A cost effective approach for securing medical X-ray images using Chebyshev map

Recent times, several deceitful attacks towards life/health insurances by providing faux health data measure is in increase. Transmission and storage of patient's medical records require high degree of confidentiality concerning the privacy of the beholder for medical insurance claim. Therefore there's a necessity for security of the medical images sent by the health professional caregiver to the insurance provider. One of the approaches for protection is to make use of steganography to include the patient's details and encryption of the image to secure the transmission. In existing approaches, steganography or water marking strengthen the medical images security; however these techniques can't assure sturdy security on transmission. In this paper, an approach for embedding the patient's information in the medical X-ray image utilizing the chaotic maps is done. This shields the patient confidentiality, and increase the protection in medical images. The chaotic maps generate discrete and random numbers that are used to assign the location of the embedded information in the medical image. This approach gives the smaller key size and as the amount of information to be inserted is less, the information loss is at minimum. Chaotic maps namely, Henon and Chebyshev maps are adopted for stego-image. In this work, database of ten X-ray images are used for performance analysis using the metrics PSNR, MSE and coefficient of correlation.

[1]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[2]  Mamta Juneja,et al.  Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[3]  A. K. Gulve,et al.  Steganography using Cryptography and Pseudo Random Numbers , 2014 .

[4]  Hui Liu,et al.  Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map , 2013, IET Inf. Secur..

[5]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[6]  J. Fridrich Image encryption based on chaotic maps , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[7]  Aarti Kochhar,et al.  A Steganography Implementation based on LSB & DCT , 2012 .

[8]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[9]  Gao Wen-zheng,et al.  Color image encryption algorithm based on chaotic map , 2011 .

[10]  Ja-Chen Lin,et al.  Hiding data in images by optimal moderately-significant-bit replacement , 2000 .

[11]  Sunanda Mitra,et al.  Secure transmission of medical records using high capacity steganography , 2004, Proceedings. 17th IEEE Symposium on Computer-Based Medical Systems.

[12]  Dongxu Qi,et al.  The application of chaotic maps in image encryption , 2005, The 3rd International IEEE-NEWCAS Conference, 2005..

[13]  Sunanda Mitra,et al.  Secure transmission of medical records using high capacity steganography , 2004 .