DOI QR코드

DOI QR Code

Reversible and High-Capacity Data Hiding in High Quality Medical Images

  • Huang, Li-Chin (Department of Computer Science and Engineering, National Chung Hsing University) ;
  • Hwang, Min-Shiang (Department of Computer Science & Information Engineering Asia University) ;
  • Tseng, Lin-Yu (Department of Computer Science and Communication Engineering, Providence University)
  • Received : 2012.09.21
  • Accepted : 2012.12.21
  • Published : 2013.01.31

Abstract

Via the Internet, the information infrastructure of modern health care has already established medical information systems to share electronic health records among patients and health care providers. Data hiding plays an important role to protect medical images. Because modern medical devices have improved, high resolutions of medical images are provided to detect early diseases. The high quality medical images are used to recognize complicated anatomical structures such as soft tissues, muscles, and internal organs to support diagnosis of diseases. For instance, 16-bit depth medical images will provide 65,536 discrete levels to show more details of anatomical structures. In general, the feature of low utilization rate of intensity in 16-bit depth will be utilized to handle overflow/underflow problem. Nowadays, most of data hiding algorithms are still experimenting on 8-bit depth medical images. We proposed a novel reversible data hiding scheme testing on 16-bit depth CT and MRI medical image. And the peak point and zero point of a histogram are applied to embed secret message k bits without salt-and-pepper.

Keywords

References

  1. Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Yeh, and Yung-Kuan Chan, "A high payload frequency-based reversible image hiding method," Information Sciences, vol. 180, pp. 2286-2298, 2010. https://doi.org/10.1016/j.ins.2010.01.034
  2. Chin-Chen Chang, Chih-Yang Lin, and Yi-Pei Hsieh, "Data hiding for vector quantizatin images using mixed-based notation and dissimilar patterns without loss of fidelity," Information Sciences, vol. 201, pp. 70-79, 2012. https://doi.org/10.1016/j.ins.2011.12.025
  3. Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng, Wei-Liang Tai, "Reversible hiding in DCT-based compressed images," Information Sciences, vol. 177, no. 13, pp. 2768-2786, 2007. https://doi.org/10.1016/j.ins.2007.02.019
  4. Chin-Chen Chang, Chih-Yang Lin, Yi-Hsuan Fan, "Lossless data hiding for color images based on block truncation coding," Pattern Recognition, vol. 41, pp.2347-2357, 2008. https://doi.org/10.1016/j.patcog.2007.12.009
  5. Chia-Chun Wu, Shang-Juh Kao, and Min-Shiang Hwang, "A high quality image sharing with steganography and adaptive authentication scheme," The Journal of Systems and Software, vol. 84, pp. 2196-2207, 2011. https://doi.org/10.1016/j.jss.2011.06.021
  6. Chia-Chun Wu, Min-Shiang Hwang, and Shang-Juh Kao, "A new approach to the secret image sharing with steganography and authentication," The Imaging Science Journal, vol. 57, no. 3, pp. 140-151, 2009. https://doi.org/10.1179/174313109X459887
  7. S-F Chiou, I-En Liao, and Min-Shiang Hwang, "A capacity-enhanced reversible data hiding scheme based SMVQ," The Imaging Science Journal, vol. 59, pp. 17-24, 2011. https://doi.org/10.1179/136821910X12750339175943
  8. Zhiguo Chang and Jian Xu, "Reversible run length data embedding for medical images," Communication Software and Networks (ICCSN), in Proc. of 2011 IEEE 3rd International Conference, pp. 260-263, 2011.
  9. M. Fallahpour, D. Megias, and M. Ghanbari, "Reversible and high-capacity data hiding in medical images," IET Image Processing, vol.5, Iss. 2, pp. 190-197, 2011. https://doi.org/10.1049/iet-ipr.2009.0226
  10. Min-Shiang Hwang, K. F. Hwang, and Chin-Chen Chang, "A timestamping protocol for digital watermarking," Applied Mathematics and Computation, vol. 169, pp. 1276-1284, 2005. https://doi.org/10.1016/j.amc.2004.10.094
  11. Li-Chin Huang, Lin-Yu Tseng, and Min-Shiang Hwang, "The study of data hiding in medical image," International Journal of Network Secuity, vol. 14, no. 5, pp. 243-251, 2012.
  12. Li-Chin Huang, Lin-Yu Tseng, and Min-Shiang Hwang, "A reversible data hiding method by histogram shifting in high quality medical images," Journal of Systems and Software, Available online 3 December, 2012.
  13. H. -J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, and H. -G. Choo, "A novel difference expansion transform for reversible data embedding," IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 456-465, Sep. 2008. https://doi.org/10.1109/TIFS.2008.924600
  14. B. Karthikeyan, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti, and M. Gomathymeenakshi, "An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image," International Journal of Network Security, vol.15, no.1, pp.314-318, 2013.
  15. Der-Chyuan Lou, Ming-Chiang Hu, and Jiang-Lung Liu, "Multiple layer data hding scheme for medical images," Computer Standards and Interfaces, vol. 31, pp.329-335, 2009. https://doi.org/10.1016/j.csi.2008.05.009
  16. Hao Luo, Fa-Xin Yu, Hua Chen, Zheng-Liang Huang, Hui Li, and Ping-Hui Wang, "Reversible data hiding based on block median preservation," Information Sciences, vol. 181, pp.308-328, 2011. https://doi.org/10.1016/j.ins.2010.09.022
  17. Zhichen Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qibin Sun and Xiao Lin, "Robust lossless image data hiding designed for seim-fragile image authentication," IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, pp.497-509, 2008. https://doi.org/10.1109/TCSVT.2008.918761
  18. Z.M. Lu., J.X. Wang, B.B. Liu, "An improved lossless data hiding scheme based on image VQ-index residual value coding," The Journal of Systems and Software, vol. 82, no. 6, pp.1016-1024, 2009. https://doi.org/10.1016/j.jss.2009.01.010
  19. Zhensong Liao, Yan Huang, and Chisong Li, "Research on Data Hiding Capacity," International Journal of Network Security, vol.5, no.2, pp.140-144, 2007.
  20. Z. Ni, Y, -Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 354-362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
  21. Zhichen Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qibin Sun and Xiao Lin, "Robust lossless image data hiding designed for seim-fragile image authentication," IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, pp.497-509, 2008. https://doi.org/10.1109/TCSVT.2008.918761
  22. National Cancer Imaging Archive. Available at https://imaging.nci.nih.gov/.
  23. Palak K. Amin, Ning Liu, and K. P. Subbalakshmi, "Statistical Attack Resilient Data Hiding," International Journal of Network Security, vol.5, no.1, pp.112-120, 2007.
  24. Mrigank Rochan, Santosh Hariharan, and Kumar Rajamani, "Data hiding scheme for medical images using lossless code for mobile HIMS," in Proc. of Third International Conference on Communication Systems and Networks, pp. 1-4, 2011.
  25. S. S. Sujatha and M. Mohamed Sathik, "A novel DWT based blind watermarking for image authentication," International Journal of Network Security, vol. 14, no. 4, pp. 223-228, 2012.
  26. Yun Q. Shi, Zhicheng Ni, Dekun Zou, Changuin Liang and Guourong Xuan, "Data hiding fundamentals, algorithms and applications," Circuits and Systems, 2004 IEEE International Symposium, pp. 33-36, 2004.
  27. D. B. Satre and R. V. Pawar, "Preserve robustness for image data hiding," in Proc. of Second International Conference on Computer Research and Development, pp. 707-711, 2010.
  28. J. Tian, "Reversible data embedding using a difference expansion," IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no 8, pp. 890-896, Aug. 2003. https://doi.org/10.1109/TCSVT.2003.815962
  29. S. Maria Celestin Vigila and K. Muneeswaran, "Nonce based elliptic curve cryptosystem for text and image applications," International Journal of Network Security, vol. 14, no. 4, pp. 236-242, 2012.
  30. Christophe De Vleeschouwer, Jean-Francois Deloaigle, and Benoit Macq, "Circular interpretation of bijective transformation in lossless watermarking for media asset management," IEEE Transactions on Multimedia, vol. 5, pp. 97-104, 2003. https://doi.org/10.1109/TMM.2003.809729
  31. Nan-I Wu and Min-Shiang Hwang, "Data hiding: Current status and key issues" International Journal of Network Security, vol. 4, no. 1, pp. 1-9, Jan. 2007.
  32. Nan-I Wu, Chung-Ming Wang, Chwei-Shyong Tsai, and Min-Shiang Hwang, "A certificate-based watermaking scheme for coloured images," The Images Science Journal, vol. 56, pp. 326-332, 2008. https://doi.org/10.1179/174313108X299516
  33. Wei-Jen Wang, Cheng-Ta Huang, and Shiuh-Jeng Wang, "VQ applications in steganorgraphic data hiding upon multimedia images," IEEE Systems Journal, vol. 5, no. 4, pp. 528-537, 2011. https://doi.org/10.1109/JSYST.2011.2165603
  34. Chi-Yao Weng, Shiuh-Jeng Wang, Jonathan Liu, and Dushyant Goyal, "Prediciton-based reversible data hiding using empirical histograms in images," Transactions on Internet and Information Systems, vol. 6, no. 4, pp. 1248-1266, 2012.
  35. Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai and Min-Shiang Hwang, "A high quality steganographic method with pixel-value differencing and modulus function", The Journal of Systems and Software, vol. 81, Iss. 1, pp. 150-158, 2008. https://doi.org/10.1016/j.jss.2007.01.049
  36. Shangping Zhong, Xueqi Cheng, and Tierui Chen, "Data Hiding in a Kind of PDF Texts for Secret Communication," International Journal of Network Security, vol.4, no.1, pp.17-26, 2007.

Cited by

  1. A Generalized Image Interpolation-based Reversible Data Hiding Scheme with High Embedding Capacity and Image Quality vol.8, pp.9, 2013, https://doi.org/10.3837/tiis.2014.09.019