
تعداد نشریات | 21 |
تعداد شمارهها | 610 |
تعداد مقالات | 9,028 |
تعداد مشاهده مقاله | 67,082,885 |
تعداد دریافت فایل اصل مقاله | 7,656,357 |
A pixel contrast based medical image steganography to ensure and secure patient data | ||
International Journal of Nonlinear Analysis and Applications | ||
دوره 12، Special Issue، اسفند 2021، صفحه 1885-1904 اصل مقاله (2.36 M) | ||
نوع مقاله: Research Paper | ||
شناسه دیجیتال (DOI): 10.22075/ijnaa.2021.5939 | ||
نویسندگان | ||
Mohammed Mahdi Hashim* 1؛ Ali A. Mahmood2؛ Mohammed Q. Mohammed2، 3 | ||
1Faculty of Engineering, Uruk University, Baghdad, Iraq | ||
2University of information technology and communications, Baghdad, Iraq | ||
3Al-Esraa University College, Baghdad, Iraq | ||
تاریخ دریافت: 12 مرداد 1400، تاریخ بازنگری: 22 شهریور 1400، تاریخ پذیرش: 29 آبان 1400 | ||
چکیده | ||
The information and communications technology time are essential for the security aspect of processes and methodologies. The security of information should a key priority in the secret exchange of information between two parties. That's to guarantee the information's security, some strategies are used, and they include steganography, watermark, and cryptography. In cryptography, the secrete message is converted into unintelligible text, but the existence of the secrete message is noticed, on the other hand, watermarking and steganography involve hiding the secrete message in a way that its presence cannot be noticed. Presently, the design and development of an effective image steganography system are facing several challenges such as low capacity, poor robustness and imperceptibility. To surmount these challenges, a new secure image steganography work called the Pixels Contrast (PC) method is proposed along with the eight neighbour's method and Huffman coding algorithm to overcome the imperceptibility and capacity issues. In the proposed method, a new image partitioning with a Henon map is used to increase the security part. This method has three main stages (preprocessing, embedding, and extracting) each stage has a different process. In this method, different standard images were used such as medical images and SIPI-dataset. The experimental result was evaluated with different measurement parameters like Histogram Analysis Structural Similarity Index (SSIM), Peak signal-to-noise ratio (PSNR). Compared the proposed method with the previous works then proved to be better than existing methods. In short, the proposed steganography method outperformed the commercially available data hiding schemes, thereby resolving the existing issues. | ||
کلیدواژهها | ||
Eight neighbors؛ Compression method؛ Image steganography؛ Security؛ imperceptibility | ||
مراجع | ||
[1] B. Abd-El-Atty, A.M. Iliyasu, H. Alaskar, A. El-Latif and A. Ahmed, A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms, Sensors 20(11) (2020) 3108. [2] A. Abdulbaqi, M. Younis, Y. Younus and A. Obaid, A hybrid technique for EEG signals evaluation and classification as a step towards to neurological and cerebral disorders diagnosis, Int. J. Nonlinear Anal. Appl. 13(1) (2022) 773–781. [3] M.N. Abdulwahedand, S.T. Mustafa and M.S.M. Rahim, Image spatial domain steganography: A study of performance evaluation parameters, IEEE 9th Int. Conf. Syst. Engine. Technol. (2019) 309–314. [4] A. Alabaichi, M.A.A.K. Al-Dabbas, A. Salih, Image steganography using least significant bit and secret map techniques, Int. J. Elect. Comput. Engin. 10(1) (2020) 935–946. [5] T. AlKhodaidi A. Gutub, Refining image steganography distribution for higher security multimedia counting-based secret-sharing, Multimedia Tools and Appl. (2020) 1–31. [6] S. Chatterjee, M. Biswas, D. Maji, B.K. Ghosh and R.K. Mandal, Logarithm similarity measure based automatic esophageal cancer detection using discrete wavelet transform, Recent Trends and Advances in Artificial Intelligence and Internet of Things (2020) 427–453. [7] Q.S. Hamad, M.Q. Mohammed and S.Q. Muhamed, Surface water pollution monitoring system based on IOT, Plant Arch. 20(2) (2020) 630–634. [8] M.M. Hashim, A.K. Mohsin and M.S.M. Rahim, All-encompassing review of biometric information protection in fingerprints based steganography, Proc. 3rd Int. Symp. Computer Sci. Intell. Control (2019) 1–8.[9] M.M. Hashim and M. Rahim, Image steganography based on odd/even pixels distribution scheme and two parameters random function, J. Theore. Appl.Inf. Technol. 95(22) (2017). [10] M.M. Hashim, S.H. Rhaif, A.A. Abdulrazzaq, A.H. Ali, M.S. Taha, Based on IoT healthcare application for medical data authentication: Towards a new secure framework using steganography, IOP Conf.Ser.: Materials Sci. Engin. 881(1) (2020) 012120. [11] M. Hassaballah, M.A. Hameed and M.H. Alkinani, Introduction to digital image steganography, Digital Media Stegan. (2020) 1–15. [12] R.K. Hussein, A. Alenezi, H.F. Atlam, M.Q. Mohammed, R.J. Walters and G.B. Wills, Toward confirming a framework for securing the virtual machine image in cloud computing, Adv. Sci. Technol. Eng. Syst. J. 2(4) (2017) 44–50. [13] M. Hussain and M. Hussain, A survey of image steganography techniques, Int. J. Adv. Sci. Tech. 54 (2013). [14] M. Hussain, A.W.A. Wahab, Y.I.B. Idris, A.T. Ho and K.H. Jung, Image steganography in spatial domain: A survey, Signal Processing: Image Communication, Signal Processing-Image Commun., 65 (2018) 46–66. [15] M. Islam, R. Amarjit and R.H. Laskar, Neural network based robust image watermarking technique in LWT domain, J. Intell. Fuzzy Syst., 34(3) (2018) 1691–1700. [16] D. Jude Hemanth, J. Anitha, D.E. Popescu and L.H. Son, A modified genetic algorithm for performance improvement of transform based image steganography systems, J. Intell. Fuzzy Syst. 35(1) (2018) 197–209. [17] I.J. Kadhim, P. Premaratne, P.J. Vial and B. Halloran, Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research, Neurocomput. 335 (2019) 299–326. [18] B. Karthikeyan, P. Nishmitha, B. Poojasree and S. Asha, Authentication of secret message using Rabin-Karp in image steganography, Int. Conf. Intell. Comput. Control Syst. (2019) 388–391. [19] G. Lakshmi, M. Ghonge and A.J. Obaid, Cloud based IoT smart healthcare system for remote patient monitoring, EAI Endorsed Trans. Pervasive Health Technol. (2021) 1–11. [20] N. Manohar and P.V. Kumar, Data encryption and decryption using steganography, 4th Int. Conf. Intell. Comput. Control Syst. (2020) 697–702. [21] M.Q. Mohammed, S.Q. Muhamed, M. Ievlanov and Z. Gazetdinova, Improvement of the method of scenario analysis of functional requirements to an information system, Eastern-European J. Enterprise Technol. 3(2(99)) (2019) 25–35. [22] B.S. Mohan, A.A. Mahmood, M.Q. Mohammed and N.D. Zaki, Replicating the MAP kinase cascade in membrane computing, J. Phys.: Conf. Ser. 1963(1) (2021) 012156. [23] S.Q. Muhamed, M.Q. Mohammed, M. Evlanov and H. Kliuchko, The ADALINE neuron modification for solving the problem on searching for the reusable functions of the information system, Eastern-European J. Enterprise Technol. 3(2(93)) (2018) 25–32. [24] S.Q. Muhamed, M.Q. Mohammed, T. Nayl, D. Mikhnov and A. Mikhnova, Technology of structural optimization for subsidiary in enterprise information systems, Int. J. Adv. Trends Comput. Sci. Engin. 8(1) (2019) 544–549. [25] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho and S.W. Baik, A novel magic LSB substitution method (MLSB-SM) using multi-level encryption and achromatic component of an image, Multimedia Tool. Appl. 75 (2016) 14867–14893. [26] H. Nyeem, Reversible data hiding with image bit-plane slicing, 20th Int. Conf. Comput. Inf. Technol. (2018) 1–6. [27] J. Qin, Y. Luo, X. Xiang, Y. Tan H. Huang, Coverless image steganography: A survey, IEEE Access 7 (2019) 171372–171394. [28] A.K. Sahu and G. Swain, A novel n-rightmost bit replacement image steganography technique, 3D Res. 10(1) (2019). [29] A.K. Sahu and G. Swain, An optimal information hiding approach based on pixel value differencing and modulus function, Wireless Personal Commun. 108(1) (2019) 159–74. [30] P. Shah, P. Choudhari and S. Sivaraman, Adaptive wavelet packet based audio steganography using data history, IEEE Region 10 and the Third Int. Conf. Indust. Inf. Syst. (2008) 1–5. [31] G.J. Simmons, The prisoners’ problem and the subliminal channel, Adv. Crypt. (1984) 51–67. [32] B. Stoyanov and B. Stoyanov, Boost: Medical image steganography using nuclear spin generator, Entropy 22(5) (2020) 501. [33] W. Su, J. Ni, X. Hu J. Fridrich, Image steganography with symmetric embedding using gaussian Markov random field model, IEEE Trans. Circuit.Syst. Video Technol. 5 (2020). [34] G. Swain, Adaptive and non-adaptive PVD steganography using overlapped pixel blocks, Arab. J. Sci. Engin. 43(12) (2018) 7549–7562. [35] M.S. Taha, M.S.M. Rahim, M.M. Hashim and H.N. Khalid, Information hiding: A tools for securing biometric information, Technol. Rep. Kansai Univ. 62(04) (2020) 1383–1394.[36] https://www.nlm.nih.gov/. | ||
آمار تعداد مشاهده مقاله: 43,717 تعداد دریافت فایل اصل مقاله: 573 |