Steganography-based voice hiding in medical images of COVID-19 patients

被引:8
作者
Yildirim, Melih [1 ]
机构
[1] Sci & Technol Res Council Turkey TUBITAK, Ankara, Turkey
关键词
COVID-19; Steganography; Cryptography; Chaos; Voice hiding; Differential attack; Statistical attacks; DNA-SEQUENCE OPERATION; TRANSFORM DOMAIN; ENCRYPTION; ALGORITHM; CHAOS; SYSTEM; MAP; SCHEME;
D O I
10.1007/s11071-021-06700-z
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
A novel image steganography technique in order to hide the ciphered voice data has been suggested in this work. The doctor's voice comments belonging to a coronavirus disease 2019 (COVID-19) patient are hidden in a medical image in order to protect the patient information. The introduced steganography technique is based on chaos theory. Firstly, the voice comments of the doctor are converted to an image and secondly, they are ciphered utilizing the suggested encryption algorithm based on a chaotic system. Then, they are embedded into the cover medical image. A lung angiography dual-energy computed tomography (CT) scan of a COVID-19 patient is used as a cover object. Numerical and security analyses of steganography method have been performed in MATLAB environment. The similarity metrics are calculated for R, G, B components of cover image and stego image as visual quality analysis metrics to examine the performance of the introduced steganography procedure. For a 512 x 512 pixel cover image, SSIM values are obtained as 0.8337, 0.7926, and 0.9273 for R, G, B components, respectively. Moreover, security analyses which are differential attack, histogram, information entropy, correlation of neighboring pixels and the initial condition sensitivity are carried out. The information entropy is calculated as 7.9993 bits utilizing the suggested steganography scheme. The mean value of the ten UACI and NPCR values are obtained as 33.5688% and 99.8069%, respectively. The results of security analysis have revealed that the presented steganography procedure is able to resist statistical attacks and the chaotic system-based steganography scheme shows the characteristics of the sensitive dependence on the initial condition and the secret key. The proposed steganography method which is based on a chaotic system has superior performance in terms of being robust against differential attack and hiding encrypted voice comments of the doctor. Moreover, the introduced algorithm is also resistant against exhaustive, known plaintext, and chosen plaintext attacks.
引用
收藏
页码:2677 / 2692
页数:16
相关论文
共 50 条
  • [1] A new chaotic system with hidden attractor and its engineering applications: analog circuit realization and image encryption
    Cavusoglu, Unal
    Panahi, Shirin
    Akgul, Akif
    Jafari, Sajad
    Kacar, Sezgin
    [J]. ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING, 2019, 98 (01) : 85 - 99
  • [2] Digital image steganography: Survey and analysis of current methods
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    Mc Kevitt, Paul
    [J]. SIGNAL PROCESSING, 2010, 90 (03) : 727 - 752
  • [3] Optical image encryption based on diffractive imaging
    Chen, Wen
    Chen, Xudong
    Sheppard, Colin J. R.
    [J]. OPTICS LETTERS, 2010, 35 (22) : 3817 - 3819
  • [4] Davis R. M., 1978, IEEE Communications Society Magazine, V16, P5, DOI 10.1109/MCOM.1978.1089771
  • [5] A new chaotic algorithm for image encryption
    Gao, HJ
    Zhang, YS
    Liang, SY
    Li, DQ
    [J]. CHAOS SOLITONS & FRACTALS, 2006, 29 (02) : 393 - 399
  • [6] A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2
    Guesmi, R.
    Farah, M. A. B.
    Kachouri, A.
    Samet, M.
    [J]. NONLINEAR DYNAMICS, 2016, 83 (03) : 1123 - 1136
  • [7] Hash key-based image encryption using crossover operator and chaos
    Guesmi, Ramzi
    Ben Farah, Mohamed Amine
    Kachouri, Abdennaceur
    Samet, Mounir
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) : 4753 - 4769
  • [8] A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map
    Hamza, Rafik
    Titouna, Faiza
    [J]. INFORMATION SECURITY JOURNAL, 2016, 25 (4-6): : 162 - 179
  • [9] Image Encryption Using Josephus Problem and Filtering Diffusion
    Hua, Zhongyun
    Xu, Binxuan
    Jin, Fan
    Huang, Hejiao
    [J]. IEEE ACCESS, 2019, 7 : 8660 - 8674
  • [10] Generalized fractional logistic map encryption system based on FPGA
    Ismail, Samar M.
    Said, Lobna A.
    Rezk, Ahmed A.
    Radwan, Ahmed G.
    Madian, Ahmed H.
    Abu-Elyazeed, Mohamed F.
    Soliman, Ahmed M.
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2017, 80 : 114 - 126