Skip to main content
Erschienen in: Journal of Medical Systems 5/2016

01.05.2016 | Mobile Systems

Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy

verfasst von: Khan Muhammad, Muhammad Sajjad, Sung Wook Baik

Erschienen in: Journal of Medical Systems | Ausgabe 5/2016

Einloggen, um Zugang zu erhalten

Abstract

In this paper, the problem of secure transmission of sensitive contents over the public network Internet is addressed by proposing a novel data hiding method in encrypted images with dual-level security. The secret information is divided into three blocks using a specific pattern, followed by an encryption mechanism based on the three-level encryption algorithm (TLEA). The input image is scrambled using a secret key, and the encrypted sub-message blocks are then embedded in the scrambled image by cyclic18 least significant bit (LSB) substitution method, utilizing LSBs and intermediate LSB planes. Furthermore, the cover image and its planes are rotated at different angles using a secret key prior to embedding, deceiving the attacker during data extraction. The usage of message blocks division, TLEA, image scrambling, and the cyclic18 LSB method results in an advanced security system, maintaining the visual transparency of resultant images and increasing the security of embedded data. In addition, employing various secret keys for image scrambling, data encryption, and data hiding using the cyclic18 LSB method makes the data recovery comparatively more challenging for attackers. Experimental results not only validate the effectiveness of the proposed framework in terms of visual quality and security compared to other state-of-the-art methods, but also suggest its feasibility for secure transmission of diagnostically important keyframes to healthcare centers and gastroenterologists during wireless capsule endoscopy.
Literatur
1.
Zurück zum Zitat Cheddad, J., Condell, K., Curran, and Mc Kevitt, P., “Digital image steganography: Survey and analysis of current methods,”. Signal Process. 90:727–752, 2010.CrossRef Cheddad, J., Condell, K., Curran, and Mc Kevitt, P., “Digital image steganography: Survey and analysis of current methods,”. Signal Process. 90:727–752, 2010.CrossRef
2.
Zurück zum Zitat Liu, J., Tang, G., and Sun, Y., A secure steganography for privacy protection in healthcare system. J. Med. Syst. 37:1–10, 2013.CrossRef Liu, J., Tang, G., and Sun, Y., A secure steganography for privacy protection in healthcare system. J. Med. Syst. 37:1–10, 2013.CrossRef
3.
Zurück zum Zitat Yang, C.-Y., and Wang, W.-F., Effective electrocardiogram steganography based on coefficient alignment. J. Med. Syst. 40:1–15, 2016.CrossRef Yang, C.-Y., and Wang, W.-F., Effective electrocardiogram steganography based on coefficient alignment. J. Med. Syst. 40:1–15, 2016.CrossRef
4.
Zurück zum Zitat Khan, F. and Gutub, A. A.-A., “Message Concealment Techniques using Image based Steganography,” in The 4th IEEE GCC Conference and Exhibition, 2007. Khan, F. and Gutub, A. A.-A., “Message Concealment Techniques using Image based Steganography,” in The 4th IEEE GCC Conference and Exhibition, 2007.
5.
Zurück zum Zitat Al-Otaibi, N. A. and Gutub, A. A., “Flexible stego-system for hiding text in images of personal computers based on user security priority,” in Proceedings of 2014 International conference on Advanced Engineering Technologies (AET-2014), 2014, pp. 243–250. Al-Otaibi, N. A. and Gutub, A. A., “Flexible stego-system for hiding text in images of personal computers based on user security priority,” in Proceedings of 2014 International conference on Advanced Engineering Technologies (AET-2014), 2014, pp. 243–250.
6.
Zurück zum Zitat Mielikainen, J., “LSB matching revisited,”. SigN. ProcesS. Lett., IEEE 13:285–287, 2006.CrossRef Mielikainen, J., “LSB matching revisited,”. SigN. ProcesS. Lett., IEEE 13:285–287, 2006.CrossRef
7.
Zurück zum Zitat Luo, W., Huang, F., and Huang, J., “Edge adaptive image steganography based on LSB matching revisited,”. Inform. Forensics Secur., IEEE Trans. 5:201–214, 2010.CrossRef Luo, W., Huang, F., and Huang, J., “Edge adaptive image steganography based on LSB matching revisited,”. Inform. Forensics Secur., IEEE Trans. 5:201–214, 2010.CrossRef
8.
Zurück zum Zitat Ioannidou, Halkidis, S. T., and Stephanides, G., A novel technique for image steganography based on a high payload method and edge detection. Expert Syst. Applic. 39:11517–11524, 2012.CrossRef Ioannidou, Halkidis, S. T., and Stephanides, G., A novel technique for image steganography based on a high payload method and edge detection. Expert Syst. Applic. 39:11517–11524, 2012.CrossRef
9.
Zurück zum Zitat Kanan, H. R., and Nazeri, B., A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Applic. 41:6123–6130, 2014.CrossRef Kanan, H. R., and Nazeri, B., A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Applic. 41:6123–6130, 2014.CrossRef
10.
Zurück zum Zitat Gutub, M., Ankeer, M., Abu-Ghalioun, A., Shaheen, and Alvi A., “Pixel indicator high capacity technique for RGB image based Steganography,” in WoSPA 2008–5th IEEE International Workshop on Signal Processing and its Applications, 2008, pp. 1-3. Gutub, M., Ankeer, M., Abu-Ghalioun, A., Shaheen, and Alvi A., “Pixel indicator high capacity technique for RGB image based Steganography,” in WoSPA 2008–5th IEEE International Workshop on Signal Processing and its Applications, 2008, pp. 1-3.
11.
Zurück zum Zitat Gutub, A.-A., Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell. 2:56–64, 2010. Gutub, A.-A., Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell. 2:56–64, 2010.
12.
Zurück zum Zitat Abu-Marie, W., Gutub, A., and Abu-Mansour, H., Image based steganography using truth table based and determinate array on RGB indicator. Int. J. Sign. Imag. Process. 1:196–204, 2010. Abu-Marie, W., Gutub, A., and Abu-Mansour, H., Image based steganography using truth table based and determinate array on RGB indicator. Int. J. Sign. Imag. Process. 1:196–204, 2010.
13.
Zurück zum Zitat Fakhredanesh, M., Rahmati, M., and Safabakhsh, R., Adaptive image steganography using contourlet transform. J. Electron. Imag. 22:043007–043007, 2013.CrossRef Fakhredanesh, M., Rahmati, M., and Safabakhsh, R., Adaptive image steganography using contourlet transform. J. Electron. Imag. 22:043007–043007, 2013.CrossRef
14.
Zurück zum Zitat Chen, W.-Y., Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques. Appl. Math. Comput. 196:40–54, 2008.CrossRef Chen, W.-Y., Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques. Appl. Math. Comput. 196:40–54, 2008.CrossRef
15.
Zurück zum Zitat Noda, H., Niimi, M., and Kawaguchi, E., High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recogn. Lett. 27:455–461, 2006.CrossRef Noda, H., Niimi, M., and Kawaguchi, E., High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recogn. Lett. 27:455–461, 2006.CrossRef
16.
Zurück zum Zitat Jafari, R., Ziou, D., and Rashidi, M. M., Increasing image compression rate using steganography. Expert Syst. Applic. 40:6918–6927, 2013.CrossRef Jafari, R., Ziou, D., and Rashidi, M. M., Increasing image compression rate using steganography. Expert Syst. Applic. 40:6918–6927, 2013.CrossRef
17.
Zurück zum Zitat Raeiatibanadkooki, M., Quchani, S. R., KhalilZade, M., and Bahaadinbeigy, K., Compression and encryption of ECG signal using wavelet and chaotically Huffman code in telemedicine application. J. Med. Syst. 40:1–8, 2016.CrossRef Raeiatibanadkooki, M., Quchani, S. R., KhalilZade, M., and Bahaadinbeigy, K., Compression and encryption of ECG signal using wavelet and chaotically Huffman code in telemedicine application. J. Med. Syst. 40:1–8, 2016.CrossRef
18.
Zurück zum Zitat Chen, S.-T., Guo, Y.-J., Huang, H.-N., Kung, W.-M., Tseng, K.-K., and Tu, S.-Y., Hiding patients confidential Datainthe ECG signal via transform-domain quantization scheme. J. Med. Syst. 38:1–8, 2014.CrossRef Chen, S.-T., Guo, Y.-J., Huang, H.-N., Kung, W.-M., Tseng, K.-K., and Tu, S.-Y., Hiding patients confidential Datainthe ECG signal via transform-domain quantization scheme. J. Med. Syst. 38:1–8, 2014.CrossRef
19.
Zurück zum Zitat Martínez-Pérez, I., De La Torre-Díez, and López-Coronado, M., “Privacy and security in mobile health apps: a review and recommendations,”. J. Med. Syst. 39:1–8, 2015.CrossRef Martínez-Pérez, I., De La Torre-Díez, and López-Coronado, M., “Privacy and security in mobile health apps: a review and recommendations,”. J. Med. Syst. 39:1–8, 2015.CrossRef
20.
Zurück zum Zitat Muhammad, K., Ahmad, J., Farman, H., and Jan, Z., A new image steganographic technique using pattern based bits shuffling and magic LSB for grayscale images. Sindh Univ. Res. J.-SURJ (Sci. Ser.) 47:723–728, 2016. Muhammad, K., Ahmad, J., Farman, H., and Jan, Z., A new image steganographic technique using pattern based bits shuffling and magic LSB for grayscale images. Sindh Univ. Res. J.-SURJ (Sci. Ser.) 47:723–728, 2016.
21.
Zurück zum Zitat Muhammad, K., Ahmad, J., Rehman, N. U., Jan, Z., and Qureshi, R. J., “A secure cyclic steganographic technique for color images using randomization,”. Tech. J., Univ. Eng. Technol. Taxila 19:57–64, 2015. Muhammad, K., Ahmad, J., Rehman, N. U., Jan, Z., and Qureshi, R. J., “A secure cyclic steganographic technique for color images using randomization,”. Tech. J., Univ. Eng. Technol. Taxila 19:57–64, 2015.
22.
Zurück zum Zitat Al-Otaibi, N. A., and Gutub, A. A., “2-Leyer security system for hiding sensitive text data on personal computers,”. Lect. NoteS Inform. Theory. 2, 2014. Al-Otaibi, N. A., and Gutub, A. A., “2-Leyer security system for hiding sensitive text data on personal computers,”. Lect. NoteS Inform. Theory. 2, 2014.
23.
Zurück zum Zitat Wang, R.-Z., Lin, C.-F., and Lin, J.-C., Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34:671–683, 2001.CrossRef Wang, R.-Z., Lin, C.-F., and Lin, J.-C., Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34:671–683, 2001.CrossRef
24.
Zurück zum Zitat Chang, C.-C., Hsiao, J.-Y., and Chan, C.-S., Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn. 36:1583–1595, 2003.CrossRef Chang, C.-C., Hsiao, J.-Y., and Chan, C.-S., Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn. 36:1583–1595, 2003.CrossRef
25.
Zurück zum Zitat Chan, C.-K., and Cheng, L.-M., Hiding data in images by simple LSB substitution. Pattern Recogn. 37:469–474, 2004.CrossRef Chan, C.-K., and Cheng, L.-M., Hiding data in images by simple LSB substitution. Pattern Recogn. 37:469–474, 2004.CrossRef
26.
Zurück zum Zitat Thien, C.-C., and Lin, J.-C., A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn. 36:2875–2881, 2003.CrossRef Thien, C.-C., and Lin, J.-C., A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn. 36:2875–2881, 2003.CrossRef
27.
Zurück zum Zitat Wu, H.-C., Wu, N.-I., Tsai, C.-S., and Hwang, M.-S., “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,”. IEE Proc.-Vision, Imag. Sign. Process. 152:611–615, 2005.CrossRef Wu, H.-C., Wu, N.-I., Tsai, C.-S., and Hwang, M.-S., “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,”. IEE Proc.-Vision, Imag. Sign. Process. 152:611–615, 2005.CrossRef
28.
Zurück zum Zitat Dumitrescu, S., Wu, X., and Wang, Z., “Detection of LSB steganography via sample pair analysis,”. Sign. Process., IEEE Trans. 51:1995–2007, 2003.CrossRef Dumitrescu, S., Wu, X., and Wang, Z., “Detection of LSB steganography via sample pair analysis,”. Sign. Process., IEEE Trans. 51:1995–2007, 2003.CrossRef
29.
Zurück zum Zitat Parvez, M. T. and Gutub, A.-A., “RGB intensity based variable-bits image steganography,” in Asia-Pacific Services Computing Conference, 2008. APSCC’08. IEEE. 1322-1327, 2008. Parvez, M. T. and Gutub, A.-A., “RGB intensity based variable-bits image steganography,” in Asia-Pacific Services Computing Conference, 2008. APSCC’08. IEEE. 1322-1327, 2008.
30.
Zurück zum Zitat Parvez, M. T., and Gutub, A. A.-A., Vibrant color image steganography using channel differences and secret data distribution. Kuwait J. Sci. Eng. 38:127–142, 2011. Parvez, M. T., and Gutub, A. A.-A., Vibrant color image steganography using channel differences and secret data distribution. Kuwait J. Sci. Eng. 38:127–142, 2011.
31.
Zurück zum Zitat Amirtharajan, R., Behera, S. K., Swarup, M. A., and Rayappan, J. B. B., “Colour guided colour image steganography,” arXiv preprint arXiv:1010.4007, 2010. Amirtharajan, R., Behera, S. K., Swarup, M. A., and Rayappan, J. B. B., “Colour guided colour image steganography,” arXiv preprint arXiv:1010.4007, 2010.
32.
Zurück zum Zitat Swain, G., and Lenka, S. K., A novel approach to RGB channel based image steganography technique. Int. Arab J. e-Technol. 2:181–186, 2012. Swain, G., and Lenka, S. K., A novel approach to RGB channel based image steganography technique. Int. Arab J. e-Technol. 2:181–186, 2012.
33.
Zurück zum Zitat Amirtharajan, R., Archana, P., Rajesh, V., Devipriya, G., and Rayappan, J., “Standard deviation converges for random image steganography,” in Information & Communication Technologies (ICT), 2013 I.E. Conference on. 1064-1069, 2013. Amirtharajan, R., Archana, P., Rajesh, V., Devipriya, G., and Rayappan, J., “Standard deviation converges for random image steganography,” in Information & Communication Technologies (ICT), 2013 I.E. Conference on. 1064-1069, 2013.
34.
Zurück zum Zitat Amirtharajan, R., Mahalakshmi, V., Nandhini, J., Kavitha, R., and Rayappan, J., Key decided cover for random image steganography. Res. J. Inf. Technol. 5:171–180, 2013.CrossRef Amirtharajan, R., Mahalakshmi, V., Nandhini, J., Kavitha, R., and Rayappan, J., Key decided cover for random image steganography. Res. J. Inf. Technol. 5:171–180, 2013.CrossRef
35.
Zurück zum Zitat Chen, W.-J., Chang, C.-C., and Le, T. H. N., High payload steganography mechanism using hybrid edge detector. Expert Syst. Applic. 37:3292–3301, 2010.CrossRef Chen, W.-J., Chang, C.-C., and Le, T. H. N., High payload steganography mechanism using hybrid edge detector. Expert Syst. Applic. 37:3292–3301, 2010.CrossRef
36.
Zurück zum Zitat Grover, N., and Mohapatra, A., “Digital image authentication model based on edge adaptive steganography,” in Advanced Computing, Networking and Security (ADCONS), 2013 2nd International Conference on. 238-242, 2013. Grover, N., and Mohapatra, A., “Digital image authentication model based on edge adaptive steganography,” in Advanced Computing, Networking and Security (ADCONS), 2013 2nd International Conference on. 238-242, 2013.
37.
Zurück zum Zitat Bailey, K., and Curran, K., An evaluation of image based steganography methods. Multimed Tools Applic. 30:55–88, 2006.CrossRef Bailey, K., and Curran, K., An evaluation of image based steganography methods. Multimed Tools Applic. 30:55–88, 2006.CrossRef
38.
Zurück zum Zitat Jassim, F. A., “A novel steganography algorithm for hiding text in image using five modulus method,” Int. J. Comput. Applic. 72, 2013. Jassim, F. A., “A novel steganography algorithm for hiding text in image using five modulus method,” Int. J. Comput. Applic. 72, 2013.
39.
Zurück zum Zitat Karim, M., “A new approach for LSB based image steganography using secret key,” 14th Int. Conf. Comput. Inform. Technol. (ICCIT 2011). 286–291, 2011. Karim, M., “A new approach for LSB based image steganography using secret key,” 14th Int. Conf. Comput. Inform. Technol. (ICCIT 2011). 286–291, 2011.
40.
Zurück zum Zitat Muhammad, K., Ahmad, J., Farman, H., and Zubair, M., A novel image steganographic approach for hiding text in color images using HSI color model. Middle-East J. Sci. Res. 22:647–654, 2014. Muhammad, K., Ahmad, J., Farman, H., and Zubair, M., A novel image steganographic approach for hiding text in color images using HSI color model. Middle-East J. Sci. Res. 22:647–654, 2014.
41.
Zurück zum Zitat Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., and Baik, S., “A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image,” Multimed. Tools Applic. 1–27, 2015/05/24 2015. Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., and Baik, S., “A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image,” Multimed. Tools Applic. 1–27, 2015/05/24 2015.
42.
Zurück zum Zitat Muhammad, K., Ahmad, J., Farman, H., Jan, Z., Sajjad, M., and Baik, S. W., A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Trans. Internet Inform. Syst. (TIIS) 9:1938–1962, 2015. Muhammad, K., Ahmad, J., Farman, H., Jan, Z., Sajjad, M., and Baik, S. W., A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Trans. Internet Inform. Syst. (TIIS) 9:1938–1962, 2015.
43.
Zurück zum Zitat Sajjad, M., Mehmood, I., and Baik, S. W., Image super-resolution using sparse coding over redundant dictionary based on effective image representations. J. Vis. Commun. Image Represent. 26:50–65, 2015.CrossRef Sajjad, M., Mehmood, I., and Baik, S. W., Image super-resolution using sparse coding over redundant dictionary based on effective image representations. J. Vis. Commun. Image Represent. 26:50–65, 2015.CrossRef
44.
Zurück zum Zitat Muhammad, K., Mehmood, I., Lee, M. Y., Ji, S. M., and Baik, S. W., Ontology-based secure retrieval of semantically significant visual contents. J. Korean Instit. Next Gen. Comput. 11:87–96, 2015. Muhammad, K., Mehmood, I., Lee, M. Y., Ji, S. M., and Baik, S. W., Ontology-based secure retrieval of semantically significant visual contents. J. Korean Instit. Next Gen. Comput. 11:87–96, 2015.
46.
Zurück zum Zitat Sheikh, H. R., Sabir, M. F., and Bovik, A. C., “A statistical evaluation of recent full reference image quality assessment algorithms,”. Imag. Process., IEEE Trans. 15:3440–3451, 2006.CrossRef Sheikh, H. R., Sabir, M. F., and Bovik, A. C., “A statistical evaluation of recent full reference image quality assessment algorithms,”. Imag. Process., IEEE Trans. 15:3440–3451, 2006.CrossRef
47.
Zurück zum Zitat Wang, J. Z., Li, J., and Wiederhold, G., “SIMPLIcity: Semantics-sensitive integrated matching for picture libraries,”. Pattern Anal. Mach. Intell., IEEE Trans. 23:947–963, 2001.CrossRef Wang, J. Z., Li, J., and Wiederhold, G., “SIMPLIcity: Semantics-sensitive integrated matching for picture libraries,”. Pattern Anal. Mach. Intell., IEEE Trans. 23:947–963, 2001.CrossRef
48.
Zurück zum Zitat Muhammad, K., Ahmad, J., Sajjad, M., and Zubair, M., “Secure image steganography using cryptography and image transposition,”. NED Univ. J. Res. 12:81–91, 2015. Muhammad, K., Ahmad, J., Sajjad, M., and Zubair, M., “Secure image steganography using cryptography and image transposition,”. NED Univ. J. Res. 12:81–91, 2015.
49.
Zurück zum Zitat Dogan, S., Tuncer, T., Avci, E., and Gulten, A., A new watermarking system based on discrete cosine transform (DCT) in color biometric images. J. Med. Syst. 36:2379–2385, 2012.CrossRefPubMed Dogan, S., Tuncer, T., Avci, E., and Gulten, A., A new watermarking system based on discrete cosine transform (DCT) in color biometric images. J. Med. Syst. 36:2379–2385, 2012.CrossRefPubMed
50.
Zurück zum Zitat Sajjad, M., Ejaz, N., and Baik, S. W., Multi-kernel based adaptive interpolation for image super-resolution. Multimed. Tools Applic. 72:2063–2085, 2014.CrossRef Sajjad, M., Ejaz, N., and Baik, S. W., Multi-kernel based adaptive interpolation for image super-resolution. Multimed. Tools Applic. 72:2063–2085, 2014.CrossRef
51.
Zurück zum Zitat Mstafa, R. J., and Elleithy, K. M., “A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes,”. Multimed. Tools Applic. 1–23, 2015. Mstafa, R. J., and Elleithy, K. M., “A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes,”. Multimed. Tools Applic. 1–23, 2015.
52.
Zurück zum Zitat Ejaz, N., Mehmood, I., and Baik, S. W., Efficient visual attention based framework for extracting key frames from videos. Signal Process. Image Commun. 28:34–44, 2013.CrossRef Ejaz, N., Mehmood, I., and Baik, S. W., Efficient visual attention based framework for extracting key frames from videos. Signal Process. Image Commun. 28:34–44, 2013.CrossRef
53.
54.
Zurück zum Zitat Parah, S. A., Sheikh, J. A., Hafiz, A. M., and Bhat, G., Data hiding in scrambled images: A new double layer security data hiding technique. Comput. Electrical Eng. 40:70–82, 2014.CrossRef Parah, S. A., Sheikh, J. A., Hafiz, A. M., and Bhat, G., Data hiding in scrambled images: A new double layer security data hiding technique. Comput. Electrical Eng. 40:70–82, 2014.CrossRef
55.
Zurück zum Zitat Mehmood, M., Sajjad, and Baik, S. W., Video summarization based tele-endoscopy: A service to efficiently manage visual data generated during wireless capsule endoscopy procedure. J. Med. Syst. 38:1–9, 2014.CrossRef Mehmood, M., Sajjad, and Baik, S. W., Video summarization based tele-endoscopy: A service to efficiently manage visual data generated during wireless capsule endoscopy procedure. J. Med. Syst. 38:1–9, 2014.CrossRef
56.
Zurück zum Zitat Wang, S., Banerjee, B. A., Barth, Y. M., Bhat, S., Chauhan, K. T., and Gottlieb, Wireless capsule endoscopy. Gastrointest. Endosc. 78:805–815, 2013.CrossRefPubMed Wang, S., Banerjee, B. A., Barth, Y. M., Bhat, S., Chauhan, K. T., and Gottlieb, Wireless capsule endoscopy. Gastrointest. Endosc. 78:805–815, 2013.CrossRefPubMed
57.
Zurück zum Zitat De Avila, S. E. F., Lopes, A. P. B., da Luz, A., and de Albuquerque Araújo, A., VSUMM: A mechanism designed to produce static video summaries and a novel evaluation method. Pattern Recogn. Lett. 32:56–68, 2011.CrossRef De Avila, S. E. F., Lopes, A. P. B., da Luz, A., and de Albuquerque Araújo, A., VSUMM: A mechanism designed to produce static video summaries and a novel evaluation method. Pattern Recogn. Lett. 32:56–68, 2011.CrossRef
58.
Zurück zum Zitat Almeida, J., Leite, N. J., and Torres, R. D. S., Vison: Video summarization for online applications. Pattern Recogn. Lett. 33:397–409, 2012.CrossRef Almeida, J., Leite, N. J., and Torres, R. D. S., Vison: Video summarization for online applications. Pattern Recogn. Lett. 33:397–409, 2012.CrossRef
59.
Zurück zum Zitat De Avila, S. E., da Luz, A., de Araujo, A., and Cord, M., “VSUMM: An approach for automatic video summarization and quantitative evaluation,”. Comput. Graph. Imag. Process. 2008. SIBGRAPI’08. XXI Brazilian Sympos. 103–110, 2008. De Avila, S. E., da Luz, A., de Araujo, A., and Cord, M., “VSUMM: An approach for automatic video summarization and quantitative evaluation,”. Comput. Graph. Imag. Process. 2008. SIBGRAPI’08. XXI Brazilian Sympos. 103–110, 2008.
60.
Zurück zum Zitat Almeida, N. J., Leite, A., and Torres, R. D. S., Online video summarization on compressed domain. J. Vis. Commun. Image Represent. 24:729–738, 2013.CrossRef Almeida, N. J., Leite, A., and Torres, R. D. S., Online video summarization on compressed domain. J. Vis. Commun. Image Represent. 24:729–738, 2013.CrossRef
61.
Zurück zum Zitat Lee, H.-G., Choi, M.-K., Shin, B.-S., and Lee, S.-C., Reducing redundancy in wireless capsule endoscopy videos. Comput. Biol. Med. 43:670–682, 2013.CrossRefPubMed Lee, H.-G., Choi, M.-K., Shin, B.-S., and Lee, S.-C., Reducing redundancy in wireless capsule endoscopy videos. Comput. Biol. Med. 43:670–682, 2013.CrossRefPubMed
62.
Zurück zum Zitat Chen, Y., and Lee, J., “A review of machine-vision-based analysis of wireless capsule endoscopy video,”. Diagnos. Therapeut. Endoscopy. 2012, 2012. Chen, Y., and Lee, J., “A review of machine-vision-based analysis of wireless capsule endoscopy video,”. Diagnos. Therapeut. Endoscopy. 2012, 2012.
63.
Zurück zum Zitat Chih-Yang, C.-C., Chang, and Yu-Zheng, W., Reversible steganographic method with high payload for JPEG images. IEICE Trans. Inf. Syst. 91:836–845, 2008. Chih-Yang, C.-C., Chang, and Yu-Zheng, W., Reversible steganographic method with high payload for JPEG images. IEICE Trans. Inf. Syst. 91:836–845, 2008.
64.
Zurück zum Zitat Zhao, H., Wang, H., and Khan, M. K., Statistical analysis of several reversible data hiding algorithms. Multimed. Tools Applic. 52:277–290, 2011.CrossRef Zhao, H., Wang, H., and Khan, M. K., Statistical analysis of several reversible data hiding algorithms. Multimed. Tools Applic. 52:277–290, 2011.CrossRef
65.
Zurück zum Zitat Wu, H., and Wang, H., “Multibit color-mapping steganography using depth-first search,”. Biomet. Sec. Technol. (ISBAST), 2013 Int. Sympos. 224–229, 2013. Wu, H., and Wang, H., “Multibit color-mapping steganography using depth-first search,”. Biomet. Sec. Technol. (ISBAST), 2013 Int. Sympos. 224–229, 2013.
Metadaten
Titel
Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy
verfasst von
Khan Muhammad
Muhammad Sajjad
Sung Wook Baik
Publikationsdatum
01.05.2016
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 5/2016
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-016-0473-x

Weitere Artikel der Ausgabe 5/2016

Journal of Medical Systems 5/2016 Zur Ausgabe