Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 9/2021

08.06.2021 | Research Article-Computer Engineering and Computer Science

Reversible Data Hiding for Electronic Patient Information Security for Telemedicine Applications

verfasst von: Romany F. Mansour, Shabir A. Parah

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 9/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing along with the Internet of Things (IoT) is proving to be an essential tool for delivering better healthcare services. However, maintenance, privacy, confidentiality, and security of Electronic Health Information (EHI) pose a huge challenge in telemedicine. The sharing of EHI with a remote doctor over the cloud is an important issue since the minute variation may lead to the wrong diagnosis. Despite the plethora of research in this field, there is an immense necessity to develop the algorithms for enhancing security in e-healthcare systems. In this paper, an innovative Reversible Data Hiding (RDH) scheme using Lagrange’s interpolation polynomial, secret sharing, and bit substitution for EHI security has been proposed. The cover medical image is sub-sampled, into four shares. Image interpolation is used to enlarge the subsamples, for hiding EHI. The secret information is processed using Lagrange’s interpolation polynomial before being embedded in the various cover image shares. The data is embedded into the interpolated sub-sampled shares at the locations pre-defined by the algorithm. The distributive nature of embedded data enhances the security of the proposed framework while maintaining reversibility. We show that only 75% of shares are required to obtain the whole embedded data and the undistorted cover image. The proposed scheme outperforms the schemes under comparison in terms of imperceptibility and payload. It can reversibly embed 163,840 bits (0.75 bits per pixel) with an average PSNR of about 52.38 dB. The average values of relative entropy, the difference in relative entropy, standard deviation, and cross-correlation are 7.3242, 0.0382, 65.0539, and 0.9838, respectively, for the first sub-sample. It shows an increase of about 3 dB for a payload of 1, 30,000 bits when compared to the state-of-art. Further, it is pertinent to mention that the proposed scheme has lower computational complexity and is hence useful for e-healthcare applications. Given all the attributes of the scheme along with its lower computational complexity, it is suitable for EHI security in a distributive environment like cloud computing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Dang, L.M.; Piran, M.J.; Han, D.; Min, K.; Moon, H.: A survey on internet of things and cloud computing for healthcare. Electronics 8, 768 (2019)CrossRef Dang, L.M.; Piran, M.J.; Han, D.; Min, K.; Moon, H.: A survey on internet of things and cloud computing for healthcare. Electronics 8, 768 (2019)CrossRef
3.
Zurück zum Zitat Yangui, S.: A panorama of cloud platforms for IoT applications across industries. Sensors 20, 2701 (2020)CrossRef Yangui, S.: A panorama of cloud platforms for IoT applications across industries. Sensors 20, 2701 (2020)CrossRef
7.
Zurück zum Zitat Rajasekaran, M.; Yassine, A.; Hossain, M.S.; Alhamid, M.F.; Guizani, M.: “Autonomous monitoring in healthcare environment: Reward-based energy charging mechanism for IoMT wireless sensing nodes”, Future Gener. Comput. Syst. 98, 565–576 (2019) Rajasekaran, M.; Yassine, A.; Hossain, M.S.; Alhamid, M.F.; Guizani, M.: “Autonomous monitoring in healthcare environment: Reward-based energy charging mechanism for IoMT wireless sensing nodes”, Future Gener. Comput. Syst. 98, 565–576 (2019)
10.
Zurück zum Zitat Mansour, R.F.; Abdelrahim, EMd.: An evolutionary computing enriched rs attack resilient medical image steganography model for telemedicine applications. Multidimensional Syst Signal Proc 30, 791–418 (2019)CrossRef Mansour, R.F.; Abdelrahim, EMd.: An evolutionary computing enriched rs attack resilient medical image steganography model for telemedicine applications. Multidimensional Syst Signal Proc 30, 791–418 (2019)CrossRef
11.
Zurück zum Zitat Kadhim, I.J.; Premaratne, P.; Vial, P.J.; Halloran, B.: Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335, 299–326 (2019)CrossRef Kadhim, I.J.; Premaratne, P.; Vial, P.J.; Halloran, B.: Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335, 299–326 (2019)CrossRef
13.
Zurück zum Zitat Ahmed, A.; Latif, R.; Latif, S.; Abbas, H.: “Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: a systematic literature review. Multimed. Tools Appl. 77, 21947–21965 (2018)CrossRef Ahmed, A.; Latif, R.; Latif, S.; Abbas, H.: “Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: a systematic literature review. Multimed. Tools Appl. 77, 21947–21965 (2018)CrossRef
15.
Zurück zum Zitat Ni, Z.; Shi, Y.Q.; Ansari, N.; Su, W.: Reversible data hiding. IEEE Trans. Circ. Syst., Vid Technol. 16(3), 354–362 (2006)CrossRef Ni, Z.; Shi, Y.Q.; Ansari, N.; Su, W.: Reversible data hiding. IEEE Trans. Circ. Syst., Vid Technol. 16(3), 354–362 (2006)CrossRef
16.
Zurück zum Zitat P. Y Tsai., Y. C. Hu, H. L. Yeh (2009), “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process, 89(11):29–43. P. Y Tsai., Y. C. Hu, H. L. Yeh (2009), “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process, 89(11):29–43.
17.
Zurück zum Zitat Kim, K.S.; Lee, M.J.; Lee, H.Y.; Lee, H.K.: Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recogn 42(11), 3083–3096 (2009)CrossRef Kim, K.S.; Lee, M.J.; Lee, H.Y.; Lee, H.K.: Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recogn 42(11), 3083–3096 (2009)CrossRef
18.
Zurück zum Zitat Li, X.; Li, J.; Li, B.; Yang, B.: High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Proc. 93(1), 198–205 (2013)CrossRef Li, X.; Li, J.; Li, B.; Yang, B.: High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Proc. 93(1), 198–205 (2013)CrossRef
19.
Zurück zum Zitat C. F. Lee, C. C. Chang, C. Y. Gao (2013), “A two-staged multi-level reversible data hiding exploiting lagrange interpolation,” 2013 Ninth international conference on intelligent information hiding and multimedia signal processing, IEEE, pp 485–488. C. F. Lee, C. C. Chang, C. Y. Gao (2013), “A two-staged multi-level reversible data hiding exploiting lagrange interpolation,” 2013 Ninth international conference on intelligent information hiding and multimedia signal processing, IEEE, pp 485–488.
20.
Zurück zum Zitat Peng, F.; Li, X.; Yang, B.: Improved PVO-based reversible data hiding. Digit Signal Proce 25, 255–265 (2014)CrossRef Peng, F.; Li, X.; Yang, B.: Improved PVO-based reversible data hiding. Digit Signal Proce 25, 255–265 (2014)CrossRef
21.
Zurück zum Zitat X. Qu X, H. J. Kim (2015), “Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding,” Signal Process, 111:249–260. X. Qu X, H. J. Kim (2015), “Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding,” Signal Process, 111:249–260.
22.
Zurück zum Zitat Ou, B.; Li, X.; Wang, J.: Improved PVO-based reversible data hiding: a new implementation based on multiple histograms modification. J Vis Commun Image Represent 38, 328–339 (2016)CrossRef Ou, B.; Li, X.; Wang, J.: Improved PVO-based reversible data hiding: a new implementation based on multiple histograms modification. J Vis Commun Image Represent 38, 328–339 (2016)CrossRef
23.
Zurück zum Zitat B. Jana B, : Reversible data hiding scheme using sub-sampled image exploiting Lagrange’s interpolating polynomial. Multimed. Tools Appl. 77, 1–17 (2018)CrossRef B. Jana B, : Reversible data hiding scheme using sub-sampled image exploiting Lagrange’s interpolating polynomial. Multimed. Tools Appl. 77, 1–17 (2018)CrossRef
24.
Zurück zum Zitat W. C. Kuo, D. J. Jiang, Y. C. Huang (2007), “Reversible data hiding based on histogram,” International conference on intelligent computing, lecture notes in artificial intelligence, vol 4682. Springer, Qing Dao, pp 1152–1161. W. C. Kuo, D. J. Jiang, Y. C. Huang (2007), “Reversible data hiding based on histogram,” International conference on intelligent computing, lecture notes in artificial intelligence, vol 4682. Springer, Qing Dao, pp 1152–1161.
25.
Zurück zum Zitat J. Hwang, J. W. Kim, J. U. Choi (2006), “A reversible watermarking based on histogram shifting,” International workshop on digital watermarking, lecture notes in computer science, vol 4283. Springer, Jeju Island, p: 348–361. J. Hwang, J. W. Kim, J. U. Choi (2006), “A reversible watermarking based on histogram shifting,” International workshop on digital watermarking, lecture notes in computer science, vol 4283. Springer, Jeju Island, p: 348–361.
26.
Zurück zum Zitat E. Varsaki, V. Fotopoulos,A. N. Skodras (2006), “A reversible data hiding technique embedding in the image histogram,” Technical Report HOU-CS-TR-2006–08-GR Hellenic Open University. E. Varsaki, V. Fotopoulos,A. N. Skodras (2006), “A reversible data hiding technique embedding in the image histogram,” Technical Report HOU-CS-TR-2006–08-GR Hellenic Open University.
27.
Zurück zum Zitat C. F. Lee, C.C. Chang, C. Y. Gao (2013), “A two-staged multi-level reversible data hiding exploiting lagrange interpolation,” 2013 Ninth international conference on intelligent information hiding and multimedia signal processing. IEEE, pp 485–488. C. F. Lee, C.C. Chang, C. Y. Gao (2013), “A two-staged multi-level reversible data hiding exploiting lagrange interpolation,” 2013 Ninth international conference on intelligent information hiding and multimedia signal processing. IEEE, pp 485–488.
31.
Zurück zum Zitat Wang, X.T.; Chang, C.C.; Nguyen, T.S.; Li, M.C.: Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digit Signal Proc. 23(2), 569–577 (2013)MathSciNetCrossRef Wang, X.T.; Chang, C.C.; Nguyen, T.S.; Li, M.C.: Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digit Signal Proc. 23(2), 569–577 (2013)MathSciNetCrossRef
32.
Zurück zum Zitat Ou, B.; Li, X.; Zhao, Y.; Ni, R.: Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion. Signal Pro Image Commun. 29(7), 760–772 (2014)CrossRef Ou, B.; Li, X.; Zhao, Y.; Ni, R.: Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion. Signal Pro Image Commun. 29(7), 760–772 (2014)CrossRef
33.
Zurück zum Zitat Meikap, S.; Jana, B.: Directional PVO for reversible data hiding scheme with image interpolation. Multimed. Tools Appl. 77(23), 31281–31311 (2018)CrossRef Meikap, S.; Jana, B.: Directional PVO for reversible data hiding scheme with image interpolation. Multimed. Tools Appl. 77(23), 31281–31311 (2018)CrossRef
Metadaten
Titel
Reversible Data Hiding for Electronic Patient Information Security for Telemedicine Applications
verfasst von
Romany F. Mansour
Shabir A. Parah
Publikationsdatum
08.06.2021
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 9/2021
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-021-05716-2

Weitere Artikel der Ausgabe 9/2021

Arabian Journal for Science and Engineering 9/2021 Zur Ausgabe

Research Article-Computer Engineering and Computer Science

EnPSO: An AutoML Technique for Generating Ensemble Recommender System

Technical Note-Computer Engineering and Computer Science

A Bit Addressable Register with Variable Write/Read Data widths

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.