Reversible data hiding scheme using deep learning and visual cryptography for medical image communication

被引:7
作者
Kumar, Namachivayam Rajesh [1 ]
Krishnan, Raghupathy Bala [1 ]
Manikandan, Ganesan [2 ]
Subramaniyaswamy, Vairavasundaram [2 ]
Kotecha, Ketan [3 ]
机构
[1] SASTRA Deemed Univ, Dept Comp Sci & Engn, Kumbakonam, Tamil Nadu, India
[2] SASTRA Deemed Univ, Sch Comp, Thanjavur, Tamil Nadu, India
[3] Symbiosis Inst Technol, Ctr Appl Artificial Intelligence, Pune, Maharashtra, India
关键词
patient privacy; visual cryptography; Hadamard matrix; deep learning; steganography;
D O I
10.1117/1.JEI.31.6.063028
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to a growth in information sharing and the use of multiple digital technologies, human lifestyles have been delivered into the virtual world. This digital world has seen the use of images in special fields increase dramatically, especially in healthcare. Healthcare services can be delivered remotely through telemedicine, a well-known method of providing quality healthcare for people worldwide. There is the risk of illegal exploitation of medical data when telemedicine applications involve exposing data over open networks. In particular, medical experts should exercise more caution when sharing a patient's private information. In the proposed model, reversible data concealment is combined with visual cryptography to provide a secure method of exchanging medical images. A cover image is divided into nonoverlapping secret shares using Hadamard matrix. Secret digital imaging communication in medicine (DICOM) image is encoded by a deep learning model and embedded into secret shares for secure medical image sharing. Finally, the DICOM image is fully reversibly extracted with the cover image. In this case, a visual cryptographic design is used to secure the embedded secret shares. Furthermore, the metrics, such as mean squared error, peak-signal-to-noise ratio, and normalized correlations, are evaluated in the suggested scheme and are compared with various research outcomes to determine the performance of the nominated model. (c) 2022 SPIE and IS&T
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Secure data hiding using Steganographic technique with Visual Cryptography and Watermarking Scheme
    Gayathri, R.
    Nagarajan, V.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 118 - 123
  • [2] A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography Methods
    Nandakumar, Aishwarya
    Harmya, P.
    Jagadeesh, Noopa
    Anju, S. S.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 498 - 505
  • [3] HIGH CAPACITY MULTI-SCALE IMAGE SHARING SCHEME BY COMBINING VISUAL CRYPTOGRAPHY WITH DATA HIDING
    Zeng, Yi-Chong
    Tsai, Chi-Hung
    2013 20TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2013), 2013, : 4536 - 4539
  • [4] Weighted Matrix Based Reversible Data Hiding Scheme Using Image Interpolation
    Biswapati, Jana
    Debasis, Giri
    Kumar, Mondal Shyamal
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, CIDM, VOL 2, 2016, 411 : 239 - 248
  • [5] An improved Visual Cryptography scheme for secret hiding
    Youmaran, R.
    Adler, A.
    Miri, A.
    2006 23RD BIENNIAL SYMPOSIUM ON COMMUNICATIONS, 2006, : 340 - +
  • [6] A Secure Reversible Data Hiding Scheme for Digital Images using Random Grid Visual Secret Sharing
    Kukreja, Sonal
    Kasana, Geeta
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 864 - 869
  • [7] A Novel Data-Annotated Label Collection and Deep-Learning Based Medical Image Segmentation in Reversible Data Hiding Domain
    Amoah, Lord
    Wang, Jinwei
    Onzo, Bernard -Marie
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2025,
  • [8] Deep Learning for Medical Image Cryptography: A Comprehensive Review
    Lata, Kusum
    Cenkeramaddi, Linga Reddy
    APPLIED SCIENCES-BASEL, 2023, 13 (14):
  • [9] Medical image protection using diffusion, substitution and reversible data hiding based on prediction
    Mancy L.
    Vigila S.M.C.
    International Journal of Security and Networks, 2019, 14 (04) : 238 - 249
  • [10] Multiple Secret Image Communication Using Visual Cryptography
    A. John Blesswin
    G. Selva Mary
    S. Manoj Kumar
    Wireless Personal Communications, 2022, 122 : 3085 - 3103