RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem

  • PDF / 3,529,532 Bytes
  • 11 Pages / 595.276 x 790.866 pts Page_size
  • 20 Downloads / 162 Views

DOWNLOAD

REPORT


ORIGINAL ARTICLE

RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem Mamta Jain1 • Anil Kumar1

Received: 20 November 2015 / Accepted: 28 April 2016 Ó Springer-Verlag Berlin Heidelberg 2016

Abstract This paper presents the novelty in sensitive data transmission of patient medical records. The secret medical data is hidden inside scanned grey medical image or magnetic resonance image using the red, green, blue, and alpha (RGBA) image and with the help of decision tree. In this technique, alpha channel will be separated from the RGBA image and merged to the medical grey image to improve the hiding capacity. RSA cryptosystem is used to encrypt the medical data, and divided into various blocks using dynamic key. In steganography process, organize the grey-alpha channel medical cover image into various blocks using dynamic key. Secret cipher blocks are assigned to grey-alpha channel medical cover image blocks using Breadth First Search and decision tree, for data embedding. Performance analysis is observed using various performance measure parameters between various medical stego and cover images. Keywords Decision tree  RGB channel  Grey-alpha channel  Steganography  Cryptography  Encryption  Decryption  Embedding

& Mamta Jain [email protected] Anil Kumar [email protected] 1

Department of Computer Science and Engineering, Mody University of Science and Technology, Lakshmangarh, Rajasthan, India

1 Introduction In this era, various medical systems are continuously migrating into the cloud and mobile environments. In the version of the telemedicine, the doctor examines the medical image along with the patient data, which is transmitted from remote places, that helps in receiving medical care by expediting diagnosis and immediate treatment. Security parameters such as authentication, integrity, confidentiality and availability have to be considered for secure transmission, Department of Health and Human Services (DHHS) imposed regulations for data security and privacy under the health insurance portability and accountability act (HIPAA) of 1996 [1–3]. Cryptographic techniques encrypt the secret records with a password and assume that only authorized parties have access to the password [4]. While this does work most of the time, the encrypted data is prone to prying security thieves, who could decipher sensitive information like the patients’ insurance service provider, medication history, etc. Steganography provides an alternative to this problem, hiding the very existence of sensitive data by concealing the data in nondescript areas of the carrier image, such that the changes made to the image are imperceptible, and the secret information is retrieved only by authorized person [5–10]. Steganography methods performance can be observed by the three valuable specifications: secrecy, volume/capability, and visual imperceptibility [11]. Secrecy is used to protect data from unauthenticated attackers or intruders. The hiding capacity should be enough to obscure the dat