A pixel contrast based medical image steganography to ensure and secure patient data

Document Type : Research Paper


1 Faculty of Engineering, Uruk University, Baghdad, Iraq

2 University of information technology and communications, Baghdad, Iraq

3 Al-Esraa University College, Baghdad, Iraq


The information and communications technology time are essential for the security aspect of processes and methodologies. The security of information should a key priority in the secret exchange of information between two parties. That's to guarantee the information's security, some strategies are used, and they include steganography, watermark, and cryptography. In cryptography, the secrete message is converted into unintelligible text, but the existence of the secrete message is noticed, on the other hand, watermarking and steganography involve hiding the secrete message in a way that its presence cannot be noticed. Presently, the design and development of an effective image steganography system are facing several challenges such as low capacity, poor robustness and imperceptibility. To surmount these challenges, a new secure image steganography work called the Pixels Contrast (PC) method is proposed along with the eight neighbour's method and Huffman coding algorithm to overcome the imperceptibility and capacity issues. In the proposed method, a new image partitioning with a Henon map is used to increase the security part. This method has three main stages (preprocessing, embedding, and extracting) each stage has a different process. In this method, different standard images were used such as medical images and SIPI-dataset. The experimental result was evaluated with different measurement parameters like Histogram Analysis Structural Similarity Index (SSIM), Peak signal-to-noise ratio (PSNR). Compared the proposed method with the previous works then proved to be better than existing methods. In short, the proposed steganography method outperformed the commercially available data hiding schemes, thereby resolving the existing issues.


[1] B. Abd-El-Atty, A.M. Iliyasu, H. Alaskar, A. El-Latif and A. Ahmed, A robust quasi-quantum walks-based
steganography protocol for secure transmission of images on cloud-based E-healthcare platforms, Sensors 20(11)
(2020) 3108.
[2] A. Abdulbaqi, M. Younis, Y. Younus and A. Obaid, A hybrid technique for EEG signals evaluation and classification as a step towards to neurological and cerebral disorders diagnosis, Int. J. Nonlinear Anal. Appl. 13(1)
(2022) 773–781.
[3] M.N. Abdulwahedand, S.T. Mustafa and M.S.M. Rahim, Image spatial domain steganography: A study of performance evaluation parameters, IEEE 9th Int. Conf. Syst. Engine. Technol. (2019) 309–314.
[4] A. Alabaichi, M.A.A.K. Al-Dabbas, A. Salih, Image steganography using least significant bit and secret map
techniques, Int. J. Elect. Comput. Engin. 10(1) (2020) 935–946.
[5] T. AlKhodaidi A. Gutub, Refining image steganography distribution for higher security multimedia counting-based
secret-sharing, Multimedia Tools and Appl. (2020) 1–31.
[6] S. Chatterjee, M. Biswas, D. Maji, B.K. Ghosh and R.K. Mandal, Logarithm similarity measure based automatic
esophageal cancer detection using discrete wavelet transform, Recent Trends and Advances in Artificial Intelligence
and Internet of Things (2020) 427–453.
[7] Q.S. Hamad, M.Q. Mohammed and S.Q. Muhamed, Surface water pollution monitoring system based on IOT,
Plant Arch. 20(2) (2020) 630–634.
[8] M.M. Hashim, A.K. Mohsin and M.S.M. Rahim, All-encompassing review of biometric information protection in
fingerprints based steganography, Proc. 3rd Int. Symp. Computer Sci. Intell. Control (2019) 1–8.[9] M.M. Hashim and M. Rahim, Image steganography based on odd/even pixels distribution scheme and two parameters random function, J. Theore. Appl.Inf. Technol. 95(22) (2017).
[10] M.M. Hashim, S.H. Rhaif, A.A. Abdulrazzaq, A.H. Ali, M.S. Taha, Based on IoT healthcare application for
medical data authentication: Towards a new secure framework using steganography, IOP Conf.Ser.: Materials Sci.
Engin. 881(1) (2020) 012120.
[11] M. Hassaballah, M.A. Hameed and M.H. Alkinani, Introduction to digital image steganography, Digital Media
Stegan. (2020) 1–15.
[12] R.K. Hussein, A. Alenezi, H.F. Atlam, M.Q. Mohammed, R.J. Walters and G.B. Wills, Toward confirming a
framework for securing the virtual machine image in cloud computing, Adv. Sci. Technol. Eng. Syst. J. 2(4)
(2017) 44–50.
[13] M. Hussain and M. Hussain, A survey of image steganography techniques, Int. J. Adv. Sci. Tech. 54 (2013).
[14] M. Hussain, A.W.A. Wahab, Y.I.B. Idris, A.T. Ho and K.H. Jung, Image steganography in spatial domain: A
survey, Signal Processing: Image Communication, Signal Processing-Image Commun., 65 (2018) 46–66.
[15] M. Islam, R. Amarjit and R.H. Laskar, Neural network based robust image watermarking technique in LWT
domain, J. Intell. Fuzzy Syst., 34(3) (2018) 1691–1700.
[16] D. Jude Hemanth, J. Anitha, D.E. Popescu and L.H. Son, A modified genetic algorithm for performance improvement of transform based image steganography systems, J. Intell. Fuzzy Syst. 35(1) (2018) 197–209.
[17] I.J. Kadhim, P. Premaratne, P.J. Vial and B. Halloran, Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research, Neurocomput. 335 (2019) 299–326.
[18] B. Karthikeyan, P. Nishmitha, B. Poojasree and S. Asha, Authentication of secret message using Rabin-Karp in
image steganography, Int. Conf. Intell. Comput. Control Syst. (2019) 388–391.
[19] G. Lakshmi, M. Ghonge and A.J. Obaid, Cloud based IoT smart healthcare system for remote patient monitoring,
EAI Endorsed Trans. Pervasive Health Technol. (2021) 1–11.
[20] N. Manohar and P.V. Kumar, Data encryption and decryption using steganography, 4th Int. Conf. Intell. Comput.
Control Syst. (2020) 697–702.
[21] M.Q. Mohammed, S.Q. Muhamed, M. Ievlanov and Z. Gazetdinova, Improvement of the method of scenario
analysis of functional requirements to an information system, Eastern-European J. Enterprise Technol. 3(2(99))
(2019) 25–35.
[22] B.S. Mohan, A.A. Mahmood, M.Q. Mohammed and N.D. Zaki, Replicating the MAP kinase cascade in membrane
computing, J. Phys.: Conf. Ser. 1963(1) (2021) 012156.
[23] S.Q. Muhamed, M.Q. Mohammed, M. Evlanov and H. Kliuchko, The ADALINE neuron modification for solving
the problem on searching for the reusable functions of the information system, Eastern-European J. Enterprise
Technol. 3(2(93)) (2018) 25–32.
[24] S.Q. Muhamed, M.Q. Mohammed, T. Nayl, D. Mikhnov and A. Mikhnova, Technology of structural optimization
for subsidiary in enterprise information systems, Int. J. Adv. Trends Comput. Sci. Engin. 8(1) (2019) 544–549.
[25] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho and S.W. Baik, A novel magic LSB substitution method (MLSB-SM) using multi-level encryption and achromatic component of an image, Multimedia Tool. Appl. 75 (2016)
[26] H. Nyeem, Reversible data hiding with image bit-plane slicing, 20th Int. Conf. Comput. Inf. Technol. (2018) 1–6.
[27] J. Qin, Y. Luo, X. Xiang, Y. Tan H. Huang, Coverless image steganography: A survey, IEEE Access 7 (2019)
[28] A.K. Sahu and G. Swain, A novel n-rightmost bit replacement image steganography technique, 3D Res. 10(1)
[29] A.K. Sahu and G. Swain, An optimal information hiding approach based on pixel value differencing and modulus
function, Wireless Personal Commun. 108(1) (2019) 159–74.
[30] P. Shah, P. Choudhari and S. Sivaraman, Adaptive wavelet packet based audio steganography using data history,
IEEE Region 10 and the Third Int. Conf. Indust. Inf. Syst. (2008) 1–5.
[31] G.J. Simmons, The prisoners’ problem and the subliminal channel, Adv. Crypt. (1984) 51–67.
[32] B. Stoyanov and B. Stoyanov, Boost: Medical image steganography using nuclear spin generator, Entropy 22(5)
(2020) 501.
[33] W. Su, J. Ni, X. Hu J. Fridrich, Image steganography with symmetric embedding using gaussian Markov random
field model, IEEE Trans. Circuit.Syst. Video Technol. 5 (2020).
[34] G. Swain, Adaptive and non-adaptive PVD steganography using overlapped pixel blocks, Arab. J. Sci. Engin. 43(12)
(2018) 7549–7562.
[35] M.S. Taha, M.S.M. Rahim, M.M. Hashim and H.N. Khalid, Information hiding: A tools for securing biometric
information, Technol. Rep. Kansai Univ. 62(04) (2020) 1383–1394.[36] https://www.nlm.nih.gov/.
Volume 12, Special Issue
December 2021
Pages 1885-1904
  • Receive Date: 03 August 2021
  • Revise Date: 13 September 2021
  • Accept Date: 20 November 2021