An Update on Medical Data Steganography and Encryption

  • Sindhu RajendranEmail author
  • Varsha Kulkarni
  • Surabhi Chaudhari
  • Praveen Kumar Gupta
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1124)


As the medical field is moving toward the digital world, the security of the medical data had raised a concern to the people. The medical data like patient information, medical history being stored in digital image. Medical images are regarded as important and sensitive data in the medical informatics systems. For transferring medical images among physicians over an insecure network, developing a secure encryption algorithm is necessary. Steganography is the method of protection of files such as images, videos or text messages by concealing their information from unauthorized users using methods of encryption and masking of data and embedding them into different images or text files. Often medical records, contain specific images regarding diagnosis, videos of research and special authorized experiments, physical examination and other important visual details perhaps required for research. We apply steganography by encrypted image of any other medical image as a cover image and embedded images as a secret image with a private key. In receiver side, reverse algorithms are applied to retrieve the patients’ original data and image. This helps us to keep the medical data secure and at the same time leads to a fast and accurate treatment of the patient. In this chapter, we discuss the different types of algorithms securing the transmission of the medical images such as Goldreich Goldwasser Halevi (GGH) algorithm and encryption algorithm techniques such as Masking Algorithm Technique. The chapter is concluded by the various application and the recent advancements achieved in the medical field.


Steganography Cryptography Medical image Encryption 


  1. 1.
    W. Puech, Image encryption and compression for medical image security, in Proceeding of IEEE Image Processing Theory, Tools & ApplicationsGoogle Scholar
  2. 2.
    M. Yang, L. Song, M. Trifas, D.B. Aires, L. Chen, J. Elston, Secure patient information and privacy in medical imaging IEEEGoogle Scholar
  3. 3.
    X. Zhang, Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255CrossRefGoogle Scholar
  4. 4.
    A. Mitra, Y.S. Rao, S.R. Prasanna, A new image encryption approach using combinational permutation techniques. Int. J Comput. Sci. 1(2), 127–131 (2006)Google Scholar
  5. 5.
    A.J. Elbirt, C. Paar, An instruction-level distributed processor for symmetric-key cryptography. IEEE Trans. Parallel Distrib. Syst. 16(5), 468–480 (2005)CrossRefGoogle Scholar
  6. 6.
    W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)MathSciNetCrossRefGoogle Scholar
  7. 7.
    W. Stallings, Cryptography and Network Security (Prentice Hall, Englewood Cliffs, NJ, 2003)Google Scholar
  8. 8.
    M. Trehan, S. Mittu, Steganography and cryptography approaches combined using medical digital images. Int. J. Eng. Res. Technol. (IJERT) 4(6). ISSN: 2278-0181 (2015)Google Scholar
  9. 9.
    Y. Wu, On the security of an SVD-based ownership water marking. IEEE Trans. Multimed. 7(4), 624–627 (2005)CrossRefGoogle Scholar
  10. 10.
    Y.T. Wu, F.Y. Shih, An adjusted-purpose digital watermarking technique. Pattern Recognit. (2004)Google Scholar
  11. 11.
    M. Katoch, R. Jaswal, Image steganography: a review. Int. J. Adv. Res. Comput. Commun. Eng. 5(4) (2016)Google Scholar
  12. 12.
    A.J. Raphael, V. Sundaram, Cryptography and steganography—a survey. Int. J. Comp. Tech. Appl. 2(3), 626–630. ISSN:2229-6093Google Scholar
  13. 13.
    B. Li, J. He, J. Huang, Y.Q. Shi, A survey on image steganography and steganalysis. J. Inf. Hiding Multimed. Signal Process. 2(2), 142–172. ISSN 2073-4212Google Scholar
  14. 14.
    S.A. Laskar, K. Hemachandran, An analysis of steganography and steganalysis techniques. Assam Univ. J. Sci. Technol. 9(II), 83–103 (2012). ISSN: 0975-2773Google Scholar
  15. 15.
    N.F. Johnson, S. Jajodia, Exploring steganography: seeing the unseen. IEEE Comput. 31(2), 26–34 (1998)CrossRefGoogle Scholar
  16. 16.
    M. Conway, Code wars: steganography, signals intelligence, and terrorism. Knowl. Technol. Policy 16(2), 45–62 (2003)CrossRefGoogle Scholar
  17. 17.
    R.S. Ramesh, G. Athithan, K. Thiruvengadam, An automated approach to solve simple substitution ciphers. Cryptologia XVII(2), 202–218 (1993)CrossRefGoogle Scholar
  18. 18.
    W.F. Friedman, Cryptology. Encycl. Br. 6, 844–851 (1967)Google Scholar
  19. 19.
    A. Rashid, M.K. Rahid, Critical analysis of steganography—an art of hidden writing. Int. J. Secur. Appl. 10(3) (2016)Google Scholar
  20. 20.
    G.K. Ravi Kumar, B. Justus Rabi, T.N. Manjunath, A study on dynamic data masking with its trends and implications 38(6) (2012)Google Scholar
  21. 21.
    G.C. Deshmukh, S.M. Patil, Study for best data obfuscation techniques using multi-criteria decision-making technique 180(43) (2018)Google Scholar
  22. 22.
    C. Goyal, Data masking need techniques and solutions 6(5) (2015). ISSN 2250-1959Google Scholar
  23. 23.
    US 7698250, C. Dwork, F. McSherry, Differential data privacy, published 2010-04-13, assigned to Microsoft Corp (original) and Microsoft Technology Licensing LLC (current)Google Scholar
  24. 24.
    V.V. Divya, S.K. Sudha, V.R. Resmy, Simple and secure image encryption. IJCSI Int. J. Comput. Sci. Issues 9, 286–289 (2012)Google Scholar
  25. 25.
    M. Bellare, Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements (Springer Berlin Heidelberg, 2000), p. 1Google Scholar
  26. 26.
    Crypto-shredding in ‘The Official ISC2 Guide to the SSCP CBK’ ISBN 1119278651Google Scholar
  27. 27.
    M.A.H.J. Al‐Kufi, H.R. Hashmi, A.M. Hussein, H.R. Mohammed, An algorithm based on GSVD for image encryption (Published: 28 Mar 2017)Google Scholar
  28. 28.
    P.C. Hansen, Regularization, GSVD and truncated GSVD. BIT Numer. Math 29, 491–504 (1989)MathSciNetCrossRefGoogle Scholar
  29. 29.
    S. Jha, Image Compression and Encryption Using Scan (NIT Rourkela)Google Scholar
  30. 30.
    R.S. Bhogal, B. Li, A. Gale, Y. Chen, Medical image encryption using chaotic map improved advanced encryption standard (Published: 08 Aug 2018)Google Scholar
  31. 31.
    M. Sokouti, A. Zakerolhosseini, Medical image encryption: an application for improved padding based GGH encryption algorithm (published 2016 Oct 28)Google Scholar
  32. 32.
    N.D.K. Al-Shakarchy, Hiba Jab, Al-Shahad. Classical image encryption and decryption (Karbala University, Karbala, IRAQ). ISSN (Online): pp. 2319–7064Google Scholar
  33. 33.
    Y. Mao, G. Chen, S. Lian, A novel fast image encryption scheme based on 3D chaotic baker maps. Int. J. Bifurcat. Chaos. 14(10), 3613–3624 (2004). Scholar
  34. 34.
    R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978). Scholar
  35. 35.
    N. Varma, P. Sondhi, G. Kalia, LSB Based Steganography to Enhance the Security of an Image, vol. 3Google Scholar
  36. 36.
    R. Gupta, R. Pachauri, A.K. Singh, An effective approach of secured medical image transmission using encryption method.

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Sindhu Rajendran
    • 1
    Email author
  • Varsha Kulkarni
    • 1
  • Surabhi Chaudhari
    • 2
  • Praveen Kumar Gupta
    • 2
  1. 1.Department of Electronics and CommunicationR. V. College of EngineeringBangaloreIndia
  2. 2.Department of BiotechnologyR. V. College of EngineeringBangaloreIndia

Personalised recommendations