# Introduction teganography word coming from the Greek for masking and essentially means "to hide in plain sight". Easy steganographic methods was used for hundreds of years, but with the increasing use of files in an electronic format new approach es for message inscription two technology used to ensure information confidentiality. The major difference between the two is that with inscription anybody can see that both parties are sharing in undercover. Steganography hides the older of undercover message and in the best case nobody can see that two technology parties are sharing in undercover. This concept makes steganography proper match for some concept for which inscription isn't, like us copyright marking. Extra incrusted message of a file could easily to delete but hiding it within the file itself can prevent it being easily identified and removed. This paper checks some resent examples of steganography and the general rules behind its usage. This suggested system will discussion of some specific approaches for hiding information in a different of files and the attacks that detecting to steganography. Same time, such process also poses specific challenges to their new idea and design process. A key is often necessary in the embedding system. This key in the format of a public or secret key so you can encode the undercover message with your public key and the recipient can decode it applying your personal key. In hiding the message this way, you can reduce the chance of a new other party attacker tacking hold of the stego image and extracting it to find out the undercover message. In general the hiding process defuse a mark, M, in an object, I. A key is mansion in the letter K, usually prepare by a random number process is used in the hiding process and the resulting marked object, ?, is created by the mapping: I x K x M ? ?. They are passed through the encoder; a stego message will be produced. A message is the real masked object with the undercover message embedded inside of the image. This process should look nearly mentioned to the mask object as otherwise a new user attacker can see hiding message. Having produced the message, then it will be send through some networking channel, such as message, to the intended recipient for decoding. The received message must decode the message in order to find the undercover message. The decoding system is the reverse system of the encoding process. It is the taken of undercover message from a image. be used for decode the original message that is used inside the encoding process is also necessary so that the undercover message can be decoded. Depending on the encoding process, sometimes the original masked object is also needed in the decoding process. Otherwise, there may be no way of decoding the undercover message from the image. finaly the extracting process is finished, the undercover message hiding in the image can then be decoding and viewed. The generic extracting process again requires a public or personal key, K, this time along with a potentially marked object, ?'. Also required is either the mark, M, which is being checked for or the real object, I, and the result will be either the extracting mark from the object or indication of the likelihood of M being present in ?'. Different types of making systems use different inputs image and outputs image. In particular, squired is crucial to telehealth message due to the fact that medical services may be critical to patients' health or even life. In this paper, we process two safety measure problems in telehealth process in the context of a medical-health portal system. First, a single trust problem came due to the low of visual proofs in telehealth process. For example, a patient may have doubts in the identity of a doctor at the other end of a telehealth service provided via the Internet. The public and personal key (PPC) can enable a patient in establishing real in the organization's website or telehealth process, which is the very famous of PPC by design. However, PPC is sufficient for giving the same kind of real a patient may attain during a faceto-face identification process. Second, telehealth services, such as tele-measurement, usually in a difficult process that normally demands a systematic process of many users playing different roles in finding exchange assets and flows of message. Digital Image processing is the fast improved area of medical science. The development of image processing was given by the process development like digital visualizing, computer processor and large storage devices. The image itself has an addition image that is mentioned as region of interest which is used to identify the message in the image. Many fields like medicine, sensing, cinema, safety measure monitoring, photography and automatic sensing which are applying the any type of imaging are changing over to digital image because of its conciliatory and significant cost. There is no need of human being to audit the process of deciding which done by the computer. There are other than two levels of image processing rules. At the low level it message of pixel value, for edge detection and de-noising. With these low level results it proceeds from the middle level for resent process like segmentation. And at the next level, it utilizes some methods to extract the useful message for face detection. # II. Literature Survey a) Relative Honesty of digital medical image without lossless watermarking DVENTS of multimedia combined with message and communication technology increasing the potential of medical message handling and exchange with applications ranging from telediagnosis to telesurgery and cooperative operating session. At the similar time, these benefits introduce concomitant difficult for exchange electronic patient records and call for more secure message management. Really devoted to medical document Digital Rights operation [1], watermarking has also advance properties that fixed in to the healthcare domain, although the interests at stake are different [1][2] [3]. Watermarking is the insertion of a message, also called content or watermark message, in a host document in some multimedia format. It is required that the watermark message remains hidden to any unwanted user (as for information encoding, a personal key is necessary to access the watermark content). Two main purposed of watermarking are foreseen in the medical domain [1]: information hiding for the purpose of applying meta-information to render the image many usable and message safety with application like honesty control. Despites its attentive, medical watermarking methods may encounter limitations in medical image. The added watermark message quickly alters the original image in an irreversible manner and may mask subtle details. Consequently, suggested problem finding try to preserve the image diagnosis quality value deleting critical message loss. In this paper, we focused to update watermarking image and its role through a difficult process of recent watermarking process in healthcare. In today's medical world, many process has got digital around us. Even in medical application the older diagnosis is exchange by e-diagnosis [2] [1]. Nowadays, transpose of digitized medical message has become very simple due to the availability and generality of network communication. However the digital form of these images can easily be measure and degraded. The problem of copyright safety and medical safety measure poses a big problem to privacy safety applying watermarking approaches. This paper presents a hole work on digital watermarking as an effective technology to protect property correct and decreasing the distribution of medical information [2] [1]. In this exiting paper a CT scan of head is taken as original image in which the patient's message and doctor's message together taken as a watermark and incrusted by coding approach called EBCDIC coding approach to enhance the robustness of suggested method. The scheme is blind so that the Electronic patient record can be taken from the medical image without the need of original image. In exiting method is useful for telemedicine applications. The performance of different approaches is calculating by considering the correlation factor for exact recovery of watermark and PSNR for perfect reconstruction of watermarked image. High value of PSNR indicates quality reconstruction of output medical image. # b) Related process of Existing system Message hiding embeds the information in a masked text. It is also known as message hiding. Information hiding approaches consists of cryptography, steganography and watermarking. To provide information honesty, confidentiality and authentication these process are used [2]. Cryptography is the study of message safety measure [4].It changes the plain text or a word in to cipher text in a form of a code. Steganography is the art of hiding the message in other message. For hiding the undercover message several steganographic approaches are accessible. Watermarking has more leverage than steganography. It makes the message imperceptible and more robust. Watermarking in medical image is used for storage, transposal and telediagonsis [3][12]. Watermark embeds the confidential information in the text, image, audio and video. Watermark is the visible image imprinted on the paper and added digitally to the image. It may be company logo, name of the person or copyright symbol. It ensures copyright protection [8] [20]. Watermark is visible only for the owner and the people who know the key message [21][22]. Comparing to analog format digital image are more secure [16]17].One of the most important approaches in watermarking is digital image watermarking. Digital image embeds and transfers the information in to host image. In other words digital watermarking can be viewed as message hiding or steganography [3][23]. Woo et al [13] introduced wavelet convert for medical image. It consists of physician signature and the message of the patient. This message is diffused into wavelet convert. kobayashi et al [14] upgrade the safety measure of medical image. With the honesty and authenticity stronger link is provided between image and message. Digital Image And Communication In Medicine image are used for development is an added advantage. Kannamal et al [18] exiting medical image with the fragile watermarking rules. Selective bit plane is used and the performance is analyzed. The rule is differentiated with DWT and ICA (Independent component Analysis) methods. With the limited scope Zain et al [9] suggested reversible watermarking approaches. Zhou et al [11] presents a method for encrypting digital signatures. This method has better authentication and honesty. Coatrieux et al [7] suggested watermarking rule for medical image. In most of the papers embedded message is in the non-ROI region. Eggers et al [6] suggested the symmetric methods with the combination of public detectors. In this approach the watermark is removed simultaneously or it made as unreadable. The secret keys ensure the safety measure. Hartung and Girod [15] suggested the asymmetric watermark with the spread spectrum of watermarking. Secret Key is used for watermark embedded process. Watermark is verified applying public key and the redundancy made with the secret key.With the Legendre sequences the method is suggested by schyndel et al [5]. Legendre sequences combines with the Fourier convert. Legendre sequences are used as a secret key to embed the watermark image. The sequence length is made as a public key. This method has N-2 Legendre sequences. Some malicious attacks are preferred in this approach. The integer wavelet convert is used with medical image for information hiding [24].The disadvantage of this fact is it is match only for gray scale image not for color image. Our suggested system overcomes this problem. Mohamed et al [1] suggested that Patient id, hash value and the compression process are concatenated to form a watermark and it is incrusted applying AES inscription approach. The Same key is used for both inscription and decoding. So it is less secure. In the suggested system the watermarked image is incrusted applying public key cryptography and Riyest,Shamir And Adleman rules to enhance the safety measure during transposal.Riyest,Shamir And Adleman rule are one of the widely used public key rules. In Riyest,Shamir And Adleman rule the image is incrusted applying acceptor public key and decoded applying the secret key. The public key is known to everyone and the secret key is kept undercover. To protect medical image LSB watermarking methods are used for inscription [25].Due to LSB the hidden message is identified easily. # III. proposed system a) Digital Watermarking Image Processes This suggested groundwork for finding the image pattern choosing a given image applying an interpolator that is trained in advance with training information, based on Regular and single vector approach for determining the optimal and compact support for valuable image expansion. Experiments on test information show that learned interpolators are compact yet superior to classical ones. To derived an valuable learning procedure for its parameters on the basis of variation approximation. When plenty of computational assets is accessible, or when the observation process is too severe to recover by mere linear filtering, the complicated image expansion methods will be preferred. In this method, at first we find out the interpolator of the given image. Then replace the low resolution pixel by the interpolator (high resolution Year 2015 # Global Journal of C omp uter S cience and T echnology Volume XV Issue IV Version I ( ) H pixel).After expanding the image does not scattered. We aim to resolve the tradeoff between high quality and low cost. The process involved in PPC approach consists of the coming steps. i. In the PPC approach, all users have the key pair of public key and personal key. ii. The two users, one is transmitter and another one is the acceptor. Transmitter provides the copy of the public key to acceptor. iii. Acceptor's trust the handler's public key and use it to encrypt the information in the medical image hiding message. iv. Acceptor sends incrusted information hidden medical image to handler. v. Handler decrypts the message in the hidden copy of medical image. Secret Key is used. # b) Digital imaging and communication in medicine image and Regular and single vector Compression Watermark is embedded with the use of public key. For the safety measure purpose, in this module the Riyest,Shamir And Adleman rule is used. Riyest,Shamir And Adleman is one of the widely used Public key rules. In RIYEST,Shamir And Adleman rule the image is incrusted applying public key. Digital Imaging and Communications in Medicine is the univeriyest,shamir and adlemanl standard communication for secured medical image. Digital image are obtained from x-ray, digital radiography, ultrasound and the hospital message # c) Building Hash value of an digital Image Hash value mainly used for message honesty and password validity. Hash value of the image is regulated applying SHA hash function.SHA produces image honesty and patient authentication more advanced than MD5.The SHA hash value, patient id and the compressed Regular and single vector are concatenated to form watermark and it is incrusted applying Riyest,Shamir And Adleman rule be justified, not ragged. The R-S-Vector consists of a stream of bits (zeros and ones). Symbols 4 and 8 are used in the compression process. Each association of pixels has a single value: 1 for R (Regular association), 0 for S (Singular association) and -1 for U (Unused association).It provides sufficient space for hiding the watermark. The compression process depends on the symbols. For compressing the Regular and single vector it must have lossless compression. Then it must contain binate information and random information. The range of hiding the watermark can be findingd by applying R. [18]. R=S R +S S -|R|(1) Where S R is the sum of regular association in the image and S S is the sum of singular association in the image. |R| is the length of the Regular and single vector. The main aim is to maximize the hiding capacity with the |R| of compressed Regular and single vector. -S R (S R/ S R+ S s )-S S log(S s /S R+ S S )bi ts From equation ( 1) and ( 2) the real range values(R ' ) can be findingd according to [19]. R ' =S R+ S S+ S R log(S R/ S R+ S S )+S S xlog(S S/ S R +S S )(3) Two middle pixels of the association(N R +N S ) increase the value. These are the unique association belong to LSB of both association. # d) Hiding Process In the hiding process the watermark is deffused into medical image. The watermark message is incrusted applying Riyest, Shamir And Adleman rules to enhance the safety measure during transposal. In Riyest, Shamir and Adleman rule the image is incrusted applying acceptor public key and decrypt the incrusted message applying the acceptor secret key. The public key is made accessible to everyone and the secret key is the undercover key remains confidential. Riyest, Shamir And Adleman rule protects the watermarked image from tampering and eventually applies compression to reduce the size of incrusted watermarked image. Fig 2 shows the watermark hiding process. Then the watermark image is incrusted. The watermark hiding consists of coming steps. i. The image is partitioned into association. Each association has four pixels with a single value. The state of the association is identified for Regular and single vector. ii. Regulate and compress the Regular and single vector. iii. Finding the SHA value of the image. Add the SHA value to the compressed Regular and single vector and patient id to form a watermark. iv. Encrypt the watermark applying public key. v. In hiding process the rule achieves image honesty and authentication. # Inscription Applying Riyest, Shamir and Adleman The watermark message is incrusted applying Riyest, Shamir And Adleman rules to enhance the safety measure during transposal. In Riyest, Shamir And Adleman rule the image is incrusted applying acceptor public key and decrypt the incrusted message applying the acceptor secret key. The public key is made accessible to everyone and the secret key is the undercover key remains confidential.Riyest, Shamir And Adleman rule protects the watermarked image from tampering and eventually applies compression to reduce the size of incrusted watermarked image. The process consists of the coming steps. In Riyest, Shamir And Adleman rule the key is generated as follows. Random prime numbers are selected such as a and b. i. Check a!=b ii. Evaluate Modulus n=axb iii. Evaluate z=(a-1)x(b-1) iv. Select public exponent e,1