Browse > Article
http://dx.doi.org/10.3837/tiis.2013.01.009

Reversible and High-Capacity Data Hiding in High Quality Medical Images  

Huang, Li-Chin (Department of Computer Science and Engineering, National Chung Hsing University)
Hwang, Min-Shiang (Department of Computer Science & Information Engineering Asia University)
Tseng, Lin-Yu (Department of Computer Science and Communication Engineering, Providence University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.7, no.1, 2013 , pp. 132-148 More about this Journal
Abstract
Via the Internet, the information infrastructure of modern health care has already established medical information systems to share electronic health records among patients and health care providers. Data hiding plays an important role to protect medical images. Because modern medical devices have improved, high resolutions of medical images are provided to detect early diseases. The high quality medical images are used to recognize complicated anatomical structures such as soft tissues, muscles, and internal organs to support diagnosis of diseases. For instance, 16-bit depth medical images will provide 65,536 discrete levels to show more details of anatomical structures. In general, the feature of low utilization rate of intensity in 16-bit depth will be utilized to handle overflow/underflow problem. Nowadays, most of data hiding algorithms are still experimenting on 8-bit depth medical images. We proposed a novel reversible data hiding scheme testing on 16-bit depth CT and MRI medical image. And the peak point and zero point of a histogram are applied to embed secret message k bits without salt-and-pepper.
Keywords
reversible data embedding; histogram; peak point; zero point; medical image;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Yeh, and Yung-Kuan Chan, "A high payload frequency-based reversible image hiding method," Information Sciences, vol. 180, pp. 2286-2298, 2010.   DOI   ScienceOn
2 Chin-Chen Chang, Chih-Yang Lin, and Yi-Pei Hsieh, "Data hiding for vector quantizatin images using mixed-based notation and dissimilar patterns without loss of fidelity," Information Sciences, vol. 201, pp. 70-79, 2012.   DOI   ScienceOn
3 Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng, Wei-Liang Tai, "Reversible hiding in DCT-based compressed images," Information Sciences, vol. 177, no. 13, pp. 2768-2786, 2007.   DOI   ScienceOn
4 Chin-Chen Chang, Chih-Yang Lin, Yi-Hsuan Fan, "Lossless data hiding for color images based on block truncation coding," Pattern Recognition, vol. 41, pp.2347-2357, 2008.   DOI   ScienceOn
5 Chia-Chun Wu, Shang-Juh Kao, and Min-Shiang Hwang, "A high quality image sharing with steganography and adaptive authentication scheme," The Journal of Systems and Software, vol. 84, pp. 2196-2207, 2011.   DOI   ScienceOn
6 Chia-Chun Wu, Min-Shiang Hwang, and Shang-Juh Kao, "A new approach to the secret image sharing with steganography and authentication," The Imaging Science Journal, vol. 57, no. 3, pp. 140-151, 2009.   DOI   ScienceOn
7 S-F Chiou, I-En Liao, and Min-Shiang Hwang, "A capacity-enhanced reversible data hiding scheme based SMVQ," The Imaging Science Journal, vol. 59, pp. 17-24, 2011.   DOI   ScienceOn
8 Zhiguo Chang and Jian Xu, "Reversible run length data embedding for medical images," Communication Software and Networks (ICCSN), in Proc. of 2011 IEEE 3rd International Conference, pp. 260-263, 2011.
9 M. Fallahpour, D. Megias, and M. Ghanbari, "Reversible and high-capacity data hiding in medical images," IET Image Processing, vol.5, Iss. 2, pp. 190-197, 2011.   DOI   ScienceOn
10 Min-Shiang Hwang, K. F. Hwang, and Chin-Chen Chang, "A timestamping protocol for digital watermarking," Applied Mathematics and Computation, vol. 169, pp. 1276-1284, 2005.   DOI   ScienceOn
11 Li-Chin Huang, Lin-Yu Tseng, and Min-Shiang Hwang, "The study of data hiding in medical image," International Journal of Network Secuity, vol. 14, no. 5, pp. 243-251, 2012.
12 Li-Chin Huang, Lin-Yu Tseng, and Min-Shiang Hwang, "A reversible data hiding method by histogram shifting in high quality medical images," Journal of Systems and Software, Available online 3 December, 2012.
13 H. -J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, and H. -G. Choo, "A novel difference expansion transform for reversible data embedding," IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 456-465, Sep. 2008.   DOI   ScienceOn
14 B. Karthikeyan, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti, and M. Gomathymeenakshi, "An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image," International Journal of Network Security, vol.15, no.1, pp.314-318, 2013.
15 Der-Chyuan Lou, Ming-Chiang Hu, and Jiang-Lung Liu, "Multiple layer data hding scheme for medical images," Computer Standards and Interfaces, vol. 31, pp.329-335, 2009.   DOI   ScienceOn
16 Hao Luo, Fa-Xin Yu, Hua Chen, Zheng-Liang Huang, Hui Li, and Ping-Hui Wang, "Reversible data hiding based on block median preservation," Information Sciences, vol. 181, pp.308-328, 2011.   DOI   ScienceOn
17 Zhichen Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qibin Sun and Xiao Lin, "Robust lossless image data hiding designed for seim-fragile image authentication," IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, pp.497-509, 2008.   DOI   ScienceOn
18 Z.M. Lu., J.X. Wang, B.B. Liu, "An improved lossless data hiding scheme based on image VQ-index residual value coding," The Journal of Systems and Software, vol. 82, no. 6, pp.1016-1024, 2009.   DOI   ScienceOn
19 Zhensong Liao, Yan Huang, and Chisong Li, "Research on Data Hiding Capacity," International Journal of Network Security, vol.5, no.2, pp.140-144, 2007.
20 Z. Ni, Y, -Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 354-362, 2006.   DOI   ScienceOn
21 Zhichen Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qibin Sun and Xiao Lin, "Robust lossless image data hiding designed for seim-fragile image authentication," IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, pp.497-509, 2008.   DOI   ScienceOn
22 National Cancer Imaging Archive. Available at https://imaging.nci.nih.gov/.
23 Yun Q. Shi, Zhicheng Ni, Dekun Zou, Changuin Liang and Guourong Xuan, "Data hiding fundamentals, algorithms and applications," Circuits and Systems, 2004 IEEE International Symposium, pp. 33-36, 2004.
24 Palak K. Amin, Ning Liu, and K. P. Subbalakshmi, "Statistical Attack Resilient Data Hiding," International Journal of Network Security, vol.5, no.1, pp.112-120, 2007.
25 Mrigank Rochan, Santosh Hariharan, and Kumar Rajamani, "Data hiding scheme for medical images using lossless code for mobile HIMS," in Proc. of Third International Conference on Communication Systems and Networks, pp. 1-4, 2011.
26 S. S. Sujatha and M. Mohamed Sathik, "A novel DWT based blind watermarking for image authentication," International Journal of Network Security, vol. 14, no. 4, pp. 223-228, 2012.
27 D. B. Satre and R. V. Pawar, "Preserve robustness for image data hiding," in Proc. of Second International Conference on Computer Research and Development, pp. 707-711, 2010.
28 J. Tian, "Reversible data embedding using a difference expansion," IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no 8, pp. 890-896, Aug. 2003.   DOI   ScienceOn
29 S. Maria Celestin Vigila and K. Muneeswaran, "Nonce based elliptic curve cryptosystem for text and image applications," International Journal of Network Security, vol. 14, no. 4, pp. 236-242, 2012.
30 Christophe De Vleeschouwer, Jean-Francois Deloaigle, and Benoit Macq, "Circular interpretation of bijective transformation in lossless watermarking for media asset management," IEEE Transactions on Multimedia, vol. 5, pp. 97-104, 2003.   DOI   ScienceOn
31 Nan-I Wu and Min-Shiang Hwang, "Data hiding: Current status and key issues" International Journal of Network Security, vol. 4, no. 1, pp. 1-9, Jan. 2007.
32 Nan-I Wu, Chung-Ming Wang, Chwei-Shyong Tsai, and Min-Shiang Hwang, "A certificate-based watermaking scheme for coloured images," The Images Science Journal, vol. 56, pp. 326-332, 2008.   DOI   ScienceOn
33 Wei-Jen Wang, Cheng-Ta Huang, and Shiuh-Jeng Wang, "VQ applications in steganorgraphic data hiding upon multimedia images," IEEE Systems Journal, vol. 5, no. 4, pp. 528-537, 2011.   DOI   ScienceOn
34 Shangping Zhong, Xueqi Cheng, and Tierui Chen, "Data Hiding in a Kind of PDF Texts for Secret Communication," International Journal of Network Security, vol.4, no.1, pp.17-26, 2007.
35 Chi-Yao Weng, Shiuh-Jeng Wang, Jonathan Liu, and Dushyant Goyal, "Prediciton-based reversible data hiding using empirical histograms in images," Transactions on Internet and Information Systems, vol. 6, no. 4, pp. 1248-1266, 2012.
36 Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai and Min-Shiang Hwang, "A high quality steganographic method with pixel-value differencing and modulus function", The Journal of Systems and Software, vol. 81, Iss. 1, pp. 150-158, 2008.   DOI   ScienceOn