Abstract

Medical data (i.e., medical image and medical record) is private which should be protected before being transferred or stored. There have been some methods proposed by implementing various algorithms, such as steganography. It is sometimes combined with the shared secret method, so that, the reconstruction of the original data must be done by some users. It is believed that this method increases the security of the data. However, there is still a need to make the stego data (i.e, stego image) has an as good as possible quality. This means that the stego image has high similarity to the cover (carrier) image. In this paper, we propose methods to protect the medical data by using the shared secret mechanism and steganography for 2 and 1 bit LSB. The experimental results show that they produce relatively good quality (similarity) in terms of PSNR.

Original languageEnglish
Title of host publicationProceeding - 2014 International Conference on Computer, Control, Informatics and Its Applications
Subtitle of host publication"New Challenges and Opportunities in Big Data", IC3INA 2014
EditorsArnida Lailatul Latifah, Rifki Sadikin
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages87-92
Number of pages6
ISBN (Electronic)9781479945757
DOIs
Publication statusPublished - 13 Feb 2014
Event2014 International Conference on Computer, Control, Informatics and Its Applications, IC3INA 2014 - Bandung, Indonesia
Duration: 21 Oct 201423 Oct 2014

Publication series

NameProceeding - 2014 International Conference on Computer, Control, Informatics and Its Applications: "New Challenges and Opportunities in Big Data", IC3INA 2014

Conference

Conference2014 International Conference on Computer, Control, Informatics and Its Applications, IC3INA 2014
Country/TerritoryIndonesia
CityBandung
Period21/10/1423/10/14

Keywords

  • Steganography
  • data protection
  • security
  • shared-secret

Fingerprint

Dive into the research topics of 'Shared secret-based steganography for protecting medical data'. Together they form a unique fingerprint.

Cite this