SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016
DOI : 10.5121/ijait.2016.6104 43
AN INTEGRATED METHOD OF DATA HIDING AND
COMPRESSION OF MEDICAL IMAGES
M.MaryShanthi Rani and S.Lakshmanan
Department of Computer Science and Applications,
The Gandhigram Rural Institute – Deemed University,
Gandhigram – 624 302,Dindigul, Tamil Nadu, India
ABSTRACT
A new technique for embedding data into an image coupled with compression has been proposed in this
paper. A fast and efficient coding algorithms are needed for effective storage and transmission, due to the
popularity of telemedicine and the use of digital medical images. Medical images are produced and
transferred between hospitals for review by physicians who are geographically apart. Such image data
need to be stored for future reference of patients as well. This necessitates compact storage of medical
images before being transmitted over Internet. Moreover, as the patient information is also embedded
within the medical images, it is very important to maintain the confidentiality of patient data. Hence, this
article aims at hiding patient information as well, within the medical image followed by joint compression.
The hidden data and the host image are absolutely recoverable from the embedded image without any loss.
KEYWORDS
Medical Image Compression, Data hiding, Telemedicine, Steganography
1. INTRODUCTION
Secure and fast transmission of medical images is a great challenge in the field of telemedicine.
Nowadays, in order to maintain the confidentiality of patient data, they are embedded within the
medical image itself. The process of hiding data in an image is called steganography which is
derived from the Greek language and means covert writing. It is the technique of encoding secret
information in a communication channel in such a manner that the very existence of the
information is concealed. Computer-based image steganography is one way of data hiding which
provides data security in digital images. The aim is to embed and deliver secret messages in
digital images without any suspiciousness. The secret message might be a caption, a plain text,
another image, a control signal, or anything that can be represented in bit stream form [2].
Picture Achieving Communication System (PACS) is used for the transmission of medical
images. PACS compress the medical images for transfer to other hospitals or storing locally. It
saves the storage space of database.
The objective of image compression is to reduce the redundancy of the image and to store or
transmit data in an efficient form. The main goal of such system is to reduce the storage quantity
as much as possible. As in telemedicine, videos and the medical images are transmitted through
advanced telecommunication links, medical image compression without any loss of useful
information is of immense importance for the fast transfer of the information [3].
Generally, lossless compression techniques are used for compressing medical images to preserve
the original image. Lossless compression is a compression algorithm in which the original image
International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016
44
can be completely recovered from the compressed image without any loss. Some of the popular
lossless compression techniques are
• Run length coding
• Huffman coding
• Arithmetic encoding
• Entropy coding
• Area coding
Run length coding is a simple method used for compressing sequential data. It achieves
compression by eliminating redundancy and avoiding repetitive data.
The combination of a run-length coding scheme followed by a Huffman coder forms the basis of
image compression standards. These compression standards yield good compression ratios from
20:1 to 50:1.
In this proposed method Run Length Encoding is used to compress the image. The remaining part
of this article is organized as follows, Section 2 discusses about related work in this research area,
section 3 describes the proposed method, Section 4 analyses the performance of the proposed
method and Section 5 presents the conclusion and future work.
2. RELATED WORK
In 2008,M.A.Ansari and R.S.Anand presented various techniques of image compression in
Telemedicine [4]. This paper deals with basic redundancies used to achieve compression
specifically focussing on medical image.
The secret data [5] is hidden into the quantized DCT co-efficients of the JPEG compressed image.
Finally, to produce the JPEG compressed stego-image, the entropy decoding method is employed.
If the data is hidden in LSB as in [6], a hacker can retrieve the hidden message by tracing the
LSBs of all pixels and fix them into bytes. To avoid this and to increase the power of security, the
stego image with hidden data is encrypted and the encrypted image is hidden in other images at
random based on random number generator.
In yet another method, LSB algorithm is represented with pseudo random number generator
which is protected from hackers [11].Random number generator is used as a selector in placing
the message bits in image randomly. In this proposed method Secret key need not be shared
between the sender and receiver to retrieve the data.
3. Proposed Method
In this paper, a new method of hiding text data into an image is proposed. This method is highly
suited for hiding patient details into a medical image producing a stego image. Furthermore, the
stego image is compressed using lossless compression technique for efficient and fast
transmission. In this method, lossless compression technique run-length encoding is used for
compressing the stego medical image so as to reconstruct the image at receiving end without any
loss in image details, whichare very vital for medical diagnosis. The special feature of this
algorithm is data hiding combined with compression. It would be useful specifically for PACS.
The algorithm of the proposed method is implemented in three phases. Phase one performs the text
hiding in medical image, phase two compresses the stego medical image and phase three performs
decompression and hidden data retrieval.
International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016
45
The steps of the proposed algorithm is outlined as follows
3.1 Phase One – Data Hiding
Steps:
• Read the input medical image.
• Convert the image into gray scale image.
• Take out the Region of Interest by locating the rectangle enclosing it, with its top left and
bottom right co-ordinates as shown in Figure.2 (b).
• Read the text data (for example: Patient id and Name)
• Convert each character of text into its consequent ASCII value as given in Table 1.
• Count the ASCII values to avoid replication of hiding same text characters.
• Find the zero valued pixel p(x,y) surrounded by pixels at four corners( Top ,Bottom, Left
,Right) with value 0.
• Hide the ASCII value at p(x,y), resulting in stego image.
3.2 Phase Two – Image compression
After the data hiding process in phase one, the stego image is compressed using Run length
encoding and transmitted through the internet.
Steps:
• The stego image is converted into a vector Figure 4 (a).
• Using Run Length Encoding, the above vector is converted into two vectors indicating
the element (pixel value) and its run length as shown in Figure 4(b) & (c)
The sample result is shown in Figure 5.
3.3 Phase Three – Decompression and Data Retrieval
Phase Three decodes the image and retrieves the medical image and the hidden data. The
compressed image obtained from the previous phase is reconstructed to get the stego image by
performing the run length decoding procedure as given below:
Steps
• Using the elements and run length vectors, create a vector of stego image.
• Convert the vector obtained in the previous step to 256x256 matrix.
• Retrieve the value of p(x,y) which is the ASCII value of the hidden character, if the
following conditions are true:
p(x,y) ≠ 0 and
p(x+1,y)= P(x-1,y)= P(x,y+1)=P(x,y-1)=0
• Replace p(x.y) with zero to get the original medical image.
• Convert the ascii values to their corresponding characters to get the secret data.
International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016
46
3.4 Flow Chart
Figure 1.(a) Data hiding and compression
Figure 1. (b) Decompression and Data Retrieval
4. RESULTS AND DISCUSSION
The proposed method is tested using medical images of size 256x256 with 256 gray levels.
Results of the proposed method is given in Table
Table 1: Secret Message
Input
Text
G R I p i d : 0 0 7
ASCII 71 82 73 32 112 105 100 58 48 48 55
International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016
47
181x218
Figure 2. (a) Original medical
image256x256
Figure 2.(b) Image with
Region of Interest 181x218
In the proposed method, even though an original medical image of size 256x256 is used, data is
hidden near Region of Interest so that there will not be any visible distortion. This is illustrated in
Figure 2 (b) which shows the actual region considered for hiding
Figure 3. Image before and after hiding
(a) Image to vector
(b) Element (c) Run Length
Figure 4: Sample result of Phase 2
The performance of the proposed system is analysed by measuring encoding and decoding time
that are tabulated in Table 1. The proposed algorithm is very simple to execute and Table 1
reveals that the data hiding and encoding time takes less than a second.
109 109 99 99 99 99 99 97 97 97
109 99 97 2 5 3
International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016
48
Table 2 : Measurement of Processing Time
Image Process
Elapsed
Time
(seconds)
Total
(seconds)
Data hiding 0.0172
0.1031
Run length
Encoding
0.0079
Run length
Decoding
0.0720
Data
Retrieval
0.0060
Data hiding 0.0169
0.0909
Run length
Encoding
0.0076
Run length
Decoding
0.0607
Data
Retrieval
0.0057
Data hiding 0.0175
0.1023
Run length
Encoding
0.0087
Run length
Decoding
0.0688
Data
Retrieval
0.0073
The quality of the reconstructed image is assessed by measuring the standard metric Mean Square
Error (MSE) between the original image and stego image as well as original and reconstructed
image which is calculated as follows,
The MSE and PSNR values computed for stego images and reconstructed images is given in
Table 3.
International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016
49
Table 3: MSE and PSNR of Stego Image and Reconstructed Image
Compared Medical Images MSE PSNR Compared Medical Images MSE PSNR
Original image stego image
0.9565 48.3240
Original image
Reconstructed
image
0 Infinity
0.9565 48.3240 0 Infinity
0.9565 48.3240 0 Infinity
The results of Table 3 shows that there is not much visible distortion between the stego images
and the reconstructed images. It is also worth noting that MSE is 0 revealing that the
reconstructed image is exactly similar to the original image. The retrieved data is same as the
hidden data in these three sample images. The MSE and PSNR values in Table 2 for all sample
images is same (PSE=0.9565, MSE=48.4240) indicating that the same number of pixels are
modified in these three images.
Table 4 compares the proposed method with the existing method [7] and the result shows the
efficiency of the proposed method.
Table 4: Comparison with Existing method
S.No Method
Elapsed Time
(Seconds)
Total
(Seconds)
1 Existing [7]
Stego 6.79
7.2100
Compression 0.42
2 Proposed
Image 1
Stego 0.0251
0.1031
Compression 0.0780
Image 2
Stego 0.0245
0.0909
Compression 0.0664
Image 3
Stego 0.0262 0.1023
Compression 0.0761
International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016
50
5. CONCLUSION
This paper proposes a new approach that couples data hiding and compression in medical images.
Experiments prove the superior performance of proposed method with low computation
complexity and ensures fast and secure transmission of medical images. As Run Length coding
lossless compression is used, the retrieved image by the receiver is the same as the original image
sent by the sender. Gray scale images are used for testing the proposed method and our future
work would be to extend to color images as well.
REFERENCES
[1] Stephen Wong, Loren Zaremba, David Gooden, and H.K. Huang, "Radiologic image compression – a
review", Proc. of the IEEE, vol 83, no. 2, pp. 194-219, Feb. 1995.
[2] Da-Chun Wu a, Wen-Hsiang Tsai b, “A steganographic method for images by pixel-value
differencing” Pattern Recognition Letters 24, 1613–1626, 2003.
[3] M.A. Ansari * Member IEEE and R.S. Anand ”Recent Trends in Image Compression and Its
Application in Telemedicine and Teleconsultation” XXXII NATIONAL SYSTEMS CONFERENCE,
NSC 2008, December 17-19, 2008
[4] Xiaojuan Li, G. Hu, S. Gao, “Design and implementation of a novel compression method in a tele-
ultrasound system,” IEEE Trans. on Information Tech. in Biomedicine, vol.3, Issue: 3, pp.205-213,
1999.
[5] Hsien-Wen TSENG, Chin-Chen CHANG ” High Capacity Data Hiding in JPEG-Compressed
Images” , INFORMATICA, 2004, Vol. 15, No. 1, 127–142 2004 Institute of Mathematics and
Informatics, Vilnius
[6] M. Mary Shanthi Rani, K.Rosemary Euphrasia , “Dynamic Hiding of message in RGB Domain based
on Random Channel Indicator”, International Journal of Applied Engineering Research, Vol.10
No.76., pp. 478-483 2015
[7] Pooja Rani, Apoorva Arora “Image Security System using Encryption and Steganography” IJIRSET
Vol. 4, Issue 6, June 2015.
[8] Jagadish h. Pujar, lohit m. Kadlaskar “A new lossless method of image compression and
Decompression using huffman coding techniques” JTAIT ©2005-2010
[9] Mary Shanthi Rani, M. Germine Mary, G. Rosemary Euphrasia,K. “High level Multimedia Security
by incorporatingSteganography and Visual Cryptography” International Journal of Innovations &
Advancement in Computer Science IJIACS - ISSN 2347 – 8616 Volume 4, Special Issue September
2015.
[10] Aihab Khan, MemoonaKhanam, Saba Bashir, Malik Sikander Hayat Khiyal, Asima Iqbal, and Farhan
Hassan Khan “Entropy Based Data Hiding in Binary Document Images” International Journal of
Computer and Electrical Engineering, Vol. 3, No. 4, August 2011
[11] Wang, H., Wang, S, October 2004, “Cyber warfare: Steganography vs. Steganalysis”,
Communications of the ACM, 47:10.
[12] M.MaryShanthi Rani, G.Germine Mary, K.RosemaryEuphrasia “Multilevel multimedia security by
Integrating Visual Cryptography and Stegnography Techniques” Chapter Computational intelligence,
Cyber Security and Computational Models volume 412 of the serious Advances in intelligent Systems
and Computing pp 403-412, December 2105.
[13] Michael G. Strintzis “A review of compression methods for medical images in PACS” International
Journal of Medical Informatics 52 (1998) 159–165.Fatema Rashid, Ali Miri, Isaac Woungang “Secure
image deduplication through image compression” journal of information security and applications
(2015)
AUTHORS
Dr.M. Mary Shanthi Rani, a NET qualified Assistant Professor in the Department of
Computer Science and Applications, Gandhigram Rural Institute (Deemed
University),Gandhigram has twelve years of teaching and eight years of research
experience as well. She has nearly twenty publications in International Journals and
Conferences. Her research areas of interest are Image Compression, Information
International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016
51
Security, Ontology, Biometrics and Computational Biology. She has authored a book titled “Novel Image
Compression Methods Based on Vector Quantization” and is one of the editors of Conference Proceedings
“Recent Advances in Computer Science and Applications”. She has served in various academic committees
in designing the curriculum for B.Sc. and M.C.A courses as well. She has also served as reviewer of Peer-
reviewed International Journals and Conferences and is a Life member of Indian Society for Technical
Education. She has the credit of being the Associate Project Director of UGC Indo-US 21st
Knowledge
Initiative Project.
S.Lakshmanan is a Research Scholar (Full-time) in the Department of Computer
Science and Applications, Gandhigram Rural Institute - Deemed University,
Dindigul, India. He received his Bachelor of Science (B.Sc) degree in Computer
Science in the year 2012 from Madurai Kamaraj University and Master of
Computer Applications (MCA) degree in the year 2015 from Gandhigram Rural
Institute - Deemed University. He is currently pursuing Ph.D. degree in
Gandhigram Rural Institute- Deemed University. His research focuses on Medical
Image Processing.

More Related Content

What's hot

OFCS: Optimized Framework of Compressive Sensing for Medical Images in Bottle...
OFCS: Optimized Framework of Compressive Sensing for Medical Images in Bottle...OFCS: Optimized Framework of Compressive Sensing for Medical Images in Bottle...
OFCS: Optimized Framework of Compressive Sensing for Medical Images in Bottle...IJECEIAES
 
A novel medical image segmentation and classification using combined feature ...
A novel medical image segmentation and classification using combined feature ...A novel medical image segmentation and classification using combined feature ...
A novel medical image segmentation and classification using combined feature ...eSAT Journals
 
Literature Survey on Detection of Brain Tumor from MRI Images
Literature Survey on Detection of Brain Tumor from MRI Images Literature Survey on Detection of Brain Tumor from MRI Images
Literature Survey on Detection of Brain Tumor from MRI Images IOSR Journals
 
FUZZY SEGMENTATION OF MRI CEREBRAL TISSUE USING LEVEL SET ALGORITHM
FUZZY SEGMENTATION OF MRI CEREBRAL TISSUE USING LEVEL SET ALGORITHMFUZZY SEGMENTATION OF MRI CEREBRAL TISSUE USING LEVEL SET ALGORITHM
FUZZY SEGMENTATION OF MRI CEREBRAL TISSUE USING LEVEL SET ALGORITHMAM Publications
 
Brain Tumor Detection using CNN
Brain Tumor Detection using CNNBrain Tumor Detection using CNN
Brain Tumor Detection using CNNMohammadRakib8
 
Techniques of Brain Cancer Detection from MRI using Machine Learning
Techniques of Brain Cancer Detection from MRI using Machine LearningTechniques of Brain Cancer Detection from MRI using Machine Learning
Techniques of Brain Cancer Detection from MRI using Machine LearningIRJET Journal
 
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSMIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSAM Publications
 
D232430
D232430D232430
D232430irjes
 
Clustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringClustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringeSAT Journals
 
Image type water meter character recognition based on embedded dsp
Image type water meter character recognition based on embedded dspImage type water meter character recognition based on embedded dsp
Image type water meter character recognition based on embedded dspcsandit
 
The Combination of Steganography and Cryptography for Medical Image Applications
The Combination of Steganography and Cryptography for Medical Image ApplicationsThe Combination of Steganography and Cryptography for Medical Image Applications
The Combination of Steganography and Cryptography for Medical Image ApplicationsIJAAS Team
 
Contour evolution method for precise boundary delineation of medical images
Contour evolution method for precise boundary delineation of medical imagesContour evolution method for precise boundary delineation of medical images
Contour evolution method for precise boundary delineation of medical imagesTELKOMNIKA JOURNAL
 
Reversible Data Hiding Methods : A Survey
Reversible Data Hiding Methods : A SurveyReversible Data Hiding Methods : A Survey
Reversible Data Hiding Methods : A Surveyrahulmonikasharma
 
Comparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesComparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesIAEME Publication
 
Segmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorSegmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorIRJET Journal
 

What's hot (19)

G011134454
G011134454G011134454
G011134454
 
K011138084
K011138084K011138084
K011138084
 
OFCS: Optimized Framework of Compressive Sensing for Medical Images in Bottle...
OFCS: Optimized Framework of Compressive Sensing for Medical Images in Bottle...OFCS: Optimized Framework of Compressive Sensing for Medical Images in Bottle...
OFCS: Optimized Framework of Compressive Sensing for Medical Images in Bottle...
 
A novel medical image segmentation and classification using combined feature ...
A novel medical image segmentation and classification using combined feature ...A novel medical image segmentation and classification using combined feature ...
A novel medical image segmentation and classification using combined feature ...
 
Literature Survey on Detection of Brain Tumor from MRI Images
Literature Survey on Detection of Brain Tumor from MRI Images Literature Survey on Detection of Brain Tumor from MRI Images
Literature Survey on Detection of Brain Tumor from MRI Images
 
FUZZY SEGMENTATION OF MRI CEREBRAL TISSUE USING LEVEL SET ALGORITHM
FUZZY SEGMENTATION OF MRI CEREBRAL TISSUE USING LEVEL SET ALGORITHMFUZZY SEGMENTATION OF MRI CEREBRAL TISSUE USING LEVEL SET ALGORITHM
FUZZY SEGMENTATION OF MRI CEREBRAL TISSUE USING LEVEL SET ALGORITHM
 
Brain Tumor Detection using CNN
Brain Tumor Detection using CNNBrain Tumor Detection using CNN
Brain Tumor Detection using CNN
 
Techniques of Brain Cancer Detection from MRI using Machine Learning
Techniques of Brain Cancer Detection from MRI using Machine LearningTechniques of Brain Cancer Detection from MRI using Machine Learning
Techniques of Brain Cancer Detection from MRI using Machine Learning
 
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSMIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
 
D232430
D232430D232430
D232430
 
Clustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringClustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clustering
 
Image type water meter character recognition based on embedded dsp
Image type water meter character recognition based on embedded dspImage type water meter character recognition based on embedded dsp
Image type water meter character recognition based on embedded dsp
 
The Combination of Steganography and Cryptography for Medical Image Applications
The Combination of Steganography and Cryptography for Medical Image ApplicationsThe Combination of Steganography and Cryptography for Medical Image Applications
The Combination of Steganography and Cryptography for Medical Image Applications
 
Contour evolution method for precise boundary delineation of medical images
Contour evolution method for precise boundary delineation of medical imagesContour evolution method for precise boundary delineation of medical images
Contour evolution method for precise boundary delineation of medical images
 
50120140503014
5012014050301450120140503014
50120140503014
 
Mm2
Mm2Mm2
Mm2
 
Reversible Data Hiding Methods : A Survey
Reversible Data Hiding Methods : A SurveyReversible Data Hiding Methods : A Survey
Reversible Data Hiding Methods : A Survey
 
Comparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesComparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniques
 
Segmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorSegmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain Tumor
 

Viewers also liked

COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...ijait
 
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...IDES Editor
 
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...ijait
 
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...ijait
 
Gray Coded Grayscale Image Steganoraphy using Hufman Encoding
Gray Coded Grayscale Image Steganoraphy using Hufman EncodingGray Coded Grayscale Image Steganoraphy using Hufman Encoding
Gray Coded Grayscale Image Steganoraphy using Hufman EncodingCSCJournals
 
A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...
A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...
A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...ijait
 
AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...
AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...
AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...ijait
 

Viewers also liked (8)

COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
 
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
 
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
 
Gray Coded Grayscale Image Steganoraphy using Hufman Encoding
Gray Coded Grayscale Image Steganoraphy using Hufman EncodingGray Coded Grayscale Image Steganoraphy using Hufman Encoding
Gray Coded Grayscale Image Steganoraphy using Hufman Encoding
 
A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...
A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...
A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...
 
AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...
AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...
AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...
 
Medical image analysis, retrieval and evaluation infrastructures
Medical image analysis, retrieval and evaluation infrastructuresMedical image analysis, retrieval and evaluation infrastructures
Medical image analysis, retrieval and evaluation infrastructures
 

Similar to AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES

A N E XQUISITE A PPROACH FOR I MAGE C OMPRESSION T ECHNIQUE USING L OSS...
A N  E XQUISITE  A PPROACH FOR  I MAGE  C OMPRESSION  T ECHNIQUE USING  L OSS...A N  E XQUISITE  A PPROACH FOR  I MAGE  C OMPRESSION  T ECHNIQUE USING  L OSS...
A N E XQUISITE A PPROACH FOR I MAGE C OMPRESSION T ECHNIQUE USING L OSS...ijcsitcejournal
 
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementA Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementIJERA Editor
 
A REVIEW OF IMAGE COMPRESSION TECHNIQUES
A REVIEW OF IMAGE COMPRESSION TECHNIQUESA REVIEW OF IMAGE COMPRESSION TECHNIQUES
A REVIEW OF IMAGE COMPRESSION TECHNIQUESArlene Smith
 
Medical Image Compression with security & water marking
Medical Image Compression with security & water markingMedical Image Compression with security & water marking
Medical Image Compression with security & water markingAnkit Chaudhary
 
A review on region of interest-based hybrid medical image compression algorithms
A review on region of interest-based hybrid medical image compression algorithmsA review on region of interest-based hybrid medical image compression algorithms
A review on region of interest-based hybrid medical image compression algorithmsTELKOMNIKA JOURNAL
 
Implementation of Fractal Image Compression on Medical Images by Different Ap...
Implementation of Fractal Image Compression on Medical Images by Different Ap...Implementation of Fractal Image Compression on Medical Images by Different Ap...
Implementation of Fractal Image Compression on Medical Images by Different Ap...ijtsrd
 
Survey of Hybrid Image Compression Techniques
Survey of Hybrid Image Compression Techniques Survey of Hybrid Image Compression Techniques
Survey of Hybrid Image Compression Techniques IJECEIAES
 
Towards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic ApproachTowards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic ApproachCSCJournals
 
Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression IJECEIAES
 
Enhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsEnhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsIJRES Journal
 
Super-Spatial Structure Prediction Compression of Medical
Super-Spatial Structure Prediction Compression of MedicalSuper-Spatial Structure Prediction Compression of Medical
Super-Spatial Structure Prediction Compression of Medicalijeei-iaes
 
An efficient lossless medical image
An efficient lossless medical imageAn efficient lossless medical image
An efficient lossless medical imagecaijjournal
 
Combining 3D run-length encoding coding and searching techniques for medical...
Combining 3D run-length encoding coding and searching  techniques for medical...Combining 3D run-length encoding coding and searching  techniques for medical...
Combining 3D run-length encoding coding and searching techniques for medical...IJECEIAES
 
Implementation of Brain Tumor Extraction Application from MRI Image
Implementation of Brain Tumor Extraction Application from MRI ImageImplementation of Brain Tumor Extraction Application from MRI Image
Implementation of Brain Tumor Extraction Application from MRI Imageijtsrd
 
Importance of Dimensionality Reduction in Image Processing
Importance of Dimensionality Reduction in Image ProcessingImportance of Dimensionality Reduction in Image Processing
Importance of Dimensionality Reduction in Image Processingrahulmonikasharma
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...IAEME Publication
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
 
Lossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyIRJET Journal
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 

Similar to AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES (20)

A N E XQUISITE A PPROACH FOR I MAGE C OMPRESSION T ECHNIQUE USING L OSS...
A N  E XQUISITE  A PPROACH FOR  I MAGE  C OMPRESSION  T ECHNIQUE USING  L OSS...A N  E XQUISITE  A PPROACH FOR  I MAGE  C OMPRESSION  T ECHNIQUE USING  L OSS...
A N E XQUISITE A PPROACH FOR I MAGE C OMPRESSION T ECHNIQUE USING L OSS...
 
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementA Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
 
A REVIEW OF IMAGE COMPRESSION TECHNIQUES
A REVIEW OF IMAGE COMPRESSION TECHNIQUESA REVIEW OF IMAGE COMPRESSION TECHNIQUES
A REVIEW OF IMAGE COMPRESSION TECHNIQUES
 
Medical Image Compression with security & water marking
Medical Image Compression with security & water markingMedical Image Compression with security & water marking
Medical Image Compression with security & water marking
 
A review on region of interest-based hybrid medical image compression algorithms
A review on region of interest-based hybrid medical image compression algorithmsA review on region of interest-based hybrid medical image compression algorithms
A review on region of interest-based hybrid medical image compression algorithms
 
Implementation of Fractal Image Compression on Medical Images by Different Ap...
Implementation of Fractal Image Compression on Medical Images by Different Ap...Implementation of Fractal Image Compression on Medical Images by Different Ap...
Implementation of Fractal Image Compression on Medical Images by Different Ap...
 
Survey of Hybrid Image Compression Techniques
Survey of Hybrid Image Compression Techniques Survey of Hybrid Image Compression Techniques
Survey of Hybrid Image Compression Techniques
 
Towards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic ApproachTowards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic Approach
 
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
 
Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression
 
Enhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsEnhanced Image Compression Using Wavelets
Enhanced Image Compression Using Wavelets
 
Super-Spatial Structure Prediction Compression of Medical
Super-Spatial Structure Prediction Compression of MedicalSuper-Spatial Structure Prediction Compression of Medical
Super-Spatial Structure Prediction Compression of Medical
 
An efficient lossless medical image
An efficient lossless medical imageAn efficient lossless medical image
An efficient lossless medical image
 
Combining 3D run-length encoding coding and searching techniques for medical...
Combining 3D run-length encoding coding and searching  techniques for medical...Combining 3D run-length encoding coding and searching  techniques for medical...
Combining 3D run-length encoding coding and searching techniques for medical...
 
Implementation of Brain Tumor Extraction Application from MRI Image
Implementation of Brain Tumor Extraction Application from MRI ImageImplementation of Brain Tumor Extraction Application from MRI Image
Implementation of Brain Tumor Extraction Application from MRI Image
 
Importance of Dimensionality Reduction in Image Processing
Importance of Dimensionality Reduction in Image ProcessingImportance of Dimensionality Reduction in Image Processing
Importance of Dimensionality Reduction in Image Processing
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
Lossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative Study
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES

  • 1. International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016 DOI : 10.5121/ijait.2016.6104 43 AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES M.MaryShanthi Rani and S.Lakshmanan Department of Computer Science and Applications, The Gandhigram Rural Institute – Deemed University, Gandhigram – 624 302,Dindigul, Tamil Nadu, India ABSTRACT A new technique for embedding data into an image coupled with compression has been proposed in this paper. A fast and efficient coding algorithms are needed for effective storage and transmission, due to the popularity of telemedicine and the use of digital medical images. Medical images are produced and transferred between hospitals for review by physicians who are geographically apart. Such image data need to be stored for future reference of patients as well. This necessitates compact storage of medical images before being transmitted over Internet. Moreover, as the patient information is also embedded within the medical images, it is very important to maintain the confidentiality of patient data. Hence, this article aims at hiding patient information as well, within the medical image followed by joint compression. The hidden data and the host image are absolutely recoverable from the embedded image without any loss. KEYWORDS Medical Image Compression, Data hiding, Telemedicine, Steganography 1. INTRODUCTION Secure and fast transmission of medical images is a great challenge in the field of telemedicine. Nowadays, in order to maintain the confidentiality of patient data, they are embedded within the medical image itself. The process of hiding data in an image is called steganography which is derived from the Greek language and means covert writing. It is the technique of encoding secret information in a communication channel in such a manner that the very existence of the information is concealed. Computer-based image steganography is one way of data hiding which provides data security in digital images. The aim is to embed and deliver secret messages in digital images without any suspiciousness. The secret message might be a caption, a plain text, another image, a control signal, or anything that can be represented in bit stream form [2]. Picture Achieving Communication System (PACS) is used for the transmission of medical images. PACS compress the medical images for transfer to other hospitals or storing locally. It saves the storage space of database. The objective of image compression is to reduce the redundancy of the image and to store or transmit data in an efficient form. The main goal of such system is to reduce the storage quantity as much as possible. As in telemedicine, videos and the medical images are transmitted through advanced telecommunication links, medical image compression without any loss of useful information is of immense importance for the fast transfer of the information [3]. Generally, lossless compression techniques are used for compressing medical images to preserve the original image. Lossless compression is a compression algorithm in which the original image
  • 2. International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016 44 can be completely recovered from the compressed image without any loss. Some of the popular lossless compression techniques are • Run length coding • Huffman coding • Arithmetic encoding • Entropy coding • Area coding Run length coding is a simple method used for compressing sequential data. It achieves compression by eliminating redundancy and avoiding repetitive data. The combination of a run-length coding scheme followed by a Huffman coder forms the basis of image compression standards. These compression standards yield good compression ratios from 20:1 to 50:1. In this proposed method Run Length Encoding is used to compress the image. The remaining part of this article is organized as follows, Section 2 discusses about related work in this research area, section 3 describes the proposed method, Section 4 analyses the performance of the proposed method and Section 5 presents the conclusion and future work. 2. RELATED WORK In 2008,M.A.Ansari and R.S.Anand presented various techniques of image compression in Telemedicine [4]. This paper deals with basic redundancies used to achieve compression specifically focussing on medical image. The secret data [5] is hidden into the quantized DCT co-efficients of the JPEG compressed image. Finally, to produce the JPEG compressed stego-image, the entropy decoding method is employed. If the data is hidden in LSB as in [6], a hacker can retrieve the hidden message by tracing the LSBs of all pixels and fix them into bytes. To avoid this and to increase the power of security, the stego image with hidden data is encrypted and the encrypted image is hidden in other images at random based on random number generator. In yet another method, LSB algorithm is represented with pseudo random number generator which is protected from hackers [11].Random number generator is used as a selector in placing the message bits in image randomly. In this proposed method Secret key need not be shared between the sender and receiver to retrieve the data. 3. Proposed Method In this paper, a new method of hiding text data into an image is proposed. This method is highly suited for hiding patient details into a medical image producing a stego image. Furthermore, the stego image is compressed using lossless compression technique for efficient and fast transmission. In this method, lossless compression technique run-length encoding is used for compressing the stego medical image so as to reconstruct the image at receiving end without any loss in image details, whichare very vital for medical diagnosis. The special feature of this algorithm is data hiding combined with compression. It would be useful specifically for PACS. The algorithm of the proposed method is implemented in three phases. Phase one performs the text hiding in medical image, phase two compresses the stego medical image and phase three performs decompression and hidden data retrieval.
  • 3. International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016 45 The steps of the proposed algorithm is outlined as follows 3.1 Phase One – Data Hiding Steps: • Read the input medical image. • Convert the image into gray scale image. • Take out the Region of Interest by locating the rectangle enclosing it, with its top left and bottom right co-ordinates as shown in Figure.2 (b). • Read the text data (for example: Patient id and Name) • Convert each character of text into its consequent ASCII value as given in Table 1. • Count the ASCII values to avoid replication of hiding same text characters. • Find the zero valued pixel p(x,y) surrounded by pixels at four corners( Top ,Bottom, Left ,Right) with value 0. • Hide the ASCII value at p(x,y), resulting in stego image. 3.2 Phase Two – Image compression After the data hiding process in phase one, the stego image is compressed using Run length encoding and transmitted through the internet. Steps: • The stego image is converted into a vector Figure 4 (a). • Using Run Length Encoding, the above vector is converted into two vectors indicating the element (pixel value) and its run length as shown in Figure 4(b) & (c) The sample result is shown in Figure 5. 3.3 Phase Three – Decompression and Data Retrieval Phase Three decodes the image and retrieves the medical image and the hidden data. The compressed image obtained from the previous phase is reconstructed to get the stego image by performing the run length decoding procedure as given below: Steps • Using the elements and run length vectors, create a vector of stego image. • Convert the vector obtained in the previous step to 256x256 matrix. • Retrieve the value of p(x,y) which is the ASCII value of the hidden character, if the following conditions are true: p(x,y) ≠ 0 and p(x+1,y)= P(x-1,y)= P(x,y+1)=P(x,y-1)=0 • Replace p(x.y) with zero to get the original medical image. • Convert the ascii values to their corresponding characters to get the secret data.
  • 4. International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016 46 3.4 Flow Chart Figure 1.(a) Data hiding and compression Figure 1. (b) Decompression and Data Retrieval 4. RESULTS AND DISCUSSION The proposed method is tested using medical images of size 256x256 with 256 gray levels. Results of the proposed method is given in Table Table 1: Secret Message Input Text G R I p i d : 0 0 7 ASCII 71 82 73 32 112 105 100 58 48 48 55
  • 5. International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016 47 181x218 Figure 2. (a) Original medical image256x256 Figure 2.(b) Image with Region of Interest 181x218 In the proposed method, even though an original medical image of size 256x256 is used, data is hidden near Region of Interest so that there will not be any visible distortion. This is illustrated in Figure 2 (b) which shows the actual region considered for hiding Figure 3. Image before and after hiding (a) Image to vector (b) Element (c) Run Length Figure 4: Sample result of Phase 2 The performance of the proposed system is analysed by measuring encoding and decoding time that are tabulated in Table 1. The proposed algorithm is very simple to execute and Table 1 reveals that the data hiding and encoding time takes less than a second. 109 109 99 99 99 99 99 97 97 97 109 99 97 2 5 3
  • 6. International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016 48 Table 2 : Measurement of Processing Time Image Process Elapsed Time (seconds) Total (seconds) Data hiding 0.0172 0.1031 Run length Encoding 0.0079 Run length Decoding 0.0720 Data Retrieval 0.0060 Data hiding 0.0169 0.0909 Run length Encoding 0.0076 Run length Decoding 0.0607 Data Retrieval 0.0057 Data hiding 0.0175 0.1023 Run length Encoding 0.0087 Run length Decoding 0.0688 Data Retrieval 0.0073 The quality of the reconstructed image is assessed by measuring the standard metric Mean Square Error (MSE) between the original image and stego image as well as original and reconstructed image which is calculated as follows, The MSE and PSNR values computed for stego images and reconstructed images is given in Table 3.
  • 7. International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016 49 Table 3: MSE and PSNR of Stego Image and Reconstructed Image Compared Medical Images MSE PSNR Compared Medical Images MSE PSNR Original image stego image 0.9565 48.3240 Original image Reconstructed image 0 Infinity 0.9565 48.3240 0 Infinity 0.9565 48.3240 0 Infinity The results of Table 3 shows that there is not much visible distortion between the stego images and the reconstructed images. It is also worth noting that MSE is 0 revealing that the reconstructed image is exactly similar to the original image. The retrieved data is same as the hidden data in these three sample images. The MSE and PSNR values in Table 2 for all sample images is same (PSE=0.9565, MSE=48.4240) indicating that the same number of pixels are modified in these three images. Table 4 compares the proposed method with the existing method [7] and the result shows the efficiency of the proposed method. Table 4: Comparison with Existing method S.No Method Elapsed Time (Seconds) Total (Seconds) 1 Existing [7] Stego 6.79 7.2100 Compression 0.42 2 Proposed Image 1 Stego 0.0251 0.1031 Compression 0.0780 Image 2 Stego 0.0245 0.0909 Compression 0.0664 Image 3 Stego 0.0262 0.1023 Compression 0.0761
  • 8. International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016 50 5. CONCLUSION This paper proposes a new approach that couples data hiding and compression in medical images. Experiments prove the superior performance of proposed method with low computation complexity and ensures fast and secure transmission of medical images. As Run Length coding lossless compression is used, the retrieved image by the receiver is the same as the original image sent by the sender. Gray scale images are used for testing the proposed method and our future work would be to extend to color images as well. REFERENCES [1] Stephen Wong, Loren Zaremba, David Gooden, and H.K. Huang, "Radiologic image compression – a review", Proc. of the IEEE, vol 83, no. 2, pp. 194-219, Feb. 1995. [2] Da-Chun Wu a, Wen-Hsiang Tsai b, “A steganographic method for images by pixel-value differencing” Pattern Recognition Letters 24, 1613–1626, 2003. [3] M.A. Ansari * Member IEEE and R.S. Anand ”Recent Trends in Image Compression and Its Application in Telemedicine and Teleconsultation” XXXII NATIONAL SYSTEMS CONFERENCE, NSC 2008, December 17-19, 2008 [4] Xiaojuan Li, G. Hu, S. Gao, “Design and implementation of a novel compression method in a tele- ultrasound system,” IEEE Trans. on Information Tech. in Biomedicine, vol.3, Issue: 3, pp.205-213, 1999. [5] Hsien-Wen TSENG, Chin-Chen CHANG ” High Capacity Data Hiding in JPEG-Compressed Images” , INFORMATICA, 2004, Vol. 15, No. 1, 127–142 2004 Institute of Mathematics and Informatics, Vilnius [6] M. Mary Shanthi Rani, K.Rosemary Euphrasia , “Dynamic Hiding of message in RGB Domain based on Random Channel Indicator”, International Journal of Applied Engineering Research, Vol.10 No.76., pp. 478-483 2015 [7] Pooja Rani, Apoorva Arora “Image Security System using Encryption and Steganography” IJIRSET Vol. 4, Issue 6, June 2015. [8] Jagadish h. Pujar, lohit m. Kadlaskar “A new lossless method of image compression and Decompression using huffman coding techniques” JTAIT ©2005-2010 [9] Mary Shanthi Rani, M. Germine Mary, G. Rosemary Euphrasia,K. “High level Multimedia Security by incorporatingSteganography and Visual Cryptography” International Journal of Innovations & Advancement in Computer Science IJIACS - ISSN 2347 – 8616 Volume 4, Special Issue September 2015. [10] Aihab Khan, MemoonaKhanam, Saba Bashir, Malik Sikander Hayat Khiyal, Asima Iqbal, and Farhan Hassan Khan “Entropy Based Data Hiding in Binary Document Images” International Journal of Computer and Electrical Engineering, Vol. 3, No. 4, August 2011 [11] Wang, H., Wang, S, October 2004, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10. [12] M.MaryShanthi Rani, G.Germine Mary, K.RosemaryEuphrasia “Multilevel multimedia security by Integrating Visual Cryptography and Stegnography Techniques” Chapter Computational intelligence, Cyber Security and Computational Models volume 412 of the serious Advances in intelligent Systems and Computing pp 403-412, December 2105. [13] Michael G. Strintzis “A review of compression methods for medical images in PACS” International Journal of Medical Informatics 52 (1998) 159–165.Fatema Rashid, Ali Miri, Isaac Woungang “Secure image deduplication through image compression” journal of information security and applications (2015) AUTHORS Dr.M. Mary Shanthi Rani, a NET qualified Assistant Professor in the Department of Computer Science and Applications, Gandhigram Rural Institute (Deemed University),Gandhigram has twelve years of teaching and eight years of research experience as well. She has nearly twenty publications in International Journals and Conferences. Her research areas of interest are Image Compression, Information
  • 9. International Journal of Advanced Information Technology (IJAIT) Vol. 6, No. 1, February 2016 51 Security, Ontology, Biometrics and Computational Biology. She has authored a book titled “Novel Image Compression Methods Based on Vector Quantization” and is one of the editors of Conference Proceedings “Recent Advances in Computer Science and Applications”. She has served in various academic committees in designing the curriculum for B.Sc. and M.C.A courses as well. She has also served as reviewer of Peer- reviewed International Journals and Conferences and is a Life member of Indian Society for Technical Education. She has the credit of being the Associate Project Director of UGC Indo-US 21st Knowledge Initiative Project. S.Lakshmanan is a Research Scholar (Full-time) in the Department of Computer Science and Applications, Gandhigram Rural Institute - Deemed University, Dindigul, India. He received his Bachelor of Science (B.Sc) degree in Computer Science in the year 2012 from Madurai Kamaraj University and Master of Computer Applications (MCA) degree in the year 2015 from Gandhigram Rural Institute - Deemed University. He is currently pursuing Ph.D. degree in Gandhigram Rural Institute- Deemed University. His research focuses on Medical Image Processing.