International Journal of Cognitive Computing in Engineering (Jan 2024)

A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement

  • Mohamed Abdel Hameed,
  • M. Hassaballah,
  • Riem Abdelazim,
  • Aditya Kumar Sahu

Journal volume & issue
Vol. 5
pp. 379 – 397

Abstract

Read online

With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the privacy of patients. As medical information becomes more widely available, security measures must be established to protect confidentiality, integrity, and availability. Image steganography was recently proposed as an extra data protection mechanism for medical records. This paper describes a data-hiding approach for DICOM medical pictures. To ensure secrecy, we use Adversarial Neural Cryptography with SHA-256 (ANC-SHA-256) to encrypt and conceal the RGB patient picture within the medical image’s Region of Non-Interest (RONI). To ensure anonymity, we use ANC-SHA-256 to encrypt the RGB patient image before embedding. We employ a secure hash method with 256bit (SHA-256) to produce a digital signature from the information linked to the DICOM file to validate the authenticity and integrity of medical pictures. Many tests were conducted to assess visual quality using diverse medical datasets, including MRI, CT, X-ray, and ultrasound cover pictures. The LFW dataset was chosen as a patient hidden picture. The proposed method performs well in visual quality measures including the PSNR average of 67.55, the NCC average of 0.9959, the SSIM average of 0.9887, the UQI average of 0.9859, and the APE average of 3.83. It outperforms the most current techniques in these visual quality measures (PSNR, MSE, and SSIM) across six medical assessment categories. Furthermore, the proposed method offers great visual quality while being resilient to physical adjustments, histogram analysis, and other geometrical threats such as cropping, rotation, and scaling. Finally, it is particularly efficient in telemedicine applications with high achieving security with a ratio of 99% during remote transmission of Electronic Patient Records (EPR) over the Internet, which safeguards the patient’s privacy and data integrity.

Keywords