Skip to main content
Top
Published in: Health and Technology 1/2020

10-01-2019 | Original Paper

Effective payload and improved security using HMT Contourlet transform in medical image steganography

Authors: S. Jeevitha, N. Amutha Prabha

Published in: Health and Technology | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper implements a novel approach for image steganography based on Hidden Markov Tree (HMT) Contourlet transform. In this paper, the biomedical image considers as a cover image and it is mapped to a specific frequency domain by applying HMT Contourlet transform. Then canny edge detection method implemented to detect the smooth edges to hide the secret data. The secret data is encrypted by using Paillier cryptosystem in a new location of the cover image. Particle Swarm Optimization (PSO) algorithm developed for the selection of the best place to locate the number of particles in a new location. The proposed method prevents the medical image from the various attacks such as rotate, crop, histogram, salt & pepper, blur and resize provides the robustness, thereby reduces to 8.19%, 10.88%, 24.03%, 15.27%, 13.21% and 14.35%. The performance measures of Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) are calculated to show the better performance compared with the existing techniques.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Miri A, Faez K. An image steganography method based on integer wavelet transforms. Multimed Tools Appl. 2018;77(11):13133–44.CrossRef Miri A, Faez K. An image steganography method based on integer wavelet transforms. Multimed Tools Appl. 2018;77(11):13133–44.CrossRef
2.
go back to reference Liao X, Yin J, Guo S, Li X, Sangaiah AK. Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng. 2018;67:320–9.CrossRef Liao X, Yin J, Guo S, Li X, Sangaiah AK. Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng. 2018;67:320–9.CrossRef
3.
go back to reference Zakaria A, Hussain M, Wahab A, Idris M, Abdullah N, Jung KH. High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Appl Sci. 2018;8(11):2199.CrossRef Zakaria A, Hussain M, Wahab A, Idris M, Abdullah N, Jung KH. High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Appl Sci. 2018;8(11):2199.CrossRef
4.
go back to reference Hoang DB, Dang TD. Health data in cloud environments. In: Pacific Asia Conference on Information Systems. 2015. Hoang DB, Dang TD. Health data in cloud environments. In: Pacific Asia Conference on Information Systems. 2015.
5.
go back to reference Sajedi H, Jamzad M. CBS: contourlet-based steganalysis method. J Signal Process Sys. 2010;61(3):367–73.CrossRef Sajedi H, Jamzad M. CBS: contourlet-based steganalysis method. J Signal Process Sys. 2010;61(3):367–73.CrossRef
6.
go back to reference Ghasemi E, Shanbehzadeh J, Fassihi N. High capacity image steganography based on genetic algorithm and wavelet transform. In: Intelligent control and innovative computing. Boston: Springer; 2012. p. 395–404. Ghasemi E, Shanbehzadeh J, Fassihi N. High capacity image steganography based on genetic algorithm and wavelet transform. In: Intelligent control and innovative computing. Boston: Springer; 2012. p. 395–404.
7.
go back to reference Bai J, Chang CC, Nguyen TS, Zhu C, Liu Y. A high payload steganographic algorithm based on edge detection. Displays. 2017;46:42–51.CrossRef Bai J, Chang CC, Nguyen TS, Zhu C, Liu Y. A high payload steganographic algorithm based on edge detection. Displays. 2017;46:42–51.CrossRef
8.
go back to reference Rong W, Li Z, Zhang W, Sun L. An improved CANNY edge detection algorithm. In: Mechatronics and automation (ICMA), 2014 IEEE international conference on 2014 Aug 3 (pp. 577-582). IEEE. Rong W, Li Z, Zhang W, Sun L. An improved CANNY edge detection algorithm. In: Mechatronics and automation (ICMA), 2014 IEEE international conference on 2014 Aug 3 (pp. 577-582). IEEE.
9.
go back to reference De Carvalho RL, Da Silva WG, de Morais AH. Optimizing image steganography using particle swarm optimization algorithm. Int J Comput Appl. 2017;164(7). De Carvalho RL, Da Silva WG, de Morais AH. Optimizing image steganography using particle swarm optimization algorithm. Int J Comput Appl. 2017;164(7).
10.
go back to reference Jeevitha S, Amutha Prabha N. A comprehensive review on steganographic techniques and implementation. ARPN Journal of Engineering and Applied Sciences. 2018;13(17). Jeevitha S, Amutha Prabha N. A comprehensive review on steganographic techniques and implementation. ARPN Journal of Engineering and Applied Sciences. 2018;13(17).
11.
go back to reference Crouse MS, Nowak RD, Baraniuk RG. Wavelet-based statistical signal processing using hidden Markov models. IEEE Trans Signal Process. 1998 Apr;46(4):886–902.MathSciNetCrossRef Crouse MS, Nowak RD, Baraniuk RG. Wavelet-based statistical signal processing using hidden Markov models. IEEE Trans Signal Process. 1998 Apr;46(4):886–902.MathSciNetCrossRef
12.
go back to reference Shah M, Zhang W, Hu H, Zhou H, Mahmood T. Homomorphic encryption-based reversible data hiding for 3D mesh models. Arab J Sci Eng. 2018:1–3. Shah M, Zhang W, Hu H, Zhou H, Mahmood T. Homomorphic encryption-based reversible data hiding for 3D mesh models. Arab J Sci Eng. 2018:1–3.
13.
go back to reference Ding L, Goshtasby A. On the canny edge detector. Pattern Recogn. 2001;34(3):721–5.CrossRef Ding L, Goshtasby A. On the canny edge detector. Pattern Recogn. 2001;34(3):721–5.CrossRef
14.
go back to reference Jeevitha S, Amutha Prabha N. Performance analysis of encryption algorithm in medical image security. In: International conference on electrical, electronics, computers, communication, mechanical and computing (EECCMC), issue V. IEEE, 2018. p. 428–433. Jeevitha S, Amutha Prabha N. Performance analysis of encryption algorithm in medical image security. In: International conference on electrical, electronics, computers, communication, mechanical and computing (EECCMC), issue V. IEEE, 2018. p. 428–433.
15.
go back to reference Cao J, Chen L, Wang M, Tian Y. Implementing a parallel image edge detection algorithm based on the Otsu-canny operator on the Hadoop platform. Comput Intell Neurosci. 2018;2018:1–12.CrossRef Cao J, Chen L, Wang M, Tian Y. Implementing a parallel image edge detection algorithm based on the Otsu-canny operator on the Hadoop platform. Comput Intell Neurosci. 2018;2018:1–12.CrossRef
16.
go back to reference Do MN, Vetterli M. The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process. 2005;14(12):2091–106.CrossRef Do MN, Vetterli M. The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process. 2005;14(12):2091–106.CrossRef
17.
go back to reference Chun-Man YA, Bao-Long GU, Meng YI. Fast algorithm for nonsubsampled contourlet transforms. Acta Automat Sin. 2014;40(4):757–62.CrossRef Chun-Man YA, Bao-Long GU, Meng YI. Fast algorithm for nonsubsampled contourlet transforms. Acta Automat Sin. 2014;40(4):757–62.CrossRef
18.
go back to reference Fakhredanesh M, Rahmati M, Safabakhsh R. Adaptive image steganography using contourlet transforms. J Electron Imaging. 2013;22(4):043007.CrossRef Fakhredanesh M, Rahmati M, Safabakhsh R. Adaptive image steganography using contourlet transforms. J Electron Imaging. 2013;22(4):043007.CrossRef
19.
go back to reference Po DY, Do MN. Directional multiscale modeling of images using the contourlet transforms. IEEE Trans Image Process. 2006;15(6):1610–20.MathSciNetCrossRef Po DY, Do MN. Directional multiscale modeling of images using the contourlet transforms. IEEE Trans Image Process. 2006;15(6):1610–20.MathSciNetCrossRef
20.
go back to reference Gai S, Yang G, Wan M, Wang L. Model of images using quaternion wavelet transform. Comput Electr Eng. 2014;40(3):819–32.CrossRef Gai S, Yang G, Wan M, Wang L. Model of images using quaternion wavelet transform. Comput Electr Eng. 2014;40(3):819–32.CrossRef
21.
go back to reference Chhikara RR, Sharma P, Singh L. A hybrid feature selection approach based on improved PSO and filter approaches for image steganalysis. Int J Mach Learn Cybern. 2016;7(6):1195–206.CrossRef Chhikara RR, Sharma P, Singh L. A hybrid feature selection approach based on improved PSO and filter approaches for image steganalysis. Int J Mach Learn Cybern. 2016;7(6):1195–206.CrossRef
22.
go back to reference Abdel-Basset M, Fakhry AE, El-Henawy I, Qiu T, Sangaiah AK. Feature and intensity based medical image registration using particle swarm optimization. J Med Syst. 2017;41(12):197.CrossRef Abdel-Basset M, Fakhry AE, El-Henawy I, Qiu T, Sangaiah AK. Feature and intensity based medical image registration using particle swarm optimization. J Med Syst. 2017;41(12):197.CrossRef
23.
go back to reference Shen L, Huang X, Fan C, Li Y. Enhanced mutual information-based medical image registration using a hybrid optimisation technique. Electron Lett. 2018;54(15):926–8.CrossRef Shen L, Huang X, Fan C, Li Y. Enhanced mutual information-based medical image registration using a hybrid optimisation technique. Electron Lett. 2018;54(15):926–8.CrossRef
24.
go back to reference Shi H, Liu D, Lu H, Zhou C. A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing. Multimed Tools Appl. 2017:1–33. Shi H, Liu D, Lu H, Zhou C. A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing. Multimed Tools Appl. 2017:1–33.
25.
go back to reference Chen X, Zhong H, Qiu A. Reversible data hiding scheme in multiple encrypted images based on code division multiplexing. Multimed Tools Appl. 2018:1–8. Chen X, Zhong H, Qiu A. Reversible data hiding scheme in multiple encrypted images based on code division multiplexing. Multimed Tools Appl. 2018:1–8.
26.
go back to reference Wu X. An algorithm for reversible information hiding of encrypted medical images in homomorphic encrypted domain. Discrete & Continuous Dynamical Systems-S. 2019;12(4&5):1441–55. Wu X. An algorithm for reversible information hiding of encrypted medical images in homomorphic encrypted domain. Discrete & Continuous Dynamical Systems-S. 2019;12(4&5):1441–55.
27.
go back to reference Shin SH, Jung KH. Reversible data hiding method using meaningful encrypted images. Multimed Tools Appl. 2018;77(12):14841–57.CrossRef Shin SH, Jung KH. Reversible data hiding method using meaningful encrypted images. Multimed Tools Appl. 2018;77(12):14841–57.CrossRef
29.
go back to reference Naqvi N, Abbasi AT, Hussain R, Khan MA, Ahmad B. Multilayer partially homomorphic encryption text steganography (MLPHE-TS): a zero steganography approach. Wirel Pers Commun. 2018:1–23. Naqvi N, Abbasi AT, Hussain R, Khan MA, Ahmad B. Multilayer partially homomorphic encryption text steganography (MLPHE-TS): a zero steganography approach. Wirel Pers Commun. 2018:1–23.
30.
go back to reference Subhedar MS, Mankar VH. Image steganography using redundant discrete wavelet transform and QR factorization. Comput Electr Eng. 2016;54:406–22.CrossRef Subhedar MS, Mankar VH. Image steganography using redundant discrete wavelet transform and QR factorization. Comput Electr Eng. 2016;54:406–22.CrossRef
Metadata
Title
Effective payload and improved security using HMT Contourlet transform in medical image steganography
Authors
S. Jeevitha
N. Amutha Prabha
Publication date
10-01-2019
Publisher
Springer Berlin Heidelberg
Published in
Health and Technology / Issue 1/2020
Print ISSN: 2190-7188
Electronic ISSN: 2190-7196
DOI
https://doi.org/10.1007/s12553-018-00285-1

Other articles of this Issue 1/2020

Health and Technology 1/2020 Go to the issue

Premium Partner