Reversible data hiding scheme using deep learning and visual cryptography for medical image communication

被引:7
|
作者
Kumar, Namachivayam Rajesh [1 ]
Krishnan, Raghupathy Bala [1 ]
Manikandan, Ganesan [2 ]
Subramaniyaswamy, Vairavasundaram [2 ]
Kotecha, Ketan [3 ]
机构
[1] SASTRA Deemed Univ, Dept Comp Sci & Engn, Kumbakonam, Tamil Nadu, India
[2] SASTRA Deemed Univ, Sch Comp, Thanjavur, Tamil Nadu, India
[3] Symbiosis Inst Technol, Ctr Appl Artificial Intelligence, Pune, Maharashtra, India
关键词
patient privacy; visual cryptography; Hadamard matrix; deep learning; steganography;
D O I
10.1117/1.JEI.31.6.063028
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to a growth in information sharing and the use of multiple digital technologies, human lifestyles have been delivered into the virtual world. This digital world has seen the use of images in special fields increase dramatically, especially in healthcare. Healthcare services can be delivered remotely through telemedicine, a well-known method of providing quality healthcare for people worldwide. There is the risk of illegal exploitation of medical data when telemedicine applications involve exposing data over open networks. In particular, medical experts should exercise more caution when sharing a patient's private information. In the proposed model, reversible data concealment is combined with visual cryptography to provide a secure method of exchanging medical images. A cover image is divided into nonoverlapping secret shares using Hadamard matrix. Secret digital imaging communication in medicine (DICOM) image is encoded by a deep learning model and embedded into secret shares for secure medical image sharing. Finally, the DICOM image is fully reversibly extracted with the cover image. In this case, a visual cryptographic design is used to secure the embedded secret shares. Furthermore, the metrics, such as mean squared error, peak-signal-to-noise ratio, and normalized correlations, are evaluated in the suggested scheme and are compared with various research outcomes to determine the performance of the nominated model. (c) 2022 SPIE and IS&T
引用
收藏
页数:21
相关论文
共 50 条
  • [21] Reversible data hiding scheme based on fractal image coding
    Lu, Zhe-Ming (zheminglu@zju.edu.cn), 1600, Ubiquitous International (08):
  • [22] Directional PVO for reversible data hiding scheme with image interpolation
    Meikap, Sudipta
    Jana, Biswapati
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (23) : 31281 - 31311
  • [23] Directional PVO for reversible data hiding scheme with image interpolation
    Sudipta Meikap
    Biswapati Jana
    Multimedia Tools and Applications, 2018, 77 : 31281 - 31311
  • [24] Color image hiding with invisible visual cryptography
    Shen, Xiaoshuang
    Zhang, Xinyu
    Zhu, Yupeng
    Mi, Zhaoke
    Zhu, Yusi
    Ke, Changjun
    Shi, Yishi
    APPLIED OPTICS, 2024, 63 (21) : 5578 - 5587
  • [25] Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement
    Yang, Yang
    Zhang, Weiming
    Yu, Nenghai
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 81 - 84
  • [26] A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography Methods
    Nandakumar, Aishwarya
    Harmya, P.
    Jagadeesh, Noopa
    Anju, S. S.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 498 - 505
  • [27] Separable and reversible data hiding scheme for medical images using modified Logistic and interpolation
    Xiong, Xiangguang
    Zhong, Siyao
    Lu, Yu
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2024, 87
  • [28] Deep Learning for Medical Image Cryptography: A Comprehensive Review
    Lata, Kusum
    Cenkeramaddi, Linga Reddy
    APPLIED SCIENCES-BASEL, 2023, 13 (14):
  • [29] A Reversible Data Hiding Scheme Using Pixel Location
    Kumar, Rajeev
    Chand, Satish
    Singh, Samayveer
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (04) : 763 - 768
  • [30] Reversible data hiding scheme using turbo code
    Sawant V.
    Bhise A.
    IEIE Transactions on Smart Processing and Computing, 2019, 8 (06): : 442 - 455