Abstract
In today’s world, transmission of information over the channel is not secure for example patient records and other sensitive information. In order to protect this sensitive information, it is coded within the image, audio or text files which is decodable only with the help of a particular key. To enable security to the covert communication and safeguarding the information for securing medical data to avoid medical related cybercrimes, we have proposed a method for medical image steganography using Elephant Herding-Monarch Butterfly (EH-MB) Optimization algorithm for effective selection of pixels for embedding the secret message (i.e. image/text medical report data) in the cover image. Initially, the cover is converted to frequency domain using multilevel DWT, where, the pixel selection is done optimally in the high frequency components using EH-MB algorithm. EH-MB based pixel selection procedure uses a fitness function that depends on the cost function, which calculates the edge, entropy, and intensity of the pixel for evaluating fitness. Simulation was done in the working platform of MATLAB and comparison of the proposed steganography approach was done with the other existing methods in terms of Peak-Signal-to Noise-Ratio and Mean Square Error to prove the effectiveness of the proposed approach.
Similar content being viewed by others
References
Virupakshappa, Amarapur B. Computer-aided diagnosis applied to MRI images of brain tumor using cognition based modified level set and optimized ANN classifier. Multimed Tools Appl. 2018. https://doi.org/10.1007/s11042-018-6176-1.
Bolle SR, Trondsen MV, Stensland GØ, Tjora A. Usefulness of videoconferencing in psychiatric emergencies – a qualitative study. Health Technol. 2018;8:111–7 Springer.
Bonet JM, Hernández Ó, Solans Ó, Pérez MJ, Barea C, Garcia F. The effectiveness of starting up a communications Centre for sending mail or SMS with normal test results in primary healthcare. Heal Technol. https://doi.org/10.1007/s12553-018-0217-7 Springer.
Wilton R. Trust and ethical data handling in the healthcare context. Health Technol, Springer. https://doi.org/10.1007/s12553-017-0206-2.
Li M, Poovendran R, Narayanan S. Protecting patient privacy against unauthorized release of medical images in a group communication environment. Comput Med Imaging Graph. 2005;29(5):367–83.
Shakeel M, Baskar S, Sarma Dhulipala VR, Mishra S, Jaber MM. Maintaining security and privacy in health care system using learning based deep-Q-networks. J Med Syst. 2018;42:186.
Cogranne R, Fridrich J. Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory. IEEE Trans Inf Forensics Secur. 2015;10(12):2627–42.
Girdhar A, Kumar V. Comprehensive survey of 3D image steganography techniques. IET Image Process. 2017;12(1):1–10.
Tsai C-S, Wu H-C, Lee C-C, Shie T-F, Lee C-C. A Steganographic method by pixel-value differencing and exploiting modification direction. J Comput. 2017;28(1):13–29.
Hemalatha S, Dinesh Acharya U, Renuka A. Wavelet transform based steganography technique to hide audio signals in image. Procedia Comput Sci. 2015;47:272–81.
Al-Dmour H, Al-Ani A. Quality optimized medical image information hiding algorithm that employs edge detection and data coding. Comput Methods Prog Biomed. 2016;127:24–43.
Subhedar MS, Mankar VH. Current status and key issues in image steganography: a survey. Computer Science Review. 2014;13:95–113.
Pandey V, Shrivastava M. Medical image protection using steganography by crypto-image as cover image. Int J Adv Comput Res. 2012;2(3).
Virupakshappa, Amarapur B. An approach of using spatial fuzzy and level set method for brain tumor segmentation. International Journal of Tomography & Simulation. 2018;31(4).
Virupakshappa, Amarapur B. Cognition-based MRI brain tumor segmentation technique using modified level set method. Cogn Tech Work. 2018. https://doi.org/10.1007/s10111-018-0472-4, Springer.
Jain M, Kumar A. RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem. Int J Mach Learn Cybern. 2017;8(5):1695–705.
Kim C, Shin D, Kim B-G, Yang C-N. Secure medical images based on data hiding using a hybrid scheme with the hamming code, LSB, and OPAP. J Real-Time Image Proc. 2017;14(1):115–26.
Karakış R, Güler İ, Capraz I, Bilir E. A novel fuzzy logic-based image steganography method to ensure medical data security. Comput Biol Med. 2015;67:172–83.
Rabie T, Baziyad M, Kamel I. Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid. Multimed Tools Appl. 2018;77(18):23673–98.
Pandey P, Tiwari P, Mishra S, Kumar A. A stegnography project-data hiding in encrypted images. Journal of Network Communications and Emerging Technologies (JNCET). 2016;6(4). www.jncet.org.
Qin C, Chang C-C, Hsu T-J. Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tools Appl. 2015;74(15):5861–72.
Kaur A, Kaur R, Kumar N. Image steganography using discrete wavelet transformation and artificial bee colony optimization. In: 2015 1st International Conference on Next Generation Computing Technologies (NGCT). Dehradun: IEEE; 2015. pp. 990–94.
Wang G-G, Deb S, Zhao X, Cui Z. A new monarch butterfly optimization with an improved crossover operator. Oper Res. 2016;18(3):731–55.
Strumberger, I, Beko M, Tuba M, Minovic M, Bacanin N. Elephant herding optimization algorithm for wireless sensor network localization problem. In: Technological Innovation for Resilient Systems: 9th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2018, Costa de Caparica, Portugal, May 2–4, 2018, Proceedings 9. Springer International Publishing; 2018. p. 175–184.
Strumberger I, Bacanin N, Tomic S, Beko M, Tuba M. Static drone placement by elephant herding optimization algorithm. In: Telecommunication Forum (TELFOR), 2017 25th, IEEE; 2017. p. 1–4.
Chen S, Chen R, Gao J. A monarch butterfly optimization for the dynamic vehicle routing problem. Algorithms. 2017;10(3):107.
Feng Y, Wang G-G, Deb S, Lu M, Zhao X-J. Solving 0–1 knapsack problem by a novel binary monarch butterfly optimization. Neural Comput & Applic. 2017;28(7):1619–34.
Virupakshappa, Amarapur B (2018) A segmentation approach using level set coding for region detection in MRI images. In: Nandi A, Sujatha N, Menaka R, Alex J (eds) Computational signal processing and analysis. Lecture Notes in Electrical Engineering, vol 490. Springer, Singapore
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ambika, Biradar, R.L. Secure medical image steganography through optimal pixel selection by EH-MB pipelined optimization technique. Health Technol. 10, 231–247 (2020). https://doi.org/10.1007/s12553-018-00289-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12553-018-00289-x