F.-C.: Reversible data hiding with hierarchical relationships. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ACIIDS 2012. LNCS (LNAI), vol. 7198, pp. 446–455. Springer, Heidelberg (2012). doi:10.1007/978-3-642-28493-9_47
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Fepslin Athish Mon, S., Suthendran, K., Arjun, K., Arumugam, S. (2017). A Novel Reversible Data Hiding Method in Teleradiology to Maximize Data Capacity in Medical Images. In: Arumugam, S., Bagga, J., Beineke, L., Panda, B. (eds) Theoretical Computer Science and Discrete Mathematics. ICTCSDM 2016. Lecture Notes in Computer Science(), vol 10398. Springer, Cham. https://doi.org/10.1007/978-3-319-64419-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-64419-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64418-9
Online ISBN: 978-3-319-64419-6
eBook Packages: Computer ScienceComputer Science (R0)