iconOpen Access

ARTICLE

A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System

Saima Kanwal1, Feng Tao1,*, Ahmad Almogren2, Ateeq Ur Rehman3, Rizwan Taj1, Ayman Radwan4

1 School of Computer and Communication, Lanzhou University of Technology, Lanzhou, 730050, China
2 Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh, 11633, Saudi Arabia
3 Department of Electrical Engineering, Government College University, Lahore, 54000, Pakistan
4 Instituto de Telecomunicações and Universidade de Aveiro, Aveiro, 3810-193, Portugal

* Corresponding Author: Feng Tao. Email: email

Computer Modeling in Engineering & Sciences 2023, 134(1), 201-219. https://doi.org/10.32604/cmes.2022.020255

Abstract

The authenticity and integrity of healthcare is the primary objective. Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection. A trade-off between robustness, imperceptibility, and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability. Keeping this purpose insight, an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern. A key is generated by a random path with minimum bit flipping is selected in the 4 × 4 block to gain access to the data embedding patterns. The random path’s complex structure ensures data security. Data of various sizes (8 KB, 16 KB, 32 KB) are used to analyze image imperceptibility and evaluate quality factors. The proposed reversible watermarking methodology performance is tested under standard structures PSNR, SSIM, and MSE. The results revealed that the MRI watermarked images are imperceptible, like the cover image when LSB is 3 bits plane. Our proposed reversible watermarking methodology outperforms other related techniques in terms of average PSNR (49.29). Experiment results show that the suggested reversible watermarking method improves data embedding capacity and imperceptibility compared to existing state-of-the-art approaches.

Keywords


1  Introduction

Over the decades, the exponential growth of the internet, digital communication expanded the capacity of internet multimedia networks with the processing of a massive volume of videos and images [1]. Many developments in the computing environment have threatened copyright security and material integrity, including hardware, software, and communication systems. In recent years, in the biomedical system, many changes and advancements have occurred regarding digital images of medical data, and it has become a significant field [2]. Besides the fast speed and highly efficient digital communication, security risks must be resolved in Internet Apps, e.g., military images are associated with the security of the entire country. Information security of digital communication affects everyone’s peace of mind. Researchers have developed different techniques in digital image processing to authenticate the image information and identify image manipulation accurately and robustly. Medical images contain sensitive information about the patients, so security and privacy protections of the medical images become crucial while sending those images through the internet [3]. Due to the rapid growth in the electronic health industry, remote health monitoring of the patients has become possible using sensors, resulting in better patient care [4]. To ensure the privacy and security of information on the internet and avoid data leakage, data hiding technology (i.e., embedding data) has emerged. Steganography and watermarking are the two major types of data hiding methodologies. Steganography is generally used for secret communication so that the confidential data concealed in the cover object would not catch the public’s attention. Steganography typically introduces a “peer-to-peer” secret communication. The content of the hidden message is only accessible to the sender and recipient, and the recipient can accurately extract the secret message. Digital watermarking is used to ensure that digital media such as documents and videos are authentic and copyright protected by embedding secret data in them. It is significant to mention that watermarking has numerous resemblances to steganography in terms of embedding data. The purpose of watermarking is to make it extremely difficult to extract hidden information to avoid the unauthorized copying of the data. Digital watermarking technology is divided into two categories: frequency domain and spatial domain [5]. The watermarking approach is implemented on the image’s coefficient values in the frequency domain. There are three main types of spatial domain images in digital image processing: one is binary, the other is grayscale, and the third is colour images. In binary images, there are only two possible values for each pixel, and it is most commonly used in black and white, but it can also be used for any two colours. Greyscales images only contain the intensity data using a single sample value for each pixel. It is usually called black and white, and these images contain the different shades of grey (0 to 255), in which the black color is at 0, and it represents the weak intensity, while the white color is at 255, and it represents the vigorous-intensity whereas color images consist of three primary sets of colors red, green and blue ranging color from 0–255 [6]. However, in the spatial domain watermarking, the modification of cover image pixel with watermark image is applied. An ideal watermarking algorithm focuses solely on high visibility of source image, minimum complexity, data security, imperceptibility, and high embedding capacity. However, it is challenging to provide a data hiding approach that contains these characteristics simultaneously in most situations. In recent decades, researchers have progressed on data hiding algorithms that need low or medium computational capacity with adequate visual quality at a higher embedding capacity. In steganography, two main embedding techniques are used, one is the PVD (Pixel Value Difference), and the other one is LSB (Least Significant Bit) [7]. PVD technique has much better performance as compared to LSB because it provides stego images with high quality and hidden data with a high capacity [8]. Implementation ofthe PVD scheme as a new paradigm, spatial domain algorithms are being used, through which the iris implicit images data would be, inserted instantly into the cover pixel images [9]. The least significant bits (LSB [1013], Exploiting Modification Direction (EMD) [1416], and Pixel Value Difference (PVD) [1721] are some of the most popular algorithms of watermarking in the spatial domain. Some researchers have combined two methodologies PVD, EMD with LSB substitutions, to obtain efficient results in data security, embedding capacity, and excellent visual quality [16,2227]. The secret bits are encoded pairwise and then embedded in the cover LSB bits with very little changes to the reference image [28]. Wu et al. [29] proposed a methodology known as PDBD for low distortion in PVD and base decomposition. In the context of a pixel pair, the difference between pixels is determined first, and the corresponding degree is measured. Then certain bits of information are transformed by the base pair of the degree into two adjacent coefficients. Further, the pixel pair is formed by embedding coefficients. Traditionally, algorithms were commonly identified, and strategies in which information was directly encoded in the LSB planes of the host image were implemented. An acceptable extent of security and in contexts of data encoding, many of these algorithms have done reasonably well. Besides that, with the ever-growing computing capability of digital technologies, most strategies are noticed to be compromised. With this in perspective, algorithms for hiding data based on keys emerged into the field of research, and researchers also explored these using conventional digital signature attacks. In [30], the Hilbert curve methodology produces data embedding structures and a logistic map to encode a message signal to improve security with a high payload and better image quality. Some studies show higher security schemes were also implemented using the similarities of the pixel neighbourhood, redundancy, inherent features in the image, etc. [3136]. Chaotic system-based various schemes have provided enhanced security performance. Such systems focus on secret keys generated by the chaotic map parameters [37,38]. The security of the data hiding algorithm relies greatly on the scale and accuracy of the secret keys used in the process. The histogram of watermarked images is well known to publicize the presence of hidden information, and this is especially true for algorithms that have a high data encoding capability. At the same point, imperceptibility is important for information security. Therefore, algorithms should also focus on significantly reducing the impact of encoding on histograms. We have proposed an efficient reversible watermarking system with improved patient records security and a high level of imperceptibility. An embedding pattern is implemented by generating the key using random paths in the pixel block to obtain maximum security. The patient record information is embedded in the cover image up to 3 bits plane without any indication of secret information for a third party.

The following are our main contributions:

•   Implementation of the unique random path in blocks and rotation of pixels.

•   Different math operations have been implemented for data embedding up to 3 bits plane LSB.

•   Strategy for optimization to reduce bit flipping.

•   An approach is implemented with impactful improvements in terms of maximum payload capacity and imperceptibility.

•   Detailed evaluation and comparison with other similar state-of-the-art methodologies.

The Breakdown structure of the paper is as follows: Section 2 represents different state-of-the-art reversible algorithms. Section 3 delves into the proposed methodology in detail with embedding and extracting watermark steps. The experimental results of the study and discussion are found in Section 4. Finally, Section 5 presents the conclusion and future work.

2  Preliminaries

Different studies have used image steganography methodologies to conceal confidential information, the images’ visual quality, and data embedding capacity. Gndu et al. [3942] explained the reverse connection between MSE and PSNR. They depicted that higher values of PSNR represent the high-quality image (better), and the PVD method stores a greater number of bits for the message than the LSB method. They showed a better quality result of LSB images after embedding as compared to PVD. However, the PVD method can store a larger number of data bits without losing the image quality, while an LSB can store a large number of data bits but degrades the image quality. Mansor et al. [6] proposed the technique of 2D discrete wavelet transforms in two levels for embedding patients’ data in a cover medium. For cover images, they used colour images and grayscale images. They employed conventional procedures to encrypt the textual data before embedding it in the cover medium. To validate the cover medium imperceptibility, they applied different algorithms and statistical tests. They achieved better statistical scores for hidden textual material than similar existing techniques and proposed various state-of-the-art image stenographic methodologies. Among them, the LSB modification of [31] is one of the most common methods to modify the lower order bits of the pixel values that will be unnoticeable, even with multiple steganalysis methods [43,44]. Several LSB-based information hiding techniques provide high data encoding with an acceptable level of imperceptibility. Even so, it can be noticed that many other spatial domain steganalysis techniques lack this primary objective, as histograms can easily decipher the appearance of concealed data. In [45], the authors proposed the inter-block coefficient dependency method for embedding purposes. The difference in the coefficients is calculated employing adjacent discrete transform cosine (DCT) blocks with identical locations. However, this technique is particularly for JPEG medical images to conceal patient data. The methodology of reversible data hiding based on histogram shifting is used to embed data via histogram modification [46]. The original image histogram’s peak and zero/minimum points are employed, where the peak point has the maximum number of grayscale pixels and the zero/minimum point has the minimum pixel value. Each pixel with a peak point value is used to convey a bit of a hidden message. The histogram shifting approach has low computational requirements, minimal distortion in the original image and a high PSNR ratio between the original and watermarked images. However, this technique limits hiding capacity by the histogram’s peak points. Sahu et al. [47] described the image steganography approach, in which they employed distinct pixels from various sub-blocks to improve the Peak Signal to Noise Ratio (PSNR) and Embedding Capacity (EC) of the image. This method was divided into two sections, the first was OPVD (Overlapped Pixel Value Difference), and the second was OPVDMF (Overlapped Pixel Value Differencing with Module Function). It brings significant improvement in resist, security, and RS analysis test. In [48], the author proposed a high-quality and straightforward reversible watermarking approach focused on difference expansion and using redundancy of digital content to obtain reversibility. The pixel value difference between pairs of the host image is expended by two in this technique. The least significant bits embed hidden messages as the even number is calculated from the expanded difference. After the least significant bits, a watermark bit is embedded to obtain the watermarked image. The compressed location map and payload are concatenated with actual least significant bit values for identical image retrieval. High embedding capacity is achieved by this method; however, because a location map is required, not much of the capacity is used to embed data. Furthermore, this approach introduces unfavorable distortion. In [49], the authors implemented a Hamiltonian path to minimize distortion between LSB pixels and embedded data. LSB equivalent encoding method is changed specifically rather than blindly to improve image steganography. However, several visual objects in the stego-images can be identified in the suggested model. Their methodology is robust against the soft margin SVM based on the second-order SPAM. In [50], the authors suggested a new approach that divides the cover image into non-overlapping blocks. Hamilton’s path for each block first modifies the structure of the block’s pixels. Next, they evaluate the pixels whose LSB is not equivalent to the hidden data. The path that results in minimal distortion is selected, and both its binary code and the mismatched pixels are counted. The pixels that should be changed during data embedding and a binary key containing codes of the best Hamiltonian path in all blocks are calculated by repeating this procedure. Then, with reference to the compressed key, the latest value of the second LSB of the modifiable pixels is computed using writing on the wet paper method. Finally, the value computed for the second LSB±1 is applied to each changeable pixel [13]. Siddiqui et al. [2] proposed steganography techniques to hide the secreted data in the image, the N-rightmost bit is replaced, and its main objective is Peak Signal to Noise Ratio (PSNR), which improves the quality of the image. The EC (Embedding Capacity) benefit from transmitting a considerable quantity of data between the sender and the receiver, avoiding the FOBP (Fall Boundary Problem), which enhance the security in salt, resist pepper noise, and RS attack. Sahu et al. [51] describes another work in which two approaches were used for RDH (Reversible Data Hiding). In the first approach, to achieve reversibility, they extend the matching of LSB (Least Significant Bit) in dual images. In the second approach for the secret data embedding, they used the four identical cover images, and then the secret data of cover images were embedded in two phases. In the first phase, the N-RMB (NRightmost Bit replacement) techniques were used, and in the second phase, the MPVD (Modified Pixel Value Differencing) technique they used in [52], 1D adaptive Bernoulli map, ideal for encryption, is suggested for correlation coefficients. The revolutionary image encryption technique was implemented focused on the recent chaotic map. The permutation process was understood by creating a randomly Hamiltonian path implemented over different bit planes. Then, in the diffusion process (XOR procedures were conducted on pixels), the concept of the random Hamiltonian path was applied to substitute for grey levels.

3  Proposed Methodology

The desired methodology takes the cover image and patient record information as inputs and generates the watermarked image by implementing numerous operations at the pixel level. The patient record has all the details about the individual, the patient’s details, the disease under which the patient suffers, and the physician who diagnoses the disease. The fundamental concept of the scheme is to maximize the imperceptibility and robustness against different attacks of the cover image. A cover image of 512 × 512 is divided into non-overlapping disjoint square pixel blocks of the same size. The patient record information is embedded in the LSB planes of the pixel blocks by pursuing a sequence created by the random path. Fig. 1 provides an example of three random paths with minimum bit flipping described in a 4 × 4 block. Once the random path has been chosen, the embedding procedure is carried out by considering four ideal sequence directions and pixel rotation (0°; 90°; 180°; 270°), and the path with minimum bit flipping is selected for the patient record embedding. The random path selected for data embedding is implemented on all blocks. The workflow of the proposed algorithm is defined in Fig. 2.

imagesimages

Figure 1: (a) An example of a 4 × 4 block (b) Random path in 4 × 4 block (c) LSB Sequence according to the random path (d) The distortion caused by matching every sequence to the data sample (1000011001011101)2 and the distinct pixels (e) The distortion caused by matching every sequence to the complement of the data sample and the distinct pixels

images

Figure 2: Proposed reversible watermarking system block diagram

3.1 Random Path Generation

We describe an explanation of finding the ideal random path in 4 × 4 non-overlapping blocks. Every pixel in the block will be accessed once starting from the top-left pixel. In the case of the proposed 4 × 4 blocks, one can choose a random path from a set of 20 possible paths using the combinatorics approach in 1.

(m+n2)!(n1)!(m1)!(1)

Assume the patient data is (1000011001011101)2. As seen in example Fig. 1, there are three different random paths in a 4 × 4 block. As shown in Fig. 1c from left to right, a matrix of the pixel’s LSB is generated by tracing each path. The pixels in which LSBs do not match the respective hidden data bit or sample data complement are depicted in Figs. 1d and 1e, respectively. The block distortion is counted by the amount of non-matching pixels, as shown in these figures. The path with the least distortion is identified as the ideal random path in this block.

3.2 Effective Embedding Capacity

Block size determines the effective embedding capacity; besides rotation bits data as explained in the embedding process, the number of bits required for embedding data is bl2-2 for the block size of l. where

4lmin(m2,n2)(2)

The effective embedding capacity will be

bl22bl2(3)

b denotes the number of bitplanes used for embedding, and l represents the block size. Data embedding is done using the three least significant bit planes in the proposed methodology. As explained in the data embedding process, two bits b1b2 will be placed at the upper left side of the selected block least significant bit concerning each block rotation. In the case of 4 × 4 block size, the total number of pixels available in the block is 16, so the maximum number of embedding bits available is 16 × 3 = 48 as the last three bits are used for embedding, 46 Effective Embedding bits are available, and .958 is effective embedding.

3.3 Embedding Phase

3.3.1 Cover Image Block

The first phase in embedding the patient data is determining the number of bytes available for modification in the cover image. The embedding phase will begin If the number of cover image bytes available for embedding is higher than or equal to the number of patient records; otherwise, an error message will appear. The cover image Cimage of size 512 × 512 is divided into 4 × 4 non-overlapping blocks to minimize the complexity of the location map.

3.3.2 Cover Image Pixel Sequence

After splitting the cover image into blocks, the preceding steps are performed for each block. The pixel sequence is defined by a unique random path in the block. [logl2] bits are required to display the final block sequence number leading to l2[logl2] bits to define each element unique in a block of size lxl. These bits are part of the hidden key. The integrated data bits information for each block will be only accessible to the authorized receivers. b bitplanes can be used for embedding patient records in medical image pixels. This quantity b is based on the size of the concealed data, but to minimize the distortion of the medical image within an acceptable level, a maximum of four-bit planes are employed for the embedding procedure. The patient record information is transformed from text to bits, and The bit string is further equally grouped into the size of bl2-2 substrings data, Data strings D0; D1; D2; D3 of four bits long bl2 will be generated from each substring of data bl2-c bits. The data bit string will be modified as

D1,D2,,Dl2,Dl2+1,,D2l2,,D(b1)l2+1,,Dbl2(4)

3.3.3 Cover Image Block Rotation

After embedding b1b2 at the ideal location, keeping in mind the security perspective, every four rotations will be evaluated employing numerous objective functions, and the optimum performance will be preferred. Two bits b1b2 (00; 01; 10; 11) denotes the pixel rotation in each block with four angels (00; 900; 1800; 2700), respectively. These bits would be positioned in the concealed data string such that they embed in the least significant bits of two upper left corners pixel in the block. These bits b1b2 determine the efficient and effective embedding capacity based on the block size. When the data set of bits for the patient record and pixel sequence of the block are determined, we add ±1 to each modifiable pixel to embed the patient record in the cover image. The value of a pixel’s LSB measured by the algorithm specifies the appropriate additive value for that pixel in the block.

images

3.4 Extraction Phase

The data extraction process is much simpler than the data embedding process. As explained earlier, the maximum block size of an image 512 × 512 can have 256. As a result, the initial eight bits of the string indicate the pixel block size in the key. Therefore the very first eight bits are dissociated from the key. The preceding three bits indicate the count of bit planes selected during the embedding process and are thus dissociated from the key. The rest of the key bits determine the random path specified for the data embedding. We stated that the rotation bits (b1b2) are located in the top-left pixels of LSB in the block at the embedding phase. The block is rotated back in the extraction process by an angle defined by rotation bits. Pixels are then positioned in the exact order as the key dictates, and data from the LSB bit planes of every block can be recovered.

images

4  Results and Discussion

This section discusses the proposed methodology performance analysis, comparing the detailed studies with numerous traditional algorithms to verify the efficiency of this proposed model. “MATLAB 2020a” is used in this research for the implementation of experiments. PC with Windows 10, 3.5-GHz CPU, and 4 GB of RAM.

4.1 Data Set

We tested different sample images from a data archive1 to evaluate our methodology. Fig. 3 represents patients’ images for cancer from n1–n10 that are negative cases, whereas images from y1–y2 are positive cases. The sample images are medical images of an 8-bit depth grayscale. The patient record sizes are 8 KB, 16 KB, and 32 KB.

images

Figure 3: The collection of MRI grayscale BMP cover images for experiments. Cancer images with the normal condition are represented from n1–n10, and cancer images with the abnormal condition are represented from y1–y2

4.2 Performance Metrics

Peak signal-to-noise ratio (PSNR), mean square error (MSE), and structural similarity index metrics (SSIM) are used to assess perceptual invisibility. PSNR analyzes the cover image with the watermarked image in terms of the maximum possible value (power). An image with a PSNR of infinity is identical, whereas any PSNR higher than 35 dB is acceptable, and higher is preferred.

PSNR=20log10(MaxMSE)(5)

MAX denotes the maximum pixel value of the image. The mean square error (MSE) is defined as follows:

MSE=1mn0m10n1(O(i,j)W(i,j))2(6)

where m, n denotes the size of the pixels, and O and W denote the original and cover images, respectively. The Structural Similarity Index is defined as follows:

SSIM(o,w)=[l(o,w)]α[c(o,w)]β[s(o,w)]γ(7)

The metric SSIM (Structural Similarity Index) extracts three main attributes from an image: Luminance, Contrast, and Structure. For the two images O and W, these are computed as follows:

l(o,w)=(2μoμw+c1μo2+μw2+c1)(8)

c(o,w)=(2σoσw+c2σo2+σw2+c2)(9)

s(o,w)=(σow+c3σoσw+c3)(10)

4.3 Results and Analysis

We analyzed our methodology at the cover image’s maximum payload capacity to ensure that it is efficient. The numerical results of PSNR, SSIM, and MSE reveal that the watermark images are imperceptible and that human eyes are unable to discriminate between visual variations in the watermark images. The suggested methodology attains the average PSNR value of 44.22 dB on 512 × 512 dimensions with data embedding up to 32 KB and employing all three LSBs. Table 1 displays the cover image quality measures for 8 KB, 16 KB, and 32 KB. Fig. 4 displays a graphical representation of the proposed algorithm. The desired scheme performance is carefully analyzed by subjecting it to numerous attacks. Normalized correlation (NC) is used to assess the robustness of the implemented watermarking methodology under filtering, geometric, enhancement, compression, and noise attacks. This NC value should be greater than 0.9 to ensure that the method will resist attacks. Table 2 represents the proposed algorithm strength for various attacks—the SSIM values for geometric attacks and 0.19 for cropping attacks for y3 and y4 images. PSNR value for histogram equalization of no8 image is highest 49.30 dB, and y3 image has the lowest PSNR of 8.7 dB. The minimum NC value calculated from all attacks is 0.97. The watermarked image was exposed to various filtering attacks. The cover images were exposed to Gaussian(3 × 3), median (3 × 3), and wiener filter (3 × 3). The average NC value of filter attack is 0.99, y3 image has the highest PSNR value of 47.58 for Gaussian attack, whereas wiener attack has the lowest value of PSNR 21.16 for y3 cover image.

images

images

Figure 4: Graphical representation of PSNR, SSIM, and MSE at 32 KB patient record after implementing the proposed algorithm

images

4.4 Evaluation and Discussion

The proposed method was compared with the state-of-the-art technique [2] to determine its performance on UCID dataset2 as seen in Fig. 5, the collection of medical images were randomly chosen. Table 3 represents the calculated PSNR, SSIM values of selected images. The average PSNR and SSIM values of [2] are 43.23 and 0.92, respectively, whereas our methodology significantly improves PSNR of 45.00 and SSIM of 0.99. Table 4 represents the performance evaluation of the proposed methods with a standard dataset of images Barbara, Baboon, Cameraman, Lena, Peppers. The results of six different methodologies Bailey et al. [53], Jassim [54], Karim et al. [11], Muhammad et al. [55], Rehman et al. [56], and Siddiqui et al. [2], are displayed in Table 2. Since PSNR is always greater than 30 dB, human eyes cannot perceive distortion. The PSNR value of our proposed method as compared to [5356] and Siddiqui et al. [2] shows better results on 857 bits.

images

Figure 5: A set of 512 × 512 medical images randomly selected for comparison purposes

images

images

We improved the effectiveness of the suggested approach with Rehman et al. [56] by increasing patient data to the maximum size of 235,929 bits since embedding a greater data size with a higher SNR indicates the performance of the watermarking strategy. The suggested scheme achieves the minimum PSNR value of 45.22 dB by hiding 235,929 and employing all three LSBs. Fig. 6 represents a graphical comparison of the proposed algorithm with the state of art methodologies.

images

Figure 6: Graphical representation of proposed algorithm with state of art methodologies

4.5 Summary of Results

Based on the above experimental analyses, we can draw the conclusion:

•   It is found that the suggested methodology performs better than other schemes. Compared to standard LSB and the other state-of-the-art watermarking systems based on reversible watermarking, the proposed method offers a higher PSNR.

•   Even if the embedding capacity is increased, the suggested methodology produces high-quality watermarked images.

•   It is noted that the visual quality of the watermarked image is undetectable. The human eye cannot differentiate between the cover image and watermarked image.

5  Conclusions

In this research paper, a novel reversible watermarking algorithm is proposed. The proposed algorithm is also evaluated under different attacks and shows better results, and it can be applied to medical images and standard images (Barbara, Baboon, Cameraman, Lena, Peppers) for reversible watermarking with better performance for medical images. The proposed algorithm generates an ideal random path among all paths for pixel blocks with minimum bit flipping to improve image imperceptibility. The embedding and extraction process is done by a key that contains information about the selected random path and pixel rotation in the blocks. The degradation of the image is proven by visual quality and structural similarity parameters PSNR, SSIM, and MSE. The calculated values of parameters always come in the acceptable range. In future research, we aim to develop a new framework of the reversible watermarking algorithm for color images.

Funding Statement: This work is supported by the National Natural Science Foundation of China (Grant No. 61762060), Educational Commission of Gansu Province, China (Grant No. 2017C-05), Foundation for the Key Research and Development Program of Gansu Province, China (Grant No. 20YF3GA016). This work was supported by King Saud University, Riyadh, Saudi Arabia, through Researchers Supporting Project No. RSP-2022/184. The work of author Ayman Radwan was supported by FCT/MEC through Programa Operacional Regional do Centro and by the European Union through the European Social Fund (ESF) under Investigator FCT Grant (5G-AHEAD IF/FCT-IF/01393/2015/CP1310/CT0002).

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

  1. Taj, R., Tao, F., Khurram, S., Rehman, A. U., & Haider, S. K. (2022). Reversible watermarking method with low distortion for the secure transmission of medical images. Computer Modeling in Engineering & Sciences, 130(3), 1309-1324. [Google Scholar] [CrossRef]
  2. Siddiqui, G. F., Iqbal, M. Z., Saleem, K., Saeed, Z., & Ahmed, A. (2020). A dynamic three-bit image steganography algorithm for medical and e-healthcare systems. IEEE Access, 8, 181893-181903. [Google Scholar] [CrossRef]
  3. Almogren, A., Mohiuddin, I., Din, I. U., Almajed, H., & Guizani, N. (2020). FTM-IoMT: Fuzzy-based trust management for preventing Sybil attacks in Internet of Medical Things. IEEE Internet of Things Journal, 8(6), 4485-4497. [Google Scholar] [CrossRef]
  4. Din, I. U., Almogren, A., Guizani, M., & Zuair, M. (2019). A decade of Internet of Things: Analysis in the light of healthcare applications. IEEE Access, 7, 89967-89979. [Google Scholar] [CrossRef]
  5. Li, Y. M., Wei, D., & Zhang, L. (2021). Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain. Information Sciences, 551, 205-227. [Google Scholar] [CrossRef]
  6. Mansor, N. K., Asraf, S. M. H., & Idrus, S. Z. S. (2020). Steganographic on pixel value differencing in iris biometric. Journal of Physics: Conference Series, 1529(3), 032078. [Google Scholar] [CrossRef]
  7. Suman, D., & Ranade, S. K. (2017). A secure steganographic method using modified lsb (least significant bit) substitution. International Journal of Advanced Research in Computer Engineering & Technology, 6(8), 1268-1273. [Google Scholar]
  8. Douglas, M., Bailey, K., Leeney, M., & Curran, K. (2018). An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Applications, 77(13), 17333-17373. [Google Scholar] [CrossRef]
  9. Sahu, A. K., Swain, G., & Babu, E. S. (2018). Digital image steganography using bit flipping. Cybernetics and Information Technologies, 18(1), 69-80. [Google Scholar] [CrossRef]
  10. Solak, S., & Altınışık, U. (2019). Image steganography based on LSB substitution and encryption method: Adaptive LSB 3. Journal of Electronic Imaging, 28(4), 043025. [Google Scholar] [CrossRef]
  11. Karim, S. M., Rahman, M. S., Hossain, M. I. (2011). December. A new approach for LSB based image steganography using secret key. 14th International Conference on Computer and Information Technology (ICCIT 2011), pp. 286–291. Dhaka, Bangladesh.
  12. Luo, W., Huang, F., & Huang, J. (2010). Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, 5(2), 201-214. [Google Scholar] [CrossRef]
  13. Sahu, A. K., & Swain, G. (2019). A novel n-right most bit replacement image steganography technique. 3D Research, 10(1), 1-18. [Google Scholar] [CrossRef]
  14. Ray, P. P., Chowhan, B., Kumar, N., & Almogren, A. (2021). BIoTHR: Electronic health record servicing scheme in IoT-blockchain ecosystem. IEEE Internet of Things Journal, 8(13), 10857-10872. [Google Scholar] [CrossRef]
  15. Liu, Y., Chang, C. C., Huang, P. C., & Hsu, C. Y. (2018). Efficient information hiding based on theory of numbers. Symmetry, 10(1), 19. [Google Scholar] [CrossRef]
  16. Leng, H. S., & Tseng, H. W. (2019). Generalize the EMD scheme on an n-dimensional hypercube with maximum payload. Multimedia Tools and Applications, 78(13), 18363-18377. [Google Scholar] [CrossRef]
  17. Prasad, S., & Pal, A. K. (2017). An RGB colour image steganography scheme using overlapping block-based pixel-value differencing. Royal Society Open Science, 4(4), 161066. [Google Scholar] [CrossRef]
  18. Kim, P. H., Yoon, E. J., Ryu, K. W., & Jung, K. H. (2019). Data-hiding scheme using multidirectional pixel-value differencing on colour images. Security and Communication Networks, 2019, [Google Scholar] [CrossRef]
  19. Li, Z., & He, Y. (2018). Steganography with pixel-value differencing and modulus function based on PSO. Journal of Information Security and Applications, 43, 47-52. [Google Scholar] [CrossRef]
  20. Yang, C. H., Weng, C. Y., Tso, H. K., & Wang, S. J. (2011). A data hiding scheme using the varieties of pixel-value differencing in multimedia images. Journal of Systems and Software, 84(4), 669-678. [Google Scholar] [CrossRef]
  21. Wu, D. C., & Tsai, W. H. (2003). A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 24(9–10), 1613-1626. [Google Scholar] [CrossRef]
  22. Darabkh, K. A., Al-Dhamari, A. K., & Jafar, I. F. (2017). A new steganographic algorithm based on multi directional PVD and modified LSB. Information Technology and Control, 46(1), 16-36. [Google Scholar] [CrossRef]
  23. Swain, G. (2019). Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arabian Journal for Science and Engineering, 44(4), 2995-3004. [Google Scholar] [CrossRef]
  24. Muhammad, S. M., Yasir, S., Ahmad, A., Jehangir, A., & Mujataba, H. J. (2022). Forensic analysis on internet of things (IoT) device using machine to machine (M2 M) framework. Electronics, 11(7), 1126. [Google Scholar] [CrossRef]
  25. Khan, S. R., Sikandar, M., Almogren, A., Din, I. U., & Guerrieri, A. (2020). IoMT–Based computational approach for detecting brain tumor. Future Generation Computer Systems, 109, 360-367. [Google Scholar] [CrossRef]
  26. Pradhan, A., Sekhar, K. R., & Swain, G. (2018). Digital image steganography using LSB substitution, PVD, and EMD. Mathematical Problems in Engineering, 2018(1), [Google Scholar] [CrossRef]
  27. Sahu, A. K., & Swain, G. (2019). Data hiding using adaptive LSB and PVD technique resisting PDH and RS analysis. International Journal of Electronic Security and Digital Forensics, 11(4), 458-476. [Google Scholar] [CrossRef]
  28. Maji, G., Mandal, S., Sen, S., Debnath, N. C. (2018). JanuaryDual image based LSB steganography. 2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom), pp. 61–66. Ho Chi Minh City, Vietnam.
  29. Wu, N. I., Wu, K. C., & Wang, C. M. (2012). Exploring pixel-value differencing and base decomposition for low distortion data embedding. Applied Soft Computing, 12(2), 942-960. [Google Scholar] [CrossRef]
  30. Yadav, G. S., Ojha, A. (2018). AugustA reversible data hiding scheme with high security and improved embedding capacity. 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 1555–1559. New York, NY, USA.
  31. Chan, C. K., & Cheng, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37(3), 469-474. [Google Scholar] [CrossRef]
  32. Bibi, N., Sikandar, M., Din, I. U., Almogren, A., & Ali, S. (2020). IoMT-Based automated detection and classification of leukemia using deep learning. Journal of Healthcare Engineering, 2020, [Google Scholar] [CrossRef]
  33. Mohammadi, A., Nakhkash, M., & Akhaee, M. A. (2020). A high-capacity reversible data hiding in encrypted images employing local difference predictor. IEEE Transactions on Circuits and Systems for Video Technology, 30(8), 2366-2376. [Google Scholar] [CrossRef]
  34. Lin, C. C., & Tsai, W. H. (2004). Secret image sharing with steganography and authentication. Journal of Systems and Software, 73(3), 405-414. [Google Scholar] [CrossRef]
  35. Luo, X. Y., Wang, D. S., Wang, P., & Liu, F. L. (2008). A review on blind detection for image steganography. Signal Processing, 88(9), 2138-2157. [Google Scholar] [CrossRef]
  36. Yadav, G. S., & Ojha, A. (2018). Secure data hiding scheme using shape generation algorithm: A key based approach. Multimedia Tools and Applications, 77(13), 16319-16345. [Google Scholar] [CrossRef]
  37. Liao, X., Hahsmi, M. A., & Haider, R. (2018). An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Optik–International Journal for Light and Electron Optics, 153, 117-134. [Google Scholar] [CrossRef]
  38. Valandar, M. Y., Barani, M. J., & Ayubi, P. (2019). A fast color image encryption technique based on three dimensional chaotic map. Optik, 193, 162921. [Google Scholar] [CrossRef]
  39. Gndurc, J. (2015). State-of-the-art review on steganographic techniques. . Image Processing and Pattern Recognition, 8(7), 161-170. [Google Scholar] [CrossRef]
  40. Rabara, V., & Goswami, A. (2015). A survey of image based steganography. International Journal of Computer Engineering and Sciences, 1(2), 1-4. [Google Scholar] [CrossRef]
  41. Shaik, A., Thanikaiselvan, V., & Amitharajan, R. (2017). Data security through data hiding in images: A review. Journal of Artificial Intelligence, 10(1), 1-21. [Google Scholar] [CrossRef]
  42. Sahu, A. K., & Swain, G. (2016). A review on LSB substitution and PVD based image steganography techniques. Indonesian Journal of Electrical Engineering and Computer Science, 2(3), 712-719. [Google Scholar] [CrossRef]
  43. Dumitrescu, S., Wu, X., Memon, N. (2002). SeptemberOn steganalysis of random LSB embedding in continuous-tone images. Proc. International Conference on Image Processing, pp. 641–644. Rochester, NY, USA.
  44. Almogren, A. S. (2015). Developing a powerful and resilient smart body sensor network through hypercube interconnection. International Journal of Distributed Sensor Networks, 11(10), 609-715. [Google Scholar]
  45. Liao, X., Yin, J., Guo, S., Li, X., & Sangaiah, A. K. (2018). Medical JPEG image steganography based on preserving inter-block dependencies. Computers & Electrical Engineering, 67, 320-329. [Google Scholar] [CrossRef]
  46. Ni, Z., Shi, Y. Q., Ansari, N., & Su, W. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16(3), 354-362. [Google Scholar] [CrossRef]
  47. Sahu, A. K., & Swain, G. (2018). Pixel overlapping image steganography using PVD and modulus function. 3D Research, 9(3), 1-14. [Google Scholar] [CrossRef]
  48. Tian, J. (2003). Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 890-896. [Google Scholar] [CrossRef]
  49. Iranpour, M. (2013). OctoberLSB–Based steganography using Hamiltonian paths. 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 586–589. Beijing, China.
  50. Iranpour, M., & Safabakhsh, R. (2015). Reducing the embedding impact in steganography using Hamiltonian paths and writing on wet paper. Multimedia Tools and Applications, 74(17), 6657-6670. [Google Scholar] [CrossRef]
  51. Sahu, A. K., & Swain, G. (2019). High fidelity based reversible data hiding using modified LSB matching and pixel difference. Journal of King Saud University–Computer and Information Sciences, 34(4), 1395-1409. [Google Scholar] [CrossRef]
  52. Zhang, W., Wang, S., Han, W., Yu, H., & Zhu, Z. (2020). An image encryption algorithm based on random Hamiltonian path. Entropy, 22(1), 73. [Google Scholar] [CrossRef]
  53. Bailey, K., & Curran, K. (2006). An evaluation of image based steganography methods. Multimedia Tools and Applications, 30(1), 55-88. [Google Scholar] [CrossRef]
  54. Jassim, F. A. (2013). A novel steganography algorithm for hiding text in image using five modulus method. arXiv preprint arXiv:1307.0642.
  55. Muhammad, K., Ahmad, J., Farman, H., Jan, Z., & Sajjad, M. (2015). A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Transactions on Internet and Information Systems , 9(5), 1938-1962. [Google Scholar] [CrossRef]
  56. Rehman, A., Saba, T., Mahmood, T., Mehmood, Z., & Shah, M. (2019). Data hiding technique in steganography for information security using number theory. Journal of Information Science, 45(6), 767-778. [Google Scholar] [CrossRef]

Cite This Article

Kanwal, S., Tao, F., Almogren, A., Rehman, A. U., Taj, R. et al. (2023). A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System. CMES-Computer Modeling in Engineering & Sciences, 134(1), 201–219. https://doi.org/10.32604/cmes.2022.020255


cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1368

    View

  • 735

    Download

  • 1

    Like

Share Link