Skip to main content
Log in

Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

Some medical accidents in hospitals are related to mismanagement of medical images X-ray and computer tomography (CT). A counterfeit medical image leads to medical accidents. Thus, security of medical images is important for patient safety. Data hiding can help patients avoid mistakes of doctors or nurses who confuse patient X-rays or CT scans. A hybrid data hiding scheme was applied that combined the Hamming code and LSB with an optimal pixel adjustment process algorithm for encoding to conceal hidden patient information. In addition, quality and capacity of stego-images were improved. Experimental results confirmed that the hiding capacity provided by this strategy is greater than for other schemes. Moreover, the image quality of stego-images with the proposed scheme remained more than 50 dB for most medical test images. In this experiment, we verified the proposed steganographic data hiding scheme as RS steganalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Sebastian, S., Jacob, N.R., Manmadhan, Y., Anand, V.R., Jayashree, M.J.: Remote patient monitoring system. Int. J. Distrib. Parallel Syst. 3(5), 99–110 (2012)

    Article  Google Scholar 

  2. Kim, C.: Data hiding by an improved exploiting modification direction. Multimed. Tools Appl. 69(3), 569–584 (2014)

    Article  Google Scholar 

  3. Yang, C.N., Ye, G.C., Kim, C.: Data hiding in halftone images by XOR block-wise operation with difference minimization. KSII Trans. Internet Inf. Syst. (TIIS) 5(2), 457–476 (2011)

    Article  Google Scholar 

  4. Kim, C., Shin, D.K., Shin, D.I.: Data Hiding in a halftone image using Hamming code (15, 11). Lect. Notes Comput. Sci. 6592, 372–381 (2011)

    Article  Google Scholar 

  5. Kim, C.: Data hiding based on compressed dithering images. Stud. Comput. Intell. 283, 89–98 (2010)

    Google Scholar 

  6. Huy, P.T., Thanh, N.H., Kim, C., Yang, C.N.: Data hiding for halftone images using an improved CPT scheme. KSII Trans. Internet Inf. Syst. (TIIS) 7(2), 405–424 (2013)

    Article  Google Scholar 

  7. Tseng, Y.-C., Chen, Y.-Y., Pan, H.-K.: A secure data hiding scheme for binary images. IEEE Trans. Commun. 50(8), 1227–1231 (2002)

    Article  Google Scholar 

  8. Willems, F., Dijk, M.: Capacity and codes for embedding information in gray-scale signals. IEEE Trans. Inf. Theory 51(3), 1209–1214 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  9. Fridrich, J., Goljan, M.: Digital image steganography using stochastic modulation. In: Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, vol. 5020, pp. 191–202. Santa Clara, California (2003)

  10. Fridrich, J., Goljan, M., Du, R.: Reliable Detection of LSB Steganography in Color and Grayscale Images. In: MM&Sec ’01 Proceedings of the 2001 workshop on Multimedia and security: new challenges, pp. 27–30 (2001)

  11. Luo, W., Huang, F., Huang, J.: Edge adaptive image Steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–213 (2010)

    Article  Google Scholar 

  12. Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)

  13. Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools. Appl. 75(4), 1947–1962 (2016)

  14. Bierbraue, J., Fridrich, J.: Constructing good covering codes for applications in steganography. Trans. Data Hiding Multimed. Secur. III, 1–22 (2008)

    Google Scholar 

  15. Crandall, R.: Some notes on steganography, (1998) http://dde.binghamton.edu/download/Crandallmatrix

  16. Westfeld, A.: F5: aA steganographic algorithm. In: Proceedings of the 4th International Workshop on Information Hiding 2001, Lecture Notes in Computer Science, vol. 2137, pp. 289–302. Pittsburgh, PA, USA (2004)

  17. Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)

    Article  Google Scholar 

  18. Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)

    Article  Google Scholar 

  19. Chang, C.C., Kieu, T.D., Chou, Y.C.: A high payload steganographic scheme based on (7, 4) hamming code for digital Images. In: Electronic Commerce and Security 2008 Symposium, pp. 16–21 (2008)

  20. Zhang, W., Wang, S., Zhang, X.: Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun. Lett. 11(8), 680–682 (2007)

    Article  Google Scholar 

  21. Tao, H., Chongmin, L., Zain, J.M., Abdalla, A.N.: Robust image watermarking theories and techniques: a review. J. Appl. Res. Technol. 12(1), 122–138 (2014)

    Article  Google Scholar 

  22. Nikolaidis, N., Pitas, I.: Digital image watermark: an overview. In: IEEE International Conference on multimedia computing and systems, vol. 1, pp. 1–6 (1999)

  23. Shen, Q., Liu, G., Liu, W., Dai, Y.: Adaptive image steganography based on pixel selection. In: 2015 IEEE International Conference on progress in informatics and computing (PIC), pp. 623–627 (2015)

  24. Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5, 201–214 (2010)

    Article  Google Scholar 

  25. Bas, P., Filler, T., Pevny, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. Lect. Notes Comput. Sci. 6958, 59–70 (2011)

    Article  Google Scholar 

  26. Oravec, J., Turn, J. Ovsenk : LSB steganography with usage of Mojette Transform for secret image scrambling. In: International Conference on Systems, Signals and Image Processing (IWSSIP), pp. 1–4, (2016)

  27. Zhang, L., Li, H.: A product code in steganography with improved embedding rate. In: 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference, pp. 246–250 (2016)

  28. Rifa-Pous, H., Rifa, J.: Product perfect codes and steganography. Digit. Signal Proc. 19(4), 764–769 (2009)

    Article  MATH  Google Scholar 

  29. Baek, J., Kim, C., Fisher, P.S., Chao, H.: (N, 1) secret sharing approach based on steganography with gray digital images, Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on, pp. 325–329 (2010)

  30. Krishna, M.M., Roberts, N.: Enhancement of embedding capacity and security in reversible steganography. In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 803–807 (2016)

  31. Chang, C.K.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469474 (2004)

    Google Scholar 

Download references

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2015R1D1A1A01059253). This work was supported under the framework of international cooperation program managed by the National Research Foundation of Korea (2016K2A9A2A05005255).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Cheonshik Kim or Dongkyoo Shin.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, C., Shin, D., Kim, BG. et al. Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP. J Real-Time Image Proc 14, 115–126 (2018). https://doi.org/10.1007/s11554-017-0674-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-017-0674-7

Keywords

Navigation