Submit your paper : editorIJETjournal@gmail.com Paper Title : A secure, reversible data hiding and plaintext encryption for medical images ISSN : 2395-1303 Year of Publication : 2021 10.29126/23951303/IJET-V7I4P17 MLA Style: -Dr. S. Hemalatha, Epuru Sai Teja Reddy, Bulagakula Ruthvick, Pulagalla Srinath , " A secure, reversible data hiding and plaintext encryption for medical images " Volume 7 - Issue 4 July - August,2021 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org APA Style: -Dr. S. Hemalatha, Epuru Sai Teja Reddy, Bulagakula Ruthvick, Pulagalla Srinath " A secure, reversible data hiding and plaintext encryption for medical images " Volume 7 - Issue 4 July - August,2021 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org Abstract - In this proposed work, Visual Secret Sharing improves security, and the data is then combined to achieve secure transmission and image quality. The cover image is processed using the DWT and Cuckoo algorithms first. On the other hand, Visual Secret Sharing uses a secret image. The visual secret sharing image is paired with a processed cover image utilising the Jsteg method for data embedding and extraction. Image quality was assessed using performance analysis techniques such as MSE, PSNR, and hiding capacity on various types of colour photographs, and the results were compared. The results show that the suggested approach is adaptive, with low mistakes and a high SNR rate at different data hiding capacities Reference [1] Lukáš Krasula, Miloš Klíma, Eric Rogard, Edouard Jeanblanc “MATLAB-based Applications for Image Processing and Image Quality Assessment – Part I: Software Description” radio engineering, vol. 20, no. 4, December 2011 [2] Zhenghao Shi, Lifeng He, “Current Status and Future Potential of Neural Networks Used for Medical Image Processing,” Journal of Multimedia, Vol. 6, No. 3, June 2011. [3] Hamdan Lateef Jaheel and Zou Beiji, “A novel approach of combining steganography algorithms,” Proceedings of international journal on smart sensing and intelligent systems vol. 8, no. 1, March 2015. [4] Neha Solanki, Sanjay Kumar Malik, Sonam Chhikara, “RONI Medical Image Watermarking using DWT and RSA”, Proceedings of the international journal of computer applications (0975 – 8887) volume 96– no.9, June 2014. [5] Rahul Saxena, Nirupma Tiwari, Manoj Kumar Ramaiya, “Blind digital watermarking using AES technique for color images”, Proceedings of International Journal of Emerging Technologies in Computational and Applied Sciences, 11(1), December-February, 2015, pp. 54-57. [6] Muley Jayant Arun, Dr. S G Kejgir, “New Robust Digital Image Watermarking using DWT, DCT and SVD”, Proceedings of International Journal of Engineering Research & Technology (IJERT)ISSN: 2278-0181, Vol. 3 Issue 7, July – 2014. [7] S. Sivasankari, S. R. Sophiya,” MATLAB Implementation of Invisible Watermarking using LSB and Lifting Wavelet Transform Technique”, Proceedings of the international journal of scientific engineering and technology research, April 2014 vol 3issue 4. [8] E.Sangeetha Devi, “Enhanced Visual Secret Sharing Scheme via Halftoning Technique”, Proceedings of 2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES. doi:10.1109/icccct.2010.5670739 [9] Suchethana H C, “visual cryptography and its challenges”, Proceedings of International Journal of Computer Engineering and Applications, Volume XII, Issue III, March 18, www.ijcea.com ISSN 2321-3469 [10] Stelvio Cimato, Roberto De Prisco and Alfredo De Santis. “Colored visual cryptography without color darkening”. Theoret. Comput. Sci. 374(1–3), 261–276 (2007) [11] Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci, “ Ideal contrast visual cryptography schemes with reversing.” Inf. Process. Lett. 93(4), 199–206 (2005) [12] Roberto De Prisco and Alfredo De Santis, “ Color visual cryptography schemes for black and white secret images.” Theoret. Comput. Sci. 510(28), 62–86 (2013) [13] Roberto De Prisco and Alfredo De Santis, “On the relation of the random grid and deterministic visual cryptography”. IEEE Trans. Inf. Forensics Secure. 9(4), 653– 665 (2014) [14] Chih-Ming Hu and Wen-Guey “Cheating prevention in visual cryptography.” IEEE Trans. Image Process. 16(1), 36– 45 (2007) [15] Gwoboa Horng, Tzungher Chen And Du-Shiau Tsai “Cheating in visual cryptography.” Des. Codes Crypt. 38(2), 219–236 (2006) [16] Kai-Hui Lee and Pei-Ling Chiu.”An extended visual cryptography algorithm for general access structures.” EEE Trans. Inf. Forensics Secure. 7(1), 219–229 (2012) [17] P. Tuyls, H. D. L. Hollmann, J. H. Van Lint, And L. Tolhuizen “XOR-based visual cryptography schemes.” Des. Codes Crypt. 27, 169–186 (2005) [18] Tjokorda Agung B. W, Adiwijaya, and Fri Puguh Permana, "Medical Image Watermarking with Tamper Detection and Recovery Using Reversible Watermarking with LSB Modification and Run Length Encoding (RLE) Compression", in proceedings of 28th Annual International Conference of the IEEE, New York, USA, vol. 30 pp. 3270- 3273, 2010. [19] Chunhua Dong, Jingbing Li, Mengxing Huang, and Yong Bai, "The Watermarking Medical Image Algorithm with Encryption by DCT and Logistic" in proceedings of Ninth Web Information Systems and Applications Conference, vol. 6072, San Jose, CA, pp. 1-13, 2012. [20] Jingbing Li and Yaoli Liu "The Medical Image Watermarking Algorithm Using DWT-DCT and Logistic", in proceedings of IEEE Ninth Web Information Systems and Applications Conference, vol. 30, pp. 119-124, 2012 . [21] G. Prabakaran, Rajeswari P Sand R. Bhavani, "Multi Secure and Robustness for Medical Image Based Steganography Scheme", in proceedings of 2013 IEEE International Conference on Circuits, Power and Computing Technologies, vol. 28, pp. 947-951, 2013. [22] Nisar Ahmed Memon, S.A.M. Gilani, Shams Qayoom, "Multiple Watermarking of Medical Images for Content Authentication and Recovery", in Proceedings of World Academy of Science, Engineering and Technology, vol. 38, pp. 347-350, 2009. [23] Siau-Chuin Liew and Jasni Mohamad Zain, "Reversible Medical Image Watermarking For Tamper Detection and Recovery", Computerized Medical Imaging and Graphics, 2003, vol. 27, pp. l85-196, 2010 Keywords —— DWT, Cuckoo algorithm, image processing, Jsteg method, MSE, PSNR, and hiding capacity |