Page 25 - Handbook of Deep Learning in Biomedical Engineering Techniques and Applications
P. 25

Chapter 1 Congruence of deep learning in biomedical engineering  13




               in a methodology that cannot be comprehended. Steganography
               is used for many purposes: the secure correspondence of private
               data, insight into organizations, significant data implanted in a
               photo on an identity card by own copyright control of provisions,
               clinical imaging where a patient’s data are inserted in a picture.
               The contrast between these two strategies is that cryptography
               keeps the message content concealed, whereas steganography
               has the resource of a shrouded message.


               3.2.1 Resolution of steganography
                  Steganography is secret correspondence that conceals a
               reminder in another entity, which is entirely unexpected from
               another strategy, for example, cryptography, the capacity to
               shroud text. This makes a message incomprehensible by a third
               party; however, it does not conceal the endurance of the con-
               cealed message.

               3.2.2 Types of steganography
                  In view of transporter media there are different kinds of steg-
               anography, for example, steganography in pictures, steganogra-
               phy in sounds, and steganography in videos.

               3.2.3 Image steganography
                  In this procedure a picture is taken as the spread article. Either
               text or a picture can be concealed in another picture. In this
               system, pixel sums are different to conceal the information.

               3.2.4 Image steganography method
                  There are two sorts of technique: spatial domain and trans-
               form domain steganography.


               3.3 Steganography techniques
               3.3.1 Spatial domain technique
                  In the spatial domain steganography method, the data are
               legitimately embedded or covered up. In this, the most conjoint
               and unassertive steganography strategy is the least significant
               bit (LSB). In the LSB technique the top-secret messages are
               inserted in the lower critical piece before installing the pixel,
               which is adjusted by data.


               3.3.1.1 Least significant bit technique
                  This substitution is a general and simple strategy for installing
               secret information in the spread picture.
   20   21   22   23   24   25   26   27   28   29   30