Transactions on Machine Intelligence

Transactions on Machine Intelligence

Image Steganography of MRI Using 2D Wavelet Transform

Document Type : Original Article

Authors
1 Department of Biomedical Engineering, Faculty of Electrical and Computer Engineering, Babol Noshirvani University of Technology, Babol, Iran
2 Associate Professor, Department of Biomedical Engineering, Babol Noshirvani University of Technology, Babol, Iran
Abstract
With the increasing use of the internet and the growing volume of exchanged data, it has become possible to store and send medical information about patients. On the other hand, the use of these methods poses significant risks to the privacy of patient information. Therefore, the use of information hiding techniques, in such a way that the information is not easily detectable or alterable, has become essential. One such method is steganography. In this paper, magnetic resonance imaging (MRI) images are used as hosts for steganographic operations. In the proposed method, all wavelet coefficients of the secret image are embedded in the coefficients of the host image using the suggested α relation. In the experiments conducted, the performance of the wavelet-based steganography in embedding the secret image coefficients into the approximation, horizontal, vertical, and diagonal detail coefficients of the host image at four wavelet decomposition levels are compared. The comparison is performed using the Mean Squared Error (MSE) and Signal to Noise Ratio (SNR) metrics. The results show that steganography at the fourth level of wavelet decomposition, with embedding in the diagonal details, provides the best outcome in terms of both visual and statistical quality.
Keywords

  • Ahsan, M., & Siddique, Z. (2021). Machine-learning-based disease diagnosis: A comprehensive review. Healthcare, 10. https://doi.org/10.3390/healthcare10030541
  • Li, X., Morgan, P., Ashburner, J., Smith, J. C., & Rorden, C. (2016). The first step for neuroimaging data analysis: DICOM to NIfTI conversion. Journal of Neuroscience Methods, 264, 47-56. https://doi.org/10.1016/j.jneumeth.2016.03.001
  • Kaur, S., Singhal, R., Farooq, O., & Ahuja, B. S. (2010). Recent trends in information, telecommunication and computing (ITC). International Conference on 2010, 140-144. https://doi.org/10.1109/ITC.2010.96
  • Navas, K., & Sasikumar, M. (2007). Proceedings of the International Conference on Sciences of Electronics, Technologies of Information and Telecommunications, 25-29.
  • Pastorfide, E., & Flores, G. (2008). An image steganography algorithm for 24-bit color images using edge-detection filter.
  • Li, H., Song, W., & Wang, S. (2006). 18th International Conference on Pattern Recognition (ICPR'06), 639-642.
  • Abdulla, A. A., Sellahewa, H., & Jassim, S. (2019). Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimedia Tools and Applications, 78, 17799-17823. https://doi.org/10.1007/s11042-019-7166-7
  • Thangavel, P., & Kumaran, T. (2007). IEEE International Symposium on Industrial Electronics, 1755-1760. https://doi.org/10.1109/ISIE.2007.4374871
  • Wu, Y., & Wu, W. (2021). Combinations of superior inorganic phosphors for level-tunable information hiding and encoding. Advanced Optical Materials, 9. https://doi.org/10.1002/adom.202100281
  • Zain, J. M., & Fauzi, A. R. (2007). 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 5661-5664. https://doi.org/10.1109/IEMBS.2007.4353631
  • Hassan, M. H., & Gilani, S. (2006). World Academy of Science, Engineering and Technology, 19, 39-43. https://doi.org/10.1088/2058-7058/19/11/38
  • Arnold, M., Schmucker, M., & Wolthusen, S. D. (2002). Techniques and applications of digital watermarking and content protection. Artech House.
  • Johnson, N. F., & Katzenbeisser, S. (2000, May). A survey of steganographic techniques. Information Hiding, 43-78.
  • Zain, J. M., & Clarke, M. (2011). Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. arXiv preprint arXiv:1101.1603.
  • Singh, Y. S., Devi, B. P., & Singh, K. M. (2013). A review of different techniques on digital image watermarking scheme. International Journal of Engineering Research, 2(3), 194-200.
  • Poljicak, A., Mandic, L., & Agic, D. (2011). Journal of Electronic Imaging, 20, 033008-033008-033008. https://doi.org/10.1117/1.3609010
  • Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2010). Signal Processing, 90, 727-752. https://doi.org/10.1016/j.sigpro.2009.08.010
  • Wu, C.-F., & Hsieh, W.-S. (2000). IEEE Transactions on Consumer Electronics, 46, 87-94. https://doi.org/10.1109/30.826385
  • Langelaar, G. C., Setyawan, I., & Lagendijk, R. L. (2000). IEEE Signal Processing Magazine, 17(5). https://doi.org/10.1109/79.879337
  • MaruthuPerumal, S., & VijayaKumar, V. (2011). International Journal of Computer Applications, 15, 29-36. https://doi.org/10.5120/1926-2571
Volume 5, Issue 4
Autumn 2022
Pages 248-255

  • Receive Date 29 May 2022
  • Revise Date 18 July 2022
  • Accept Date 12 December 2022