A secure steganography for privacy protection in healthcare system
- 368 Downloads
Private data in healthcare system require confidentiality protection while transmitting. Steganography is the art of concealing data into a cover media for conveying messages confidentially. In this paper, we propose a steganographic method which can provide private data in medical system with very secure protection. In our method, a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then divided into non-overlapping embedding units with three consecutive pixels. We use adaptive pixel pair match (APPM) method to embed digits in the pixel value differences (PVD) of the three pixels and the base of embedded digits is dependent on the differences among the three pixels. By solving an optimization problem, minimal distortion of the pixel ternaries caused by data embedding can be obtained. The experimental results show our method is more suitable to privacy protection of healthcare system than prior steganographic works.
KeywordsPrivacy protection Healthcare system Steganography Pixel value difference Hilbert filling curve Adaptive pixel pair match
This work is partially supported by National Natural Science Foundation of China under the grant number 61101112, and Postdoctoral Science Foundation of China under the grant number 2011M500775. The authors would like to thank Prof. Hong at Yu Da University, Taiwan, for providing us the source code in .
- 1.Fridrich, J., Steganography in digital media: Principles, algorithms, and applications. Cambridge Univ. Press, Cambridge, U.K., 2009.Google Scholar
- 2.Filler, T., Judas, J., Fridrich, J., Minimizing embedding impact in steganography using trellis-coded quantization. in Proc. SPIE, Media Forensics and Security. 2010, vol.7541, 2010, doi 10.1117/12.838002.
- 9.Chao, R. M., Wu, H. C., Lee, C. C., et al., A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Secur., 2009. doi: 10.1155/2009/658047. Article ID 658047.
- 11.Hempstalk, K., Hiding behind corners: Using edges in images for better steganography. In Proc. Computing Women’s Congress, Hamilton, New Zealand, 2006.Google Scholar
- 20.Westfeld, A., Space filling curves in steganalysis. Proceedings of SPIE: Security, Steganography and Watermarking for Multimedia. San Jose, California:SPIE, pp 28–37, 2005.Google Scholar
- 22.Pevý, T., Filler, T., Bas, P., Using high-dimensional image models to perform highly undetectable steganography. In Proc. 12 Information Hiding, Jun.28–30, vol.6387, Lecture Notes in Computer Science, pp.161–177, 2010.Google Scholar
- 24.Yu, Babaguchi, N., Breaking the YASS algorithm via pixel and DCT coefficients analysis, in Proc. 19th IEEE Int. Conf. Pattern Recogn. pp1–4, 2008.Google Scholar