Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 35

A SYSTEMATIC SURVEY, CLASSIFICATION

AND ANALYSIS OF STEGANO-ENCRYPTION


TECHNIQUES FOR MEDICAL IMAGES

Presented by
Tuaha Nomani (nomani@cae.nust.edu.pk)
Department of Avionics Engineering, College of Aeronautical Engineering
National University of Sciences and Technology, Islamabad
Sequence

• Introduction
• Cryptography
• Steganography
• Image Steganography
• Applications
• Literature Survey
• Different Techniques
• Conclusion
• Q&A Session

2/42
Introduction

• Information security is important in every field


• Medical
• Business
• Banking
• Education

3/42
Cryptography

• Study of secure communications techniques that allow


only the sender and intended recipient of a message to
view its contents.
• Cryptography are basically of two types
• Symmetric key Cryptography
• Public key Cryptography

[1] F. A. P. Peticolas,, “Information hiding-a survey”, Proceedings of the IEEE, Vol. 87, pp. 1062-1078, 1999 4/42
Steganography
• An ability to hide the information
for security purposes.
• It helps in achieving the good
information security.
• To hide the communicated
information in any other
information like

[2] N. Chen, C. Su, C. Shih and Y. Chen, “Reversible watermarking for medical images using histogram shifting with
location map reduction,” 2016 IEEE International Conference on Industrial Technology (ICIT), Taipei, 2016, pp. 792-797 5/42
Flow of Steganography

7/42
Image Steganography
• The technique of hiding data within an image file.
• That prevents the unintended user from the detection of
hidden messages or data.

8/42
Applications of Image
Steganography
• Secure private files and documents.
• Hide passwords and Encryption keys.
• Transport Highly private documents between
international Governments.
• Transmit message/data without revealing the existence
of available message.

9/42
Least Significant Bit

• The most common and popular approach for hiding data


is LSB (Least Significant Bit) substitution.
• Take the binary representation of hidden data and
overwrite the LSB of each byte within the cover image
• Computational Complexity is easy to maintain.
• Easier Implementation.
• Variation in choosing LSB.

[3] Musa EP, Philip S. “Secret communication using image steganography, African Journal of Computing and ICT, Vol 8.
No. 3, pp. 1-8, Sep 2015. 10/42
LSB Matching

• LSB technique with some modifications has been


introduced.
• Novel methods of multiple LSB implemented on grey
scale images of 512x512.
• This 8 bit image first converted into ASCII and then a
secret message was embedded in it using multiple LSB
method.
• The embedded data was of 15 KB approximately
• PSNR and MSE parameters were used for the
steganography of images.

[4] W. Luo, F. Huang and J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited,” in IEEE
Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 201-214, June 2010. 12/42
LSB Matching

[4] W. Luo, F. Huang and J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited,” in IEEE
Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 201-214, June 2010. 13/42
LSB Matching

14/42
Modified Signed Digit (MSD)

• Another technique proposed that is MSD.


• Only 2 pixels of the cover image have been changed
• More data can be embedded into the cover image.
• Furthermore, if the pixels of cover image are 4 in each
group
• Then quality of stego-image is better than 52 db.

[5] W. C. Kuo, C. C. Wang, H. C. Hou, “Signed digit data hiding scheme”, Information Processing Letters, vol. 116, no. 2,
pp. 183-191, February 2016. 15/42
Modified Signed Digit (MSD)

Original Image (Lena)


16/42
Modified Signed Digit (MSD)

17/42
Data Encryption Standard (DES)

• DES based image steganography proposed.


• It increase the security and authenticity of the secret
data.
• S-Box mapping and secret key used for hiding the secret
information in an image.
• By using 2 unique S-boxes, the pre-processing of secret
image is carried out.

[6] Manoj Kumar Ramaiya, N. Hemrajani and A. K. Saxena, “Security improvisation in image steganography using DES,”
2013 3rd IEEE InternationalAdvanceComputingConference(IACC),Ghaziabad,2013, pp. 1094-1099. 18/42
Data Encryption Standard (DES)

19/42
Gabor Filter

• Another technique introduced that based on texture


similarity using Gabor filter.
• In this method secret image and the original image were
divided into 4x4 blocks.
• After that Gabor filter was used.
• Embedding the images block by block.
• Replacing the blocks with the maximum resemblance
and least distortion.
• More robust as compare to the other techniques.

[7] Z. Z. Kermani and M. Jamzad, “A robust steganography algorithm based on texture similarity using Gabor filter,”
Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005., Athens,
2005, pp. 578-582. 20/42
Steganography using Secret
Keys
• Using 2 private keys to randomize the embedding
process.
• Improve the security level of the hidden information.
• It used a pixels R, G, B values and performed a few
mathematical calculations.
• Data to be hidden is inserted randomly.
• For evaluation PSNR was used that helped to assess
the quality.
• Concluded more efficient than others.

[8] S. Dagar, “Highly randomized image steganography using secret keys,” International Conference on Recent
Advances and Innovations in Engineering (ICRAIE-2014), Jaipur, 2014, pp. 1-5. 21/42
Steganography using Secret
Keys

Cover Image

Secret Information
22/42
Steganography using Secret
Keys

Cover Image PSNR (in dB)

Lena 49.2668

Baboon 48.8766

Peppers 47.9887

23/42
Discrete Wavelet Transform

• The DWT (Discrete Wavelet Transform) divides the


image in frequency components.
• Take an image as cover object and other small image as
the secret message.
• In the process of embedding:
• Convert the cover image in the wavelet domain.
• Manipulation of high frequency.
• Then steganography have been done.

[9] P. B. Kutade, P. S. Arora Bhalotra, “A Survey on Various Approaches of Image Steganography”, International Journal
of Computer Applications (0975 8887), vol. 109, no. 3, 2015. 24/42
RGB Based Steganography

• A novel technique RGB based Steganography is


proposed.
• Divide the cover and secret image into 8 blocks.
• Then private message is embedded with the selected
color image, block by block.
• Add 4 bits of secret message in the color components.
• For encryption and decryption process, RSA algorithm is
used at receiver and sender side

[10] G. Swain, S. K. Lenka, “A novel approach to RGB channel based image steganography technique”, International
Arab Journal of e-Technology, vol. 2, no. 4, pp. 181-186, 2012. 25/42
RGB Based Steganography
Cover Image PSNR (in dB)

Lena 49.67

Garden-Home 50.26

Road 50.79

Player 50.31

26/42
Encryption through RSA
(Rivest-Shamir-Adleman)
• RSA is use to encrypt the data from different attacks by
using two keys
• Public key
• Private key
• In RSA algorithm, anyone can encrypt the data but no
one can decrypt it except some authorized receiver.
• Here, it is use for encoding and decoding the brain
images by using both keys in pairs.

[11] B. J. S. Kumar, V. K. R. Raj, and A. Nair, “Comparative study on AES and RSA algorithm for medical images,” in
2017 International Conference on Communication and Signal Processing (ICCSP), 2017, pp. 0501-0504. 27/42
Encryption through AES
(Advance Encryption Standard)
• AES based on Substitution Permutation Network.
• AES is use for data encryption and decryption by using
same private key.
• It can keep their digital images safe.
• AES encompasses three block ciphers,
• AES-128
• AES-192
• AES-256
• AES is more efficient in both encryption and decryption.

[11] B. J. S. Kumar, V. K. R. Raj, and A. Nair, “Comparative study on AES and RSA algorithm for medical images,” in
2017 International Conference on Communication and Signal Processing (ICCSP), 2017, pp. 0501-0504. 28/42
HAAR Discrete Wavelet
Transform
• Haar wavelet is the simplest discrete wavelet transform.
• Through this method a steganographic algorithm is
capable of hiding the secret data.
• By applying Haar Wavelet on an image, we get
• Approximation coefficients LL , LH
• Detailed coefficients HL , HH
• In this research the proposed approach includes 2 main
process
• Embedding process
• Extracting process
[12] E. H. Houssein, M. A. S. Ali and A. E. Hassanien, “An image steganography algorithm using Haar Discrete Wavelet
Transform with Advanced Encryption System,”2016 Federated Conferenceon Computer Science and Information
Systems (FedCSIS), Gdansk, 2016, pp. 641644. 29/42
HAAR Discrete Wavelet
Transform

2D Haar Wavelet Transform

30/42
HAAR Discrete Wavelet
Transform

31/42
HAAR Discrete Wavelet
Transform

32/42
Conclusion

• LSB is comparatively straight forward but it is not


resistant toward the statistical attacks.
• LSB is preferable for short messages only.
• DWT is best choice between DCT and DWT, as it causes
minimum distortion in the image.
• For Encryption of medical images, AES is suggested by
many researchers.
• Steganography must be added with encryption of a
medical image for more security.

33/42
References

• F. A. P. Peticolas,, “Information hiding-a survey”, Proceedings of the IEEE, Vol. 87, pp. 1062-1078, 1999
• N. Chen, C. Su, C. Shih and Y. Chen, “Reversible watermarking for medical images using histogram shifting with location
map reduction,” 2016 IEEE International Conference on Industrial Technology (ICIT), Taipei, 2016, pp. 792-797
• Musa EP, Philip S. “Secret communication using image steganography, African Journal of Computing and ICT, Vol 8. No.
3, pp. 1-8, Sep 2015.
• W. Luo, F. Huang and J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited,” in IEEE
Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 201-214, June 2010.
• W. C. Kuo, C. C. Wang, H. C. Hou, “Signed digit data hiding scheme”, Information Processing Letters, vol. 116, no. 2,
pp. 183-191, February 2016.
• Manoj Kumar Ramaiya, N. Hemrajani and A. K. Saxena, “Security improvisation in image steganography using DES,”
2013 3rd IEEE InternationalAdvanceComputingConference(IACC),Ghaziabad,2013, pp. 1094-1099.
• Z. Z. Kermani and M. Jamzad, “A robust steganography algorithm based on texture similarity using Gabor filter,”
Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.,
Athens, 2005, pp. 578-582
• S. Dagar, “Highly randomized image steganography using secret keys,” International Conference on Recent Advances
and Innovations in Engineering (ICRAIE-2014), Jaipur, 2014, pp. 1-5.
• P. B. Kutade, P. S. Arora Bhalotra, “A Survey on Various Approaches of Image Steganography”, International Journal of
Computer Applications (0975 8887), vol. 109, no. 3, 2015.
• G. Swain, S. K. Lenka, “A novel approach to RGB channel based image steganography technique”, International Arab
Journal of e-Technology, vol. 2, no. 4, pp. 181-186, 2012..

34/42
References

• B. J. S. Kumar, V. K. R. Raj, and A. Nair, “Comparative study on AES and RSA algorithm for medical images,” in 2017
International Conference on Communication and Signal Processing (ICCSP), 2017, pp. 0501-0504.
• E. H. Houssein, M. A. S. Ali and A. E. Hassanien, “An image steganography algorithm using Haar Discrete Wavelet
Transform with AdvancedEncryptionSystem,”2016FederatedConferenceonComputer Science and Information Systems
(FedCSIS), Gdansk, 2016, pp. 641644.
• D.L.Vasoya,V.M.Vekariya and P.P.Kotak, “Novel approach forimage steganography using classification algorithm,” 2018
2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, 2018, pp. 1079-1082.
• M. Douglas, K. Bailey, M. Leeney, K. Curran, “Using SVD and DWT Based Steganography to Enhance the Security of
Watermarked Fingerprint Images”,Telkomnika, vol. 13, June 2015.
• M.S. Subhedar, V.H. Mankar, “Image steganography using redundant discrete wavelet transform and qr factorization”,
Computers & Electrical Engineering, vol. 54, pp. 406-422, 2016.
• R. M. Chao, H. C. Wu, C. C. Lee, Y. P. Chu, “A novel image data hiding scheme with diamond encoding”, EURASIP J.
Inf. Security, vol. 2009, 2009.
• N. M. Surse and P. Vinayakray-Jani, “A comparative study on recent image steganography techniques based on DWT,”
2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai,
2017, pp. 1308-1314.
• R. Sreejith and S. Senthil, “A novel tree based method for data hiding and integrity in medical images,
”2017IEEEInternationalConferenceon Electrical, Instrumentation and Communication Engineering (ICEICE), Karur,
2017, pp. 1-4.

35/42
Questions

36/42
PSNR

37/42

You might also like