scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Reversible dynamic secure steganography for medical image using graph coloring

01 Sep 2013-Health policy and technology (Elsevier)-Vol. 2, Iss: 3, pp 151-161
TL;DR: A novel steganography technique that conceals patient information inside a medical image using a dynamic key generated by graph 3 coloring problem is proposed, which ensures reversibility as the original medical image is restored after extracting the embedded data from the stego medical image.
Abstract: Securing data in telemedicine applications is extremely essential and therefore it is mandatory to develop algorithms which preserve the data transmitted. Steganography (information hiding technique) plays a crucial role in telemedicine applications by providing confidentiality, integrity, availability and authenticity. This paper proposes a novel steganography technique that conceals patient information inside a medical image using a dynamic key generated by graph 3 coloring problem. The proposed method ensures reversibility as the original medical image is restored after extracting the embedded data from the stego medical image. Despite the embedding of patient information in the medical image, the visual quality of the image is preserved. Experimental results show that the proposed method is resistant against uniform affine transformations such as cropping, rotation and scaling. The proposed method is designed by considering issues related to transmission errors which could contaminate the medical images transmitted. The performance of the proposed method is compared to other information hiding methods against various parameters such as robustness of stego-image against affine transformations, toughness of the dynamic key generated, detection of transmission error, embedding rate and reversibility.
Citations
More filters
Journal ArticleDOI
TL;DR: A review of fundamental concepts, evaluation measures and security aspects of steganography system, various spatial and transform domain embedding schemes, and current research trends and directions to improve on existing methods are suggested.

273 citations


Cites methods from "Reversible dynamic secure steganogr..."

  • ...The algorithm is proved to be better in terms of robustness of stego image against affine transformation embedding rate and reversibility [60]....

    [...]

Journal ArticleDOI
TL;DR: A novel scheme for encryption of medical images is introduced, based on the cosine number transform, a mathematical tool whose application requires modular arithmetic only, which allows that the image recovered after the encryption/decryption process be identical to the corresponding original image.
Abstract: In this paper, we introduce a novel scheme for encryption of medical images. The technique is based on the cosine number transform, a mathematical tool whose application requires modular arithmetic only. This property avoids rounding-off errors and allows that the image recovered after the encryption/decryption process be identical to the corresponding original image. The proposed scheme is flexible and can be applied to images complying with the DICOM standard, which is frequently employed in medical applications. We show that the technique is capable of resisting the main cryptographic attacks.

85 citations

Journal ArticleDOI
TL;DR: A histogram of oriented gradient (HOG) algorithm is proposed to find the dominant edge direction for each $2\times 2$ block of cover images and provides high embedding capacity and better visual quality compared with several other PVD- and LSB-based methods.
Abstract: Pixel value differencing (PVD) and least significant bit substitution (LSB) are two widely used schemes in image steganography. These two methods do not consider different content in a cover image for hiding the secret data. The content of most digital images has different edge directions in each pixel, and the local object shape or appearance is mostly characterized by the distribution of its intensity gradients or edge directions. Exploiting these characteristics for embedding various secret information in different edge directions will eliminate sequential embedding and improve robustness. Thus, a histogram of oriented gradient (HOG) algorithm is proposed to find the dominant edge direction for each $2\times 2$ block of cover images. Blocks of interest (BOIs) are determined adaptively based on the gradient magnitude and angle of the cover image. Then, the PVD algorithm is used to hide secret data in the dominant edge direction, while the LSB substitution is utilized in the other two remaining pixels. Extensive experiments using various standard images reveal that the proposed scheme provides high embedding capacity and better visual quality compared with several other PVD- and LSB-based methods. Moreover, it resists various steganalysis techniques, such as pixel difference histogram and RS analysis.

49 citations

Journal ArticleDOI
TL;DR: The proposed medical imaging information system proved to be capable of concealing EPR data and producing imperceptible stego images with minimal embedding distortions compared to other existing methods.

33 citations


Cites background or methods from "Reversible dynamic secure steganogr..."

  • ...Algorithms Navas [77] Bremnavas [78] Thiyagarajan [2] Al-Dmour [33] Proposed Embedding Domain IWT Spatial Spatial Spatial Spatial Embedding Technique Difference between coefficients in LH and HL sub-bands LSB LSB LSB with Hamming code LSBM with STC or Hamming code Encryption Yes Yes NO No Yes ROI Yes No Yes, RONI is the background region using Canny method Yes Yes Shape of ROI Rectangular No Irregular Irregular Rectangular Ellipse Embedding Rate 8500 bits 13% Patient record around 20 bytes (650−1850) bits (2323−32300) bits (3−49)% (3251−32600) bits (5−50)% Key Yes No Yes No Yes ExtractionProcess Blind Blind Blind Blind Blind Shared Info NA NA NA Coordinates of ROI Threshold Coordinates of ROI operations....

    [...]

  • ...Algorithms Navas [77] Bremnavas [78] Thiyagarajan [2] Al-Dmour [33] Proposed Embedding Domain IWT Spatial Spatial Spatial Spatial...

    [...]

  • ...Table 9 shows a comparison with an existing medical information hiding methods (Navas [77], Bremnavas [78], Thiyagarajan [2], Al-Dmour [33]), in term of embedding process, embedding capacity and encryption process....

    [...]

  • ...Evaluation of the proposed method with state of the art Table 9 shows a comparison with an existing medical information hiding methods (Navas [77], Bremnavas [78], Thiyagarajan [2], Al-Dmour [33]), in term of embedding process, embedding capacity and encryption process....

    [...]

  • ...and health care where the Internet has become the backbone for data exchanging and sharing [1, 2]....

    [...]

Proceedings ArticleDOI
01 Dec 2016
TL;DR: A novel technique about secure medical information transmission of patient inside medical cover image is presented by concealing data using decision tree concept, which shows a robust mechanism by providing decisions for secret information concealing location in medical carrier image using secret information mapping concept.
Abstract: In this article, a novel technique about secure medical information transmission of patient inside medical cover image is presented by concealing data using decision tree concept. Decision tree shows a robust mechanism by providing decisions for secret information concealing location in medical carrier image using secret information mapping concept. RSA encryption algorithm is being used for patient's unique information enciphering. The outcome of the RSA is structured into various equally distributed blocks. In steganography, secret cipher blocks are assigned to carrier image for data inserting by mapping mechanism using breadth first search. Receiver gets hidden secret medical information of patient using RSA decryption, so only authorized recipient can recognize the plain text. Performance is analyzed and measured using numerous parameters between medical stego and carrier images. Results are analyzed and compared with many of existing algorithms.

23 citations

References
More filters
Journal ArticleDOI
TL;DR: A "true" two-dimensional transform that can capture the intrinsic geometrical structure that is key in visual information is pursued and it is shown that with parabolic scaling and sufficient directional vanishing moments, contourlets achieve the optimal approximation rate for piecewise smooth functions with discontinuities along twice continuously differentiable curves.
Abstract: The limitations of commonly used separable extensions of one-dimensional transforms, such as the Fourier and wavelet transforms, in capturing the geometry of image edges are well known. In this paper, we pursue a "true" two-dimensional transform that can capture the intrinsic geometrical structure that is key in visual information. The main challenge in exploring geometry in images comes from the discrete nature of the data. Thus, unlike other approaches, such as curvelets, that first develop a transform in the continuous domain and then discretize for sampled data, our approach starts with a discrete-domain construction and then studies its convergence to an expansion in the continuous domain. Specifically, we construct a discrete-domain multiresolution and multidirection expansion using nonseparable filter banks, in much the same way that wavelets were derived from filter banks. This construction results in a flexible multiresolution, local, and directional image expansion using contour segments, and, thus, it is named the contourlet transform. The discrete contourlet transform has a fast iterated filter bank algorithm that requires an order N operations for N-pixel images. Furthermore, we establish a precise link between the developed filter bank and the associated continuous-domain contourlet expansion via a directional multiresolution analysis framework. We show that with parabolic scaling and sufficient directional vanishing moments, contourlets achieve the optimal approximation rate for piecewise smooth functions with discontinuities along twice continuously differentiable curves. Finally, we show some numerical experiments demonstrating the potential of contourlets in several image processing applications.

3,948 citations


"Reversible dynamic secure steganogr..." refers methods in this paper

  • ...The four most popular methods in frequency domain image steganography are Discrete Cosine Transform (DCT) [5–8], Discrete Fourier Transform (DFT) [9,10], Discrete Wavelet Transform (DWT) [11–13] and Contourlet transform (CT) [14–16]....

    [...]

Journal ArticleDOI
01 Jul 1999
TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Abstract: Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorized copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity, and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field, of what we know, what works, what does not, and what are the interesting topics for research.

2,561 citations


"Reversible dynamic secure steganogr..." refers background or methods in this paper

  • ...Generally information hiding is achieved through steganography and watermarking [3]....

    [...]

  • ...hiding technique [3]—steganography which uses key generated from graph 3 coloring problem....

    [...]

Book
01 Jul 2007
TL;DR: This book is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors, and serves as a basic reference volume and is suitable for self-study.
Abstract: From the Book: PREFACE: Preface In this age of electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, network security has assumed increasing importance. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security. Objectives It is the purpose of this book to provide a practical survey of network security applications and standards. The emphasis is on applications that are widely used on the Internet and for corporate networks, and on standards, especially Internet standards, that have been widely deployed. Intended Audience The book is intended for both an academic and a professional audience. As a textbook, it is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors. The book also serves as a basic reference volume and is suitable for self-study. Plan of the Book The book is organized in three parts: I. Cryptography: A concise survey of the cryptographic algorithms and protocols i reportunderlyingnetwork security applications, including encryption, hash functions, digital signatures, and key exchange. i See Appen~ II. Network Security Applications: Covers important network security tools and applications, including Kerberos, X.509v3 certificates, PGP, S/MIME, IP Secu- rity, SSL/TLS, SET, and SNMPv3. III. System Security: Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems. This book i A more detailed, chapter-by-chapter summary appears at the end of Chapter ~ (CNS2e). 1. In addition, the book includes an extensive glossary, a list of frequently used detailed an< acronyms, and a bibliography. There are also end-of-chapter problems and sugges- of which co tions for further reading. dards (NSE 3. NSE1e in covers SNh Internet Services for Instructors and Students There is a Web page for this book that provides support for students and instruc tors. The page includes links to relevant sites, transparency masters of figures in the book in PDF (Adobe Acrobat) format, and sign-up information for the book's Internet mailing list. The Web page is at ...

761 citations


Additional excerpts

  • ...Fragile steganography system embeds the digital signature or cryptographic hash value [21] of the sensitive data in the image and its correctness is verified on the receiver side....

    [...]

Proceedings ArticleDOI
16 Sep 1996
TL;DR: This work describes two techniques for the invisible marking of images and analyzes the robustness of the watermarks with respect to linear and nonlinear filtering, and JPEG compression.
Abstract: The growth of networked multimedia systems has magnified the need for image copyright protection. One approach used to address this problem is to add an invisible structure to an image that can be used to seal or mark it. These structures are known as digital watermarks. We describe two techniques for the invisible marking of images. We analyze the robustness of the watermarks with respect to linear and nonlinear filtering, and JPEG compression. The results show that our watermarks detect all but the most minute changes to the image.

548 citations


"Reversible dynamic secure steganogr..." refers methods in this paper

  • ...The invisible spatial domain watermarking method described in [22] uses longer m-sequence in two dimensional blocks....

    [...]

Journal ArticleDOI
TL;DR: The digital signature standard (DSS) as mentioned in this paper was proposed to authenticate electronic mail messages by using modern cryptographic techniques to prevent the explosion of very capable personal computers from driving up the incidence of doctored photographs being passed off as truth.
Abstract: The trustworthy digital camera is an application of existing technology toward the solution of an evermore-troubling social problem, the eroding credibility of the photographic image. Although it will always be possible to lie with a photograph (using such time-honored techniques as false perspective and misleading captions), this proposed device will prevent the explosion of very capable personal computers from driving up the incidence of doctored photographs being passed off as truth. A solution to this problem comes from the proposed digital signature standard (DSS), which incorporates modern cryptographic techniques to authenticate electronic mail messages. >

502 citations