A Secure Reversible Data Hiding and Encryption System for Embedding EPR in Medical Images

Author(s): Sonal Ayyappan, C. Lakshmi, Varun Menon*

Journal Name: Current Signal Transduction Therapy

Volume 15 , Issue 2 , 2020


Become EABM
Become Reviewer
Call for Editor

Graphical Abstract:


Abstract:

Background: Recent advances in medical associated technologies have drastically increased the amount of electronic medical records collected, stored and transferred through the network. Considering the significance and level of sensitivity of the collected medical data, the security of the transmitted data has become a very vital and challenging task for researchers. The protection of these medical images with embedded data is usually guaranteed using encryption or data hiding techniques. Conventional techniques that employ encryption or data hiding are often insecure and also time-consuming during transmission through the network.

Materials and Methods: A method combining encryption and data hiding together can result in compression of data that reduces the transmission time and increases the security level. Reversible data hiding in images can reestablish the cover image after extracting the hidden embedded data exclusive of alterations. Here a new reversible crypto-watermarking system is proposed using cryptographic algorithms that encrypts and hides an Electronic Patient Record (EPR) into an image corresponding to that patient using Rhombus Prediction Scheme. It embeds a big amount of encrypted data into an image with hardly noticeable modification using spatial pixel manipulations based on prediction errors. The marked image is hashed using SHA-256 algorithm.

Results and Conclusion: Hashing and cryptography increases the robustness and guarantees authenticity with integrity. The proposed method results in improved safety with a lower transmission time than the existing methods.

Keywords: Crypto-watermarking, Diffie-Hellman, image security, medical images, RC4 encryption, rhombus prediction scheme, SHA-256.

[1]
Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inf Theory 1976; 22(6): 644-54.
[http://dx.doi.org/10.1109/TIT.1976.1055638]
[2]
Philip V, Suman VK, Menon VG, Dhanya KA. A review on latest Internet of things based healthcare applications. Int J Comp Sci Inf Secur 2017; 15(1): 248.
[3]
Vinoj PG, Jacob S, Menon VG. Hybrid brain actuated muscle interface for the physically disabled. Basic Clint Pharmacol Toxicol 2018; 123(S3): 8-9.
[4]
Deshkar S, Thanseeh RA, Menon VG. A review on IoT based mhealth systems for diabetes. Int J Comp Sci Tel 2017; 8(1): 13-8.
[5]
Menon VG, Prathap J. Vehicular fog computing: Challenges, applications and future directions Fog computing: Breakthroughs in research and practice. IGI Global 2018; p. 220.
[http://dx.doi.org/10.4018/978-1-5225-5649-7.ch011]
[6]
Menon VG, Joe Prathap PM. Moving from vehicular cloud computing to vehicular fog computing: Issues and challenges. Int J Comp Sci Eng 2017; 9(2)
[7]
Yang B, Schmucker M, Funk W, Busch C, Sun S. Integer DCT based reversible watermarking for images using companding technique. Proceedings of the SPIE, Security, Steganography, and Water-marking of Multimedia Contents VI 2004; pp. 405-15.
[http://dx.doi.org/10.1117/12.527216]
[8]
Xuan G, Yang C, Zhen Y, Shi YQ, Ni Z. Reversible data hiding using integer wavelet transform and companding technique Digital watermarking IWDW 2004 Lecture Notes in Computer Science Berlin, Heidelberg: Springer. 2005; 3304: pp. 115-24.
[9]
Celik MU, Sharma G, Tekalp AM, Saber E. Lossless generalized lSB data embedding. IEEE Trans Image Process 2005; 14(2): 253-66.
[http://dx.doi.org/10.1109/TIP.2004.840686] [PMID: 15700530]
[10]
Memon N, Khan A, Gilani S, Ahmad M. Reversible water-marking method based on adaptive thresholding and companding technique. Int J Comp Math 2011; 88(8): 1573-94.
[http://dx.doi.org/10.1080/00207160.2010.509429]
[11]
Arsalan M, Malik S, Khan A. Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Soft 2012; 85(4): 883-94.
[http://dx.doi.org/10.1016/j.jss.2011.11.005]
[12]
Gao X, An L, Li X, Tao D. Reversibility improved lossless data hiding. Signal Processing 2009; 89(10): 2053-65.
[http://dx.doi.org/10.1016/j.sigpro.2009.04.015]
[13]
Hu Y. Heung-Kyu Lee, Jianwei Li. DE-based reversible data hiding with improved overflow location map. IEEE Trans Circ Syst Video Tech 2009; 19(2): 250-60.
[http://dx.doi.org/10.1109/TCSVT.2008.2009252]
[14]
Juang Y, Ko L, Chen J, Shieh Y, Sung T, Hsin H. Histogram modification and wavelet transform for high performance watermarking. Math Probl Eng 2012; 2012: 1-14.
[http://dx.doi.org/10.1155/2012/164869]
[15]
Kamran KA. Malik S. A high capacity reversible water-marking approach for authenticating images: Exploiting down-sampling, histogram processing, and bloc selection. Inf Sci 2014; 256: 162-83.
[http://dx.doi.org/10.1016/j.ins.2013.07.035]
[16]
Kim K, Lee M, Lee H, Lee H. Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recognit 2009; 42(11): 3083-96.
[http://dx.doi.org/10.1016/j.patcog.2009.04.004]
[17]
Lee S, Suh Y, Ho Y. Reversible image authentication based on watermarking. IEEE International Conference on Multimedia and Expo. Toronto, Canada. 2006; pp. 1321-4.
[18]
Li X, Li B, Yang B, Zeng T. General framework to histogram shifting- based reversible data hiding. IEEE Trans Image Process 2013; 22(6): 2181-91.
[http://dx.doi.org/10.1109/TIP.2013.2246179] [PMID: 23399962]
[19]
Li X, Zhang W, Gui X, Yang B. A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inf Forensics Security 2013; 8(7): 1091-100.
[http://dx.doi.org/10.1109/TIFS.2013.2261062]
[20]
Ni Z, Shi Y, Ansari N, Su W, Sun Q, Lin X. Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Trans Circ Syst Video Tech 2008; 18(4): 497-509.
[http://dx.doi.org/10.1109/TCSVT.2008.918761]
[21]
Pan JS, Yang CN, Lin CC, Wang ZH, et al. Multi- dimensional and multi-level histogram-shifting-imitated reversible data hiding schemeAdv Intell Syst Appl. 2013; pp. 149-58.
[22]
Tai W-L. Chia-Ming Yeh, Chin-Chen Chang. Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circ Syst Video Tech 2009; 19(6): 906-10.
[http://dx.doi.org/10.1109/TCSVT.2009.2017409]
[23]
De Vleeschouwer C, Delaigle J, Macq B. Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimed 2003; 5(1): 97-105.
[http://dx.doi.org/10.1109/TMM.2003.809729]
[24]
De-Vleeschouwer C, Delaigle JF, Macq B. Circular interpretation of histogram for reversible watermarking IEEE Fourth Workshop on Multimedia Signal Processing. 345-50.
[25]
Lin C, Tai W, Chang C. Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 2008; 41(12): 3582-91.
[http://dx.doi.org/10.1016/j.patcog.2008.05.015]
[26]
Ni Z, Shi Y, Ansari N, Su W. Reversible data hiding. IEEE Trans Circ Syst Video Tech 2006; 16(3): 354-62.
[http://dx.doi.org/10.1109/TCSVT.2006.869964]
[27]
Tsai P, Hu Y, Yeh H. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing 2009; 89(6): 1129-43.
[http://dx.doi.org/10.1016/j.sigpro.2008.12.017]
[28]
Tian J. Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Tech 2003; 13(8): 890-6.
[http://dx.doi.org/10.1109/TCSVT.2003.815962]
[29]
Al-Qershi O, Khoo B. High capacity data hiding schemes for medical images base on difference expansion. J Syst Soft 2011; 84(1): 105-12.
[http://dx.doi.org/10.1016/j.jss.2010.08.055]
[30]
Alattar AM. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 2004; 13(8): 1147-56.
[http://dx.doi.org/10.1109/TIP.2004.828418] [PMID: 15326856]
[31]
Hsu F, Wu M, Wang S, Huang C. Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion. J Supercomput 2013; 66(2): 812-28.
[http://dx.doi.org/10.1007/s11227-013-0896-9]
[32]
Jawad K, Khan A. Genetic algorithm and difference expansion based reversible watermarking for relational databases. J Syst Soft 2013; 86(11): 2742-53.
[http://dx.doi.org/10.1016/j.jss.2013.06.023]
[33]
Hyoung Joong Kim Sachnev V, Yun Qing Shi, Jeho Nam, Hyon- Gon Choo. A novel difference expansion transform for reversible data embedding. IEEE Trans Inf Forensics Security 2008; 3(3): 456-65.
[http://dx.doi.org/10.1109/TIFS.2008.924600]
[34]
Ni R, Cheng HD, Zhao Y, Hou Y. High capacity reversible watermarking for images based on classified neural network. Lect Notes Comp Sci, Image Anal 2013; pp. 697-706.
[http://dx.doi.org/10.1007/978-3-642-38886-6_65]
[35]
Pei Q, Wang X, Li Y, Li H. Adaptive reversible watermarking with improved embedding capacity. J Syst Soft 2013; 86(11): 2841-8.
[http://dx.doi.org/10.1016/j.jss.2013.06.055]
[36]
Peng F, Lei Y, Long M, Sun X. A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comp Aided Des 2011; 43(8): 1018-24.
[http://dx.doi.org/10.1016/j.cad.2011.03.011]
[37]
Tseng H, Chang C. An extended difference expansion algorithm for reversible watermarking. Image Vis Comp 2008; 26(8): 1148-53.
[http://dx.doi.org/10.1016/j.imavis.2007.12.005]
[38]
Thodi DM, Rodriguez JJ. Prediction-error based reversible watermarking International Conference on Image Processing 1549-52.
[39]
Chen M, Chen Z, Zeng X, Xiong Z. Reversible image watermarking based on full context prediction. 16th IEEE International Conference of Image Processing. Cairo, Egypt. 2009; pp. 4253-6.
[40]
Chen X, Sun X, Sun H, Zhou Z, Zhang J. Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J Syst Soft 2013; 86(10): 2620-6.
[http://dx.doi.org/10.1016/j.jss.2013.04.086]
[41]
Sachnev V. Hyoung Joong Kim, Jeho Nam, Suresh S, Yun Qing Shi. Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circ Syst Video Tech 2009; 19(7): 989-99.
[http://dx.doi.org/10.1109/TCSVT.2009.2020257]
[42]
Shi X, Xiao D. A reversible watermarking authentication scheme for wireless sensor networks. Inf Sci 2013; 240: 173-83.
[http://dx.doi.org/10.1016/j.ins.2013.03.031]
[43]
Tseng H, Hsieh C. Prediction-based reversible data hiding. Inf Sci 2009; 179(14): 2460-9.
[http://dx.doi.org/10.1016/j.ins.2009.03.014]
[44]
Jung K, Yoo K. Data hiding method using image interpolation. Comp Stand Interfaces 2009; 31(2): 465-70.
[http://dx.doi.org/10.1016/j.csi.2008.06.001]
[45]
Lixin L, Zhenyong C, Ming C, Xiao Z, Zhang X. Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Security 2010; 5(1): 187-93.
[http://dx.doi.org/10.1109/TIFS.2009.2035975]
[46]
Abadi M A M, Danyali H, Helfroush MS. Reversible watermarking based on interpolation error histogram shifting. 5th International Symposium on Telecommunications (IST). Kish Island, Iran. 2010; pp. 840-5.
[47]
Naheed T, Usman I, Dar A. Lossless data hiding using optimized interpolation error expansion. Front. Inform. Technol 2011; pp. 281-6.
[48]
Lee C, Huang Y. An efficient image interpolation-increasing payload in reversible data hiding. Expert Syst Appl 2012; 39(8): 6712-9.
[http://dx.doi.org/10.1016/j.eswa.2011.12.019]
[49]
Hu J, Li T. Reversible steganography using extended image interpolation technique. Comput Electr Eng 2015; 46: 447-55.
[http://dx.doi.org/10.1016/j.compeleceng.2015.04.014]
[50]
Tang M, Hu J, Song W. A high capacity image steganography using multi-layer embedding. Optik (Stuttg) 2014; 125(15): 3972-6.
[http://dx.doi.org/10.1016/j.ijleo.2014.01.149]
[51]
Hirak KM, Santi PM. Joint robust and reversible watermarking for medical images. 2nd International Conference on Communication, Computing Security [ICCCS-2012], Elsevier, Procedia Technology. 6: 275-82.
[52]
Naheed T, Usman I, Khan T, Dar A, Shafique M. Intelligent reversible watermarking technique in medical images using GA and PSO. Optik (Stuttg) 2014; 125(11): 2515-25.
[http://dx.doi.org/10.1016/j.ijleo.2013.10.124]
[53]
Ou B, Zhao Y, Ni R. Reversible watermarking using optional prediction error histogram modification. Neurocomputing 2012; 93: 67-76.
[http://dx.doi.org/10.1016/j.neucom.2012.04.021]
[54]
Wang X, Chang C, Nguyen T, Li M. Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digit Signal Process 2013; 23(2): 569-77.
[http://dx.doi.org/10.1016/j.dsp.2012.06.015]
[55]
Menon VG, Joe Prathap PM. comparative analysis of opportunistic routing protocols for underwater acoustic sensor networks. Proceedings of the IEEE International Conference on Emerging Technological Trends. Kerala, India. 2016.
[http://dx.doi.org/10.1109/ICETT.2016.7873733]
[56]
Menon VG. Opportunistic routing protocols in underwater acoustic sensor networks: Issues, challenges, and future directions magnetic communications: From theory to practice. CRC Press 2018; pp. 127-48.
[57]
Menon V G. Survey on latest energy based routing protocols for under-water wireless sensor networks. Sensors 2016; 6(6): 52-5.
[58]
Keerthi KS. Bandana Mahapatra and Menon V G. Into the world of underwater swarm robotics: Architecture, communication, applications and challenges. Recent Pat Comp Sci 2019; 12: 1.
[59]
Menon VG, Joe Prathap PM. Analyzing the behavior and performance of opportunistic routing protocols in highly mobile wireless ad hoc networks. IACSIT Int J Eng Technol 2016; 8(5): 1916-24.
[http://dx.doi.org/10.21817/ijet/2016/v8i5/160805409]
[60]
Bouslimi D, Coatrieux G, Cozic M, Roux C. Combination of watermarking and joint watermarking-decryption for reliability control and traceability of medical images. Annual International Conference of the IEEE Engineering in Medicine and Biology Society 2014; 4495-8.
[61]
Ma K, Zhang W, Zhao X, Yu N, Li F. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Security 2013; 8(3): 553-62.
[http://dx.doi.org/10.1109/TIFS.2013.2248725]
[62]
Koushik P, Subhajit K, Goutam G, Mahua B. A new combined crypto-watermarking technique using RSA algorithm and discrete cosine transform to retrieve embedded EPR from noisy bio-medical images. IEEE 1st International Conference on Condition Assessment Techniques in Electrical Systems (CATCON). 368-73.
[63]
Lakrissi Y. Mohammed E, Fakir M A joint encryption/watermarking algorithm for secure image transfer. Int J Comp Net Commun IJCNAC 2013; p. 1.
[64]
Zhang X. Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Security 2012; 7(2): 826-32.
[http://dx.doi.org/10.1109/TIFS.2011.2176120]
[65]
Subeesh V, Sudhish NG, Deepthi P. An integrity verification system for image using hashing and watermarking. International Conference on Image Processing, Applications and Systems 2020; 85-9.
[66]
Bouslimi D, Coatrieux G, Cozic M, Roux C. A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Trans Inf Technol Biomed 2012; 16(5): 891-9.
[http://dx.doi.org/10.1109/TITB.2012.2207730] [PMID: 22801525]
[67]
Rao N, Kumari V. Watermarking in medical imaging for security and authentication. Inf Sec J: Glo Percpec 2011; 20(3): 148-55.
[http://dx.doi.org/10.1080/19393555.2011.561154]
[68]
Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: Survey and analysis of current methods. Signal Processing 2010; 90(3): 727-52.
[http://dx.doi.org/10.1016/j.sigpro.2009.08.010]
[69]
Coatrieux G, Le Guillou C, Cauvin JM, Roux C. Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Inf Technol Biomed 2009; 13(2): 158-65.
[http://dx.doi.org/10.1109/TITB.2008.2007199] [PMID: 19272858]
[70]
Basri H. Efficient routing for dense UWSNs with high-speed mobile nodes using spherical divisions. J Super Comp 2018; 74: 696-716.
[http://dx.doi.org/10.1007/s11227-017-2148-x]
[71]
Basri H. Distributed random cooperation for VBF-based routing in high-speed dense underwater acoustic sensor networks. J Super Comp 2018; 74: 6184-200.
[http://dx.doi.org/10.1007/s11227-018-2532-1]
[72]
Basri H. Energy efficient spherical divisions for vbf-based routing in dense UWSNs.The International Conference on Knowledge-Based Engineering and Innovations. 2015; pp. 961-5.
[73]
Tavallali P, Yazdi M, Khosravi MR. Robust cascaded skin detector based on Ada- Boost. Multimedia Tools Appl 2018; 78: 2599-2620.
[http://dx.doi.org/10.1007/s11042-018-6385-7]
[74]
Basri H. A novel fake color scheme based on depth protection for MR passive/optical sensors. The International Conference on Knowledge-Based Engineering and Innovations. 362-7.
[75]
Samadi S. Determining the optimal range of angle tracking radars. IEEE International Conference on Power, Control, Signals and Instrumentation Engineering. 3132-5.
[76]
Yazdi M. A lossless data hiding scheme for medical images using a hybrid solution based on IBRW error histogram computation and quartered interpolation with greedy weights. Neural Comp Appl 2018; 30(7): 2017-28.
[http://dx.doi.org/10.1007/s00521-018-3489-y]
[77]
Sharif-Yazd M. MRF-based multispectral image fusion using an adaptive approach based on edge-guided interpolation. J Geogr Inf Syst 2017; 09(02): 114-25.
[http://dx.doi.org/10.4236/jgis.2017.92008]
[78]
Rostami H. enhancing the binary watermark-based data hiding scheme using an interpolation-based approach for optical remote sensing images. Int J Agric Environ Inf Syst 2018; 9(2): 53-71.
[http://dx.doi.org/10.4018/IJAEIS.2018040104]
[79]
Manikandan V, Masilamani V. Reversible data hiding scheme during encryption using machine learning. Procedia Comp Sci 2018; 133: 348-56.
[http://dx.doi.org/10.1016/j.procs.2018.07.043]
[80]
Sachnev V. Hyoung Joong Kim, Jeho Nam, Suresh S, Yun Qing Shi. Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circ Syst Video Tech 2009; 19(7): 989-99.
[http://dx.doi.org/10.1109/TCSVT.2009.2020257]
[81]
Haouzia A, Noumeir R. Methods for image authentication: A survey. Multimedia Tools Appl 2007; 39(1): 1-46.
[http://dx.doi.org/10.1007/s11042-007-0154-3]
[82]
Puech W. A reversible data hiding method for encrypted images, electronic imaging. International Society for Optics and Photonics 2008; pp. 68191E-E.
[83]
Loan NA, Parah SA, Sheikh JA, Akhoon JA, Bhat GM. Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications. J Biomed Inform 2017; 73: 125-36.
[http://dx.doi.org/10.1016/j.jbi.2017.08.002] [PMID: 28782602]
[84]
Akbarzadeh O. An introduction to envi tools for Synthetic Aperture Radar (sar) image despeckling and quantitative comparison of denoising filters. IEEE International Conference on Power, Control, Signals and Instrumentation Engineering. 2012-15;
[85]
Alhihi M. Determining the optimum number of paths for realization of multi-path routing in MPLS-TE networks. TELKOMNIKA 2017; 15: 1701-9.
[http://dx.doi.org/10.12928/telkomnika.v15i4.6597]


open access plus

Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 15
ISSUE: 2
Year: 2020
Published on: 01 December, 2020
Page: [124 - 135]
Pages: 12
DOI: 10.2174/1574362414666190304162411

Article Metrics

PDF: 24
HTML: 3
EPUB: 1