Journal of Medical Systems

, 37:9918 | Cite as

A secure steganography for privacy protection in healthcare system

  • Jing Liu
  • Guangming Tang
  • Yifeng Sun
Original Paper


Private data in healthcare system require confidentiality protection while transmitting. Steganography is the art of concealing data into a cover media for conveying messages confidentially. In this paper, we propose a steganographic method which can provide private data in medical system with very secure protection. In our method, a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then divided into non-overlapping embedding units with three consecutive pixels. We use adaptive pixel pair match (APPM) method to embed digits in the pixel value differences (PVD) of the three pixels and the base of embedded digits is dependent on the differences among the three pixels. By solving an optimization problem, minimal distortion of the pixel ternaries caused by data embedding can be obtained. The experimental results show our method is more suitable to privacy protection of healthcare system than prior steganographic works.


Privacy protection Healthcare system Steganography Pixel value difference Hilbert filling curve Adaptive pixel pair match 



This work is partially supported by National Natural Science Foundation of China under the grant number 61101112, and Postdoctoral Science Foundation of China under the grant number 2011M500775. The authors would like to thank Prof. Hong at Yu Da University, Taiwan, for providing us the source code in [10].


  1. 1.
    Fridrich, J., Steganography in digital media: Principles, algorithms, and applications. Cambridge Univ. Press, Cambridge, U.K., 2009.Google Scholar
  2. 2.
    Filler, T., Judas, J., Fridrich, J., Minimizing embedding impact in steganography using trellis-coded quantization. in Proc. SPIE, Media Forensics and Security. 2010, vol.7541, 2010, doi  10.1117/12.838002.
  3. 3.
    Lou, D.-C., Wu, N.-I., Wang, C.-M., et al., A novel adaptive steganography based on local complexity and human vision sensitivity. J. Syst. Softw. 83:1236–1248, 2010.CrossRefGoogle Scholar
  4. 4.
    Wang, R. Z., Lin, C. F., and Lin, J. C., Hiding data in images by optimal moderately significant bit replacement. IEEE Electron. Lett. 36(25):2069–2070, 2001.CrossRefGoogle Scholar
  5. 5.
    Thien, C. C., and Lin, J. C., A simple and high-hiding capacity method for hiding digit-by—digit data in images based on modulus function. Pattern Recogn. 36(12):2875–2881, 2003.MATHCrossRefGoogle Scholar
  6. 6.
    Chan, C. K., and Cheng, L. M., Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3):469–474, 2004.MATHCrossRefGoogle Scholar
  7. 7.
    Mielikainen, J., LSB matching revisited. IEEE Signal Process Lett. 13(5):285–287, 2006.CrossRefGoogle Scholar
  8. 8.
    Zhang, X. P., and Wang, S. Z., Efficient steganographyic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11):781–783, 2006.CrossRefGoogle Scholar
  9. 9.
    Chao, R. M., Wu, H. C., Lee, C. C., et al., A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Secur., 2009. doi: 10.1155/2009/658047. Article ID 658047.
  10. 10.
    Hong, W., and Chen, T.-S., A novel data embedding method using adaptive pixel pair matching[J]. IEEE Trans. Inform. Forensic Secur. 7(1):176–184, 2012.CrossRefGoogle Scholar
  11. 11.
    Hempstalk, K., Hiding behind corners: Using edges in images for better steganography. In Proc. Computing Women’s Congress, Hamilton, New Zealand, 2006.Google Scholar
  12. 12.
    Zhang, X., and Wang, S., Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process. Lett. 12(1):67–70, 2005.CrossRefGoogle Scholar
  13. 13.
    Li, B., Fang, Y., and Huang, J., Steganalysis of multiple-base notaional system steganography. IEEE Signal Process. Lett. 15:493–496, 2008.CrossRefGoogle Scholar
  14. 14.
    Wu, D. C., and Tsai, W. H., A steganographic method for image by pixel-value differencing. Pattern Recogn. Lett. 24:1613–1626, 2003.MATHCrossRefGoogle Scholar
  15. 15.
    Yang, C. H., Weng, C. Y., and Wang, S., Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inform. Forensic Secur. 3(3):488–497, 2008.CrossRefGoogle Scholar
  16. 16.
    Luo, W., Huang, F., and Huang, J., Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inform. Forensic Secur. 5(2):201–214, 2010.MathSciNetCrossRefGoogle Scholar
  17. 17.
    Hong, W., Chen, T.-S., and Luo, C.-W., Data embedding using pixel value differencing and diamond encoding with multiple—base notational system. J. Syst. Softw. 85:1166–1175, 2012.CrossRefGoogle Scholar
  18. 18.
    Zhang, X., and Wang, S., Vnluerability of pixel-value differencing steganography to histogram analysis and modification for enhance security. Pattern Recognit. Lett. 25:331–339, 2004.CrossRefGoogle Scholar
  19. 19.
    Tan, S., and Li, B., Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-Spline Fitting. IEEE Signal Process. Lett. 19(6):336–339, 2012.MathSciNetCrossRefGoogle Scholar
  20. 20.
    Westfeld, A., Space filling curves in steganalysis. Proceedings of SPIE: Security, Steganography and Watermarking for Multimedia. San Jose, California:SPIE, pp 28–37, 2005.Google Scholar
  21. 21.
    Pevý, T., Bas, P., and Fridrich, J., Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inform. Forensic Secur. 5(2):215–224, 2010.CrossRefGoogle Scholar
  22. 22.
    Pevý, T., Filler, T., Bas, P., Using high-dimensional image models to perform highly undetectable steganography. In Proc. 12 Information Hiding, Jun.28–30, vol.6387, Lecture Notes in Computer Science, pp.161–177, 2010.Google Scholar
  23. 23.
    Luo, W. Q., Wang, Y. G., and Huang, J. W., detection of quantization artifacts and its applications to transform encoder identification. IEEE Trans. Inform. Forensic Secur. 5(4):810–815, 2010.CrossRefGoogle Scholar
  24. 24.
    Yu, Babaguchi, N., Breaking the YASS algorithm via pixel and DCT coefficients analysis, in Proc. 19th IEEE Int. Conf. Pattern Recogn. pp1–4, 2008.Google Scholar
  25. 25.
    Vapnik, V. N., The nature of statistical learning theory. Springer, New York, 1995.MATHCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Zhengzhou Information Science and Technology InstituteZhengzhouChina

Personalised recommendations