1 Introduction

Today, the Internet has turned out to be one of the significant part of our daily life. The E-healthcare framework is considered as connecting entities to the Internet and utilizing that association for remote checking of patient health. In current scenario, a standout among the most significant issue is the exchange of Electronic Patient Information (EPI) between patient and a doctor that are remotely connected. A minute change to EPI may result in wrong diagnosis to the patient. In this way, a protected and effective transmission of such information is required in E-healthcare framework.

To ensure safe and secure transfer of patient report to a specialist, patient information is to be embedded in medical report through a data hiding method. But sometimes, at recipient end, doctor is not able to reconstruct the patient report while for a proper diagnosis, loss of information in patient report is not permitted. In such type of scenario, reversible data hiding is employed for embedding EPI in patient report respectively. Reversible data hiding is meant to embed the secret message in cover image in such a way that at receiver end, secret message as well as original cover image is recovered successfully. Encryption is the most promising solution to maintain confidentiality and privacy of data. The integration of encryption and reversible data hiding technologies plays an important role in privacy protection. As a result, reversible data hiding (RDH) in encrypted image (RDH-EI) has attracted a great attention from the research community.

2 Literature review

There is a lot of research done in reversible data hiding domain; some are illustrated as follows- In the beginning, a reversible data hiding method was introduced by Shi [20]. Subsequently, difference expansion based reversible data hiding method was introduced by Tian [22], where a bit of secret message is hidden between a pair of pixels through difference computation. Histogram based reversible data hiding method is presented by Ni et al. [14] where secret message bits are embedded at peak of histogram of cover image respectively.

Reversible data hiding schemes in encrypted domain has attained an enormous consideration from the research community because secret message is embedded into cover image by data hider without knowing the original content of cover image and at recipient end, secret message and original cover image is recovered effectively. Zhang [26], segregated cover image into equivalent sized blocks and subsequently, every block is additionally partitioned into two sub-parts whereas a single bit of secret message is hidden in a block. Secret message is retrieved through fluctuation function computation relating to each block respectively. Yet, during computation of fluctuation value, edged pixels of cover image are to be barred which bring about a large amount of dissimilarity occurred between embedded and extracted secret message for small block sizes respectively. Disadvantage of Zhang [26] is eliminated by Hong et al. [6] through incorporation of edged pixels during fluctuation function computation. This brings about same peak-signal-to-noise-ratio(PSNR) worth and low bit error rate an incentive as contrast with Zhang [26] for small block sizes. Young-sik et al. [10] segregated cover image into equivalent sized blocks and subsequently, every block is additionally partitioned into two sub-parts where a a single bit of secret message is hidden in it utilizing idea of lattice. Using four-path connectivity, embeddable pixel’s neighbors are not chosen for data hiding which brings about high PSNR worth and low bit error rate esteem. Ma et al. [12] proposed a reversible data hiding method where embedding space is reserved before encryption of original image. In the beginning, Chen et al. [4], encrypted cover image though Paillier cryptosystem [15], subsequently one bit of secret message is hidden per pixel pair respectively. Bhardwaj and Aggarwal [2] presented a reversible data hiding method where n bits of secret message are hidden per block by again partitioning them into n sub-blocks. Downside of this strategy is that for small sized blocks, secret message is not retrieved accurately which bring about a large amount of dissimilarity occurred between embedded and extracted secret message respectively. Lu et al. [23] proposed a dual reversible data hiding method where secret message is folded centrally. Subsequently, reduced secret message is embedded in cover image and produced dual stego images. Yao et al. [25] presented a dual reversible data hiding method dependent on pixel co-ordinate framework which bring about least contortion of pixel’s co-ordinate esteem. Lee and Huang [11] presented a dual reversible data hiding method where secret message in \(base_{5}\) numeral system is embedded with the help of orientation combination of pixel co-ordinates respectively. Chi et al. [5] introduced a powerful encoding method where repeatedly occurrence of secret message digits is encoded as the small absolute digit. The supported position signifies that for same embedding rate, proposed technique gave a higher PSNR than Lu et al. [23] method. Lu et al. [24] proposed a frequency encoding technique to wipe out the weakness of Lu et al. [23] method.

Rosiyadi et al. [18] proposed an efficient copyright protection scheme for e-government document images which combines the discrete cosine transform (DCT) and singular value decomposition (SVD) using a control parameter to avoid the false-positive problem. Horng et al. [8]r proposed an adaptive watermarking scheme for e-government document images. The adaptive scheme combined the discrete cosine transform (DCT) and the singular value decomposition (SVD) using luminance masking. As a core of masking model in the human visual system (HVS), luminance masking is implemented to improve noise sensitivity. Horng et al. [7] proposed an efficient blind copyright protection for e-government document images through a combination of the discrete cosine transform (DCT) and the singular value decomposition (SVD) based on genetic algorithm (GA). This combination could lead the watermarked image to be resistant to various attacks as well as to improve its performance, security and robustness. Rosiyadi et al. [19] presented a secret sharing based watermarking scheme using the Fractional Fourier Transform (FrFT) and Singular Value Decomposition (SVD). This method embeds the singular value matrix into the FrFT transformed sub-bands. The FrFT transformed sub-bands are computed from the Samir Secret Sharing (SSS) scheme. Shiu et al. [21] method used error correcting-coding technique where (nm) hamming code is needed to embed \((n-m)\) bits of patient data into n number of ECG signals respectively. Parah et al. [16] presented a reversible data hiding scheme for embedding patient information in medical images where cover image is interpolated through Pixel to Block (PTB) conversion method to guarantee reversibility of medical images. A high capacity reversible data hiding method which is capable of tamper detection of patient information at receiver end has been presented in this paper [17]. Bhalero et al. [1] used Deep neural network for predicting the sample values of ECG signal. Afterwards, patient data is embedded in ECG signals through prediction error expansion technique successfully. Mansour et al. [13] presented a robust reversible data hiding method in frequency domain where Discrete Ripplet Transformation method is used for embedding patient data in medical images effectively. The most important contribution of proposed work is to enhance embedding capacity as well as imperceptibility features through utilization of adaptive genetic algorithm for optimal pixel adjustment process effectively. Bhardwaj [3] presented an enhanced reversible data hiding method in the encrypted domain that gives a higher embedding rate by embedding \(k, (k\ge 1)\) binary bits of a secret message at every pixel of a cover image without any occurrence of underflow and overflow problem. Table 1 presented imperceptibility analysis of some state-of-art methods respectively.

Table 1 Study of some state-of-art methods in terms of imperceptibility and payload

A detailed review of the stated work [3, 5, 11, 23,24,25] reveals that reporting methods have low embedding capacity and they does not even support content authentication of patient data also. The motivation of this work is to present a reversible and high capacity data hiding algorithm which is capable of content authentication for E-healthcare applications.

The key features of the proposed algorithm are summarized as follows:-

  • Development of a high capacity dual image reversible data hiding scheme in the encrypted domain.

  • \(\lfloor \log _{2}(2 \times n+1) \times NZ -1 \rfloor\) binary bits of EPI is embedded in \(base_{10}\) numeral framework to improve the embedding capacity.

  • A fragile watermark is used for content authentication at the receiver end.

The rest of the paper is structured as follows- Proposed algorithm is described in Section3. Experimental study is described briefly in Section 4 and at last Section 5 concluded the paper.

3 Proposed algorithm

One of the vital concern to be addressed for the implementation of E-healthcare framework is security, authentication and copyright protection of the patient data respectively. Encryption is the most promising solution to maintain confidentiality and privacy of data. The integration of encryption and reversible data hiding technologies plays an important role in privacy protection. Dual-image reversible data hiding method can be functional in situations where embedding capacity and visual quality of stego images matter. From a security viewpoint, attackers cannot extract secret message without access to the dual images concurrently. Keeping this in view, an enhanced dual image reversible data hiding algorithm in the encrypted domain to embed electronic patient information(EPI) in cover image has been represented in this paper. Workflow diagram of proposed method has been shown in Fig. 1 respectively.

Cover image and secret message are encrypted through Paillier cryptosystem which is described briefly in subsection 3.1. Subsection 3.2 presented data embedding algorithm while subsection 3.3 presented data extraction and image recovery algorithm respectively.

Fig. 1
figure 1

Workflow of proposed algorithm

3.1 Paillier Cryptosystem

This is public key cryptosystem based on the composite residuosity class problem. It comprised three procedures: key generation, data encryption and data decryption as described as follows-

  • Let p and q be two large prime numbers that are independent of each other.

  • Compute \(N=pq\) and \(\lambda =LCM(p-1,q-1)\)

  • Select generator g such that \(g \in Z_{N^2}^{*}\) and \(gcd(S(g^{\lambda } mod\;N^{2}),N)=1\) where

    $$\begin{aligned} S(x)=\frac{x-1}{N} \end{aligned}$$
    (1)
  • Consider a message \(m \in Z_N^*\) and randomly chosen \(r\in Z_N^*\). Compute the cipher text of m as

    $$\begin{aligned} c=g^m r^N mod\;N^2 \end{aligned}$$
    (2)
  • Public key is composed of (Ng) and private key is composed of \((p,q,\lambda )\).

  • Decryption of ciphertext c is given by

    $$\begin{aligned} m=\frac{S(c^\lambda mod\;N^2)}{S(g^\lambda mod\;N^2) } mod\;N \end{aligned}$$
    (3)
  • Given two plaintexts \(m_1\) and \(m_2\), corresponding ciphertexts are given by \(Enc [m_1]\) and \(Encr[m_2]\). The additive homomorphic property, \(Encr[m_1]\times Encr[m_2] =Encr[m_1+m_2]\) holds because of

    $$\begin{aligned} {\begin{matrix} Encr[m_1]\times Encr[m_2]= (g^{{m_1}} r_1^N mod\;N^2) (g^{{m_2 }} r_2^N mod\;N^2) = \\ (g^{m_1+m_2 } (r_1 r_2 )^N mod\;N^2) = Encr[m_1+ m_2] \end{matrix}} \end{aligned}$$
    (4)

    The multiplicative homomorphic property,

    $$\begin{aligned} {\begin{matrix} Encr[m_1]^x = (g^{m_1} r_1^N mod\;N^2)^x=(g^{m_1 } r_1^N)^x mod\;N^2= \\ (g^{xm_1 } ) (r_1^{x^N }) mod\;N^2= Encr[xm_1] \end{matrix}} \end{aligned}$$
    (5)

3.2 Data embedding phase

Firstly, cover image (CI) of size \(M \times N\) was set to \(CI^1\) = [\(P^1_{1,1},P^1_{1,2},.....,P^1_{M,N}\)] and \(CI^2\) = [\(P^2_{1,1},P^2_{1,2},.....,P^2_{M,N}\)], where M and N are the image height and width, respectively. Pixels of \(CI^1\) and \(CI^2\) are segmented into two types - seed pixels [(\(NZ^{*}\)...255),(2n...255)] and the remaining pixels are called non-seed pixels. Now, embedded \(\lfloor \log _{2}(2 \times n+1) \times NZ -1 \rfloor\) binary bits of secret message by changed over it into \(base_{10}\) numeral framework at seed pixels of \(CI^2\) and corresponding zone values are embedded at seed pixels of \(CI^1\) respectively. Data embedding algorithm is discussed below as-

figure a

3.3 Data extraction and image recovery phase

The process of extraction of secret message in \(base_{2}\) numeral framework and recovery of original cover image is shown in the following algorithm-

figure b

Example: Execution of proposed algorithm for (\(n=1\)) and (\(NZ=3\)) on cover image(CI) is shown in Table 2 where cover image(CI) is \(\begin{bmatrix}112&153\\167&255\end{bmatrix}\) respectively.

Table 2 Working of proposed method
Fig. 2
figure 2

Test images

Fig. 3
figure 3

Watermark

4 Results and discussion

This section presented experimental study of proposed method carried out using MATLAB R2017a platform on different \({512 \times 512}\) test images obtained from open-source image database (USC-SIPI) whereas medical images obtained from the database of The Cancer Imaging Archive (TCIA) as shown in Fig. 2 respectively. The performance of the proposed method has been evaluated in terms of metrics like Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Structural Similarity Index Matrix (SSIM), Normalized Absolute Error (NAE), Normalized Cross-correlation (NCC) and Embedding Rate (bpp) respectively. These metrics are defined as follows -

$$\begin{aligned} PSNR=10 log_{10} \frac{255^2}{MSE} \end{aligned}$$
(6)

where

$$\begin{aligned} MSE=\frac{1}{M\times N}\sum _{x=1}^{M}\sum _{y=1}^{N}(f(x,y)-\bar{f}(x,y))^2 \end{aligned}$$
(7)
$$\begin{aligned} SSIM(x,y)=\frac{(2\mu _x\mu _y+c_1)(2\sigma _{xy}+c_2)}{(\mu _x^2+\mu _y^2+c_1)(\sigma _x^2+\sigma _y^2+c2)} \end{aligned}$$
(8)

where \(\mu _x\) is average of x, \(\mu _y\) is average of y, \(\sigma _x^2\) is variance of x, \(\sigma _y^2\) is variance of y, \(\sigma _{xy}\) is covariance of x and y, \(c_1=(k_1L)^2, c_2=(k2L)^2, L=(2^8-1), k_1=0.01\) and \(k_2=0.03\) respectively.

$$\begin{aligned} NAE=\frac{\sum _{x=1}^{M}\sum _{y=1}^{N}|f(x,y)-\hat{f}(x,y)|}{\sum _{x=1}^{M}\sum _{y=1}^{N}f(x,y)} \end{aligned}$$
(9)
$$\begin{aligned} NCC=\frac{\sum _{x=1}^{M}\sum _{y=1}^{N}f(x,y)\hat{f}(x,y)}{\sqrt{\sum _{x=1}^{M}\sum _{y=1}^{N}f(x,y)^2\sum _{x=1}^{M}\sum _{y=1}^{N}\hat{f}(x,y)^2}} \end{aligned}$$
(10)

The embedding rate indicated by R is described as pure payload of cover image \((CI^2)\) of size \(M \times N\) respectively. It is defined as pursues:-

$$\begin{aligned} R=\frac{Pure\_payload}{2 \times M \times N} \end{aligned}$$
(11)

where pure payload is the total number of binary bits of secret message which are embedded in cover image \((CI^2)\) respectively.

4.1 Result analysis

In this section, performance of the proposed method is evaluated and compared it with some existing state-of-the-art methods of Lu et al. \((k=3)\)[23], Yao et al. \((k=3)\)[25], Lee & Huang [11], Chi et al. \((k=3)\)[5], Lu et al. \((k=3)\)[24] and Bhardwaj [3] respectively. Table 3 exhibits the assessment of the proposed method with all other compared methods with reference to maximum embedding capacity (bits), maximum embedding rate (bpp) and visual quality of stego images observed on test images (Fig. 2) respectively. It tends to be observed from Table 3 that maximum average embedding rate (2.36 bpp) is obtained by proposed method with an average visual quality of stego images (\(\infty\) dB) respectively. The maximum embedding rate of proposed method is higher than other compared methods with maintaining a good visual quality of the stego images too. Hence, embedding rate achieved by the proposed method is at standard with all the looked at methods. Fig. 4 presents the comparative study of visual quality of stego images vs embedding rate achieved by the proposed and compared methods on different payload values respectively. It is observed from Fig. 4 that even at high payload value, the proposed method gave good visual quality of stego image while looked at strategies didn’t on the grounds that their decreased embedding rates can’t work at high payloads. Fig. 5 presents the comparison in maximum embedding rate and average embedding rate attained by the proposed and compared strategies respectively. It is noted from Fig. 5 that proposed method gave a high embedding rate while compared schemes did not because their decreased embedding rates can’t work at high payloads. The superior performance of the proposed method on all test images is credited to its capacity to deal with the high-intensity pixels, which could cause the overflow issue during process of data embedding respectively. In the looked at strategies, they disregard these high-intensity pixels, or continuously end mark them as non-embeddable cases.

Table 4 demonstrates the examination of the proposed algorithm\((n=5, NZ=8)\) with state-of-the-art algorithms Lu et al. \((k=3\))[23], Yao et al. \((k=3\))[25], Lee & Huang [11], Chi et al. \((k=3\))[5] and Lu et al. \((k=3\))[24] with reference to image quality metrics like with reference to Structural Similarity Index Matrix (SSIM), Normalized Absolute error (NAE), Normalized Cross-correlation (NCC) and Embedding Rate attained on medical images respectively. It is evident from the average values of quality metrics, high SSIM value combined with low NAE value and NCC value of approximate unity indicate that proposed method is able to provide a high visual quality of stego image for an embedding rate of 2.30 bpp respectively. Proposed method provides a high embedding capacity in encrypted domain with content authentication at recipient end while all other compared methods didn’t as observed from Table 4 respectively. Hence, it is concluded that, for all kind of test images, a high embedding capacity is achieved by the proposed method with maintaining the visual nature of stego images as well.

Table 3 Comparative study of proposed method
Fig. 4
figure 4

Experimental study of proposed method

Fig. 5
figure 5

Comparative study of proposed method

Table 4 Comparative study of proposed method in terms of imperceptibility, payload and authenticity

4.2 Authentication analysis

To assess the performance of the proposed algorithm for its secret message validation, some well known image processing attacks are executed on dual stego images respectively. For secret message validation at the recipient end, a watermark (Fig. 3) of size \(256 \times 256\) is hidden within the cover image. At the beneficiary end, extracted watermark is matched with original watermark, if the compared watermarks are not same to each other, it is acknowledged that the stego images and the secret message is not authentic. The validation examination is completed to figure out the level of deterioration in secret message through computation of BER (bit error rate) as follows-

$$\begin{aligned} BER = \frac{\sum _{x=1}^{P}\sum _{y=1}^{Q}{(\,z(x,y) \oplus z^{'}(x,y)\,)}\times 100}{Count\_of\_embedded\_bits} \end{aligned}$$
(12)

Here, z and \(z^{'}\) of size \(P \times Q\) is embedded and extracted watermark respectively. From the results for various attacks on proposed algorithm as shown in Table 5, it is observed that extracted watermark in most of the cases is not matched with original one hence the proposed method is fragile against all type of attacks.

Table 5 Authentication Analysis

4.3 Histogram analysis

Stego images attained through a specific data hiding method are generally exposed to histogram analysis by attackers to get a hint about what has been embedded in it. Generally, a steganalyst gets a hint about embedded information through a comparison of corresponding histograms. A data hiding method is viewed as robust to this sort of attack if corresponding histograms are closely identical to each other. Fig. 6 show histograms of different medical cover images and corresponding stego images for a payload of \(512 \times 512\). As is observed from the Fig. 6 that the proposed system is robust to this attack because corresponding histograms are closely identical to each other because their absolute difference is zero for all the intensity values.

Fig. 6
figure 6

Histogram analysis of proposed method

Theorem 1:- The proposed scheme can not extract the secret message and reconstruct the original cover image at the receiver end successfully if stego image has been attacked during transmission.

Proof:-Consider any pixel value\((P_{u,v}= 2^{k})\) in cover image\((CI^2)\) which is divided into two units \(x_{u,v}\) and \(y_{u,v}\) as follows-

$$\begin{aligned} {\left\{ \begin{array}{ll} P_{u,v} = x_{u,v}+y_{u,v}\\ where\quad x_{u,v}=\lfloor \frac{P_{u,v}}{2}\rfloor =2^{(k-1)}\quad \\ y_{u,v} =P_{u,v}-x_{u,v}=2^{(k-1)}\\ \end{array}\right. } \end{aligned}$$

To avoid image distortion caused by a large value of \(w_{u,v}\)(EPI), it was further reduced by using Lu et al. [9] method as follows-

$$\begin{aligned} {\left\{ \begin{array}{ll} w_{u,v}^{'}=w_{u,v}-2^{k-1} \end{array}\right. } \end{aligned}$$

Now \(x_{u,v}\), \(y_{u,v}\) and \(w_{u,v}^{'}\) are encrypted through Paillier cryptosystem [15] to produced encrypted \(Encr[x_{u,v}]\), \(Encr[y_{u,v}]\) and \(Encr[w_{u,v}^{'}]\) respectively. After embedding \(Encr[w_{u,v}^{'}]\) into \(Encr[x_{u,v}]\) and \(Encr[y_{u,v}]\), they will be changed into \(Encr[x_{u,v}^{*}]\) and \(Encr[y_{u,v}^{*}]\) as follows-

$$\begin{aligned} {\left\{ \begin{array}{ll} Encr[x_{u,v}^{*}]=Encr[x_{u,v}]+Encr[w_{u,v}^{'}]=Encr[x_{u,v}+w_{u,v}^{'}]=Encr[2^{(k-1)}+w_{u,v}^{'}]\\ Encr[y_{u,v}^{*}]=Encr[y_{u,v}]-Encr[w_{u,v}^{'}]=Encr[2^{(k-1)}-w_{u,v}^{'}] \end{array}\right. } \end{aligned}$$

Assume noise(\(\delta\)) is introduced due to attack on stego image which has been taken place during transmission process. It is introduced into \(x^{*}_{u,v}\) and \(y^{*}_{u,v}\) as follows-

$$\begin{aligned} {\left\{ \begin{array}{ll} Encr[x_{u,v}^{*}]=Encr[2^{(k-1)}+\delta +w_{u,v}^{'}]\\ Encr[y_{u,v}^{*}]=Encr[2^{(k-1)}-w_{u,v}^{'}] \end{array}\right. } \end{aligned}$$

At receiver end, firstly compute \(diff_{u,v}^{'}= x_{u,v}^{*}-y_{u,v}^{*}=2w_{u,v}^{'}+\delta\)

$$\begin{aligned} {\left\{ \begin{array}{ll} Now diff_i^{'} \in [(-2^{k}-1)....(2^{k}-1-2)]\\ diff_{u,v}^{'} \% 2 \ne 0 \\ w_{u,v}^{'}=\frac{diff_{u,v}^{'}+1}{2}=\frac{2w_{u,v}^{'}+\delta +1}{2}\\ w_{u,v} =w_{u,v}^{'}+2^{k-1}\\ =\frac{2w_{u,v}^{'}+\delta +1}{2}+2^{k-1}\ne w_{u,v}\\ z_{u,v} =x_{u,v}^{*}+y_{u,v}^{*}= 2^{k-1}+\delta +2^{k-1}=2^k+\delta \ne P_{u,v}\\ \end{array}\right. } \end{aligned}$$

Similarly, all pixel values of the cover image are retrieved and finally, the extraction of secret message and reconstruction of the original cover image is not done successfully at the receiver end. So, it is to be concluded that stego image has been attacked during the transmission process.

Theorem 2:-The proposed scheme is reversible in nature so that after extraction of the secret message, it reconstructs the original cover image at the receiver end successfully.

Proof:-Consider any pixel value\((P_{u,v}= 2^{k})\) in cover image\((CI^2)\) which is divided into two units \(x_{u,v}\) and \(y_{u,v}\) as follows-

$$\begin{aligned} {\left\{ \begin{array}{ll} P_{u,v} = x_{u,v}+y_{u,v}\\ where\quad x_{u,v}=\lfloor \frac{P_{u,v}}{2}\rfloor =2^{(k-1)}\quad \\ y_{u,v} =P_{u,v}-x_{u,v}=2^{(k-1)}\\ \end{array}\right. } \end{aligned}$$

So that, to avoid image distortion caused by a large value of \(w_{u,v}\)(EPI), it was further reduced by using Lu et al. [9] method as follows-

$$\begin{aligned} {\left\{ \begin{array}{ll} w_{u,v}^{'}=w_{u,v}-2^{k-1} \end{array}\right. } \end{aligned}$$

Now \(x_{u,v}\), \(y_{u,v}\) and \(w_{u,v}^{'}\) are encrypted through Paillier cryptosystem [15] to produced encrypted \(Encr[x_{u,v}]\), \(Encr[y_{u,v}]\) and \(Encr[w_{u,v}^{'}]\) respectively. After embedding \(Encr[w_{u,v}^{'}]\) into \(Encr[x_{u,v}]\) and \(Encr[y_{u,v}]\), they will be changed into \(Encr[x_{u,v}^{*}]\) and \(Encr[y_{u,v}^{*}]\) as follows-

$$\begin{aligned} {\left\{ \begin{array}{ll} Encr[x_{u,v}^{*}]=Encr[x_{u,v}]+Encr[w_{u,v}^{'}]=Encr[x_{u,v}+w_{u,v}^{'}]=Encr[2^{(k-1)}+w_{u,v}^{'}]\\ Encr[y_{u,v}^{*}]=Encr[y_{u,v}]-Encr[w_{u,v}^{'}]=Encr[2^{(k-1)}-w_{u,v}^{'}] \end{array}\right. } \end{aligned}$$

At receiver end extract the secret message \(w_{u,v}\) and reconstruct cover image(CI) as follows:-

Firstly, compute \(diff_{u,v}^{'}= x_{u,v}^{*}-y_{u,v}^{*}=2w_{u,v}^{'}\) as follows-

$$\begin{aligned} {\left\{ \begin{array}{ll} Now diff_{u,v}^{'} \in [-2^{k}....(2^{k}-2)]\\ diff_{u,v}^{'} \% 2 =0 \\ w_{u,v}^{'}=\frac{diff_{u,v}^{'}}{2}=w_{u,v}^{'}\\ w_{u,v} =w_{u,v}^{'}+2^{k-1}=w_{u,v}\\ z_{u,v} =x_{u,v}^{*}+y_{u,v}^{*}= 2^{k-1}+2^{k-1}=2^k=P_{u,v}\\ \end{array}\right. } \end{aligned}$$

Hence, proved that that the proposed scheme is purely reversible in nature.

Table 6 Computational complexity comparison of proposed method

4.4 Computational complexity

The time complexity is computed when proposed method and compared schemes are run on a machine with Intel i5@2.40 GHz CPU and 8 GB RAM. As shown in Table 6, execution time of proposed method is more as compared to the methods of (Lu et al. [23], Yao et al. [25], Chi et al. [5], Lu et al. [24]) but less than the method of Lee & Huang [11] for test medical images. Embedding rate of the proposed strategy is most prominent than other compared schemes and the visual quality of stego images produced by the proposed method is at standard with all the compared methods.

5 Conclusion

One of the basic problem for the execution of E-medical platform is security, verification, and copyright protection of the patient information. To ensure safe and secure transfer of patient report at a specialist, patient information is to be embedded in medical report through proposed method. Proposed method embed

$$\lfloor \log _{2}(2 \times n+1) \times NZ -1 \rfloor$$

binary bits of patient information at seed pixels of the report (cover image) whereas no overflow problem has occurred during embedding process respectively. Maximum average embedding rate (2.36 bpp) is achieved by proposed method with an average visual quality of stego images (\(\infty\) dB) respectively. A comparative study of the proposed method with some state-of-the-art methods shows that at higher payloads compared methods wriggled to perform because of failing to recompense the overflow problem in high-intensity pixels, proposed method thus surpasses all the compared methods as it is able to embed data at high intensity pixels too. Since the proposed method has been carried out in the spatial domain so that embedded electronic patient information (EPI) is not robust to well known image processing attacks. Constraint of proposed method is robustness which can be dispensed with in coming future.