Skip to main content

Modified Least Significant Bit Technique for Securing Medical Images

  • Conference paper
  • First Online:
Information Systems (EMCIS 2020)

Abstract

The confidentiality and safety of patient records is a significant concern for medical professionals. So protections must be placed to guarantee that illegal individuals do not have access to medical images (Patient’s description). Hence, the objective of this study is to secure digital medical images being transmitted over the internet from being accessed by an intruder. The study, therefore, proposed a modified Least Significant Bit (LSB) algorithm implemented on a MATLAB 2018a programming environment, and the proposed system was compared with the existing system using three performance metrics which are PSNR. MSE and SSIM. The result showed that the proposed approach outperformed the current standard methods by producing a more robust, high capacity, and highly imperceptible stego image. The comparative analysis conducted also showed that the PSNR valve is higher, and MSE value is lower when compared with existing systems. It was concluded that the projected technique accomplishes excellently in making the medical image transmitted to be more secured, robust, and invisible, thereby making the communication to be unnoticeable by an intruder or attacker.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Attaby, A.A., Ahmed, M.F.M.M., Alsammak, A.K.: Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Eng. J. 9, 1965–1974 (2018). https://doi.org/10.1016/j.asej.2017.02.003

    Article  Google Scholar 

  2. Younus Z.S., Hussain, M.K.: Image steganography using exploiting modification direction for compressed, encrypted data. Journal of King Saud University–Computer and Information Sciences, an article in press (2019). https://doi.org/10.1016/j.jksuci.2019.04.008

  3. Morkel, T., Eloff, J., Olivier, M.: An overview of image steganography. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandston, South Africa (2005)

    Google Scholar 

  4. Rehman, A., Alqahtani, S., Altameem, A., Saba, T.: Virtual machine security challenges: case studies. Int. J. Mach. Learn. Cybern. 5(5), 729–742 (2013). https://doi.org/10.1007/s13042-013-0166-4

    Article  Google Scholar 

  5. Kumar, V., Kumar, D.: Performance evaluation of modified colour image steganography using discrete wavelet transform. J. Intell. Syst. (2017). https://doi.org/10.1515/jisys-2017-0134

    Article  Google Scholar 

  6. Younus, Z.S., Younus, G.T.: Video steganography using knight tour algorithm and LSB method for encrypted data. J. Intell. Syst. (2019) https://doi.org/10.1515/jisys-2018-0225

  7. Habibi, M., Karimi, R., Nosrati, M.: Using SFLA and LSB for text message steganography in 24-bit RGB colour images. Int. J. Eng. 2(3), 68–75 (2013)

    Google Scholar 

  8. Tejeshwar, G.: Colour image steganography using LZW compression and fisher-yates shuffle algorithm. Int. J. Innovative Res. Dev. 3(6), 54–61 (2014)

    Google Scholar 

  9. Ranjani, J.J.: Data hiding using pseudo magic squares for embedding high payload in digital images. Multimedia Tools Appl. 76(3), 3715–3729 (2016). https://doi.org/10.1007/s11042-016-3974-1

    Article  Google Scholar 

  10. Taha, A., Hammad, A., Selim, M.: A high capacity algorithm for information hiding in Arabic text. Journal of King Saud University, pp. 1–8 (2018) https://doi.org/10.1016/j.jksuci.2018.07.007

  11. Kalra, M., Singh, P.: EMD techniques of image steganography a comparative study. Int. J. Technol. Explor. Learn. 3(2), 385–390 (2014)

    Google Scholar 

  12. Hashim, M., Rahim, M.: Image steganography based on odd/even pixels distribution scheme and two parameters random function. J. Theor. Appl. Inf. Technol. 95(22), 5977–5986 (2017)

    Google Scholar 

  13. Christiana, A.O., Oluwatobi, A.N., Victory, G.A., Oluwaseun, O.R.: A secured one time password authentication technique using (3, 3) visual cryptography scheme. J. Phys. Conf. Ser. 1299(1), 012059 (2019)

    Google Scholar 

  14. Marvel, Jr, Boncelet, C., Retter, C.: Spread spectrum image steganography. IEEE Trans. Image Process. 8, 1075–83 (1999)

    Google Scholar 

  15. Akande, N.O., Abikoye, C.O., Adebiyi, M.O., Kayode, A.A., Adegun, A.A., Ogundokun, R.O.: Electronic medical information encryption using modified blowfish algorithm. In: Misra, S. (ed.) ICCSA 2019. LNCS, vol. 11623, pp. 166–179. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24308-1_14

    Chapter  Google Scholar 

  16. Memon N, Chandramouli R. Analysis of LSB based image steganography techniques. In: Proceedings of IEEE ICIP (2001)

    Google Scholar 

  17. Abikoye, O.C., Ojo, U.A., Awotunde, J.B., Ogundokun, R.O.: A safe and secured iris template using steganography and cryptography. Multimedia Tools and Appl. 79(31), 23483–23506 (2020). https://doi.org/10.1007/s11042-020-08971-x

    Article  Google Scholar 

  18. Marvel, Jr, Boncelet, C., Retter, C.: Spread spectrum image steganography. IEEE Trans. Image Process. 8 1075–83 (1999)

    Google Scholar 

  19. Memon N, Chandramouli R.: Analysis of LSB based image steganography techniques. In: Proceedings of IEEE ICIP (2001)

    Google Scholar 

  20. Morimoto, N., Bender, W., Gruhl, D., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–316 (1996)

    Article  Google Scholar 

  21. Doerr, G., Dugelay, J.L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans. Signal Process. Suppl. Secure. Media 52, 2955–2964 (2004)

    Article  Google Scholar 

  22. Gopalan K.: Audio steganography using bit modification. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ‘03), vol. 2(6), pp. 421–24 (2003)

    Google Scholar 

  23. Anderson, R., Petitcolas, F.: On the limits of steganography. IEEE J. Select Areas Commun. (J-SAC) 16, 474–481 (1998)

    Article  Google Scholar 

  24. Kutade, P., Bhalotra, P.: A survey on various approaches of image steganography. Int. J. Comput. Appl. 109(3), 1–5 (2015)

    Google Scholar 

  25. Prajapati, H., Chitaliya, N.: Secure and robust dual image steganography: a survey. Int. J. Innovative Res. Comput. Commun. Eng. 3(1), 534–542 (2015)

    Google Scholar 

  26. Kalaivanan, S., Ananth, V., Manikandan, T.: A survey on digital image steganography. Int. J. Emerg. Trends Technol. Comput. Sci. 4(1), 30–33 (2015)

    Google Scholar 

  27. Hussain, M., Hussain, M.: A survey of image steganography techniques. Int. J. Adv. Sci. Technol 54, 113–124 (2013)

    Google Scholar 

  28. Idakwo, M.A., Muazu, M.B., Adedokun, E.A., Sadiq, B.O.: An extensive survey of digital image steganography: state of the art. J. Sci. Technol. Edu. 8(2), 40–54 (2020)

    Google Scholar 

  29. Chang, C., Tai, W., Chen, K.: Improvements in EMD embedding for large payloads. In: Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), pp. 473–476. ACM (2007)

    Google Scholar 

  30. Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90, 727–752 (2010). https://doi.org/10.1016/j.sigpro.2009.08.010

    Article  MATH  Google Scholar 

  31. Maniriho, P., Ahmad, T.: Information hiding scheme for digital images using difference expansion and modulus function. J. King Saud Univ.-Comput. Inf. Sci. 1–13 (2018). https://doi.org/10.1016/j.jksuci.2018.01.011

  32. Chan, C., Cheng, L.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37, 469–474 (2004). https://doi.org/10.1016/j.patcog.2003.08.007

    Article  MATH  Google Scholar 

  33. Shjul, A., Kulkarni, U.: A secure skin tone based steganography using wavelet transform. Int. J. Comput. Theory Eng. 3(1), 16–22 (2011)

    Article  Google Scholar 

  34. Zhang, X., Wang, S.: Efficient stenographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006). https://doi.org/10.1109/LCOMM.2006.060863

    Article  MathSciNet  Google Scholar 

  35. Lee, C., Wang, Y., Chang, C.: A steganography method with high capacity by improving exploiting modification direction. In: IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), pp. 497–500. (2007) https://doi.org/10.1109/IIH-MSP.2007.62

  36. Jung, K., Yoo, K.: Improved exploiting modification direction method by modulus operation. Int. J. Signal Process. Image Process. Pattern. 2(1), 79–87 (2009)

    Google Scholar 

  37. Lin, K., Hong, W., Chen, J., Chen, T., Chiang, W., n et al. Data hiding by exploiting the modification direction technique using optimal pixel grouping. In: IEEE 2010 2nd international Conference on Education Technology and Computer (ICETC) (2010). https://doi.org/10.1109/ICETC.2010.5529581

  38. Mohsin, A.T.: A New Steganography Technique Using Knight’s Tour Algorithm, Affine Cipher, And Huffman Coding (Master Thesis). Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia (2013)

    Google Scholar 

  39. Ahmad, A., Sulong, G., Rehman, A., Alkawaz, M., Saba, T.: Data hiding based on improved exploiting modification direction method and huffman coding. J. Intell. Syst. 23(4), 451–459 (2014). https://doi.org/10.1515/jisys-2014-0007

    Article  Google Scholar 

  40. Lee, C., Chang, C., Pai, P., Liu, C.: Adjustment hiding method based on exploiting modification direction. Int. J. Netw. Secur. 17(5), 607–618 (2015)

    Google Scholar 

  41. Alsaffawi, Z.S.Y.: Image steganography by using exploiting modification direction and knight tour algorithm. J. Al-Qadissiya Comput. Sci. Math. 8(1), 1–11 (2016)

    Google Scholar 

  42. Saha, S., Ghosal, S., Chakraborty, A., Dhargupta, S., Sarkar, R., Mandal, J.: Improved exploiting modification direction-based steganography using dynamic weightage array. Electron. Lett. 54(8), 498–500 (2018). https://doi.org/10.1049/el.2017.3336

    Article  Google Scholar 

  43. Walia, G.S., Makhija, S., Singh, K., Sharma, K.: Robust stego-key directed LSB substitution scheme based upon the cuckoo search and chaotic map. Optik 170, 106–124 (2018)

    Article  Google Scholar 

  44. Preishuber, M., HĂ¼tter, T., Katzenbeisser, S., Uhl, A.: Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans. Inf. Forensics Secur. 13(9), 2137–2150 (2018)

    Article  Google Scholar 

  45. Atawneh, S., Almomani, A., Al Bazar, H., Sumari, P., Gupta, B.: Secure and imperceptible digital image steganographic algorithm based on diamond encoding in the DWT domain. Multimedia Tools Appl. 76(18), 18451–18472 (2017). https://doi.org/10.1007/s11042-016-3930-0

    Article  Google Scholar 

  46. Wang, Z., Zhang, X., Yin, Z.: Joint cover-selection and payload allocation by steganographic distortion optimization. IEEE Signal Process. Lett. 25(10), 1530–1534 (2018)

    Article  Google Scholar 

  47. Kumar, V., Kumar, D.: A modified DWT-based image steganography technique. Multimedia Tools Appl. 77(11), 13279–13308 (2017). https://doi.org/10.1007/s11042-017-4947-8

    Article  Google Scholar 

  48. Bhardwaj, R., Sharma, V.: Image steganography based on complemented message and inverted bit LSB substitution. Procedia Comput. Sci. 93, 832–838 (2016). https://doi.org/10.1016/j.procs.2016.07.245

    Article  Google Scholar 

  49. Christiana, A.O., Oluwatobi, A.N., Victory, G.A., Oluwaseun, O.R.: A secured one time password authentication technique using (3, 3) visual cryptography scheme. In: Journal of Physics: Conference Series, vol. 1299, no. 1, p. 012059, IOP Publishing (2019)

    Google Scholar 

  50. Abikoye, O.C., Akande, N.O., Garuba, A.V., Ogundokun, R.O.: A secured one time password authentication technique using (3, 3) visual cryptography scheme (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roseline Oluwaseun Ogundokun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ogundokun, R.O., Abikoye, O.C., Misra, S., Awotunde, J.B. (2020). Modified Least Significant Bit Technique for Securing Medical Images. In: Themistocleous, M., Papadaki, M., Kamal, M.M. (eds) Information Systems. EMCIS 2020. Lecture Notes in Business Information Processing, vol 402. Springer, Cham. https://doi.org/10.1007/978-3-030-63396-7_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-63396-7_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-63395-0

  • Online ISBN: 978-3-030-63396-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics