Abstract
Some medical accidents in hospitals are related to mismanagement of medical images X-ray and computer tomography (CT). A counterfeit medical image leads to medical accidents. Thus, security of medical images is important for patient safety. Data hiding can help patients avoid mistakes of doctors or nurses who confuse patient X-rays or CT scans. A hybrid data hiding scheme was applied that combined the Hamming code and LSB with an optimal pixel adjustment process algorithm for encoding to conceal hidden patient information. In addition, quality and capacity of stego-images were improved. Experimental results confirmed that the hiding capacity provided by this strategy is greater than for other schemes. Moreover, the image quality of stego-images with the proposed scheme remained more than 50 dB for most medical test images. In this experiment, we verified the proposed steganographic data hiding scheme as RS steganalysis.
Similar content being viewed by others
References
Sebastian, S., Jacob, N.R., Manmadhan, Y., Anand, V.R., Jayashree, M.J.: Remote patient monitoring system. Int. J. Distrib. Parallel Syst. 3(5), 99–110 (2012)
Kim, C.: Data hiding by an improved exploiting modification direction. Multimed. Tools Appl. 69(3), 569–584 (2014)
Yang, C.N., Ye, G.C., Kim, C.: Data hiding in halftone images by XOR block-wise operation with difference minimization. KSII Trans. Internet Inf. Syst. (TIIS) 5(2), 457–476 (2011)
Kim, C., Shin, D.K., Shin, D.I.: Data Hiding in a halftone image using Hamming code (15, 11). Lect. Notes Comput. Sci. 6592, 372–381 (2011)
Kim, C.: Data hiding based on compressed dithering images. Stud. Comput. Intell. 283, 89–98 (2010)
Huy, P.T., Thanh, N.H., Kim, C., Yang, C.N.: Data hiding for halftone images using an improved CPT scheme. KSII Trans. Internet Inf. Syst. (TIIS) 7(2), 405–424 (2013)
Tseng, Y.-C., Chen, Y.-Y., Pan, H.-K.: A secure data hiding scheme for binary images. IEEE Trans. Commun. 50(8), 1227–1231 (2002)
Willems, F., Dijk, M.: Capacity and codes for embedding information in gray-scale signals. IEEE Trans. Inf. Theory 51(3), 1209–1214 (2005)
Fridrich, J., Goljan, M.: Digital image steganography using stochastic modulation. In: Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, vol. 5020, pp. 191–202. Santa Clara, California (2003)
Fridrich, J., Goljan, M., Du, R.: Reliable Detection of LSB Steganography in Color and Grayscale Images. In: MM&Sec ’01 Proceedings of the 2001 workshop on Multimedia and security: new challenges, pp. 27–30 (2001)
Luo, W., Huang, F., Huang, J.: Edge adaptive image Steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–213 (2010)
Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)
Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools. Appl. 75(4), 1947–1962 (2016)
Bierbraue, J., Fridrich, J.: Constructing good covering codes for applications in steganography. Trans. Data Hiding Multimed. Secur. III, 1–22 (2008)
Crandall, R.: Some notes on steganography, (1998) http://dde.binghamton.edu/download/Crandallmatrix
Westfeld, A.: F5: aA steganographic algorithm. In: Proceedings of the 4th International Workshop on Information Hiding 2001, Lecture Notes in Computer Science, vol. 2137, pp. 289–302. Pittsburgh, PA, USA (2004)
Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)
Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)
Chang, C.C., Kieu, T.D., Chou, Y.C.: A high payload steganographic scheme based on (7, 4) hamming code for digital Images. In: Electronic Commerce and Security 2008 Symposium, pp. 16–21 (2008)
Zhang, W., Wang, S., Zhang, X.: Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun. Lett. 11(8), 680–682 (2007)
Tao, H., Chongmin, L., Zain, J.M., Abdalla, A.N.: Robust image watermarking theories and techniques: a review. J. Appl. Res. Technol. 12(1), 122–138 (2014)
Nikolaidis, N., Pitas, I.: Digital image watermark: an overview. In: IEEE International Conference on multimedia computing and systems, vol. 1, pp. 1–6 (1999)
Shen, Q., Liu, G., Liu, W., Dai, Y.: Adaptive image steganography based on pixel selection. In: 2015 IEEE International Conference on progress in informatics and computing (PIC), pp. 623–627 (2015)
Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5, 201–214 (2010)
Bas, P., Filler, T., Pevny, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. Lect. Notes Comput. Sci. 6958, 59–70 (2011)
Oravec, J., Turn, J. Ovsenk : LSB steganography with usage of Mojette Transform for secret image scrambling. In: International Conference on Systems, Signals and Image Processing (IWSSIP), pp. 1–4, (2016)
Zhang, L., Li, H.: A product code in steganography with improved embedding rate. In: 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference, pp. 246–250 (2016)
Rifa-Pous, H., Rifa, J.: Product perfect codes and steganography. Digit. Signal Proc. 19(4), 764–769 (2009)
Baek, J., Kim, C., Fisher, P.S., Chao, H.: (N, 1) secret sharing approach based on steganography with gray digital images, Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on, pp. 325–329 (2010)
Krishna, M.M., Roberts, N.: Enhancement of embedding capacity and security in reversible steganography. In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 803–807 (2016)
Chang, C.K.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469474 (2004)
Acknowledgements
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2015R1D1A1A01059253). This work was supported under the framework of international cooperation program managed by the National Research Foundation of Korea (2016K2A9A2A05005255).
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Kim, C., Shin, D., Kim, BG. et al. Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP. J Real-Time Image Proc 14, 115–126 (2018). https://doi.org/10.1007/s11554-017-0674-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11554-017-0674-7