Skip to main content

Advertisement

Log in

Secure medical image steganography through optimal pixel selection by EH-MB pipelined optimization technique

  • Original Paper
  • Published:
Health and Technology Aims and scope Submit manuscript

Abstract

In today’s world, transmission of information over the channel is not secure for example patient records and other sensitive information. In order to protect this sensitive information, it is coded within the image, audio or text files which is decodable only with the help of a particular key. To enable security to the covert communication and safeguarding the information for securing medical data to avoid medical related cybercrimes, we have proposed a method for medical image steganography using Elephant Herding-Monarch Butterfly (EH-MB) Optimization algorithm for effective selection of pixels for embedding the secret message (i.e. image/text medical report data) in the cover image. Initially, the cover is converted to frequency domain using multilevel DWT, where, the pixel selection is done optimally in the high frequency components using EH-MB algorithm. EH-MB based pixel selection procedure uses a fitness function that depends on the cost function, which calculates the edge, entropy, and intensity of the pixel for evaluating fitness. Simulation was done in the working platform of MATLAB and comparison of the proposed steganography approach was done with the other existing methods in terms of Peak-Signal-to Noise-Ratio and Mean Square Error to prove the effectiveness of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Virupakshappa, Amarapur B. Computer-aided diagnosis applied to MRI images of brain tumor using cognition based modified level set and optimized ANN classifier. Multimed Tools Appl. 2018. https://doi.org/10.1007/s11042-018-6176-1.

  2. Bolle SR, Trondsen MV, Stensland GØ, Tjora A. Usefulness of videoconferencing in psychiatric emergencies – a qualitative study. Health Technol. 2018;8:111–7 Springer.

    Article  Google Scholar 

  3. Bonet JM, Hernández Ó, Solans Ó, Pérez MJ, Barea C, Garcia F. The effectiveness of starting up a communications Centre for sending mail or SMS with normal test results in primary healthcare. Heal Technol. https://doi.org/10.1007/s12553-018-0217-7 Springer.

  4. Wilton R. Trust and ethical data handling in the healthcare context. Health Technol, Springer. https://doi.org/10.1007/s12553-017-0206-2.

  5. Li M, Poovendran R, Narayanan S. Protecting patient privacy against unauthorized release of medical images in a group communication environment. Comput Med Imaging Graph. 2005;29(5):367–83.

    Article  Google Scholar 

  6. Shakeel M, Baskar S, Sarma Dhulipala VR, Mishra S, Jaber MM. Maintaining security and privacy in health care system using learning based deep-Q-networks. J Med Syst. 2018;42:186.

    Article  Google Scholar 

  7. Cogranne R, Fridrich J. Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory. IEEE Trans Inf Forensics Secur. 2015;10(12):2627–42.

    Article  Google Scholar 

  8. Girdhar A, Kumar V. Comprehensive survey of 3D image steganography techniques. IET Image Process. 2017;12(1):1–10.

    Article  Google Scholar 

  9. Tsai C-S, Wu H-C, Lee C-C, Shie T-F, Lee C-C. A Steganographic method by pixel-value differencing and exploiting modification direction. J Comput. 2017;28(1):13–29.

    Google Scholar 

  10. Hemalatha S, Dinesh Acharya U, Renuka A. Wavelet transform based steganography technique to hide audio signals in image. Procedia Comput Sci. 2015;47:272–81.

    Article  Google Scholar 

  11. Al-Dmour H, Al-Ani A. Quality optimized medical image information hiding algorithm that employs edge detection and data coding. Comput Methods Prog Biomed. 2016;127:24–43.

    Article  Google Scholar 

  12. Subhedar MS, Mankar VH. Current status and key issues in image steganography: a survey. Computer Science Review. 2014;13:95–113.

    Article  Google Scholar 

  13. Pandey V, Shrivastava M. Medical image protection using steganography by crypto-image as cover image. Int J Adv Comput Res. 2012;2(3).

  14. Virupakshappa, Amarapur B. An approach of using spatial fuzzy and level set method for brain tumor segmentation. International Journal of Tomography & Simulation. 2018;31(4).

  15. Virupakshappa, Amarapur B. Cognition-based MRI brain tumor segmentation technique using modified level set method. Cogn Tech Work. 2018. https://doi.org/10.1007/s10111-018-0472-4, Springer.

  16. Jain M, Kumar A. RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem. Int J Mach Learn Cybern. 2017;8(5):1695–705.

  17. Kim C, Shin D, Kim B-G, Yang C-N. Secure medical images based on data hiding using a hybrid scheme with the hamming code, LSB, and OPAP. J Real-Time Image Proc. 2017;14(1):115–26.

  18. Karakış R, Güler İ, Capraz I, Bilir E. A novel fuzzy logic-based image steganography method to ensure medical data security. Comput Biol Med. 2015;67:172–83.

    Article  Google Scholar 

  19. Rabie T, Baziyad M, Kamel I. Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid. Multimed Tools Appl. 2018;77(18):23673–98.

  20. Pandey P, Tiwari P, Mishra S, Kumar A. A stegnography project-data hiding in encrypted images. Journal of Network Communications and Emerging Technologies (JNCET). 2016;6(4). www.jncet.org.

  21. Qin C, Chang C-C, Hsu T-J. Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tools Appl. 2015;74(15):5861–72.

    Article  Google Scholar 

  22. Kaur A, Kaur R, Kumar N. Image steganography using discrete wavelet transformation and artificial bee colony optimization. In: 2015 1st International Conference on Next Generation Computing Technologies (NGCT). Dehradun: IEEE; 2015. pp. 990–94.

  23. Wang G-G, Deb S, Zhao X, Cui Z. A new monarch butterfly optimization with an improved crossover operator. Oper Res. 2016;18(3):731–55.

  24. Strumberger, I, Beko M, Tuba M, Minovic M, Bacanin N. Elephant herding optimization algorithm for wireless sensor network localization problem. In: Technological Innovation for Resilient Systems: 9th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2018, Costa de Caparica, Portugal, May 2–4, 2018, Proceedings 9. Springer International Publishing; 2018. p. 175–184.

  25. Strumberger I, Bacanin N, Tomic S, Beko M, Tuba M. Static drone placement by elephant herding optimization algorithm. In: Telecommunication Forum (TELFOR), 2017 25th, IEEE; 2017. p. 1–4.

  26. Chen S, Chen R, Gao J. A monarch butterfly optimization for the dynamic vehicle routing problem. Algorithms. 2017;10(3):107.

    Article  MathSciNet  Google Scholar 

  27. Feng Y, Wang G-G, Deb S, Lu M, Zhao X-J. Solving 0–1 knapsack problem by a novel binary monarch butterfly optimization. Neural Comput & Applic. 2017;28(7):1619–34.

    Article  Google Scholar 

  28. Virupakshappa, Amarapur B (2018) A segmentation approach using level set coding for region detection in MRI images. In: Nandi A, Sujatha N, Menaka R, Alex J (eds) Computational signal processing and analysis. Lecture Notes in Electrical Engineering, vol 490. Springer, Singapore

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ambika.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ambika, Biradar, R.L. Secure medical image steganography through optimal pixel selection by EH-MB pipelined optimization technique. Health Technol. 10, 231–247 (2020). https://doi.org/10.1007/s12553-018-00289-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12553-018-00289-x

Keywords

Navigation