SlideShare a Scribd company logo
International Journal of Advances in Applied Sciences (IJAAS)
Vol. 7, No. 2, June 2018, pp. 102~104
ISSN: 2252-8814, DOI: 10.11591/ijaas.v7.i2.pp102-104  102
Journal homepage: http://iaescore.com/online/index.php/IJAAS
The Combination of Steganography and Cryptography for
Medical Image Applications
B.Kiran Bala, R.Sasi Kumar
Department of Computer Science and Engineering, K.Ramakrishnan College of Engineering, Trichy, Tamil Nadu, India
Article Info ABSTRACT
Article history:
Received Jan 5, 2018
Revised May 2, 2018
Accepted May 27, 2018
To give more security for the biomedical images for the patient betterment as
well privacy for the patient highly confidently patient image report can be
placed in database. If unknown persons like hospital staffs, relatives and third
parties like intruder trying to see the report it has in the form of hidden state
in another image. The patient detail like MRI image has been converted into
any form of steganography. Then, encrypt those image by using proposed
cryptography algorithm and place in the database.
Keyword:
Authentication
Cryptography
Mammogram Image
Steganography
Copyright © 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
B.Kiran Bala,
Department of Computer Science and Engineering,
K.Ramakrishnan College of Engineering,
Trichy, Tamil Nadu, India.
Email: kiranit2010@gmail.com
1. INTRODUCTION
The security is the very big issue in present technology to overcome those issue in various field day
by day so many new proposed technique is released every day but in the field of medical the security is very
much important to give privacy and security for the patient details to avoid data hacking and data surfing in
the hospital database even though hospital staff should not directly see the without permission of patient as
well as doctor. The Proposed system deals with the MRI scan image for the patient and it should be pre-
processed and then convert into steganography technique it is in the form of two things first one is in image
form another type is in form of text form each time MRI image has been converted into text or image
form [1-2].
The next step for the proposed system is from that using the proposed cryptography algorithm just
convert those unknown form into another form for the purpose of security aspect to give privacy and
authentication for the patient as well as hospital for high quality of service. MIAS database is used for the
proposed system from that database the entire process has been carried out for the better result for the present
technology result. The proposed system is not deals with the diagnosis of the disease from the image but the
system is mainly focus on the security aspect of the system[3][4]. Basic diagram for proposed system as
shown in Figure 1.
IJAAS ISSN: 2252-8814 
The Combination of Steganography and Cryptography for Medical Image Applications (B.Kiran Bala)
103
Figure 1. Basic diagram for proposed system
The proposed system is having two modules namely steganography form and cryptography module
from the input image random chosen of image or text from the proposed system and then by using image
conversion means MRI image has been converted into binary form and then plain image from the proposed
algorithm identify the unused space from the plain image insert the MRI image into the plain image and now
the MRI image is in unknown form and then encrypt the image into cipher text and store in the database.
Likewise, if MRI image can also be convert into text and encrypt into cipher text and finally store into
database [5].
2. METHODOLOGIES AND RESULTS
2.1. Initial Process for Image
The First and foremost process in the proposed system after getting the MRI image the system will
random conversion of image or text from of the MRI image[6]. Random conversion for steganography
process as shown Figure 2.
Figure 2. Random conversion for steganography
process
Figure 3 Basic diagram of image for Steganography
process
Figure 4. Basic diagram of text for steganography process
 ISSN: 2252-8814
IJAAS Vol. 7, No. 2, June 2018: 102 – 104
104
The Figure 3 and Figure 4 for the process of steganography has been shown in the Figures and
finally store in the database of the proposed system[7]
3. RESULTS AND DISCUSSION
The Proposed system have implementation of the entire process and which has process and
execution time accuracy has been discussed in the system. The result of proposed system are available in
Table 1
Table 1. Implementation Result of Proposed System
Image Type Time (in sec) Accuracy (in %)
JPEG 0.001 99.3
MPEG 0.001 99.4
BMP 0.002 99.5
PNG 0.001 99.5
GIF 0.001 99.4
PNM 0.001 99.5
BAT 0.003 99.3
BPG 0.001 99.4
From the implementation part the discussion has been made that the input image converted and
result as well as graphs are available in the Figure 5 and Figure 6 for the proposed system.
Figure 5. Graph for image type & time taken for
conversion
Figure 6. Graph for image type & accuracy from the
conversion
4. CONCLUSION
The experimental results reported in this paper shown in the Figure 5 and Figure 6 for the
processing and efficiency of the entire proposed system is possible the justification shown in the
implementation part is available. The proposed system deals with security of the present technology and
which gives the input for the issues in the present system and solution to the issues of the present technology
for the biomedical application for the medical sector for privacy and highly confidentially data of the patient.
REFERENCES
[1] http://www. mammoimage. Org / databases/
[2] B.Kiran Bala, R.Sasikumar, Identification Of Cancer From The Mammogram Images By Using Frequency Domain
Approaches, International Journal of ChemTech Research, April 2017, Volume 10 No.5.
[3] B.Kiran Bala, A Novel Approach to Identify the Micro calcification Images, Journal of Chemical and
Pharmaceutical Sciences, SpecialIssue2: February 2017, Pages 190-192.
[4] B.Kiran Bala, Biometrics for Mobile Banking, International Journal of Technology And Engineering System, 2011,
Volume 2, Issue 1,Pages95-97.
[5] B.Kiran Bala, T.m.nithya, Remedy For Disease Affected Iris In Iris Recognition, International Journal of
Research in Engineering and Technology, November Issue 2012, ISSN: 2319 – 1163, page No. 332-334.
[6] B.Kiran Bala, A Novel Approach to Generate a Key for Cryptographic Algorithm, Journal of Chemical and
Pharmaceutical Sciences, Special Issue 2: February 2017, Pages 229-231

More Related Content

PDF
IRJET- GDPS - General Disease Prediction System
PDF
MLTDD : USE OF MACHINE LEARNING TECHNIQUES FOR DIAGNOSIS OF THYROID GLAND DIS...
PDF
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
PDF
GRC-MS: A GENETIC RULE-BASED CLASSIFIER MODEL FOR ANALYSIS OF MASS SPECTRA DATA
PDF
IRJET- Result on the Application for Multiple Disease Prediction from Symptom...
PDF
Csit110713
PDF
Personal identity verification based ECG biometric using non-fiducial features
PDF
IRJET - Breast Cancer Prediction using Supervised Machine Learning Algorithms...
IRJET- GDPS - General Disease Prediction System
MLTDD : USE OF MACHINE LEARNING TECHNIQUES FOR DIAGNOSIS OF THYROID GLAND DIS...
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
GRC-MS: A GENETIC RULE-BASED CLASSIFIER MODEL FOR ANALYSIS OF MASS SPECTRA DATA
IRJET- Result on the Application for Multiple Disease Prediction from Symptom...
Csit110713
Personal identity verification based ECG biometric using non-fiducial features
IRJET - Breast Cancer Prediction using Supervised Machine Learning Algorithms...

What's hot (20)

PDF
Q45019899
PDF
Ijarcet vol-2-issue-4-1393-1397
PDF
IRJET- Detection of Plant Leaf Diseases using Image Processing and Soft-C...
PDF
Search System for Medical Images
PDF
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
PDF
MEDICAL IMAGES AUTHENTICATION THROUGH WATERMARKING PRESERVING ROI
PDF
IRJET- Detection of Plant Leaf Diseases using Machine Learning
PDF
Leaf Disease Detection and Selection of Fertilizers using Artificial Neural N...
PPTX
Data Mining Techniques In Computer Aided Cancer Diagnosis
PDF
Framework for comprehensive enhancement of brain tumor images with single-win...
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PPT
Biology protein structure in cloud computing
PDF
Iganfis Data Mining Approach for Forecasting Cancer Threats
PDF
IRJET- Diabetes Diagnosis using Machine Learning Algorithms
PDF
An efficient feature selection algorithm for health care data analysis
PDF
IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...
PDF
Hybrid System of Tiered Multivariate Analysis and Artificial Neural Network f...
PDF
IRJET- Image Processing based Detection of Unhealthy Plant Leaves
PDF
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...
Q45019899
Ijarcet vol-2-issue-4-1393-1397
IRJET- Detection of Plant Leaf Diseases using Image Processing and Soft-C...
Search System for Medical Images
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
MEDICAL IMAGES AUTHENTICATION THROUGH WATERMARKING PRESERVING ROI
IRJET- Detection of Plant Leaf Diseases using Machine Learning
Leaf Disease Detection and Selection of Fertilizers using Artificial Neural N...
Data Mining Techniques In Computer Aided Cancer Diagnosis
Framework for comprehensive enhancement of brain tumor images with single-win...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Biology protein structure in cloud computing
Iganfis Data Mining Approach for Forecasting Cancer Threats
IRJET- Diabetes Diagnosis using Machine Learning Algorithms
An efficient feature selection algorithm for health care data analysis
IRJET - Survey on Chronic Kidney Disease Prediction System with Feature Selec...
Hybrid System of Tiered Multivariate Analysis and Artificial Neural Network f...
IRJET- Image Processing based Detection of Unhealthy Plant Leaves
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...
Ad

Similar to The Combination of Steganography and Cryptography for Medical Image Applications (20)

PDF
Medical image encryption techniques: a technical survey and potential challen...
PDF
Batch 21 - Final project review -PPT.pdf
PDF
New Watermarking/Encryption Method for Medical ImagesFull Protection in m-Hea...
PDF
ANALYSIS OF WATERMARKING TECHNIQUES FOR MEDICAL IMAGES PRESERVING ROI
PDF
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
PDF
A NEW SELF-ADAPTIVE APPROACH FOR MEDICAL IMAGE SECURITY
PDF
Review of Image Watermarking Technique for Medi
PDF
Introduction to medical image processing.pdf
PDF
Embedding and Extraction Techniques for Medical Images-Issues and Challenges
PDF
Secure E- Health Care Model
PDF
Lx3620422047
PDF
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
PDF
Analysis Of Medical Image Processing And Its Application In Healthcare
PPTX
research review committe review paper for discussion
PPTX
research review committee review status new
PDF
Advanced watermarking technique to improve medical images’ security
PPTX
Cryptographic Transmission for Secured Medical Images using DWT,DCT and SHA
PPTX
Basic Medical Imaging Processing and Analysis
PDF
Lightweight digital imaging and communications in medicine image encryption f...
PDF
An efficient data masking for securing medical data using DNA encoding and ch...
Medical image encryption techniques: a technical survey and potential challen...
Batch 21 - Final project review -PPT.pdf
New Watermarking/Encryption Method for Medical ImagesFull Protection in m-Hea...
ANALYSIS OF WATERMARKING TECHNIQUES FOR MEDICAL IMAGES PRESERVING ROI
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
A NEW SELF-ADAPTIVE APPROACH FOR MEDICAL IMAGE SECURITY
Review of Image Watermarking Technique for Medi
Introduction to medical image processing.pdf
Embedding and Extraction Techniques for Medical Images-Issues and Challenges
Secure E- Health Care Model
Lx3620422047
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
Analysis Of Medical Image Processing And Its Application In Healthcare
research review committe review paper for discussion
research review committee review status new
Advanced watermarking technique to improve medical images’ security
Cryptographic Transmission for Secured Medical Images using DWT,DCT and SHA
Basic Medical Imaging Processing and Analysis
Lightweight digital imaging and communications in medicine image encryption f...
An efficient data masking for securing medical data using DNA encoding and ch...
Ad

More from IJAAS Team (20)

PDF
Super Capacitor Electronic Circuit Design for Wireless Charging
PDF
On the High Dimentional Information Processing in Quaternionic Domain and its...
PDF
Using FPGA Design and HIL Algorithm Simulation to Control Visual Servoing
PDF
Mitigation of Selfish Node Attacks In Autoconfiguration of MANETs
PDF
Vision Based Approach to Sign Language Recognition
PDF
Design and Analysis of an Improved Nucleotide Sequences Compression Algorithm...
PDF
Review: Dual Band Microstrip Antennas for Wireless Applications
PDF
Building Fault Tolerance Within Wsn-A Topology Model
PDF
Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...
PDF
An Examination of the Impact of Power Sector Reform on Manufacturing and Serv...
PDF
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
PDF
Physical Properties and Compressive Strength of Zinc Oxide Nanopowder as a Po...
PDF
Experimental and Modeling Dynamic Study of the Indirect Solar Water Heater: A...
PDF
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
PDF
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
PDF
A Novel CAZAC Sequence Based Timing Synchronization Scheme for OFDM System
PDF
Workload Aware Incremental Repartitioning of NoSQL for Online Transactional P...
PDF
A Fusion Based Visibility Enhancement of Single Underwater Hazy Image
PDF
Graph Based Workload Driven Partitioning System by Using MongoDB
PDF
Data Partitioning in Mongo DB with Cloud
Super Capacitor Electronic Circuit Design for Wireless Charging
On the High Dimentional Information Processing in Quaternionic Domain and its...
Using FPGA Design and HIL Algorithm Simulation to Control Visual Servoing
Mitigation of Selfish Node Attacks In Autoconfiguration of MANETs
Vision Based Approach to Sign Language Recognition
Design and Analysis of an Improved Nucleotide Sequences Compression Algorithm...
Review: Dual Band Microstrip Antennas for Wireless Applications
Building Fault Tolerance Within Wsn-A Topology Model
Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...
An Examination of the Impact of Power Sector Reform on Manufacturing and Serv...
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
Physical Properties and Compressive Strength of Zinc Oxide Nanopowder as a Po...
Experimental and Modeling Dynamic Study of the Indirect Solar Water Heater: A...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
A Novel CAZAC Sequence Based Timing Synchronization Scheme for OFDM System
Workload Aware Incremental Repartitioning of NoSQL for Online Transactional P...
A Fusion Based Visibility Enhancement of Single Underwater Hazy Image
Graph Based Workload Driven Partitioning System by Using MongoDB
Data Partitioning in Mongo DB with Cloud

Recently uploaded (20)

PDF
BET Eukaryotic signal Transduction BET Eukaryotic signal Transduction.pdf
PDF
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
PDF
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
PPT
6.1 High Risk New Born. Padetric health ppt
PDF
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
PPTX
Seminar Hypertension and Kidney diseases.pptx
PDF
. Radiology Case Scenariosssssssssssssss
PDF
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
DOCX
Q1_LE_Mathematics 8_Lesson 5_Week 5.docx
PPTX
Pharmacology of Autonomic nervous system
PDF
GROUP 2 ORIGINAL PPT. pdf Hhfiwhwifhww0ojuwoadwsfjofjwsofjw
PDF
The scientific heritage No 166 (166) (2025)
PDF
The Land of Punt — A research by Dhani Irwanto
PPTX
BIOMOLECULES PPT........................
PDF
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
PPTX
TOTAL hIP ARTHROPLASTY Presentation.pptx
PPTX
The Minerals for Earth and Life Science SHS.pptx
PPTX
Overview of calcium in human muscles.pptx
PDF
Phytochemical Investigation of Miliusa longipes.pdf
PDF
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...
BET Eukaryotic signal Transduction BET Eukaryotic signal Transduction.pdf
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
6.1 High Risk New Born. Padetric health ppt
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
Seminar Hypertension and Kidney diseases.pptx
. Radiology Case Scenariosssssssssssssss
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
Q1_LE_Mathematics 8_Lesson 5_Week 5.docx
Pharmacology of Autonomic nervous system
GROUP 2 ORIGINAL PPT. pdf Hhfiwhwifhww0ojuwoadwsfjofjwsofjw
The scientific heritage No 166 (166) (2025)
The Land of Punt — A research by Dhani Irwanto
BIOMOLECULES PPT........................
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
TOTAL hIP ARTHROPLASTY Presentation.pptx
The Minerals for Earth and Life Science SHS.pptx
Overview of calcium in human muscles.pptx
Phytochemical Investigation of Miliusa longipes.pdf
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...

The Combination of Steganography and Cryptography for Medical Image Applications

  • 1. International Journal of Advances in Applied Sciences (IJAAS) Vol. 7, No. 2, June 2018, pp. 102~104 ISSN: 2252-8814, DOI: 10.11591/ijaas.v7.i2.pp102-104  102 Journal homepage: http://iaescore.com/online/index.php/IJAAS The Combination of Steganography and Cryptography for Medical Image Applications B.Kiran Bala, R.Sasi Kumar Department of Computer Science and Engineering, K.Ramakrishnan College of Engineering, Trichy, Tamil Nadu, India Article Info ABSTRACT Article history: Received Jan 5, 2018 Revised May 2, 2018 Accepted May 27, 2018 To give more security for the biomedical images for the patient betterment as well privacy for the patient highly confidently patient image report can be placed in database. If unknown persons like hospital staffs, relatives and third parties like intruder trying to see the report it has in the form of hidden state in another image. The patient detail like MRI image has been converted into any form of steganography. Then, encrypt those image by using proposed cryptography algorithm and place in the database. Keyword: Authentication Cryptography Mammogram Image Steganography Copyright © 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: B.Kiran Bala, Department of Computer Science and Engineering, K.Ramakrishnan College of Engineering, Trichy, Tamil Nadu, India. Email: kiranit2010@gmail.com 1. INTRODUCTION The security is the very big issue in present technology to overcome those issue in various field day by day so many new proposed technique is released every day but in the field of medical the security is very much important to give privacy and security for the patient details to avoid data hacking and data surfing in the hospital database even though hospital staff should not directly see the without permission of patient as well as doctor. The Proposed system deals with the MRI scan image for the patient and it should be pre- processed and then convert into steganography technique it is in the form of two things first one is in image form another type is in form of text form each time MRI image has been converted into text or image form [1-2]. The next step for the proposed system is from that using the proposed cryptography algorithm just convert those unknown form into another form for the purpose of security aspect to give privacy and authentication for the patient as well as hospital for high quality of service. MIAS database is used for the proposed system from that database the entire process has been carried out for the better result for the present technology result. The proposed system is not deals with the diagnosis of the disease from the image but the system is mainly focus on the security aspect of the system[3][4]. Basic diagram for proposed system as shown in Figure 1.
  • 2. IJAAS ISSN: 2252-8814  The Combination of Steganography and Cryptography for Medical Image Applications (B.Kiran Bala) 103 Figure 1. Basic diagram for proposed system The proposed system is having two modules namely steganography form and cryptography module from the input image random chosen of image or text from the proposed system and then by using image conversion means MRI image has been converted into binary form and then plain image from the proposed algorithm identify the unused space from the plain image insert the MRI image into the plain image and now the MRI image is in unknown form and then encrypt the image into cipher text and store in the database. Likewise, if MRI image can also be convert into text and encrypt into cipher text and finally store into database [5]. 2. METHODOLOGIES AND RESULTS 2.1. Initial Process for Image The First and foremost process in the proposed system after getting the MRI image the system will random conversion of image or text from of the MRI image[6]. Random conversion for steganography process as shown Figure 2. Figure 2. Random conversion for steganography process Figure 3 Basic diagram of image for Steganography process Figure 4. Basic diagram of text for steganography process
  • 3.  ISSN: 2252-8814 IJAAS Vol. 7, No. 2, June 2018: 102 – 104 104 The Figure 3 and Figure 4 for the process of steganography has been shown in the Figures and finally store in the database of the proposed system[7] 3. RESULTS AND DISCUSSION The Proposed system have implementation of the entire process and which has process and execution time accuracy has been discussed in the system. The result of proposed system are available in Table 1 Table 1. Implementation Result of Proposed System Image Type Time (in sec) Accuracy (in %) JPEG 0.001 99.3 MPEG 0.001 99.4 BMP 0.002 99.5 PNG 0.001 99.5 GIF 0.001 99.4 PNM 0.001 99.5 BAT 0.003 99.3 BPG 0.001 99.4 From the implementation part the discussion has been made that the input image converted and result as well as graphs are available in the Figure 5 and Figure 6 for the proposed system. Figure 5. Graph for image type & time taken for conversion Figure 6. Graph for image type & accuracy from the conversion 4. CONCLUSION The experimental results reported in this paper shown in the Figure 5 and Figure 6 for the processing and efficiency of the entire proposed system is possible the justification shown in the implementation part is available. The proposed system deals with security of the present technology and which gives the input for the issues in the present system and solution to the issues of the present technology for the biomedical application for the medical sector for privacy and highly confidentially data of the patient. REFERENCES [1] http://www. mammoimage. Org / databases/ [2] B.Kiran Bala, R.Sasikumar, Identification Of Cancer From The Mammogram Images By Using Frequency Domain Approaches, International Journal of ChemTech Research, April 2017, Volume 10 No.5. [3] B.Kiran Bala, A Novel Approach to Identify the Micro calcification Images, Journal of Chemical and Pharmaceutical Sciences, SpecialIssue2: February 2017, Pages 190-192. [4] B.Kiran Bala, Biometrics for Mobile Banking, International Journal of Technology And Engineering System, 2011, Volume 2, Issue 1,Pages95-97. [5] B.Kiran Bala, T.m.nithya, Remedy For Disease Affected Iris In Iris Recognition, International Journal of Research in Engineering and Technology, November Issue 2012, ISSN: 2319 – 1163, page No. 332-334. [6] B.Kiran Bala, A Novel Approach to Generate a Key for Cryptographic Algorithm, Journal of Chemical and Pharmaceutical Sciences, Special Issue 2: February 2017, Pages 229-231