Skip to main content

A Medical Image Steganography Method Based on Integer Wavelet Transform and Overlapping Edge Detection

  • Conference paper
  • First Online:
Neural Information Processing (ICONIP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9492))

Included in the following conference series:

Abstract

Recently, there has been an increased interest in the transmission of digital medical images for e-health services. However, existing implementations of this service do not pay much attention to the confidentiality and protection of patients’ information. In this paper, we present a new medical image steganography technique for protecting patients’ confidential information through the embedding of this information in the image itself while maintaining high quality of the image as well as high embedding capacity. This technique divides the cover image into two areas, the Region of Interest (ROI) and the Region of Non-Interest (RONI), by performing Otsu’s method and then encloses ROI pixels in a rectangular shape according to the binary pixel intensities. In order to improve the security, the Electronic Patient Records (EPR) is embedded in the high frequency sub-bands of the wavelet transform domain of the RONI pixels. An edge detection method is proposed using overlapping blocks to identify and classify the edge regions. Then, it embeds two secret bits into three coefficient bits by performing an XOR operation to minimize the difference between the cover and stego images. The experimental results indicate that the proposed method provides a good compromise between security, embedding capacity and visual quality of the stego images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Singh Brar, A., Kaur, M.: High capacity, reversible data hiding using cdcs along with medical image authentication. Int. J. Sig. Proc. Image Proc. Pattern Recogn. 8, 49–60 (2015)

    Google Scholar 

  2. Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: Survey and analysis of current methods. Signal Proc. 90, 727–752 (2010)

    Article  MATH  Google Scholar 

  3. Ramaiya, M.K., Hemrajani, N., Saxena, A.K.: Security improvisation in image steganography using des. In: 2013 IEEE 3rd International Advance Computing Conference (IACC), pp. 1094–1099. IEEE (2013)

    Google Scholar 

  4. Al-Dmour, H., Al-Ani, A., Nguyen, H.: An efficient steganography method for hiding patient confidential information. In: 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 222–225. IEEE (2014)

    Google Scholar 

  5. Hamid, N., Yahya, A., Ahmad, R.B., Al-Qershi, O.M.: Image steganography techniques: an overview. Int. J. Comput. Sci. Secur. (IJCSS) 6, 168–187 (2012)

    Google Scholar 

  6. Dumitrescu, S., Wu, X., Wang, Z.: Detection of lsb steganography via sample pair analysis. Signal Proc. IEEE Trans. 51, 1995–2007 (2003)

    Article  MATH  Google Scholar 

  7. Navas, K., Thampy, S.A., Sasikumar, M.: Epr hiding in medical images for telemedicine. Int. J. Biomed. Sci. 3, 44–47 (2008)

    Google Scholar 

  8. Zou, D., Shi, Y.Q., Ni, Z., Su, W.: A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. IEEE Trans. Circuits Syst. Video Technol. 16, 1294–1300 (2006)

    Article  Google Scholar 

  9. Prabakaran, G., Bhavani, R., Rajeswari, P.: Multi secure and robustness for medical image based steganography scheme. In: 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT), pp. 1188–1193. IEEE (2013)

    Google Scholar 

  10. Solanki, N., Malik, S.K., Chhikara, S.: Roni medical image watermarking using dwt and rsa. Int. J. Comput. Appl. 96, 30–35 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hayat Al-Dmour .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Al-Dmour, H., Al-Ani, A. (2015). A Medical Image Steganography Method Based on Integer Wavelet Transform and Overlapping Edge Detection. In: Arik, S., Huang, T., Lai, W., Liu, Q. (eds) Neural Information Processing. ICONIP 2015. Lecture Notes in Computer Science(), vol 9492. Springer, Cham. https://doi.org/10.1007/978-3-319-26561-2_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26561-2_52

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26560-5

  • Online ISBN: 978-3-319-26561-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics