Secure transmission of medical images in multi-cloud e-healthcare applications using data hiding scheme

被引:0
|
作者
Devi, K. Jyothsna [1 ]
Singh, Priyanka [2 ]
Dash, Jatindra Kumar [2 ]
Thakkar, Hiren Kumar [3 ]
Tanwar, Sudeep [4 ]
Alabdulatif, Abdulatif [5 ]
机构
[1] PVPSIT, Dept Comp Sci & Engn, Vijayawada 520008, Andhra Pradesh, India
[2] SRM Univ, Dept Comp Sci & Engn, Amaravati 522502, Andhra Pradesh, India
[3] Pandit Deendayal Energy Univ, Dept Comp Sci & Engn, Gandhinagar, Gujarat, India
[4] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad, India
[5] Qassim Univ, Coll Comp, Dept Comp Sci, Buraydah 52571, Saudi Arabia
关键词
Reversible data hiding; NMI; Interpolation; Cloud security; Medical image watermarking; Security; REVERSIBLE WATERMARKING;
D O I
10.1016/j.jisa.2023.103655
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, medical image transmission using a multi-cloud system has played a significant role in e Healthcare infrastructure. It allows medical practitioners to easily store, retrieve, and share patients' medical information across multiple stakeholders. However, multi-cloud image transmission may be vulnerable to multiple security breaches, such as authentication, confidentiality, and security issues. Motivated by these issues, this paper proposes a data-hiding scheme for secure medical image transmission in a multi-cloud environment. The proposed scheme ensures imperceptible robustness and watermark security at a low computational cost. Here, the medical image is divided into a number of shares using Neighbor Mean Interpolation (NMI). To achieve confidentiality, Electronic Patient Healthcare Record (EPHR) is encrypted using Double Scan Pixel Position Shuffling (DSPPS) approach. Then, the encrypted EPHR is divided into shares and embedded in the cover medical image shares. Finally, a minimum of 50% of watermarked image shares are utilized to retrieve the original medical image and encrypted EPHR, consequently reducing multi-cloud latency and computational burden. Experimental results show that the proposed scheme shows high imperceptibility, robustness, and watermark security at a low computational cost. Comparative analysis with some of the recent popular data hiding schemes shows that the proposed scheme has improved imperceptibility and robustness by 10%-15% (approximately) with higher watermark security at a low computational cost.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] A Blind Medical Image Watermarking for Secure E-Healthcare Application Using Crypto-Watermarking System
    Aparna, Puvvadi
    Kishore, Polurie Venkata Vijay
    JOURNAL OF INTELLIGENT SYSTEMS, 2020, 29 (01) : 1558 - 1575
  • [42] Verifiable fuzzy keyword search supporting sensitive information hiding for data sharing in cloud-assisted e-healthcare systems
    Zhang, Yunfeng
    Hao, Rong
    Ge, Xinrui
    Yu, Jia
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
  • [43] Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications
    Mukul Majhi
    Arup Kumar Pal
    Jitesh Pradhan
    SK Hafizul Islam
    Muhammad Khurram Khan
    Multimedia Tools and Applications, 2022, 81 : 41545 - 41577
  • [44] Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications
    Majhi, Mukul
    Pal, Arup Kumar
    Pradhan, Jitesh
    Islam, S. K. Hafizul
    Khan, Muhammad Khurram
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (29) : 41545 - 41577
  • [45] Separable and reversible data hiding scheme for medical images using modified Logistic and interpolation
    Xiong, Xiangguang
    Zhong, Siyao
    Lu, Yu
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2024, 87
  • [46] Novel substitution-box generation using group theory for secure medical image encryption in E-healthcare
    Razaq, Abdul
    Maghrabi, Louai A.
    Ahmad, Musheer
    Naith, Qamar H.
    AIMS MATHEMATICS, 2024, 9 (03): : 6207 - 6237
  • [47] An optimal cloud-based e-healthcare system using k-centroid MVS clustering scheme
    Sreedhar, K. C.
    Kumar, N. Suresh
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (03) : 1595 - 1607
  • [48] Multi-Cloud Environments With Quantum Cloud Computing for Secure Data Transfer using Two-Tier Homomorphic Encryption
    Chhabra, Manish
    Rajesh, E.
    2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE COMPUTING AND SMART SYSTEMS, ICSCSS 2024, 2024, : 663 - 670
  • [49] A Secure, Energy- and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System
    Sharma, Ashutosh
    Rathee, Geetanjali
    Kumar, Rajiv
    Saini, Hemraj
    Varadarajan, Vijayakumar
    Nam, Yunyoung
    Chilamkurti, Naveen
    SENSORS, 2019, 19 (09)
  • [50] A Secure Reversible Data Hiding Scheme for Digital Images using Random Grid Visual Secret Sharing
    Kukreja, Sonal
    Kasana, Geeta
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 864 - 869