Skip to main content
Log in

A secure steganography for privacy protection in healthcare system

  • Original Paper
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Private data in healthcare system require confidentiality protection while transmitting. Steganography is the art of concealing data into a cover media for conveying messages confidentially. In this paper, we propose a steganographic method which can provide private data in medical system with very secure protection. In our method, a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then divided into non-overlapping embedding units with three consecutive pixels. We use adaptive pixel pair match (APPM) method to embed digits in the pixel value differences (PVD) of the three pixels and the base of embedded digits is dependent on the differences among the three pixels. By solving an optimization problem, minimal distortion of the pixel ternaries caused by data embedding can be obtained. The experimental results show our method is more suitable to privacy protection of healthcare system than prior steganographic works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Fridrich, J., Steganography in digital media: Principles, algorithms, and applications. Cambridge Univ. Press, Cambridge, U.K., 2009.

    Google Scholar 

  2. Filler, T., Judas, J., Fridrich, J., Minimizing embedding impact in steganography using trellis-coded quantization. in Proc. SPIE, Media Forensics and Security. 2010, vol.7541, 2010, doi 10.1117/12.838002.

  3. Lou, D.-C., Wu, N.-I., Wang, C.-M., et al., A novel adaptive steganography based on local complexity and human vision sensitivity. J. Syst. Softw. 83:1236–1248, 2010.

    Article  Google Scholar 

  4. Wang, R. Z., Lin, C. F., and Lin, J. C., Hiding data in images by optimal moderately significant bit replacement. IEEE Electron. Lett. 36(25):2069–2070, 2001.

    Article  Google Scholar 

  5. Thien, C. C., and Lin, J. C., A simple and high-hiding capacity method for hiding digit-by—digit data in images based on modulus function. Pattern Recogn. 36(12):2875–2881, 2003.

    Article  MATH  Google Scholar 

  6. Chan, C. K., and Cheng, L. M., Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3):469–474, 2004.

    Article  MATH  Google Scholar 

  7. Mielikainen, J., LSB matching revisited. IEEE Signal Process Lett. 13(5):285–287, 2006.

    Article  Google Scholar 

  8. Zhang, X. P., and Wang, S. Z., Efficient steganographyic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11):781–783, 2006.

    Article  Google Scholar 

  9. Chao, R. M., Wu, H. C., Lee, C. C., et al., A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Secur., 2009. doi:10.1155/2009/658047. Article ID 658047.

  10. Hong, W., and Chen, T.-S., A novel data embedding method using adaptive pixel pair matching[J]. IEEE Trans. Inform. Forensic Secur. 7(1):176–184, 2012.

    Article  Google Scholar 

  11. Hempstalk, K., Hiding behind corners: Using edges in images for better steganography. In Proc. Computing Women’s Congress, Hamilton, New Zealand, 2006.

  12. Zhang, X., and Wang, S., Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process. Lett. 12(1):67–70, 2005.

    Article  Google Scholar 

  13. Li, B., Fang, Y., and Huang, J., Steganalysis of multiple-base notaional system steganography. IEEE Signal Process. Lett. 15:493–496, 2008.

    Article  Google Scholar 

  14. Wu, D. C., and Tsai, W. H., A steganographic method for image by pixel-value differencing. Pattern Recogn. Lett. 24:1613–1626, 2003.

    Article  MATH  Google Scholar 

  15. Yang, C. H., Weng, C. Y., and Wang, S., Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inform. Forensic Secur. 3(3):488–497, 2008.

    Article  Google Scholar 

  16. Luo, W., Huang, F., and Huang, J., Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inform. Forensic Secur. 5(2):201–214, 2010.

    Article  MathSciNet  Google Scholar 

  17. Hong, W., Chen, T.-S., and Luo, C.-W., Data embedding using pixel value differencing and diamond encoding with multiple—base notational system. J. Syst. Softw. 85:1166–1175, 2012.

    Article  Google Scholar 

  18. Zhang, X., and Wang, S., Vnluerability of pixel-value differencing steganography to histogram analysis and modification for enhance security. Pattern Recognit. Lett. 25:331–339, 2004.

    Article  Google Scholar 

  19. Tan, S., and Li, B., Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-Spline Fitting. IEEE Signal Process. Lett. 19(6):336–339, 2012.

    Article  MathSciNet  Google Scholar 

  20. Westfeld, A., Space filling curves in steganalysis. Proceedings of SPIE: Security, Steganography and Watermarking for Multimedia. San Jose, California:SPIE, pp 28–37, 2005.

  21. Pevý, T., Bas, P., and Fridrich, J., Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inform. Forensic Secur. 5(2):215–224, 2010.

    Article  Google Scholar 

  22. Pevý, T., Filler, T., Bas, P., Using high-dimensional image models to perform highly undetectable steganography. In Proc. 12 Information Hiding, Jun.28–30, vol.6387, Lecture Notes in Computer Science, pp.161–177, 2010.

  23. Luo, W. Q., Wang, Y. G., and Huang, J. W., detection of quantization artifacts and its applications to transform encoder identification. IEEE Trans. Inform. Forensic Secur. 5(4):810–815, 2010.

    Article  Google Scholar 

  24. Yu, Babaguchi, N., Breaking the YASS algorithm via pixel and DCT coefficients analysis, in Proc. 19th IEEE Int. Conf. Pattern Recogn. pp1–4, 2008.

  25. Vapnik, V. N., The nature of statistical learning theory. Springer, New York, 1995.

    Book  MATH  Google Scholar 

Download references

Acknowledgements

This work is partially supported by National Natural Science Foundation of China under the grant number 61101112, and Postdoctoral Science Foundation of China under the grant number 2011M500775. The authors would like to thank Prof. Hong at Yu Da University, Taiwan, for providing us the source code in [10].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Liu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, J., Tang, G. & Sun, Y. A secure steganography for privacy protection in healthcare system. J Med Syst 37, 9918 (2013). https://doi.org/10.1007/s10916-012-9918-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-012-9918-z

Keywords

Navigation