Advertisement

Effective payload and improved security using HMT Contourlet transform in medical image steganography

  • S. Jeevitha
  • N. Amutha PrabhaEmail author
Original Paper
  • 16 Downloads
Part of the following topical collections:
  1. Internet Of Medical Things In E-Health

Abstract

This paper implements a novel approach for image steganography based on Hidden Markov Tree (HMT) Contourlet transform. In this paper, the biomedical image considers as a cover image and it is mapped to a specific frequency domain by applying HMT Contourlet transform. Then canny edge detection method implemented to detect the smooth edges to hide the secret data. The secret data is encrypted by using Paillier cryptosystem in a new location of the cover image. Particle Swarm Optimization (PSO) algorithm developed for the selection of the best place to locate the number of particles in a new location. The proposed method prevents the medical image from the various attacks such as rotate, crop, histogram, salt & pepper, blur and resize provides the robustness, thereby reduces to 8.19%, 10.88%, 24.03%, 15.27%, 13.21% and 14.35%. The performance measures of Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) are calculated to show the better performance compared with the existing techniques.

Keywords

Optimal pixel adjustment process Hidden Markov tree Contourlet transform Particle swarm optimization Paillier cryptosystem 

Notes

Compliance with ethical standards

Conflict of interest

The authors S. Jeevitha and N. Amutha Prabha declare that they have no conflict of interest.

Research involving human participants and/or animals

1) Statement of Human Rights

Ethical approval: For this type of study formal consent is not required.

2) Statement on the Welfare of Animals

Ethical approval: This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Additional informed consent was not obtained from all individual participants for whom identifying information is included in this article.

References

  1. 1.
    Miri A, Faez K. An image steganography method based on integer wavelet transforms. Multimed Tools Appl. 2018;77(11):13133–44.CrossRefGoogle Scholar
  2. 2.
    Liao X, Yin J, Guo S, Li X, Sangaiah AK. Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng. 2018;67:320–9.CrossRefGoogle Scholar
  3. 3.
    Zakaria A, Hussain M, Wahab A, Idris M, Abdullah N, Jung KH. High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Appl Sci. 2018;8(11):2199.CrossRefGoogle Scholar
  4. 4.
    Hoang DB, Dang TD. Health data in cloud environments. In: Pacific Asia Conference on Information Systems. 2015.Google Scholar
  5. 5.
    Sajedi H, Jamzad M. CBS: contourlet-based steganalysis method. J Signal Process Sys. 2010;61(3):367–73.CrossRefGoogle Scholar
  6. 6.
    Ghasemi E, Shanbehzadeh J, Fassihi N. High capacity image steganography based on genetic algorithm and wavelet transform. In: Intelligent control and innovative computing. Boston: Springer; 2012. p. 395–404.Google Scholar
  7. 7.
    Bai J, Chang CC, Nguyen TS, Zhu C, Liu Y. A high payload steganographic algorithm based on edge detection. Displays. 2017;46:42–51.CrossRefGoogle Scholar
  8. 8.
    Rong W, Li Z, Zhang W, Sun L. An improved CANNY edge detection algorithm. In: Mechatronics and automation (ICMA), 2014 IEEE international conference on 2014 Aug 3 (pp. 577-582). IEEE.Google Scholar
  9. 9.
    De Carvalho RL, Da Silva WG, de Morais AH. Optimizing image steganography using particle swarm optimization algorithm. Int J Comput Appl. 2017;164(7).Google Scholar
  10. 10.
    Jeevitha S, Amutha Prabha N. A comprehensive review on steganographic techniques and implementation. ARPN Journal of Engineering and Applied Sciences. 2018;13(17).Google Scholar
  11. 11.
    Crouse MS, Nowak RD, Baraniuk RG. Wavelet-based statistical signal processing using hidden Markov models. IEEE Trans Signal Process. 1998 Apr;46(4):886–902.MathSciNetCrossRefGoogle Scholar
  12. 12.
    Shah M, Zhang W, Hu H, Zhou H, Mahmood T. Homomorphic encryption-based reversible data hiding for 3D mesh models. Arab J Sci Eng. 2018:1–3.Google Scholar
  13. 13.
    Ding L, Goshtasby A. On the canny edge detector. Pattern Recogn. 2001;34(3):721–5.CrossRefzbMATHGoogle Scholar
  14. 14.
    Jeevitha S, Amutha Prabha N. Performance analysis of encryption algorithm in medical image security. In: International conference on electrical, electronics, computers, communication, mechanical and computing (EECCMC), issue V. IEEE, 2018. p. 428–433.Google Scholar
  15. 15.
    Cao J, Chen L, Wang M, Tian Y. Implementing a parallel image edge detection algorithm based on the Otsu-canny operator on the Hadoop platform. Comput Intell Neurosci. 2018;2018:1–12.CrossRefGoogle Scholar
  16. 16.
    Do MN, Vetterli M. The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process. 2005;14(12):2091–106.CrossRefGoogle Scholar
  17. 17.
    Chun-Man YA, Bao-Long GU, Meng YI. Fast algorithm for nonsubsampled contourlet transforms. Acta Automat Sin. 2014;40(4):757–62.CrossRefGoogle Scholar
  18. 18.
    Fakhredanesh M, Rahmati M, Safabakhsh R. Adaptive image steganography using contourlet transforms. J Electron Imaging. 2013;22(4):043007.CrossRefGoogle Scholar
  19. 19.
    Po DY, Do MN. Directional multiscale modeling of images using the contourlet transforms. IEEE Trans Image Process. 2006;15(6):1610–20.MathSciNetCrossRefGoogle Scholar
  20. 20.
    Gai S, Yang G, Wan M, Wang L. Model of images using quaternion wavelet transform. Comput Electr Eng. 2014;40(3):819–32.CrossRefGoogle Scholar
  21. 21.
    Chhikara RR, Sharma P, Singh L. A hybrid feature selection approach based on improved PSO and filter approaches for image steganalysis. Int J Mach Learn Cybern. 2016;7(6):1195–206.CrossRefGoogle Scholar
  22. 22.
    Abdel-Basset M, Fakhry AE, El-Henawy I, Qiu T, Sangaiah AK. Feature and intensity based medical image registration using particle swarm optimization. J Med Syst. 2017;41(12):197.CrossRefGoogle Scholar
  23. 23.
    Shen L, Huang X, Fan C, Li Y. Enhanced mutual information-based medical image registration using a hybrid optimisation technique. Electron Lett. 2018;54(15):926–8.CrossRefGoogle Scholar
  24. 24.
    Shi H, Liu D, Lu H, Zhou C. A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing. Multimed Tools Appl. 2017:1–33.Google Scholar
  25. 25.
    Chen X, Zhong H, Qiu A. Reversible data hiding scheme in multiple encrypted images based on code division multiplexing. Multimed Tools Appl. 2018:1–8.Google Scholar
  26. 26.
    Wu X. An algorithm for reversible information hiding of encrypted medical images in homomorphic encrypted domain. Discrete & Continuous Dynamical Systems-S. 2019;12(4&5):1441–55.Google Scholar
  27. 27.
    Shin SH, Jung KH. Reversible data hiding method using meaningful encrypted images. Multimed Tools Appl. 2018;77(12):14841–57.CrossRefGoogle Scholar
  28. 28.
    The national library of Medicine presents MedPix® retrieved 18 September 2018 http://medpix.nlm.nih.gov.
  29. 29.
    Naqvi N, Abbasi AT, Hussain R, Khan MA, Ahmad B. Multilayer partially homomorphic encryption text steganography (MLPHE-TS): a zero steganography approach. Wirel Pers Commun. 2018:1–23.Google Scholar
  30. 30.
    Subhedar MS, Mankar VH. Image steganography using redundant discrete wavelet transform and QR factorization. Comput Electr Eng. 2016;54:406–22.CrossRefGoogle Scholar

Copyright information

© IUPESM and Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Electronics EngineeringVITVelloreIndia
  2. 2.School of Electrical EngineeringVITVelloreIndia

Personalised recommendations