Skip to content
2000
Volume 20, Issue 1
  • ISSN: 1573-4056
  • E-ISSN: 1875-6603
side by side viewer icon HTML

Abstract

Aim of the Study

Post COVID-19, everyone needs to be aware of health. The condition of the human body is judged based on various health reports like X-ray, CT scan and MRI scan. Due to misplacement or loss of medical reports, there lies a high chance of improper diagnosis.

Methods

In order to avoid improper diagnosis, a novel data-hiding technique is proposed in this work. In the proposed method, the patient’s health records are hidden using polynomial theory in the patient photograph. This is used by doctors in telemedicine for better treatment at the right time. Image steganography is useful for hiding secret images and also for generating secret keys. This enables only the authorized people (patient and corresponding doctor) to access the reports using secret keys.

Results

Four secret images (medical reports of the patient) are successfully embedded onto a single cover image (patient photo) with good quality. After embedding, the stego images look like cover images so that unauthorized persons will not be able to access the data, and hence, safe transmission is being carried out.

Conclusion

A patient's medical report plays an important role in proper medical treatment. Particularly in telemedicine, the safe transmission of patient reports without any loss or damage is necessary. The proposed method embeds reports of a patient in his/her photo and transmits them to the destination safely with a quality of 45.5 dB. This hiding method is helpful to avoid cyber crimes, illegal transactions, malpractices .

This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International Public License (CC-BY 4.0), a copy of which is available at: https://creativecommons.org/licenses/by/4.0/legalcode. This license permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Loading

Article metrics loading...

/content/journals/cmir/10.2174/0115734056276785240229073917
2024-01-01
2025-06-21
The full text of this item is not currently available.

References

  1. WeiW. WenY. A novel image steganography using wavelet contrast and modulus operation.Lect. Notes Comput. Sci.2016977241842510.1007/978‑3‑319‑42294‑7_37
    [Google Scholar]
  2. DuanX. GuoD. LiuN. A new high capacity image steganography method combined with image elipitic curve cryptography and deep neural network.IEEE Access20208
    [Google Scholar]
  3. BiXinliang YangXiaoyuan WangChao LiuJia High capacity image steganography algorithm based on image style transfer.Secur. Commun. Networks20211114
    [Google Scholar]
  4. LakshmiS.B. Image steganography based on SVD and DWT techniques.J Discrete Math. Sci. Cryptograph202023377978610.1080/09720529.2019.1698801
    [Google Scholar]
  5. LakshmiS.B. SrinivasK.S. ChandraM.B. Steganography based image sharing with reversibility.J Discrete Math. Sci. Cryptograph2016191678010.1080/09720529.2015.1086109
    [Google Scholar]
  6. LakshmiS.B. SrinivasK.S. ChandraM.B. Identification of cheaters in elections using steganography.J Inform. Optimiz. Sci.201637227127810.1080/02522667.2015.1130891
    [Google Scholar]
  7. PrasanthV.S. Adaptive temper detection watermarking scheme for medical images in transform domain.Multimed Tools Appl.20228181160511619
    [Google Scholar]
  8. PrasanthV.S. Adaptive medical image watermarking system for E- Health care applications.S N Comp. Sci.202232107110
    [Google Scholar]
  9. RayiS. EPNN based high secure intensive hidden digital wateemark application in telemedicine.Adv. Model. Analy20195612225
    [Google Scholar]
  10. LakshmiS.B. SrinivasK.S. ChandraM.B. Advances in modelling and analysis Steganography based information security with high embedding capacity.National conference on Recent Advances in Electronics & Computer Engineering2015
    [Google Scholar]
  11. UshaR.K. ArunaP.P. Identification of attention-deficit-hyperactivity disorder subtypes based on structural mri grey matter volume and phenotypic information.J Curr. Med. Imag.2023191416561664
    [Google Scholar]
  12. WangJ. ZhaoX. ZhangW. Pituitary adenoma with multiple calcifications in a child: A rare case presentation.J Curr. Med. Imag.2023191416851688
    [Google Scholar]
  13. SuX. WangS. Is magnetic resonance imaging (mri) still a gold standard to detect breast cancer: A meta-analysis.J Curr. Med. Imag.2023191416431655
    [Google Scholar]
  14. MohsinH. PSO–Blockchain-based image steganography: Towards a new method to secure updating and sharing COVID-19 data in decentralized hospitals intelligence architecture. Multimedia Tools and Applications SpringerBerlin20201413714161
    [Google Scholar]
  15. SiddiquiG.F. IqbalM.Z. SaleemK. A dynamic three-bit image steganography algorithm for medical and e-healthcare systems.IEEE2020181893181903
    [Google Scholar]
  16. SahuA.K. SahuM. Digital image steganography and steganalysis: A journey of the past three decades.Open Comp. Sci.202010296342
    [Google Scholar]
  17. OgundokunR.O. AbikoyeO.C. A safe and secured medical textual information using an improved LSB image steganography.Int J. Dig. Multimed. Broadcast202120218827055
    [Google Scholar]
  18. SubramanianN. ElharroussO. Al-MaadeedS. BouridaneA. Image steganography: A review of the recent advances.IEEE Access20219234092342310.1109/ACCESS.2021.3053998
    [Google Scholar]
  19. FridrichJ KodovskyJ Rich models for steganalysis of digital images.IEEE Transactions on Information Forensics and SecurityIEEE202273868882
    [Google Scholar]
  20. ZhouZ. Coverless image steganography using partial-duplicate image retrieval.Soft Computing20192349274938
    [Google Scholar]
  21. ShamirA. How to share a secret.Commun. ACM1979221161261310.1145/359168.359176
    [Google Scholar]
  22. ThienC.C. LinJ.C. Secret image sharing.Comput. Graph.200226576577010.1016/S0097‑8493(02)00131‑0
    [Google Scholar]
  23. LinC.C. TsaiW.H. Secret image sharing with steganography and authentication.J. Syst. Softw.200473340541410.1016/S0164‑1212(03)00239‑5
    [Google Scholar]
  24. WuY.S. ThienC.C. LinJ.C. Sharing and hiding secret images with size constraint.Pattern Recognit.20043771377138510.1016/j.patcog.2004.01.002
    [Google Scholar]
  25. YangC.N. ChenT-S. YuK.H. WangC.C. Improvements of image sharing with steganography and authentication.J. Syst. Softw.20078071070107610.1016/j.jss.2006.11.022
    [Google Scholar]
  26. ChangC.C. HsiehY.P. LinC-H. Sharing secrets in stego images with authentication.Pattern Recognit.200841103130313710.1016/j.patcog.2008.04.006
    [Google Scholar]
  27. ZhaoR. ZhaoJ. DaiF. ZhaoF. A new image secret sharing scheme to identify cheaters.Comput. Stand. Interfaces200931125225710.1016/j.csi.2007.10.012
    [Google Scholar]
  28. LinP.Y. LeeJ.S. ChangC.C. Distortion-free secret image sharing mechanism using modulus operator.Patt. Recognit.200942588689510.1016/j.patcog.2008.09.014
    [Google Scholar]
  29. PeiY. Invertible secret image sharing with steganography.Patt. Recognit. Lett.2010311887189310.1016/j.patrec.2010.01.019
    [Google Scholar]
  30. LeeY-P. LeeJ-C. ChenW-K. ChangK-C. SuI-J. ChangC-P. High-payload image hiding with quality recovery using tri-way pixel-value differencing.Inf. Sci.201219121422510.1016/j.ins.2012.01.002
    [Google Scholar]
  31. XieJ. WangH. WuD. Adaptive image steganography using fuzzy enhancement and grey wolf optimizer.IEEE Trans. Fuzzy Syst.202230114953496410.1109/TFUZZ.2022.3164791
    [Google Scholar]
  32. El-ShafaiW. Abd El-HameedH.A. El-HagN.A. KhalafA.A.M. SolimanN.F. Proposed privacy preservation technique for color medical images.Intell. Automat. Soft Comput.202336171973210.32604/iasc.2023.031079
    [Google Scholar]
  33. GaoS. WuR. WangX. LiuJ. LiQ. TangX. EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory.Inf. Sci.202362176678110.1016/j.ins.2022.11.121
    [Google Scholar]
  34. GaoS. WuR. WangX. WangJ. LiQ. WangC. TangX. A 3D model encryption scheme based on a cascaded chaotic system.Sign. Process.202320210874510.1016/j.sigpro.2022.108745
    [Google Scholar]
/content/journals/cmir/10.2174/0115734056276785240229073917
Loading
/content/journals/cmir/10.2174/0115734056276785240229073917
Loading

Data & Media loading...


  • Article Type:
    Research Article
Keyword(s): COVID-19; Data hiding; Image metrics; Internet; Steganography; Telemedicine
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test