Steganography-Based Transmission of Medical Images Over Unsecure Network for Telemedicine Applications
Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is called image steganography. In image steganography, the major features are the cover object quality and hiding data capacity. Due to poor image q...
Saved in:
Published in | Computers, materials & continua Vol. 68; no. 3; pp. 4069 - 4085 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Henderson
Tech Science Press
2021
|
Subjects | |
Online Access | Get full text |
ISSN | 1546-2226 1546-2218 1546-2226 |
DOI | 10.32604/cmc.2021.017064 |
Cover
Loading…
Abstract | Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is called image steganography. In image steganography, the major features are the cover object quality and hiding data capacity. Due to poor image quality, attackers could easily hack the secret data. Therefore, the hidden data quantity should be improved, while keeping stego-image quality high. The main aim of this study is combining several steganography techniques, for secure transmission of data without leakage and unauthorized access. In this paper, a technique, which combines various steganography-based techniques, is proposed for secure transmission of secret data. In the pre-processing step, resizing of cover image is performed with Pixel Repetition Method (PRM). Then DES (Data Encryption Standard) algorithm is used to encrypt secret data before embedding it into cover image. The encrypted data is then converted to hexadecimal representation. This is followed by embedding using Least Signification Bit (LSB) in order to hide secret data inside the cover image. Further, image de-noising using Convolutional Neural Network (CNN) is used to enhance the cover image with hidden encrypted data. Embedded Zerotrees of Wavelet Transform is used to compress the image in order to reduce its size. Experiments are conducted to evaluate the performance of proposed combined steganography technique and results indicate that the proposed technique outperforms all existing techniques. It achieves better PSNR, and encryption/decryption times, than existing methods for medical and other types of images. |
---|---|
AbstractList | Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is called image steganography. In image steganography, the major features are the cover object quality and hiding data capacity. Due to poor image quality, attackers could easily hack the secret data. Therefore, the hidden data quantity should be improved, while keeping stego-image quality high. The main aim of this study is combining several steganography techniques, for secure transmission of data without leakage and unauthorized access. In this paper, a technique, which combines various steganography-based techniques, is proposed for secure transmission of secret data. In the pre-processing step, resizing of cover image is performed with Pixel Repetition Method (PRM). Then DES (Data Encryption Standard) algorithm is used to encrypt secret data before embedding it into cover image. The encrypted data is then converted to hexadecimal representation. This is followed by embedding using Least Signification Bit (LSB) in order to hide secret data inside the cover image. Further, image de-noising using Convolutional Neural Network (CNN) is used to enhance the cover image with hidden encrypted data. Embedded Zerotrees of Wavelet Transform is used to compress the image in order to reduce its size. Experiments are conducted to evaluate the performance of proposed combined steganography technique and results indicate that the proposed technique outperforms all existing techniques. It achieves better PSNR, and encryption/decryption times, than existing methods for medical and other types of images. |
Author | R. Girgis, Moheb F. Mansour, Romany |
Author_xml | – sequence: 1 givenname: Romany surname: Mansour middlename: F fullname: Mansour, Romany F – sequence: 2 givenname: Moheb surname: Girgis middlename: R fullname: Girgis, Moheb R |
BookMark | eNp1kD1PwzAQhi1UJNrCzmiJOcUfiROPgPioVOhAO1uOey4piR3sFNR_T9oyICSmu-F93tM9IzRw3gFCl5RMOBMkvTaNmTDC6ITQnIj0BA1ploqEMSYGv_YzNIpxQwgXXJIhsq8drLXz66Dbt11yqyOs8CJoF5sqxso77C1-hlVldI2njV5DxPNPCHjpIphtAPwC3ZcP79j6gBdQQ7MPVw7wTdvWPdb1JfEcnVpdR7j4mWO0fLhf3D0ls_nj9O5mlhhOeZfIUmsrc0ZtZnMmaJpbUWoQhnLgkOpcg81ISaWUkAEpCplmZcnyQoDVjBM-RlfH3jb4jy3ETm38Nrj-pGIZzwQtZJH2KXJMmeBjDGBVG6pGh52iRB1sqt6m2ttUR5s9Iv4gpuoOv3VBV_X_4DftZHzV |
CitedBy_id | crossref_primary_10_48084_etasr_5501 crossref_primary_10_1016_j_aej_2023_05_051 crossref_primary_10_32604_cmc_2022_021185 crossref_primary_10_32604_csse_2023_023307 crossref_primary_10_48084_etasr_4296 |
Cites_doi | 10.1016/j.chaos.2005.08.110 10.4236/jis.2012.32011 10.1016/j.compeleceng.2015.12.011 10.1007/s11042-016-4253-x 10.1109/78.258085 10.1007/s11042-017-4935-z 10.1007/s11042-006-0008-4 10.1016/j.jbi.2017.08.002 10.1016/j.neunet.2019.12.024 10.1007/s11128-017-1694-8 10.1177/0165551518816303 10.1007/s11042-019-08251-3 10.1109/ACCESS.2019.2894295 10.1155/2012/173931 10.1016/j.mehy.2020.109691 10.1016/j.ins.2017.12.041 10.33633/jais.v2i1.1330 10.1007/s11042-013-1832-y 10.1016/j.future.2018.02.023 10.1007/s10773-015-2640-0 10.48084/etasr.2380 10.1007/s11045-018-0575-3 10.11591/ijeecs.v2.i3.pp712-719 10.1016/j.chaos.2003.12.022 10.1007/s11042-018-6476-5 |
ContentType | Journal Article |
Copyright | 2021. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2021. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION 7SC 7SR 8BQ 8FD ABUWG AFKRA AZQEC BENPR CCPQU DWQXO JG9 JQ2 L7M L~C L~D PHGZM PHGZT PIMPY PKEHL PQEST PQQKQ PQUKI PRINS |
DOI | 10.32604/cmc.2021.017064 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Engineered Materials Abstracts METADEX Technology Research Database ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials - QC ProQuest Central ProQuest One ProQuest Central Korea Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ProQuest Central Premium ProQuest One Academic (New) ProQuest Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China |
DatabaseTitle | CrossRef Publicly Available Content Database Materials Research Database Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Central China METADEX Computer and Information Systems Abstracts Professional ProQuest Central Engineered Materials Abstracts ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic Advanced Technologies Database with Aerospace ProQuest One Academic (New) |
DatabaseTitleList | Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1546-2226 |
EndPage | 4085 |
ExternalDocumentID | 10_32604_cmc_2021_017064 |
GroupedDBID | AAFWJ AAYXX ACIWK ADMLS AFKRA ALMA_UNASSIGNED_HOLDINGS BENPR CCPQU CITATION EBS EJD J9A OK1 P2P PHGZM PHGZT PIMPY PUEGO RTS TUS 7SC 7SR 8BQ 8FD ABUWG AZQEC DWQXO JG9 JQ2 L7M L~C L~D PKEHL PQEST PQQKQ PQUKI PRINS |
ID | FETCH-LOGICAL-c313t-9baaf9721f5f726147f6bae6c13e3e4a7aef50b1999e5e088945bb2786efa2303 |
IEDL.DBID | BENPR |
ISSN | 1546-2226 1546-2218 |
IngestDate | Mon Jun 30 04:21:08 EDT 2025 Thu Apr 24 22:59:12 EDT 2025 Mon Sep 01 05:05:00 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 3 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c313t-9baaf9721f5f726147f6bae6c13e3e4a7aef50b1999e5e088945bb2786efa2303 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
OpenAccessLink | https://www.proquest.com/docview/2535618984?pq-origsite=%requestingapplication% |
PQID | 2535618984 |
PQPubID | 2048737 |
PageCount | 17 |
ParticipantIDs | proquest_journals_2535618984 crossref_primary_10_32604_cmc_2021_017064 crossref_citationtrail_10_32604_cmc_2021_017064 |
PublicationCentury | 2000 |
PublicationDate | 2021-00-00 20210101 |
PublicationDateYYYYMMDD | 2021-01-01 |
PublicationDate_xml | – year: 2021 text: 2021-00-00 |
PublicationDecade | 2020 |
PublicationPlace | Henderson |
PublicationPlace_xml | – name: Henderson |
PublicationTitle | Computers, materials & continua |
PublicationYear | 2021 |
Publisher | Tech Science Press |
Publisher_xml | – name: Tech Science Press |
References | Laimeche (ref11) 2019; 51 Sreehari (ref17) 2018 Wang (ref43) 2008 Ardiansyah (ref20) 2017 Manjula (ref22) 2016; 3 Li (ref27) 2019 Qu (ref33) 2019; 78 Rachmawanto (ref24) 2017 Kim (ref14) 2020; 79 Loukhaoukha (ref42) 2012; 2012 Parah (ref18) 2020; 108 Gao (ref40) 2006; 29 Jung (ref21) 2015; 74 Umair (ref8) 2017 Miri (ref15) 2018; 77 Mansour (ref6) 2012; 3 Tian (ref26) 2020; 124 Rahim (ref13) 2018; 11132 Rachmawanto (ref23) 2017; 2 Bailey (ref36) 2006; 30 Sahu (ref9) 2016; 2 Qu (ref31) 2016 Kaur (ref16) 2016; 2 Rahmani (ref3) 2018; 435 Parah (ref25) 2018; 77 Chen (ref41) 2004; 21 Karakus (ref1) 2020; 139 Ahmadi (ref5) 2017 Sakthidasan (ref12) 2016; 54 Loan (ref10) 2017; 73 Shapiro (ref28) 1993; 41 Jiang (ref30) 2016; 55 Mansour (ref7) 2019; 30 Hussain (ref4) 2018; 65 Heidari (ref32) 2017; 16 Rehman (ref37) 2019; 45 Sivakumar (ref39) 2013; 12 Güler (ref19) 2017 Jassim (ref34) 2013; 72 Rasras (ref38) 2019; 9 Roy (ref2) 2017 Qu (ref29) 2019; 7 Muhammad (ref35) 2015; 9 |
References_xml | – volume: 9 start-page: 1938 year: 2015 ident: ref35 article-title: A secure method for color image steganography using gray-level modification and multi-level encryption publication-title: TIIS – volume: 29 start-page: 393 year: 2006 ident: ref40 article-title: A new chaotic algorithm for image encryption publication-title: Chaos, Solitons & Fractals doi: 10.1016/j.chaos.2005.08.110 – volume: 3 start-page: 91 year: 2012 ident: ref6 article-title: A robust method to detect hidden data from digital images publication-title: Journal of Information Security doi: 10.4236/jis.2012.32011 – start-page: 45 year: 2017 ident: ref5 article-title: Image steganography with artificial immune system – volume: 65 start-page: 46 year: 2018 ident: ref4 article-title: Image steganography in spatial domain: A survey publication-title: Signal Processing: Image Communication – volume: 54 start-page: 382 year: 2016 ident: ref12 article-title: Noise free image restoration using hybrid filter with adaptive genetic algorithm publication-title: Computers & Electrical Engineering doi: 10.1016/j.compeleceng.2015.12.011 – volume: 77 start-page: 185 year: 2018 ident: ref25 article-title: Information hiding in edges: A high capacity information hiding technique using hybrid edge detection publication-title: Multimedia Tools Applications doi: 10.1007/s11042-016-4253-x – year: 2008 ident: ref43 article-title: An image scrambling encryption using chaos controlled Poker shuffle operation – start-page: 16 year: 2017 ident: ref24 article-title: A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size – volume: 41 start-page: 3445 year: 1993 ident: ref28 article-title: Embedded image coding using zerotrees of wavelet coefficients publication-title: IEEE Transactions on Signal Processing doi: 10.1109/78.258085 – year: 2017 ident: ref8 publication-title: Comparison of Symmetric Block Encryption Algorithms – volume: 77 start-page: 13133 year: 2018 ident: ref15 article-title: An image steganography method based on integer wavelet transform publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-017-4935-z – volume: 30 start-page: 55 year: 2006 ident: ref36 article-title: An evaluation of image based steganography methods publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-006-0008-4 – volume: 73 start-page: 125 year: 2017 ident: ref10 article-title: Hiding electronic patient record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications publication-title: Journal of Biomedical Informatics doi: 10.1016/j.jbi.2017.08.002 – volume: 124 start-page: 117 year: 2020 ident: ref26 article-title: Attention-guided CNN for image denoising publication-title: Neural Networks doi: 10.1016/j.neunet.2019.12.024 – volume: 16 start-page: 242 year: 2017 ident: ref32 article-title: A novel quantum LSB-based steganography method using the gray code for colored quantum images publication-title: Quantum Information Processing doi: 10.1007/s11128-017-1694-8 – volume: 45 start-page: 767 year: 2019 ident: ref37 article-title: Data hiding technique in steganography for information security using number theory publication-title: Journal of Information Science doi: 10.1177/0165551518816303 – start-page: 7026 year: 2019 ident: ref27 article-title: Attention guided unified network for panoptic segmentation – volume: 51 start-page: 1 year: 2019 ident: ref11 article-title: Enhancing LSB embedding schemes using chaotic maps systems publication-title: Neural Computing and Applications – volume: 79 start-page: 1355 year: 2020 ident: ref14 article-title: CNN-based image steganalysis using additional data embedding publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-019-08251-3 – volume: 7 start-page: 35684 year: 2019 ident: ref29 article-title: Matrix coding-based quantum image steganography algorithm publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2894295 – volume: 2012 start-page: 1 year: 2012 ident: ref42 article-title: A secure image encryption algorithm based on Rubik’s cube principle publication-title: Journal of Electrical and Computer Engineering doi: 10.1155/2012/173931 – volume: 139 start-page: 109691 year: 2020 ident: ref1 article-title: A new image steganography method with optimum pixel similarity for data hiding in medical images publication-title: Medical Hypotheses doi: 10.1016/j.mehy.2020.109691 – volume: 435 start-page: 224 year: 2018 ident: ref3 article-title: An efficient histogram-based index mapping mechanism for reversible data hiding in VQ-compressed images publication-title: Information Sciences doi: 10.1016/j.ins.2017.12.041 – start-page: 394 year: 2016 ident: ref31 article-title: A novel self-adaptive quantum steganography based on quantum image and quantum watermark – start-page: 249 year: 2017 ident: ref20 article-title: Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm – volume: 2 start-page: 1 year: 2017 ident: ref23 article-title: Secure image steganography algorithm based on DCT with otp encryption publication-title: Journal of Applied Intelligent System doi: 10.33633/jais.v2i1.1330 – volume: 72 start-page: 39 year: 2013 ident: ref34 article-title: A novel steganography algorithm for hiding text in image using five modulus method publication-title: International Journal of Computer Applications – volume: 74 start-page: 2143 year: 2015 ident: ref21 article-title: Steganographic method based on interpolation and LSB substitution of digital images publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-013-1832-y – volume: 12 start-page: 407 year: 2013 ident: ref39 article-title: A novel image encryption approach using matrix reordering publication-title: WSEAS Transactions on Computers – start-page: 52 year: 2018 ident: ref17 article-title: Implementation of hybrid cryptosystem using DES and MD5 – volume: 108 start-page: 935 year: 2020 ident: ref18 article-title: Electronic health record hiding in images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2018.02.023 – volume: 55 start-page: 107 year: 2016 ident: ref30 article-title: LSB based quantum image steganography algorithm publication-title: International Journal of Theoretical Physics doi: 10.1007/s10773-015-2640-0 – volume: 9 start-page: 3681 year: 2019 ident: ref38 article-title: A methodology based on steganography and cryptography to protect highly secure messages publication-title: Engineering Technology & Applied Science Research doi: 10.48084/etasr.2380 – start-page: 49 year: 2017 ident: ref19 article-title: CUDA implementation of DES algorithm for lightweight platforms – volume: 3 start-page: 1715 year: 2016 ident: ref22 article-title: Color image encryption and decryption using DES algorithm publication-title: International Research Journal of Engineering and Technology – volume: 30 start-page: 791 year: 2019 ident: ref7 article-title: An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications publication-title: Multidim Syst. Sign Process doi: 10.1007/s11045-018-0575-3 – year: 2017 ident: ref2 publication-title: Visual Cryptographic Steganography with Data Integrity – volume: 2 start-page: 712 year: 2016 ident: ref9 article-title: A review on LSB substitution and PVD based image steganography techniques publication-title: Indonesian Journal of Electrical Engineering and Computer Science doi: 10.11591/ijeecs.v2.i3.pp712-719 – volume: 21 start-page: 749 year: 2004 ident: ref41 article-title: A symmetric image encryption scheme based on 3D chaotic cat maps publication-title: Chaos, Solitons and Fractals doi: 10.1016/j.chaos.2003.12.022 – volume: 2 start-page: 1 year: 2016 ident: ref16 article-title: A new LSB embedding for 24-bit pixel using multi-layered bitwise XOR – volume: 78 start-page: 7981 year: 2019 ident: ref33 article-title: A novel quantum image steganography algorithm based on exploiting modification direction publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-018-6476-5 – volume: 11132 start-page: 723 year: 2018 ident: ref13 article-title: End-to-end trained CNN encoder-decoder networks for image steganography |
SSID | ssj0036390 |
Score | 2.244351 |
Snippet | Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is... |
SourceID | proquest crossref |
SourceType | Aggregation Database Enrichment Source Index Database |
StartPage | 4069 |
SubjectTerms | Algorithms Artificial neural networks Data encryption Embedding Encryption Image enhancement Image quality Image transmission Layouts Medical imaging Steganography Telemedicine Wavelet transforms |
Title | Steganography-Based Transmission of Medical Images Over Unsecure Network for Telemedicine Applications |
URI | https://www.proquest.com/docview/2535618984 |
Volume | 68 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV07U8JAEL5RaGx8O6LoXGFjcQK5uzwqBxwYtEBHYYYucxf2bCSg4P93N7moNNS5pNjd229f-ZaxG1AOo2CdCANWC5UpJ6wMpIiStpUxGOLUommLUTicqKepnvqC28qPVVY-sXDUs0VGNfJWoCVCfZzE6n75KWhrFHVX_QqNXVZHFxyjndd7_dHLa-WLJeJv8UukVqEIEM3KRiWGLG3VyuZEYRh07goKGbUJTJt-uQCbwSHb91Ei75ZqPWI7kB-zg2oDA_cX8oS5tzW8m9zTToseQtKMF_CD6qM6GF847nsx_HGOvmPFn9F4-SRfUaEd-KgcA-cYu_Ix0Cx52Wvn3X-d7VM2GfTHD0PhNyeITHbkWiTWGEe8PE67CHMkFbnQGggzqnmCMpEBp9uWKAhAA006KW1tEMUhOINJiTxjtXyRwznj7Rg6WYinrExUYgJUQMHZF6FerTW6wVqV2NLM04rTdouPFNOLQtApCjolQaeloBvs9veNZUmpseVss9JE6i_XKv0zhYvtjy_ZHn2rrJg0WW399Q1XGEOs7bU3lB9ejMV7 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV07UxsxEN4hpiBNeCSZAA6ogIJC2D5J9yiYDM-xeRgG7Bm6i3RepYGzwc5k-FP5jdm9R4CGjvp0Klar_Vb7-BZgC7UnL9gk0qIzUmfaS6cCJaOk7VSMljm1uNqiH3aH-vTW3M7B37oXhssqa5tYGOrROOMYeSswiqA-TmL9Y_IgeWoUZ1frERqlWpzh0x96sk33ekd0vttBcHI8OOzKaqqAzFRHzWTirPXMWeONj-j9oCMfOothxvFA1Day6E3bcXs-GuQqIG2cC6I4RG_JYVe07weY19zR2oD5g-P-1XVt-xXhfdGCaXQoA0LPMjFKLlJbt7J7pkwMOrsFZY1-DYSvcaAAt5Ml-FR5pWK_VKNlmMN8BRbriQ-iMgCfwd_M8JfNK5preUAQOBIF3JG6cNxNjL2ocj-id0-2aiou6bKIYT7lwD6Kfll2LshXFgPk2vUyty_2X2TSv8DwXWT6FRr5OMdvINoxdrKQVjmV6MQGdOAFR2BEeuScNavQqsWWZhWNOU_TuEvpOVMIOiVBpyzotBT0Kuz8_2NSUni8sbZZn0RaXeZp-qx6a29_3oSF7uDiPD3v9c_W4SPvW0ZrmtCYPf7G7-S_zNxGpTQCfr63nv4DzPsCuQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Steganography-Based+Transmission+of+Medical+Images+Over+Unsecure+Network+for+Telemedicine+Applications&rft.jtitle=Computers%2C+materials+%26+continua&rft.au=F.+Mansour%2C+Romany&rft.au=R.+Girgis%2C+Moheb&rft.date=2021&rft.issn=1546-2226&rft.volume=68&rft.issue=3&rft.spage=4069&rft.epage=4085&rft_id=info:doi/10.32604%2Fcmc.2021.017064&rft.externalDBID=n%2Fa&rft.externalDocID=10_32604_cmc_2021_017064 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1546-2226&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1546-2226&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1546-2226&client=summon |