Loseless Data Embedding Scheme for Medical Image Transmission in E-Diagnosis
DOI:
https://doi.org/10.51983/ajeat-2012.1.1.2507Keywords:
Video Steganography, Medical Images, Information Hiding, Multimedia Messaging Service (MMS), HaarWaveletAbstract
One of the major concerns throughout the world today is to make high quality health care available to all. Traditionally, part of the difficulty in achieving equitable access to health care has been that the provider and the recipient must be physically present in the same place. Recent advances in Information and Communication Technologies have increased the number of ways health care can be delivered to reduce these difficulties. Mobile phones are the most commonly used devices in today’s scenario. The expanding use of mobile phone, telecommunication companies added feature such as MMS (Multimedia Messaging Service) in order to attract more customers. The Multimedia Messaging Service (MMS) has became very popular for sending messages containing multimedia objects such as images, audio, or video clips among mobile users. Alongside, the need for the secure communication became more imperative. Steganography is the most reliable technique for hidden communication. Hiding information, especially in images has been an alternative solution for secret communication [2].
References
Amr A. Hanafy, Gouda I. Salama and Yahya Z. Mohasseb, “A Secure Covert Communication Model Based on Video Steganography”, in Military Communications Conference, 2008 MILCOM. IEEE on 16 – 19 Nov. 2008.
M.Shirali-Shahreza, “Steganography in MMS”, Proceedings of the 11th IEEE International Multitopic Conference (INMIC 2007), Lahore, Pakistan, December 28 – 30, 2007.
K. Papapanagiotou, E. Kellinis, G.F. Marias, and P. Georgiadis, “Alternatives for Multimedia Messaging System Steganography”, Proceedings the IEEE International Conference on Computational Intelligence and Security (CIS 2005), Part II, LNAI 3802, Xian, China, pp. 589 – 596, December 2005.
T. Morkel, J.H.P. Eloff, M.S. Olivier, “An Overview of Image Steganography”, in proceedings of the fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005 (Published electronically).
K. Papapanagiotou, E. Kellinis, G.F. Marias, and P. Georgiadis, “Alternatives For multimedia Messaging System Steganography”, Proceedings the IEEE International Conference on Computational Intelligence and Security (CIS 2005), Part II, LNAI 3802, Xian, China, pp. 589 – 596, December 2005.
Marvel L.M., Boncelet Jr., C.G. and Retter C., “Spread Spectrum Steganography”, IEEE Transactions on image processing, Vol. 8, No. 8, 1999.
G. Langelaar, I. Setyawan, R.L. Lagendijk, “Watermarking Digital Image and Video Data”, in IEEE Signal Processing Magazine, Vol. 17, pp. 20 – 43, September 2000.
Brani Vidakovic and Peter Müller, “Wavelets for kids,” A Tutorial Introduction,Institute of Statistics and Decision Science, Duke University, Durham, NC, 1991.
Chao, Hongyang; Fisher, Paul, “An Approach to Fast Integer Reversible Wavelet Transforms for Image Compression,” Computer and Information Science Inc., 3401 E. University, Suite 104, Denton, TX 76208, in “Advances in Computational Mathematics: Guangzhou, China - The proceedings of Guangzhou International Symposium on Computational Mathematics,” Guangzhou, P. R. China, August11-15, 1997.
Eric J. Stollnitz, Tony D. DeRose and David H. Salesin, ”Wavelets for Computer Graphics : A Primer Part 1,” IEEE Computer Graphics and ions, May 1995.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2012 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.