Encryption-based Image Steganography Technique for Secure Medical Image Transmission During the COVID-19 Pandemic

被引:5
作者
Alkhliwi, Sultan [1 ]
机构
[1] Northern Border Univ, Fac Sci, Ar Ar, Saudi Arabia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2021年 / 21卷 / 03期
关键词
COVID-19; Image security; Encryption; Steganography; Image transmission; SCHEME; PERMUTATION; DIFFUSION; EFFICIENT;
D O I
10.22937/IJCSNS.2021.21.3.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
COVID-19 poses a major risk to global health, highlighting the importance of faster and proper diagnosis. To handle the rise in the number of patients and eliminate redundant tests, healthcare information exchange and medical data are transmitted between healthcare centres. Medical data sharing helps speed up patient treatment; consequently, exchanging healthcare data is the requirement of the present era. Since healthcare professionals share data through the internet, security remains a critical challenge, which needs to be addressed. During the COVID-19 pandemic, computed tomography (CT) and X-ray images play a vital part in the diagnosis process, constituting information that needs to be shared among hospitals. Encryption and image steganography techniques can be employed to achieve secure data transmission of COVID-19 images. This study presents a new encryption with the image steganography model for secure data transmission (EIS-SDT) for COVID19 diagnosis. The EIS-SDT model uses a multilevel discrete wavelet transform for image decomposition and Manta Ray Foraging Optimization algorithm for optimal pixel selection. The EIS-SDT method uses a double logistic chaotic map (DLCM) is employed for secret image encryption. The application of the DLCM-based encryption procedure provides an additional level of security to the image steganography technique. An extensive simulation results analysis ensures the effective performance of the EIS-SDT model and the results are investigated under several evaluation parameters. The outcome indicates that the EISSDT model has outperformed the existing methods considerably.
引用
收藏
页码:83 / 93
页数:11
相关论文
共 29 条
[1]  
Ambika R. L., 2019, INT J COMPUTERS APPL, V46, P1
[2]  
[Anonymous], 2017, 2017 INT C CIRC POW
[3]  
Anwar A.S., 2015, Int. J. Bio-Med. Inf. eHealth, V3, P7
[4]   An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures [J].
Bairagi, Anupam Kumar ;
Khondoker, Rahamatullah ;
Islam, Rafiqul .
INFORMATION SECURITY JOURNAL, 2016, 25 (4-6) :197-212
[5]  
Bashir A., 2012, Int. J. Comput. Appl, V42, P38
[6]   A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Yu, Hai ;
Zhang, Li-bo .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 20 (03) :846-860
[7]   An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Yu, Hai .
OPTICS EXPRESS, 2013, 21 (23) :27873-27890
[8]   Early diagnosis of COVID-19-affected patients based on X-ray and computed tomography images using deep learning algorithm [J].
Dansana, Debabrata ;
Kumar, Raghvendra ;
Bhattacharjee, Aishik ;
Hemanth, D. Jude ;
Gupta, Deepak ;
Khanna, Ashish ;
Castillo, Oscar .
SOFT COMPUTING, 2023, 27 (05) :2635-2643
[9]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[10]   An efficient and secure medical image protection scheme based on chaotic maps [J].
Fu, Chong ;
Meng, Wei-hong ;
Zhan, Yong-feng ;
Zhu, Zhi-liang ;
Lau, Francis C. M. ;
Tse, Chi K. ;
Ma, Hong-feng .
COMPUTERS IN BIOLOGY AND MEDICINE, 2013, 43 (08) :1000-1010