Abstract
The process of content confidentiality of the medical diagnostic reports and the scanned image of patients among doctors with balancing proficiency for mutual dealing will provide utmost care through faster and significant decisions. The medical field's present-day technology with information technology has made it possible to deliver and distribute digital information in a more comfortable way at a faster rate. This simpleness of the content makes the issue of exhibiting the transmitted digital content on the network with the chance of illegal interception. Traditional cryptographic mechanisms follow the trend of encrypting the content before transmission to improve content confidentiality. However, the encrypted information's visual aspect makes the intruder focus more on the range, leading to malicious attacks. Hence the routine of data hiding has received substantial aid as an alternative way to ensure information security. This paper presents a biomedical data concealment procedure with Sudoku based scrambling on Biomedical DICOM image and Queen Traversal pattern for locating the pels over the DICOM image. It hides the confidential medical data in the scrambled or encrypted cover images. Experimental outcomes establish the efficacy of the system viz-a-viz respective parameters of interest.
Similar content being viewed by others
References
Schneier, B. (2007). Applied cryptography protocols (2 ed.). Algorithm and source code in C. Wiley India Edition.
Bender, W., Butera, W., Gruhl, D., Hwang, R., Paiz, F. J., & Pogreb, S. (2000). Applications for data hiding. IBM Systems Journal, 39(3 & 4), 547–568
Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3 & 4), 313–336
Chan, C. K., & Chen, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37(3), 469–474
Narayanan, P., Sengan, S., Pudhupalayam Marimuthu, B., et al. (2021). Analysis and design of fuzzy-based manoeuvring model for mid-vehicle collision avoidance system. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02737-x
Katzenbeisser, S., & Petitcolas, F. A. P. (2000). Information hiding techniques for steganography and digital watermarking. Norwood, MA: Artech House.
Liu, Q., Sung, A. H., Qiao, M., Chen, Z., & Ribeiro, B. (2010). An improved approach to steganalysis of JPEG images. Information Sciences, 180, 1643–1655
Zhang, T., Li, W., Zhang, Y., Zheng, E., & Ping, X. (2010). Steganalysis of LSB matching based on statistical modeling of pixel difference distributions. Information Sciences, 180, 4685–4694
Westfeld, A. (2005). Space-filling curves in steganalysis. In: E. J. Delp, III, & P. W. Wong (Eds.), Security, steganography and watermarking of multimedia contents VII SPIE 5681 (pp. 28–37).
Luo, X.-Y., Wang, D.-S., Wang, P., & Liu, F.-L. (2008). A review on blind detection for image steganography. Signal Processing, 88, 2138–2157
Chang, C.-C., Wen-Chuan, Wu., & Chen, Y.-H. (2008). Joint coding and embedding techniques for multimedia images. Information Sciences, 178(18), 3543–3556
Chang, C.-C. (2010). The Duc Kieu, A reversible data hiding scheme using complementary embedding strategy. Information Sciences, 180, 3045–3058
Zhang, F., Pan, Z., Cao, K., Zheng, F., & Wu, F. (2008). The upper and lower bounds of the information-hiding capacity of digital images. Information Sciences, 178(14–15), 2950–2959
Chang, C.-C., Lin, C.-Y., & Wang, Y.-Z. (2006). New image steganographic methods using run-length approach. Information Sciences, 176, 3393–3408
Chang, C.-C., Lin, C.-Y., & Fan, Y.-H. (2008). Lossless data hiding for color images based on block truncation coding. Pattern Recognition, 41(7), 2347–2357
Sagan, H. (1994). Space-filling curves. New York: Springer.
Provos, N., & Honeyman, P. (2003). Hide and seek: an introduction to steganography. IEEE Security & Privacy Magazine, 1, 32–44
Chang, C.-C., Pai, P.-Y., Yeh, C.-M., & Chan, Y.-K. (2010). A high payload frequency-based reversible image hiding method. Information Sciences, 180, 2286–2298
Chen, P.-Y., & Lin, H.-J. (2006). A DWT based approach for image steganography. International Journal of Applied Science and Engineering, 4(3), 275–290
Thien, C. C., & Lin, J. C. (2003). A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition, 36(11), 2875–2881
Wang, R. Z., Lin, C. F., & Lin, J. C. (2000). Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 34(3), 671–683
Yang, C. H. (2008). Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recognition, 41, 2674–2683
Aura, T. (1996). Practical invisibility in digital communication. In: Proceedings of the workshop on information hiding, LNCS 1174 (pp. 265–278).
Wang, C. M., Wu, N. I., Tsai, C. S., & Hwang, M. S. (2008). A high-quality steganography method with pixel-value differencing and modulus function. Journal of System and Software, 81(1), 150–158
Park, Y.-R., Kang, H.-H., Shin, S.-U., & Kwon, K.-R., et al. (2005). An image steganography using pixel characteristics. In Y. Hao (Ed.), CIS 2005, Part II, LNAI 3802. (pp. 581–588). Berlin: Springer.
Chang, C. C., Chen, T. S., & Chung, L. Z. (2002). A steganographic method based upon JPEG and quantization table modification. Information Sciences, 141, 123–138
Li, X., & Wang, J. (2007). A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Sciences, 177, 3099–3109
Raghupathy, B. K., Kumar, N. R., & Raajan, N. R. (2014). An enhanced bishop tour scheme for information hiding. International Journal of Applied Engineering Research, 9(1), 145–151
Manikandan, G., Bala Krishnan, R., Varadharajan, R., & Dharshini, G. (2014). An 8-queen algorithm based steganographic approach for secure key exchange. International Journal of Applied Engineering Research, 9(7), 763–769
Ganesh Kumar, K., & Sengan, S. (2020). Improved network traffic by attacking denial of service to protect resource using Z-test based 4-tier geomark traceback (Z4TGT). Wireless Personal Communications, 114, 3541–3575. https://doi.org/10.1007/s11277-020-07546-1
Yue, Wu., Zhou, Y., Noonan, J. P., & Agaian, S. (2014). Design of image cipher using Latin squares. Information Sciences, 264, 317–339
Wu, Y., Agaian, S. S., & Noonan, J. P. (2012). Sudoku associated two dimensional bijections for image scrambling. http://arxiv.org/abs/1207.5856.
Wu, Y., Zhou, Y., Noonan, J. P., Panetta, K., Agaian, S. (2010). Image encryption using the sudoku matrix. In: S. S. Agaian & S. A. Jassim (Eds.) SPIE, vol. 7708, no. 1, p. 77080P.
Hemanth, J., & Uma Maheswari, S. (2017). Performances enhanced image steganography systems using transforms and optimization techniques. Multimedia Tools and Applications, 76(1), 415–436
Manikandan, G., Krishnan, R. B., Kumar, N. R., Narasimhan, D., Srinivasan, A., & Raajan, N. R. (2018). Steganographic approach to enhancing secure data communication using contours and clustering. Multimedia Tools and Applications, 77(24), 32257–32273
Manisha, S., & Sree Sharmila, T. (2018). A two-level secure data hiding algorithm for video steganography. Multidimensional Systems and Signal Processing. https://doi.org/10.1007/s11045-018-0568-2
Ansari, A. S., Mohammadi, M. S., & Parvez, M. T. (2019). A comparative study of recent steganography techniques for multiple image formats. International Journal of Computer Network and Information Security., 11(1), 11
Manikandan, G., et al. (2019). An approach with steganography and scrambling mechanism for hiding image over images. International Journal on Emerging Technologies, 10(1), 64–67
Alia, M., & Suwais, K. (2020). Improved steganography scheme based on fractal set. The International Arab Journal of Information Technology, 17(1), 128–136
Funding
Not applicable.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Bala Krishnan, R., Rajesh Kumar, N., Raajan, N.R. et al. An Approach for Attaining Content Confidentiality on Medical Images Through Image Encryption with Steganography. Wireless Pers Commun 127, 979–995 (2022). https://doi.org/10.1007/s11277-021-08477-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08477-1