Journal of Healthcare Engineering

Journal of Healthcare Engineering / 2021 / Article
Special Issue

Multiple Criteria Decision-Making Approaches for Healthcare Management Applications

View this Special Issue

Research Article | Open Access

Volume 2021 |Article ID 9943402 | https://doi.org/10.1155/2021/9943402

Ji-Hwei Horng, Ching-Chun Chang, Guan-Long Li, Wai-Kong Lee, Seong Oun Hwang, "Blockchain-Based Reversible Data Hiding for Securing Medical Images", Journal of Healthcare Engineering, vol. 2021, Article ID 9943402, 22 pages, 2021. https://doi.org/10.1155/2021/9943402

Blockchain-Based Reversible Data Hiding for Securing Medical Images

Academic Editor: Chi-Hua Chen
Received23 Mar 2021
Revised07 Apr 2021
Accepted24 Apr 2021
Published08 May 2021

Abstract

Medical images carry a lot of important information for making a medical diagnosis. Since the medical images need to be communicated frequently to allow timely and accurate diagnosis, it has become a target for malicious attacks. Hence, medical images are protected through encryption algorithms. Recently, reversible data hiding on the encrypted images (RDHEI) schemes are employed to embed private information into the medical images. This allows effective and secure communication, wherein the privately embedded information (e.g., medical records and personal information) is very useful to the medical diagnosis. However, existing RDHEI schemes still suffer from low embedding capacity, which limits their applicability. Besides, such solution still lacks a good mechanism to ensure its integrity and traceability. To resolve these issues, a novel approach based on image block-wise encryption and histogram shifting is proposed to provide more embedding capacity in the encrypted images. The embedding rate is over 0.8 bpp for typical medical images. On top of that, a blockchain-based system for RDHEI is proposed to resolve the traceability. The private information is stored on the blockchain together with the hash value of the original medical image. This allows traceability of all the medical images communicated over the proposed blockchain network.

1. Introduction

The medical industry has been moving toward the digitized era, wherein a large amount of medical information is stored in a digital form and communicated digitally [1]. This helps in streamlining the acquisition, processing, and management of medical information and, at the same time, improving the efficiency in the medical industry. From all medical information, medical health record (MHR) is the most vital part, as it keeps all the important and private information regarding the patients and their diagnosis. MHR usually includes the patients’ information like personal data, medical history, medical images, diagnosis reports, etc. Due to the booming of telemedicine technology, the exchange of medical images is becoming an important trend in the medical industry [2]. Medical image is one of the critical pieces of information in MHR that reveals a lot of sensitive information, which needs to be protected against malicious intrusion.

Traditional cryptographic algorithms can be used in protecting MHR (including medical images) effectively. For instance, Alam et al. [3] had proposed a framework for provisioning healthcare data, wherein Elliptic Curve Cryptography (ECC) and Advanced Encryption Standard (AES) are being used to encrypt the medical data. Recently, there is an increasing trend in employing reversible data hiding (RDH) techniques to embed sensitive information into medical images. RHD schemes have found some applications to the medical images, which are reported by Yang et al. [4, 5]. This shows that RDH is a promising candidate in securing medical images with the additional ability to embed sensitive information, which is not found in traditional cryptographic algorithms.

RDH is a technique that allows perfect recovery of the original plain image and the embedded data. The embedded data is usually some important or sensitive data to be hidden within the plain image. For instance, in the context of medical images, this can be the patient’s personal data, diagnosis report, and summary of past medical records related to the medical images. The study [6] presented a flexible RDH scheme based on quad-tree and pixel value ordering (PVO) to exploit the similarity between neighboring pixels to hide more data. The paper [7] proposed a method that does not take the difference of the neighboring pixels in an image. Instead, they rearrange the columns/rows of the image in a way that improves the smooth regions, resulting in an increase in embedding capacity.

Recently, more attention turned toward RDH on the encrypted images (RDHEI). This is to ensure that the security and privacy of the transmitted image are being protected. Although these proposed RDHEI schemes are advanced and able to securely communicate the images and hidden data, they are still vulnerable to certain malicious activities. In particular, one can still modify the pixel values in an encrypted medical image for a malicious purpose, which should be detected. In other words, the integrity of RDHEI schemes needs to be checked, and this is still an open research problem to date. Moreover, the records of medical data communication are not properly protected, which makes the tracing and tracking of such communication a challenging issue to be resolved.

Blockchain is an emerging technology that aims to replace or compensate for the traditional centralized systems. It can be regarded as a Distributed Ledger Technology (DLT), wherein the transaction and storage of data are performed in a distributed manner. In such a way, even though there is no trust among all communicating parties, they can still trust the blockchain network. One of the key features of the blockchain is that all the data stored in the chain are connected through a cryptographic hash, which is very costly (or almost impossible) to tamper with.

Blockchain was recently applied to the healthcare system to improve security. For instance, [8] proposed Guardhealth, a decentralized blockchain system for privacy preserving and data sharing in medical industry. In this paper, our aim is to apply blockchain to improve integrity and traceability of the RDHEI scheme for protecting medical images.

An RDHEI scheme that vacates room after encryption of the cover image is proposed. The cover image is first divided into small blocks and then permuted by a permutation key. Then, each block is stream ciphered by an encryption key. The data hider vacates the embedding room and hides secret data using the histogram shifting technique. Our scheme can achieve a high embedding capacity compared to the state-of-the-art scheme by Zhang et al. [9]. A blockchain-based system is proposed to provide additional features to the proposed RDHEI scheme, which can be very useful in securing medical images. The contribution of this paper is summarized as follows:(1)This paper proposed an RDHEI scheme to embed private information into the medical images. The proposed scheme employed stream cipher to vacate more space for data embedding capacity compared to the state-of-the-art scheme proposed by Zhang et al. [9].(2)A novel blockchain-based RDHEI system was proposed, wherein the hash value is generated from the output of RDHEI and stored on the blockchain. This ensures that any attempt to tamper with the medical images can be detected easily.

The proposed system allows the user to exchange the ciphered steganography medical image (CSMI) securely with other members within the blockchain network. This is an important contribution to the medical industry as important medical information can be communicated frequently without worrying about security issues.

2. Background

2.1. Overview of Blockchain Technology

Blockchain is a distributed ledger system that is developed to work in an environment wherein the participating parties do not trust each other. In contrast to the traditional server-centric model, blockchain requires each participating node to store a copy of the ledger which records all the transactional details. Since the ledger is kept locally by all participating nodes, they can perform an audit on the transactions locally. With this feature, even though there is no trust among the participating nodes, one can still trust the consensus achieved through blockchain.

Another unique feature offered by blockchain is the introduction of a cryptographic hash to link up all the transaction records. Referring to Figure 1, all valid transactions are grouped into a block within a fixed time interval. A new hash value is generated based on these transaction details together with the hash of the previous block. Followed by this is the consensus process (e.g., Proof of Work (PoW)) to approve the transaction. During the consensus process, only the node that successfully solved the given difficult puzzle can add this block into the existing blockchain. The generation of hash in each transaction block is linked with the hash of the previous block. To modify one of the transaction records in the blockchain, one must generate a lot of valid blocks through the consensus process and overwrite the subsequent blocks. Since the PoW is a time-consuming process, it is very difficult to generate a lot of new blocks in a short time; this makes blockchain an immutable solution to many applications.

The consensus process through the PoW process in the blockchain is time consuming, which makes the transaction slow (e.g., 10 minutes for Bitcoin). Another alternative is to employ consortium blockchain, wherein a list of trusted members is predefined. In such case, a lightweight consensus process like Practical Byzantine Fault Tolerance (PBZT) [10] can be used. This allows timelier communication between the nodes within the same consortium blockchain, without sacrificing the key security features (i.e., auditability, traceability, and integrity) in the blockchain.

2.2. Overview of RDHEI

Many image steganography techniques have been proposed in the past in order to hide secret data in a way that the stego image appears with no difference from the cover image. To achieve this goal, only a slight modification of the pixel value is allowed, which severely limits the hiding capacity of a cover image. If we further constrain that the cover image should be perfectly recoverable [11] after the extraction of secret data, the embedding capacity is reduced to a very low level. Many reversible data hiding methods have been proposed to solve this challenging problem, which can be classified into three categories including lossless compression, histogram shifting, and pixel value differencing.

The lossless compression [12, 13] exploits redundancy of the cover image to embed data, in which the smooth images can hide more data than the complex images. Histogram shifting [14, 15] was proposed later on, wherein the data is embedded by shifting one side of a peak value in the histogram outward, leveraging the expanded extra space. Pixel value differencing is a more advanced technique [16, 17] that computes the differences of the pixel value in an image block and hides data by expanding the difference, in a way similar to the histogram shifting method. All these methods can embed secret data and recover the cover image after data extraction. The emergence of cloud services provides another possible framework, in which the data hiding operation is performed by a third party. RDHEI scheme can be used under this framework, wherein the content owner encrypts the cover image and sends it to the data hider to embed the secret data and forward it to the receiver. At the receiver end, the secret data can be extracted using the embedding key and the cover image can be reconstructed using the encryption key. In case the receiver is not authorized to acquire the secret data, he can still obtain the slightly distorted cover image using the encryption key only.

RDHEI schemes proposed in the past can be classified into two categories: vacating room after encryption (VRAE) and vacating room before encryption (VRBE). VRAE technique vacates room for embedding after the encryption. In 2008, Puech et al. [18] proposed an RDHEI scheme that applies bit substitution to embed secret data into an encrypted image. Later on, Zhang [19] proposed a separable RDH scheme, in which the receiver can extract secret data by using an encryption key and recover the cover image using a data hiding key. When the receiver has both keys, he can obtain both secret data and recover the image. VRBE is first proposed by Ma et al. [20] in 2013. By vacating embedding room before encryption, they claim that their scheme can achieve real reversibility; i.e., the data extraction and image recovery are free of any error. In 2016, Cao et al. [21] proposed a VRBE scheme based on sparse coding, in which the leading residual errors and learned dictionaries, together with the secret data, are embedded into the encrypted image. Malik et al. proposed an RDHEI scheme [22] that creates spare space using the prediction-error estimation method. The data is embedded into the most significant bits of the encrypted image. However, an additional location map is required to mark the nonembeddable pixels. RDHEI schemes can also be used to embed sensitive information into medical images. For instance, [4] had proposed a scheme to embed information into medical images through RDH and homomorphic encryption. Later on, [5] improved the scheme by proposing a novel paradigm (encrypt-then-RDH) to enhance the security of RDH over medical images.

Recently, Zhang et al. [9] proposed an interesting work along this research direction, in which they claim to achieve high embedding capacity. Referring to Figure 2, Zhang et al. [9] use additive homomorphic encryption and block permutation to encrypt the cover. The encryption and decryption formulas for homomorphic encryption are given by equations (1) and (2), respectively.where N = 256, K is Key-1, and E(·) and D(·) are encryption and decryption algorithms, respectively. For each subblock, all pixels are encrypted using the same key to preserve the correlation between them. A block permutation method based on the chaotic algorithm is applied to strengthen security. An additional key sequence Key-2 is required to execute this operation. In the data embedding phase, the pixels in a subblock are classified into three sets according to their locations. For each set of pixels, a particular prediction rule is applied to measure prediction errors. Then, the histogram expansion and shifting process is used to embed secret data into the prediction errors. By controlling the embedding interval created by histogram expansion, the embedding capacity is adjustable. An embedding key Key-3 is required to store the information about embedding intervals.

This data hiding scheme suffers from some problems. First, homomorphic and block permutation encryptions of the cover image are not secure enough. The overall effect of image encryption is shifting of pixel gray level and changing of block spatial location. Secondly, the embedding key is not completely random, because it stores the parameters for data hiding, which is actually metadata for secret message extraction. The public key system could not help to share the encryption key under this scheme. The third and the most critical one is the problem of overflow. To hide the more secret data, the wider embedding interval should be expanded, and larger prediction errors exist. The encrypted pixel values may overflow the formal range of 0 to 255. To deal with the problems above, we propose a novel data hiding scheme in the following section.

3. The Proposed Reversible Data Hiding Scheme for Medical Images

In this section, we propose an RDHEI scheme based on stream ciphering and histogram shifting techniques. Our scheme includes three phases, namely, (1) the image encryption, (2) the data hiding, and (3) the data extraction and image decryption as shown in Figure 3. Three secret keys are involved in the proposed RDHEI scheme. Key-I and Key-II are the image encryption keys and Key-III is the data hiding key. The length of each key could be 64, 128, or 256 bits depending on the required security level. In the image encryption phase, the gray level cover image occupied by the content owner is firstly divided into mutually exclusive blocks of size 3 × 3. Block permutation with encryption key Key-I is applied to crumble the spatial relationship between image blocks. Then, stream ciphering with encryption key Key-II is leveraged to encrypt the image. In the data hiding phase, the data hider embeds secret data and metadata using the histogram shifting technique with Key-III. At the receiver end, the metadata is extracted first. With histogram rough restoration, the approximate cover image can be recovered using encryption keys Key-I and Key-II. With histogram fine restoration, the cover image can be perfectly recovered. For an authenticated receiver, a secret message can be deciphered from secret data using Key-III.

3.1. Cover Image Encryption Phase

The cover image encryption phase includes two steps: block permutation and stream ciphering. The cover image is divided into mutually exclusive blocks of size 3 × 3 first. Then, Key-I is applied to generate a random sequence of length equal to the number of total blocks in the image and all blocks are reordered according to the random sequence. An illustrative tiny image of 2 × 2 blocks is shown in Figure 4, where (a) is the original tiny image and (b) is the permuted image according to the random sequence 2; 3; 1; 0. After block permutation, we apply Key-II to generate a secret stream. Then, each image block is encrypted bywhere K is an 8-bit stream code truncated from the secret stream, P and C represent the input block and the cipher block, respectively, and the encryption function E(∙) is an Exclusive-OR operation denoted by “⊕.” All blocks are sequentially encrypted with a distinct 8-bit code segment for each. Pixels within the same block are encrypted with the same code segment; therefore, their correlation is preserved. This is an important feature for the following data embedding phase.

An illustrative example of the cover image encryption is shown in Figure 5. To simplify the representation, we use two blocks only to demonstrate the encryption operation. The two image blocks in (a) are permuted using the sequence generated by Key-I to obtain (b). Then, the two blocks are stream ciphered by two code segments generated by Key-II, individually. We take the first pixel of each block as an example. The binary codes of the first code segment and first-pixel value are and , respectively. By Exclusive-OR operation, it results in . The code segment and first-pixel value of the second block are and , respectively. It results in . Other pixels are calculated in the same way to get the result (c).

3.2. Data Embedding Phase

The data embedding process for the data hider is as shown in Figure 3. The preprocessing for each block in the encrypted image is an internal Exclusive-OR operation given bywhere is the center pixel value of a block, is a pixel value around the center pixel as shown in Figure 6(a), and is its corresponding output pixel value as shown in Figure 6(b).

By simple derivation as given by equation (5), we can find that is equal to . For a smooth block, all pixel values are close to each other. Therefore, there are a lot of zeros in the output image.

After preprocessing, we apply the histogram shifting technique to embed secret data. According to the required embedding capacity, a threshold of gray level is determined and the histogram is expanded by

A vacating band of width after the gray level is created. Then, the first gray levels are shifted to even values without disrupting their order and the gray levels are shifted outward between and 128. The threshold value , recorded with six bits, and the information in the vacating band are encoded and stored as metadata.

The binary secret stream is encrypted using Key-III with the conventional stream ciphering technique into an encrypted bitstream . For all embeddable pixels with , we collect them in ascending order of gray level and in a raster scan order for pixels of the same gray level. Then, we consecutively embed secret bit by

After embedding, postprocessing with the same operation as preprocessing is executed again to reverse the effect. For each block,where the definitions of and can refer to Figure 5.

To achieve reversibility of the proposed scheme, the histogram band in the range erased by the vacating process of histogram shifting should be recorded. Since only a very small amount of data is required to record, we design a simple and straightforward coding rule. Six bits are used to record ; twelve bits are used to record the total number of coded pixels; 3 bytes for each pixel are used to record its gray level and coordinates in the image. The image encryption and data embedding process is summarized as follows.Input: cover image, binary secret stream, encryption key: Key-I, Key-II, data hiding key: Key-IIIOutput: encrypted image with data embeddedContent owner:Step 1: encrypt the image by block permutation with Key-I and stream ciphering with Key-IIData hider:Step 2: preprocess the encrypted image according to equation (4)Step 3: apply histogram shifting to vacate embedding area by equation (6)Step 4: encode the erased histogram band into metadataStep 5: collect the embeddable pixels in ascending order of gray level and raster scan orderStep 6: apply stream ciphering to the secret binary stream with Key-III into an encrypted data streamStep 7: embed metadata first and then encrypted data stream by equation (7)Step 8: postprocess the embedded image by equation (8) to produce the output image

The tiny image example given in Figure 5(c) is applied to illustrate the data embedding process as shown in Figure 7. The two encrypted image blocks are shown in Figure 7(a). The preprocessed blocks are shown in Figure 6(b), where we apply the threshold gray level and the embeddable pixels are denoted by red characters. The embedding order of all embeddable pixels is labeled with green Arabic numerals. Except for the center pixel of each block, all pixel values are expanded according to equation (6). Then, the encrypted secret stream is embedded in the predefined order by equation (7) to obtain Figure 7(c). Finally, the two blocks are postprocessed to get Figure 7(d). An example of pixel processing is also given in the figure.

3.3. Data Extraction and Image Recovery Phase

The data extraction and cover image recovery are executed in the reverse order of encryption and embedding. The overall process is summarized as follows (Figure 8).

The data extraction and image recovery process.Input: encrypted image with data embedded, encryption key: Key-I, Key-II, data hiding key: Key-III.Output: binary secret stream, cover image.Receiver:Step 1: preprocess each block of the input image bywhere the notation definitions of and are the same as equation (9).Step 2: collect the first six pixels belonging to in the raster scan order and convert them to get .Step 3: according to , collect all embeddable pixels in the ascending order of and raster scan order for the pixels of the same value, where is the floor function.Step 4: consecutively extract the metadata and encrypted secret stream by even-odd decision.Step 5: decipher the binary secret stream using Key-III.Step 6: backward shift the pixel values and recover the vacating band according to the metadata. The backward shifting is given bywhere is the floor function.Step 7: postprocess each block bywhere the notation definitions of and are the same as equation (4).Step 8: decipher the histogram recovered image using Key-II.Step 9: apply backward permutation to obtain a cover image using Key-I.

The data embedded tiny illustrative image in Figure 7(d) is applied as an input of the data extraction and image recovery process as shown in Figure 7(a). The two blocks are preprocessed to get Figure 7(b). Then, according to , the secret data stream can be extracted, and the histogram can be recovered as shown in Figure 7(c). Next, we postprocess the two blocks to get Figure 7(d). Finally, we use the encryption key to decipher the image blocks. Note that we do not show the extraction of metadata and recovery of vacated histogram band as in an actual application.

4. Blockchain-Based Reversible Data Hiding System

The proposed blockchain system is presented in this section, with the aim of providing integrity and traceability in existing RDHEI. A consortium blockchain system is used in this paper, in which the participants in the blockchain network are trusted parties. For instance, the hospitals and health research institute (HRI) can form a consortium blockchain to share the medical images among themselves. In this way, an expensive consensus algorithm (e.g., PoW) is not required; it can be replaced with a lightweight algorithm like PBZT. Moreover, consortium blockchain is also a more appropriate choice as we do not expect any unauthorized person to join the blockchain network and gain access to the medical information, which is supposed to be private.

4.1. Architecture of the Proposed Blockchain-Based Reversible Data Hiding System

Figure 9 shows the architecture of the proposed blockchain system, which can be used to exchange medical images safely. Doctor A first encrypts the medical records of a patient and then generates the CSMI using the proposed RDHEI scheme, wherein the encrypted medical records are embedded into the patient’s medical image. The encrypted medical records and CSMI are stored in the database of his hospital (Hospital X). A transaction block is generated and added to the blockchain.

With the proposed blockchain system, anyone who wants to share medical information can verify the integrity of transmitted data at the receiver end. For instance, Doctor A shares the CSMI with Doctor B and Medicate Institute Y. Upon receiving the CSMI, Doctor B first computes the hash value of received data and compares it against the blockchain to verify its integrity. He then extracts the hidden medical records with a legitimate key and then decrypts the medical records with another legitimate key. A similar process is performed by Medical Institute Y. The details on how to generate a new block and verify the integrity of CSMI are presented in the next section.

4.2. Process of Generating New Blocks and Verifying the Integrity of CSMI

Referring to Figure 10, the medical records of a patient are first encrypted by a symmetric key algorithm through the following equation:where MR refers to the medical records, K1 is the symmetric key, and CMR is the resultant ciphertext. Next, we generate another key K2= Key-I || Key-II || Key-III, where Key-I, Key-II, and Key-III are the keys used in the proposed RDHEI scheme. We embed the encrypted medical records (CMR) into the medical image and generate a CSMI through the proposed RDHEI scheme. In Step 3, the generated CSMI and the hash value of the previous block in blockchain (Hprev) are concatenated. The hash value of the current block is generated through the following equation:where Hash can be any standardized cryptographic hash function (e.g., SHA-2 and SHA-3) and Hcurr is the hash value of the current block. The newly generated block is transmitted to the blockchain network for the consensus process, wherein a lightweight algorithm can be used. Once the peers in the blockchain network approved the current block, a new block is generated (Step 5) and is added to the existing blockchain (Step 6). Assume that a person receives CSMI from a legitimate member in the blockchain network. To verify the integrity of the received CSMI, he first computes the hash value: following the same hash function used in the block creation process. Then, he compares against the hash value Hcurr stored in the blockchain. If both values are the same, then CSMI is untampered; otherwise, CSMI or CMR has been modified.

The proposed blockchain system can be implemented with any popular blockchain framework, e.g., Hyperledger Fabric and Ethereum. Step 1 can employ an industry-grade block cipher (e.g., AES) to perform the encryption, while Step 2 can be carried out by using the techniques described in Section 3. Subsequently, Steps 3–6 are common operations found in a standard blockchain framework, which can be implemented easily.

4.3. Security Analysis

In this section, a security analysis on the proposed blockchain system is provided, with consideration of various attacking scenarios.(1)Attackers cannot retrieve the steganography of medical images. In the proposed system, the CSMI is stored in the database of the hospital. Assuming that the malicious attacker has access to the CSMI, he cannot recover the steganography of medical images (SMI). This is because he does not hold K2 to successfully recover the SMI. On top of that, he can never extract the patient’s medical records embedded into CSMI(2)The proposed system can protect the confidentiality of medical records. The patient’s medical records are being encrypted by a symmetric key algorithm with key K1, before embedding it into the medical image. Assume that the malicious attacker has access to the CSMI, and he had successfully extracted the SMI. In such a situation, he cannot successfully extract the medical records, because he does not have the K1 to decrypt them. Hence, the confidentiality of the patient’s medical records is protected(3)The proposed system can achieve integrity. It is also possible that the malicious attacker is interested in creating fake CSMI instead of extracting information from it. For instance, one can generate fake keys to encrypt the legitimate medical records () and then embed them to the other medical image to produce a fake CSMI′. This fake CSMI′ is being stored in the database as a new entry. However, the hospital can detect this fake CSMI′ easily by comparing it against the hash value stored in our blockchain system. Since CSMI′ is calculated from fake keys and , the hash value generated () is not the same as the one stored in the blockchain (Hcurr). In order to create fake CSMI′ that everyone trusts, the attacker needs to modify the blockchain accordingly. However, referring to equation (13), the hash value in each new block depends on the previous block. To modify one record in blockchain, the attacker must also recalculate all the subsequent blocks, which is almost impossible. Hence, the proposed system is secure against malicious attacks that attempt to compromise its integrity(4)The image encryption scheme is robust under chosen-plaintext analysis. The permutation process with Key-I has corrupted the block correspondence between the cover image and the encrypted image. Without the mapping information between the image blocks before and after encryption, chosen plaintext analysis is useless. Even if the block mapping is known, it is still too complicated for analysis since image blocks are encrypted with distinct keys generated by Key-II

5. Experimental Results and Discussion

In this section, we present the experimental results of the proposed RHDEI and its application to medical images. The hardware resources are Intel ® Core ™ i7-3770 CPU @ 3.40 GHz and 8 GB RAM PC. The application software is MATLAB R2017a running with Windows 10 Professional operating system. Six standard test images (see Figure 11) including “Airplane,” “Baboon,” “Boat,” “Lena,” “Peppers,” and “Sailboat” are applied to demonstrate the effectiveness of our scheme. The encrypted images are shown in Figure 12. The preprocessed images and postprocessed images with data embedded are given in Figures 13 and 14, respectively.

The histograms of the test images and their corresponding encrypted images are given in Figures 15 and 16. Referring to Figure 16, the histogram of encrypted images is evenly distributed in the entire range of gray levels regardless of the different image features. This indicates a high-security level of the proposed image encryption scheme.

The histogram after the preprocess of the embedding phase is given in Figure 17. For smooth images, the histogram is more concentrated while it is more distributed for complex images such as “Baboon.” Note that the histogram band of gray levels is very “clear” by observation. To know the details, we further restrict the display range of the vertical axis to pixels as shown in Figure 18. There are some pixels distributed in the band. To achieve the complete reversibility of the embedding scheme, the metadata includes three data segments. The first segment records the threshold with six bits. The second segment records the number of pixels in the vacating band with twelve bits. The last segment contains all details of each pixel in the vacating band by one byte for its gray level and two bytes for its coordinates in the image. Therefore, the total length of metadata is , where is the number of pixels in the vacating band. After histogram shifting and data embedding, the histogram in Figure 17 changes to the distribution shown in Figure 19, where the applied threshold of vacating band is . Figure 20 shows the resulting histogram of the marked encrypted image after postprocessing. The histogram is still evenly distributed and preserves at a high-security level.

Since the total number of pixels in the vacating band is very small, we can recover the histogram in a more efficient way by retrieving the first two segments of metadata to get and determine the remaining length of metadata to be discarded. Thus, the recovery of the vacating band can be skipped, and the process is proceeded directly to extract the secret data stream. To know the visual quality of the approximated image, we apply the peak-signal-to-noise ratio (PSNR) index given bywhere MSE is the mean square error between the cover image and the approximated image and and are the width and height of the image. The second measure of similarity between them is the structural similarity (SSIM) defined bywhere , , , and are the mean values and standard deviations and is the covariance of the two images.

The experimental results of the proposed RDHEI scheme with different thresholds are listed in Table 1. The “capacity” and “metadata” are measured in bits. The actual embedding capacity of secret data can be calculated by subtracting the amount of metadata from the “capacity” value. The “ER” is the embedding rate measured in bits per pixel (bpp). The PSNR and SSIM values listed in the table indicate that the approximated images under fast recovery have good visual quality.


ImageMetrics = 4 = 8 = 16 = 32 = 64

AirplaneCapacity102125140358171658190931202715
Metadata4266162666612858
ER (bpp)0.380.530.650.720.77
PSNR61.6458.2954.7737.7234.35
SSIM0.99990.99990.99990.9950.9912
BaboonCapacity305065604793320134879173447
Metadata1242229849621281051138
ER (bpp)0.110.210.350.510.66
PSNR42.6140.3236.9932.7926.12
SSIM0.9990.99830.99610.98950.9516
BoatCapacity79348119982153134184078209831
Metadata114210546186610626
ER (bpp)0.30.450.580.70.8
PSNR56.3652.2146.940.8332.5
SSIM0.99990.99990.99960.99830.9879
LenaCapacity83908127070164152194295209334
Metadata1381623547384506
ER (bpp)0.320.480.620.740.79
PSNR53.1152.0748.2445.2736.04
SSIM0.99990.99990.99970.99930.9944
PepperCapacity81892127696167267195067214845
Metadata25849895417945586
ER (bpp)0.310.480.630.740.81
PSNR51.1547.4843.940.535.82
SSIM0.99980.99970.99930.99820.9944
SailboatCapacity5691093681134503176246195452
Metadata4749301794390610122
ER (bpp)0.210.350.510.670.74
PSNR45.2341.7639.1135.8731.43
SSIM0.99950.9990.9980.99580.9872

Figure 21 shows the PSNR values with respect to the embedding rate (ER). The threshold value determines the width of the vacating band and therefore degrades the visual quality. However, the ER also increases with the increased threshold. Another important point of observation is that the PSNR value is dependent on the image feature. The most complex image “Baboon” has the lowest PSNR level among all.

The second set of test images are two medical images downloaded from the website of MIDAS/National Alliance for Medical Image Computing (NAMIC) as shown in Figure 22. The image size is relatively smaller than the standard test images in the first experiment. The encrypted images, preprocessed images, and postprocessed images are given in Figures 2325, respectively. Histograms of the cover images are shown in Figure 26. Notice that the pixel values are concentrated to very low gray levels due to the inherent nature of MRI images. This phenomenon is especially beneficial to our data hiding scheme. The histogram distributions for different processing phases are given in Figures 2731. The experimental values are listed in Table 2. The major difference from the first experiment is that the embedding rate reaches 0.6 bpp at the lowest threshold of , which is much higher than the capacity of standard test images. At the highest threshold of , the medical images can reach an embedding rate of 0.8 bpp.


ImageMetrics = 4 = 8 = 16 = 32 = 64

Medical ACapacity3967143490485075265556038
Metadata661142347381554
ER (bpp)0.60.660.740.80.85
PSNR70.157.0242.6837.4435.34
SSIM0.99990.99990.99890.99710.9953
Medical BCapacity4060843388468515016853448
Metadata13825854611224338
ER (bpp)0.610.660.710.760.81
PSNR49.645.6741.4537.4830.82
SSIM0.99990.99960.9990.99760.9871

Figure 32 compares the proposed scheme with other related works, including VRAE-based schemes (Zhang et al.’s scheme [9, 12]) and VRBE-based schemes (Cao et al.’s scheme [21] and Malik et al.’s scheme [22]), for two typical test images “Lena” and “Baboon.” Note that all these schemes are completely reversible. The PSNR values are compared under the situation of discarding some information in image deciphering. The proposed scheme reaches a good embedding rate with a good visual quality of the approximation image. The scheme proposed in [17] is VRBE-based; therefore, it provides only one fixed embedding rate.

Compared to a recently proposed RDH technique by Anushiadevi et al. [23], the proposed technique offers a flexible threshold () to allow performance tuning. The user can flexibly select a higher embedding capacity or higher PSNR by adjusting ; this is not found in [23]. Another recent work that offered homomorphic encryption on RDH was proposed by Anushiadevi et al. [24]. Our proposed technique shows performance on par with them in terms of ER, PSNR, and flexible threshold configuration.

6. Conclusion

Medical images are important assets to the medical industry, and they should be protected to avoid potential infringement of privacy. To achieve this goal, we propose an RDHEI scheme, in which the cover image is encrypted by block permutation using encryption Key-I and stream ciphering using encryption Key-II. Then, the encrypted patient data is embedded into the encrypted image through Key-III to produce a secure CSMI. Experimental results show that the performance of the proposed RDHEI scheme is excellent when applied to medical images. The embedding rate is over 0.8 bpp for typical medical images. An image of high visual quality can be recovered even if the receiver only holds the image encryption keys. Since most processes of the proposed RDHEI scheme are based on the simple Exclusive-OR operation, our scheme can be executed very efficiently. To provide an integrity check, we propose a blockchain system on top of the RDHEI. The hash value of CSMI is stored in a commonly used blockchain system for future verification. The proposed RDHEI blockchain system allows the user to check the integrity of CSMI from time to time, which shows additional benefit compared to the conventional RDHEI schemes.

Data Availability

The data used in the experiments and discussions in the paper are available within this article.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by the Brain Pool Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (2019H1D3A1A01102607).

References

  1. M. Hadzic, T. Dillon, and E. Chang, “Use of digital ecosystem and ontology technology for standardization of medical records,” in Proceedings of the Inaugural IEEEIES Digital EcoSystems and Technologies Conference, pp. 595–601, Cairns, Australia, February 2007. View at: Google Scholar
  2. H. Peng, B. Yang, L. Li, and Y. Yang, “Secure and traceable image transmission scheme based on semitensor product compressed sensing in telemedicine system,” IEEE Internet of Things Journal, vol. 7, no. 3, pp. 2432–2451, 2020. View at: Publisher Site | Google Scholar
  3. M. G. R. Alam, M. S. Munir, M. Z. Uddin, M. S. Alam, T. N. Dang, and C. S. Hong, “Edge-of-things computing framework for cost-effective provisioning of healthcare data,” Journal of Parallel and Distributed Computing, vol. 123, pp. 54–60, 2019. View at: Publisher Site | Google Scholar
  4. Y. Yang, X. Xiao, X. Cai, and W. Zhang, “A secure and high visual-quality framework for medical images by contrast-enhancement reversible data hiding and homomorphic encryption,” IEEE Access, vol. 7, pp. 96900–96911, 2019. View at: Publisher Site | Google Scholar
  5. Y. Yang, X. Xiao, X. Cai, and W. Zhang, “A secure and privacy-preserving technique based on contrast-enhancement reversible data hiding and plaintext encryption for medical images,” IEEE Signal Processing Letters, vol. 27, pp. 256–260, 2020. View at: Publisher Site | Google Scholar
  6. J.-J. Li, C.-F. Lee, C.-C. Chang, J.-Y. Lin, and Y.-H. Wu, “Reversible data hiding scheme based on quad-tree and pixel value ordering,” IEEE Access, vol. 7, pp. 142947–142962, 2019. View at: Publisher Site | Google Scholar
  7. F. Aziz, T. Ahmad, A. H. Malik, M. I. Uddin, S. Ahmad, and M. Sharaf, “Reversible data hiding techniques with high message embedding capacity in images,” PLoS One, vol. 15, Article ID e0231602, 2020. View at: Publisher Site | Google Scholar
  8. Z. Wang, N. Luo, and P. Zhou, “Guardhealth: blockchain empowered secure data management and graph convolutional network enabled anomaly detection in smart healthcare,” Journal of Parallel and Distributed Computing, vol. 142, pp. 1–12, 2020. View at: Publisher Site | Google Scholar
  9. R. Zhang, C. Lu, and J. Liu, “A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting,” Journal of Information Security and Applications, vol. 47, pp. 199–207, 2019. View at: Publisher Site | Google Scholar
  10. S. Gao, T. Yu, J. Zhu, and W. Cai, “T-PBFT: an EigenTrust-based practical Byzantine fault tolerance consensus algorithm,” China Communications, vol. 16, no. 12, pp. 111–123, 2019. View at: Publisher Site | Google Scholar
  11. Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–362, 2006. View at: Google Scholar
  12. J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,” Security and Watermarking of Multimedia, Contents, vol. 3, pp. 197–209, 2001. View at: Google Scholar
  13. J. Fridrich, M. Goljan, and R. Du, “Invertible authentication watermark for jpeg images,” in Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 223–227, Las Vegas, NV, USA, April 2001. View at: Google Scholar
  14. Y. Du, Z. Yin, and X. Zhang, “Improved lossless data hiding for jpeg images based on histogram modification,” Computer Mater Continua, vol. 55, no. 3, pp. 495–507, 2018. View at: Google Scholar
  15. W. Wang, J. Ye, T. Wang, and W. Wang, “A high capacity reversible data hiding scheme based on right-left shift,” Signal Processing, vol. 150, pp. 102–115, 2018. View at: Publisher Site | Google Scholar
  16. S. Weng, J.-S. Pan, and L. Li, “Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding,” Information Sciences, vol. 369, pp. 144–159, 2016. View at: Publisher Site | Google Scholar
  17. S. Weng, Y. Liu, J.-S. Pan, and N. Cai, “Reversible data hiding based on flexible block-partition and adaptive block-modification strategy,” Journal of Visual Communication and Image Representation, vol. 41, pp. 185–199, 2016. View at: Publisher Site | Google Scholar
  18. W. Puech, M. Chaumont, and O. Strauss, “A reversible data hiding method for encrypted images,” in Proceedings of the SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 68191E, San Jose, CA, USA, January 2008. View at: Google Scholar
  19. X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 826–832, 2012. View at: Publisher Site | Google Scholar
  20. K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 3, pp. 553–562, 2013. View at: Publisher Site | Google Scholar
  21. X. Cao, L. Du, X. Wei, D. Meng, and X. Guo, “High capacity reversible data hiding in encrypted images by patch-level sparse representation,” IEEE Transactions on Cybernetics, vol. 78, no. 46, pp. 1132–1143, 2016. View at: Publisher Site | Google Scholar
  22. A. Malik, H.-X. Wang, Y. Chen, and A. N. Khan, “A reversible data hiding in encrypted image based on prediction-error estimation and location map,” Multimedia Tools and Applications, vol. 79, no. 17-18, pp. 11591–11614, 2020. View at: Publisher Site | Google Scholar
  23. R. Anushiadevi, P. Praveenkumar, J. B. B. Rayappan, and R. Amirtharajan, “Uncover the cover to recover the hidden secret—a separable reversible data hiding framework,” Multimedia Tools and Applications, 2021. View at: Publisher Site | Google Scholar
  24. R. Anushiadevi, P. Praveenkumar, J. B. B. Rayappan, and R. Amirtharajan, “Reversible data hiding method based on pixel expansion and homomorphic encryption,” Journal of Intelligent & Fuzzy Systems, vol. 39, no. 3, pp. 2977–2990, 2020. View at: Publisher Site | Google Scholar

Copyright © 2021 Ji-Hwei Horng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Related articles

No related content is available yet for this article.
 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views885
Downloads641
Citations

Related articles

No related content is available yet for this article.

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.