Skip to main content

Advertisement

Log in

Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy

  • Mobile Systems
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

In this paper, the problem of secure transmission of sensitive contents over the public network Internet is addressed by proposing a novel data hiding method in encrypted images with dual-level security. The secret information is divided into three blocks using a specific pattern, followed by an encryption mechanism based on the three-level encryption algorithm (TLEA). The input image is scrambled using a secret key, and the encrypted sub-message blocks are then embedded in the scrambled image by cyclic18 least significant bit (LSB) substitution method, utilizing LSBs and intermediate LSB planes. Furthermore, the cover image and its planes are rotated at different angles using a secret key prior to embedding, deceiving the attacker during data extraction. The usage of message blocks division, TLEA, image scrambling, and the cyclic18 LSB method results in an advanced security system, maintaining the visual transparency of resultant images and increasing the security of embedded data. In addition, employing various secret keys for image scrambling, data encryption, and data hiding using the cyclic18 LSB method makes the data recovery comparatively more challenging for attackers. Experimental results not only validate the effectiveness of the proposed framework in terms of visual quality and security compared to other state-of-the-art methods, but also suggest its feasibility for secure transmission of diagnostically important keyframes to healthcare centers and gastroenterologists during wireless capsule endoscopy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Cheddad, J., Condell, K., Curran, and Mc Kevitt, P., “Digital image steganography: Survey and analysis of current methods,”. Signal Process. 90:727–752, 2010.

    Article  Google Scholar 

  2. Liu, J., Tang, G., and Sun, Y., A secure steganography for privacy protection in healthcare system. J. Med. Syst. 37:1–10, 2013.

    Article  Google Scholar 

  3. Yang, C.-Y., and Wang, W.-F., Effective electrocardiogram steganography based on coefficient alignment. J. Med. Syst. 40:1–15, 2016.

    Article  CAS  Google Scholar 

  4. Khan, F. and Gutub, A. A.-A., “Message Concealment Techniques using Image based Steganography,” in The 4th IEEE GCC Conference and Exhibition, 2007.

  5. Al-Otaibi, N. A. and Gutub, A. A., “Flexible stego-system for hiding text in images of personal computers based on user security priority,” in Proceedings of 2014 International conference on Advanced Engineering Technologies (AET-2014), 2014, pp. 243–250.

  6. Mielikainen, J., “LSB matching revisited,”. SigN. ProcesS. Lett., IEEE 13:285–287, 2006.

    Article  Google Scholar 

  7. Luo, W., Huang, F., and Huang, J., “Edge adaptive image steganography based on LSB matching revisited,”. Inform. Forensics Secur., IEEE Trans. 5:201–214, 2010.

    Article  Google Scholar 

  8. Ioannidou, Halkidis, S. T., and Stephanides, G., A novel technique for image steganography based on a high payload method and edge detection. Expert Syst. Applic. 39:11517–11524, 2012.

    Article  Google Scholar 

  9. Kanan, H. R., and Nazeri, B., A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Applic. 41:6123–6130, 2014.

    Article  Google Scholar 

  10. Gutub, M., Ankeer, M., Abu-Ghalioun, A., Shaheen, and Alvi A., “Pixel indicator high capacity technique for RGB image based Steganography,” in WoSPA 2008–5th IEEE International Workshop on Signal Processing and its Applications, 2008, pp. 1-3.

  11. Gutub, A.-A., Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell. 2:56–64, 2010.

    Google Scholar 

  12. Abu-Marie, W., Gutub, A., and Abu-Mansour, H., Image based steganography using truth table based and determinate array on RGB indicator. Int. J. Sign. Imag. Process. 1:196–204, 2010.

    Google Scholar 

  13. Fakhredanesh, M., Rahmati, M., and Safabakhsh, R., Adaptive image steganography using contourlet transform. J. Electron. Imag. 22:043007–043007, 2013.

    Article  Google Scholar 

  14. Chen, W.-Y., Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques. Appl. Math. Comput. 196:40–54, 2008.

    Article  Google Scholar 

  15. Noda, H., Niimi, M., and Kawaguchi, E., High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recogn. Lett. 27:455–461, 2006.

    Article  Google Scholar 

  16. Jafari, R., Ziou, D., and Rashidi, M. M., Increasing image compression rate using steganography. Expert Syst. Applic. 40:6918–6927, 2013.

    Article  Google Scholar 

  17. Raeiatibanadkooki, M., Quchani, S. R., KhalilZade, M., and Bahaadinbeigy, K., Compression and encryption of ECG signal using wavelet and chaotically Huffman code in telemedicine application. J. Med. Syst. 40:1–8, 2016.

    Article  Google Scholar 

  18. Chen, S.-T., Guo, Y.-J., Huang, H.-N., Kung, W.-M., Tseng, K.-K., and Tu, S.-Y., Hiding patients confidential Datainthe ECG signal via transform-domain quantization scheme. J. Med. Syst. 38:1–8, 2014.

    Article  CAS  Google Scholar 

  19. Martínez-Pérez, I., De La Torre-Díez, and López-Coronado, M., “Privacy and security in mobile health apps: a review and recommendations,”. J. Med. Syst. 39:1–8, 2015.

    Article  Google Scholar 

  20. Muhammad, K., Ahmad, J., Farman, H., and Jan, Z., A new image steganographic technique using pattern based bits shuffling and magic LSB for grayscale images. Sindh Univ. Res. J.-SURJ (Sci. Ser.) 47:723–728, 2016.

    Google Scholar 

  21. Muhammad, K., Ahmad, J., Rehman, N. U., Jan, Z., and Qureshi, R. J., “A secure cyclic steganographic technique for color images using randomization,”. Tech. J., Univ. Eng. Technol. Taxila 19:57–64, 2015.

    Google Scholar 

  22. Al-Otaibi, N. A., and Gutub, A. A., “2-Leyer security system for hiding sensitive text data on personal computers,”. Lect. NoteS Inform. Theory. 2, 2014.

  23. Wang, R.-Z., Lin, C.-F., and Lin, J.-C., Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34:671–683, 2001.

    Article  Google Scholar 

  24. Chang, C.-C., Hsiao, J.-Y., and Chan, C.-S., Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn. 36:1583–1595, 2003.

    Article  Google Scholar 

  25. Chan, C.-K., and Cheng, L.-M., Hiding data in images by simple LSB substitution. Pattern Recogn. 37:469–474, 2004.

    Article  Google Scholar 

  26. Thien, C.-C., and Lin, J.-C., A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn. 36:2875–2881, 2003.

    Article  Google Scholar 

  27. Wu, H.-C., Wu, N.-I., Tsai, C.-S., and Hwang, M.-S., “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,”. IEE Proc.-Vision, Imag. Sign. Process. 152:611–615, 2005.

    Article  Google Scholar 

  28. Dumitrescu, S., Wu, X., and Wang, Z., “Detection of LSB steganography via sample pair analysis,”. Sign. Process., IEEE Trans. 51:1995–2007, 2003.

    Article  Google Scholar 

  29. Parvez, M. T. and Gutub, A.-A., “RGB intensity based variable-bits image steganography,” in Asia-Pacific Services Computing Conference, 2008. APSCC’08. IEEE. 1322-1327, 2008.

  30. Parvez, M. T., and Gutub, A. A.-A., Vibrant color image steganography using channel differences and secret data distribution. Kuwait J. Sci. Eng. 38:127–142, 2011.

    Google Scholar 

  31. Amirtharajan, R., Behera, S. K., Swarup, M. A., and Rayappan, J. B. B., “Colour guided colour image steganography,” arXiv preprint arXiv:1010.4007, 2010.

  32. Swain, G., and Lenka, S. K., A novel approach to RGB channel based image steganography technique. Int. Arab J. e-Technol. 2:181–186, 2012.

    Google Scholar 

  33. Amirtharajan, R., Archana, P., Rajesh, V., Devipriya, G., and Rayappan, J., “Standard deviation converges for random image steganography,” in Information & Communication Technologies (ICT), 2013 I.E. Conference on. 1064-1069, 2013.

  34. Amirtharajan, R., Mahalakshmi, V., Nandhini, J., Kavitha, R., and Rayappan, J., Key decided cover for random image steganography. Res. J. Inf. Technol. 5:171–180, 2013.

    Article  Google Scholar 

  35. Chen, W.-J., Chang, C.-C., and Le, T. H. N., High payload steganography mechanism using hybrid edge detector. Expert Syst. Applic. 37:3292–3301, 2010.

    Article  Google Scholar 

  36. Grover, N., and Mohapatra, A., “Digital image authentication model based on edge adaptive steganography,” in Advanced Computing, Networking and Security (ADCONS), 2013 2nd International Conference on. 238-242, 2013.

  37. Bailey, K., and Curran, K., An evaluation of image based steganography methods. Multimed Tools Applic. 30:55–88, 2006.

    Article  Google Scholar 

  38. Jassim, F. A., “A novel steganography algorithm for hiding text in image using five modulus method,” Int. J. Comput. Applic. 72, 2013.

  39. Karim, M., “A new approach for LSB based image steganography using secret key,” 14th Int. Conf. Comput. Inform. Technol. (ICCIT 2011). 286–291, 2011.

  40. Muhammad, K., Ahmad, J., Farman, H., and Zubair, M., A novel image steganographic approach for hiding text in color images using HSI color model. Middle-East J. Sci. Res. 22:647–654, 2014.

    Google Scholar 

  41. Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., and Baik, S., “A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image,” Multimed. Tools Applic. 1–27, 2015/05/24 2015.

  42. Muhammad, K., Ahmad, J., Farman, H., Jan, Z., Sajjad, M., and Baik, S. W., A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Trans. Internet Inform. Syst. (TIIS) 9:1938–1962, 2015.

    Google Scholar 

  43. Sajjad, M., Mehmood, I., and Baik, S. W., Image super-resolution using sparse coding over redundant dictionary based on effective image representations. J. Vis. Commun. Image Represent. 26:50–65, 2015.

    Article  Google Scholar 

  44. Muhammad, K., Mehmood, I., Lee, M. Y., Ji, S. M., and Baik, S. W., Ontology-based secure retrieval of semantically significant visual contents. J. Korean Instit. Next Gen. Comput. 11:87–96, 2015.

    Google Scholar 

  45. The USC-SIPI Image Database. http://sipi.usc.edu/services/database/Database.html. 2003.

  46. Sheikh, H. R., Sabir, M. F., and Bovik, A. C., “A statistical evaluation of recent full reference image quality assessment algorithms,”. Imag. Process., IEEE Trans. 15:3440–3451, 2006.

    Article  Google Scholar 

  47. Wang, J. Z., Li, J., and Wiederhold, G., “SIMPLIcity: Semantics-sensitive integrated matching for picture libraries,”. Pattern Anal. Mach. Intell., IEEE Trans. 23:947–963, 2001.

    Article  Google Scholar 

  48. Muhammad, K., Ahmad, J., Sajjad, M., and Zubair, M., “Secure image steganography using cryptography and image transposition,”. NED Univ. J. Res. 12:81–91, 2015.

  49. Dogan, S., Tuncer, T., Avci, E., and Gulten, A., A new watermarking system based on discrete cosine transform (DCT) in color biometric images. J. Med. Syst. 36:2379–2385, 2012.

    Article  PubMed  Google Scholar 

  50. Sajjad, M., Ejaz, N., and Baik, S. W., Multi-kernel based adaptive interpolation for image super-resolution. Multimed. Tools Applic. 72:2063–2085, 2014.

    Article  Google Scholar 

  51. Mstafa, R. J., and Elleithy, K. M., “A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes,”. Multimed. Tools Applic. 1–23, 2015.

  52. Ejaz, N., Mehmood, I., and Baik, S. W., Efficient visual attention based framework for extracting key frames from videos. Signal Process. Image Commun. 28:34–44, 2013.

    Article  Google Scholar 

  53. Sun, Y., Chen, L., Xu, R., and Kong, R., An image encryption algorithm utilizing Julia Sets and Hilbert Curves. PLoS One 9:e84655, 2014.

    Article  PubMed  PubMed Central  Google Scholar 

  54. Parah, S. A., Sheikh, J. A., Hafiz, A. M., and Bhat, G., Data hiding in scrambled images: A new double layer security data hiding technique. Comput. Electrical Eng. 40:70–82, 2014.

    Article  Google Scholar 

  55. Mehmood, M., Sajjad, and Baik, S. W., Video summarization based tele-endoscopy: A service to efficiently manage visual data generated during wireless capsule endoscopy procedure. J. Med. Syst. 38:1–9, 2014.

    Article  Google Scholar 

  56. Wang, S., Banerjee, B. A., Barth, Y. M., Bhat, S., Chauhan, K. T., and Gottlieb, Wireless capsule endoscopy. Gastrointest. Endosc. 78:805–815, 2013.

    Article  PubMed  Google Scholar 

  57. De Avila, S. E. F., Lopes, A. P. B., da Luz, A., and de Albuquerque Araújo, A., VSUMM: A mechanism designed to produce static video summaries and a novel evaluation method. Pattern Recogn. Lett. 32:56–68, 2011.

    Article  Google Scholar 

  58. Almeida, J., Leite, N. J., and Torres, R. D. S., Vison: Video summarization for online applications. Pattern Recogn. Lett. 33:397–409, 2012.

    Article  Google Scholar 

  59. De Avila, S. E., da Luz, A., de Araujo, A., and Cord, M., “VSUMM: An approach for automatic video summarization and quantitative evaluation,”. Comput. Graph. Imag. Process. 2008. SIBGRAPI’08. XXI Brazilian Sympos. 103–110, 2008.

  60. Almeida, N. J., Leite, A., and Torres, R. D. S., Online video summarization on compressed domain. J. Vis. Commun. Image Represent. 24:729–738, 2013.

    Article  Google Scholar 

  61. Lee, H.-G., Choi, M.-K., Shin, B.-S., and Lee, S.-C., Reducing redundancy in wireless capsule endoscopy videos. Comput. Biol. Med. 43:670–682, 2013.

    Article  PubMed  Google Scholar 

  62. Chen, Y., and Lee, J., “A review of machine-vision-based analysis of wireless capsule endoscopy video,”. Diagnos. Therapeut. Endoscopy. 2012, 2012.

  63. Chih-Yang, C.-C., Chang, and Yu-Zheng, W., Reversible steganographic method with high payload for JPEG images. IEICE Trans. Inf. Syst. 91:836–845, 2008.

    Google Scholar 

  64. Zhao, H., Wang, H., and Khan, M. K., Statistical analysis of several reversible data hiding algorithms. Multimed. Tools Applic. 52:277–290, 2011.

    Article  Google Scholar 

  65. Wu, H., and Wang, H., “Multibit color-mapping steganography using depth-first search,”. Biomet. Sec. Technol. (ISBAST), 2013 Int. Sympos. 224–229, 2013.

Download references

Acknowledgments

This research is supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2013R1A1A2012904).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sung Wook Baik.

Additional information

This article is part of the Topical Collection on Mobile Systems

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Muhammad, K., Sajjad, M. & Baik, S.W. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy. J Med Syst 40, 114 (2016). https://doi.org/10.1007/s10916-016-0473-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-016-0473-x

Keywords

Navigation