Abstract
The confidentiality and safety of patient records is a significant concern for medical professionals. So protections must be placed to guarantee that illegal individuals do not have access to medical images (Patient’s description). Hence, the objective of this study is to secure digital medical images being transmitted over the internet from being accessed by an intruder. The study, therefore, proposed a modified Least Significant Bit (LSB) algorithm implemented on a MATLAB 2018a programming environment, and the proposed system was compared with the existing system using three performance metrics which are PSNR. MSE and SSIM. The result showed that the proposed approach outperformed the current standard methods by producing a more robust, high capacity, and highly imperceptible stego image. The comparative analysis conducted also showed that the PSNR valve is higher, and MSE value is lower when compared with existing systems. It was concluded that the projected technique accomplishes excellently in making the medical image transmitted to be more secured, robust, and invisible, thereby making the communication to be unnoticeable by an intruder or attacker.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Attaby, A.A., Ahmed, M.F.M.M., Alsammak, A.K.: Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Eng. J. 9, 1965–1974 (2018). https://doi.org/10.1016/j.asej.2017.02.003
Younus Z.S., Hussain, M.K.: Image steganography using exploiting modification direction for compressed, encrypted data. Journal of King Saud University–Computer and Information Sciences, an article in press (2019). https://doi.org/10.1016/j.jksuci.2019.04.008
Morkel, T., Eloff, J., Olivier, M.: An overview of image steganography. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandston, South Africa (2005)
Rehman, A., Alqahtani, S., Altameem, A., Saba, T.: Virtual machine security challenges: case studies. Int. J. Mach. Learn. Cybern. 5(5), 729–742 (2013). https://doi.org/10.1007/s13042-013-0166-4
Kumar, V., Kumar, D.: Performance evaluation of modified colour image steganography using discrete wavelet transform. J. Intell. Syst. (2017). https://doi.org/10.1515/jisys-2017-0134
Younus, Z.S., Younus, G.T.: Video steganography using knight tour algorithm and LSB method for encrypted data. J. Intell. Syst. (2019) https://doi.org/10.1515/jisys-2018-0225
Habibi, M., Karimi, R., Nosrati, M.: Using SFLA and LSB for text message steganography in 24-bit RGB colour images. Int. J. Eng. 2(3), 68–75 (2013)
Tejeshwar, G.: Colour image steganography using LZW compression and fisher-yates shuffle algorithm. Int. J. Innovative Res. Dev. 3(6), 54–61 (2014)
Ranjani, J.J.: Data hiding using pseudo magic squares for embedding high payload in digital images. Multimedia Tools Appl. 76(3), 3715–3729 (2016). https://doi.org/10.1007/s11042-016-3974-1
Taha, A., Hammad, A., Selim, M.: A high capacity algorithm for information hiding in Arabic text. Journal of King Saud University, pp. 1–8 (2018) https://doi.org/10.1016/j.jksuci.2018.07.007
Kalra, M., Singh, P.: EMD techniques of image steganography a comparative study. Int. J. Technol. Explor. Learn. 3(2), 385–390 (2014)
Hashim, M., Rahim, M.: Image steganography based on odd/even pixels distribution scheme and two parameters random function. J. Theor. Appl. Inf. Technol. 95(22), 5977–5986 (2017)
Christiana, A.O., Oluwatobi, A.N., Victory, G.A., Oluwaseun, O.R.: A secured one time password authentication technique using (3, 3) visual cryptography scheme. J. Phys. Conf. Ser. 1299(1), 012059 (2019)
Marvel, Jr, Boncelet, C., Retter, C.: Spread spectrum image steganography. IEEE Trans. Image Process. 8, 1075–83 (1999)
Akande, N.O., Abikoye, C.O., Adebiyi, M.O., Kayode, A.A., Adegun, A.A., Ogundokun, R.O.: Electronic medical information encryption using modified blowfish algorithm. In: Misra, S. (ed.) ICCSA 2019. LNCS, vol. 11623, pp. 166–179. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24308-1_14
Memon N, Chandramouli R. Analysis of LSB based image steganography techniques. In: Proceedings of IEEE ICIP (2001)
Abikoye, O.C., Ojo, U.A., Awotunde, J.B., Ogundokun, R.O.: A safe and secured iris template using steganography and cryptography. Multimedia Tools and Appl. 79(31), 23483–23506 (2020). https://doi.org/10.1007/s11042-020-08971-x
Marvel, Jr, Boncelet, C., Retter, C.: Spread spectrum image steganography. IEEE Trans. Image Process. 8 1075–83 (1999)
Memon N, Chandramouli R.: Analysis of LSB based image steganography techniques. In: Proceedings of IEEE ICIP (2001)
Morimoto, N., Bender, W., Gruhl, D., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–316 (1996)
Doerr, G., Dugelay, J.L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans. Signal Process. Suppl. Secure. Media 52, 2955–2964 (2004)
Gopalan K.: Audio steganography using bit modification. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ‘03), vol. 2(6), pp. 421–24 (2003)
Anderson, R., Petitcolas, F.: On the limits of steganography. IEEE J. Select Areas Commun. (J-SAC) 16, 474–481 (1998)
Kutade, P., Bhalotra, P.: A survey on various approaches of image steganography. Int. J. Comput. Appl. 109(3), 1–5 (2015)
Prajapati, H., Chitaliya, N.: Secure and robust dual image steganography: a survey. Int. J. Innovative Res. Comput. Commun. Eng. 3(1), 534–542 (2015)
Kalaivanan, S., Ananth, V., Manikandan, T.: A survey on digital image steganography. Int. J. Emerg. Trends Technol. Comput. Sci. 4(1), 30–33 (2015)
Hussain, M., Hussain, M.: A survey of image steganography techniques. Int. J. Adv. Sci. Technol 54, 113–124 (2013)
Idakwo, M.A., Muazu, M.B., Adedokun, E.A., Sadiq, B.O.: An extensive survey of digital image steganography: state of the art. J. Sci. Technol. Edu. 8(2), 40–54 (2020)
Chang, C., Tai, W., Chen, K.: Improvements in EMD embedding for large payloads. In: Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), pp. 473–476. ACM (2007)
Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90, 727–752 (2010). https://doi.org/10.1016/j.sigpro.2009.08.010
Maniriho, P., Ahmad, T.: Information hiding scheme for digital images using difference expansion and modulus function. J. King Saud Univ.-Comput. Inf. Sci. 1–13 (2018). https://doi.org/10.1016/j.jksuci.2018.01.011
Chan, C., Cheng, L.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37, 469–474 (2004). https://doi.org/10.1016/j.patcog.2003.08.007
Shjul, A., Kulkarni, U.: A secure skin tone based steganography using wavelet transform. Int. J. Comput. Theory Eng. 3(1), 16–22 (2011)
Zhang, X., Wang, S.: Efficient stenographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006). https://doi.org/10.1109/LCOMM.2006.060863
Lee, C., Wang, Y., Chang, C.: A steganography method with high capacity by improving exploiting modification direction. In: IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), pp. 497–500. (2007) https://doi.org/10.1109/IIH-MSP.2007.62
Jung, K., Yoo, K.: Improved exploiting modification direction method by modulus operation. Int. J. Signal Process. Image Process. Pattern. 2(1), 79–87 (2009)
Lin, K., Hong, W., Chen, J., Chen, T., Chiang, W., n et al. Data hiding by exploiting the modification direction technique using optimal pixel grouping. In: IEEE 2010 2nd international Conference on Education Technology and Computer (ICETC) (2010). https://doi.org/10.1109/ICETC.2010.5529581
Mohsin, A.T.: A New Steganography Technique Using Knight’s Tour Algorithm, Affine Cipher, And Huffman Coding (Master Thesis). Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia (2013)
Ahmad, A., Sulong, G., Rehman, A., Alkawaz, M., Saba, T.: Data hiding based on improved exploiting modification direction method and huffman coding. J. Intell. Syst. 23(4), 451–459 (2014). https://doi.org/10.1515/jisys-2014-0007
Lee, C., Chang, C., Pai, P., Liu, C.: Adjustment hiding method based on exploiting modification direction. Int. J. Netw. Secur. 17(5), 607–618 (2015)
Alsaffawi, Z.S.Y.: Image steganography by using exploiting modification direction and knight tour algorithm. J. Al-Qadissiya Comput. Sci. Math. 8(1), 1–11 (2016)
Saha, S., Ghosal, S., Chakraborty, A., Dhargupta, S., Sarkar, R., Mandal, J.: Improved exploiting modification direction-based steganography using dynamic weightage array. Electron. Lett. 54(8), 498–500 (2018). https://doi.org/10.1049/el.2017.3336
Walia, G.S., Makhija, S., Singh, K., Sharma, K.: Robust stego-key directed LSB substitution scheme based upon the cuckoo search and chaotic map. Optik 170, 106–124 (2018)
Preishuber, M., HĂ¼tter, T., Katzenbeisser, S., Uhl, A.: Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans. Inf. Forensics Secur. 13(9), 2137–2150 (2018)
Atawneh, S., Almomani, A., Al Bazar, H., Sumari, P., Gupta, B.: Secure and imperceptible digital image steganographic algorithm based on diamond encoding in the DWT domain. Multimedia Tools Appl. 76(18), 18451–18472 (2017). https://doi.org/10.1007/s11042-016-3930-0
Wang, Z., Zhang, X., Yin, Z.: Joint cover-selection and payload allocation by steganographic distortion optimization. IEEE Signal Process. Lett. 25(10), 1530–1534 (2018)
Kumar, V., Kumar, D.: A modified DWT-based image steganography technique. Multimedia Tools Appl. 77(11), 13279–13308 (2017). https://doi.org/10.1007/s11042-017-4947-8
Bhardwaj, R., Sharma, V.: Image steganography based on complemented message and inverted bit LSB substitution. Procedia Comput. Sci. 93, 832–838 (2016). https://doi.org/10.1016/j.procs.2016.07.245
Christiana, A.O., Oluwatobi, A.N., Victory, G.A., Oluwaseun, O.R.: A secured one time password authentication technique using (3, 3) visual cryptography scheme. In: Journal of Physics: Conference Series, vol. 1299, no. 1, p. 012059, IOP Publishing (2019)
Abikoye, O.C., Akande, N.O., Garuba, A.V., Ogundokun, R.O.: A secured one time password authentication technique using (3, 3) visual cryptography scheme (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Ogundokun, R.O., Abikoye, O.C., Misra, S., Awotunde, J.B. (2020). Modified Least Significant Bit Technique for Securing Medical Images. In: Themistocleous, M., Papadaki, M., Kamal, M.M. (eds) Information Systems. EMCIS 2020. Lecture Notes in Business Information Processing, vol 402. Springer, Cham. https://doi.org/10.1007/978-3-030-63396-7_37
Download citation
DOI: https://doi.org/10.1007/978-3-030-63396-7_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-63395-0
Online ISBN: 978-3-030-63396-7
eBook Packages: Computer ScienceComputer Science (R0)