Skip to main content

Advertisement

Log in

RETRACTED ARTICLE: Staganography-based healthcare model for safe handling of multimedia health care information using VR

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

This article was retracted on 13 September 2022

This article has been updated

Abstract

Due to the development of the Internet of Things (IoT) in the medical field, special medical equipment such as CT and MRI, which are used in medical institutions, can be used for digital healthcare services by medical staff using VR. However, the integrity and confidentiality of multimedia health care information handled through special medical equipment using VR is still one of the major issues that cause many problems in the application sector of medical services. This paper proposes a steganography-based digital healthcare model to ensure the integrity of user multimedia image information processed through special medical equipment using VR. The proposed model aims to prevent illegal use by the medical team through VR of multimedia image information collected through special medical equipment without the consent of the user. The proposed model uses the user’s signature and credentials in a hybrid cipher for multimedia health care information. The proposed model has features that ensure the integrity and confidentiality of the user’s medical image information without disturbing the user’s multimedia image quality filmed through special medical equipment. In addition, multimedia medical information viewed through VR is not exploited without the consent of users because the user’s signature information was encrypted using steganography-based cryptography-based ciphering techniques. In particular, the proposed model provides real-time guidance related to users’ health conditions and first-aid care in connection with the hospital health service to improve the management of medical image information for users in hospitals. As a result of the performance evaluation, the proposed model averaged 12.5% improvement in the management of the user’s medical image information compared to the existing technique, and the user’s accuracy in extracting medical image information was averaged 10.4% higher than that of the existing technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Change history

References

  1. Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101

    Article  Google Scholar 

  2. Bang DW, Jeong JS, Lee JH (2010) An implementation of privacy security for PHR framework supporting u-healthcare service. In: 2010 6th international conference on networked computing(INC), pp 1–4

  3. Fan R, He DJ, Pan XZ, Ping LD (2011) An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks. Journal of Zhejiang University-Science C(Computers & Electronics) (JZUS-C) 12(7):550–560

  4. Garkoti G, Peddoju SK, Balasubramanian R (2014) Detection of insider attacks in cloud based e-healthcare environment. In: Proceedings - 2014 13th international conference on information technology (ICIT 2014), pp 195–200

  5. Gonzalez N, Miers C, Redigolo F, Carvalho T, Simplicio M, Naslund M, Pourzandi M (2011) A quantitative analysis of current security concerns and solutions for cloud computing. In: 2011 IEEE third international conference on cloud computing technology and science, pp 231–238

  6. Kester QA, Nana L, Pascu AC, Gire S, Eghan JM, Quaynor NN (2015) A security technique for authentication and security of medical images in health information systems. In: Proceedings - 15th international conference on computational science and its applications (ICCSA 2015), pp 8–13

  7. Khalil MI (2017) Medical image steganography: study of medical image quality degradation when embedding data in the frequency domain. International Journal of Computer Network and Information Security(IJCNIS) 9(2):22–22

    Article  Google Scholar 

  8. Kim YH, Kook KH (2014) A study on the relative importance of the administrative and technical measures for the personal information protection. The Journal of Society for e-Business Studies (JSEBS) 19(4):614–624

    Google Scholar 

  9. Ko JG, Lu C, Srivastava MB, Stankovic JA, Terzis A, Welsh M (2010) Wireless sensor networks for healthcare. Proc IEEE 98(11):1947–1960

    Article  Google Scholar 

  10. Liu D, Song T, Dai Y (2005) Isomorphism and generation of Montgomery-form elliptic curves suitable for cryptosystems. Tsinghua Sci Technol 10(2):145–151

    Article  MathSciNet  Google Scholar 

  11. Mohamed E, Gustavo RG, Osama MA, Shihab AS, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596–20608

    Article  Google Scholar 

  12. Rahimi F, Hossein R (2011) A dual adaptive watermarking scheme in contourlet domain for DICOM images. Biomed Eng Online 10(1):53–53

    Article  Google Scholar 

  13. Rathi SC (2012) Technology. I. : medical image authentication through watermarking preserving ROI, vol 2, pp 292–295

  14. Saaty TL (2008) Decision making with dependenceand feedback : the analysis network process. Int J Services Sciences (IJSSci) 1(1):83–98

    Article  Google Scholar 

  15. Seyyedi SA, Sadau V, Ivanov N (2016) A secure steganography method based on integer lifting wavelet transform. International Journal of Network Security(IJNS) 18(1):124–132

    Google Scholar 

  16. Virone G, Wood A, Selavo L, Cao Q, Fang L, Doan T, Stankovic JA (2006) An advanced wireless sensor network for health monitoring. Transdisciplinary conference on distributed diagnosis and home healthcare (D2H2), pp 2–5

  17. Walters W, Betz A (2009) Medical identity theft. Journal of Consumer Education (JCE) 15(10):1–5

    Google Scholar 

  18. Wu JHK, Ruey-Feng C, Chii-Jen C, Ching-Lin W, Ta-Hsun K, Woo KM, Dar-Ren C (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59–76

    Article  Google Scholar 

  19. Yang T, D M, W H, Zhang H (2014) Energy-efficient border intrusion detection using wireless sensors network. EURASIP J Wirel Commun Netw 1:46

    Article  Google Scholar 

  20. Yong CD (1996) Application of the extent analysis method on fuzzy AHP. Eur J Oper Res 95(3):649–655

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the BB21+ Project in 2018.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeong Yoon-Su.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s11042-022-13870-4

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yoon-Su, J., Seung-Soo, S. RETRACTED ARTICLE: Staganography-based healthcare model for safe handling of multimedia health care information using VR. Multimed Tools Appl 79, 16593–16607 (2020). https://doi.org/10.1007/s11042-019-07833-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07833-5

Keywords

Navigation