Вы находитесь на странице: 1из 5

An Improved Quad and RDE-based Medical Data

Hiding Method

Tohari Ahmad1, Muhammad Holil2, Waskitho Wibisono3, Royyana Muslim I4


Department of Informatics
Institut Teknologi Sepuluh Nopember (ITS)
Kampus ITS Keputih Sukolilo, Surabaya, Indonesia, 60111
{1tohari, 3waswib, 4roy}@if.its.ac.id, 2holil12@mhs.if.its.ac.id

Abstract—Difference Exapansion is one of popular reversible capacity of message (e.g., identity of the user) to be embedded
steganography methods which can be used for authenticating into the image [2]. In this case, the capacity must not less than
images. By using this method, the reconstructed image is exactly the size of the message itself. It means that the information or
the same as the original one. However, the stego image generated identity of the patient can be embedded properly into the medical
is relatively different from the original. Based on Quad and RDE image. Another factor is reversibility, that the stegano image
methods, we propose an algorithm which can improve the quality resulted from the process can be reconstructed into the exactly
of the stego image, in terms of PSNR, in particular. The same as the original image. Medical environment needs this
experimental results show that while the capacity of embedded properties because downgrading the image quality most likely to
message is slightly higher, the PSNR is significantly better.
lead to incorrect analyzing result by the doctor. In addition, the
Keywords—steganography, medical image, data hiding, security
message embedded to the image itself must also be
reconstructed correctly, so, the doctor knows that it corresponds
I. INTRODUCTION to the right person. Therefore, fulfilling these requirements,
reversibility in particular, can protect both the security and
Patient images have played an important role in medical privacy of the patient and its corresponds data. Also, the the
environment. Many health problems require a doctor to analyze
original image can be extracted without any distortion[3]. This
the patient medical image, for example, abdominal, chest and is appropriate to the environment which prioritizes the quality as
leg images. Based on them, the doctor draws a conlusion what in medical and military environment[4].
kind of treatment should be given to the patient. After being
analyzed, patient medical images are stored in a database along One of reversible data hiding methods is Difference
with his/her health record. This data will be used for next Expansion (DE) which is introduced by Tian[5] and improved
processes such as transferred to other doctors so that a decision by Alattar[8]. Compared to other reversible methods, it is
on how the patient is treated can be made as soon as possible. superior in terms of the capacity of the message to be embedded
to the image[6]. However, similar to other introduced methods,
Nevertheless, in terms of security, privacy and accuracy,
the quality of the stego image (embedded image) can still be a
there are at least two problems of transferring or accessing the problem. If its quality significantly decreases, public is able to
stored images. First, the user (e.g., a doctor) must not have an identify that the image has been embedded by other data. This
access to unrelated patient data in order to avoid incorrect can attract the adversary to investigate the stego image
treatment. Furthermore, the user must be able to authenticate intensively and reveal both the message and the original medical
those medical images. So, ensuring this process works properly image.
is critical to the accuracy factor. Secondly, the identity of the
image owner must be secret. In case an adversary has been able In this paper, we propose a Quad and RDE-based method
to compromise the image, he/she does not know who this data which can increase the stego image quality as well as the
belong to, so, security and privacy of the patient are maintained. capacity of the embedded message. We believe that by rising up
its quality, public may not be suspicious about this stego image.
One possible solution of those problems is to insert the
Furthermore, the exactly same original image and message can
identity of the patient to its corresponding medical image be extracted from this image. The rest of this paper is organized
property. However, this method is not secure because public can as follows. Section 2 explains the related works, section 3
still read or even modify the information in it. Therefore, this
describes the proposed method. The experimental result and
method is not applicable to use. Another solution is to employ conclusion are provided in section 4 and 5, respectively.
steganography, which embeds the identity of the patient to the
corresponding medical image. By using this method, the II. RELATED WORKS
information cannot be seen easily by public.
By considering the specified requirements (e.g, capacity,
Applying steganography is also useful for authenticating the reversibility) described in the previous section, some methods
medical image itself [1]. There are some factors should be taken have been introduced. This includes difference expansion (DE)
into consideration when implementing this method, such as the

978-1-4673-6053-1/13/$31.00 ©2013 IEEE 141 CYBERNETICSCOM 2013


[5], reduce difference expansion (RDE) [2] and some modified = + 2log2 | |−1
(7)
DE [7,8,9].
= + 2log2 | |
(8)
A. Difference Expansion (DE)
DE [5] is constructed by modifying the difference value C. Different Expansion of Quads
between two pixels but maintaining their average value. This Alattar [8] improves the DE method introduced by Tian [5]
method groups every two pixels, so, there are pixel pairs. in terms of the capacity of the message can be embedded to the
Selection is made to them such that the embedded value is only image. In [5], a bit of data can be embedded into a pixel pair;
done to the pairs whose value is neither overflow nor underflow. while in [8], 3 bit of data can be for a quad pixel. Therefore, there
In this case, a bit of data is only applied to the pairs which meet is a significant increase of maximum amount of data can be
the requirements. embedded.
Specifically, this method groups 8 bit grayscale pixels into In this method, an image is divided into square blocks
(x,y) pairs where 0≤ x, y ≤255. It is defined in (1) that: contain 4 pixels each. In the image, blocks are constructed from
left to right and from top to bottom. Every pixel block is
= , = − (1) converted into a vector. For every block = ( , , , ),
Alattar [8] defines an integer transformation as in (9). Here, the
where m and v are the average and difference two pixel values, vector = ( , , , ) is the difference value of block =
respectively. The embedding bit data is performed according to ( , , , ).
(2), where v’ is the result of embedding process, and b is bit data
to be embedded. In this case, b is either 0 or 1. =

′ = 2 x + (2) = − (9)
⎨ = −
The equation (2) is actually the inverse of (1) as it is provided
in (3). ⎩ = −
In order to reconstruct the original image, the invers of (9) is
= + , = − (3) used. This is provided in (10) below.
In order to avoid overflow and underflow, the value of v’ has ⎧ = −
to meet (4). If v’ fulfills (4) then it is classified as expandable; ⎪
otherwise, it is unexpandable. = + (10)
⎨ = +
| | ( ) , ⎪ = +
{| | , (4) ⎩
The embedding process is done by modifying the values of
B. Reduced Difference Expansion (RDE) , and . The embedding process itself can be done in two
RDE is an improvement of the previous DE method. In the ways. Those are:
previous DE, the difference pixel value is two times bigger after
being processed. In case the resulted value is more than 255, it  By using expanding
will be ignored. This is intended to keep the quality of the image. ′ = 2 x +
However, this ignorance leads to reducing the capacity of the ′ = 2 x + (11)
message can be embedded into the image. Because of this
condition, Lou et al. [2] proposes this reduced difference ′ = 2 x +
expansion method.  By modifying LSB
RDE works by reducing the difference value between pixels
used in the DE embedding process. RDE is represented in (5), ⎧ ′ = 2 x +

where v’ is the difference value which has been reduced by using ′ = 2 x + (12)
RDE. ⎨
⎪ ′ = 2 x +
̅={ ,
(5) ⎩
⌊ ⌋ ,
where , and ∈ {0,1} are the bits of data to be embedded
In order to get the correctly original diffence value in the into pixel blocks. Once the embedding process has finished, the
reconstruction step, location map is applied whenever the vector = ( ′ , ′ , ′ , ′ ) is transformed by using (10) into
reduction is occured. The size of the location map itself is similar = ( ′ , ′ , ′ , ′ ). Pixel block u is then replaced by u’
to the number of pixel pairs. This location map is specified in which has been embedded by the bit of data, so, the imagae I
(6). will be I’.
, ⌊ ⌋ ⌊ ⌋
Location map = { (6) Block = ( , , , ) is expandable if it meets two
, ⌊ ⌋ ⌊ ⌋
criterias. First, it fulfills (9-12); second, the final embedding
The reconstruction of the original value is performed by result does not cause overflow or underflow. A pixel block is
using (7) if the location map is 0; and by using (8) if the location overflow if the value of the modified pixel is higher than the
map is 1. maximum pixel value being used; while underflow if it is lower

142
than the minimum pixel value being used [5]. If the embedding The embedding process is begun by determining the
process is sucessfully done by using (11), then vector u is difference between pixel as in (9). Different from Alattar [8],
classified as expandable; and if (12) is sucessfully used, then however, we only calculate the pixel differences of , , .
vector u is changeable. If those two embedding methods in (11- Here, is not used. In the expandable blocks, before the
12) can cause either overflow or underflow to the expendable embedding process is run, the difference of pixels where ∈
vector u, then the vector is non-changeable. {1,2,3} is reduced by using RDE.
Similar to Tian [5], Alattar [8] also implements location map Reduction of pixel differences is done by improving the
M to store the embedding technique information for each block. original method proposed in [2]. The differences between theirs
Bit 0 in M means that the expansion method is applied for the and ours are explained as follows. Lou et. al [2] proposes the
corresponding block, and bit 1 means that the LSB modification reduction method which is only applied when the difference of
method is implemented for the block. pixels is higher than 2. It means that any value other than that
will not be reduced. Different from this, we propose a method
III. PROPOSED METHOD which the reduction is performed for both positive and negative
Our proposed method is developed by considering the quad differences of pixels except −1 ≤ ≤ 1. This is because the
of DE method by Alattar [8] and RDE by Lou et al. [2]. These image reconstruction by using a value in this range causes
two methods are combined by reducing the difference pixel incorrect both image and message. The reduction process
value using RDE. The overall algorithm is described in Fig 1. employs two methods. The first is applied for > 1, where it
Different from the method proposed in [8] that the difference of is similar to the one proposed by Lou et. al [2] as described in
pixels is directly embedded by a message with expansion, we (13). The second is for < −1, as provided in (14).
propose that the difference is firstly reduced by using RDE. This
makes only the smaller expansion. = − 2⌊ ( )⌋
(13)
⌊ (| |)⌋
A. Data Embedding = +2 (14)
As in [8], we classify pixel blocks into three categories: Reduction is only applied for expandable pixel blocks. After
expandable, changeable and non-changeable. The embedding reduction is performed, there is a smaller number . The
process is only applied for the first two categories. This is embedding process is done to this reduced number by
because those two categories produce new pixels in an ideal applying (11). This results to ́ which contains embedded data.
condition (neither overflow nor underflow). As in the previous
Once the data embedding has finished, the pixel value is
description, the expandable blocks are processed by using (11)
while changeable ones are by using (12). Non-changeable determined by using the difference of pixel ́ . In [8,9], Alattar
blocks are ignored in the embedding process since it can cause proposes to use (10) to obtain a new pixel value. Here, we
either overflow or underflow. In the grayscale environment, it is propose (15). Different from that in [8,9], ours does not change
defined that underflow is when the pixel value is negative, and the value of . For the other new three pixels, we still use those
overflow is when it is higher than 255 [5]. provided by Alattar [8,9].
=
Alattar[8] Proposed Method
= ́ +
(15)
= ́ +
= ́ +
Calculate Calculate
difference v difference v
For expandable non RDE and changeable pixel blocks, the
data embedding process is done similar to [8] except for
determining new pixels. That is, [8] uses (10) while we use (15)
to calculate the value of new pixels.
Reduce v Similar to other DE-based methods, the proposed method
also uses a location map for the recontruction purpose. Different
Embed data to v from the one of Alattar [8], however, we do not embed it to the
stego image. Equivalent to the classification of the pixel blocks,
Embed data to v
the location map is also grouped into three. Those are
expandable, changeable and non-changeable. Because
expandable pixel blocks will be reduced, it needs a location map
which performs further grouping the pixel blocks into
Calculate new Calculate new
expandable RDE and expandable non-RDE. Furthermore, in
pixel pixel order to obtain the exactly same original image, RDE also
requires a location map for each pixel reduction process.
The location map fo each pixel block is saved into vector
Figure 1 Differences between Alattar's method [8] and the
=( , , , , ). The value of each block in
proposed method the location map is shown in Fig. 2, where those in expandable,
changeable and non-changeable groups are assigned 1, 0 and -1,
respectively. In this case, if is 1, which means expandable,

143
then = 1 means that the corresponding block is expandable B. Data extraction
RDE; and = 0 means that that block is expandable non- Extraction of expandable RDE pixel blocks will be done if
RDE. For those in expandable RDE, the location map only both and are 1. This extraction is performed by
, , is 0 if ± 2 | | = ; and firstly calculating the difference of pixels ́ =
| |
, , is 1 if ±2 ≠ . This is different { , , } using (9). Bit data is obtained by extracting LSB
from Lou et al. [2] as described in (7,8). For = 0, which of ́ . It is then right shifted to have . Because is previously
means that the corresponding block is changeable, the value of reduced, in order to get the original data, (7) is used if
, , is 1 if each difference of pixels , , is odd; , , is 0 and ≥ 1; and (8) is used if
and 0 if it is even. The overall data embedding process is , , is 1 and ≥ 1. In case ≤ −1 and
depicted in Fig. 3. , , is 0, (16) is applied; and if ≤ −1 and
, , is 1, then (17) is employed. After each value of
has been recoverd, the value of pixels is determined by (15).
Expandable
RDE = − 2log2 | |−1
(16)
LM2=1
Expandable log2 | |
= −2 (17)
LM1=1
Expandable Extraction of expandable non-RDE pixel blocks will be
NON RDE performed by using a method proposed by Alattar [8], and the
LM2=0 new pixel value is determined according to (15). Lastly,
Changeable extraction of changeable pixel blocks will be performed by
Pixel blocks
LM1=0 taking LSB bit of each . After that, is returned back to the
original difference by using (18) if , , is 0, and
by using (19) if , , is 1.

Non Changeable = 2 x (18)


LM1=-1
= 2 x +1 (19)
Figure 2 Location map IV. EXPERIMENTAL RESULTS
Once the extraction process has finished, the extracted data
Calculate
can be compared to its corresponding original data. If both of
Set block to them are same, then it is classified as authentic. The experiment
differences
unchangeable is done to the grayscale radiography images obtained from [10]
v1,v2,v3
whose size are 512 x 512 pixel each. Data embedded to the
No image is a bitstream whose size is corresponding to the
maximum bit can be embedded to the image.
Expandable No Changeable The quality of stego images is measured by using common
methods. Those are peak signal-to-noise-ratio (PSNR) to
measure how close the original and stego images. The PSNR
Yes Yes value itself is specified as in (20).
Set block to = 10 log
|v1|,|v2|,& |v3| Set block to
YES expandable (20)
≥ 2 changeable
RDE = ∑ ∑ ( − )
NO MSE is mean square error which shows the difference
between the original image Y and the stego image Y’. Higher
Set block to Reduction Data embedding PSNR obtained means better.
expandable process (Eq. 12)
In addition, we also measure the capacity of the embedded
data. This is the maximum bit can be embedded to the image. It
is to investigate whether changes in the quality of images affect
the capacity.
Data embedding Calculate new
(Eq. 11) pixel (Eq. 15) From the experimental result showed in Table 1, it can be
inferred that the capacity of the embedded data of the proposed
method is higher than that of Alattar [8]. The highest increase is
Figure 3 Data embedding process in “Head” image where there are more than 2.5 kilo bits, while
the lowest is in “Hand” image where there are about 100 bits. In

144
terms of capacity, the proposed method is more appropriate to
implement.
7
Table 2 depicts the PSNR values of both Alattar [8] and the
proposed method. It shows that the proposed method delivers 6
higher PSNR values than that of Alattar [8]. Similar to Table 1, 5
the highest increase of PSNR is obtained from “Head” image
4
with 6.258. Different trend from Table 1, the lowest increase of
PSNR is “Leg” image. From those two tables, the increasing of 3
both capacity and PSNR can be drawn in Fig. 4. Overall, they 2
have similar trend.
1
0
Table 1 Capacity of embedded data

Capacity (bits)
Image
Alattar [8] Proposed Method
Abdominal 187677 189408 Capacity (kilo bits) PSNR
Chest 194982 195978
Hand 196491 196587 Figure 4 The increase of capacity and PSNR values
Head 184428 186948
Leg 196323 196605 REFERENCES

[1] Osamah M Al-Qershi and Bee Ee Khoo, "High capacity data hiding
schemes for medical images based on difference expansion," Journal of
Table 2 PSNR of the images Systems and Software , no. 84, pp. 105-112, 2011.
[2] Der-Chyuan Lou, Ming-Chiang Hu, and Jiang-Lung Liu, "Multiple layer
PSNR (dB) data hiding scheme for medical images," Computer Standards &
Image Interfaces, pp. 329-335, 2009.
Alattar [8] Proposed Method
[3] Chi-Nan Lin, J. Buehrer Daniel, and Chin-Chen Chang, "Using quad
Abdominal 32.427 37.285 smoothness to efficiently control capacity distortion of reversible data
Chest hiding," Journal of Systems and Software, no. 83, pp. 1805-1812, 2010.
35.756 40.128
[4] Chin-Chen Chang, "A high stego-image quality steganographic scheme
Hand 32.971 38.371 with reversibility and high payload using multiple embedding strategy,"
Journal of Systems and Software , no. 82, pp. 1743-1752, 2009.
Head 29.689 35.947 [5] Jun Tian, "Reversible data embedding using a difference expansion,"
Leg 34.942 38.385 Circuits and Systems for Video Technology, IEEE Transactions, pp. 890-
896, 2003.
[6] Diljith M. Thodi and J. Rodríguez Jeffrey, "Expansion embedding
techniques for reversible watermarking," Image Processing, IEEE
V. CONCLUSION Transactions, pp. 721-730, 2007.
The proposed method has been evaluated in terms of [7] Adnan M Alattar, "Reversible watermark using difference expansion of
capacity and PSNR. The experimental results show that this triplets," in IEEE International Conference on Image
Processing,ICIP’2003, 2003, pp. I-501.
method produces higher values than the previous method. On
[8] Adnan M Alattar, "Reversible watermark using difference expansion of
average, based on the experiment, there is an increase of 4.8 of quads," in Acoustics, Speech, and Signal Processing IEEE International
PSNR for a slight increase of secret message capacity. There is Conference, 2004, pp. iii-377.
still an opprotunity to improve this PSNR value and capacity of [9] Adnan M Alattar, "Reversible watermark using the difference expansion
the embedded message by, for example, enlarging the size of of a generalized integer transform," in Image Processing, IEEE
pixel groups. Transactions, 2004, pp. 1147-1156.
[10] (2013, September) Partners Infectious Disesase Images, Emicrobes
Digital Library. [Online].
ACKNOWLEDGMENT http://www.idimages.org/images/browse/ImageTechnique/
This project is supported by Ministry of Education and
Culture, and Institut Teknologi Sepuluh Nopember (ITS) under
LBE research grant.

145

Вам также может понравиться