1 Introduction

Today, the Internet has turned out to be one of the significant part of our daily life. The telemedicine framework is considered as connecting objects to the Internet and utilizing that association for remote checking. The telemedicine industry is renewing the conventional healthcare system by improving efficiency, bringing down expenses, and set the consideration back on better patient care. Telemedicine has offered to ascend to E- healthcare and its focus is on improving the healthcare framework. In the current scenario, a standout amongst the most significant issue is the exchange of Electronic Patient Information (EPI) between patient and a doctor that are remotely connected. A minute change to EPI may result in a wrong diagnosis for the patient. In this way, a protected and effective transmission of such information is required in the telemedicine framework. Even though Internet security protocol (IPsec), is a well-utilized for giving security to exchanged information, yet it has been provided to have lesser throughput. So that, utilization of such an algorithm for resource-constrained telemedicine framework would not yield better outcomes. In such type of scenario, researchers have been looking out for alternative approaches to secure the EPI in a progressively effective manner. Data hiding is the most robust tool that can address the security, authentication and copyright protection of the patient data issues. Various data hiding techniques are applied to protect data integrity and through these techniques, one can ensure data reliability. Sometimes, during the data hiding process, receiver is not able to reconstructed cover image successfully while in few applications, for example, medical, military, and law crime scene investigation, loss of cover image is not permitted. In these cases, an extraordinary sort of data hiding strategy called reversible or lossless data hiding is utilized. Reversible data hiding meant to embed the secret message in cover image in such a way that at receiver end, secret message as well as original cover image is recovered successfully. Encryption is the most promising solution to maintain confidentiality and privacy of data. The integration of encryption and RDH technologies plays an important role in privacy protection of data.

2 Literature review

There is a lot of research done in reversible data hiding domain; some are illustrated as follows—Firstly, the idea of hiding information from attackers was presented by Shi [22]. Afterward, difference expansion based reversible data hiding technique was proposed by Tian [25], where a single bit was embedded between two close-by pixels through difference computation. Ni et al. [16] had given a scheme where a secret message is embedded at the histogram’s peak point of cover image. Afterward, Bo et al. [27] had given a method where cover image is segmented into equal-sized blocks and each block’s histogram embedded secret message in it. M. Celik et al. [5] depicted a steganographic methodology for compressed cover image pixels. Qian et al. [21] exhibited a separable reversible data hiding algorithm where cover image is encrypted through block cipher algorithm. In this paper [29], firstly segmented cover image into equal-sized blocks, and after that, each block is further subdivided into two sub-blocks where one bit of secret message is embedded in it. The secret message is extracted through the computation of fluctuation function corresponding to each block. But during the computation of fluctuation function, boundary pixels are to be excluded which results in high bit error rate value. Wu and Sun [26] exhibited a method where blocks are further segmented into two sub-blocks. Embeddable pixel’s neighbors are not selected for data embedding which results in high peak-signal-to-noise-ratio(PSNR) value and low bit error rate respectively. Hong et al. [8] included boundary pixels during computation of fluctuation function which results in the same PSNR value and low bit error rate value as compare to Zhang [29]. In this paper [9] segmented cover image into equal-sized blocks and after that, each block is further subdivided into two sub-blocks where one bit of secret message is embedded in it using the concept of lattice. Embeddable pixel’s four-connectivity neighbors are not selected for data embedding which results in high PSNR value and low bit error rate value. Ma et al. [14] proposed a reversible data hiding method before encryption of cover image. Liao and Changwen [11] improved computation of fluctuation function through calculating mean difference of neighboring pixels. Paillier cryptosystem [17] cryptosystem is utilized for encryption of cover image in Chen et al. [6] where one bit of secret message is embedded per pixel pair. Tai and Chang [24] proposed a separable reversible data hiding algorithm where embedding space is reserved before encryption of cover image. Puech et al. [20] proposed a method of the local standard deviation of the encrypted image for the extraction of hidden data during decryption phase. Bhardwaj and Aggarwal [4] introduced a reversible data hiding algorithm in encrypted domain where n secret bits are embedded per block by segmenting them into n sub-blocks. The drawback of this method is that for small block size, secret message is not extracted correctly which result in a high bit error rate. Lu et al. [12] had given a method where dual stego images are generated by folded secret message centrally. Yao et al. [28] described a dual-image method based on pixel co-ordinate system which results in minimum distortion of pixel’s coordinate value. Lee and Huang [10] presented a method where dual stego images are generated through orientation combination of pixel coordinates. Here, binary secret message by changed over it into base5 numeral framework is embedded which results in improved embedding rate. Chi et al. [7] presented a dynamic encoding scheme where frequent occurrence of secret digits is encoded as the minimum absolute digit. The favored stance denotes that for the same embedding rate, the proposed method gave a higher PSNR than existing methods. Lu et al. [13] proposed a frequency encoding method to eliminate the disadvantage of Lu et al. [12] strategy.

Shiu et al. [23] employed a reversible scheme for preservation of patient information in ECG signals through error correcting-coding method where (nm) bits of secret message are embedded into n number of signals with the help of (n, m) hamming code successfully. Parah et al. [18] presented a reversible data hiding scheme for embedding patient information in medical images where cover image is interpolated through Pixel to Block (PTB) conversion method to guarantee reversibility of medical images. A high capacity reversible data hiding method which is capable of tamper detection of patient information at receiver end has been presented in this paper [19]. Bhalero et al. [3] embedded patient data in ECG signals using a prediction error expansion scheme where prediction of the sample values is performed through deep neural network respectively. Mansour et al. [15] proposed a highly robust reversible data hiding method in encrypted domain where patient data is hidden in medical images with the help of Discrete Ripplet Transformation technique successfully. The most significant commitment of proposed work is to employ adaptive genetic algorithm for optimal pixel adjustment process that enhances embedding capacity as well as imperceptibility features also. Abdullla et al. [2] proposed a dual phase efficient steganography method to enhance stego image visual quality and undetectability of secret message . During first phase, secret message is losslessly compressed to reduce the number of embedding bits and in second phase reduced size secret message is embedded in the cover image through Fibonacci-based mapping scheme respectively. The advantage of this method is to improve the visual quality of stego image by embedding the compressed secret message in the cover image through Fibonacci-based mapping scheme.

A detailed review of the stated work [4, 8, 9, 11, 29] reveals that reporting schemes have low embedding capacity and they does not even support content authentication of patient data also. The motivation of this work is to present a separable reversible data hiding algorithm which is capable of content authentication for E-healthcare applications. This paper presents an enhanced dual-image separable reversible data hiding algorithm in encrypted domain to embed electronic patient information by changed over it into base5 numeral framework respectively. In addition to embedding EPI, it also adds a fragile watermark for authentication of EPI at receiver end. Any type of attack during transmission process, results in non-recovery of embedded watermark at receiver end that conveys that the EPI has been transformed during transmission process. The key features of the proposed algorithm are summarized as follows:

  • Least pixel repetition (LPR) method is used for interpolation instead of conventional ones to avoid underflow and overflow problem during data embedding in scaled-up image.

  • Pixel geometry is used instead of conventional data hiding techniques for embedding of EPI in base5 numeral framework to improve the embedding capacity.

  • Fragile watermark is used for content authentication at the receiver end.

The remaining paper is organized as follows. Section 3 described proposed algorithm in detail. Further, discussions are conducted in Section 4 for comparison of embedding performance and reversibility nature of proposed algorithm with the compared algorithms. At last, Section 5 concluded the paper.

3 Proposed algorithm

Nowadays, patient data privacy and security is one of the most significant challenge for telemedicine applications. Consider a scenario where patient’s data is sent to doctor/surgeon; the hacker may observe the healthcare information. Later, an attacker may float this information on social sites and this action may put tremendous threats to the patient’s confidentiality. The appropriate encryption and authentication schemes can be useful to prevent these types of attacks. The proposed method demonstrated a block-based dual-image separable reversible data hiding algorithm to embed electronic patient information by changed over it into base5 numeral framework which is based on pixel geometry (Fig. 1). Firstly, cover image of size M × N is scaled-up to a \((M+\frac {M}{2}) \times (N+\frac {N}{2})\) image by using the method of Least Pixel Repetition (LPR) which is based on simple arithmetic and is discussed in detail in Section 3.1.

Fig. 1
figure 1

Proposed algorithm

Data embedding algorithm is discussed in detail in Section 3.2 while as data extraction and Image recovery algorithm is discussed in detail in Section 3.3.

3.1 Least Pixel Repetition (LPR)

To facilitate reversibility and carry out data embedding based on pixel geometry, the original image is subjected to LPR method. The two main key points that need to be kept in mind while carrying out LPR process are given as follows:

  • Least pixel value is minimal pixel value from 2 × 2 block.

  • Average of scaled-up block is very close to original block’s average.

  • pixels of block are segmented into two types—seed pixels (corner pixels) and non-seed pixels (non corner pixels) whereas non-seed pixels should have different values.

figure a
Fig. 2
figure 2

Pixel geometry

It is apparent from Fig. 3 that seed pixels are original cover image pixels and these are not used for data embedding purpose. Figures 45 and 6 demonstrates the visual quality of various original and corresponding scaled-up images. Figure 6 demonstrated the iterations of 4-connectivity respectively.

Fig. 3
figure 3

Least pixel repetition method

Fig. 4
figure 4

Original test images

Fig. 5
figure 5

Scaled-up test images

figure b

3.2 Data embedding phase

Before data embedding, proposed algorithm changes over binary secret message into a succession of digits in base5 numeral framework. For dual base5 numeral framework, maximum value is 4 × 51 + 4 × 50 = (24)10. Assumed, a secret message Si is changed over into a binary sequence BS, which is traversed from left to right as follows:-

  • If (bsn+ 1)10 ∈ [16,17....23,24] then bsi = bsn+ 1 bits, otherwise bsi = bsn bits where n = 4 bits and bsn or bsn+ 1 is the succession of n or n + 1 bits from the binary sequence BS.

  • Now convert binary secret message bsi into two continuous digits w1w2 of base5 numeral framework which are embedded into non-seed center pixel Sx, y or \(S^{\prime }_{x,y}\) of encrypted dual stego images as per pixel geometry respectively.

Fig. 6
figure 6

Iterations of 4-connectivity into clock wise direction

3.3 Data extraction and image recovery phase

During this phase, a decryption key and a data hiding key is required according to different cases. As presented in Fig. 1, three cases are to be considered at receiver side. In proposed algorithm, receiver with only the data hiding key can extract the secret message without having any knowledge of cover image. If the receiver has only decryption key, it can recoup original cover image without extraction of secret message. When the receiver has both the data hiding key and the decryption key, it is conceivable to extract the secret message and recuperate original cover image without any error. First of all, dual stego images are divided into a block size of 3 × 3. The process of extraction of secret message in base5 numeral framework and recovery of the original cover image is shown in Algorithm 3.

figure c
Table 1 Pixel geometry based data embedding

Example: The execution of proposed algorithm on sample block value is shown in Table 2.

Table 2 Example

4 Result and discussion

Here, we examine the performance of the proposed method which is evaluated using metrics like Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Embedding Capacity (bits) and Bit Error Rate (BER) respectively. PSNR is used to evaluate the quality of stego images while BER is used to evaluate the error between embedded and extracted watermark (Abdulla et al. [1]). The experimental study is performed on test images of size 512 × 512 as shown in Fig. 7 respectively.

Fig. 7
figure 7

Test images

Let f(x, y) and \(\hat {f}(x, y)\) denote the value of pixel (x, y) in the cover and stego image of size \((M+\frac {M}{2}) \times (N+\frac {N}{2})\) and sm and \(sm^{\prime }\) is embedded and extracted watermark, where A × B is the size of the watermark. These metrics are defined as follows -

$$ PSNR=10 log_{10} \frac{255^{2}}{MSE} $$
(8)

where

$$ MSE=\frac{1}{(M+\frac{M}{2})\times (N+\frac{N}{2})}\sum\limits_{x=1}^{(M+\frac{M}{2})}\sum\limits_{y=1}^{(N+\frac{N}{2})}(f(x,y)-\hat{f}(x,y))^{2} $$
$$ BER = \frac{{\sum}_{i=1}^{A}{\sum}_{j=1}^{B}{(sm(i,j) \oplus sm^{\prime}(i,j) )}\times 100}{Count\_of\_embedded\_bits} $$
(9)

4.1 Imperceptibility analysis

Here, we examine the performance of the proposed scheme and compare it with the existing state-of-the-art algorithms of Zhang [29], Hong et al. [8], Young-Sik et al. [9], Liao et al. [11] and Bhardwaj et al. [4] respectively. Table 3 demonstrates the examination of the proposed algorithm with all other compared algorithms regarding embedding capacity, bit error rate, and the PSNR value attained on random test images, exhibited in Fig. 7 respectively. Proposed algorithm embedded binary secret message by changed over it into base5 numeral framework to produce dual stego images simultaneously. Embedding capacity and PSNR value are reciprocal to each other, with the increase in embedding capacity there is an inherent loss of PSNR value respectively. Even then, the PSNR values obtained by the proposed approach are superior to those obtained by compared methods. It is noted from Fig. 8 that even at high payloads, the proposed method gave high-quality stego image while compared schemes did not because their decreased embedding rates can’t work at high payloads. It is visible from Fig. 9 that for the proposed algorithm with block_size = 3 × 3, maximum embedding capacity is 327,680 bits, bit error rate is zero and PSNR is 54.10 dB(approx.) for all test images which is far better than other compared algorithms. Indeed, even as far as PSNR values, the visual quality of the stego image produced by the proposed method is at par with all the compared methods. The proposed scheme has not been suffering from underflow and overflow problem so that empowering it to embed and recover information precisely from low-intensity pixels too. This property makes our proposed methodology truly reasonable for its utilization on medical images. In this manner it very well may be inferred that, on all types of test images, the proposed methodology altogether beaten all the compared methodologies in its ability to embed secret information and precisely recover it by maintaining the visual nature of stego images too.

Table 3 Comparative study of proposed method
Fig. 8
figure 8figure 8

PSNR value comparison against different payload on test images

Fig. 9
figure 9

Comparative study of proposed method

4.2 Security and robustness analysis

To evaluate the performance of proposed scheme for its hidden message authentication, we subject stego image to popular image processing attacks. It is appropriate to mention here that the proposed algorithm is fragile in nature as a secret message is embedded in spatial domain. The authentication analysis is aimed to calculate the degree of degradation in secret message due to a predefined attack which has been evaluated in terms of Bit error rate respectively. We had given example of some popular image processing attacks on Med4(512 × 512) cover image with binary Cameraman (128 × 128) data embedding (Fig. 10). From the outcomes for different attacks, referenced in Fig. 10, it is clear that the proposed strategy is highly fragile to all the attacks except histogram equalization attack carried on different stego images. Bit error rate value is around 0-52% which concluded that recovered secret message in most of the cases is not recognizable, hence indicated that stego image has been attacked during transmission. High Bit Error Rates for test images, approve the way that the proposed scheme is profoundly fragile, irrespective of the type of cover image.

Fig. 10
figure 10

Image quality under different type of attacks

4.3 Reversibility analysis

At the receiver end, after extraction of the secret message, cover image is also reconstructed through stego image successfully. Table 4 shows reversibility analysis of the proposed method which consists of the original cover image, corresponding recovered image, difference image, and PSNR value between the original and reconstructed cover image in dB. From the outcomes which are referenced in Table 4, it is obvious that the difference image is perfectly black with each pixel intensity equivalent to zero and corresponding PSNR value is \(\infty \) dB thus demonstrative that the proposed scheme is purely reversible in nature. Similarly, all pixel values of the cover image are retrieved and finally, the extraction of secret message and reconstruction of the original cover image is not done successfully at the receiver end. So, it is to be concluded that stego image has been attacked during the transmission process.

Table 4 Reversibility analysis

5 Conclusion

To ensure secure and safe communications for telemedicine applications, an enhanced separable reversible data hiding scheme in encrypted domain has been presented in this paper where binary secret message by changed over it into base5 numeral framework is embedded according to pixel geometry to produce dual stego images respectively. The secret message is extracted through the access of dual stego-images simultaneously. The proposed technique has not been suffering from underflow and overflow problem so that empowering it to embed and recover patient information precisely from low-intensity pixels too. Since the proposed algorithm has been carried out in spatial domain so that embedded electronic patient information (EPI) is not robust to various image processing attacks. In future, we need to improve the robustness of the proposed method.