Design an Implementation of Crypto based Water Marking Techniques for EHR Security

Authors

  • J. Guru Mohish Srivastava
  • R. Sheeja

Abstract

Secured communication in between person to person is more essential in daily life. The information passed in between them is lost as their security levels are less. By using steganography technique, we are going to hide the data from unauthorized user. By using the encryption key, we are going to hide the data and later it decrypts the data by entering the encrypted key. The cryptographic techniques are also used to hide the information and communicate with others. The input data is stored in the form of images, Data stores are used for storing images, so image compression has to be done. In order to use of statistics – hiding key to create a sparse space to accommodate some additional information. Having an encrypted photo contains additional statistics even though they does not understand the photographic content. With the help of encryption key the receiver can decrypt the received information. A photo just like a unique one, but cannot extract the additional information and recover the original contents. When the additional information is not too large then they can use spatial correlation in normal image.

Downloads

Published

2020-02-19

Issue

Section

Articles