Skip to main content
Top
Published in: Journal of Medical Systems 2/2013

01-04-2013 | Original Paper

A secure steganography for privacy protection in healthcare system

Authors: Jing Liu, Guangming Tang, Yifeng Sun

Published in: Journal of Medical Systems | Issue 2/2013

Login to get access

Abstract

Private data in healthcare system require confidentiality protection while transmitting. Steganography is the art of concealing data into a cover media for conveying messages confidentially. In this paper, we propose a steganographic method which can provide private data in medical system with very secure protection. In our method, a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then divided into non-overlapping embedding units with three consecutive pixels. We use adaptive pixel pair match (APPM) method to embed digits in the pixel value differences (PVD) of the three pixels and the base of embedded digits is dependent on the differences among the three pixels. By solving an optimization problem, minimal distortion of the pixel ternaries caused by data embedding can be obtained. The experimental results show our method is more suitable to privacy protection of healthcare system than prior steganographic works.
Literature
1.
go back to reference Fridrich, J., Steganography in digital media: Principles, algorithms, and applications. Cambridge Univ. Press, Cambridge, U.K., 2009. Fridrich, J., Steganography in digital media: Principles, algorithms, and applications. Cambridge Univ. Press, Cambridge, U.K., 2009.
2.
go back to reference Filler, T., Judas, J., Fridrich, J., Minimizing embedding impact in steganography using trellis-coded quantization. in Proc. SPIE, Media Forensics and Security. 2010, vol.7541, 2010, doi 10.1117/12.838002. Filler, T., Judas, J., Fridrich, J., Minimizing embedding impact in steganography using trellis-coded quantization. in Proc. SPIE, Media Forensics and Security. 2010, vol.7541, 2010, doi 10.​1117/​12.​838002.
3.
go back to reference Lou, D.-C., Wu, N.-I., Wang, C.-M., et al., A novel adaptive steganography based on local complexity and human vision sensitivity. J. Syst. Softw. 83:1236–1248, 2010.CrossRef Lou, D.-C., Wu, N.-I., Wang, C.-M., et al., A novel adaptive steganography based on local complexity and human vision sensitivity. J. Syst. Softw. 83:1236–1248, 2010.CrossRef
4.
go back to reference Wang, R. Z., Lin, C. F., and Lin, J. C., Hiding data in images by optimal moderately significant bit replacement. IEEE Electron. Lett. 36(25):2069–2070, 2001.CrossRef Wang, R. Z., Lin, C. F., and Lin, J. C., Hiding data in images by optimal moderately significant bit replacement. IEEE Electron. Lett. 36(25):2069–2070, 2001.CrossRef
5.
go back to reference Thien, C. C., and Lin, J. C., A simple and high-hiding capacity method for hiding digit-by—digit data in images based on modulus function. Pattern Recogn. 36(12):2875–2881, 2003.MATHCrossRef Thien, C. C., and Lin, J. C., A simple and high-hiding capacity method for hiding digit-by—digit data in images based on modulus function. Pattern Recogn. 36(12):2875–2881, 2003.MATHCrossRef
6.
go back to reference Chan, C. K., and Cheng, L. M., Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3):469–474, 2004.MATHCrossRef Chan, C. K., and Cheng, L. M., Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3):469–474, 2004.MATHCrossRef
7.
go back to reference Mielikainen, J., LSB matching revisited. IEEE Signal Process Lett. 13(5):285–287, 2006.CrossRef Mielikainen, J., LSB matching revisited. IEEE Signal Process Lett. 13(5):285–287, 2006.CrossRef
8.
go back to reference Zhang, X. P., and Wang, S. Z., Efficient steganographyic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11):781–783, 2006.CrossRef Zhang, X. P., and Wang, S. Z., Efficient steganographyic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11):781–783, 2006.CrossRef
9.
go back to reference Chao, R. M., Wu, H. C., Lee, C. C., et al., A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Secur., 2009. doi:10.1155/2009/658047. Article ID 658047. Chao, R. M., Wu, H. C., Lee, C. C., et al., A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Secur., 2009. doi:10.​1155/​2009/​658047. Article ID 658047.
10.
go back to reference Hong, W., and Chen, T.-S., A novel data embedding method using adaptive pixel pair matching[J]. IEEE Trans. Inform. Forensic Secur. 7(1):176–184, 2012.CrossRef Hong, W., and Chen, T.-S., A novel data embedding method using adaptive pixel pair matching[J]. IEEE Trans. Inform. Forensic Secur. 7(1):176–184, 2012.CrossRef
11.
go back to reference Hempstalk, K., Hiding behind corners: Using edges in images for better steganography. In Proc. Computing Women’s Congress, Hamilton, New Zealand, 2006. Hempstalk, K., Hiding behind corners: Using edges in images for better steganography. In Proc. Computing Women’s Congress, Hamilton, New Zealand, 2006.
12.
go back to reference Zhang, X., and Wang, S., Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process. Lett. 12(1):67–70, 2005.CrossRef Zhang, X., and Wang, S., Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process. Lett. 12(1):67–70, 2005.CrossRef
13.
go back to reference Li, B., Fang, Y., and Huang, J., Steganalysis of multiple-base notaional system steganography. IEEE Signal Process. Lett. 15:493–496, 2008.CrossRef Li, B., Fang, Y., and Huang, J., Steganalysis of multiple-base notaional system steganography. IEEE Signal Process. Lett. 15:493–496, 2008.CrossRef
14.
go back to reference Wu, D. C., and Tsai, W. H., A steganographic method for image by pixel-value differencing. Pattern Recogn. Lett. 24:1613–1626, 2003.MATHCrossRef Wu, D. C., and Tsai, W. H., A steganographic method for image by pixel-value differencing. Pattern Recogn. Lett. 24:1613–1626, 2003.MATHCrossRef
15.
go back to reference Yang, C. H., Weng, C. Y., and Wang, S., Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inform. Forensic Secur. 3(3):488–497, 2008.CrossRef Yang, C. H., Weng, C. Y., and Wang, S., Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inform. Forensic Secur. 3(3):488–497, 2008.CrossRef
16.
go back to reference Luo, W., Huang, F., and Huang, J., Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inform. Forensic Secur. 5(2):201–214, 2010.MathSciNetCrossRef Luo, W., Huang, F., and Huang, J., Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inform. Forensic Secur. 5(2):201–214, 2010.MathSciNetCrossRef
17.
go back to reference Hong, W., Chen, T.-S., and Luo, C.-W., Data embedding using pixel value differencing and diamond encoding with multiple—base notational system. J. Syst. Softw. 85:1166–1175, 2012.CrossRef Hong, W., Chen, T.-S., and Luo, C.-W., Data embedding using pixel value differencing and diamond encoding with multiple—base notational system. J. Syst. Softw. 85:1166–1175, 2012.CrossRef
18.
go back to reference Zhang, X., and Wang, S., Vnluerability of pixel-value differencing steganography to histogram analysis and modification for enhance security. Pattern Recognit. Lett. 25:331–339, 2004.CrossRef Zhang, X., and Wang, S., Vnluerability of pixel-value differencing steganography to histogram analysis and modification for enhance security. Pattern Recognit. Lett. 25:331–339, 2004.CrossRef
19.
go back to reference Tan, S., and Li, B., Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-Spline Fitting. IEEE Signal Process. Lett. 19(6):336–339, 2012.MathSciNetCrossRef Tan, S., and Li, B., Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-Spline Fitting. IEEE Signal Process. Lett. 19(6):336–339, 2012.MathSciNetCrossRef
20.
go back to reference Westfeld, A., Space filling curves in steganalysis. Proceedings of SPIE: Security, Steganography and Watermarking for Multimedia. San Jose, California:SPIE, pp 28–37, 2005. Westfeld, A., Space filling curves in steganalysis. Proceedings of SPIE: Security, Steganography and Watermarking for Multimedia. San Jose, California:SPIE, pp 28–37, 2005.
21.
go back to reference Pevý, T., Bas, P., and Fridrich, J., Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inform. Forensic Secur. 5(2):215–224, 2010.CrossRef Pevý, T., Bas, P., and Fridrich, J., Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inform. Forensic Secur. 5(2):215–224, 2010.CrossRef
22.
go back to reference Pevý, T., Filler, T., Bas, P., Using high-dimensional image models to perform highly undetectable steganography. In Proc. 12 Information Hiding, Jun.28–30, vol.6387, Lecture Notes in Computer Science, pp.161–177, 2010. Pevý, T., Filler, T., Bas, P., Using high-dimensional image models to perform highly undetectable steganography. In Proc. 12 Information Hiding, Jun.28–30, vol.6387, Lecture Notes in Computer Science, pp.161–177, 2010.
23.
go back to reference Luo, W. Q., Wang, Y. G., and Huang, J. W., detection of quantization artifacts and its applications to transform encoder identification. IEEE Trans. Inform. Forensic Secur. 5(4):810–815, 2010.CrossRef Luo, W. Q., Wang, Y. G., and Huang, J. W., detection of quantization artifacts and its applications to transform encoder identification. IEEE Trans. Inform. Forensic Secur. 5(4):810–815, 2010.CrossRef
24.
go back to reference Yu, Babaguchi, N., Breaking the YASS algorithm via pixel and DCT coefficients analysis, in Proc. 19th IEEE Int. Conf. Pattern Recogn. pp1–4, 2008. Yu, Babaguchi, N., Breaking the YASS algorithm via pixel and DCT coefficients analysis, in Proc. 19th IEEE Int. Conf. Pattern Recogn. pp1–4, 2008.
25.
Metadata
Title
A secure steganography for privacy protection in healthcare system
Authors
Jing Liu
Guangming Tang
Yifeng Sun
Publication date
01-04-2013
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 2/2013
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-012-9918-z

Other articles of this Issue 2/2013

Journal of Medical Systems 2/2013 Go to the issue