SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images

Abstract The advances in computer technologies and the Internet have made rapid strides and breakthroughs in the field of data communication, which nowadays, is easily accessed. Unfortunately, this easy access offers almost endless opportunities for pirating copyrighted and confidential medical imagery. Many methods are proposed in the literature, however, most of them lack in robustness and perceptibility, and are prone to attacks. Hence, this study proposes a robust image steganographic approach that combines Redundant Integer Wavelet Transform (RIWT), Discrete Wavelet Transforms (DCT) and Singular Value Decomposition (SVD) and the logistic chaotic map. RIWT being a shift invariant, reversibility and robustness were achieved in this proposed technique. Better level of imperceptibility was achieved using SVD and DCT, with embedding carried out on singular values. Extra security was provided using the logistic chaotic map for encryption of secret medical images, which also enhanced the robustness of the technique. The effectiveness of our proposed scheme was compared with similar schemes available in the literature using common parameters such as imperceptibility, robustness and resistance to several geometric transformation attacks. This technique proved superior to other existing methods. The UCID benchmarking database was used during validation.

[1]  Pachiyappan Arulmozhivarman,et al.  RAND - STEG: an integer wavelet transform domain digital image random steganography using knight's tour , 2015, Secur. Commun. Networks.

[2]  Sujata Nagpal,et al.  An Enhanced Digital Image Watermarking Scheme for Medical Images using Neural Network, DWT and RSA , 2016 .

[3]  Ki-Hyun Jung,et al.  Steganographic method based on interpolation and LSB substitution of digital images , 2014, Multimedia Tools and Applications.

[4]  Iqtadar Hussain,et al.  A technique for digital steganography using chaotic maps , 2014 .

[5]  Gregory Schott,et al.  Data Analysis in High Energy Physics: A Practical Guide to Statistical Methods , 2013 .

[6]  Hamidreza Rashidy Kanan,et al.  A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..

[7]  Bee Ee Khoo,et al.  A new robust lossless data hiding scheme and its application to color medical images , 2015, Digit. Signal Process..

[8]  Ying Zeng,et al.  Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography , 2013, IEEE Transactions on Information Forensics and Security.

[9]  Mohammad Shahram Moin,et al.  A novel image steganography scheme based on morphological associative memory and permutation schema , 2015, Secur. Commun. Networks.

[10]  Amit Mehto,et al.  Adaptive Lossless Medical Image Watermarking Algorithm Based on DCT & DWT , 2016 .

[11]  Karim Faez,et al.  An image steganography method based on integer wavelet transform , 2017, Multimedia Tools and Applications.

[12]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[13]  Vijay H. Mankar,et al.  Image steganography using redundant discrete wavelet transform and QR factorization , 2016, Comput. Electr. Eng..

[14]  Nasrin M. Makbol,et al.  Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition , 2013 .

[15]  Shang-Juh Kao,et al.  A high quality image sharing with steganography and adaptive authentication scheme , 2011, J. Syst. Softw..

[16]  Zhengwei Zhang,et al.  Robust Reversible Watermarking Algorithm Based on RIWT and Compressed Sensing , 2018 .

[17]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[18]  Pei-Ling Chiu,et al.  Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints , 2013, IEEE Transactions on Image Processing.

[19]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[20]  Li Fan,et al.  Improving the embedding efficiency of weight matrix-based steganography for grayscale images , 2013, Comput. Electr. Eng..

[21]  M. I. Khalil Medical Image Steganography: Study of Medical Image Quality Degradation when Embedding Data in the Frequency Domain , 2017 .

[22]  Amit Kumar Singh,et al.  Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine , 2014, Int. J. Electron. Secur. Digit. Forensics.

[23]  Della Baby,et al.  A Novel DWT Based Image Securing Method Using Steganography , 2015 .

[24]  Rajib Kumar Jha,et al.  Improved watermarking technique based on significant difference of lifting wavelet coefficients , 2015, Signal Image Video Process..

[25]  Subramaniyaswamy,et al.  Meta-data based secret image sharing application for different sized biomedical images , 2018 .

[26]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[27]  K. Rajesh,et al.  A Novel Approach for Color Image, Steganography Using NUBASI and Randomized, Secret Sharing Algorithm , 2015 .

[28]  Vinay Kumar Srivastava,et al.  A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications , 2017, Multimedia Tools and Applications.

[29]  lobna yehia,et al.  Hybrid Security Techniques for Internet of Things Healthcare Applications , 2015, IOT 2015.

[30]  Rose Qingyang Hu,et al.  Optimal multiuser spread-spectrum data hiding in digital images , 2015, Secur. Commun. Networks.

[31]  Ming Li,et al.  Extracting Spread-Spectrum Hidden Data From Digital Media , 2013, IEEE Transactions on Information Forensics and Security.

[32]  K. S. Ravichandran,et al.  RIWT and QR factorization based hybrid robust image steganography using block selection algorithm for IoT devices , 2019, J. Intell. Fuzzy Syst..

[33]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[34]  Chih-Ta Yen,et al.  Frequency domain digital watermark recognition using image code sequences with a back-propagation neural network , 2015, Multimedia Tools and Applications.