Li-Chin Huang, Min-Shiang Hwang, and Lin-Yu Tseng
Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map
Li-Chin Huang, Min-Shiang Hwang, and Lin-Yu Tseng
—Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Hénon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images.
Index Terms—Cloud computing environments, encryption, Haar digital wavelet transformation, Hénon map, reversible data embedding.
With the development of Internet, cloud computing is going to be applied in large data centers. Considering security issues, it is important to manage the data and services in cloud computing environments safely. Techniques of reversible data hiding[1]–[3]are more efficient and cheaper than intrusion detection system (IDS)[4]solutions in image security. To improve security in clinical information such as medical history, radiology images, and personal states, many reversible schemes are getting more and more important via Internet and cloud computing environments. After the process of embedding secrets, data hiding schemes[5]?[7]which can restore the original image and extract secrets from stego-images without distortion are known as reversible schemes[8],[9]. The applications of reversible techniques have already been adopted by variety of high precision systems such as the health care system, artwork, and science.
In the transform domain schemes[1],[10], the cover image will be transformed to a set of coefficients modified for embedding secrets and then the modified coefficients perform the inverse transformation to construct stego-images. An integer discrete cosine transform reversible data hiding scheme was presented by Yanget al.[11]. Based on the compressed domain[12], reversible data hiding schemes have already developed by joint photographic experts group (JPEG)[13], vector quantization[14], and block truncation coding[15]. In spatial domains, there are three schemes: difference expansion (DE), histogram shifting, and cryptography base schemes[16]. DE techniques[17]are based on checking the redundancy between the two neighboring pixels to obtain a high capacity and low distortion data hiding. In 2009, Louet al.[18]developed a reduction DE method to adjust the expansion difference and embed data into multiple layers in medical images to increase capacity. The histogram shifting techniques[19]are adopted to search the peak and zero points in the cover image histogram. Then, the bins between the peak and zero points will be shifted with one level to empty the peak point for hiding secrets. Cryptography-based reversible data hiding techniques[20]consider steganography as a cryptography. Therefore, a variety of secret communications messages can be embedded in stegoimages.
Reversible data hiding techniques play a critical role in medical images. To provide some preliminary diagnosis for health care[21],[22]without the restoration of the original medical images, some data hiding schemes[19]embedded secrets into the region of non-interest (RONI) and less secret bits are embedded into the region of interest (ROI). In mobile healthcare applications, Rochanet al.[23]adopted an arithmetic coding and cryptography to embed data in medical images.
Haar digital wavelet transformation (HDWT) is an important technique to transform an image from a spatial domain to a frequency domain composed of different frequency bands. Since human eyes are less sensitive to change the image of the high-frequency coefficients, Changet al.[1]adopted this property to conceal secret data.
With the advent of cloud computing environments, confidentiality of data becomes more and more important. In 2011, Abbasyet al.[24]presented a data hiding based on deoxyribonucleic acid (DNA) sequences to encrypt in cloud computing environments. Conventional cryptography utilizes a long bit strings encryption key. However, it is hard to be applied in high resolution images and huge amount of data. Patidaret al.[25]adopted an efficient substitution-diffusion image cipher using chaotic standard and logistic maps. In this paper, we apply the Hénon map[26]and chaotic-based cryptosystems to data hiding.
This paper is organized as follows. Section 2 demonstrates our method. Section 3 presents the experimental results. And conclusions are drawn in Section 4.
HDWT-based reversible image hiding is applied to embednbits secret messages for each block in this paper. In the application of compression and data hiding, two-dimensional discrete wavelet transform (DWT) is often adopted to transform the spatial domain to the frequency domain. We apply also HDWT to transform an image in the frequency domain for data hiding described as follows.
2.1 Embedding Secret Phase
Let a one-level HDWT decomposition transform a spatial domain cover image into a frequency domain cover image. Further, each coefficient of the image is divided two parts: integer and decimal. In Fig. 1 and Fig. 2, there are 4 types of decimal fractions: 0, 0.25, 0.5, and 0.75. In this paper, we adopt decimal 0 and 0.5 to embed secret.
At preliminary process, we select four decimal fractions (D1,D2,D3,D4) whereD1,D2,D3,D4∈{0, 0.5}. And four decimal fractions satisfy the relationRdescribed as follow.
Let (D1,D2,D3,D4) be a set of candidate decimal fractions. Candidate decimal fractions will be generated as {(0, 0, 0, 0), (0, 0, 0.5, 0.5), (0, 0.5, 0, 0.5), (0, 0.5, 0.5, 0)}. Thus, decimal secret code provides 2 bits embedding shown in Table 1.
Step 1: Image partition with non-overlapping image blocks.
AssumeHbe a 16-bit depth gray scale medical HD WT images with sizem×nwheremis the image width andnis the image height. We partition imageHinto a set of 4×4 blocks. Thus, many blocks will be generated in imageH.
Step 2: Embed secret bits to the decimal part.
1) Apply one-level HDWT operation.
We apply one-level HDWT to the original image demonstrated in Fig. 3. The cover imageHis transformed to values with decimal shown in Fig. 1 (c).
Fig. 1. Results of two dimensional image transform, (a) original image (b) values of the ROI in the medical image, and (c) coefficients of the ROI after one-level HDWT operation.
Fig. 2. Division of HDWT images into three matrices:HI,HS, andHD.
Fig. 3. Flowcharts of the data embedding.
2) Retrieve decimal codes according to secret bits.
For each secret bits, we retrieve decimal codes (D1,D2,D3,D4) from decimal codes table shown in Table 1. For instance, we will get the decimal codes (0, 0, 0.5, 0.5) if the embed bit is 01.
3) Alter decimal value in the HDWT images to embed data.
In our method, we partition the HDWT coefficients into three parts: integer, sign, and decimal. Then, integer matrixHI, sign matrixHS, and decimal matrixHDwill be generated, as shown in Fig. 4. We merge decimal codes with integer matrixHIand sign matrixSIdescribed as follows.
? Select four sets of integers from integer matrixHIby
wheni=1 andj=2, the sets of integers areHI(1, 2),HI(1, 4),HI(3, 2), andHI(3, 4). According to (2), four sets of integer (582, 0, 1, 0), (585, 0, 0, 0), (582, 0, 1, 1) and (585, 0, 0, 1) will be produced from integer matrixHIfor embedding shown in Fig. 4.
? Modify decimal values in HDWT images.
When we embed 2 secret digits 10, the set of the decimal codes (0, 0.5, 0, 0.5) will be retrieved from the decimal code table shown in Table 1. The values of unsigned HDWT images are a set of integers and decimal codes. Then, new HDWT images are unsigned HDWT images withHSmatrix shown in (3).
wherei,j∈{1, 2}. Therefore, each pixel of new HDWT images combines decimal codes of secret bits andHI. Suppose the casei=1,j=2 will retrieveHI=(585, 0, 0, 0), we combineHIand the set of the decimal codes (0, 0.5, 0, 0.5) shown in Fig. 4 and Table 1. New HDWT images are obtained as follows.
Suppose the case (i,j)={(1, 1), (1, 2), (2,1), (2, 2)} in (3) embed secret bits ‘01’→{(0, 0, 0.5, 0.5)}, ‘11’→{(0, 0.5, 0.5, 0)} , ‘01’→{(0, 0, 0.5, 0.5)} and ‘00’→{(0, 0, 0, 0)} from Table 1, respectively. The new HDWT images will be obtained as demonstrated in Table 2.
? RecordHDmatrix.
TheHDmatrix will be recorded in order to restore original image at the extraction stage shown in Fig. 4. We also utilize the arithmetic coding method[1]to compress theHDmatrix and embed them to cover images.
Step 3: Embed secret bits to integer part of high-frequency band.
The coefficients of high-frequency band which are presented in Fig. 4 (c), HH area, will influence the subtle texture after applying one-level HDWT decomposition. Further, most coefficients are utilized in the data compression method. In our scheme, the secret bits are embedded to the integer part.
Table 1: Decimal codes with 2 bits coding
Fig. 4. Two dimensional HDWT: (a) original image, (b) horizontal operation of (a) in 4×4 block image, (c) vertical operation of (b), and (d) invert two dimensional HDWT.
Table 2: New HDWT images combines decimal codes andHIwithHS
Table 3: Invert transform of new HDWT images
Step 4: Invert one-level HDWT.
Two dimensional Haar discrete wavelet invert high-frequency band will be chosen to 0[1]. Transformation is applied to HDWT images after the embedding process in decimal and high-frequency band described in Step 2, Step 3, Fig. 4 (d), and Table 3.
Step 5: Construct invert one-level HDWT images blocks.
In order to get the stego-images, the invert one-level HDWT images blocks are constructed.
Step 6: Process the underflow/overflow problem.
In this scheme, there are two kinds of medical image formats: signed bit and unsigned bit. We adjust image histograms to prevent overflow/underflow problems. At first, we compute intensity rate by the range of intensity and bit-depth of image. The range of intensity is the difference of maximum and minimum intensity in the whole image. Bit-depth is the number of bits utilized to indicate the gray of a single pixel. In the next step, the underflow rate (or overflow rate) is calculated by the value of underflow (or overflow) and bit-depth. The value of underflow (or overflow) is the minimum (or maximum) value in the whole image. Finally, the utilization rate is the sum of the absolute values of intensity rate and underflow (or overflow) rate. The formulas are demonstrated as follows.
The utilization rate = |intensity rate| +|underflow/overflow rate|.
On low underflow/overflow rates of high bit-depth medical images, unsinged bit images will produce underflow problems. And it is hard to find the underflow/overflow problem in the signed bit images.
Step 7: Generate chaotic image.
This step is to disarrange the stego-images for cloud computing environments. We adopt chaotic Hénon map to construct a cryptographic application scheme. At first, pseudo-random sequence is generated by Hénon map[26], as shown in Fig. 5.
2.2 Data Extraction Phase
Fig. 5. Produce chaotic image byrotate and Hash by Hénon map: (a) partition stego-images, (b) rotate each blocks with Hénon map sequence, (c) disarrange each blocks by SHA-512, and (d) disarrange each block by Hénon map sequence.
In order to extract secret bits, many parameters from embedding phase are needed such as decimal codes table, block size, and shift distance for underflow/overflow. The data extraction is able to extract secrets correctly and obtain the original image without any distortions. The details are described below. At the first step, chaotic images are downloaded from cloud computing environments and perform the invert chaotic Hénon map procedure to obtain stego-images. Then, the invert underflow/overflow process is performed by shifting back histogram. The whole image is partitioned into 4×4 non-overlaying block size like the data embedding process. The next step is one-level Haar discrete wavelet transformation for each block as shown in Fig. 4. Then, the digit of integer part in high-frequency band (HH) is extracted as secret bits. As the similar way in data embedding, secrets are extracted from the decimal and restore the decimal by the original decimal. At the final step, the block image performs the invert transform of the one-level HDWT to obtain the original image.
Our scheme is performed at two kinds of high quality computer tomography (CT) and magnetic resonance imaging (MRI) medical images with digital imaging and communications in medicine (DICOM) from the National Cancer Imaging Archive[15]. This method is implemented by MATLAB and experimented on Notebook with 2.67 GHz processor and 4.0 GB RAM. In general, the quality of stego-images is measured by peak signal to noise ratio (PSNR) and mean square error (MSE). The definition of MSE is described as follows.
where an image bit depth may be set to 16 (or 12). The parameters ofmandnare the width and height of the image. Bothare intensities of the pixels located in cover and stego-images, respectively. We experiment onCT and MRI medical images with 16-bit depth. The capacity and bpp (bit per pixel) will depend on PSNR. In Table 4 and Table 5, the embedded bits in integer and decimal part are 7 and 2, respectively. Because theHDmatrix and decimal code tale are stored in the embedding phase, the overload of capacity will reduce capacity as shown in Table 4, Table 5, and Step 2. For example, slice 1.3.6.1.4.1.9328.50.14.1141.dcm can embed 294725 bits to cover image with overload of capacity 169703. In Table 5, there are underflow problems with distance_O about intensity value 126 to 128. In order to process underflow/overflow problems, the histogram shifts to rightward with distance_O.
In this paper, we present a reversible image data hiding method by modifying the decimal and integer of coefficients of HDWT, and a Hénon map is adopted to transform stego-images into chaotic image to achieve an acceptable level of confidentiality in cloud computing environments.
Table 4: Rsults for sign 16-bit grayscale medical image with secret decimal 4-bit
Table 5: Results for sign 16-bit grayscale medicalimage
Generally, HDWT is a popular method to convert an image from spatial domain to frequency domain which is composed of different frequency bands as LL, LH, HL, and HH. The HH bands will be embedded with secret bits.
Changet al.[1]adopted HH bands to embed secret bits in zeros of Integer part. In our scheme, we embed secret bits to both decimal part and integer part in HH bands. The result of capacity and the quality of image are demonstrated on Table 4 and Table 5. Although the overhead of the recordingHDmatrix will reduce capacity, the best capacity is still reach 0.96 bpp (bit per pixel) as shown in Table 4. In cloud computing environments, the most of important problem is data confidentiality. The Hénon map is a simple and efficiency method to disarrange stago-images.
We would like to thank National Cancer Institute for providing the CT image data used in this study.
[1] C.-C. Chang, P.-Y. Pai, C.-M. Yeh, and Y.-K. Chan, “A high payload frequency-based reversible image hiding method,”Information Sciences, vol. 180, pp. 2286–2298, Jun. 2010.
[2] L.-C. Huang, L.-Y. Tseng, and M.-S. Hwang, “The study of data hiding in medical image,”Int. Journal of Network Security, vol. 14, no. 5, pp. 243–251, 2012.
[3] S. S. Sujatha and M. M. Sathik, “A novel DWT based blind watermarking for image authentication,”Int. Journal of Network Security, vol. 14, no. 4, pp. 223–228, 2012.
[4] L.-C. Huang and M.-S. Hwang, “The study of intrusion detection system,”Journal of Electronic Science and Technology, vol. 10, no. 3, pp. 269–275, 2012.
[5] C.-M. Wang, N.-I. Wu, C.-S. Tsai, and M.-S. Hwang, “A high quality steganographic method with pixel-value differencing and modulus function,”The Journal of Systems and Software, vol. 81, no. 1, pp. 150–158, 2008.
[6] C.-C. Wu, S.-J. Kao, and M.-S. Hwang, “A high quality image sharing with steganography and adaptive authentication scheme,”The Journal of Systems and Software, vol. 84, pp. 2196–2207, Dec. 2011.
[7] C.-C. Wu, M.-S. Hwang, and S.-J. Kao, “A new approach to the secret image sharing with steganography and authentication,”The Imaging Science Journal, vol. 57, no. 3, pp. 140–151, 2009.
[8] L.-C. Huang, L.-Y. Tseng, and M.-S. Hwang, “A reversible data hiding method by histogram shifting in high quality medical images,”The Journal of Systems and Software, vol. 86, pp. 716–727, Mar. 2013.
[9] L.-C. Huang, M.-S. Hwang, and L.-Y. Tseng, “Reversible and high-capacity data hiding in high quality medical images,”KSII Trans. on Internet and Information Systems, vol. 7, no. 1, pp. 132–148, 2013.
[10] G.-R. Xuan, Y.-Q. Shi, Q.-M. Yao, Z.-C. Ni, C.-Y. Yang, J.-J. Gao, and P.-Q. Chai, “Lossless data hiding using histogram shifting method based on integer wavelets,”Lecture Notes in Computer Science, vol. 4283, pp. 323–332, Aug. 2006.
[11] B. Yang, M. Schmucker, X. Niu, C. Busch, and S. Sun,“Integer-DCT-based reversible image watermarking by adaptive coefficient modification,”Proc. of the SPIE, vol. 5681, pp. 218–229, Jan. 2005.
[12] C.-C. Chang, C.-Y. Lin, and Y.-P. Hsieh, “Data hiding for vector quantization images using mixed-based notation and dissimilar patterns without loss of fidelity,”Information Sciences, vol. 201, pp. 70–79, Oct. 2012.
[13] C.-C. Chang, C.-C. Lin, C.-S. Tseng, and W.-L. Tai,“Reversible hiding in DCT-based compressed images,”Information Sciences, vol. 177, no. 13, pp. 2768–2786, 2007.
[14] Z.-M. Lu, J.-X. Wang, B.-B. Liu, “An improved lossless data hiding scheme based on image VQ-index residual value coding,”The Journal of Systems and Software, vol. 82, no. 6, pp. 1016–1024, 2009.
[15] C.-C. Chang, C.-C. Lin, and Y.-H. Fan, “Lossless data hiding for color images based on block truncation coding,”Pattern Recognition, vol. 41, pp. 2347–2357, Jul. 2008.
[16] L.-C. Huang and M.-S. Hwang, “Two-party authenticated multiple-key agreement based on elliptic curve discrete logarithm problem,”Int. Journal of Smart Home, vol. 7, no. 1, pp. 9–18, 2013.
[17] J. Tian, “Reversible data embedding using a difference expansion,”IEEE Trans. on Circuits System Video Technology, vol. 13, no. 8, pp. 890–896, 2003.
[18] D.-C. Lou, M.-C. Hu, and J.-L. Liu, “Multiple layer data hiding scheme for medical images,”Computer Standards and Interfaces, vol. 31, pp. 329–335, Feb. 2009.
[19] M. Fallahpour, D. Megias, and M. Ghanbari, “Reversible and high-capacity data hiding in medical images,”IET Image Processing, vol. 5, no. 2, pp. 190–197, 2011.
[20] S. M. C. Vigila and K. Muneeswaran, “Nonce based elliptic curve cryptosystem for text and image applications,”Int. Journal of Network Security, vol. 14, no. 4, pp. 236–242, 2012.
[21] L.-Y. Tseng and L.-C. Huang, “An adaptive thresholding method for automatic lung segmentation in CT images,” inProc. of IEEE AFRICON 2009, Nairobi, 2009, pp. 1–5.
[22] L.-Y. Tseng and L.-C. Huang, “Automatic fissure detection in CT images based on the genetic algorithm,” inProc. of the 2010 Int. Conf. on Machine Learning and Cybernetics, Taipei, 2010, pp. 2583–2588.
[23] M. Rochan, S. Hariharan, and K. Rajamani, “Data hiding scheme for medical images using lossless code for mobile HIMS,” inProc. of the 3rd Int. Conf. on Communication Systems and Networks, Bangalore, 2011, pp. 1–4.
[24] M. Reza Abbasy and B. Shanmugam, “Enabling data hiding for resource sharing in cloud computing environments based on DNA sequences,” inProc. of 2011 IEEE World Congress on Services, Washington, DC, 2011, pp. 385–390.
[25] V. Patidar, N. K. Pareek, G. Purohit, and K. K. Sud,“Modified substitution-diffusion image cipher using chaotic standard and logistic maps,”Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 10, pp.2755–2765, 2010.
[26] M. Suneel, “Cryptographic pseudo-random sequences form the chaotic Hénon map,”Indian Academy of Sciences, vol. 34, pp. 689–701, Oct. 2009.
Min-Shiang Hwangreceived the B.S. degree in electronic engineering from National Taipei Institute of Technology, Taipei in 1980, the M.S. degree in industrial engineering from National Tsing Hua University in 1988, and the Ph.D. degree in computer and information science from National Chiao Tung University in 1995. He also studied applied mathematics with National Cheng Kung University from 1984 to 1986. He was the Chairman with the Department of Information Management, CYUT during 1999 to 2002. He is currently a professor with the Department of Management Information System, NCTU. He is a member of IEEE, ACM, and Chinese Information Security Association. Dr. Hwang had published more than 170 articles on the above research fields in international journals. His current research interests include electronic commerce, database and data security, cryptography, image compression, and mobile computing.
Lin-Yu Tsengreceived the B.S. degree in mathematics from the National Taiwan University in 1975, the M.S. degree in computer science from the National Chiao Tung University in 1978, and the Ph.D. degree in computer science from National TsingHua University in 1988. He is presently a professor with the Department of Computer Science and Communication Engineering, Providence University. His research interests include evolutionary computation, neural network, multimedia systems, image processing, pattern recognition, and bioinformatics.
uang
the B.S. and M.S. degrees in information management both from Chaoyang University of Technology (CYUT), Taichung in 2001 and 2003, respectively. She is currently working towards the Ph.D. degree with the Department of Computer Science and Engineering, the National Chung Hsing University (NCTU). Her current research interests include information security, cryptography, medical image, and mobile communications.
Manuscript received October 20, 2012; revised March 13, 2013.
L.-C. Huang is with National Land Surveying and Mapping Center, Taichung (e-mail: lsb55239@gmail.com).
M.-S. Hwang is with the Department of Computer Science & Information Engineering, Asia University, Taichung (Corresponding author e-mail: mshwang@asia.edu.tw).
L.-Y. Tseng is with Department of Computer Science and Communication Engineering, Providence University, Taichung (e-mail: lytseng@pu.edu.tw).
Digital Object Identifier: 10.3969/j.issn.1674-862X.2013.02.019
Journal of Electronic Science and Technology2013年2期