Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.3.12

Encryption-based Image Steganography Technique for Secure Medical Image Transmission During the COVID-19 Pandemic  

Alkhliwi, Sultan (Northern Border University-Faculty of Science)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.3, 2021 , pp. 83-93 More about this Journal
Abstract
COVID-19 poses a major risk to global health, highlighting the importance of faster and proper diagnosis. To handle the rise in the number of patients and eliminate redundant tests, healthcare information exchange and medical data are transmitted between healthcare centres. Medical data sharing helps speed up patient treatment; consequently, exchanging healthcare data is the requirement of the present era. Since healthcare professionals share data through the internet, security remains a critical challenge, which needs to be addressed. During the COVID-19 pandemic, computed tomography (CT) and X-ray images play a vital part in the diagnosis process, constituting information that needs to be shared among hospitals. Encryption and image steganography techniques can be employed to achieve secure data transmission of COVID-19 images. This study presents a new encryption with the image steganography model for secure data transmission (EIS-SDT) for COVID-19 diagnosis. The EIS-SDT model uses a multilevel discrete wavelet transform for image decomposition and Manta Ray Foraging Optimization algorithm for optimal pixel selection. The EIS-SDT method uses a double logistic chaotic map (DLCM) is employed for secret image encryption. The application of the DLCM-based encryption procedure provides an additional level of security to the image steganography technique. An extensive simulation results analysis ensures the effective performance of the EIS-SDT model and the results are investigated under several evaluation parameters. The outcome indicates that the EIS-SDT model has outperformed the existing methods considerably.
Keywords
COVID-19; Image security; Encryption; Steganography; Image transmission;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Zhao, W., Zhang, Z. and Wang, L., 2020. Manta ray foraging optimization: An effective bio-inspired optimizer for engineering applications. Engineering Applications of Artificial Intelligence, 87, p.103300.   DOI
2 Lou, D.C., Hu, M.C. and Liu, J.L., 2009. Multiple layer data hiding scheme for medical images. Computer Standards & Interfaces, 31 (2), pp.329-335.   DOI
3 Chen, J.X., Zhu, Z.L., Fu, C., Yu, H. and Zhang, L.B., 2015. A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Communications in Nonlinear Science and Numerical Simulation, 20 (3), pp.846-860.   DOI
4 Zhang, Y. and Xiao, D., 2014. Self-adaptive permutation and combined global diffusion for chaotic color image encryption. AEU-International Journal of Electronics and Communications, 68 (4), pp.361-368.   DOI
5 United States Department of Health and Human Services, HIPPA: medical privacy-national standards to protect the privacy of personal health information, http://www.hhs.gov/ocr/ privacy/.
6 Lin, C.F., Chung, C.H. and Lin, J.H., 2009. A chaos-based visual encryption mechanism for clinical EEG signals. Medical & biological engineering & computing, 47 (7), pp.757-762.   DOI
7 Fu, C., Meng, W.H., Zhan, Y.F., Zhu, Z.L., Lau, F.C., Chi, K.T. and Ma, H.F., 2013. An efficient and secure medical image protection scheme based on chaotic maps. Computers in biology and medicine, 43 (8), pp.1000-1010.   DOI
8 Mansour, R.F. and Abdelrahim, E.M., 2019. An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications. Multidimensional Systems and Signal Processing, 30 (2), pp.791-814.   DOI
9 Zhang, L.B., Zhu, Z.L., Yang, B.Q., Liu, W.Y., Zhu, H.F. and Zou, M.Y., 2015. Cryptanalysis and improvement of an efficient and secure medical image protection scheme. Mathematical Problems in Engineering, 2015.
10 Fridrich, J., 1998. Symmetric ciphers based on twodimensional chaotic maps. International Journal of Bifurcation and chaos, 8 (06), pp.1259-1284.   DOI
11 Yu, L., Wang, Z. and Wang, W., 2012, November. The application of hybrid encryption algorithm in software security. In 2012 Fourth International Conference on Computational Intelligence and Communication Networks (pp. 762-765). IEEE.
12 Zhou, N., Zhang, A., Zheng, F. and Gong, L., 2014. Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Optics & Laser Technology, 62, pp.152-160.   DOI
13 Zhang, L.Y., Wong, K.W., Zhang, Y. and Lin, Q., 2015, May. Joint quantization and diffusion for compressed sensing measurements of natural images. In 2015 IEEE International Symposium on Circuits and Systems (ISCAS) (pp. 2744-2747). IEEE.
14 Bairagi, A.K., Khondoker, R. and Islam, R., 2016. An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures. Information Security Journal: A Global Perspective, 25 (4-6), pp.197-212.   DOI
15 Goldberg, D.E. and Holland, J.H., 1988. Genetic algorithms and machine learning. Machine Learning.
16 Jain, M., Choudhary, R.C. and Kumar, A., 2016, December. Secure medical image steganography with RSA cryptography using decision tree. In 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) (pp. 291-295). IEEE.
17 Bashir, A., Hasan, A.S.B. and Almangush, H., 2012. A new image encryption approach using the integration of a shifting technique and the AES algorithm. International Journal of Computers and Applications, 42 (9), pp.38-45.
18 Muhammad, K., Ahmad, J., Farman, H., Jan, Z., Sajjad, M. and Baik, S.W., 2015. A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. TIIS, 9 (5), pp.1938-1962.
19 Sreekutty, M.S. and Baiju, P.S., 2017, April. Security enhancement in image steganography for medical integrity verification system. In 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1-5). IEEE.
20 Razzaq, M.A., Sheikh, R.A., Baig, A. and Ahmad, A., 2017. Digital image security: Fusion of encryption, steganography and watermarking. International Journal of Advanced Computer Science and Applications (IJACSA), 8 (5).
21 Dansana, D., Kumar, R., Bhattacharjee, A., Hemanth, D.J., Gupta, D., Khanna, A. and Castillo, O., 2020. Early diagnosis of COVID-19-affected patients based on X-ray and computed tomography images using deep learning algorithm. Soft Computing, pp.1-9.
22 Shankar, K. and Eswaran, P., 2017. RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14 (2), pp.118-130.   DOI
23 Pan, H., Lei, Y. and Jian, C., 2018. Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing, 2018 (1), pp.1-10.   DOI
24 Anwar, A.S., Ghany, K.K.A. and Mahdy, H.E., 2015. Improving the security of images transmission. International Journal, 3 (4), pp.7-13.
25 Waheed, A., Goyal, M., Gupta, D., Khanna, A., Al-Turjman, F. and Pinheiro, P.R., 2020. Covidgan: data augmentation using auxiliary classifier gan for improved covid-19 detection. Ieee Access, 8, pp.91916-91923.   DOI
26 Chen, J.X., Zhu, Z.L., Fu, C. and Yu, H., 2013. An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism. Optics Express, 21 (23), pp.27873- 27890.   DOI
27 Zaw, Z.M. and Phyo, S.W., 2015. Security enhancement system based on the integration of cryptography and steganography. International Journal of Computer (IJC), 19 (1), pp.26-39.
28 Ambika, Biradar, R.L. and Burkpalli, V., 2019. Encryption-based steganography of images by multiobjective whale optimal pixel selection. International Journal of Computers and Applications, pp.1-10.
29 Shankar, K. and Eswaran, P., 2016. RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers, 25 (11), p.1650138.   DOI