Skip to main content
Log in

An Approach for Attaining Content Confidentiality on Medical Images Through Image Encryption with Steganography

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The process of content confidentiality of the medical diagnostic reports and the scanned image of patients among doctors with balancing proficiency for mutual dealing will provide utmost care through faster and significant decisions. The medical field's present-day technology with information technology has made it possible to deliver and distribute digital information in a more comfortable way at a faster rate. This simpleness of the content makes the issue of exhibiting the transmitted digital content on the network with the chance of illegal interception. Traditional cryptographic mechanisms follow the trend of encrypting the content before transmission to improve content confidentiality. However, the encrypted information's visual aspect makes the intruder focus more on the range, leading to malicious attacks. Hence the routine of data hiding has received substantial aid as an alternative way to ensure information security. This paper presents a biomedical data concealment procedure with Sudoku based scrambling on Biomedical DICOM image and Queen Traversal pattern for locating the pels over the DICOM image. It hides the confidential medical data in the scrambled or encrypted cover images. Experimental outcomes establish the efficacy of the system viz-a-viz respective parameters of interest.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Schneier, B. (2007). Applied cryptography protocols (2 ed.). Algorithm and source code in C. Wiley India Edition.

  2. Bender, W., Butera, W., Gruhl, D., Hwang, R., Paiz, F. J., & Pogreb, S. (2000). Applications for data hiding. IBM Systems Journal, 39(3 & 4), 547–568

    Article  Google Scholar 

  3. Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3 & 4), 313–336

    Article  Google Scholar 

  4. Chan, C. K., & Chen, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37(3), 469–474

    Article  MATH  Google Scholar 

  5. Narayanan, P., Sengan, S., Pudhupalayam Marimuthu, B., et al. (2021). Analysis and design of fuzzy-based manoeuvring model for mid-vehicle collision avoidance system. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02737-x

    Article  Google Scholar 

  6. Katzenbeisser, S., & Petitcolas, F. A. P. (2000). Information hiding techniques for steganography and digital watermarking. Norwood, MA: Artech House.

    Google Scholar 

  7. Liu, Q., Sung, A. H., Qiao, M., Chen, Z., & Ribeiro, B. (2010). An improved approach to steganalysis of JPEG images. Information Sciences, 180, 1643–1655

    Article  Google Scholar 

  8. Zhang, T., Li, W., Zhang, Y., Zheng, E., & Ping, X. (2010). Steganalysis of LSB matching based on statistical modeling of pixel difference distributions. Information Sciences, 180, 4685–4694

    Article  Google Scholar 

  9. Westfeld, A. (2005). Space-filling curves in steganalysis. In: E. J. Delp, III, & P. W. Wong (Eds.), Security, steganography and watermarking of multimedia contents VII SPIE 5681 (pp. 28–37).

  10. Luo, X.-Y., Wang, D.-S., Wang, P., & Liu, F.-L. (2008). A review on blind detection for image steganography. Signal Processing, 88, 2138–2157

    Article  MATH  Google Scholar 

  11. Chang, C.-C., Wen-Chuan, Wu., & Chen, Y.-H. (2008). Joint coding and embedding techniques for multimedia images. Information Sciences, 178(18), 3543–3556

    Article  Google Scholar 

  12. Chang, C.-C. (2010). The Duc Kieu, A reversible data hiding scheme using complementary embedding strategy. Information Sciences, 180, 3045–3058

    Article  Google Scholar 

  13. Zhang, F., Pan, Z., Cao, K., Zheng, F., & Wu, F. (2008). The upper and lower bounds of the information-hiding capacity of digital images. Information Sciences, 178(14–15), 2950–2959

    Article  MathSciNet  Google Scholar 

  14. Chang, C.-C., Lin, C.-Y., & Wang, Y.-Z. (2006). New image steganographic methods using run-length approach. Information Sciences, 176, 3393–3408

    Article  MathSciNet  Google Scholar 

  15. Chang, C.-C., Lin, C.-Y., & Fan, Y.-H. (2008). Lossless data hiding for color images based on block truncation coding. Pattern Recognition, 41(7), 2347–2357

    Article  MATH  Google Scholar 

  16. Sagan, H. (1994). Space-filling curves. New York: Springer.

    Book  MATH  Google Scholar 

  17. Provos, N., & Honeyman, P. (2003). Hide and seek: an introduction to steganography. IEEE Security & Privacy Magazine, 1, 32–44

    Article  Google Scholar 

  18. Chang, C.-C., Pai, P.-Y., Yeh, C.-M., & Chan, Y.-K. (2010). A high payload frequency-based reversible image hiding method. Information Sciences, 180, 2286–2298

    Article  Google Scholar 

  19. Chen, P.-Y., & Lin, H.-J. (2006). A DWT based approach for image steganography. International Journal of Applied Science and Engineering, 4(3), 275–290

    Google Scholar 

  20. Thien, C. C., & Lin, J. C. (2003). A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition, 36(11), 2875–2881

    Article  MATH  Google Scholar 

  21. Wang, R. Z., Lin, C. F., & Lin, J. C. (2000). Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 34(3), 671–683

    Article  MATH  Google Scholar 

  22. Yang, C. H. (2008). Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recognition, 41, 2674–2683

    Article  MATH  Google Scholar 

  23. Aura, T. (1996). Practical invisibility in digital communication. In: Proceedings of the workshop on information hiding, LNCS 1174 (pp. 265–278).

  24. Wang, C. M., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2008). A high-quality steganography method with pixel-value differencing and modulus function. Journal of System and Software, 81(1), 150–158

    Article  Google Scholar 

  25. Park, Y.-R., Kang, H.-H., Shin, S.-U., & Kwon, K.-R., et al. (2005). An image steganography using pixel characteristics. In Y. Hao (Ed.), CIS 2005, Part II, LNAI 3802. (pp. 581–588). Berlin: Springer.

    Google Scholar 

  26. Chang, C. C., Chen, T. S., & Chung, L. Z. (2002). A steganographic method based upon JPEG and quantization table modification. Information Sciences, 141, 123–138

    Article  MATH  Google Scholar 

  27. Li, X., & Wang, J. (2007). A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Sciences, 177, 3099–3109

    Article  Google Scholar 

  28. Raghupathy, B. K., Kumar, N. R., & Raajan, N. R. (2014). An enhanced bishop tour scheme for information hiding. International Journal of Applied Engineering Research, 9(1), 145–151

    Google Scholar 

  29. Manikandan, G., Bala Krishnan, R., Varadharajan, R., & Dharshini, G. (2014). An 8-queen algorithm based steganographic approach for secure key exchange. International Journal of Applied Engineering Research, 9(7), 763–769

    Google Scholar 

  30. Ganesh Kumar, K., & Sengan, S. (2020). Improved network traffic by attacking denial of service to protect resource using Z-test based 4-tier geomark traceback (Z4TGT). Wireless Personal Communications, 114, 3541–3575. https://doi.org/10.1007/s11277-020-07546-1

    Article  Google Scholar 

  31. Yue, Wu., Zhou, Y., Noonan, J. P., & Agaian, S. (2014). Design of image cipher using Latin squares. Information Sciences, 264, 317–339

    Article  MathSciNet  MATH  Google Scholar 

  32. Wu, Y., Agaian, S. S., & Noonan, J. P. (2012). Sudoku associated two dimensional bijections for image scrambling. http://arxiv.org/abs/1207.5856.

  33. Wu, Y., Zhou, Y., Noonan, J. P., Panetta, K., Agaian, S. (2010). Image encryption using the sudoku matrix. In: S. S. Agaian & S. A. Jassim (Eds.) SPIE, vol. 7708, no. 1, p. 77080P.

  34. Hemanth, J., & Uma Maheswari, S. (2017). Performances enhanced image steganography systems using transforms and optimization techniques. Multimedia Tools and Applications, 76(1), 415–436

    Article  Google Scholar 

  35. Manikandan, G., Krishnan, R. B., Kumar, N. R., Narasimhan, D., Srinivasan, A., & Raajan, N. R. (2018). Steganographic approach to enhancing secure data communication using contours and clustering. Multimedia Tools and Applications, 77(24), 32257–32273

    Article  Google Scholar 

  36. Manisha, S., & Sree Sharmila, T. (2018). A two-level secure data hiding algorithm for video steganography. Multidimensional Systems and Signal Processing. https://doi.org/10.1007/s11045-018-0568-2

    Article  MATH  Google Scholar 

  37. Ansari, A. S., Mohammadi, M. S., & Parvez, M. T. (2019). A comparative study of recent steganography techniques for multiple image formats. International Journal of Computer Network and Information Security., 11(1), 11

    Article  Google Scholar 

  38. Manikandan, G., et al. (2019). An approach with steganography and scrambling mechanism for hiding image over images. International Journal on Emerging Technologies, 10(1), 64–67

    Google Scholar 

  39. Alia, M., & Suwais, K. (2020). Improved steganography scheme based on fractal set. The International Arab Journal of Information Technology, 17(1), 128–136

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Manikandan.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bala Krishnan, R., Rajesh Kumar, N., Raajan, N.R. et al. An Approach for Attaining Content Confidentiality on Medical Images Through Image Encryption with Steganography. Wireless Pers Commun 127, 979–995 (2022). https://doi.org/10.1007/s11277-021-08477-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08477-1

Keywords

Navigation