0% found this document useful (0 votes)
22 views11 pages

07 Padam+Paper

This research presents a hybrid encryption method combining AES and RSA algorithms for securing medical images through steganography techniques. The study demonstrates that the proposed methods achieve higher PSNR and MSE values, improving data imperceptibility and robustness while minimizing image degradation. The findings indicate that the hybrid approach effectively conceals sensitive information in cover images, enhancing data security in medical applications.

Uploaded by

mnjoum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views11 pages

07 Padam+Paper

This research presents a hybrid encryption method combining AES and RSA algorithms for securing medical images through steganography techniques. The study demonstrates that the proposed methods achieve higher PSNR and MSE values, improving data imperceptibility and robustness while minimizing image degradation. The findings indicate that the hybrid approach effectively conceals sensitive information in cover images, enhancing data security in medical applications.

Uploaded by

mnjoum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Padam Kumar Verma et al.

| Acta Energetica 3/46 (2022) | 42–52

Design Simulation and Analysis for Securing Medical


Images Using Hybrid Algorithm

Padam Kumar Verma


M. Tech Scholar, Department of Computer Science, YIT, Jaipur
[email protected]

Abhigya Saxena
Assistant Professor, Department of Computer Science, YIT, Jaipur

Keywords
AES, RSA, PSNR, MSE, Encryption

Abstract
This research is focused to use a hybrid encryption method. This hybrid system uses both the AES and RSA
algorithms. To compare the efficacy of the four proposed algorithms, additional testing was done on both colour
and grayscale photographs with varied text sizes. Our methods produced higher PSNR and MSE values than the
reference data. When comparing 2D-DWT-3L with hybrid (AES and RSA) to other approaches, it was found that
while text encryption increases the security of the text, it decreases the invisibility of the cover picture. To put
it another way, text encryption exacerbates the distortion of the cover image, making it more visible to those
who shouldn't. As a result, when compared to the reference methodology used in this study, our proposed
methods were more effective in concealing hidden information.

Received by the editor: 05.08.2022


Received in revised form: 20.10.2022
Accepted: 10.11.2022

1. INTRODUCTION ➢ Assess the system's ability to protect and


retrieve the original data.
By combining cryptography and steganography
techniques, we want to develop and propose a novel Image processing on digital photos is carried out
hybrid data security technique. Using this system, an through the use of computer algorithms. N rows and
encrypted secret message can be embedded in the M columns make up the 2D continuous image. A
cover image to achieve high invisibility and pixel is the intersection of a row and a column. In
durability, with minimal degradation of the image addition to depth, colour, and time, the image can
that is received. The following were the primary also be a function of these additional variables. First,
aims of this project: the image is digitised and stored in computer
memory as a matrix of binary digits in the form of a
➢ Steganography techniques (LSB and DWT) can
transparency, slide, photograph, or X-ray Digital
be used individually to hide text data in an
images can then be processed and/or shown on a
image.
high-definition TV monitor. At 25 frames per
➢ Develop a hybrid security system that
second, the monitor refreshes its display to maintain
incorporates both data encryption (AES and
a smooth, uninterrupted flow of visual information.
RSA) and steganography (LSB and DWT)
techniques to enhance data imperceptibility, The term "digital image processing" refers to the
robustness, and performance of the stego image. digital processing of an image. While digital images
can be captured by modern cameras, the majority of

http://actaenergetica.org 42
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52

photos are captured optically. Using video cameras, some way. Place encrypted photos in database using
they are recorded and digitalized. Samples and cryptography algorithm that has been proposed.
quantization are part of the digitization process. In If you're looking for an easy way to get your kids to
the next step, these images are subjected to one or eat more fruits and vegetables, this is a good place
more of the five essential procedures. to start. (Aboul Ella Hassanien; Mohamed Elhoseny;
Data storage and transmission have become more Arun Kumar Sangaiah; Khan Muhammad, 2017)
sensitive to information security concerns. Images This century's ICT revolution has seen the rise of
and electronic data sharing have created a huge Cloud Computing (CC) and the Internet of Things.
opportunity for data security and protection of Experts believe that the CloudIoT paradigm can
personal information from unauthorised access. significantly improve healthcare services and
When it comes to data security, encryption is one of contribute to its ongoing and systematic
the most used methods. Encryption technology has improvement if it is adopted in the healthcare field.
advanced greatly in recent years, with a variety of CC and IoT integration in healthcare applications,
encryption methods being employed to protect such as smart hospitals, medicine control, and
images. Using these methods, random encryption remote medical services, is examined in this study.
keys are generated but the content itself is hidden We also cover some basic concepts like cloud
from view. Each algorithm has been created and computing and IoT in the context of health care. In
applied to ensure secure image data transfer. this study, we introduce the CloudIoT-Health
paradigm, a new approach to integrating cloud
computing and Internet of Things (IoT) for
2. LITERATURE SURVEY healthcare applications. Using the name CloudIoT-
Dr. Harsh Vikram Singh and Ms. Pushpanjali Health, this study provides a feasible vision for
Singh1 (2020) Since medical picture data are integrating current components of CC and the IoT in
routinely disseminated via public channels, the healthcare applications. Besides that, this article
security, privacy, and confidentiality of such data is seeks to describe the current state of the art and gap
of paramount importance (internet). With this, analysis of various levels of integration components
remote pre-diagnosis has been made more in CloudIoT-Health systems by assessing various
affordable and accessible in the remotest parts of the existing ideas. Finally, studies on CC and IoT
world, where there are few medical facilities. A high integration for healthcare systems have been
danger of life is associated with tampering with evaluated, together with their relevant study.. An
medical images that are sensitive and private data, extensive bibliography is provided to assist in the
therefore maintaining data integrity, confidentiality, identification of challenges and prospective research
and allowed use while storing, transferring, and avenues.
using medical images is critical. There is an ever- Jain, M.; Choudhary RC; and Kumar A Using a
increasing requirement for the protection of medical decision tree approach, a new method for encrypting
photographs transmitted via the internet. Medical medical information is provided in this article to
information is protected using cryptography, protect patient confidentiality. It is shown that the
steganography, and watermarking. In the previous secret information mapping concept provides a
few years, a number of image security techniques robust mechanism for determining the position of a
have been classified and discussed in this paper. medical carrier image's secret information hiding
Using these tools, researchers can identify research site using decision trees. The RSA technique is
gaps in medical image security and establish new being used to encrypt the patient's unique data. The
avenues for their work. RSA results in a series of blocks that are evenly
Bala Kumari and B.Kiran Bala (2017) The patient dispersed. In steganography, secret cypher blocks
picture report can be stored in a database in order to are assigned to the carrier image for data insertion
provide more protection for the patient's medical via a mapping process that uses breadth-first search.
images as well as privacy for the patient. The report With RSA decryption, the recipient receives the
has a hidden state in another image if it is attempted patient's private medical information, which can
to be viewed by third parties such as medical only be read by the recipient who is authorised to see
workers, relatives, and intruders. The MRI image of it. There are a variety of metrics used to evaluate the
the patient has been steganographically altered in performance of the medical stego and carrier

http://actaenergetica.org 43
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52

images. Algorithms that have already been scanning assaults may be achieved. Color space is
developed are compared to the results. transformed during the printing and scanning
(Yehia, L., Khedr, A., & Darwish, A., 2015) Things process.
will be able to recognise one another and connect to
the internet as part of an emerging technology called 3. OBJECTIVES AND SCOPE
the Internet of Things (IoT). Smart living, smart
housing, healthcare systems, smart manufacturing, By combining a steganography approach with a
environmental monitoring, and smart logistics are hybrid encryption scheme, the goal of this research
is to increase the security of medical data transfer.
just some of the applications that will benefit from
the Internet of Things (IoT). For healthcare ➢ Develop a security system that uses
applications in the IoT, this study integrates, steganography techniques (DWT) to hide text
summarises and examines some of the security data in an image independently.
solutions, particularly hybrid techniques, that can be ➢ Improve the security of stego images by
deployed. developing an integrated security system that
includes both data encryption (AES and RSA)
(Su Wai Phyob., 2015) As electronic data sharing
and steganography (DWT) approaches.
has become more common, the importance of data
storage and transmission security cannot be ➢ Assess the system's ability to protect and
overstated. The lack of security in security retrieve the original data.
awareness applications causes a number of issues. It
is important to remember that images and text are 4. METHODOLOGY
the two most common ways to communicate. It is
An IoT security paradigm for medical data transfer
possible to protect data security using
is proposed in this work. Four continuous processes
steganography and cryptography. In other words,
make up the suggested model:
the goal of this research is to improve the security of
both images and information by combining • RSA and AES encryption methods are
cryptography with steganography approaches. combined in a suggested hybrid encryption
Images are more secure because of the proposed scheme to protect personal patient data.
block-based transformation and encryption • Second, a stego-image is created by utilising
technique, according to cryptography. It is proposed 2D-DWT-2L to hide the encrypted data.
that a block-based transformation technique be used • The embedded data is retrieved in this step.
to improve image encryption robustness. Blowfish • The encrypted data is decoded in order to get
is used to encrypt the resulting image once it has the unencrypted data.
been converted. Using the encrypted image as a An encryption cryptography method is one in which
cover for information security, a steganography messages are encoded such that hackers can't read
approach provides the data-hiding mechanism. them, but only authorised individuals can. The
Combination process (proposed transformation and Advanced Encryption Standard (AES) and the
Blowfish encryption) is shown to be more Rivest-Shamir-Adleman (RSA) algorithm are the
advantageous than single encryption by comparing two primary data encryption methods employed in
the correlation and entropy of encrypted images this study. Symmetric AES employs the usage of the
generated by combination process with the Blowfish same key on both ends. Text (plain or encryption)
technique. and keys of lengths 128,192, or 256 bits are used in
[Wen Zhang, et.al, 2018] The study plan for a fixed message block size of 128 bits. Messages
implementing and discovering the hard to duplicate that are longer than 128 bits are broken up into
and easy to detect watermarking approach. The blocks of 128 bits. Keys that are longer appear to
watermarking procedure was broken down into make the cypher harder to break, but they also make
three stages: printing, scanning, extracting, and the encryption and decryption process longer.
watermarking, according to the authors. However, RSA is a public key method that is widely
Watermarking in digital photographs employs a utilised in both the corporate and personal
technology that makes it impossible to link communication sectors. It features a configurable
watermarking algorithms to printing process factors. key size of (2-2048) bits, which makes it more
The researchers determined that the balance flexible.The frequency domain DWT steganography
between invisibility and resilience against printing techniques implemented in this research are 1-level,

http://actaenergetica.org 44
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52

2-level, and 3-level DWT steganography Proposed System Model


approaches. The image was divided into sections The techniques of steganography and cryptography
with high and low iterations. Low iteration is often are commonly employed to hide the existence of
broken into two parts: high and low. The high information. To make a message understandable,
iteration section comprises edge information. cryptography tamper with it. Steganography, on the
other hand, hides or conceals the message so that it
Proposed Algorithm cannot be read. As it turns out, steganography can be
extremely useful in situations where robust
Algorithm (1): Hybrid (AES & RSA) Algorithm.
encryption is prohibited. Steganography, on the
Inputs: secret plain Stext message. other hand, is able to circumvent these regulations
Output: main_cipher message, key s and transmit a secret message. We're trying to figure
Algorithm-: out how to make a good defence even better. Our job
Throughout the encryption process, the plain text T is to come up with a novel method that is more
is divided into odd part T-ODD and even parts T- difficult to detect or defeat than the current
EVEN. techniques in the domains of cryptanalysis and
steganalysis.
The AES is used to encrypt T-ODD using a secret
public key s. The RSA is used to encrypt T-EVEN • An IoT security paradigm for medical data
using a secret public key m. transfer is proposed in this work. Four
continuous processes make up the suggested
Algorithm (2): Embedding 2D-DWT-2L
model:
Algorithm.
• RSA and AES encryption methods are
Algorithm-: Haar-DWT combined in a suggested hybrid encryption
2D-DWT-3L can be formulated as a consecutive scheme to protect personal patient data.
transformation using low-pass and high-pass filters. • 2D-DWT-2L or 2D-DWT-3L is used to
Proposed System Advantages conceal the encrypted data in a cover image,
➢ Steganography has the advantage of allowing resulting in a stego-image.
the transfer of sensitive information without • The embedded data is retrieved in this step.
detection. • The original data can be retrieved by
➢ It is safe, secure, and protected data transfer. decrypting the extracted data. On both the
➢ AES is more rapid. source and destination sides, we propose a
➢ It is more difficult to break an AES key than a paradigm for protecting medical data transfer.
DES key since AES keys can be up to 128,192 Images are used as a means of concealing data in the
or 259 bits long. suggested strategy (color and grayscale). The
➢ Wavelet transforms an image into one with the communication is practically undetected unless the
encrypted text encoded in the LL subband. intended recipient goes through the proper measures
➢ It was found that the proposed model was able to reveal its existence. An important characteristic of
to disguise the sensitive patient's data into a information can be hidden in the proposed
transmitted cover image with high technique, making it distinct from other data hiding
imperceptibility, capacity, and low mechanisms.
degradation in the received stego-image, as These diagrams (4.1 and 4.2) show the general
compared to current approaches. framework of the suggested systems for hiding
confidential data. These diagrams show the essential
stages that are done by both the sender and the
receiver.

http://actaenergetica.org 45
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52

Figure 4.1 Proposed Framework for Hiding Information using Steganography Technologies Only

Figure 4.2 Proposed Framework for Hiding Information using both Steganography and Hybrid
Encryption Algorithms
5. SIMULATION interfaces, and integrating with other programmes
written in C, C++, Java, and Fortran.
Numerical computation is made easier by
MATLAB, a programming language developed by There are many ways to document and share your
the MIT Media Lab for the fourth generation. work with MATLAB. MATLAB code can be
MATLAB, created by Math Works, is a powerful integrated into other languages and applications, and
tool for manipulating matrices, graphing functions MATLAB techniques and applications can be
and data, implementing algorithms, creating user distributed. The following are the simulation steps:

Figure 5.1 Select Text File to Hide

http://actaenergetica.org 46
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52

Figure 5.2 Plain Text to Cipher Text

Figure 5.3 Input Colour Image Figure 5.4 Input Gray Image

Figure 5.5 1-Level Decomposed Cover Image Figure 5.6 2-Level Decomposed Cover Image

Figure 5.7 3-Level Decomposed Cover Image Figure 5.8 3-Level Embedded Image

http://actaenergetica.org 47
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52

Figure 5.9 Embedded Cover Image

Figure 5.10 Extraction of Text into Readable Text


Figures 5.1 to 5.9 show the suggested research's RAM, and Windows 10 as the operating system was
implementation procedure step by step. A PC with a used to implement our proposed concept.
2.27GHz Intel (R) Core (TM) I3 processor, 8GB of

Figure 5.11 Histogram Analysis of Proposed System for Colour Images

http://actaenergetica.org 48
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52

Figure 5.12 Histogram Analysis of Proposed System for Grey Scale Image

Table 5.1 Based on the eight statistical parameters


Comparative Analysis of Parameter investigated, this is the conclusion (PSNR, MSE,
SSIM, and Correlation). All other parameters were
MODEL PSNR MSE unable to differentiate between the various
approaches; only PSNR and MSE did so. The
Existing Work 56.76 0.1338
proposed strategies had no substantial impact on the
Proposed Model 58.02 0.1188 other statistical factors, and this was confirmed by
the results. Increased text size improved PSNR
On a medical colour image of 256x256 pixels, we values in all of the examined colour images except
compared our model to an existing approach for the pepper image. If there is a lot of fluctuation
produced by previous researchers [1,2,5]. Table 5.3 in colour in a cover image, the stego image will
compares our model's PSNR and MSE results with appear less close to the original image as the font
those obtained by [1,2,5]. Color medical photos with size increases. However, increasing the size of the
text size 18 bytes were used to test the models. Our lettering reduces PSNR values when the number of
proposed model was shown to have a higher PSNR colours is limited, as in the pepper image.
value and a smaller MSE value, which demonstrates
The grayscale images showed the reverse tendency,
its superior performance.
with PSNR values decreasing as the word size
increased. Increasing the font size reduced the MSE
6. CONCLUSION AND FUTURE SCOPE for all but the pepper image, which is also linked to
the cover image's number of colour variations, with
Conclusion
the lesser number of colour variations leading to a
Increased ability for embedding, security, lower MSE result. However, there was no consistent
flexibility, and invisibility are the most significant pattern in the MSE values for grayscale images, with
benefits of this effort. A hybrid encryption technique the values varying greatly from image to image. If
was also employed in this study. AES and RSA the histogram of pixel values in each image is not
algorithms are combined in this hybrid system. distributed equally over the grayscale, this could be
Steganography techniques (LSB and 2D-DWT-3L) explained. Further testing was done on both colour
combined with encryption algorithms (AES and and grayscale photos with varying text sizes to
RSA) proved to be more effective when applied to compare the performance of the four proposed
colour and grayscale images with varying text size. techniques. The PSNR and MSE values achieved by

http://actaenergetica.org 49
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52

our methods were greater than those found in the [5]. Bairagi, A. K., Khondoker, R., & Islam, R. (2016).
reference data. But while text encryption increases An efficient steganographic approach for
the security of the text, it reduces the invisibility of protecting communication in the Internet of
Things (IoT) critical infrastructures. Information
the cover image, which was observed when
Security Journal: A Global Perspective, 25(4-6),
comparing 2D-DWT-3L with hybrid (AES and
197-212.
RSA) to other techniques. To put it another way, text [6]. Anwar, A. S., Ghany, K. K. A., & Mahdy, H. E.
encryption exacerbates the distortion of the cover (2015).Improving the security of images
image, making it more obvious to people who transmission. International Journal of Bio-Medical
shouldn't see it. As a result, when compared to the Informatics and e-Health, 3(4).
reference methodologies employed in this [7]. Ahmed Abdelaziza, Mohamed Elhoseny, Ahmed
investigation, our proposed approaches performed S. Salama, A.M. Riad,”A Machine Learning
better at concealing secret data. Model for Improving Healthcare services on
Cloud Computing Environment”, Measurement,
Volume 119, April 2018, Pages 117-128, 2018
Future Work (https://doi.org/10.1016/j.measurement.2018.01.0
22)
We can improve information security procedures in
[8]. Paschou, M., Sakkopoulos, E., Sourla, E., &
the future and provide a channel for safe data
Tsakalidis, A. (2013). Health Internet of Things:
transmission. It is possible to extend this work to Metrics and methods for efficient data transfer.
operate with other types of data files, such as video Simulation Modelling Practice and Theory, 34,
and audio. Each Arabic text in the cover media may 186-199.
be used to construct a powerful strategy for hiding [9]. Muhammad Sajjad, Mansoor Nasir, Khan
Arabic text in the cover media. The larger the Muhammad, Siraj Khan, Zahoor Jan, Arun Kumar
implementation, the more likely it is that we'll be Sangaiah, Mohamed Elhoseny, Sung Wook Baik,
able to mimic numerous parties exchanging "Raspberry Pi assisted face recognition framework
for enhanced law-enforcement services in smart
messages (normal and covert communication). A
cities", Future Generation Computer Systems,
quantum steganography system that cannot be
Elsevier, 2018 (DOI:
duplicated will be introduced to strengthen the https://doi.org/10.1016/j.future.2017.11.013)
currently used approach of quantum steganography, [10]. Kumar, P., & Lee, H. J. (2011). Security issues in
making it stronger than conventional steganography. healthcare applications using wireless medical
sensor networks: A survey. Sensors, 12(1), 55-91.
[11]. Razzaq, M. A., Sheikh, R. A., Baig, A., & Ahmad,
REFERENCES A. (2017). Digital image security: Fusion of
[1]. Ms. Pushpanjali Singh1 and Dr. Harsh Vikram encryption, steganography and watermarking.
Singh, “Analysis of Data Security for Medical International Journal of Advanced Computer
Images”, Journal of Critical Reviews ISSN- 2394- Science and Applications (IJACSA), 8(5).
5125 VOL 7, ISSUE 19, 2020. [12]. Dey, N., & Santhi, V. (Eds.). (2017). Intelligent
[2]. Bala B. K, Kumar A. B. “The Combination of Techniques in Signal Processing for Multimedia
Steganography and Cryptography for Medical Security. Springer International Publishing.
Image Applications”, Biomed Pharmacol J [13]. Jain, M., Choudhary, R. C., & Kumar, A. (2016).
2017;10 (4). Secure medical image steganography with RSA
[3]. Ashraf Darwish, Aboul Ella Hassanien, cryptography using decision tree. In
MohamedElhoseny, Arun Kumar Sangaiah, Khan Contemporary Computing and Informatics (IC3I),
Muhammad, The Impact of the Hybrid Platform of 2016 2nd International Conference on (pp. 291-
Internet of Things and Cloud Computing on 295). IEEE.
Healthcare Systems: Opportunities, Challenges, [14]. Yehia, L., Khedr, A., & Darwish, A. (2015).
and Open Problems, Journal of Ambient Hybrid security techniques for Internet of Things
Intelligence and Humanized Computing, 2017 healthcare applications. Advances in Internet of
(https://doi.org/10.1007/s12652-017-0659-1) Things, 5(03), 21.
[4]. Abdulaziz Shehab, Mohamed Elhoseny, Khan [15]. Zaw, Z. M., & Phyo, S. W. (2015). Security
Muhammad,Arun Kumar Sangaiah, Po Yang, Enhancement System Based on the Integration of
Haojun Huang, Guolin Hou;Secure and Robust Cryptography and Steganography. International
Fragile Watermarking Scheme for Medical Journal of Computer (IJC), 19(1), 26-39.
Images, IEEE Access, Volume: PP, Issue: 99, [16]. Gupta, R. K., & Singh, P. (2013). A new way to
(DOI: 10.1109/ACCESS.2018.2799240). design and implementation of hybrid crypto
system for security of the information in public

http://actaenergetica.org 50
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52

network. International Journal of Emerging [28]. Khalil, M. I. (2017). Medical Image


Technology and Advanced Engineering, 3(8), Steganography :Study of Medical Image Quality
108- 115. Degradation when Embedding Data in the
[17]. Laskar, S. A., & Hemachandran, K. (2012). High Frequency Domain. International Journal of
Capacity data hiding using LSB Steganography Computer Network and Information Security,
and Encryption. International Journal of Database 9(2),
Management Systems, 4(6), 57. [29]. Abdel-Nabi, H., & Al-Haj, A. (2017). Efficient
[18]. Yu, L., Wang, Z., & Wang, W. (2012). The joint encryption and data hiding algorithm for
application of hybrid encryption algorithm in medical images security. In Information and
software security. In Computational Intelligence Communication Systems (ICICS), 2017 8th
and Communication Networks (CICN), 2012 International Conference on (pp. 147-152). IEEE.
Fourth International Conference on (pp. 762- 765). [30]. Li, L., Hossain, M. S., El-Latif, A. A. A., &
IEEE. Alhamid, M. F. (2017). Distortion less secret
[19]. Mare, S. F., Vladutiu, M., & Prodan, L. (2011). image sharing scheme for Internet of Things
Secret data communication system using system. Cluster Computing, 1-15.
Steganography, AES and RSA. In Design and [31]. Sajjad, M., Muhammad, K., Baik, S. W., Rho, S.,
Technology in Electronic Packaging (SIITME), Jan, Z., Yeo, S. S., & Mehmood, I. (2017). Mobile-
2011 IEEE 17th International Symposium for (pp. cloud assisted framework for selective encryption
339-344). IEEE. of medical images with steganography for
[20]. Mandal, A. K., Parakash, C., & Tiwari, A. (2012). resource-constrained devices. Multimedia Tools
Performance evaluation of cryptographic and Applications, 76(3), 3519-3536.
algorithms: DES and AES. In Electrical, [32]. Parah, S. A., Sheikh, J. A., Ahad, F., & Bhat, G.
Electronics and Computer Science (SCEECS), M. (2018). High Capacity and Secure Electronic
2012 IEEE Students' Conference on (pp. 1-5). Patient Record (EPR) Embedding in Color Images
IEEE. for IoT Driven Healthcare Systems. In Internet of
[21]. Mjolsnes, Stig F. (Eds.). (2011). A Things and Big Data Analytics Toward Next-
Multidisciplinary Introduction to Information Generation Intelligence (pp. 409-437). Springer,
Security. CRC Press. Cham.
[22]. Rivest, R. L., Shamir, A., & Adleman, L. (1978). [33]. Mourad Talbi and Med Salim Bouhlel,
A method for obtaining digital signatures and “Application of a Lightweight Encryption
public-key cryptosystems. Communications of the Algorithm to a Quantized Speech Image for
ACM, 21(2), 120-126. Secure IoT”, Preprints.org; 2018. DOI:
[23]. Sreekutty, M. S., & Baiju, P. S. (2017). Security 10.20944/preprints201802.0096.v1.
enhancement in image steganography for medical
[34]. Wen Zhang, Jie Men, Conglong Ma, “Research
integrity verification system. In Circuit, Power and
progress of applying digital watermarking
Computing Technologies (ICCPCT), 2017
technology for printing,” 2018, IEEE
International Conference on (pp. 1-5). IEEE.
[24]. Bashir, A., Hasan, A. S. B., & Almangush, H. [35]. David-Octavio Muñoz-Ramirez ,
(2012). A new image encryption approach using VolodymyrPonomaryo , Rogelio Reyes-Reyes ,
the integration of a shifting technique and the AES VolodymyrKyrychenko , OleksandrPechenin,
algorithm. International Journal of Computers and Alexander Totsky , “A Robust Watermarking
Applications, 42(9). Scheme to JPEG Compression for Embedding a
[25]. Muhammad, K., Ahmad, J., Farman, H., Jan, Z., Color Watermark into Digital Images,” 2018,
Sajjad, M., & Baik, S. W. (2015). A Secure IEEE
Method for Color Image Steganography using [36]. AnirbanPatra, ArijitSaha, Ajoy Kumar
Gray-Level Modification and Multi-level Chakraborty, Kallol Bhattacharya, “A New
Encryption. TIIS, 9(5), 1938-1962. Approach to Invisible Water Marking of Color
[26]. Yin, J. H. J., Fen, G. M., Mughal, F., & Images using Alpha Blending,” 2018, IEEE
Iranmanesh, V. (2015). Internet of Things: [37]. Irshad Ahmad Ansari, Chang WookAhn and
Securing Data using Image Steganography. In Millie Pant, “On the Security of “Block-based
Artificial Intelligence, Modelling and Simulation SVD image watermarking in spatial and transform
(AIMS), 2015 3rd International Conference on domains”, 2018, IEEE
(pp. 310-314). IEEE. [38]. Alexander S. Komarov, “Adaptive Probability
[27]. Seyyedi, S. A., Sadau, V., & Ivanov, N. (2016). A Thresholding in Automated Ice and Open Water
Secure Steganography Method Based on Integer Detection From RADARSAT-2 Images,” 2018,
Lifting Wavelet Transform. IJ Network Security, IEEE
18(1), 124-132.

http://actaenergetica.org 51
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52

[39]. Aoshuang Dong, RuiZeng, “Research and


Implementation Based on Three-dimensional
Model Watermarking Algorithm,” 2017, IEEE
[40]. EnjianBai, Yiyu Yang and Xueqin Jiang, “Image
Digital Watermarking Based on a Novel Clock-
controlled Generator,” 2017, IEEE
[41]. Oleg Evsutin, Roman Meshcheryakov,Viktor
Genrikh, Denis Nekrasov and Nikolai Yugov, “An
Improved Algorithm of Digital Watermarking
Based on Wavelet Transform Using Learning
Automata,” 2017, IEEE
[42]. Ritu Gill and Rishi Soni, “Digital Image
Watermarking using 2-DCT and 2- DWT in Gray
Images,” 2017, IEEE.
[43]. S.K.A., “A New Palm Print Recognition Approach
by Using PCA & Gabor Filter”, International
Journal on Future Revolution in Computer
Science & Communication Engineering, Vol-4,
Issue-4 (2018), 38–45.
[44]. Alaria, S. K. . Analysis of WAF and Its
Contribution to Improve Security of Various Web
Applications: Benefits,
Challenges. ijfrcsce 2019, 5, 01-03.
[45]. Rajput, B. S. .; Gangele, A. .; Alaria, S. K. .
Numerical Simulation and Assessment of Meta
Heuristic Optimization Based Multi Objective
Dynamic Job Shop Scheduling
System. ijfrcsce 2022, 8, 92-98.
[46]. Satish Kumar Alaria. Secure Algorithm for File
Sharing Using Clustering Technique of K-Means
Clustering. IJRITCC 2016, 4, 35-39.
[47]. Satish Kumar Alaria and Abha Jadaun.
“Design and Performance Assessment of Light
Weight Data Security System for Secure Data
Transmission in IoT”, Journal of Network
Security, 2021, Vol-9, Issue-1, PP: 29-41.

http://actaenergetica.org 52

You might also like