You are on page 1of 16

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/328021502

A Secure Transmission Approach for Medical Images and Patient’s Information


by Using Cryptography and Steganography

Article · October 2018

CITATIONS READS

0 9

1 author:

Jamal N. Bani Salameh


Mu’tah University
11 PUBLICATIONS   16 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Jamal N. Bani Salameh on 04 October 2018.

The user has requested enhancement of the downloaded file.


IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

A Secure Transmission Approach for Medical


Images and Patient’s Information by Using
Cryptography and Steganography
Jamal N. Bani Salameh

Department of Computer Engineering, Mutah University


Mutah, Karak, P.O. Box: 7, Zip Code: (61710), Jordan

Abstract - Nowadays many medical images and patient’s information are transferred between different parties to be reviewed and
evaluated by physicians who are geographically apart. Any illegal modification in this information during transmission may lead to
wrong assumptions and wrong diagnosis. Therefore, the security of medical images and patient’s information has always been a
concern. In this research, we developed a new security system that combines cryptography and steganography techniques to provide
a secure distribution for both the medical images and patient’s information to the other party over un-secure channel to protect it
against attackers. For cryptography we used our encryption algorithm MJEA (for Modified Jamal Encryption Algorithm); it is a
symmetric (64-bit) block encryption algorithm with (120-bit) key. For steganography we used a very simple algorithm that hides the
patient’s information within the medical image by using bit-by-bit Xoring. The proposed system deals with the medical image and
patient’s information as shares, the first share represents the medical image after it will be encrypted by using MJEA and the second
share represents all patient’s information embedded in the medical image and encrypted by using MJEA. For more security, before
transmit the two shares they will be mixed together by using a scrambling algorithm. We adopted different simulation metrics for
evaluating the performance of the proposed system such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) and the
histogram distribution analysis. For this purpose, the proposed technique was applied on several gray scale medical images with
different sizes of patient’s information. All experimental results proved the strength of the proposed system in securing both the
medical image and patient’s information while transmission over unsecure channel. At the receiver side, the proposed system was
able to recover back the original medical image and the patient’s information that was sent by the sender without any loss.

Keywords – Medical image, Patient’s information, Data hiding, Telemedicine, Cryptography, Steganography.

1. Introduction from unauthorized accessing or interception. The


transferred medical information should be reached

T
he field of Telemedicine involves exchanging accurately to the other party without any change, else
medical images and patient’s information from this can lead to false diagnosis causing adverse effects to
one location to another via different forms of the normal medical condition. For this reason medical
electronic telecommunications, it has many images and patient’s information should be protected and
applications such as: Tele-consulting, Tele-radiology, distributed securely over an open access channel. The
Tele-diagnosis, Tele-surgery, Remote medical education importance of a secured exchange of medical images
and others. Those benefits are associated with various encourage international healthcare organizations to
types of risks during sharing the medical information publish special standards that deal with medical data
across the vulnerable public networks [1]. Medical security issues. One such standard is the Digital Imaging
information, such as Electronic Patient Records (EPRs) and Communications in Medicine (DICOM) standard
and Electronic Health Records (EHRs) which may [3]. The standard is used to facilitate safe transmission
include: clinical examinations, diagnosis explanations and secure storage for medical images. DICOM provides
and other findings, is often closely related to patients’ guidelines and mechanisms to healthcare professionals
privacies which should be kept secret. Furthermore, and entities to achieve three telemedicine security
medical images for diagnosis need to be protected in services: confidentiality, authenticity and integrity [4].
order to prevent malicious tampering [2]. Confidentiality ensures that only the authorized
individuals or systems have the right to access the
In the growing field of telemedicine, the size of medical exchanged information. Authenticity allows verification
information being exchanged over the Internet are of the origin and owner of the exchanged information,
extremely increasing and these information are and integrity ensures that the exchanged information has
vulnerable to variety types of security attacks. Therefore; not been modified or tampered with. The confidentiality
securing medical images and patient’s information has service is necessary to prevent illegal access to the
gained important attention in recent years to protect them transmitted images, whereas the integrity and

289

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

authenticity are needed to verify ownership and detect stream cipher, and then information is embedded into the
tampering of the received images [5]. encrypted images by modifying a small proportion of
those encrypted data. In the receiving end, the encrypted
There are a lot of techniques that used to ensure security image containing additional data is firstly decrypted to
for telemedicine applications; these techniques are get similar versions of the original images; then, the
cryptography, steganography and digital watermarking. embedded data can be extracted and the original image
Cryptography convert the medical information to can be reversibly recovered with the data hiding key and
unreadable form except to those who are authorized to the spatial correlation features in natural images [26].
achieve confidentiality and to provide authenticity. This scheme is reversible; however, the hiding capacity
Steganography hide the existence of medical information is rather low. In [27], an improvement is proposed to
by hiding it in another object so it can maintain the increase the hiding capacity of the scheme proposed in
integrity of the information. Digital watermarking is the [26]. However, the hiding capacity is still not large
process that hides watermark data into a multimedia enough after the improvement. In [28], medical images
object such that the watermark can be detected or are firstly divided into blocks; then, three LSB planes
extracted from the object to prove its ownership or substitution is utilized in the regions of noninterest
validate its integrity [5].The traditional method which (RONI) in medical images for hiding the additional data.
has been commonly used for achieving security in the In [29], a reversible data hiding scheme in encrypted
medical information exchange systems is based on images by reserving room before encryption is proposed.
cryptographic functions. Cryptographic algorithms can The self-embedding of LSB planes guarantees the
be generally classified into two major groups: symmetric reversibility of LSB substitution embedding. In [30],
algorithms which use the same key for encryption and additional information is firstly coded with a
decryption and asymmetric algorithms which use quantization index modulation (QIM) method; then this
deferent keys [5]. Various encryption algorithms have coded information is encrypted with traditional
been proposed in literature in order to ensure security for encryption methods (such as RC4 algorithm); finally, the
telemedicine applications [6-9]. With the development of encrypted coded information is embedded into medical
data hiding and digital watermarking, numerous numbers image with the simple least significant bit (LSB)
of effective schemes have been proposed to embed substitution method; this scheme is not reversible due to
information into medical images for the protection of the LSB substitution. In [31], the authors proposed an
private information and the authentication of medical encryption frame of medical image with watermark
images, however, this technique has the disadvantage of based on hyper chaotic system. Medical information is
not providing confidentiality to the watermarked embedded into the regions of interest (ROI) in medical
multimedia objects [10-16]. Steganography is the process images with a high capacity difference-histogram based
of hiding secret or sensitive information inside other reversible data-hiding scheme. After that, the
carrier in such a way that no one except the authorized watermarked medical images are encrypted with hyper
user can even detect that there is a secret message inside chaotic systems. In the receiving end, the encrypted
it [17]. There are a lot of steganography algorithms in the image is firstly decrypted to get the similar image with
literature that are used to protect medical information; watermark. Then, the ROI of the image with hidden data
[18] shows a survey and analysis of various is detected and hidden data is extracted. Finally, the
steganographic techniques used for information hiding. original medical image is reversibly recovered.

Combining cryptography with steganography together Several techniques combined both encryption and
can make a strong security system for securing medical watermarking algorithms to get a better security for
information from unauthorized access or unwanted medical information. Algorithm [32] applied a reversible
intervention in order to maintain its confidentiality and data hiding algorithm on encrypted medical images. The
integrity. There have been lots of work in the literature medical image was first encrypted using the electronic
that combine steganography with cryptography for more code book (ECB) mode of AES standard, and then data
security [19-25]. Obviously, using both encryption and hiding in the encrypted domain was done using bit-
data hiding separately have their advantages and substitution based method. Algorithm [33] proposed
disadvantages in secure communication. Recently, a lot reversible watermarking techniques and applied it on
of schemes combine them together for better protection various medical image modalities. The proposed
for medical images and patient’s information. Those algorithm is region-based, and the RSA public key
schemes could be divided into three categories: The first method was used to provide secured transmission. In
one is encryption before data hiding; the second one is [34] a joint watermarking/encryption algorithm was
encryption after data hiding and the third one is fusion of proposed. The algorithm combines quantization index
encryption and data hiding. modulation (QIM) and the AES block cipher algorithm
in the cipher block chaining (CBC) mode. In [35] a
Reversible data hiding schemes in encrypted images are randomized cryptographic fusion watermarking system
proposed in [26, 27]. The image is encrypted with a was proposed. The system operates by encrypting the

290

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

patient information and embedding the encrypted data in algorithm. The performance evaluation of the algorithm
the medical image by bitwise operation. achieves a good security properties: it thoroughly
scrambles the plaintext with the 120-bit key when run for
As we noticed above, previous works used encryption, 8-rounds, it achieves a good Avalanche Effect as quickly
steganography and watermarking techniques to protect as possible and complete the encryption/decryption
medical images and patient’s information, we can process with a high speed [36]. Also, MJEA has been
summarize those works as follows: Some techniques analyzed considerably as image encryption algorithm, it
used cryptography algorithms alone to secure medical was able to achieve high embedding capacity, minimum
information: all medical images and/or patient’s correlation coefficient and high encryption quality. At
information should be encrypted before transmission to the receiver side, the encrypted image was decrypted
the other party. Some techniques used steganography successfully and the decoder was able efficiently to
algorithms a lone to secure medical information: embed recover the original image without any loss [37]. For
the patient’s information in the medical image and send steganography we used a very simple algorithm that
them to the other party. Some techniques used digital hides the patient’s information within the medical image
watermarking a lone to secure medical information: the by using bit-by-bit Xoring to get the steganography
patient’s information (the watermark) is inserted into the image (Steg_Img). There is no need to use a complex
medical image (visible or invisible) and send them to the steganography algorithm because the (Steg_Img) will be
other party. Some techniques used a hybrid system by encrypted by using MJEA in the next stage. So it is hard
combing encryption and watermarking together to for anyone to get the secret data without breaking down
protect medical information. Other hybrid systems were MJEA first then extract the embedded data out of the
combined by using encryption and steganography cover medical image. So, the main contribution of this
together to protect medical information; but the question research is developing a new security system that
is; which one comes first? Steganography or encryption. combines steganography with cryptography to provide a
Some techniques used the encryption first for the secure transition of medical images and patient’s
medical image then use steganography second to embed information over open channel to protect it against
the patient’s information in the encrypted image. Since attackers.
the entropy of the encrypted image is maximal, the
embedding step is considered like noise, is not possible The rest of the paper is organized as follows: Section 2
by using standard data hiding algorithms. Reversible data gives a detailed description of the design process of the
hiding algorithms should be applied on encrypted images proposed technique. Section 3 shows experimental
by wishing to remove the embedded data before the results and discusses the efficiency of the proposed
image decryption. Furthermore, some techniques used mechanism. Finally, section 4 provides some concluding
the encryption algorithm first to encrypt the patient’s remarks and future work.
information then use steganography second to embed the
encrypted patient’s information in the medical image.
Using steganography and cryptography alone have some 2. Description for the Proposed System
limitation to secure the medical information, so
obviously combining them together can give a strong In this research we proposed a hybrid security system
security system. The steganography will protect the that combine cryptography and steganography
transmitted data against the suspicion of the attacker by techniques for securing not only medical images but also
hiding it in a cover image. Cryptography will protect patient’s information as well during transmission over an
the confidentiality of the transmitted data even though open access network (i.e. Internet). The proposed system
the attacker is able to break down the steganography deals with the two secrets (medical image and patient’s
system. information) that will be sent securely to the anticipated
party as shares. The first share represents the medical
In this paper, we proposed a new approach for securing image after it will be encrypted by using MJEA and the
both medical images and patient’s information during help of the (120-bit) encryption key and the second share
transmission over an open access network (i.e. Internet) represents all patient’s information embedded in the
by using a hybrid system combined of cryptography and medical image and encrypted by using MJEA. As a final
steganography. The cryptography technique adopted in step and for more security, before transmit the two shares
this research was our encryption algorithm: Modified they will be mixed together by using a scrambling
Jamal Encryption Algorithm (MJEA); which is proposed algorithm.
by Jamal Bani Salameh. MJEA is a novel symmetric
block encryption algorithm; it has a 64-bit block size, 8- In this section, we are going to give a detailed
rounds and 120-bit key [36]. Former evaluation description of the design process to define the proposed
experiments show the capability of MJEA for securing technique precisely. Figure 1 shows a block diagram for
both plain texts and digital images. MJEA has been the proposed system at the transmitter side. As we see in
analyzed considerably as a plain text encryption this figure, we have three inputs for this system and two

291

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

outputs. The inputs are: the medical image (Med_Img), the patient’s information should not exceed the
the patient’s information (Pat_Info) and the encryption size of the medical image.
key (K =120-bit). The outputs are: the encrypted image
(Enc_Img) and the encrypted steganography image Encryption Key
(K=120-bit)
(Enc_Steg_Img); those outputs represent the two shares
that will be transmitted to the other party. The proposed Secret Image
(Med_Img) Hexa-decimal MI Encryption Enc_MI Enc_Img
system works as follows: Firstly, we used the Hexa-decimal
Representation Encryption
Algorithm
Representation
Algorithm Algorithm
(MJEA)
hexadecimal representation algorithm to convert the Algorithm (MJEA)
(Med_Img) and (Pat_Info) into 8-bit binary Scrampling
Scrampling
Algorithm
representation and store the result in arrays called (MI) Algorithm
Embedding Enc_Steg
and (PI). After that we used the encryption algorithm Secret Info.
(Pat_Info) Hexa-decimal PI Algorithm SI Encryption Enc_SI _Img
Hexa-decimal Encryption
MJEA by the help of K (120-bit) to encrypt (MI) and Representation
Representation
Algorithm + Algorithm
Algorithm
(MJEA)
store the result in array called (Enc_MI) which Algorithm (MJEA)

represents the encrypted form of the medical image. Note


that the medical image will play the role as a cover
Fig. 1 A block diagram for the proposed system at the sender side
media in this system and it will be used to hide the other
secret which is the patient’s information; to do that we
used the embedding algorithm to do bit-by-bit XORing The algorithm for the proposed system at the sender side
between (MI) and (PI) and store the result in an array is described in details step-by-step as follows:
called (SI) which represents the steganography image.
As a double security, we encrypted the result (SI) by
using MJEA and the help of (120-bit) key to get Algorithm for the proposed system at the sender
(Enc_SI) which represents an encrypted form of the side:
steganography image. As a third level of security in this Inputs: secret image (i.e. medical image),
system, we used the scrambling algorithm to mix both secret information (i.e. patients information),
arrays { Enc_MI & Enc_SI} in order to scramble them Encryption Key (K=120-bit).{Med_Img,Pat_Inf,K}
before transmission and the outputs for this level are: Outputs: Encrypted image and the Encrypted Steg-
{Enc_Img & Enc_Steg_Img}; those outputs represent Image: {Enc_Img,Enc_Steg_Img}
the two shares that will be sent to the anticipated 1. Use the hexadecimal representation algorithm
recipient. to convert the (Med_Img) into 8-bit binary
representation and store the result in an
From the previous description about the proposed system array called MI: Med_Img → (MI)
at the transmitter side; we note the following points: 2. Use the hexadecimal representation algorithm
• If the attacker intercepted one of the two shares; to convert the (Pat_Info) into 8-bit binary
he still needs the other one in order to start the representation and store the result in an
process of recovering the original information. array called PI: Pat_Info → (PI)
• If the attacker got the two shares and he was 3. Use the embedding algorithm to do bit-by-bit
able to separate them, and he start working on XORing between MI and PI and store the
the first share; he still needs to break down the result in an array called (SI): MI ⊕ PI SI
encryption algorithm; which is not an easy job; 4. Use the encryption algorithm (MJEA) by the
in order to recover back the original medical help of K(120-bit)to encrypt MI: Ek(
image.
MI) = Enc_MI
• If the attacker was able to decrypt the
5. Use the encryption algorithm (MJEA) by the
(Enc_Img) and recovered the original medical
help of K(120-bit)to encrypt (SI): Ek(SI)
image; still it is meaningless to him because it
has no information about the case and about the = Enc_SI
patient; it is just an image; that is the reason 6. Use the Scrambling Algorithm to mix both
why we did not embed the patient’s information arrays { Enc_MI & Enc_SI} to get: {Enc_Img
in the first share. & Enc_Steg_Img}
• The patient’s information that was included in 7. Transmit the two shares {Enc_Img &
the second share passed through three levels of Enc_Steg_Img} to the receiver side:
_ , _ _
security; so it is secured against most known Tx Rx
types of attacks.
• There was no capacity limitation to the patient’s
information that will be embedded in the Figure 2 shows a block diagram for the proposed system
medical image; the only limitation is the size of at the receiver side. As we see in this figure, we have
three inputs for this system and two outputs. The inputs

292

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

are: the encrypted image (Enc_Img), the encrypted = MI


steganography image (Enc_Steg_Img) and the 4. Use the decryption algorithm (MJEA) by the help
encryption key (K =120-bit). The outputs are: The of K(12-bit)to decrypt Enc_SI: Dk(Enc_SI) = SI
medical image (Med_Img) and the patient’s information 5. Use the extracting algorithm to do bit-by-bit
(Pat_Info) that was sent by the transmitter. This system XORing between MI and SI to get back the
works as follows: The first step; we need to rearrange the original PI: MI ⊕ SI PI
received shares (Enc_Img and Enc_Steg_Img) in arrays 6. Use the hexadecimal representation algorithm in
with 8-columns and S/8 rows; where S represents the the reverse direction to reconstruct
number of pixels for the medical image. Then we used the(Med_Img) by reshaping the array (MI): MI →
the Scrambling Algorithm to separate both arrays to get
Med_Img
the original ones (Enc_MI and Enc_SI). After that, we
7. Use the hexadecimal representation algorithm in
used the decryption algorithm (MJEA) by the help of K
the reverse direction to reconstruct
(120-bit) to decrypt (Enc_MI) and (Enc_SI) to get the
the(Pat_Info) by reshaping the array (PI): PI →
original arrays that represents the medical image and the
Pat_Info
steganography image (MI, SI). Furthermore; we used the
8. Recover back the original: {Med_Img & Pat_Info}
extracting algorithm to do bit-by-bit XORing between
that was sent by the sender.
MI and SI to get back the original PI. The last step we
used the hexadecimal representation algorithm in the
reverse direction to reconstruct the (Med_Img) by
reshaping the array (MI) and to reconstruct the
(Pat_Info) by reshaping the array (PI). The proposed
system was able to recover back the original: {Med_Img As seen in Figures (1 & 2), the proposed system has four
& Pat_Info} that was sent by the sender. algorithms: the hexadecimal representation algorithm,
the embedding/extracting algorithm, the
Encryption Key encryption/decryption algorithm and the scrambling
(K=120-bit) algorithm. In the following sections, we will give a
detailed description about each one of them.
Secret Image
(Med_Img) Hexa-decimal MI Encryption Enc_MI Enc_Img
Hexa-decimal
Representation Encryption
Algorithm
Representation
Algorithm Algorithm
(MJEA) 2.1 Hexadecimal Representation Algorithm
Algorithm (MJEA)

Scrampling
Scrampling
Algorithm
The main use of this algorithm at the transmitter side is
Algorithm
Secret Info. Extracting Enc_Steg to convert the medical image and patient’s information
(Pat_Info) Hexa-decimal PI Algorithm SI Encryption Enc_SI _Img into 8-bit binary representation (known that each pixel of
Hexa-decimal
Representation Encryption
Algorithm
Representation
Algorithm
+ Algorithm
(MJEA) the medical image needs 8-bit of storage). At the receiver
Algorithm (MJEA)
side this algorithm works in the reverse direction to
Fig. 2 A block diagram for the proposed system at the receiver side reconstruct the (Med_Img) by reshaping the array (MI)
and to reconstruct the (Pat_Info) by reshaping the array
The algorithm for the proposed system at the receiver (PI.) Note that each row in all arrays used in the
side is described in details step-by-step as follows: proposed system {MI, PI and SI) should store 64-bit this
is necessary to match the requirement of the encryption
Algorithm for the proposed system at the receiver algorithm (MJEA) that will be used in the proposed
side: system which is (64-bit) block encryption algorithm.
Input: Encryption Key (K=120-bit),the Encrypted This algorithm is described in details step-by-step as
Image and the Encrypted Steg-Image: {K, follows:
Enc_Img,Enc_Steg_Img}
Output: secret image (i.e. medical image), secret
information (i.e. patients information): {Med_Img,
Pat_Info}
1. Rearrange the received shares (Enc_Img and
Enc_Steg_Img) in arrays with 8-columns and S/8
rows; where S represents the number of pixels
for the medical image.
2. Use the transformation Algorithm to separate
both arrays to get the original arrays: Enc_MI
and Enc_SI
3. Use the decryption algorithm (MJEA) by the help
of K(120-bit)to decrypt Enc_MI: Dk( En_MI)

293

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

Hexadecimal representation Algorithm at the sender side:


Input: medical image (Med_Img), patient’s information (Pat_Info)
Output: two arrays (MI & PI) that contain the hexadecimal representation for (Med_Img)
1. Convert the medical image into 8-bit binary representation
2. Store the number of pixels for the medical image in a variable S (known that each pixel needs 1-
byte of storage).
3. Make an empty array and call it (MI) with 8-columns and S/8 rows, this means that each row will
store 64-bit.
4. Store the hexadecimal representation of the (Med_Img)in MI: Med_Img → (MI)
5. Convert the patient’s information into 8-bit binary representation
6. Make an empty array and call it (PI) with 8-columns and S/8 rows.
7. Store the hexadecimal representation of the (Pat_Info)in PI: Pat_Info → (PI).
Algorithm at the receiver side:
1. Use the hexadecimal representation algorithm in the reverse direction to reconstruct the(Med_Img)
by reshaping the array (MI): MI → Med_Img
2. Use the hexadecimal representation algorithm in the reverse direction to reconstruct the(Pat_Info)
by reshaping the array (PI): PI → Pat_Info
3. Recover back the original: {Med_Img & Pat_Info} that was sent by the sender.

2.2 The Embedding / Extracting Algorithm


The main use of this algorithm is to embed the secret Algorithm for the embedding process at the
information (patient’s information) into the cover image sender side:
(medical image) at the sender side and to extract those Input: the array that contains binary
information from the cover image at the receiver side. representation for medical image (MI), the
The inputs for the embedding process comes from the
array that contains binary representation for
previous step (MI and PI). Those inputs are arrays with
patient’s information (PI): {MI, PI)
8-columns and S/8 rows; which represents the
Output: the array that contains the binary
hexadecimal representation of the medical image and the
representation for the steganography image (SI)
patient’s information. This process could be done simply
MI, PI, SI: are arrays with 8-columns and S/8
by using the idea of bit-by-bit Xoring between MI and PI
rows, where S represents the number of pixels
to get the steganography image. This output stored in an
in the medical image.
array (SI) with 8-columns and S/8 rows. The reason for
1. Use bit-by-bit XORing between MI and PI to
choosing this simple algorithm because SI will be
get the Steg_Img and store the result in
secured by two more levels of security: first, it will be
MI ⊕ PI SI
encrypted by using the encryption algorithm MJEA then array SI :
it will be scrambled by the scrambling algorithm; we will Algorithm for the extracting process at the
talk about those steps in sections 2.3 and 2.4. The receiver side:
extracting process is done at the receiver side and it is Input: the array that contains the binary
used to extract the secret information (i.e. patient’s representation for the steganography image
information) from the cover image (medical image). This (SI), the array that contains binary
process will be done by applying the inverse bit-by-bit representation for medical image (MI):{SI, MI)
Xoring that was done at the sender side. The inputs for Output: the array that contains the binary
this process are: (MI and SI) that comes out of the representation for the patient’s
decryption algorithm; the output for this process was the information:(PI)
array (PI) that represents the original patient’s 1. Use bit-by-bit XORing between SI and MI to
information that was sent by the sender. This output will get the patient’s information and store
be transferred to the hexadecimal representation the result in array (PI) : SI ⊕ MI PI
algorithm to be used in the reverse direction to
reconstruct the (Pat_Info) by reshaping the array (PI).
This process was able to recover back the original secret
information (Pat_Info) that was sent by the sender. This
algorithm is described in details step-by-step as follows:

294

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

2.3 Encryption / Decryption Algorithm performance results is good according to the avalanche
effect. MJEA has been analyzed considerably as plain
In this research we used our encryption algorithm text encryption algorithm through a series of simulation
(MJEA) for image encryption / decryption. MJEA is a tests. The algorithm thoroughly scrambling the plaintext
novel symmetric-key block ciphering algorithm, it has a with the key and it achieved a good Avalanche Effect
64-bit block size, 8-rounds and 120-bit key. Figure 3 when it is tested separately; on average more than 50%
shows a block diagram for this algorithm at the of the bits were changed when we changed a bit in the
transmitter side. As we see in the figure, MJEA divides plaintext, key or the ciphertext. A comparison has been
the plain text message or the secret image into (64-bit) conducted between MJEA and different encryption
blocks then it encrypts each block separately. All algorithms and the simulation results clearly showed the
operations in MJEA are XORed on 8-bit words. The 64- superiority of MJEA over the other encryption
bit block of the plain text (Pt) goes in one end of the algorithms in terms of Avalanche Effect [36]. Also
algorithm, and then the algorithm runs to produce the 64- MJEA has been analyzed considerably as image
bit of ciphered text (Ct) at the end. Each (Pt) block is encryption algorithm. Experimental results showed the
converted into a (Ct) block in 8-roundes under the possibility of applying MJEA to encrypt digital images.
control of (120-bit) encryption key. The decryption The algorithm was able to achieve high embedding
process in MJEA is different from the encryption process capacity and high quality of encoded image. It was able
in that the S-boxes must be used in the reverse order, as to replace and transform of all pixels in the original-
well as the inverse linear transformation and reverse image, and on the other side there was no loss of the
order of the sub-keys. image quality after performing the decryption process
[37].
Decryption for MJEA is relatively straightforward We applied MJEA at the sender side to encrypt the secret
beginning with the ciphered text as input which is medical image to get the (Enc_Img) and to encrypt the
divided into (64-bit) blocks, then each block is decrypted steganography image (SI) to get the (Enc_SI). At the
separately. The (64-bit) block of the Ct goes in one end receiver side we applied MJEA to decrypt the (Enc_Img)
of the algorithm, and then the algorithm runs to produce to get back the original medical image that was sent by
the (64-bit) of Pt at the end. Each Ct block is converted the sender and to decrypt the (Enc_SI) to get back the
into a Pt block in 8-roundes under the control of the same steganography image (SI) that hides the patient’s
(120-bit) encryption key that was used in the sender side. information.
The design of the algorithm is easy to implement and its

Fig. 3 Block diagram of MJEA at the transmitter side

295

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

2.4 The Scrambling Algorithm • Assign the odd number of elements of X́ [1 … S/8] & Ý
[1 … S/8] to generate X [1 … S/8]
As a third level of security in the proposed system, we • Assign the even number of elements of X́ [1 … S/8] & Ý
used the scrambling algorithm at the transmitter side to [1 … S/8] to generate Y[1 … S/8]
mix both arrays { Enc_MI & Enc_SI} in order to 1. X [1 … S/8] = {X [1], X [2], X [3], X [4], ……, X
scramble them before transmission and the outputs for [S/8-1], X [S/8] }
= {X́ [1], Ý [1], X́ [3], Ý [3], ……, X́
this algorithm are: {Enc_Img & Enc_Steg_Img}; those [S/8-1], Ý [S/8-1]}
outputs represent the two shares that will be sent to the 2. Ý[ 1 … S/8] = {Y [1], Y[2], Y [3], Y[4], ……, Y
other party. [S/8-1], Y[S/8] }
Note that, if any attacker intercepted one of the two = {X́ [2],Ý [2], X́ [4],Ý [4], ……, X́
shares; he/she still needs the other one in order to start [S/8], Ý [S/8] }
the process of recovering the original information. If the 3. X [1 … S/8] = Enc_MI, Y [1 … S/8] = Enc_SI
attacker got the two shares; he needs to know how to
separate them in order to continue the process for
recovering medical information. This algorithm will be
used at the receiver side to separate the received shares
(Enc_Img, Enc_Steg_Img) out of each other to get the In the next section; the performance of the proposed
original arrays (Enc_MI, Enc_SI) that represents the technique will be evaluated by considering several
encrypted form of the array (MI) and the encrypted form experimental tests under different metrics.
of the array (SI) that will be sent to the decryption
process. This algorithm is described in details step-by-
step as follows: 3. Experimental Results and Analysis
The performance evaluating process that was done in this
Scrambling Algorithm at the sender side:
Inputs: Enc_MI and Enc_SI: that are received from the research involves several experimental tests to check the
encryption algorithm invisibility and the robustness properties of the proposed
Outputs: Enc_Img, Enc_Steg_Img: that represent the two technique; those tests will include the following:
shares that will be sent to the receiver • Visual testing to show how the proposed system
Assume that: works.
• Enc_MI = X, Enc_SI = Y, Enc_Img = X́, Enc_Steg_Img = • Statistical test which include the PSNR (Peak
Ý Signal to Noise Ratio) to measure the quality of
• S: represents the number of pixels for the medical image the image and the MSE (Mean Square Error) to
(known that each pixel needs 1-byte of storage).
measure the distortion in the image.
• X, Y, X́ and Ý : are arrays with 8-columns and S/8 rows,
this means that each row will store 64-bit. • Histogram analysis test: we calculated the
• Each array has (S/8) rows and each row stores a (64-bit) histogram for each one of the medical images at
block of data the four phases of the proposed system then we
did our analysis by comparing them together to
In this algorithm we will mix (X&Y) to generate (X́ & Ý ) check if the proposed technique is secure
• Assign the odd number of elements of X[1 … S/8] & against histogram analysis attack.
Y[1 … S/8] to generate X́ [1 … S/8] • The Entropy test: used to measure the
• Assign the even number of elements of X[1 … S/8] & uncertainty association with random variable.
Y[1 … S/8] to generate Ý [1 … S/8] • The correlation coefficient test which is used to
1. X́ [1 … S/8] = {X́ [1], X́ [2], X́ [3], X́ [4], ……, X́
[S/8-1], X́ [S/8] }
display the relationship between two
= {X [1], Y [1], X [3], Y [3], ……, X neighboring pixels.
[S/8-1], Y[S/8-1] }
2. Ý [1 … S/8] = {Ý [1],Ý [2],Ý [3],Ý [4], ……, Ý To check the robustness of the proposed system
[S/8-1], Ý [S/8] } according to all tests that will be conducted in this
= {X [2], Y[2], X[4], Y[4], ……, section; we calculated and analyzed each metric for each
X[S/8], Y[S/8] } one of the medical images at the four phases of the
3. X́ [1 … S/8] = Enc_Img, Ý [1 … S/8] = proposed system:
Enc_Steg_Img
• The original medical image (Org_Img)
Scrambling Algorithm at the receiver side:
Inputs: Enc_Img, Enc_Steg_Img: that are received from the • The (Steg_Img), that represent the medical image
transmitter side mixed with the patient’s information
Outputs: Enc_MI and Enc_SI: that will be passed to the • The encrypted medical image (Enc_Img)
decryption algorithm • The encrypted steganography image
(Enc_Steg_Img)
In this algorithm we will separate (X́ & Ý ) to generate (X & For conducting those experimental tests; we used
Y) :
MatLab for simulation because it supports image

296

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

processing by using a group of orders under the Image


Processing Tool Box.

In the following experimental tests and for the evaluation


purposes, we selected three grey-scale medical images to
be applied on the proposed technique: {EyeIris, Chest
and Hand}; each image has (512 X 512) pixels; known
that each pixel needs 1-byte of storage; that means each
image needs 262144-byte of storage. We choose (59022
byte of data) that represents: {patient’s information,
medical image report, description about the case, etc…)
to be embedded in each one of the medical images (cover
images) which forms (22.5%) of the total size of each
one of the cover images.
Fig. 4 Testing the EyeIris image at the sender side
We chose the following encryption key randomly to be
used by MJEA algorithm for the encryption/decryption
process in all experimental tests (given in hexa-decimal
notation):
K (120-bit)= 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 0 0 9 9 7 7 5 5 3 3 1 1 2 2

3.1 Visual Testing for the Proposed Method


In this section we did a series of experiments to show the
effectiveness and the correctness of the proposed
technique; to do this:
• We need to proof that the sender is able to send
both the medical image and the secret data that
represents: {patient’s information, medical
image report, description about the case, etc…)
securely to the other party. Fig. 5 Testing the Chest image at the sender side
• We need to ensure that the receiver is able to
recover back the exact original medical image
that was sent by the sender and to extract the
secret data from the (Steg_Img) without any
loss.

For this test, we applied all selected medical images on


the proposed technique. Figures (4-6) show all results for
this experiment for the (EyeIris, Chest and Hand )
images at the sender side: Figures (4-6).a show the
medical images (Org_Img) that should be sent securely
to the other party, Figures (4-6).b show images that
represents the secret patient’s information (Pat_Info) that
should be sent securely to the other party, Figures (4-6).c
show the medical images after they were encrypted by
using MJEA and the help of the encryption key
Fig. 6 Testing the Hand image at the sender side
(Enc_Img), Figures (4-6).d show the (Steg_Img) that
hides the patient’s information and Figures (4-6).e show
Assuming that the bundle that was sent by the sender is
the (Enc_Steg_Img). Note that: {Figures (4-6).c &
received correctly and securely and the receiver use the
Figures (4-6).e} forms the two shares that will be sent to
same encryption / decryption key that was used at the
the receiver side. Both figures in this bundle are
sender side. Figures (7-9) show all results for this
encrypted by using MJEA and the help of (120-bit) key;
experiment at the receiver side: Figures ((7-9).a and (7-
there is no risk sending them over unsecured channel
9).b) show the bundle that was received from the sender,
because they are protected against man-in-the-middle
the first part of this bundle represents the
attack.
(Enc_Steg_Img) and the second part represents the

297

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

(Enc_Img). After we separate those parts and decrypt


them by using MJEA and the help of (K=120-bit) we got
the original medical images that are shown in Figures (7-
9).c and the (Steg_Img) which are shown in Figures (7-
9).d. The last step in this process is to extract the original
secret information out of the (Steg_Img); this can be
done by Xoring Figures (7-9).c and (7-9).d together and
all results are shown in Figures (7-9).e which represents
original patient’s information that was sent by the sender.
Note that the recovered medical images and patients’
information that are shown in Figures ((7-9).c and (7-
9).e) are exactly the same as the original ones that are
shown in Figures ((4-6).a and (4-6).b) that were sent by
the sender. Figures (7-9).e looks intact with Figures (4-
6).a and the recovered patient’s information are exactly
the same as the one that was sent by the sender. This Fig. 8 Testing the Chest image at the receiver side
means that the proposed system at the receiver side was
able to recover back the original medical images and
patient’s information that were sent by the sender
without any loss.

As a final note on this test; it is obvious that nobody can


notice by human visual system that the two shares which
will be sent to the other side contain the secret medical
image and secret patient’s information. There is no risk
sending them over unsecured channel because they are
protected against man-in-the-middle attack. At the
receiver side:

In all experiments; we noticed that the recovered medical


images looks intact with the original ones that were sent
by the sender, and the recovered patient’s information
Fig. 9 Testing the Hand image at the receiver side
are exactly the same as the one that was sent by the
sender. We can conclude that the proposed system
works probably according to this test. 3.2. Histogram Analysis Test
A good image encryption scheme should always generate
a cipher image of uniform histogram for any original
images because the quality of images could be visually
noticed by applying the histogram analysis. To check the
robustness of the proposed system according to the
histogram test; we calculated and analyzed the histogram
for each one of the medical images at the four phases of
the proposed system. For this test, we applied all selected
medical images on the proposed technique. Figures (10-
12) show the histogram analysis for the (EyeIris, Chest
and Hand) images at the sender and receiver side. As we
see in this image Figures (10-12).a represent histograms
for the (Org_Img), Figures (10-12).b represent histogram
for the (Enc_Img), Figures (10-12).c represent the
histograms for the (Steg_Img), and Figures (10-12) .d
represent the histograms for the (Enc_Steg_Img). Note
that: {Figures (10-12).b and Figures (10-12).d} represent
the two shares that will be transmitted by the sender over
unsecured channel toward the receiver side. It is clear
Fig.7 Testing the EyeIris image at the receiver side that those figures are close to the flat shape. They are
fairly uniform and significantly different from the
respective histograms shown if Figures (10-12).a and

298

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

Figures (10-12).c. They does not contain any statistical


resemblance to the original image and hence does not
provide any clue to employ any statistical attack on the
proposed system. The histogram uniformity in the results
ensures the success of the proposed system in achieving
the required randomness. Also, it is hard for the
stegoanalysist to notice that there is an embedded data in
Figures (10-12).d by analyzing and comparing it with
Figures (10-12).c because it is totally different.

Assuming that the other party received correctly the


same bundle that was sent by the sender: Figures (10-
Fig. 12 The histogram of Hand image at the sender and receiver side
12).e represent the histograms for the received
(Enc_Steg_Img), Figures (10-12).g represent the
histograms for the received (Enc_Img), Figures (10-12).f Histogram measurements further confirm the robustness
represent the histograms for the decrypted (Steg_Img) level of the proposed technique; this means that the
and Figures (10-12).h represent the histograms for the proposed technique is secured against histogram analysis
decrypted medical images. Note that histograms of the attack and the known-plaintext attack.
recovered medical images that are shown in Figures (10-
12).h looks intact with histograms of the original medical 3.3 Correlation Coefficient Analysis
images at the sender side that are shown in Figures (10-
12).a; this means that the proposed system at the receiver Correlation test measures the relationship among various
side was able to recover back the original medical image adjacent image pixels and this is considered as another
that was sent by the sender without any loss. evaluator metric to examine the robustness of the
proposed system. If correlation between two pixels is
nearly 1, the image Pixels is highly correlated but if it is
nearly 0, the image pixels are highly uncorrelated; we
need to get smaller values of the correlation coefficient,
the lower values of correlation are better. The correlation
coefficient between various pairs of different medical
images have been analyzed and calculated by using
equation 1 [7]:
N

∑ ( x i − E ( x ))( y i − E ( y )) (1)
i =1
r xy =
N N
( ∑ ( x i − E ( x )) 2 ) ( ∑ ( y i − E ( y )) 2 )
i =1 i =1

Where:
Fig. 10 The histogram of EyeIris image at the sender and receiver side
xi and yi are gray level values of two adjacent pixels of
the tested image, N is the number of pairs (xi , yi ), E(x)
is the mean of xi : ∑#$% " and E(y) is the
mean of yi : & ∑#$% &"

To check the robustness of the proposed system


according to the correlation test; we calculated the
correlation between various pairs for each medical image
at the four phases of the proposed system. Table 1 shows
the correlation of: {two horizontal adjacent pixels, two
vertical adjacent pixels and two diagonal adjacent
pixels} for the {Org_Img, Steg_Img, Enc_Img and
Enc_Steg_Img }. Before start analyzing the results in
this test; we will divide the tested images into two
groups: the first group represents the plain images (not
Fig. 11 The histogram of Chest image at the sender and receiver side
encrypted) which includes {Org_Img, Steg_Img} and the
second group represents the encrypted images which
includes {Enc_Img, Enc_Steg_Img} that will be sent to
the other party.

299

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

that was used in our encryption algorithm (MJEA) which


As we can see from results for all medical images shown based on reducing correlation between neighborhood
Table 1; the correlation values for group 2 are close to pixels. Furthermore; using steganography technique
zero while it is close to one in the first group which followed by encryption resulted in a lower correlation
indicates a good performance for the proposed system compared to using encryption alone.
that is because of the powerful permutation technique
Table 1: Correlation coefficients for Iris, Chest and Hand images
Eye Iris Chest Hand
Direction Org_Img Steg_Img Enc_Img Enc_Steg_Img Org_Img Steg_Img Enc_Img Enc_Steg_Img Org_Img Steg_Img Enc_Img Enc_Steg_Img
Horizontal 0.9928 0.8064 -0.002 -0.0014 0.9958 0.7989 0.0463 0.0038 0.9917 0.7398 0.0407 -0.0016
Vertical 0.9957 0.8095 0.0024 -0.0009 0.9963 0.7994 0.0203 -0.0017 0.9931 0.7415 0.009 0.0019
Diagonal 0.9895 0.8032 -0.0003 0.0013 0.9923 0.7956 0.021 0.0009 0.9861 0.7336 0.0111 -0.0014
G −1
H e = − ∑ P ( K ). log 2 ( P ( K ))
K =0 (2)
3.4 Image Entropy Where:
He: Entropy of image
Entropy measures the uncertainty association with G: Gray value of an input image (0-255)
random variable. Block Based Image Encryption P(k): Represents the probability of the occurrence of
techniques decreases the mutual information among symbol (k)
encrypted image variables (i.e. high contrast) and thus To check the robustness of the proposed system
increases the entropy value; a ciphered image encrypted according to the entropy test; we calculated the entropy
by using such techniques should not provide any for each medical image at the four phases of the
information about the original image. When evaluating proposed system. Table 2 shows the entropy of the
the entropy for a truly random source that emits symbols {Org_Img, Steg_Img, Enc_Img and Enc_Steg_Img} for
with equal probability, it is calculated to be equals to all tested medical images.
(He= 8). Actually, a practical information source rarely As we can see in Table 2; the information entropy
generates random messages, in general its entropy value obtained in all medical images for the {Enc_Img and
is smaller than the ideal one. However, when we have a Enc_Steg_Img} are very close to the theoretical value of
secure cryptosystem; the entropy of the encrypted images 8. This means that information leakage in the encryption
should be nearly close to 8; if the output of such a cipher process is negligible and the proposed system is secure
emits symbols with entropy less than that, there exists against entropy attack. Also, we can see that using
certain degree of predictability, which threatens its steganography technique followed by encryption by
security. The information entropy is computed according using MJEA resulted in higher entropy compared to
to Equation 2 [7]. using encryption alone.

Table 2: Entropy for different medical images at the four phases of the proposed system
Img \
Entropy Org_Img Steg_Img Enc_Img Enc_Steg_Img
Eye-Iris 7.7152 7.8053 7.9913 7.9993
Chest 7.8894 7.7903 7.9837 7.9991
Hand 8.8319 7.1795 7.7833 7.9985
-./01
PSNR 10 log % -23 (dB) (3)
The entropy values for the two shares that will be sent to
the other party are very close to 8 which ensures a good Where MAXi is the maximum value of the samples and
performance for the proposed system according to this it equal 255 for a monochrome image have 8 bits per
test. pixel
MSE (Mean Square Error) which defines as the square of
3.5 PSNR and MSE Comparison Test error between the (Cov-Img) and the (Steg-Img) and it is
calculated by using Equation 4. Higher value of MSE
PSNR (Peak Signal to Noise Ratio) is a measure of the means more image distortion.
6=
quality of the image and it is measured by comparing the MSE -∗6 ∑-= 0$% 7>$% C i, j ; S i, j
<
(4)
(Cov-Img) with the (Steg-Img). And it is calculated by Where: M*N is the image size, C(i,j) is intensity of the
using Equation 3. Higher PSNR value indicates better pixel at the Cov-Img and S(i,j) is the intensity of the
quality of image (i.e. lower distortion which decrease the pixel at the Steg-Img.
possibility of visual attach by human eyes) [1].

300

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

To conduct this test, we embedded (59022 byte of data) The performance evaluating process that was done in this
that represents: {patient’s information, medical image research involves several experimental tests to check the
report, description about the case, etc…) in each one of invisibility and the robustness properties of the proposed
the selected medical images then we calculated the technique; from the simulation results we can conclude
PSNR and MSE values for all {Steg_Img, Enc_Img and the following points:
Enc_Stego_Img } produced by the proposed technique. • In all results obtained for all figures that represent
Table 3 shows the MSE and the PSNR results for this the two shares which will be sent to the receiver
test. side; we noticed the following points:
Based on the visual testing result: the two
Table 3: PSNR and MSE results shares looks scrambled because the proposed
Images MSE PSNR system was able to add more image distortion to
them; which makes it difficult for anyone to
[EyeIris_Img, Steg_Img] 912.297 18.5294
notice by human eyes that there is exist a hidden
[EyeIris_Img, Enc_Img] 1.04E+04 7.98E+00 data in those images. There is no risk sending
[EyeIris _Img,Enc_Steg_Img] 1.08E+04 7.89E+00 them over unsecured channel because they are
protected against man-in-the-middle attack.
[Chest_Img, Steg_Img] 1.15E+03 1.75E+01
The correlation values for those shares are very
[Chest_Img, Enc_Img] 1.24E+04 7.20E+00 close to zero which indicates a good
[Chest_Img,Enc_Steg_Img] 1.28E+04 7.07E+00 performance for the proposed system that is
because of the powerful permutation technique
[Hand_Img, Steg_Img] 1.35E+03 1.88E+01
that was used in our encryption algorithm
[Hand_Img, Enc_Img] 1.32E+04 8.92E+00 (MJEA) which based on reducing correlation
[Hand_Img,Enc_Steg_Img] 1.40E+04 8.88E+00 between neighborhood pixels.
The information entropy for those shares are
As seen from the results above for all medical images; very close to the theoretical value of 8. This
the MSE values for the encrypted images goes up means that information leakage in the
compared to the steganography images and the PSNR encryption process is negligible and the
values for the encrypted images goes down compared to proposed system is secured against entropy
the steganography images; so the performance of the attack.
proposed system shows a good behavior under the PSNR The MSE values for the two shares goes up and
and MSE tests. This result ensures the strength of the the PSNR values goes down compared to the
proposed system that was able to add more image steganography images. So, the performance of
distortion; which makes it difficult for anyone to notice the proposed system shows a good behavior
by human eyes that there is exist a hidden data in the under the PSNR and MSE tests.
encrypted images that will be sent to the other party. • The histogram uniformity in the results ensures the
robustness level of the proposed technique; this
All experimental results proved the capability of the means that our system is secured against histogram
proposed system in providing a secure distribution of analysis attack and the known-plaintext attack.
medical images and patient’s information between • Furthermore; using steganography technique
entities while transmission over unsecure channel. At the followed by encryption by using MJEA resulted in a
receiver side, the proposed system was able to recover lower correlation and higher entropy compared to
back the original medical image and the patient’s using encryption alone.
information that was sent by the sender without any loss. • The receiver was able to recover back all medical
images and patients’ information and they looks
exactly the same as the original ones that were sent
4. Conclusions and Future Work by the sender without any loss which means that our
proposed technique works correctly.
Medical information and medical images are often • There was no capacity limitation to the patient’s
closely related to patients’ privacies which should be information that will be embedded in the medical
kept secret and need to be protected while transmission image; the only limitation is the size of the patient’s
over unsecured channel for diagnosis in order to prevent information; it should not exceed the size of the
malicious tampering. medical image.
The main contribution of this research is developing a Some further work that could be done to improve the
new security system that combine cryptography and performance of the proposed system:
steganography techniques to provide a secure
distribution for both the medical images and patient’s • Use the proposed algorithm with the transform
information to the other party over un-secure channel to domain embedding technique which will improve
protect it against attackers. the robustness of the algorithm

301

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

• Try to use the losses compression image format such Systems", Telecommunications and Radio
Engineering, Vol. 67, No. 19, 2008, pp. 1777-1790.
as JPEG.
[13] A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris,
• Try to use 32-bit color medical images "Multiple Image Watermarking Applied to Health
• Try to secure 3-D medical image during Information Management", IEEE Transactions on
transmission Information Technology in Biomedicine, Vol. 10,
No. 4, 2006, pp. 722-732.
• Try to use the idea of cloud computing for our [14] D. Nilanjan, P. Moumita , D. Achintya, "A Session
proposed system Based Blind Watermarking Technique Within the
• More thorough testing and analysis to get better NROI of Retinal Fundus Images for Authentication
performance Using DWT, Spread Spectrum and Harris Corner
Detection", International Journal of Modern
Engineering Research, Vol. 2, Issue. 3, 2010, pp.
References 749-757.
[15] M. Soliman, A. Hassanien, N. Ghali, and H. Onsi,
[1] M. Barni, F. Bartolini, "Data Hiding for Fighting "An Adaptive Watermarking Approach for Medical
Piracy", IEEE Signal Processing Magazine, Vol. 21, Imaging Using Swarm Intelligent", International
No. 2, 2004, pp. 28–39. Journal of Smart Home, Vol. 6, No. 1, 2012, pp. 37-
[2] V. Fotopoulos, M. Stavrinou, and A. Skodras, 49.
"Medical Image Authentication and Self-Correction [16] X. Zhou and H. Huang, "Authenticity and Integrity of
Through an Adaptive Reversible Watermarking Digital Mammography Images", IEEE Transactions
Technique", in Proceedings of the 8th IEEE on Medical Imaging, Vol. 20, No. 8, 2001, pp. 784-
International Conference on BioInformatics and 791.
BioEngineering (BIBE’08), 2008, pp. 1–5. [17] M. E. Whitman, H. J. Mattord, Principles of
[3] O. Pianykh, Digital Imaging and Communications in Information Security, Fourth Edition, Course
Medicine (DICOM), Springer-Verlag, 2012. Technology, 2012.
[4] L. Kobayashi, S. Furuie, and P. Barreto, "Providing [18] P. Hall, Modern Cryptography: Theory and Practice,
Integrity and Authenticity in DICOM Images: A Hewlett-Packard Company, 2003.
novel Approach", IEEE Transactions on Information [19] M. Juneja , P. Sandhu, "Designing of Robust Image
Technology in Biomedicine, Vol. 13, Issue. 4, 2009, Steganography Technique Based on LSB Insertion
pp. 582-589. and Encryption", in Proceedings of the International
[5] W. Stallings, Cryptography and Network Security: Conference on Advances in Recent Technologies in
Principles and Practice, Prentice Hall, 2013. Communication and Computing, 2009, pp. 302-305.
[6] G. Alvarez, S. Li, and L. Hemandez, "Analysis of [20] K. Joshi, R. Yadav, "A New LSB-S Image
Security Problems in A medical Image Encryption Steganography Method Blend with Cryptography for
System", Computers in Biology and Medicine, Vol. Secret Communication", in Proceedings of the Third
37, No. 3, 2007, pp. 424-427. International Conference on Image Information,
[7] U. Acharva, P. Bhat, S. Kumar, and L. Min, 2015, pp. 86-90.
"Transmission and Storage of Medical Images with [21] Y. Renaer, Z. Zhiwei, T. Shun, D. Shilei, "Image
Patient Information", Computers in Biology and Steganography Combined with DES Encryption Pre-
Medicine, Vol. 33, No. 4, 2003, pp. 303-310. processing", in Proceedings of the Sixth International
[8] A. Mahmood, R. Dony, "Segmentation Based Conference on Measuring Technology and
Encryption Method for Medical Images", in Mechatronics Automation, 2014, pp. 323-326.
Proceedings of the 6th International Conference on [22] S. Ushll, G. Kumal, K. Boopathybagan, "A Secure
Internet Technology and Secured Transactions, Triple Level Encryption Method Using Cryptography
December 2011. and Steganography", in Proceedings of the
[9] F. Taleb, "A New Chaos Based Image Encryption International Conference on Computer Science And
Scheme Using Chaotic Logistic Maps", in Network Technology, 2011, pp. 1017-1020.
Proceedings of the Multimedia Computing and [23] G. S. Charan, N. Kumar, B. Karthikeyan, V.
Systems 2014 International Conference (ICMCS), Yanathan and K. Lakshmi, "A Novel LSB Based
2014, pp. 1222-1228. Image Steganography with Multi-Level Encryption",
[10] H. Chao, C. CM, S. Miaou, "A Data Hiding International Conference on Innovations in
Technique with Authentication, Integration, and Information, Embedded and Communication Systems
Confidentiality for Electronic Patient Records", IEEE (ICIIECS), Coimbatore, India, 19-20 March 2015.
Transactions on Information Technology in [24] S. Laskar, K. Hemachandran, "High Capacity Data
Biomedicine, Vol. 6, No. 1, 2002, pp. 46-53. Hiding Using LSB Steganography and Encryption",
[11] G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland, and International Journal of Database Management
R. Collorec, "Relevance of Watermarking in Medical Systems, Vol. 4, No. 6, 2012, pp. 57-62.
Imaging", in: Proceeding of IEEE-EMBS Conference [25] W. Al-qwider, J. Bani Salameh, "A Novel Technique
on Information Technology Application in for Securing Data Communication Systems by Using
Biomedicine, Arlington, 2000. Cryptography and Steganography", Jordanian Journal
[12] C. Cruz, R. Reyes, J. Mendoza, M. Nakano, and H. of Computers and Information Technology (JJCIT),
Perez, "A Novel Verification Scheme for Vol. 3, No. 2, 2017, pp. 110-130.
Watermarking Based Image Content Authentication

302

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 5, October 2018
ISSN (Online): 2277-5420
www.IJCSN.org
Impact Factor: 1.5

[26] X. Zhang, "Reversible data hiding in encrypted [34] D. Bouslimi, and G. Coatrieux, "A joint
image", IEEE Signal Processing Letters, Vol. 18, No. Watermarking/Encryption Algorithm for Verifying
4, 2011, pp. 255–258. Medical Image Integrity and Authenticity in Both
[27] W. Hong, T. Chen, and H. Wu, "An Improved Encrypted and Spatial Domains", in Proceedings of
Reversible Data Hiding in Encrypted Images Using the 33th Annual International Conference of the
Side Match", IEEE Signal Processing Letters, Vol. IEEE- EMBS, Massachusetts USA, 2011.
19, No. 4, 2011, 2012, pp. 199–202. [35] P. Viswanathan and P. Krishna, "Randomized
[28] A. Lavanya and V. Natarajan, "Watermarking Patient Cryptographic Fusion Watermarking Medical Image
Data in Encrypted Medical Images", in Proceedings with Reversible Property", International Journal of
of the Sadhana-Academy in Engineering Computer Information Systems, Vol. 2, 2011.
Sciences,2012, Vol. 37, pp. 723–729. [36] J. Bani Salameh, "A New Symmetric-Key Block
[29] X. Zhang, "Separable Reversible Data Hiding in Ciphering Algorithm", Middle-East Journal of
Encrypted Image", IEEE Transactions on Information Scientific Research (MEJSR), Vol. 12, No. 5, 2012,
Forensics and Security, Vol. 7, No. 2, 2012, pp. 826– pp. 662-673.
832. [37] J. Bani Salameh, "An Investigation of the Use of
[30] D. Bouslimi, G. Coatrieux, M. Cozic, and C. Roux, MJEA in Image Encryption", WSEAS Transactions
"A Joint Encryption /Watermarking System for on Computers, Vol. 15, 2016, pp. 12-23.
Verifying the Reliability of Medical Images", IEEE
Transactions on Information Technology in Biography:
Biomedicine, Vol. 16, 2012, pp. 891–899.
[31] S. Zhang, G. Tiegang, and L. Gao, "A Novel Dr. Jamal N. Bani Salameh was born in Irbed,
Encryption Frame for Medical Image with Jordan. He received the B.C degree in Electrical
Watermark Based on Hyperchaotic System", Engineering from Mutah University, Jordan, in
1988, M.S. and Ph.D. degrees in Computer
Mathematical Problems in Engineering, Vol. 11,
Engineering from New Mexico State University,
2014, https://doi.org/10.1155/2014/240749. U.S.A, in 2000 and 2005. Dr. Bani Salameh
[32] W. Puech, "An Efficient Hybrid Method for Safe became Associate Professor at the Department of
Transfer of Medical Images", in Proceedings of the Computer Engineering of Mutah University in
2nd International Conference: E-Medical Systems, 2013 and has published widely in international
2008, PP. 29-31. journals. He now works as Vice Dean of Faculty of Engineering at
[33] A. Umamageswari, U. Ferni, and G. Suresh, "A Mutah University. His research interests are in the fields of wireless
Survey on Security in Medical Image computer networks, multicast routing, network security and
cryptography. Dr. Bani Salameh held a number of administrative
Communication", International Journal of Computer
positions including Chairman of the IT Department, SUR College for
Applications, Vol. 30, No.3, 2011. Applied Sciences, Oman, Sept. 2010 – Aug. 2011, Chairman of the
Computer Engineering Department, Mutah University, Jordan, Sept.
2015 – Sept. 2016.

303

Copyright (c) 2018 International Journal of Computer Science and Network. All Rights Reserved.

View publication stats

You might also like