Research Article | Open Access
Reversible Data Hiding in FTIR Microspectroscopy Images with Tamper Indication and Payload Error Correction
Fourier transform infrared (FTIR) microspectroscopy images contain information from the whole infrared spectrum used for microspectroscopic analyses. In combination with the FTIR image, visible light images are used to depict the area from which the FTIR spectral image was sampled. These two images are traditionally acquired as separate files. This paper proposes a histogram shifting-based data hiding technique to embed visible light images in FTIR spectral images producing single entities. The primary objective is to improve data management efficiency. Secondary objectives are confidentiality, availability, and reliability. Since the integrity of biomedical data is vital, the proposed method applies reversible data hiding. After extraction of the embedded data, the FTIR image is reversed to its original state. Furthermore, the proposed method applies authentication tags generated with keyed Hash-Based Message Authentication Codes (HMAC) to detect tampered or corrupted areas of FTIR images. The experimental results show that the FTIR spectral images carrying the payload maintain good perceptual fidelity and the payload can be reliably recovered even after bit flipping or cropping attacks. It has been also shown that extraction successfully removes all modifications caused by the payload. Finally, authentication tags successfully indicated tampered FTIR image areas.
Capturing image information from the whole infrared spectrum limited only by the near diffraction limit of light has now allowed scientists to further exploit the possibilities of microspectroscopic analysis. To give an example, analyzing the infrared spectrum enables the acquisition of biochemical information out of a tissue for the diagnosis and the assessment of cell functionality [1, 2]. Specifically, Fourier transform infrared (FTIR) microspectroscopy is a widely used technology in life science applications. In FTIR microspectroscopy, a FTIR spectrometer is connected to an optical microscope and the transmission of infrared light through the sample (or the reflection from the sample surface) is measured as a function of wavelength. Standard FTIR microscopes can collect chemical microscopic images with a spatial resolution of approximately 5–10 μm . FTIR microspectroscopy helps scientists to study and analyze the heterogeneity of samples, their biochemical characterization, and, for example, the distribution of drugs in tissues. Nowadays, storage and circulation of FTIR image files become more and more common and thus new requirements come to place. Those requirements have to do primarily with the efficient management of this data and secondly with security issues. In this paper, we will specifically deal with those requirements using FTIR spectral images and their corresponding visible light images sampled from the human articular cartilage. Currently, those two images are transferred and stored in databases as separate files.
Data management efficiency refers to storing and transferring multiple data entities as efficiently as possible. In this case, by multiple entities, we refer to the FTIR images and their corresponding visible light images, as well as other possible Electronic Patient Records (EPR). Because of regular transfer of biomedical material, there is a risk of data loss. Constant transfer and storage of biomedical data raises other security issues. Some among the most important are data confidentiality, availability, and reliability . Concerning confidentiality, biomedical data can come with private patient information and thus direct access to all data by nonauthorized users would violate the privacy. Availability refers to the ability to access all the different entities or files at any moment. This is not necessarily guaranteed when data is stored and circulated in separate files. Last, reliability is related to the problems of verifying integrity of data, as well as tracing and validating authentic data. Tampered data can mislead and cause errors in the diagnosis and similar problems can occur when nonauthentic material is used. Since biomedical data is sensitive and sometimes used even for diagnoses, mechanisms and techniques for tracing and validating authentic content are of high importance. A data hiding method is a complementary solution to the management and security issues by enabling the combination of different data entities in one, as well as the recoverability of the payload and the tamper proofing of the host data. Since in this case we use biomedical data, a reversible data hiding method is preferred. Reversible data hiding is described as the process of embedding a set of data in a host digital object . This process produces a new object from which can be reliably located and extracted . Parallel to extraction, is reversed to its original state by removing all modifications.
This paper proposes a data hiding method for embedding the visible light image in the FTIR spectral image, including authentication tags of the original FTIR image generated using Hash-Based Message Authentication Codes (HMAC) for authentication and tamper proofing purposes. Moreover, all necessary side information is also included in the payload. Prior to embedding, all payload data is encoded using error correcting codes. Because of the sensitivity of the host, after the extraction of the payload from the FTIR image, all modifications are removed and therefore its original state is recovered. The error correcting codes used in this method were designed to recover data from two attack scenarios. The first one is least significant bit flipping due to noise and the other one is removal attacks. Both attacks might take place in one, more, or all spectral components of FTIR pixels. All experiments in this paper used research data collected from Oulu university hospital taken from human articular cartilage samples, that is, the connective tissue that provides resistance to compressive forces during joint movements .
In this method, by combining all the entities associated with the FTIR microspectroscopy in a single package, data management efficiency is increased since the access to the different entities is done through a single FTIR image. Furthermore, storing all components in the same structure reserves more space and the linkage between files is not necessary any more as everything is included in this same structure. Access to embedded data is only given to entitled users with access to the extracting code. Furthermore, all information such as patient details or EPR can be encrypted before it is hidden and therefore confidentiality is maintained. Availability is guaranteed since all the data is combined in the same entity and thus access to the visible light image for a given FTIR segment is always available. Last, reliability is assured since tampered areas can be revealed using authentication tags. To sum everything up, for data management efficiency and security purposes, this paper proposes a method of embedding related data in FTIR spectral images, including authentication tags. This enables constant availability of data and tamper detection capabilities.
The paper is organized as follows. Section 2 includes the state of the art in hyperspectral image watermarking. Past literature is primarily dealing with hyperspectral satellite images. Further to that, some biomedical applications based on the comparable data are also presented. Section 3 features the key technological components used in this method. Section 4 includes the main part of this paper, that is, the description of the data hiding methods. Section 5 explains the data formats concerning the FTIR spectral image and the visible light image. Secondly, it presents the experimental results and the discussion. Last, Section 6 is the conclusion part of this paper, including suggestions for improvements on future work.
2. State of the Art
Before the reference to biomedical applications, this section begins with the background of hyperspectral image data hiding and watermarking. Hyperspectral imaging concerns the collection and process of information originating from the whole electromagnetic spectrum. The purpose of hyperspectral imaging is to obtain the spectrum for each pixel in the image of a scene in order to find objects, identify materials or tissues, and detect processes [6, 7]. Past data hiding literature focuses on remote sensing satellite images. Remote sensing is a subfield of geography. In modern usage, the term generally refers to the use of aerial sensor technologies to detect and classify objects on Earth. The data is sampled from multiple parts of the electromagnetic spectrum and combined with larger scale aerial or ground-based sensing. Consequently, it provides researchers with enough information to monitor trends, including both long and short term phenomena. Data hiding in 3D hyperspectral structures can be done with two different approaches. Firstly, it is done by processing each pixel independently. In this case, though, the size of the vectors might be too small; thus the redundancies are not enough to give enough capacity to store the watermark. Secondly, it is possible to process each image row as a 2D image structure, the second dimension given by the wavelength. This corresponds to the most usual capture process.
In 2003, Tamhankar et al.  proposed a watermarking scheme based on the Redundant Discrete Wavelet Transform (RDWT) and applied to hyperspectral signatures to protect ownership rights and deter any illegal use. It is designed for the data collected by handheld devices that measure reflectance of electromagnetic waves in the wavelength range of 350 nm to 2500 nm. For embedding, the watermark the RDWT was chosen as the transform domain. Specifically, the watermarks were hosted in the RDWT coefficients from the second level of two-level decomposition.
In 2003, Kaarna and Toivanen  developed a hyperspectral image digital watermarking method where the payload is a grayscale image. The method is based on the use of Principal Component Analysis (PCA) transformation getting the eigenimages and eigenvectors and in a second stage the wavelet transform is applied to each eigenimage. Each pixel of the wavelet transform of the watermark image is embedded in the most appropriate eigenhost image transform. In that way, the watermark is embedded throughout the spectrum. It is a well considerable approach when robustness against noise or lossy compression is required. In 2004, Kaarna and Parkkinen  proposed an improved version where the multiwavelet transform is used. Specifically, the method uses the Chui-Lian multiwavelets  to create the 3D wavelet transform of the host hyperspectral satellite image. As for the payload, it is again a grayscale image. For the watermarking process, first, a single level scalar wavelet transform is produced from the watermark image. Then, the 3D multiwavelet transform is generated from the hyperspectral host image and the watermark is added. For each watermark pixel, the most appropriate band of the transform block is selected. In 2004, Qin et al.  presented a semifragile watermarking scheme based on wavelet transforms. The edge and texture of the remote sensing image are extracted and the watermark is embedded only in the edge character. In that paper, only one band is marked. One of the purposes of the watermarking technique is to also provide information for tampered areas.
In 2006, Kbaier and Belhadj  proposed a Discrete Wavelet Transform- (DWT-) based watermarking scheme for remote sensed multispectral images. For reduced Mean Square Error (MSE) figures, they calculated the embedding strength separately for each spectral band. Serra-Ruiz and Megías in 2010  proposed a method that uses the whole signature to embed a watermark for tamper detection using vector quantization. In the same year, Serra-Ruiz and Megías  proposed a semifragile watermarking scheme for remote sensing images. They exploit DWT watermarking and the low frequency (LL) subband in order to offer tamper proofing capabilities. The watermarks’ fragility is exploited to indicate tampered image areas. The method can be tuned to embed the mark according to band relevance, depending on the content and the signatures to be protected. The technique is robust on JPEG compression and fidelity was high for every band, that is, PSNR over 60 dB.
The literature review did not reveal any hyperspectral watermarking techniques proposed for biomedical data. Nevertheless, reversible data hiding for data tampering and recoverability is considered by Liew and Zain . The paper presents a method to protect 8-bit grayscale ultrasound images from unauthorized modification or destruction. The method is based on LSB substitution and on the Region of Interest-Region of No Interest (ROI-RONI) concept. Authentication and recovery data replace LSBs of the ROI, and, to enable reversibility, bits that have been replaced are embedded in RONI area that does not require reversion.
Other techniques more similar to FTIR spectral image data hiding technique are biomedical video watermarking methods. That is because the FTIR structure is similar to the video, but instead of the time dimension of the video, the third dimension is the one going over spectral components. Two examples are the data hiding method proposed by Dey et al. in 2012  and by Achrajee et al. in 2014 . The papers present data hiding methods designed to embed EPR or other data in intravascular ultrasound video. Both methods rely on redundancy in the motion vector where the watermark bits are embedded.
3. Key Technological Components
The proposed data hiding method makes use of a few key technological components. Some of those are established methods like those used for error correction and others were developed specifically for use on the currently proposed data hiding method. This section gives the necessary information about them to clarify the step by step description of the data hiding method in the next section.
3.1. Hash-Based Message Authentication Codes (HMAC)
The data hiding method includes the payload authentication tags created using HMAC. Those are generated from the original FTIR before the data is inserted. After extraction and reversion, authentication tags are generated again from the FTIR and compared with the ones that have just been acquired from the extracted payload. This comparison indicates whether some locations or spectral components of the FTIR have been possibly tampered. If there are no such indications, it confirms that reversion runs successfully and that the modifications of hidden data have been removed. Furthermore, they can indicate tampering that was caused because of noise or other forms of attack in the host FTIR spectral image.
In cryptography, a keyed Hash Message Authentication Code or, for short, HMAC, is a specific type of message authentication code (MAC) involving a cryptographic hash function (hence, the “H”) in combination with a secret cryptographic key. They are used for data integrity and authentication of messages.
Cryptographic hash functions are typically used to ensure the integrity of data. A cryptographic hash function can be applied on a message of arbitrary length to generate a short fixed sized message digest that can be subsequently used for integrity testing. MACs are keyed cryptographic hash functions that additionally guarantee authenticity of the data. For a MAC, a secret key is needed in order to generate a valid digest. The same key is also needed to check the validity of the digest.
In our case, both the data and the message digest are embedded, which means that a hash function is not sufficient (an attacker could easily modify both the data and its digest). We apply a keyed HMAC using the SHA256 hash function to ensure the authenticity of the data. HMAC  is a well-studied and used method of turning cryptographic hash functions into MACs with a proof of security . SHA256 is a member of the SHA-2 family of cryptographic hash functions  with a 256-bit digest length. It is one of the most widely used cryptographic hash functions and widely considered to be secure.
HMAC-SHA256 is, in this case, used to create unique identifiers, that is, authentication tags for bundles of spectral components, as well as groups of pixels to locate spatial and spectral location of tampered data.
3.2. Reed-Solomon Codes
This paper is going to analyze two basic threat scenarios. The first one included attacks that caused bit flips and the second one cropping and removal attacks causing missing bits. For the first scenario, Reed-Solomon codes are the most appropriate solution.
Reed-Solomon codes are a group of error correcting codes introduced by Reed and Solomon in 1960 . It is a widely used method for error correction in data disks. Reed-Solomon codes are specifically designed to correct multiple symbol errors. It is a linear block code of length with dimension and minimum Hamming distance . It will be represented with ReedSolomon and it can correct up to symbols. For instance, a Reed-Solomon code operating on 8-bit symbols has symbols per block.
3.3. Deletion Channel Correction
The second threat scenario that will be analyzed in this paper is the one with cropping or removal attacks. In this case, since we are using FTIR spectral images, one, more, or all spectral components are removed out of certain pixels. Due to this process, it is most likely that bits will be missing out of the extracted bit stream. The end result is a deletion channel.
For the deletion channel correction, the proposed method uses the implementation by Duda using correction trees. The correction trees are big trees that contain all the possible solutions. The encoding method that was used of this implementation is based on encoding used in binary symmetric channel in the past .
This scenario may have exceptions, including bit flips instead of missing bits. Those errors can be accepted in most of the payload data but not in the side information. A single error in the extracted side information necessary in each iteration of the extracting procedure can cause it to halt and therefore a solution had to be designed. This solution was based on a time-consuming trial and error approach and thus this is why it was only applied for side information and not for the whole payload. Given a chunk of data, what the method does is detecting the existence of bit errors that the deletion channel correcting code is unable to repair. Then, it attempts to proceed by removing parts of this chunk until the problematic bits are removed and replaced by the original ones. This relies on the fact that the problem has been converted to a deletion channel.
3.4. Histogram Shifting
Reversibility and high capacity were the most important requirements in his method. Therefore, a histogram shifting-based approach was preferred. This concept was introduced by Ni et al.  followed by improvements by Tsai et al.  and Fallahpour et al. . The idea behind this technique is that a zero and a peak point are located in the image histogram and then by modifying corresponding pixel intensities all values between the peak and zero point are shifted towards the zero point creating one empty bin next to the peak. Then, once again, the image is scanned pixel by pixel and pixels with intensity value corresponding to the peak point are lowered or increased to match the value of the emptied bin. Modified values represent 1 s and unmodified values represent 0 s. After extraction, the histogram is shifted back to its original state reversing also the image to its exact initial state. The process is illustrated in Figure 1.
Tsai et al.  implemented a data hiding method designed for static biomedical images. In the proposed scheme, histogram shifting data hiding was applied after employing a linear prediction technique on the host image to expand linear prediction errors instead of pixel intensities. First, the image is divided into × blocks; then in each block a basic pixel is selected. The difference between the basic and the other pixels is calculated and replaced with the original values calculating the residual image. Last, histogram shifting is applied with one or more peak and zero pairs. Similarly, Zeng et al.  implemented a reversible data hiding method in uncompressed videos exploiting their interframe prediction. This method performs double histogram shifting (two peak and two zero points) in the histogram produced from the estimation error for each video frame as follows:where represents the current frame, the predicted frame, and × their dimensions. The method starts embedding from the last frame to the first and, in each iteration, the detected peak and zero points are embedded fused with the payload in the next pair of frames to be used as side information in the extracting procedure. When the last frame is reached, an approach without the need for a reference frame can be used to store the last bits of the peak and zero points. In the extracting procedure, the loop is performed the other way around so that the side information for the next frame would always be available. The basic idea was reworked for FTIR spectral images. The inspections showed suitability of using the difference matrix between two consecutive spectral components as follows:where and are the two spectral components and × the dimensions of every component.
3.5. Data Quantization
In digital images, in order to form digital function, the gray-level values have to be converted into discrete quantities. This process of assigning the intensity levels to discrete values is called quantization . The quantization process can also refer to downsampling discrete values. The current implementation falls in the second case as initially the quantization step was low due to the large bit depth and accordingly the generated histogram did not provide enough capacity.
The tested FTIR image samples were in 24-bit floating-point format, which for the difference matrix of two spectral components means histogram bins, while the original histogram shifting method was optimized for 8-bit images and thus for bins. For this reason, similar to our previous research paper , the solution was to downsample the FTIR spectral component difference matrix histogram from to bins. This downsampling process should not downgrade the actual quality; otherwise, reversion is not possible. For this reason, what is applied is not actual downsampling but a process better described as “grouping.” The difference matrix is not modified but instead a histogram is generated with histogram bins corresponding to a broader range of values. The quantization step is calculated as follows:where is the maximum intensity FTIR value, the minimum intensity FTIR value, and the target number of histogram bins. In our case, data quantization enables the creation of discrete histograms ranging in [, 255] as they would have done in regular 8-bit images. In this way, the capacity is also highly increased being equal to the sum of the two highest peaks in the histogram. Furthermore, robustness is also considerably increased with the proposed method.
4. Proposed Method
This section describes the proposed reversible data hiding method step by step. The proposed method includes the two basic data hiding procedures, that is, the embedding procedure, where the payload is hidden in the FTIR spectral image, and the extracting/reversing procedure, where the payload is extracted and the FTIR image reversed.
4.1. Overall Description
The payload is embedded in the FTIR spectral image with imperceptible modifications producing . This payload includes the following four components: () the necessary side information required by the histogram shifting technique that includes the two peak and zero locations at the histograms; () the equivalent visible light image, a regular RGB image depicting the area from which the FTIR image was sampled; () the authentication tags produced from the original FTIR image useful for showing possible tampering at the FTIR image; and () other optional possibly private data or patient information as, for instance, the Electronic Patient Records (EPR). Before the payload is embedded in the host, it is encoded using error correction codes to make it recoverable even in the case of attacks that might later occur in the host. The embedding procedure for a block chosen out of the grid on the left is demonstrated in the block diagram in Figure 2.
The payload is extracted and decoded from the FTIR image which is reversed to the initial state . Possible tampering in can be indicated comparing the authentication tags contained in with tags generated from the reversed . The procedure is demonstrated in the block diagram of Figure 3.
Using the double histogram shifting approach with the modification described in Section 3.4 capacity is high and good fidelity between the original FTIR image and the one containing hidden data can be achieved. Moreover and most importantly, the host is reliably reversed to its original state. Furthermore, we demonstrate an alternative use of histogram shifting approaches as we did in  where we were using 32-bit MREG based on an approach initially designed for 8-bit static images. In this case, we use 24-bit FTIR images.
For the attack scenario of bit flipping by increasing or decreasing values of one or more spectral components of pixels by one unit, Reed-Solomon codes were selected. For each component of the payload, Reed-Solomon n and k had different values because of the different characteristics of the data. Furthermore, those were also dynamically selected when the side information was encoded, depending on the available capacity of the current pair of spectral components. Concerning the visible light image, the settings were different for the five most significant bits compared to the remaining three to make sure that the important information remains intact. Having the same settings for all bits would not be possible as the available capacity is not enough. Settings concerning authentication tags were always fixed. The exact and values used in each of the above cases will be stated in the step by step algorithmic description of Section 4.2.
Last, concerning the authentication tags, the HMAC-SHA256 is used to create two separate groups of tags out of the input FTIR image. The first group is created out of sets of spectral components to later determine the wavelength where tampering has taken place. In our implementation, we have used one authentication tag for every set of consecutive five spectral components. The second group of authentication tags is generated out of spatial areas to determine the pixels that have undergone tampering. In our case, we used tags for every 8 × 8 block of pixels. This will allow a double level description of the tampered area including both spatial and spectral information. The tags which were generated from the original FTIR image and now extracted with the rest of the payload, compared to the ones generated from the reversed FTIR image can show areas that failed to get to their original state or had modifications because of attacks. That is done indicating those ranges of five spectral components that contain the error and the 8 × 8 block of pixels where this occurred.
4.2. Embedding Procedure
The embedding procedure embeds data by accessing pairs of consecutive spectral components in reverse order, starting from () and ending in (). This procedure is demonstrated in the diagram of Figure 4. In every iteration, the two peak and zero points of the histograms are converted to binary form and this side information is embedded in the next iteration. When the first spectral component is reached, the peak and zero points for the last pair of spectral components that were accessed along with other possible bits of payload are stored with another reversible method for 2D images, for instance, Tsai et al.’s method , or even another method that does not require side information.
Step by step, the embedding procedure works as follows.
Input Step(i)Read FTIR image of size × and spectral components.(ii)Read visible light image of size × .
Step 1(i)Convert to binary.(ii)Encode using Reed-Solomon (, for 5 most significant bits, , for 3 least significant bits).(iii)For every set of 5 spectral components generate authentication tags.(iv)For every 8 × 8 block of pixels generate authentication tags.(v)Encode all tags using Reed-Solomon (, ).(vi)Encode all possible additional payload using Reed-Solomon; and values depend on the format of the input data and the available capacity.(vii)Combine everything in a single payload .(viii) index 1.
Step 2 Initiate Loop , :(i)Calculate spectral component difference (see (2)) .(ii)Calculate quantization step (see (3)).(iii)Using step calculate values’ threshold matrix , thresholds will show the range of values that correspond to each particular histogram bin. and are the maximum and minimum values in ; for , , (iv)Calculate histogram based on boundaries.(v)Calculate left peak and zero points and left peak and zero indexes , , , . In histogram (a) of Figure 5 those are 10, 0, −1, and −5, respectively.(vi)Calculate right peak and zero points and right peak and zero indexes Rmx, Rmn, Rmxi, Rmni. In histogram (a) of Figure 5 those are 9, 0, 1, and 6, respectively.(vii) capacity Rmx + Lmx.(viii)From second iteration onwards if (1)if capacity > 2040 encode ws using Reed-Solomon (, )(2)else if capacity > 378 encode using Reed-Solomon (, )(3)else encode using Reed-Solomon (, ). (ix)Payload wcur to be embedded in this loop is a concatenation of and (index: index + capacity − size() − 1); value is from the previous iteration; thus if then is empty.(x) index index + capacity.(xi)Convert current to binary and store in .
Step 3. Do histogram shifting operations accessing all values. Bins following the left zero up before the peak location, that is, , for every are shifted to the left by one histogram unit creating one empty bin next to the maximum peak location’s bin. From the right side, it will be bins following the right peak point until the right zero point, that is, , for every shifted to the right. The process is also illustrated in Figure 5. For , (i) if if ; (ii) if if .
Step 4. The algorithm accesses the Es’s values that fall in the range, which corresponds to the peak location histogram bins. Value indexes in this range are returned sequentially using function . As the binary information to be embedded is accessed sequentially, the voxel in order maintains its value to store a bit of 0 or is increased or decreased depending on whether it is the right or left peak, respectively, to hide a bit of 1. The modified difference matrix is added to the spectral component in index to create the new spectral component in index , as illustrated in Figure 4. Note that when the algorithm reaches the first spectral component, an alternative method for 2D images is employed. The result of this operation is demonstrated in histogram c of Figure 5. (i) For 1 ≤ id ≤ capacity (1) ← GetNextIdx; (2) if (a) if position = Left (b) if position = Right . (ii) (see (2)). Use an alternative method to store the peak and zero points for the two last spectral components hiding it in .
Output Step Return .
4.3. Extracting/Recovering Procedure
The extracting procedure extracts hidden data and reverses the image by accessing pairs of consecutive spectral components in increasing order, starting from () and ending in (). In every iteration, the peak and zero point for the next pair are obtained from the extracted binary stream. Once again, concerning the first pair, peak and zero points are extracted from the first spectral component using an alternative method. Step by step, the procedure performs as follows.
Input Step Read FTIR image of size × and spectral components.
Step 1(i).(ii)Extract the initial from and recover .(iii)Initiate Loop , : (1) Calculate spectral component difference . (2) Calculate , , (see, embedding Step ). (3) Capacity .
Step 2. The algorithm accesses the Es’s values which have intensity value within the range which corresponds to the peak location histogram bins, including the ones next to them which resulted from the modified values during embedding. Values in this range are returned sequentially using function GetNextIdx(). The ones that retained their values extract 0 bits, while the modified ones extract 1 bit. In the meantime, values are modified back to the peak points. (i) . (ii) For 1 ≤ id ≤ capacity (1) . (2) If position = Left (a) if if (b) if if (I) (II) . (3) If position = Right (a) if if (b) if if (I) (II) .
Step 3. Do the reverse histogram shifting operations accessing all values. Bins following the left zero location up before the peak location, that is, , for every are shifted to the right by one histogram unit. From the right side of the histogram, bins following the right peak point until the right zero point, that is, , for every will shift to the left. The end result is demonstrated in histogram of Figure 5. In order to reverse the spectral component of the image the components are added with the difference matrix . (i) For , (1) if if (2) if if . (ii) Get the image payload data and add it in in front of the data that it already contains. Side information is decoded with the Reed-Salomon Codes. and will be the same as in embedding. Decoded data is converted to decimal and stored in . (iii) (see (2)).
Step 4(i)In the reverse way to embedding Step all the information is decoded from , and thus the image is acquired, as well as all authentication tags.(ii)For every set of 5 spectral components generate authentication tag from and compare with extracted tag and indicate possible tampered data if they are not equal.(iii)For every 8 × 8 block of pixels generate authentication tag from and compare with extracted tag and indicate possible tampered data if they are not equal.
Output Step Return , .
4.4. Removal and Cropping Attack Scenario
Additionally, to Reed-Solomon codes, we studied and verified the effectiveness of deletion channel correction codes for robustness against removal and cropping attacks; the method remains the same but every application of Reed-Solomon codes is now replaced by deletion channel correction codes. Those are applied as described in Section 3.3. Unlike Reed-Solomon codes which had varying properties, in this case, the properties of this deletion channel correction codes were identical for all the different components of the payload. Specifically, those were seven redundancy bits per byte.
Note that in this case there is a generated key for each single use of the deletion channel error correcting codes. Those keys are stored in a file and used as input for decoding during the extracting/reversing procedure. Thus, unlike the default version where the only side information required is for the generation of the authentication tags, in here, side information is required for error corrections.
5. Results and Discussion
For the experimental purposes, FTIR image and visible light image samples have been collected from our university hospital following research procedures with informed consent. All the FTIR image samples were of size 64 × 64, including 1,556 spectral components and a bit depth of 24 bits. The embedded visible light images were 100 × 100 RGB image blocks with a bit depth of 8 bits. Seven different attack test scenarios with different characteristics were studied. Every test was repeated five times using different data each time, that is, different pairs of FTIR images and visible light images. Firstly, the functionality of the method was tested by running it without applying any attacks, to verify reversibility. Secondly, in order to test robustness and tamper detection, there were three different bit flipping attacks and four cropping/removal attacks. More details will follow in Section 5.4.
Prior to attacks, on the host FTIR image, we confirmed reversibility by extracting/reversing an intact FTIR image that contained hidden data. In this test, the payload image was extracted intact, but most importantly, the authentication tags did not indicate any possibly tampered areas or tampered spectral components, proving that the method extracted the payload successfully but also reversed to its exact initial state. That was also confirmed by manually operating a simple subtraction between the original FTIR image and the reversed one.
5.2. Capacity and Fidelity
Capacity depends on the type of error correcting codes that were utilized for the different attack scenarios. This is because the side information size is different, depending on whether Reed-Solomon or deletion channel correction encoding is applied. The following capacity results include the mean capacity and the standard deviation from five repetitions with different data.
Beginning with the use of Reed-Solomon codes by running five different sample images, full capacity is 5,842,880 ± 34,320 bits, while capacity with the side information subtracted is 2,758,483 ± 32,613 bits. The encoded payload visible light image’s size is 1,760,000 bits and the authentication tags’ size is 765,000 bits.
In the second case where deletion channel correction codes are employed for robustness against cropping and removal attacks, full capacity remained the same but the real capacity after subtracting the side information is 5,051,443 ± 34,160 bits. This time, the size of the encoded visible light image is 1,920,000 bits, while the size of the authentication tags is 768,000 bits.
Fidelity was good as the FTIR image containing hidden data was very close to the original one. Specifically, Peak Signal to Noise Ratio (PSNR) values using five sample images were 34.4 ± 1.5 dB when Reed-Solomon codes were employed. As a demonstration, a single spectral component before and after data hiding is shown in Figure 6. Figure 7 similarly compares spectra out of a single pixel acquired from the same image. Then, PSNR was 34.8 ± 2.2 dB when the deletion channel error correction coding was employed for the same five data samples.
5.3. Tamper Detection
The data hiding method offers tamper detection through the comparison of authentication tags generated from the original FTIR image using HMAC-SHA256 and embedded in the FTIR image with tags generated from the reversed FTIR image after the payload has been extracted.
Specifically, tamper detection is realized by comparing the authentication tag produced of each set of five consecutive spectral components but also for each set of 8 × 8 blocks of image pixels. For instance, the tamper detection function could output that there is a possibility of tampering in spectral components 350–354 and the block of pixels with coordinates and thus that part is not safe to use in a diagnosis. Note that, in every experiment performed to check robustness, the extracted authentication tags indicated successfully tampered FTIR image locations. Since HMAC-SHA256 was used, even a single error in a spectral component of one pixel is able to trigger positive indication for a tampered 8 × 8 block and a group of 5 spectral components that contains it. However, even a single error in the extracted and decoded stream that represents the authentication tags can result in false positive alerts about tampering. Of course, false positives are of secondary priority and what was significant here is that there were never cases of false negative alerts about tampering. That ensured that in every case that the FTIR image contains errors it is always indicated successfully and it is not used in any vital analyses. More specific details about those errors follow in the next subsection.
The following experiments were performed to test all possible attacks described in Table 1. They were run with the FTIR image after the embedding procedure and before running the extracting and recovery procedures. Those experiments tested in which level the error correcting codes succeed in recovering the payload, how accurately the FTIR image is reversed, and how accurately the authentication tags show tampered areas. There were again five repetitions for each one of the seven experiments using different data each time. Error probability refers to the probability of introducing error to each individual spectral component of each pixel in the image, that is, each individual cell in the 3D data structure. The modified values refer to the number of actual values that were modified by the attack. Last, error correction refers to the error correcting code that was used in each case.
Experiments to had bit flipping in the LSBs of the FTIR image with 0.01% and 1% probabilities. That was done by increasing or decreasing intensity values by one unit each time with the corresponding probability. As for experiments 4 to 7, removal attacks were applied. More specifically, experiments 4 and 5 had random value removal with 0.001% and 0.01% probabilities, while experiment 6 had all spectral components removed for one specific FTIR image point pixel and last experiment 7 had 3 × 3 rectangles of pixels cropped from 4 separate spectral components. Experiments to used Reed-Solomon codes, while experiments 4–7 used deletion channel correction encoding because cropping attacks are more likely to cause missing bits other than flipped bits.
Beginning with the first component of the payload, that is, the authentication tags, certain cases included errors resulting in false positives, as already described in Section 5.3. Specifically, experiments 2–7 did contain false positives as alerts were shown for other areas except the ones that were indeed attacks. Experiment indicated successfully only the attacked areas, and of course, in the scenario when no attacks were applied at all, authentication tags did not show any alerts.
Another component inside the payload was the side information which enabled the selected histogram shifting data hiding method to run successfully. In this case, there was zero error tolerance and that is the reason why the solution presented in Section 3.3 was integrated. The success ratio here was significantly high. Specifically, thanks to the error correcting solutions, out of the 35 test runs that included attacks, 34 managed to retrieve and recover the side information making the extracting procedure run successfully. There was only one failure in experiment number 5 after an error occurred in the side information of one iteration and the operation halted.
Table 2 includes further information on the result of every experiment. The “payload image” column describes the state of the extracted visible light image payload reporting the PSNR values comparing them with the original images. In experiments 1 to 3, there were hardly any noticeable artifacts, while in experiments 4 to 7, there were color distortions due to bit shifts caused by missing bits. Still those errors can be tolerated as the visible light images are not used in the analyses but they merely assist by indicating the location of the tissue from which the FTIR image originates. The image texture is enough to indicate location. The second column shows the amount of FTIR image values that had errors. In every case, modifications caused by the hidden data were removed and that is why the errors were highly correlated to the number of errors inserted through attacks. An exception usually appears in neighboring to removed values and that is why intensity errors tend to increase when deletion error probability reaches 0.01% in experiment 5. It should be further noticed that 2 and 3 intact images were extracted from experiment number 2 and number 3, respectively, and there was a single failure in experiment number 5. Figure 8 demonstrates the state of the extracted visible light image acquired during the first experiment run.
As it has been demonstrated by the experimental results, the presented method is able to hide data with high capacity and good fidelity and reliably extract it and reverse the FTIR image in its initial state to make it safe for analyses. In case of attacks or modifications in FTIR images, the authentication tags will indicate possibly tampered areas and thus analyses can then be avoided from those locations.
High capacity was necessary for hiding visible light image data. Furthermore, error correcting codes multiply the needs for capacity. Thus, this was the reason that a double histogram shifting, that is, using two histogram point pairs, on difference matrices was proposed as the data hiding scheme. The choice of two histogram pairs combined with its application on the difference matrix and the use of quantization comes with a cost to fidelity in favor of capacity. However, it is demonstrated in the experimental results that fidelity was enough to make the FTIR images perfectly acceptable for viewing. For the analyses’ purposes, the images are reversed to their initial state and thus the level of modifications in the images that contain hidden data does not have any effect on the diagnoses. For reference, experimental results showed that, using the above scheme, the current approach offered an average pure capacity of 0.92 bits/value, where value stands for the pixel of spectral component unit. After subtraction of side information, the capacity was 0.43 bits/value and 0.79 bits/value with the use of Reed-Solomon and deletion channel correction codes, respectively. As for the fidelity between the original FTIR image and the one containing hidden data, maintaining the above capacity, the PSNR was over 34 dB.
Since the method was based on difference matrices of spectral components and FTIR images have higher bit depth and are overall different, there can be no direct comparison with the other histogram shifting schemes. However, some information can be acquired by comparing the capacity per unit and PSNR. Ni et al.  reported a capacity of about 5–80 kb tested on various 512 × 512 images, which is 0.02–0.31 bits/pixel. The PSNR was over 48 dB. An improvement followed by Tsai et al. . In their proposal, the capacity varies depending on the set of parameters. To give some examples, using 3 × 3 prediction blocks and two histogram nonoverlapping pairs similar to the proposed technique there was an average capacity of 0.25 bits/pixel and a PSNR of 49.85 dB. Even higher capacity was obtained with three overlapping pairs, reaching an average of 0.47 bits/pixel and a PSNR of 43.61 dB. Another improved method based on histogram shifting was proposed by Fallahpour et al. . The method improved capacity by 30% to 200% and maintained good fidelity by employing image tiling in blocks before histogram shifting operations. Results from an example showed that capacity is 0.04–0.14 bits/pixel when PSNR is ranging between 40 dB and 52 dB. Last, to compare with a different approach, Tian  proposed a reversible data hiding paper based on difference expansion exploring the redundancy of pixels. Using different settings the capacity starts from 0.15 bits/pixel and a PSNR of 44.30 dB up to 1.97 bits/pixel and a PSNR of 16.47 dB. It should be also noted that the capacity of 0.67 bits/pixel is achieved with a PSNR of 34.80 dB.
In the first attack scenario, Reed-Solomon codes were able to extract the payload with high precision and the false positives from the extracted authentication tags were limited. Errors in the extracted visible light image were more prevalent in cropping/removal attacks and the employment of deletion channel correcting codes, although most of those errors were shifts due to missing bits; thus the content of the image was visible but the images colors distorted. The point where this problem was more significant was at the extraction of the authentication tags. Tags were able to detect that there were errors in the FTIR image but they could not indicate only the tampered areas as they also revealed that the whole or most of the FTIR image structure was tampered. This is an issue that can be fixed with a solution similar, for instance, to the one applied for the side information, as described in Section 3.3. What made it practically infeasible to apply for the visible light image but also for the authentication tags was the fact that it was a considerably time-consuming process since it was based on a trial and error approach. The issue can be approached with two options: the application of the same solution proposed for side information in cases with no time limitations and the development of a highly optimized version of the current method.
It was shown that by comparing authentication tags the FTIR image can be reversed successfully and that there are no error artifacts in the spectral or spatial domain. It should be always taken into account, however, that there might be some false negatives since errors might be present in the extracted authentication tags, which will indicate the unlikely event of failed reversion in a specific area with that area having been completely recovered.
This paper presented a method for hiding visible light images or other information such as EPR in FTIR images with a main purpose of providing efficiency in data management and storage. Furthermore, the paper addressed security issues, that is, confidentiality, availability, and reliability of content. Tamper proofing and recoverability capabilities are additionally provided and small alterations on the host can be detected. The data hiding method can guarantee with the proper quantization settings high capacity and good fidelity between the original FTIR structure and its version that carries hidden data. Moreover, reversibility is available. Along extraction of data, the method reverses the FTIR image that carries hidden data to its original state. Last, two different approaches for error correction were suggested to enable corrections of the payload data after extraction.
What shall be researched in future work is a more optimized method for error correction. It was noted that bit errors cause problems in deletion channel correction encoding. The solution presented here is time-consuming and thus it was used only for the part of the payload created out of the side information which was of the highest priority. Specifically, with the current setup this solution added ~40 sec delay in the iterations where bit errors were detected. Improvements in here would allow great quality increase in the extracted visible light images, as well as the precision of tamper detection.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this article.
This research was supported by Infotech Oulu and the Nokia Foundation. The authors further thank Dr. Lassi Rieppo from the Research Unit of Medical Imaging, Physics and Technology of the University of Oulu for providing the hospital research data for the experiments.
- P. Garidel and M. Boese, “Non-invasive fourier transform infrared microspectroscopy and imaging techniques: basic principles and applications,” Modern Research and Educational Topics in Microscopy, vol. 3, no. 1, pp. 132–143, 2007.
- N. P. Camacho, P. West, P. A. Torzilli, and R. Mendelsohn, “FTIR microscopic imaging of collagen and proteoglycan in bovine cartilage,” Biopolymers - Biospectroscopy Section, vol. 62, no. 1, pp. 1–8, 2001.
- P. Lasch and D. Naumann, “Spatial resolution in infrared microspectroscopic imaging of tissues,” Biochimica et Biophysica Acta (BBA) - Biomembranes, vol. 1758, no. 7, pp. 814–829, 2006.
- G. Coatrieux, L. Lecornu, B. Sankur, and C. Roux, “A review of image watermarking applications in healthcare,” in Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS '06), pp. 4691–4694, New York, NY, USA, September 2006.
- C. Collberg and J. Nagra, Surreptitious Software, Addison-Wesley, Boston, Massachusetts, USA, 2010.
- C.-I. Chang, Hyperspectral Imaging: Techniques for Spectral Detection and Classification, Springer Science & Business Media, 2003.
- H. Grahn and P. Geladi, Techniques and Applications of Hyperspectral Image Analysis, John Wiley & Sons, 2007.
- H. Tamhankar, L. M. Bruce, and N. Younan, “Watermarking of hyperspectral data,” in Proceedings of the Learning From Earth's Shapes and Colours (IGARSS '03), pp. 3574–3576, Toulouse, France, July 2003.
- A. Kaarna and P. Toivanen, “Digital watermarking of spectral images in pca/wavelet-transform domain,” in Proceedings of the Learning From Earth's Shapes and Colours (IGARSS '03), vol. 6, pp. 3564–3567, Toulouse, France, July 2003.
- A. Kaarna and J. Parkkinen, “Multiwavelets in watermarking spectral images,” in Proceedings of the IEEE International Geoscience and Remote Sensing Symposium Proceedings: Science for Society: Exploring and Managing a Changing Planet. IGARSS '04, pp. 3225–3228, Anchorage, AK, USA, September 2004.
- C. K. Chui and J.-a. Lian, “A study of orthonormal multi-wavelets,” Applied Numerical Mathematics, vol. 20, no. 3, pp. 273–298, 1996.
- Q. Qin, W. Wang, S. Chen, D. Chen, and W. Fu, “Research of digital semi-fragile watermarking of remote sensing image based on wavelet analysis,” in Proceedings of the 2EEE International Geoscience and Remote Sensing Symposium Proceedings: Science for Society: Exploring and Managing a Changing Planet. IGARSS '04, pp. 2542–2545, Anchorage, AK, USA, September 2004.
- I. Kbaier and Z. Belhadj, “A novel content preserving watermarking scheme for multipectral images,” in Proceedings of the 2nd International Conference on Information & Communication Technologies, pp. 322–327, Damascus, Syria, 2006.
- J. Serra-Ruiz and D. Megías, “A novel semi-fragile forensic watermarking scheme for remote-sensing images,” International Journal of Remote Sensing, vol. 32, no. 19, pp. 5583–5606, 2011.
- J. Serra-Ruiz and D. Megías, “DWT and TSVQ-based semi-fragile watermarking scheme for tampering detection in remote sensing images,” in Proceedings of the 4th Pacific-Rim Symposium on Image and Video Technology, PSIVT '10, pp. 331–336, Singapore, Singapore, November 2010.
- S.-C. Liew and J. M. Zain, “Reversible medical image watermarking for tamper detection and recovery,” in Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT '10, pp. 417–420, Chengdu, China, July 2010.
- N. Dey, P. Das, A. B. Roy, A. Das, and S. S. Chaudhuri, “Medical information embedding in compressed watermarked intravascular ultrasound video,” Transactions on Electronics and Communications, vol. 57, no. 71, pp. 1–7, 2012.
- S. Acharjee, R. Ray, S. Chakraborty, S. Nath, and N. Dey, “Watermarking in motion vector for security enhancement of medical videos,” in Proceedings of the International Conference on Control, Instrumentation, Communication and Computational Technologies, ICCICCT '14, pp. 532–537, Kanyakumari, India, July 2014.
- M. Bellare, R. Canetti, and H. Krawczyk, “Keying hash functions for message authentication,” in Advances in Cryptology—CRYPTO '96, vol. 1109 of Lecture Notes in Computer Science, pp. 1–15, Springer, Berlin, Germany, 1996.
- M. Bellare, “New proofs for NMAC and HMAC: security without collision resistance,” Journal of Cryptology. The Journal of the International Association for Cryptologic Research, vol. 28, no. 4, pp. 844–878, 2015.
- National Institute of Standards and Technology, “Secure hash standard (SHS),” 2015, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf.
- I. S. Reed and G. Solomon, “Polynomial codes over certain finite fields,” Journal of the Society For Industrial & Applied Mathematics, vol. 8, no. 2, pp. 300–304, 1960.
- J. Duda and P. Korus, “Correction trees as an alternative to turbo codes and low density parity check codes,” CoRR, vol. abs/1204.5317, 2012.
- Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–361, 2006.
- P. Tsai, Y.-C. Hu, and H.-L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, vol. 89, no. 6, pp. 1129–1143, 2009.
- M. Fallahpour, D. Megias, and M. Ghanbari, “Reversible and high-capacity data hiding in medical images,” IET Image Processing, vol. 5, no. 2, pp. 190–197, 2011.
- X. Zeng, Z.-Y. Chen, M. Chen, and Z. Xiong, “Reversible video watermarking using motion estimation and prediction error expansion,” Journal of Information Science and Engineering, vol. 27, no. 2, pp. 465–479, 2011.
- R. C. Gonzalez and R. E. Woods, “Digital image processing,” Pearson, Article ID 0131687288, 2007.
- A. Fylakis, A. Keskinarkaus, V. Kiviniemi, and T. Seppänen, “Temporally synchronized reversible data hiding of EEG to MREG,” in Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies - Volume 5: HEALTHINF, (BIOSTEC '16), pp. 58–67, Rome, Italy, February 2016.
- J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890–896, 2003.
Copyright © 2017 Angelos Fylakis et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.