Abstract
Due to the development of the Internet of Things (IoT) in the medical field, special medical equipment such as CT and MRI, which are used in medical institutions, can be used for digital healthcare services by medical staff using VR. However, the integrity and confidentiality of multimedia health care information handled through special medical equipment using VR is still one of the major issues that cause many problems in the application sector of medical services. This paper proposes a steganography-based digital healthcare model to ensure the integrity of user multimedia image information processed through special medical equipment using VR. The proposed model aims to prevent illegal use by the medical team through VR of multimedia image information collected through special medical equipment without the consent of the user. The proposed model uses the user’s signature and credentials in a hybrid cipher for multimedia health care information. The proposed model has features that ensure the integrity and confidentiality of the user’s medical image information without disturbing the user’s multimedia image quality filmed through special medical equipment. In addition, multimedia medical information viewed through VR is not exploited without the consent of users because the user’s signature information was encrypted using steganography-based cryptography-based ciphering techniques. In particular, the proposed model provides real-time guidance related to users’ health conditions and first-aid care in connection with the hospital health service to improve the management of medical image information for users in hospitals. As a result of the performance evaluation, the proposed model averaged 12.5% improvement in the management of the user’s medical image information compared to the existing technique, and the user’s accuracy in extracting medical image information was averaged 10.4% higher than that of the existing technique.
Similar content being viewed by others
Change history
13 September 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s11042-022-13870-4
References
Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101
Bang DW, Jeong JS, Lee JH (2010) An implementation of privacy security for PHR framework supporting u-healthcare service. In: 2010 6th international conference on networked computing(INC), pp 1–4
Fan R, He DJ, Pan XZ, Ping LD (2011) An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks. Journal of Zhejiang University-Science C(Computers & Electronics) (JZUS-C) 12(7):550–560
Garkoti G, Peddoju SK, Balasubramanian R (2014) Detection of insider attacks in cloud based e-healthcare environment. In: Proceedings - 2014 13th international conference on information technology (ICIT 2014), pp 195–200
Gonzalez N, Miers C, Redigolo F, Carvalho T, Simplicio M, Naslund M, Pourzandi M (2011) A quantitative analysis of current security concerns and solutions for cloud computing. In: 2011 IEEE third international conference on cloud computing technology and science, pp 231–238
Kester QA, Nana L, Pascu AC, Gire S, Eghan JM, Quaynor NN (2015) A security technique for authentication and security of medical images in health information systems. In: Proceedings - 15th international conference on computational science and its applications (ICCSA 2015), pp 8–13
Khalil MI (2017) Medical image steganography: study of medical image quality degradation when embedding data in the frequency domain. International Journal of Computer Network and Information Security(IJCNIS) 9(2):22–22
Kim YH, Kook KH (2014) A study on the relative importance of the administrative and technical measures for the personal information protection. The Journal of Society for e-Business Studies (JSEBS) 19(4):614–624
Ko JG, Lu C, Srivastava MB, Stankovic JA, Terzis A, Welsh M (2010) Wireless sensor networks for healthcare. Proc IEEE 98(11):1947–1960
Liu D, Song T, Dai Y (2005) Isomorphism and generation of Montgomery-form elliptic curves suitable for cryptosystems. Tsinghua Sci Technol 10(2):145–151
Mohamed E, Gustavo RG, Osama MA, Shihab AS, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596–20608
Rahimi F, Hossein R (2011) A dual adaptive watermarking scheme in contourlet domain for DICOM images. Biomed Eng Online 10(1):53–53
Rathi SC (2012) Technology. I. : medical image authentication through watermarking preserving ROI, vol 2, pp 292–295
Saaty TL (2008) Decision making with dependenceand feedback : the analysis network process. Int J Services Sciences (IJSSci) 1(1):83–98
Seyyedi SA, Sadau V, Ivanov N (2016) A secure steganography method based on integer lifting wavelet transform. International Journal of Network Security(IJNS) 18(1):124–132
Virone G, Wood A, Selavo L, Cao Q, Fang L, Doan T, Stankovic JA (2006) An advanced wireless sensor network for health monitoring. Transdisciplinary conference on distributed diagnosis and home healthcare (D2H2), pp 2–5
Walters W, Betz A (2009) Medical identity theft. Journal of Consumer Education (JCE) 15(10):1–5
Wu JHK, Ruey-Feng C, Chii-Jen C, Ching-Lin W, Ta-Hsun K, Woo KM, Dar-Ren C (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59–76
Yang T, D M, W H, Zhang H (2014) Energy-efficient border intrusion detection using wireless sensors network. EURASIP J Wirel Commun Netw 1:46
Yong CD (1996) Application of the extent analysis method on fuzzy AHP. Eur J Oper Res 95(3):649–655
Acknowledgements
This work was supported by the BB21+ Project in 2018.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s11042-022-13870-4
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yoon-Su, J., Seung-Soo, S. RETRACTED ARTICLE: Staganography-based healthcare model for safe handling of multimedia health care information using VR. Multimed Tools Appl 79, 16593–16607 (2020). https://doi.org/10.1007/s11042-019-07833-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-07833-5