Keywords

1 Introduction

These days, the growing of information technology, particularly systems such as mobile communication, the computer network, and digital interactive program applications, has unlocked innovative possibilities for steganography and concealing procedures for information [1]. Data security has been a critical topic in recent years as a product of the massive developments in information technologies as well as the tremendous rise in computer networks used by data transmission and receiving [2, 28]. Researchers then concentrated on developing data security systems, and experiments were carried out to refine existing strategies and introduce new ones to secure data from hackers [3]. Cryptography is a tool used to confirm the details of a message by scrambling the message in such a way that nobody can decode apart from the individual who has the undisclosed password. It also a means of ensuring that messages were not altered throughout the communication cycle. Many methods for encoding and decoding messages to secure them have been developed, nevertheless with the emergence of the internet, these methods became inefficient [3]. New techniques were, therefore, necessary to resolve this problem, and this led to the advent of the principle of steganography [4,5,6].

Steganography refers to know-how and the ability to hide messages or any communication between the source and the destination of the undisclosed message via an electronic channel transferring the message [7,8,9,10]. The term (steganography) arising out of (steganos) denoting (concealed) and (graph) denoting (script) denotes (hidden writing) [11, 12]. Steganography is a way of covering coded communications in a plain concealment medium such as stegograms so that the presence of the hidden messages would not be revealed to an accidental observer [13,14,15,16,17, 49, 50]. Using steganographic strategies, material that is perceptually and statistically undetectable can be contained inside images, audio, video documents, or text. The electronic object is the utmost well-known concealment medium because of its extreme level of verbosity [18, 19]. The equivalent technique could be utilized in video steganography to entrench a communication into all the video edges [20, 21]. Audio steganography integrates the message as noise in a concealment acoustic medium at a rate of recurrence that is below the normal listening range [22]. It’s discovered that steganography disguises the presence of hidden communication, equating steganography with cryptography [23], while cryptography masks the meaning of the hidden communication [1].

Therefore, the objective of this study is to secure digital medical images being transmitted over the internet or an electronic medium from being accessed by an intruder. The study, therefore, proposed a modified Least Significant Bit algorithm implemented on a MATLAB 2018a programming environment and submitted to conduct a comparative analysis of the developed system with the existing system using three performance metrics which are PSNR. MSE and SSIM.

The remaining part of the paper are prearranged as follows: Sect. 2 discussed the related research works, Sect. 3 described the proposed method for this study, the datasets used for the implementation of the system and the stages with the algorithms utilized for performance, Sect. 4 discussed the results obtained from the implementation of the system, and this also showed the interfaces of the performance. The qualitative evaluation metrics used for the developed system analysis and the comparative analysis of the developed system with previous researches were discussed in Sect. 5. This investigation was concluded in Sect. 6.

2 Related Works

Several studies have investigated the various Steganography image approaches utilized to conceal messages in concealment objects [24,25,26,27]. The critical problem of communication concealing methods is to embed the most significant volume of communication in the cover object while maintaining consistency, including the reliability and power of the system in challenging hackers with electronic attacks. Several techniques and methods have been proposed to mask image data due to the immense number of visual imageries on the internet and as well as the straightforwardness of managing imageries in a concealment procedure [29,30,31].

To this end, scholars have tried to use new methods to deal with the accelerated evolution of concealing strategies to obtain specific outcomes. Researchers recently concentrated on enhancing the hiding mechanism in images by utilizing diverse approaches, for instance, LSB.

The LSB structure is prevalent plus is the utilization of Images to conceal data. This approaches the concealment medium specifically by modifying the least essential bit size to insert the details about the undisclosed communication and make it very difficult to identify the evolving mechanism in the medium from the people’s eyes. Hence, it a robust technique to add hidden knowledge by effecting imperceptible changes in the cover object [32, 33].

[34] proposed the Manipulating Alteration Path approach where the image was divided into multiple clusters comprising n pixels to inject the undisclosed file into (2n + 1)-ary encryption. The amount of a particular pixel within a category was raised or decreased by one during the insertion phase. Their method’s drawback is the reduced concealment object features because the group size had two pixels.

[35] proposed a structure to develop the so-called EMD process (IEMD). Compared to the standard EMD approach, this system collected a significant volume of data without compromising the concealment object features. This process transformed the undisclosed communication into an undisclosed digit in an 8-ary encrypting structure and inserted all secret communication into a collection of two pixels.

[36] proposed a system for improving the conventional EMD approach by embedding secret messages in all pixels using every pixel in the image. The entrenched material in the picture was duplicated when contrasted with the traditional method in the process. Utilizing the approach overpowered the detrimental features of the EMD system plus integrated the best volume of facts as long as maintaining the image characteristics.

[37] proposed an Opt EMD structure to what end the association amid the number of pixels (n) in the whole cluster with the number of payloads contained in the image was used to minimize the image distortion. This scheme achieved high efficiency, but the volume of the payload was affected.

[38] introduced a scheme using the methods of encoding Huffman, affine cypher, and Knight Tour. The undisclosed communication was scrambled and compacted in the procedure utilizing affine encryption and Huffman encoding, after that the new message was entrenched into a concealment object using LSB and Knight’s tour approaches. The item was translated into the colour space of YCbCr, and the undisclosed communication was inserted in the Cb part.

[39] brought forward a system utilizing better techniques for coding EMD and Huffman. This approach compacts the mystery message using Huffman coding; after that, the mystery cypher was encoded in an image utilizing the EMD approach, whereas the collection of pixels used for entrenching was divided into two subcategories of 2 and 3 pixels successively to maximize the payload beyond effecting the concealment object characteristics.

[40] implemented a data hiding structure that would calculate the sum of the I structure contained in the image utilizing the EMD process. The undisclosed message in this scheme was represented using (cn-ary). Then, utilizing C of diverse approaches to change its rate after that the set of (n) pixels was used to enclose the undisclosed communication in it.

[41] recommended a structure utilizing the LZW technique to minimize the magnitude of undisclosed details and raise the payload then use the Knight tour system as well as EMD structure to incorporate new knowledge into the concealment picture.

[42] set out a framework for developing the EMD process. The picture was separated into n pixels in the scheme and was utilized to implant 2kn-ary figures in the core section. The technique of Image Steganography was proposed by combining the methods of cryptography and steganography in this investigation. First, Vigenere cypher and Huffman encrypting were used to scramble and compact undisclosed communication. This means preserving the details and raising the size of the unknown communication for integration into the concealment picture utilizing the EMD procedure. Using the Knight tour scheme and arbitrary function, it was then enhanced to improve robustness and reliability by selecting the wedges and clusters used to enclose the secret communication into a particular pixel. This as well helps to maintain the stego-picture consistency and brought it nearer to the camera cover.

To ensure internet stability, [43] established a new LSB replacement scheme using stego-key guidance. The system’s payload and imperceptibility were models as a search issue for optimization. Finally, using a messy map, the critical information was arbitrarily inserted into the cover image. The recovery of classified information requires all procedures being reversed. The technique got 44.09db and 0.97 respectively as PSNR and SSIM.

[48] recommended image steganography established on integrated files plus inverted bit LSB replacement. The research intended to deliver three layers of security moderately than entrenching the file’s bit straight forward into the concealment object. The pixels were engendered arbitrarily via a pseudo-random number generator after the undisclosed communication is concealed inside the concealment object utilizing an inverted LSB approach.

The findings from the review show that the standard LSB steganography has mostly been used for hiding information, and it has shown that it had some limitation of perceptibility, distortion, the cover image is not robust.

3 Material and Method

3.1 Proposed Method

The need to develop reliable mechanisms for transmitting and receiving information through a contact channel is a significant issue. An innovative method is anticipated to cover the medical image by changing the LSB steganography approach to mask a considerable volume of records and given the accuracy of stego-images succeeding incorporating the medical image into the file. This provides an extreme degree of confidentiality in concealing the details inside the cover picture and through the method’s intensity in the digital occurrence situation. Such elements are confrontations facing the technique of hiding messages in photographs.

The stages of the projected method comprise

Embedding Procedure:

The medical image is entrenched within the concealment object by utilizing a modified LSB procedure called Circular Shift LSB and gives an output called stego image which is an image hiding the medical image in it.

Extraction Process:

The stego image is detached out of the stego image using the modified LSB procedure called the Circular Shift algorithm.

3.2 Materials

Data Availability.

The medical images which are mammogram images exploit in this investigation are openly obtainable at mini-MIAS: http://peipa.essex.ac.uk/pix/mias/.

Sample Medical Images.

Figure 1 displays the sample medical images, which are a mammogram used for the testing of the developed system.

Fig. 1.
figure 1

Sample medical image

3.3 Proposed Method Algorithms

Embedding Algorithm

  • Input: Medical image, Cover object, Stego key

  • Output: Stego image

  • Phase 1: Enter the medical image and the stego key

  • Phase 2: Read the given message of the medical image

  • Step 3: Change the pictures to ASCII arrangement

  • Phase 4: Embed the ASCII format into the cover image using the modified LSB algorithm called Circular Shift Method

  • Phase 5: Produce a stego image

Extracting Algorithm

  • Input: Stego image, Stego key

  • Output: Medical image, Cover image

  • Phase 1: Enter the stego image and the stego key

  • Phase 2: Read given stego image

  • Phase 3: Change the picture to ASCII arrangement

  • Phase 4: Extract the ASCII format from the stego image utilizing the projected system algorithm called Circular Shift Method

  • Phase 5: Produce the medical image and the initial cover image

4 Results and Discussion

The study exploits the use of MATLAB for the implementation of the proposed technique, the system also employed medical images for the testing of the system. The following interfaces display the results from the performance of the developed system.

4.1 Embedding Phase of the System

Figure 2 shows the proposed system interface for the secured medical information system.

Fig. 2.
figure 2

The interface of the system

Figure 3 displays the interface showing the procedure of the embedding technique.

Fig. 3.
figure 3

Embedding process in progress

Figure 4 shows the interface displaying the result of the embedding stage of the system. This demonstrates the initial concealment object and the steganographic image (that is object hiding the patient’s information).

Fig. 4.
figure 4

The interface of embedding result

4.2 Extracting Phase of the System

Figure 5 displays the extraction phase for the scheme, and here the stego key for access to the secured patient information is entered.

Fig. 5.
figure 5

The interface of the extraction phase

Figure 6 shows the folder from where the saved stego image is being stored and picked for extraction.

Fig. 6.
figure 6

The interface of folder having the message sent

Figure 7 displays the extraction phase of the projected scheme, and the confidential information is shown on the retrieve message and also the initial cover message.

Fig. 7.
figure 7

The interface of the extraction phase

5 Qualitative Evaluation Metric

Mean square error (MSE), peak signal-to-noise ratio (PSNR), normalization of cross-correlation (NCC), structural similarity index (SSIM), plus histogram are generally utilized to assess the characteristics of stego-images virtually [44]. In this investigation, the authors used three out of the metrics; for instance, the MSE, PSNR, and SSIM.

Mean Square Error (MSE).

This tests the quality of a stego image by determining the variation amid the concealment object and the stego image [45].

$$ MSE = \frac{1}{mn}\sum\nolimits_{0}^{m - 1} {\sum\nolimits_{0}^{n - 1} {c - s^{2} } } $$
(1)

m and n are the entered images number of rows and columns correspondingly, C is the cover-object while S is the stego-image.

Peak Signal to Noise Ratio (PSNR).

The PSNR calculates the rate at which the encoded information in the decibel (dB) variable distorts a stego-image as a result. A more excellent PSNR value represents the advanced stego-image efficiency and is measured as [46].

$$ PSNR = 10log\left( {\frac{{255^{2} }}{MSE}} \right) $$
(2)

Where 255 is the utmost pixel value in both stego-image plus concealment object.

Structural Similarity Index (SSIM).

SSIM contrasts two equivalent pictures using their configurations to values ranging from -1 to 1. The closest the SSIM is to 1 the. The resemblance between the two images given and is determined [47].

5.1 Comparative Evaluation

Three qualitative evaluation metrics were used for the comparative analysis with previous researches, and these were used in comparing with two earlier pieces of research which are Younus & Hussain, 2019, and Bhardwaj & Sharma, 2016.

Table 1 illustrates the values of PSNR, MSE, and SSIM for Younus & Hussain, (2019), Bhardwaj & Sharma, (2016), and the proposed system. It displays the value of payload, PNSR value, MSE value, and SSIM. Consequently, it was deduced that the PSNR value is higher than 30 which is 82.35 and the MSE value is increased with 0.0744, which signifies that the suggested approach is ideal at entrenching the medical image inside the concealment object by implanting a considerable quantity of medical images within it and maintaining the concealment object quality. The SSIM value is similar to 1, which means that the stego image is the same as the initial concealment image of good quality.

Table 1. Comparative analysis of the developed system with previous works

6 Conclusion

The critical aim of steganography techniques is to hide a vast volume of details within an image without compromising the appearance of the picture. The robustness and reliability of these systems also offer protection against cyber threats. For this study, an innovative technique was recommended, which is the circular shift (Modified LSB) steganography technique to mask the medical image within cover images. The proposed scheme was tested utilizing PSNR, MSE, and SSIM to determine the consistency and utilizing the embedding degree to exam the payload. The analytical findings indicate that the suggested scheme’s efficiency and payload are higher than conventional approaches. Furthermore, the protection and robustness of the presented process were considered to be satisfactory in the face of electronic attacks. The system can be checked in future works by producing other electronic threats, and other techniques can be used for random selection as well.