Multimedia Tools and Applications

, Volume 76, Issue 3, pp 3519–3536 | Cite as

Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices

  • Muhammad Sajjad
  • Khan Muhammad
  • Sung Wook Baik
  • Seungmin Rho
  • Zahoor Jan
  • Sang-Soo Yeo
  • Irfan Mehmood


In this paper, the problem of outsourcing the selective encryption of a medical image to cloud by resource-constrained devices such as smart phone is addressed, without revealing the cover image to cloud using steganography. In the proposed framework, the region of interest of the medical image is first detected using a visual saliency model. The detected important data is then embedded in a host image, producing a stego image which is outsourced to cloud for encryption. The cloud which has powerful resources, encrypts the image and sent back the encrypted marked image to the client. The client can then extract the selectively encrypted region of interest and can combine it with the region of non-interest to form a selectively encrypted image, which can be sent to medical specialists and healthcare centers. Experimental results and analysis validate the effectiveness of the proposed framework in terms of security, image quality, and computational complexity and verify its applicability in remote patient monitoring centers.


Medical image processing Image steganography Visual saliency models Selective image encryption Mobile-cloud computing Information security Resource-constrained devices 



This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education (2013R1A1A2061978).


  1. 1.
    Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate Array on RGB indicator. International Journal of Signal and Image Processing 1:196–204Google Scholar
  2. 2.
    Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293–306CrossRefGoogle Scholar
  3. 3.
    Almeida J, Leite NJ, Torres R d S (2012) Vison: Video summarization for online applications,. Pattern Recogn Lett 33:397–409Google Scholar
  4. 4.
    Al-Otaibi NA, Gutub AA (2014a) 2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers,. Lecture Notes on Information Theory Vol 2Google Scholar
  5. 5.
    Al-Otaibi NA, Gutub AA (2014b) Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority,. Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014):250–256Google Scholar
  6. 6.
    Nouf Alotaibi, Adnan Gutub, and Esam Khan, stego-system for hiding text in images of personal computers, The 12th Learning and Technology Conference, 2015.Google Scholar
  7. 7.
    Bruce N, Tsotsos J (2005) Saliency based on information maximization,. Adv Neural Inf Proces Syst:155–162Google Scholar
  8. 8.
    Buke A, Gaoli F, Yongcai W, Lei S, Zhiqi Y (2015) “healthcare algorithms by wearable inertial sensors: a survey,” Communications. China 12:1–12Google Scholar
  9. 9.
    Chen Y, Lee J (2012) A review of machine-vision-based analysis of wireless capsule endoscopy video. Diagnostic and therapeutic endoscopy, vol 2012Google Scholar
  10. 10.
    Chih-Yang L, Chang C-C, Yu-Zheng W (2008) Reversible steganographic method with high payload for JPEG images. IEICE Trans Inf Syst 91:836–845Google Scholar
  11. 11.
    de Avila SEF, Lopes APB, da Luz A, de Albuquerque Araújo A (2011) VSUMM: a mechanism designed to produce static video summaries and a novel evaluation method. Pattern Recogn Lett 32:56–68CrossRefGoogle Scholar
  12. 12.
    Ejaz N, Mehmood I, Baik SW (2013) MRT letter: visual attention driven framework for hysteroscopy video abstraction. Microsc Res Tech 76:559–563CrossRefGoogle Scholar
  13. 13.
    Erdem E, Erdem A (2013) Visual saliency estimation by nonlinearly integrating features using region covariances. J Vis 13:11–11CrossRefGoogle Scholar
  14. 14.
    Goferman S, Zelnik-Manor L, Tal A (2012) context-aware saliency detection, Pattern Analysis and Machine Intelligence. IEEE Transactions on 34:1915–1926Google Scholar
  15. 15.
    Gupta B, Joshi RC, Misra M (2009) Defending against distributed denial of service attacks: issues and challenges. Information Security Journal: A Global Perspective 18:224–247Google Scholar
  16. 16.
    Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence 2:56–64Google Scholar
  17. 17.
    Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A (2008) “pixel indicator high capacity technique for RGB image based steganography,” in WoSPA 2008-5th IEEE International Workshop on Signal Processing and its Applications Google Scholar
  18. 18.
    Gutub A, Al-Qahtani A, Tabakh A (2009) Triple-A: Secure RGB image steganography based on randomization, in Computer Systems and Applications, AICCSA 2009. IEEE/ACS International Conference on, 2009, pp. 400–403Google Scholar
  19. 19.
  20. 20.
    Hussain M, Wahab AWA, Anuar NB, Salleh R, Noor RM (2015) Pixel value differencing steganography techniques: Analysis and open challenge,. Consumer Electronics-Taiwan (ICCE-TW), 2015 I.E. International Conference on:21–22Google Scholar
  21. 21.
    Khan F, Gutub AA-A, (2007) message concealment techniques using image based steganography, in The 4th IEEE GCC Conference and Exhibition Google Scholar
  22. 22.
    Li X, Yang B, Cheng D, Zeng T (2009) a generalization of LSB matching, Signal Processing Letters. IEEE 16:69–72Google Scholar
  23. 23.
    Lin C-C, Liu X-L, Yuan S-M (2015) Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping. Inf Sci 293:314–326CrossRefGoogle Scholar
  24. 24.
    Liu Z, Zhang F, Wang J, Wang H, Huang J (2016) Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Processing 123:157–166Google Scholar
  25. 25.
    Lv Z, Chirivella J, Gagliardo P (2016) Bigdata oriented multimedia mobile health applications. J Med Syst 40:1–10CrossRefGoogle Scholar
  26. 26.
    Mehmood I, Sajjad M, Baik SW (2014a) Mobile-cloud assisted video summarization framework for efficient management of remote sensing data generated by wireless capsule sensors. Sensors 14:17112–17145CrossRefGoogle Scholar
  27. 27.
    Mehmood I, Sajjad M, Baik SW (2014b) Video summarization based tele-endoscopy: a service to efficiently manage visual data generated during wireless capsule endoscopy procedure. J Med Syst 38:1–9CrossRefGoogle Scholar
  28. 28.
    Mehmood I, Sajjad M, Ejaz W, Baik SW (2015) Saliency-directed prioritization of visual data in wireless surveillance networks. Information Fusion 24:16–30CrossRefGoogle Scholar
  29. 29.
    Mstafa RJ, Elleithy KM (2014) A highly secure video steganography using Hamming code (7, 4),. Systems, Applications and Technology Conference (LISAT), 2014 I.E. Long Island:1–6Google Scholar
  30. 30.
    Mstafa RJ, Elleithy KM (2015) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimedia Tools and Applications:1–23Google Scholar
  31. 31.
    Muhammad K, (2015) Steganography: A Secure way for Transmission in Wireless Sensor Networks, arXiv preprint arXiv:1511.08865, Google Scholar
  32. 32.
    Muhammad K, Ahmad J, Farman H, Zubair M (2014) A novel image steganographic approach for hiding text in color images using HSI color model. Middle-East J Sci Res 22:647–654Google Scholar
  33. 33.
    Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2015a) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications:1–27Google Scholar
  34. 34.
    Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015b) A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption,. KSII Transactions on Internet and Information Systems (TIIS) 9:1938–1962Google Scholar
  35. 35.
    Muhammad K, Ahmad J, Sajjad M, Zubair M (2015c) Secure image steganography using cryptography and image transposition. NED Univ J Res 12:81–91Google Scholar
  36. 36.
    Muhammad K, Mehmood I, Lee MY, Ji SM, Baik SW (2015d) Ontology-based secure retrieval of semantically significant visual contents. Journal of Korean Institute of Next Generation Computing 11:87–96Google Scholar
  37. 37.
    Muhammad K, Sajjad M, Baik SW (2016a) Dual-level security based Cyclic18 steganographic method and its application for secure transmission of Keyframes during wireless capsule endoscopy. J Med Syst 40:1–16CrossRefGoogle Scholar
  38. 38.
    Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2016b) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools and Applications:1–30Google Scholar
  39. 39.
    Muhammad K, Ahmad J, Sajjad M, Rho S, Baik SW (2016c) Evaluating the Suitability of Color Spaces for Image Steganography and Its Application in Wireless Capsule Endoscopy,. 2016 International Conference on Platform Technology and Service (PlatCon):1–3Google Scholar
  40. 40.
    Parvez MT, Gutub A-A (2008) RGB intensity based variable-bits image steganography,. Asia-Pacific Services Computing Conference, APSCC’08. IEEE 2008:1322–1327Google Scholar
  41. 41.
    Parvez MT, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38:127–142Google Scholar
  42. 42.
    Qin C, Chang C-C, Huang Y-H, Liao L-T (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Transactions on Circuits and Systems for Video Technology 23:1109–1118CrossRefGoogle Scholar
  43. 43.
    Salvatore M, Margolies L, Kale M, Wisnivesky J, Kotkin S, Henschke CI, et al. (2014) Breast density: comparison of chest CT with mammography. Radiology 270:67–73CrossRefGoogle Scholar
  44. 44.
    Singh AK, Kumar B, Dave M, Mohan A (2015a) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5:607–614CrossRefGoogle Scholar
  45. 45.
    Singh AK, Dave M, Mohan A (2015b) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools and Applications:1–21Google Scholar
  46. 46.
    Tewari A, Jain A, Gupta B (2016) Recent survey of various defense mechanisms against phishing attacks. Journal of Information Privacy and Security 12:3–13CrossRefGoogle Scholar
  47. 47.
    Wang L, Song H, Liu P (2016) A novel hybrid color image encryption algorithm using two complex chaotic systems. Opt Lasers Eng 77:118–125CrossRefGoogle Scholar
  48. 48.
    Wu H, Wang H (2013) Multibit color-mapping steganography using depth-first search,. Biometrics and Security Technologies (ISBAST), 2013 International Symposium on:224–229Google Scholar
  49. 49.
    Wu H, Wang H, Zhao H, Yu X (2015) Multi-layer assignment steganography using graph-theoretic approach. Multimedia Tools and Applications 74:8171–8196CrossRefGoogle Scholar
  50. 50.
    Xiang T, Wong K-w, Liao X (2007) Selective image encryption using a spatiotemporal chaotic system. Chaos: An Interdisciplinary Journal of Nonlinear Science 17:023115CrossRefMATHGoogle Scholar
  51. 51.
    Xiang T, Hu J, Sun J (2015) Outsourcing chaotic selective image encryption to the cloud with steganography. Digital Signal Processing 43:28–37CrossRefGoogle Scholar
  52. 52.
    Yang J-J, Li J, Mulder J, Wang Y, Chen S, Wu H, et al. (2015a) Emerging information technologies for enhanced healthcare. Comput Ind 69:3–11CrossRefGoogle Scholar
  53. 53.
    Yang J, Lin Y, Gao Z, Lv Z, Wei W, Song H (2015b) Quality index for stereoscopic images by separately evaluating adding and subtracting. PLoS One 10:e0145800CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Digital Image Processing Laboratory, Department of Computer ScienceIslamia College PeshawarPeshawarPakistan
  2. 2.Intelligent Media Laboratory, Department of Digital Contents, College of Electronics and Information EngineeringSejong UniversitySeoulRepublic of Korea
  3. 3.Department of Media SoftwareSungkyul UniversityAnyangRepublic of Korea
  4. 4.Division of Convergence Computer & MediaMokwon UniversityDaejeonRepublic of Korea
  5. 5.Department of Computer Science and EngineeringSejong UniversitySeoulRepublic of Korea

Personalised recommendations