Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP

被引:14
作者
Kim, Cheonshik [1 ]
Shin, Dongkyoo [1 ]
Kim, Byung-Gyu [2 ]
Yang, Ching-Nung [3 ]
机构
[1] Sejong Univ, Dept Comp Sci & Engn, Seoul, South Korea
[2] Sookmyung Womens Univ, Dept Informat Technol Engn, Seoul, South Korea
[3] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Shoufeng, Taiwan
基金
新加坡国家研究基金会;
关键词
Data hiding; Hamming code; OPAP; LSB; Security;
D O I
10.1007/s11554-017-0674-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Some medical accidents in hospitals are related to mismanagement of medical images X-ray and computer tomography (CT). A counterfeit medical image leads to medical accidents. Thus, security of medical images is important for patient safety. Data hiding can help patients avoid mistakes of doctors or nurses who confuse patient X-rays or CT scans. A hybrid data hiding scheme was applied that combined the Hamming code and LSB with an optimal pixel adjustment process algorithm for encoding to conceal hidden patient information. In addition, quality and capacity of stego-images were improved. Experimental results confirmed that the hiding capacity provided by this strategy is greater than for other schemes. Moreover, the image quality of stego-images with the proposed scheme remained more than 50 dB for most medical test images. In this experiment, we verified the proposed steganographic data hiding scheme as RS steganalysis.
引用
收藏
页码:115 / 126
页数:12
相关论文
共 30 条
[1]   (N, 1) Secret Sharing Approach Based on Steganography with Gray Digital Images [J].
Baek, Jinsuk ;
Kim, Cheonshik ;
Fisher, Paul S. ;
Chao, Hongyang .
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, :325-+
[2]  
Bas P., 2011, P 13 INF HID C PRAG, V6958, DOI 10.1007/978-3-642- 24178-9_5
[3]  
Bierbrauer J, 2008, LECT NOTES COMPUT SC, V4920, P1, DOI 10.1007/978-3-540-69019-1_1
[4]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[5]   A High Payload Steganographic Scheme Based on (7,4) Hamming Code for Digital Images [J].
Chang, Chin-Chen ;
Kieu, The Duc ;
Chou, Yung-Chen .
PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, :16-+
[6]  
Crandall R., 1998, SOME NOTES STEGANOGR
[7]   Digital image steganography using stochastic modulation [J].
Fridrich, J ;
Goljan, M .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 :191-202
[8]  
Fridrich J., 2001, P ACM INT MULT C EXH, P27, DOI [10.1145/1232454.1232466, DOI 10.1145/1232454.1232466]
[9]   Robust Image Watermarking Theories and Techniques: A Review [J].
Hai Tao ;
Li Chongmin ;
Zainl, Jasni Mohamad ;
Abdalla, Ahmed N. .
JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2014, 12 :122-138
[10]   Data hiding by an improved exploiting modification direction [J].
Kim, Cheonshik .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 69 (03) :569-584