Abstract
The emerging demand for sharing medical digital images amid specialists and hospitals for enhanced and precise analysis necessitates protecting patients’ privacy. The communication of such information over available channels is very much susceptible to numerous security threats. The contemporary defence level is not strong enough for maintaining the protection and integrity of information in a required field like the human healthcare sector. There is a stern need for a robust safety mechanism. In this paper, a model is created by harmonizing various cryptography and steganography techniques to secure secret diagnostic information. This proposal provides multi-level security by utilizing a blend of Rivest, Shamir, and Adleman (RSA) and Quantum Chaos (QC) for Encryption mechanism as the first level and the Improved BPCS (IBPCS) steganography as the next step to conceal the resultant cipher in a cover image. Both image formats, Grayscale, and colored are employed as the cover images to hide various volumes of the confidential data. The proposed framework is implemented in MATLAB and assessed using different performance metrics like mean square error (MSE), Peak Signal to noise ratio (PSNR), bit error rate (BER), structural component (SC), structural similarity (SSIM), and so forth that are referenced in writing. Appraisal and comparison with state-of-art methods are also made after applying the different attacks (geometric, Gaussian, salt and pepper, flipping, etc.) on the stego image. Result analysis illustrates that the proposed model reveals its capacity to conceal the confidential patient’s information into a transmitted cover image with high imperceptibility and robustness in the presence and absence of attacks.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
The distant digital healthcare is increasing rapidly; the patient’s diagnostic medical data’s communication is escalating in the healthcare sector. Hence, it becomes a topic of concern to search out ways to receive and transmit such confidential data in this interventionist environment [12, 29, 41]. Therefore, the data should be secured using multi-level security mechanisms, which provide more robustness against the various attacks that can influence the data in the realistic scenario. This work contributes to delivering protection utilizing an amalgamation of different cryptography/ encryption and steganography algorithms in the presence of attacks. The first level of data safety is accomplished by encryption. In this process, the intended information or message, referred to as the plaintext, is being encrypted using a defined algorithm. A cipher is then generated. This leads to the procedure of encrypting a given message or the user’s information in such a way that only authorized users can access it, not the hackers. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm.
The second level of data safety is provided by the embedding mechanism called steganography [20, 25, 36, 37, 43]. It is known as the art of hiding information within a carrier: image, audio, video, etc. The mechanisms used for data encryption in this work are the Rivest-Shamir-Adleman (RSA) [32, 33] and Quantum Chaos Encryption. The RSA is public-key cryptography with extensive applications in business and personal communication sectors [6, 45]. The variable key size of this mechanism is its foremost advantage. On the contrary, encryption based on the Quantum chaos system [3], is a classical dynamical system which can be used to describe the function developed for solving the computing of the quantum related issues in which the perturbation fails to consider in small value, in theoretical apprehension and where quantum is generally treated as large values of numbers. In this work, image is chosen as a medium because these can be easily modified or manipulated using image processing tools resulting in protection of respectability and credibility of medical images. Among the widely used spatial domain steganography methods, Bit-Plane Complexity Segmentation (BPCS) [15, 21] steganographic procedure is suggested to insert secret scrambled information in a spread image because of its high security and embedding capacity. But, the BPCS system does not give attractive outcomes, mainly on account of periodic examples of chessboard or stripes. There is a need to enhance the ordinary BPCS procedure. Thus this paper proposes a hybrid technique that utilizes Improved BPCS (IBPCS) [7, 15, 27] to build the nature of implanting in an image.
A standard comparison between cryptography and steganography defines that an encrypted cipher that was visible in the document raises suspicion while it was sent, but the data that was hidden in messages usually don’t get easily noticed. Also, standalone steganography is considered a weak security mechanism in the scenario when a high intensity of security is required. Thus blend of cryptography and steganography can provide a more effective and efficient solution that can overcome the weaknesses of both. Such a hybrid security mechanism consists of encrypting the message to be transmitted combined with its storage in the cover image using the steganography technique resulting in a stego image. The resulting stego-image will then be sent to the intended recipient across the internet or any other communications channel without raising suspicion [16, 18, 24, 60]. Even then, if an intruder gets hold of this encrypted image file, then firstly, its steganalysis process is required to recover the transmitted ciphertext that was embedded in the image, even if successful still the decryption algorithm is necessitated so that message can be understood that makes it more insurmountable task. [11, 17, 19, 22, 26, 34, 35, 39, 50]. Applications in the healthcare sector require strict security and timeliness demand compared to other factors needed in other security-related applications.
This paper is organized as mentioned. Section 2 shows the related works; Section 3 explains the proposed model and corresponding algorithms; Section 4 gives set up parameters and performance parameters. Section 5 presents the experimental results and their discussions along with a comparison with an available mechanism followed by conclusion and references.
2 Related work
Table 1 presents an assessment of the security mechanisms available in the literature. After analyzing all the above techniques, it is found that security of medical data still require higher levels of security to achieve increased protection, robustness, and data integrity because the stego-image is likely to be subjected to a certain number of manipulations, some unintentional such as transmission noise and some intentional such as filtering, cropping, etc. Such distortion is defined as attacks on the image. The performance of the distorted images is tested for the robustness evaluation. Robustness indicates that the secret information embedded in the stego-image can survive even if the image is subjected to any manipulation.
Hence, the proposed mechanism attempts to overcome the above factors and enables the healthcare sector to achieve more significant data transmission security. This paper expects to improve medical information transmission safety depending on the union of a steganography technique and a hybrid encryption scheme to get a positively verified social insurance framework. The hallmarks of the proposed method are:
-
Quantum chaotic image encryption by quantum logistic map is used which not only decreases the time complexity of the encryption mechanism but it also enhances the overall security of the process by providing resistance to differential attacks.
-
RSA is used to enhance security to much elevated level, as it is highly protective mechanism with complex computational algorithm, which results in contributing prominent security with little over head over speed.
-
Improved BPCS mechanism is used for hiding the secret information which enhances the Imperceptibility of crucial medical information in stego image. Randomization of secret data makes the embedded data to become more intangible.
-
Various attacks are applied on the scheme to provide the same scenario as for the practical applications hence better security analysis can be done.
3 Proposed model
This paper depicts a hybrid healthcare security model that will ensure the security of the patient’s medical data transmission in various peculiar conditions. The process for the proposed technique is described in Fig. 2 and the steps are as follows:
-
(1)
The confidential medical records of patient are first encrypted using the proposed hybrid encryption mechanism that is developed from both Quantum Chaotic encryption system and RSA encryption algorithms.
-
(2)
Then the encrypted data is being embedded in a cover image using Improved BPCS technique to obtain a stego-image.
-
(3)
The extraction from stego image is done using the same process in reverse order at the destination or receiver side.
-
(4)
Finally decryption of the original secret medical patient’s data is done.
Figure 1 depicts the generalised framework of proposed model for providing the protection for the medical data transmission at both the source’s and the destination’s ends.
The proposed model follows a reversible process. All sender side processes are implemented in reverse order on the receiver side for the complete secret information recovery.
3.1 Encryption and embedding scheme
In the proposed model, the first level of security is provided by the cryptographic mechanism. This mechanism is comprised of encryption and decryption processes. During the encryption process, secret information SI is divided into two parts that are odd part (SIodd) and even part (SIeven). The Quantum Chaotic encryption scheme is used to encrypt the Sodd part. Quantum-based encryption techniques have the key advantage of sensitivity to initial conditions and highly non-linear relationships between input and output. Some others are listed below in Fig. 2. Also, in reference [13] exhaustive comparison of different encryption mechanism give justification for this choice. To defend against cryptanalysis, evaluation of the strength of encryption algorithms for differential attacks is suggested by researchers [57]. This gauge is NPCR that is the number of changing pixel rates and the UACI; unified averaged changed intensity randomness tests (Table 2).
The selected mechanism cleared both these tests and proved to be a robust algorithm against differential attack. Many algorithms, like AES and many chaos-based algorithms, are futile to clear these tests.
The RSA scheme is used to encrypt the SIeven part using the secret public key and private key (d, v). The choice of this algorithm is also based on many factors. These are listed below in Fig. 3.
The encryption process can be mathematically modelled as given in the following equations:
The algorithm that is used in the encryption procedure is as follows:
Embedding of this encrypted information in cover image is achieved by Improved Bit Plane slicing scheme (IBPCS) steganography technique. Choice of this mechanism is based on an exhaustive survey described in reference [8]. In this paper, literature survey on various hybrid security mechanisms is performed, under this many steganography mechanisms had been tested like LSB substitution, Status bit based LSB substitution, visual cryptography etc. The motivation behind choice of IBPCS is originated from this assessment [8, 46].
3.2 Extraction and decryption scheme
After incorporating the cipher text into the cover image, resultant stego image is exposed to insecure channel. At receiver side all the processes are executed in reverse order to get back the secret information. Firstly, Improved BPCS technique in reverse order is carried to extract the secret message and to retrieve the cover image. The extraction algorithm is described in Algorithm 4.
Final step is the decryption of extracted information. Decryption refers to the mechanism of converting the encrypted cipher back to the user in the well-known pattern; this is the reverse of the encryption process. The same key which was used by the sender will be used on the cipher-text during the decryption process in Quantum but RSA is Asymmetric algorithm thus requires no key sharing.
The proposed decryption algorithm is provided in Algorithm 5.
4 Simulation setup parameters
4.1 Setup parameters
Table 3 presents set up parameters considered while taking results of the techniques and Fig. 7 shows data set containing images used as cover image for the mechanism.
4.2 Performance metrics and attacks: [51, 53, 54]
-
Peal Signal Noise Ratio (PSNR): It calculates the imperceptibility of the stego image [59]. More value of PSNR reveals a better quality of the stego image or a higher imperceptibility of the hidden message. It is also known as the ratio of the peak square value of the pixels by mean square error (MSE).
-
Mean Square Error (MSE): It determines the magnitude of the average error between the two images i.e. original image and stego-image.
-
Bit Error Rate (BER): It gives the probability about a bit that will be incorrectly received at the destination due to the noise that will be encountered by the information [56]. It is defined as the number of bits that are received in error divided by the total number of bits that are being transferred.
-
Structural Similarity Index Measure (SSIM): It calculates the structural similarity between the two images that is original and stego- image [55]. The value range of this parameter is between −1 and 1. When the two images are almost identical, their SSIM is found to be close to 1.
-
Correlation Coefficient (CC): It is defined as a correlation-based measure, and it also measures the similarity between the two images. Its range lies between −1 to 1.
-
Universal Image quality index (UIQI): It is a better correlated quality metric parameter with the feature of perception of the HVS (Human Visual System) then the traditional error summation methods. It is designed as the combination of the three factors namely: loss of the correlation, luminance distortion and contrast distortion.
-
The Jaccard similarity index or Jaccard similarity coefficient (JI): It compares elements of two collections to identify similar and dissimilar components. It’s a gauge of similarity for the two sets of information, with a range from zero to a hundred percent. Higher percentage signifies more similar values.
-
Bhattacharya Coefficient (BC): It gives an approximate measure of the count of overlapping between two arithmetical samples which are two images (before embedding and after embedding). It measures the relative closeness between these images.
-
Intersection Coefficient (IC): This parameter provides a count of the same value of pixels between two histograms. Intersection coefficient can be calculated using probability distribution of two images (original and stego).
-
Attacks
-
Geometric Attack: These attacks are also known as de-synchronization attacks. These are the geometric distortions that get introduced in an image and include operations such as rotation, translation, scaling and cropping etc. They attempt to make the detection process more difficult and sometimes even impossible. The distortion due to the geometric attack is clearly visible in the image.
-
Flip Geometric Attack: This attack mainly flips the image upside down. Syntax: u = flipdim(I, 1) where I is the given image and 1 is the dimension for the flipping process.
-
-
Noise Attack Analysis: These are the manipulations that are encountered when the image is being transmitted over the communication channel. Various types of noise that are considered as follows:
-
Salt & pepper Noise attack: It is referred to as on off pixels. Syntax: u = imnoise (I, ‘salt& pepper’,d) where imnoise means addition of noise (salt and pepper), I is the stego image on which the attack will transpire, d is noise density which is the measure of noise to be added in the image. Its default value is 0.05. Salt and Pepper noise is the type of noise which is an external disturbance that can be seen on the images. It is also called as Impulse Noise. Reason of the occurrence of this noise is the sharp and sudden disturbance that comes in the image signal. It can be observed as the occurrence of small white and black dots on the image.
-
-
Antiocclusion Attack: The occlusion attack test is to occlude the resultant image and then observe the degree of restoration of the image or secret data. The final images with cutting areas of 1/2, 1/4, 1/16, 1/64 are used for further processing.
-
5 Simulation results and security analysis
The proposed model is simulated and the security analysis is done by calculating the statistical metrics. These parameters calculate the quality of the proposed security model. The obtained results were evaluated based on the following statistical parameters; the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Bit Error Rate (BER), Structural Similarity (SSIM), Structural Content (SC), Universal Image Quality Index (UIQI), and Correlation. The parameters are also calculated after the influence of various attacks on the stego image. For the simulation part, gray scale and colored images have been tested by the proposed security mechanism. The proposed algorithm does not devastate the characteristics of the original data and the cover image.
5.1 Histogram statistical analysis in absence of attacks
The histogram of the original image and the stego image is found to be almost similar which indicates that the level of imperceptibility of the secret data is very high and it will lead to more security and high robustness. As the presence of data isn’t predicted by any non-intentional recipient of information, thus it is at safe location for communication.
From the above histograms in Tables 4 and 5, it can be concluded that the original image and the stego image have an almost similar histogram. The analysis is done on greyscale images. The data considered here is 15, 20, 45, 55, 100, 128, 256 bytes. It shows that the imperceptibility is very high in the proposed model and compared with other techniques. Hence the data embedded in the images cannot be easily detected by the hackers. Therefore the proposed method is high-quality in terms of this performance metric.
5.2 Comparative analysis in the absence and presence of attacks
This section provides a comparison of the proposed mechanism with state-of-art techniques available in the literature. All results are evaluated using five different images, as shown in Data set Fig. 7. The readings shown here are averages of all five outcomes for proper readability of evaluation.
5.2.1 Robustness analysis
Robustness is a significant parameter to access a security mechanism. It can be computed by possible attacks such as noise attack, removal attack, inversion attack, Gaussian attack, etc. The Peak Signal to Noise Ratio (PSNR), Mean Absolute Error (MAE), and Mean Square Error (MSE) are its measures. Tables 6, 7, and 8 gives robustness analysis of the proposed mechanism with available techniques in literature in the absence and presence of noise and geometric attack; it can be observed that the proposed approach got better results in terms of the different metrics like PSNR, MSE, MAE in the absence of attacks. The value for the PSNR and MSE are found to be more generous in the projected method. Hence it has the competence to be more robust and provide greater security. In the absence of attacks, the proposed method has high values of PSNR for all sizes of data bytes with low mean square and absolute errors.
Tables 6, 7, 8, and 9 show results for PSNR, MSE, and MAE in the absence and the presence of attacks. In the presence of geometric attack (flipping of stego image column wise), the proposed method has high values of PSNR for all sizes of data bytes with low mean square and absolute errors. This implies that even in the presence of attacks projected mechanism is robust enough to withstand the attacks compared to other renowned mechanisms. In the presence of salt and pepper noise, the proposed method has high values of PSNR for all sizes of data bytes with low mean square and absolute errors. This implies that even in the presence of attacks projected mechanism is robust enough to withstand the attacks compared to other renowned mechanisms. From these tables, it is visible that the proposed mechanism provides optimum values of all the parameters in both scenarios. These optimum values ensure the complete retrieval of information and cover image at the receiver side.
5.2.2 Security analysis
The security analysis compares the pixel values, probability distribution, and histograms between the cover and watermarked images. A histogram is a graphical representation of the distribution of the data. Various parameters used to measure the security are the Jaccard index, UIQI, SSIM, etc. Tables 10, 11, 12, and 13 gives security analysis of the proposed mechanism with available techniques in literature in the absence and presence of noise and attacks; it can be observed that the proposed approach got better results in terms of the different metrics like UIQI and SSIM in the absence of attacks. Hence it has the competence to be more secure and provide greater protection to data. In the presence of noise and attack performance of the proposed mechanism is modest.
As seen in Tables 10, 11, 12, and 13, different parameters show the projected mechanism’s best values. Usage of the IBPCS steganography mechanism ensures hiding information in such regions that even in the presence of attacks, visibility of image and retrieval of data and cover image accomplishes remarkable success compared to other renowned mechanisms in literature.
5.2.3 Correlation analysis
Under this analysis, the correlation between different mechanisms is compared. Various parameters like the Bhattacharya coefficient, Correlation coefficient, and Intersection coefficient, measure the similarity between cover mage and stego image so that presence of information cannot be detected. The foremost strength of the proposed mechanism lies in security imposed by hiding secret data in such regions of cover image that cannot be seen easily, as shown by the proposed mechanism’s diverse coefficient values, which are very high compared with existing mechanisms.
In Tables 14, 15, 16, and 17, it can be observed that all the coefficients are high for the proposed mechanism for all data sizes. This implies that the projected mechanism has the effectiveness to secure the secret information in both ideal and practical scenarios compared to available mechanisms. Data reproducibility is 100% for all the mechanisms in the absence of attacks. The presence of noises and attacks may hinder the complete retrieval of data. However, as seen from a different set of results, given mechanisms provide the best results in all aspects. Time complexity is one parameter of the proposed mechanism, which requires improvement in comparison with other mechanisms. Due to the use of RSA, increased embedding data may cause higher computational complexity. Security is the higher priority for this work; however, time requirements are equally crucial.
6 Conclusions
With the increased medical data transversal over communication networks, demand for security of such crucial data has also raised manifold. The paper illustrates a multi-level security architecture that provides hybrid encryption algorithms followed by a robust steganography mechanism. This paper also considers the influence of probable attack and noise, which are prevalent over communication channels. The following are the highlights of the proposed scheme:
-
Elevated randomness and superior key space of the encryption scheme used.
-
The Improved Bit Plane Complexity Slicing (IBPCS) steganography preserves image quality in comparison to other schemes in the literature as it embeds the information into those portions of bit planes which have high complexity or randomness.
-
The proposed technique has better PSNR and MSE values in absence of attacks in comparison with the other state-of art technique. This prime strength of the mechanism contributes towards providing higher level of security to the medical data crucial in healthcare services.
-
The proposed technique achieves an enhanced level of robustness against the attacks. Hence the data is secured during the transmission.
-
Time complexity, reproducibility and correlation are also comparable with other accepted mechanisms.
Change history
24 August 2024
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s11042-024-20148-4
References
Abdelaziz, Elhoseny M, Salama AS, Riad AM A machine learning model for improving healthcare services on cloud computing environment. IEEE Access Meas 119:117–128. https://doi.org/10.1016/j.measurement(2018
Abdel-Nabi H, Al-Haj A (2017) Efficient joint encryption and data hiding algorithm for medical images security. In: Proc. 8th International Conference Information Communication System (ICICS), pp 147–152
Ahmed A, El-Latif A, Li Li C, Wang N, Han Q, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process 93:2986–3000. https://doi.org/10.1016/j.sigpro.2013.03.031
Anwar S, Ghany KKA, El Mahdy H (2015) Improving the security of images transmission. Int J Bio-Med Informat e-Health 3(4):7–13
Bairagi K, Khondoker R, Islam R An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures. Information Security Journal: A Global Perspective 25(4–6):197–212
Bansal R, S SG, Sharma G (2016) An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multimed Tools Appl:1–34. https://doi.org/10.1007/s11042-016-3926-9
Bansal R , Chawla R , Gupta S (2016) A comparison of image encryption techniques based on chaotic maps. In: Computing for sustainable global development”, (INDIACom), in 3rd international conference on IEEE, pp 933–938
Bansal R, Nagpal CK, Gupta S (2017) An efficient hybrid security mechanism based on chaos and improved BPCS. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-4600-6
Bashir A, Hasan ASB, Almangush H (2012) A new image encryption approach using the integration of a shifting technique and the AES algorithm. Int J Comput Appl 42(9):38–45
Chatterjee A, Ghosal SK, Sarkar R (2020) LSB based steganography with OCR: an intelligent amalgamation. Multimed Tools Appl:11747–11765. https://doi.org/10.1007/s11042-019-08472-6
Chaudhary D, Gupta S, Kumari M (2016) A novel hybrid security mechanism for data communication networks. International Journal of Information Privacy, Security and Integrity 2:216–231
Darwish A, Hassanien E, Elhoseny M, Sangaiah AK, Muhammad K (2017) The impact of the hybrid platform of Internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Humaniz Comput 7:231–245. https://doi.org/10.1007/s12652-017-0659-1
Dhall S, Sharma R, Gupta S (2019) A multi-level steganography mechanism using quantum chaos encryption. Multimedia Tools and Applications:1–28. https://doi.org/10.1007/s11042-019-08223-7
Elhoseny M, Ramirez- Gonzalez G, Abu-Elnase OM, Shawkat SA, Kumar A, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. In: IEEE Access Special section on information security solutions for telemedicine applications, vol 6, pp 20596–20608. https://doi.org/10.1109/ACCESS.2018.2817615
François M, Grosges T, Barchiesi D, Erra R (2012) A new image encryption scheme based on a chaotic function. Signal Process Image Commun 27:249–259
Goel S, Rana A, Kaur M (2013) A review of comparison techniques of image steganography. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) 13:9–14
Gokul M, Umeshbabu R, Vasudevan SK, Karthik D (2012) Hybrid steganography using visual cryptography and LSB encryption method. Int J Comput Appl 59:5–8
Gupta RK, Singh P (2013) A new way to design and implementation of hybrid crypto system for security of the information in public network. Int J Emerg Technol Adv Eng 3(8):108–115
Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and cryptography. International Journal of Modern Education and Computer Science 6:27–34
Habes A (2006) Information hiding in BMP image implementation, analysis and evaluation. in Saint Petersburg Institute for Informatics, vol 6, pp 1–10
Hanchinamani G, Kulkarni L (2015) An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3D Research, vol 6, pp 30
Islam MR, Siddiqa A, Uddin MP (2014) An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography. In: Proceedings of 3rd International conference on informatics, Electronics & Vision, vol 7, pp 1–6
Jain M, Choudhary RC, Kumar A (2016) Secure medical image steganography with RSA cryptography using decision tree. In: Proc.2nd International Conference Contemporary Computer Information (IC3I), vol 8, pp 291–295
Johnson NF, Jajodia S (1998) Exploring steganography: Seeing the unseen. Computer 31(2):26–34
Joseph A, Sundaram (2015) Cryptography and steganography–a survey. Int J Comput Appl 2:626–630
Karim S, Rahman MS (2011) A new approach for LSB based image steganography using secret key. In: Proceedings of 14th International conference on computer and information Technology, pp 286–291
Kawaguchi E, Eason RO (1998) Principles and Applications of BPCS Steganography. Proceedings of SPIE: Multimedia Systems and Applications, Boston, 22 January 1999, 3528:464–473. https://doi.org/10.1117/12.337436
Khalil MI (2017) Medical image steganography: Study of medical image quality degradation when embedding data in the frequency domain. Int J Comput Netw Inform Secur 9(2):22
Kumar P, Lee H-J (2012) Security issues in healthcare applications using wireless medical sensor networks: a survey. IEEE 12(1):55–91
Laskarand SA, Chandran KH (2012) High capacity data hiding using LSB steganography and encryption. International Journal of Database Management Systems (IJDMS) 4(6):57
Li L, Hossain MS, El-Latif AAA, Alhamid MF (2017) Distortion less secret image sharing scheme for Internet of Things system. In: Cluster Computing NewYork, NY, USA :Springer, 2017, pp 1–15. https://doi.org/10.1007/s10586-017-1345-y
Mandal AK, Parakash C, Tiwari A (2012) Performance evaluation of cryptographic algorithms: DES and AES. In: Proc. IEEE Students’ Conference Electronics, Electron. Computer Science (SCEECS), pp 1–5
Mare SF, Vladutiu M, Prodan L (2011) Secret data communication system using steganography, AES and RSA. In: Proc. IEEE 17th International Symbiosis Design Technology Electron Package (SIITME), pp 339–344
Marwaha P (2010) Visual cryptographic steganography in images. In: Proceedings of second international conference on computing, Communication and Networking Technologies, pp 1–6
Mathe R, Atukuri V, Devireddy SK (2012) Securing information: cryptography and steganography. Int J Comput Sci Inform Technol 3:4251–4255
McEvoy FJ, Svalastoga E (2009) Security of patient and study data associated with DICOM images when transferred using compact disc media. J Digit Image 22(1):65–70
Mjolsnes SF (ed) (2011) A multidisciplinary introduction to information security. CRC Press, Boca Raton
Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A secure method for color image steganography using gray-level modification and multi-level encryption. TIIS 9(5):1938–1962
Nivedhitha R, Meyyappan DT, Phil M (2012) Image security using steganography and cryptographic techniques. Int J Eng Trends Technol 3:366–337
Parah SA, Sheikh JA, Ahad F, Bhat GM (2018) High capacity and secure electronic patient record (EPR) embedding in color images for IoT driven healthcare systems. Internet of Things and Big Data Analytics Toward Next-Generation Intelligence. Cham, Switzerland: Springer, pp 409–437
Paschou M, Sakkopoulos E, Sourla E, Tsakalidis A (2013) Health Internet of Things: Metrics and methods for efficient data transfer. Simul Model Pract Theory 34:186–199
Priya S, Santhi B (2019) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mob Netw Appl. https://doi.org/10.1007/s11036-019-01213-x
Rabbani H, Allingham MJ, Mettu PS, Cousins SW, Farsiu S (2015) Fully automatic segmentation of fluorescein leakage in subjects with diabetic macularedema. Investig Ophthalmol Vis Sci 56(3):1482–1492
Razzaq MA, Shaikh RA, Baig MA, Memon AA (2017) Digital image security: fusion of encryption, steganography and watermarking. Int J Adv Comput Sci Appl 8(5):224–228
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Sajasi S, Moghadam A-ME (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl Soft Comput Js. https://doi.org/10.1016/j.asoc.2015.01.032
Sajjad M, Muhammad K, Baik SW, Rho S, Jan Z, Yeo SS, Mehmood I (2017) Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimedia Tools Appl 76(3):3519–3536
Seyyedi SA, Sadau V, Ivanov N (2016) A secure steganography method based on integer lifting wavelet transform. Int J Netw Secur 18(1):124–132
Shehab et al (2018) Secure and robust fragile watermarking scheme for medical images. In: IEEE Access, vol 6 pp 10269–10278. https://doi.org/10.1109/ACCESS.2018.2799240
Shingote PN, Syed A, Bhujbal PM (2014) Advanced security using cryptography and LSB matching steganography. Int J Comput Electron Res 3:52–55
Silva EA, Panetta K, Agaian SS (2007) Quantifying image similarity using measure of enhancement by entropy. In: Proc. SPIE, Mobile Multimedia/Image Process Military Security Application, vol 6579, pp 65790U-1– 65790U-12
Sreekutty MS, Baiju PS (2017) Security enhancement in image steganography for medical integrity verification system. In: Proc. International Conference Circuit, Power Computer Technology (ICCPCT), pp 1–5
Tayal N, Dhall S, Gupta S (2016) A robust hybrid steganography mechanism for security in data communication networks. International Journal of Computer Networks and Applications (IJCNA) 3(3) ISSN: 2395–0455
Varnan S, Jagan A, Kaur J, Jyoti D, Rao DS (2011) Image quality assessment techniques in spatial domain. Int J Comput Sci Technol 2(3):177–184
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Wu Y, Noonan JP (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications 2:31–38
Wu Y, Agaian S (2011) NPCR and UACI randomness tests for image encryption.
Yehia L, Khedr A, Darwish A (2015) Hybrid security techniques for Internet of things healthcare applications. Advances in Internet of Things 5:21–25
Yin JHJ, Fen GM, Mughal F, Iran Manesh V (2015) Internet of Things: Securing data using image steganography. In: Proc. 3rd International Conference Artificial Intelligence, Modelling Simulation (AIMS), pp 310–314
Yu L, Wang Z, Wang W (2012) The application of hybrid encryption algorithm in software security. In: Proc. 4th International Conference Computer Intelligence Communication Network (CICN), pp 762–765
Zaw ZM, Phyo SW (2015) Security enhancement system based on the integration of cryptography and steganography. Int J Comput 19(1):26–39
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s11042-024-20148-4
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Panwar, P., Dhall, S. & Gupta, S. RETRACTED ARTICLE: A multilevel secure information communication model for healthcare systems. Multimed Tools Appl 80, 8039–8062 (2021). https://doi.org/10.1007/s11042-020-10083-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10083-5