Skip to main content
Log in

Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, the problem of outsourcing the selective encryption of a medical image to cloud by resource-constrained devices such as smart phone is addressed, without revealing the cover image to cloud using steganography. In the proposed framework, the region of interest of the medical image is first detected using a visual saliency model. The detected important data is then embedded in a host image, producing a stego image which is outsourced to cloud for encryption. The cloud which has powerful resources, encrypts the image and sent back the encrypted marked image to the client. The client can then extract the selectively encrypted region of interest and can combine it with the region of non-interest to form a selectively encrypted image, which can be sent to medical specialists and healthcare centers. Experimental results and analysis validate the effectiveness of the proposed framework in terms of security, image quality, and computational complexity and verify its applicability in remote patient monitoring centers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate Array on RGB indicator. International Journal of Signal and Image Processing 1:196–204

    Google Scholar 

  2. Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293–306

    Article  Google Scholar 

  3. Almeida J, Leite NJ, Torres R d S (2012) Vison: Video summarization for online applications,. Pattern Recogn Lett 33:397–409

  4. Al-Otaibi NA, Gutub AA (2014a) 2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers,. Lecture Notes on Information Theory Vol 2

  5. Al-Otaibi NA, Gutub AA (2014b) Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority,. Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014):250–256

  6. Nouf Alotaibi, Adnan Gutub, and Esam Khan, stego-system for hiding text in images of personal computers, The 12th Learning and Technology Conference, 2015.

  7. Bruce N, Tsotsos J (2005) Saliency based on information maximization,. Adv Neural Inf Proces Syst:155–162

  8. Buke A, Gaoli F, Yongcai W, Lei S, Zhiqi Y (2015) “healthcare algorithms by wearable inertial sensors: a survey,” Communications. China 12:1–12

  9. Chen Y, Lee J (2012) A review of machine-vision-based analysis of wireless capsule endoscopy video. Diagnostic and therapeutic endoscopy, vol 2012

  10. Chih-Yang L, Chang C-C, Yu-Zheng W (2008) Reversible steganographic method with high payload for JPEG images. IEICE Trans Inf Syst 91:836–845

    Google Scholar 

  11. de Avila SEF, Lopes APB, da Luz A, de Albuquerque Araújo A (2011) VSUMM: a mechanism designed to produce static video summaries and a novel evaluation method. Pattern Recogn Lett 32:56–68

    Article  Google Scholar 

  12. Ejaz N, Mehmood I, Baik SW (2013) MRT letter: visual attention driven framework for hysteroscopy video abstraction. Microsc Res Tech 76:559–563

    Article  Google Scholar 

  13. Erdem E, Erdem A (2013) Visual saliency estimation by nonlinearly integrating features using region covariances. J Vis 13:11–11

    Article  Google Scholar 

  14. Goferman S, Zelnik-Manor L, Tal A (2012) context-aware saliency detection, Pattern Analysis and Machine Intelligence. IEEE Transactions on 34:1915–1926

  15. Gupta B, Joshi RC, Misra M (2009) Defending against distributed denial of service attacks: issues and challenges. Information Security Journal: A Global Perspective 18:224–247

    Google Scholar 

  16. Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence 2:56–64

    Google Scholar 

  17. Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A (2008) “pixel indicator high capacity technique for RGB image based steganography,” in WoSPA 2008-5th IEEE International Workshop on Signal Processing and its Applications

  18. Gutub A, Al-Qahtani A, Tabakh A (2009) Triple-A: Secure RGB image steganography based on randomization, in Computer Systems and Applications, AICCSA 2009. IEEE/ACS International Conference on, 2009, pp. 400–403

  19. https://ganymed.imib.rwth-aachen.de/irma/veroeffentlichungen_en.php.

  20. Hussain M, Wahab AWA, Anuar NB, Salleh R, Noor RM (2015) Pixel value differencing steganography techniques: Analysis and open challenge,. Consumer Electronics-Taiwan (ICCE-TW), 2015 I.E. International Conference on:21–22

  21. Khan F, Gutub AA-A, (2007) message concealment techniques using image based steganography, in The 4th IEEE GCC Conference and Exhibition

  22. Li X, Yang B, Cheng D, Zeng T (2009) a generalization of LSB matching, Signal Processing Letters. IEEE 16:69–72

  23. Lin C-C, Liu X-L, Yuan S-M (2015) Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping. Inf Sci 293:314–326

    Article  Google Scholar 

  24. Liu Z, Zhang F, Wang J, Wang H, Huang J (2016) Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Processing 123:157–166

  25. Lv Z, Chirivella J, Gagliardo P (2016) Bigdata oriented multimedia mobile health applications. J Med Syst 40:1–10

    Article  Google Scholar 

  26. Mehmood I, Sajjad M, Baik SW (2014a) Mobile-cloud assisted video summarization framework for efficient management of remote sensing data generated by wireless capsule sensors. Sensors 14:17112–17145

    Article  Google Scholar 

  27. Mehmood I, Sajjad M, Baik SW (2014b) Video summarization based tele-endoscopy: a service to efficiently manage visual data generated during wireless capsule endoscopy procedure. J Med Syst 38:1–9

    Article  Google Scholar 

  28. Mehmood I, Sajjad M, Ejaz W, Baik SW (2015) Saliency-directed prioritization of visual data in wireless surveillance networks. Information Fusion 24:16–30

    Article  Google Scholar 

  29. Mstafa RJ, Elleithy KM (2014) A highly secure video steganography using Hamming code (7, 4),. Systems, Applications and Technology Conference (LISAT), 2014 I.E. Long Island:1–6

  30. Mstafa RJ, Elleithy KM (2015) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimedia Tools and Applications:1–23

  31. Muhammad K, (2015) Steganography: A Secure way for Transmission in Wireless Sensor Networks, arXiv preprint arXiv:1511.08865,

  32. Muhammad K, Ahmad J, Farman H, Zubair M (2014) A novel image steganographic approach for hiding text in color images using HSI color model. Middle-East J Sci Res 22:647–654

    Google Scholar 

  33. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2015a) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications:1–27

  34. Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015b) A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption,. KSII Transactions on Internet and Information Systems (TIIS) 9:1938–1962

  35. Muhammad K, Ahmad J, Sajjad M, Zubair M (2015c) Secure image steganography using cryptography and image transposition. NED Univ J Res 12:81–91

  36. Muhammad K, Mehmood I, Lee MY, Ji SM, Baik SW (2015d) Ontology-based secure retrieval of semantically significant visual contents. Journal of Korean Institute of Next Generation Computing 11:87–96

    Google Scholar 

  37. Muhammad K, Sajjad M, Baik SW (2016a) Dual-level security based Cyclic18 steganographic method and its application for secure transmission of Keyframes during wireless capsule endoscopy. J Med Syst 40:1–16

    Article  Google Scholar 

  38. Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2016b) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools and Applications:1–30

  39. Muhammad K, Ahmad J, Sajjad M, Rho S, Baik SW (2016c) Evaluating the Suitability of Color Spaces for Image Steganography and Its Application in Wireless Capsule Endoscopy,. 2016 International Conference on Platform Technology and Service (PlatCon):1–3

  40. Parvez MT, Gutub A-A (2008) RGB intensity based variable-bits image steganography,. Asia-Pacific Services Computing Conference, APSCC’08. IEEE 2008:1322–1327

  41. Parvez MT, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38:127–142

    Google Scholar 

  42. Qin C, Chang C-C, Huang Y-H, Liao L-T (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Transactions on Circuits and Systems for Video Technology 23:1109–1118

    Article  Google Scholar 

  43. Salvatore M, Margolies L, Kale M, Wisnivesky J, Kotkin S, Henschke CI, et al. (2014) Breast density: comparison of chest CT with mammography. Radiology 270:67–73

    Article  Google Scholar 

  44. Singh AK, Kumar B, Dave M, Mohan A (2015a) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5:607–614

    Article  Google Scholar 

  45. Singh AK, Dave M, Mohan A (2015b) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools and Applications:1–21

  46. Tewari A, Jain A, Gupta B (2016) Recent survey of various defense mechanisms against phishing attacks. Journal of Information Privacy and Security 12:3–13

    Article  Google Scholar 

  47. Wang L, Song H, Liu P (2016) A novel hybrid color image encryption algorithm using two complex chaotic systems. Opt Lasers Eng 77:118–125

    Article  Google Scholar 

  48. Wu H, Wang H (2013) Multibit color-mapping steganography using depth-first search,. Biometrics and Security Technologies (ISBAST), 2013 International Symposium on:224–229

  49. Wu H, Wang H, Zhao H, Yu X (2015) Multi-layer assignment steganography using graph-theoretic approach. Multimedia Tools and Applications 74:8171–8196

    Article  Google Scholar 

  50. Xiang T, Wong K-w, Liao X (2007) Selective image encryption using a spatiotemporal chaotic system. Chaos: An Interdisciplinary Journal of Nonlinear Science 17:023115

    Article  MATH  Google Scholar 

  51. Xiang T, Hu J, Sun J (2015) Outsourcing chaotic selective image encryption to the cloud with steganography. Digital Signal Processing 43:28–37

    Article  Google Scholar 

  52. Yang J-J, Li J, Mulder J, Wang Y, Chen S, Wu H, et al. (2015a) Emerging information technologies for enhanced healthcare. Comput Ind 69:3–11

    Article  Google Scholar 

  53. Yang J, Lin Y, Gao Z, Lv Z, Wei W, Song H (2015b) Quality index for stereoscopic images by separately evaluating adding and subtracting. PLoS One 10:e0145800

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education (2013R1A1A2061978).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Irfan Mehmood.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sajjad, M., Muhammad, K., Baik, S.W. et al. Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimed Tools Appl 76, 3519–3536 (2017). https://doi.org/10.1007/s11042-016-3811-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3811-6

Keywords

Navigation