A new efficient block matching data hiding method based on scanning order selection in medical images

A new efficient block matching data hiding method based on scanning order selection in medical images

Digital technology and the widespread use of the Internet has increased the speeds at which digital data can be obtained and shared in daily life. In parallel to this, there are important concerns regarding the confidentiality of private data during data transmissions and the possibility that data might fall into the hands of third parties. Issues relating to data safety can also affect patients medical images and other information relating to these images. In this study, we propose a new method based on block matching that can be used to hide the patient information in medical images. In this method, 8 scanning orders (6 of which are newly designed) are developed to provide high image quality. By diversifying the number of scanning orders, we aim to achieve the lowest number of bit changes. The performance of the developed method is measured using the number of bits subject to change, the peak signal-to-noise ratio and the mean structural similarity index measure image quality assessment metrics, and steganalysis attacks. The method we developed was found to be more effective in hiding data compared to the classical least significant bit method.

___

  • [1] Guo K, Zhang S. A semantic medical multimedia retrieval approach using ontology information hiding. Comput Math Method M 2013; 2013: 407917.
  • [2] Ahmed M, Ahamad M, Jaiswal T. Augmenting security and accountability within the eHealth Exchange. IBM J Res Dev 2014; 58: 8:1-8:11.
  • [3] Liu J, Tang G, Sun Y. A secure steganography for privacy protection in healthcare system. J Med Syst 2013; 37: 1-10.
  • [4] Petitcolas FAP, Anderson RJ, Kuhn MG. Information hiding: a survey. P IEEE 1999; 87: 1062-1078.
  • [5] Raul RC, Claudia FU, Trinidad-BIas GDJ. Data hiding scheme for medical images. In: 17th International Conference on Electronics, Communications and Computers; 26–28 February 2007; Cholula, Mexico. New York, NY, USA: IEEE. pp. 32-32.
  • [6] Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: Survey and analysis of current methods. Signal Process 2010; 90: 727-752.
  • [7] Akar F, Yalman Y, Varol HS. Data hiding in digital images using a partial optimization technique based on the classical LSB method. Turk J Elec Eng & Comp Sci 2013; 21: 2037-2047.
  • [8] Chen SK, Wang RZ. High-payload image hiding scheme using k-way block matching. In: 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing; 15–17 October 2010; Darmstadt, Germany. New York, NY, USA: IEEE. pp. 70-73.
  • [9] Wang RZ, Chen YS. High-payload image steganography using two-way block matching. IEEE Signal Proc Let 2006; 13: 161-164.
  • [10] Kermani ZZ, Jamzad M. A robust steganography algorithm based on texture similarity using Gabor filter. In: Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology; 21 December 2005; Athens, Greece. New York, NY, USA: IEEE. pp. 578-582.
  • [11] Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited. IEEE T Inf Foren Sec 2010; 5: 201-214.
  • [12] Zhou XQ, Huang HK, Lou SL. Authenticity and integrity of digital mammography images. IEEE T Med Imaging 2001; 20: 784-791.
  • [13] Luo X, Cheng Q, Tan J. A lossless data embedding scheme for medical images in application of e-diagnosis. In: Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society; 17–21 September 2003. New York, NY, USA: IEEE: pp. 852-855.
  • [14] Srinivasan Y, Nutter B, Mitra S, Phillips B, Ferris D. Secure transmission of medical records using high capacity steganography. In: 17th IEEE Symposium on Computer-Based Medical Systems; 24–25 June 2004. New York, NY, USA: IEEE. pp. 122-127.
  • [15] Taghipour H, Taghipour J, Esmaili HA. Embedding of pathology reports in pathology images. Annual Research & Review in Biology 2014; 4: 2228-2241.
  • [16] Iranpour M, Farokhian F. Minimal distortion steganography using well-defined functions. In: 10th International Conference on High Capacity Optical Networks and Enabling Technologies; 11–13 December 2013. New York, NY, USA: IEEE. pp. 21-24.
  • [17] Tang M, Hu J, Fan M, Song W. A steganalysis by adjacency pixel bits structure. Comput Electr Eng 2013; 39: 488-496.
  • [18] Zhu Z, Zhang T, Wan B. A special detector for the edge adaptive image steganography based on LSB matching revisited. In: 10th IEEE International Conference on Control and Automation; 12–14 June 2013; Hangzhou, China. New York, NY, USA: IEEE. pp. 1363-1366.
  • [19] Vashishtha LK, Dutta T, Sur A. Least significant bit matching steganalysis based on feature analysis. In: 2013 National Conference on Communications; 15–17 February 2013; New Delhi, India. New York, NY, USA: IEEE. pp. 1-5.
  • [20] Nayak DK, Bhagvati C. A threshold-LSB based information hiding scheme using digital images. In: 4th International Conference on Computer and Communication Technology; 20–22 September 2013; Allahabad, India. New York, NY, USA: IEEE. pp. 269-272.
  • [21] Co¸skun ˙I, Akar F, C¸ etin O. A new digital image steganography algorithm based on visible wavelength. Turk J Elec ¨ Eng & Comp Sci 2013; 21: 548-564.
  • [22] Rad RM, Wong K, Guo JM. A unified data embedding and scrambling method. IEEE T Image Process 2014; 23: 1463-1475.
  • [23] Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image quality assessment: from error visibility to structural similarity. IEEE T Image Process 2004; 13: 600-612.
  • [24] Yalman Y, Ert¨urk ˙I. A new color image quality measure based on YUV transformation and PSNR for human vision system. Turk J Elec Eng & Comp Sci 2013; 21: 603-612.
  • [25] Lou DC, Hu CH. LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Inform Sciences 2012; 188: 346-358.
  • [26] Kanan HR, Nazeri B. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 2014; 41: 6123-6130.
  • [27] Sarreshedari S, Akhaee MA. One-third probability embedding: a new ±1 histogram compensating image least significant bit steganography. IET Image Process 2014; 8: 78-89.
  • [28] Al-Dmour H, Al-Ani A. A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 2016; 46: 293-306.
  • [29] Sajasi S, Moghamad AME. An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl Soft Comput 2015; 30: 375-389.
  • [30] Li X, Zhang W, Gui X, Yang B. Efficient reversible data hiding based on multiple histograms modification. IEEE T Inf Foren Sec 2015; 10: 2016-2027.
  • [31] Ker AD, Pevny T. The steganographer is the outlier: realistic large-scale steganalysis. IEEE T Inf Foren Sec 2014; 9: 1424-1435.
  • [32] Khalind OS, Hernandez-Castro JC, Aziz B. A study on the false positive rate of Stegdetect. Digit Invest 2013; 9: 235-245.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: Yılda 6 Sayı
  • Yayıncı: TÜBİTAK
Sayıdaki Diğer Makaleler

Implementation of a personal area network for secure routing in MANETs by using low-cost hardware

Debika BHATTACHARYYA, Himadri Nath SAHA, Rohit SINGH, Pranab Kumar BANERJEE

An online approach for feature selection for classification in big data

Nasrin Banu NAZAR, Radha SENTHILKUMAR

GICA: Imperialist competitive algorithm with globalization mechanism for optimization problems

Yousef ABDI, Mahmoud LAK, Yousef SEYFARI

A comparative analysis of classification methods for hyperspectral images generated with conventional dimension reduction methods

Özer AKYÜREK, Ozan ARSLAN, Şinasi KAYA

Analysis of reconstruction performance of magnetic resonance conductivity tensor imaging (MRCTI) using simulated measurements

Behçet Murat EYÜBOĞLU, Evren DEĞİRMENCİ

Channel estimation using an adaptive neuro fuzzy inference system in the OFDM-IDMA system

Necmi TAŞPINAR, Şakir ŞİMŞİR

An efficient global technique for solving the network constrained static and dynamic economic dispatch problem

Umair Ali KHAN, Aamir NAWAZ, Nasir SALEEM, Ehtasham MUSTAFA

Automatic instrumental platform for the measurement of the characteristics of ferromagnetic materials based on LabVIEW

Monia Ferjani JAAFAR

Pixel- versus object-based classification of forest and agricultural areas from multiresolution satellite images

Ferruh YILDIZ, Mustafa ERDOĞAN, Dijle BOYACI

A data-aware cognitive engine for scheduling data intensive applications in a grid

Vijaya NAGARAJAN, Maluk ABDUL MULK MOHAMED