Next Article in Journal
Derivation of the Critical Point Scaling Hypothesis Using Thermodynamics Only
Next Article in Special Issue
Clinical Evaluation of Duchenne Muscular Dystrophy Severity Using Ultrasound Small-Window Entropy Imaging
Previous Article in Journal
Knudsen Number Effects on Two-Dimensional Rayleigh–Taylor Instability in Compressible Fluid: Based on a Discrete Boltzmann Method
Previous Article in Special Issue
Image Encryption Using Elliptic Curves and Rossby/Drift Wave Triads
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

BOOST: Medical Image Steganography Using Nuclear Spin Generator

by
Bozhidar Stoyanov
and
Borislav Stoyanov
*
Konstantin Preslavsky University of Shumen, 9712 Shumen, Bulgaria
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(5), 501; https://doi.org/10.3390/e22050501
Submission received: 12 March 2020 / Revised: 15 April 2020 / Accepted: 21 April 2020 / Published: 26 April 2020
(This article belongs to the Special Issue Entropy in Image Analysis II)

Abstract

:
In this study, we present a medical image stego hiding scheme using a nuclear spin generator system. Detailed theoretical and experimental analysis is provided on the proposed algorithm using histogram analysis, peak signal-to-noise ratio, key space calculation, and statistical package analysis. The provided results show good performance of the brand new medical image steganographic scheme.

Graphical Abstract

1. Introduction

In this century, with the rapid evolution of data processing and information technologies, web security instruments are becoming more and more relevant. Various health systems are constantly relocating into the cloud and mobile device space. A body of US national rules for the defence of certain medical information must be taken into account for secure communication [1,2]. Many technologies have been introduced in recent years for secure storage and transmission of medical records and information regarding patient identity, such as digital watermarking [3,4], image encryption [5,6,7,8,9], and steganography [10,11].
Nevertheless, most of those schemes depend on some form of cryptography. The aim of cryptography is to create and analyze protocols that prevent individuals or the public from reading private data. In cryptography, an encryption is the method of encoding data. This method converts the original representation of the data, known as input text, into an alternative form known as encrypted text. Only authorized parties can decrypt encrypted data back to input text and access the original data [12]. Unlike cryptography, steganography is the art and science of hiding in plain sight secret data without being detected inside an innocent objects, called containers, so that it can be safely transmitted on a public channel of communication [13,14]. Containers may have the form of video streams, audio records, and digital images.
Image steganography refers to the hiding of user data in an image file [15]. Medical image steganographic schemes play a significant function in contemporary therapeutic procedures. The digital security of medical records and patient data both during communication and at the storage location must be ensured [16]. For medical images, sensitive patient information is embedded as header details defined in the Digital Imaging and Communications in Medicine (DICOM) standard in the image files [17] and should be removed before network transmission.
The efficiency of the steganography methods can be calculated by the three valuable specifications: security, capacity, and visual undetectability [18,19].
Numerous strategies are employed to conceal a variety of input data with respect to medical images. Because of the resistance of increasing statistical attacks, use of chaotic functions in steganography algorithms becomes more popular. Satish et al. [20] introduced Logistic map based spread spectrum image steganography. Jain and Lenka [19] used an asymmetric cryptographic system for secret information hiding in brain images. Jain and Kumar [21] presented a medical record steganography method based on Rivest–Shamir–Adleman cryptosystem and decision tree for data inclusion. Jain et al. [22] described an improved medical image steganographic methodology using a public key cryptosystem and linear feedback shift register (LFSR), and dynamically picked diagonal blocks. Ambika and Biradar [23] proposed a novel technique to hide data in medical images. The scheme uses two level discrete wavelet transformation with a pixel selection by Elephant Herding–Monarch Butterfly algorithm. By using 1D chaotic function, medical image stego algorithm is presented in [24].
The steganography techniques provide the necessary security and privacy in data transmission. In our humble opinion, the main contributions of our work can be summarized as follows:
  • We present novel algorithm for pseudorandom byte output using nuclear spin generator (NSG), which has acceptable statistical properties.
  • We apply the pseudorandom algorithm to a novel medical image steganography scheme.
  • We examine the proposed method, and the data show that it has excellent peak signal-to-noise ratio, strong collision resistance, and desirable security properties that can withstand most common theoretical and statistical attacks.
In Section 2, we present a novel pseudorandom byte output method based on two nuclear spin generators. In Section 3, we introduce the novel medical image steganography algorithm BOOST and complete steganalysis is given. Finally, the article is concluded in Section 4.

2. Pseudorandom Byte Output Algorithm Using Nuclear Spin Generator

Pseudorandom generators are basic primitives used in cryptography algorithms but in our case we apply the random properties of pseudorandom byte generator to steganography algorithm. Pseudorandom generators are software realized methods for extracting sequences of random values.

2.1. Proposed Pseudorandom Byte Output Algorithm

The nuclear spin generator is a high-frequency oscillator which generates and controls the oscillations of the motion of a nuclear magnetization vector in a magnetic field. This system exhibits a large variety of regular and dynamic motions [25,26,27,28,29]. The nuclear spin generator was first described by Sherman [30]. The typical NSG is nonlinear three-dimensional dynamical system given by
x ˙ ( t ) = β x + y y ˙ ( t ) = x β y ( 1 k z ) z ˙ ( t ) = β ( α ( 1 z ) k y 2 ) ,
where x, y, and z are the components of the nuclear magnetization vector in the X, Y, and Z directions, respectively, and α , β , and k are positive parameters. The nuclear spin generator with initial values ( x , y , z ) = ( 0.12 , 0.25 , 0.0032 ) and parameters equal to ( α , β , k ) = ( 0.15 , 0.75 , 21.5 ) is plotted in Figure 1 and Figure 2.
The novel pseudorandom byte output algorithm is based on the next few steps:
  • The seed values x ( 0 ) , y ( 0 ) , and z ( 0 ) from Equation (1) are determined. The output byte length L is determined.
  • Equation (1) is iterated for N times.
  • The iteration of the nuclear spin generator continues. As a result, the three floating-point values x ( i ) , y ( i ) , and z ( i ) are calculated. They are manipulated as follows: x m ( i ) = m o d ( a b s ( i n t ( x ( i ) × 10 13 ) ) ) , 256 ) , y m ( i ) = m o d ( a b s ( i n t ( y ( i ) × 10 13 ) ) ) , 256 ) , and z m ( i ) = m o d ( a b s ( i n t ( z ( i ) × 10 13 ) ) ) , 256 ) , where a b s ( a ) returns the modulus of a, i n t ( a ) returns the the integer part of a, truncating the value behind the decimal sign, and m o d ( a , b ) returns the reminder after division.
  • Perform XOR operation between x m i , y m i , and z m i to get an output byte.
  • Return to Step 3 until the output byte length L is reached.

2.2. Key Size Analysis

The set of all initial values compose the key size. The key size of the proposed pseudorandom generator has three secret values x ( 0 ) , y ( 0 ) , and z ( 0 ) . As reported by IEEE floating-point standard [31], the computational precision of the 64-bit double-precision number is about 10 14 . The key size of the proposed scheme is ( 10 14 ) 3 = 10 42 2 139 bits. This is high enough against mechanisms of exhaustive attack [32].

2.3. Statistical Tests

To estimate unpredictability of the novel nuclear spin equation based pseudo-random byte generator, we used National Institute of Standards and Technology (NIST) statistical software [33] and ENT [34] statistical application. Using the novel pseudorandom byte generator, 3000 sequences of 125,000 bytes were produced.
The NIST package contains 15 statistical tests: frequency, block frequency, cumulative sums forward and reverse, runs, longest run of ones, rank, spectral, non overlapping templates, overlapping templates, universal, approximate entropy, serial first and second, linear complexity, random excursion, and random excursion variant. The application calculates the proportion of streams that pass the particular tests. The range of acceptable proportion is determined using the confidence interval, defined as
p ^ ± 3 p ^ ( 1 p ^ ) m ,
where p ^ = 1 α and m is the number of binary tested sequences. NIST recommends that, for these tests, the user should have at least 1000 sequences of 1,000,000 bits each. In our setup, m = 3000 . Thus, the confidence interval is
0.99 ± 3 0.99 ( 0.01 ) 3000 = 0.99 ± 0.0054498 .
The proportion should lie above 0.9845502 with exception of random excursion and random excursion variant tests. These two tests only apply whenever the number of cycles in a sequence exceeds 500. Thus, the sample size and minimum pass rate are dynamically reduced taking into account the tested sequences.
The distribution of p-values is examined to ensure uniformity. The interval between 0 and 1 is divided into 10 subintervals. The p-values that lie within each subinterval are counted. Uniformity may also be specified through an application of a χ 2 test and the determination of a p-value corresponding to the goodness-of-fit distributional test on the p-values obtained for an arbitrary statistical test, p-value of the p-values. This is implemented by calculating
χ 2 = i = 1 10 ( F i s / 10 ) 2 s / 10 ,
where F i is the number of p-values in subinterval i and s is the sample size. A p-value is computed such that p- v a l u e T = I G A M C ( 9 / 2 , χ 2 / 2 ) , where I G A M C is the complemented incomplete gamma statistical function. If p- v a l u e T 0.0001 , then the sequences can be considered to be uniformly distributed.
The output values of the first 13 test are in Table 1. The minimum pass rate for each statistical test with the exception of the random excursion variant test is approximately 2953 for a sample size of 3000 binary sequences. The random excursion test outputs eight p-values, which are tabulated in Table 2. The random excursion variant test outputs 18 randomness probability values: p-values, as shown in Table 3. The minimum pass rate for the random excursion variant test is approximately 1788 for a sample size of 1819 binary sequences.
The output results in Table 1, Table 2 and Table 3 indicate that all p-values are uniformly distributed over the ( 0 , 1 ) interval. The total numbers of acceptable streams are within the expected confidence levels for all performed tests. Based on the results, the novel pseudo-random byte generator passed without error NIST suite.
The ENT consists of six statistical tests (entropy, optimum compression, χ 2 square, arithmetic mean value, Monte Carlo for π , and serial correlation), which focus on the pseudorandomness of byte sequences. We tested a stream of 375,000,000 bytes of the proposed generator. The value of entropy is 8.0 byte per byte; the optimum compression would reduce the byte file by 0%; χ 2 square is 238.18 (randomly would exceed this value 76.79% of the times; the sequence is random); arithmetic mean value is 127.5040 (very close to 127.5, less then 10%); Monte Carlo for π is 3.141616448 (error 0.00%); and serial correlation coefficient is 0.000003 (less then 0.005 for true random generators). The novel pseudorandom byte generator passed successfully ENT tests.
Based on the excellent test outputs, we can infer that the proposed pseudorandom byte generator has satisfying statistical properties and provides reasonable level of security.

3. Medical Image Steganography Using Nuclear Spin Generator

3.1. Embedding Scheme

In this subsection, by using the pseudorandom byte generation algorithm based on the nuclear spin function in Section 2, we present a medical image steganography algorithm named BOOST.
We consider 16 bits DICOM grayscale input images of n × n size. As input message, we specify the patient information (text based patient medical records with patient identification data). The information includes patient name, patient ID/UID, and doctors remarks. Stego image is the input image with embedded encrypted patient information. The DICOM header data are directly transferred into stego image, based on [35].
The proposed medical image steganography algorithm BOOST consists of the following steps:
  • Iterate for L times the pseudorandom generator based on the nuclear spin generator in Section 2.
  • Apply XOR operation between the pseudorandom byte sequence and all of the input message to produce an encrypted bytes C.
  • Specify the input intervals of gray levels [ a , b ] of non-black pixels, where a and b determine the boundaries of the container.
  • Index the image pixels by consecutive passing through columns and separate those that fall within the interval [ a , b ] .
  • Convert encrypted data to binary sequence using ASCII table.
  • Consecutively embed the encrypted data into the last bits of the pixels from the interval [ a , b ]
  • The list output pixels is checked to see if their new values are in the input interval. For those pixels that fall outside this range, their value increases by + 2 if their new values are below the minimum value of the interval or decreases by 2 if the maximum value of the range is exceeded.

3.2. Extraction Scheme

  • Retrieve the number L of embedded bytes, input levels interval [ a , b ] , and the secret key space of the pseudorandom generator based on the nuclear spin generator in Section 2.
  • Index the image pixels by consecutive passing through columns and separate those that fall within the interval [ a , b ] .
  • Consecutively extract the embedded data from the last bits of the pixels from the interval [ a , b ] .
  • Iterate for L times the pseudorandom generator based on the nuclear spin generator in Section 2.
  • Apply XOR operation between the output pseudorandom byte sequence and all of the extracted bytes to produce the input bytes C.
The proposed medical image steganography algorithm was implemented in C++ programming language. Fifteen 16-bit monochrome DICOM images were used for the experimental analysis. The test images were selected from the National Electrical Manufacturers Association (NEMA) medical image database: ftp://medical.nema.org/medical/dicom/DataSets/WG16/Philips/ClassicSingleFrame/. The folder consists of classical 16 bits DICOM grayscale single frame medical images of brains, knees, and livers. An example to illustrate the BOOST is presented in Figure 3.

3.3. Steganographic Analysis

An image histogram is an accurate illustration of the tonal value distribution in digital images. This check compares both input and stego image histograms. Histograms, performed using ImageJ2x 2.1.5.0 (http://www.rawak.de/rs2012/), for three input images and their stego images are also shown in Figure 4.
It is considered that the histograms of the stego images are much the same as those of the input images with no evidence of hidden messages in stego images.
Peak Signal-to-Noise Ratio (PSNR) is the proportion between the highest possible value of a signal and the value of distorting noise that affects the accuracy of its representation. It is defined as:
P S N R = 10 log 10 ( 2 d 1 ) 2 M S E ( d B ) ,
where d is the bit depth of the pixel and MSE is the Mean-Square Error between the input and stego images. MSE is defined as:
M S E = 1 m n i = 1 m j = 1 n ( P [ i , j ] S [ i , j ] ) 2 ,
where P [ i , j ] and S [ i , j ] are the ith row and jth column pixel in the input and stego images, respectively.
In Table 4, we provide the computed values for MSE and PSNR for BOOST algorithm. MSE and PSNR are calculated for images with 1050 bytes (8400 bits), 1042 bytes (8336 bits), and 1119 bytes (8952 bits) embedded. Maximum payload is calculated as a number of non-black pixels.
From results obtained, as shown in Table 4, the PSNR values are extremely high, above 113 dB, which suggests an excellent level of security for the proposed BOOST algorithm.
The Bit Error Rate (BER) is computed as the actual number of bit positions which are changed in the stego image compared with the input image. A value of BER close to 0.0 stands for high efficiency of the steganography algorithm. The Normalized Cross-Correlation (NCC) calculates the cross-correlation in the the frequency domain, depending on the size of the images. Then, it computes the local sums by pre-computing running sums. Use local sums to normalize the cross-correlation to get correlation coefficients. The output matrix holds the correlation coefficients, which can range between −1.0 and 1.0. NCC is defined as:
N C C = i = 1 m j = 1 n ( P [ i , j ] × S [ i , j ] ) i = 1 m j = 1 n ( P [ i , j ] ) 2 .
A value of NCC close to 1.0 represents perfect quality of the stego image.
The Structural SIMilarity (SSIM) index is an algorithm for measuring the similarity between input and stego images [36]. The output SSIM index is a decimal number between −1 and 1. Value 1 indicates excellent structural similarity.
In Table 5, we provide the calculated values for BER, NCC, and SSIM for the presented BOOST scheme. From the obtained results shown in Table 5, it is clear that the BER are very close to 0.0 and NCC and SSIM values are almost equal to 1.0. The data indicate that the BOOST scheme provides good quality and excellent structural similarity.
The resistance of the BOOST algorithm against cropping attack [37,38] was tested. Cropping is the mechanism by which outer parts of the image are cut. Three stego images (Brain IM_0001, Knee IM_0001, and Liver IM_0001) generated from the BOOST algorithm were subjected to cropping attacks.
The normalized correlation (NC) values were calculated for the stego image and the corresponding cropped image [38]. The output NC results varied between 0.8944 and 1, as shown in Table 6. We see from these results that the proposed BOOST algorithm reasonably resists cropping attack.
The steganographic analysis undoubtedly shows the good rate of the proposed algorithm. Table 7 summarizes some of the computed values of our proposed scheme with other algorithms.
Using the given test results, we can conclude that the presented algorithm BOOST, based on the nuclear spin generator, has satisfying statistical properties and provides a proper safety expectation.

4. Conclusions

We introduce a novel medical image steganographic scheme named BOOST. The presented algorithm uses a novel pseudorandom byte output technique based on the nuclear spin generator. Our security investigation (mean square error, peak signal-to-noise ratio, normalized cross-correlation, and structural similarity) shows that the proposed hiding can be used with success for secure medical record communication.

Author Contributions

B.S. (Bozhidar Stoyanov) and B.S. (Borislav Stoyanov) wrote and edited the manuscript. Both authors have read and agreed to the published version of the manuscript.

Funding

The paper was partially supported by the National Scientific Program “Information and Communication Technologies for a Single Digital Market in Science, Education and Security (ICTinSES)”, financed by the Ministry of Education and Science, Bulgaria for Bozhidar Stoyanov and Borislav Stoyanov.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Office for Civil Rights. HIPAA Compliance Assistance. Summary of the HIPAA Privacy Rule. Available online: https://www.hhs.gov/sites/default/files/privacysummary.pdf (accessed on 12 March 2020).
  2. Barrows, R.; Clayton, P. Privacy, Confidentiality, and Electronic Medical Records. J. Am. Med Inform. Assoc. 1996, 3, 139–148. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Niu, X.M.; Lu, Z.M.; Sun, S.H. Digital watermarking of still images with gray-level digital watermarks. IEEE Trans. Consum. Electron. 2000, 46, 137–145. [Google Scholar] [CrossRef]
  4. Kutter, M.; Jordan, F.D.; Bossen, F. Digital watermarking of color images using amplitude modulation. J. Electron. Imaging 1998, 7, 326–332. [Google Scholar] [CrossRef]
  5. Cao, W.; Zhou, Y.; Chen, C.P.; Xia, L. Medical image encryption using edge maps. Signal Process. 2017, 132, 96–109. [Google Scholar] [CrossRef]
  6. Kanso, A.; Ghebleh, M. An efficient and robust image encryption scheme for medical applications. Commun. Nonlinear Sci. Numer. Simul. 2015, 24, 98–116. [Google Scholar] [CrossRef]
  7. Abdelfattah, M.; Hegazy, S.F.; Areed, N.F.; Obayya, S.S. Compact optical asymmetric cryptosystem based on unequal modulus decomposition of multiple color images. Opt. Lasers Eng. 2020, 129, 106063. [Google Scholar] [CrossRef]
  8. Wang, X.; Zhao, H.; Feng, L.; Ye, X.; Zhang, H. High-sensitivity image encryption algorithm with random diffusion based on dynamic-coupled map lattices. Opt. Lasers Eng. 2019, 122, 225–238. [Google Scholar] [CrossRef]
  9. Chen, H.; Liu, Z.; Zhu, L.; Tanougast, C.; Blondel, W. Asymmetric color cryptosystem using chaotic Ushiki map and equal modulus decomposition in fractional Fourier transform domains. Opt. Lasers Eng. 2019, 112, 7–15. [Google Scholar] [CrossRef]
  10. Huang, L.C.; Tseng, L.Y.; Hwang, M.S. A reversible data hiding method by histogram shifting in high quality medical images. J. Syst. Softw. 2013, 86, 716–727. [Google Scholar] [CrossRef]
  11. Jiang, N.; Zhao, N.; Wang, L. LSB based quantum image steganography algorithm. Int. J. Theor. Phys. 2016, 55, 107–123. [Google Scholar] [CrossRef]
  12. Agrawal, M.; Mishra, P. A comparative survey on symmetric key encryption techniques. Int. J. Comput. Sci. Eng. 2012, 4, 877. [Google Scholar]
  13. Zielińska, E.; Mazurczyk, W.; Szczypiorski, K. Trends in steganography. Commun. ACM 2014, 57, 86–95. [Google Scholar] [CrossRef]
  14. Chen, H.; Du, X.; Liu, Z.; Yang, C. Optical color image hiding scheme by using Gerchberg–Saxton algorithm in fractional Fourier domain. Opt. Lasers Eng. 2015, 66, 144–151. [Google Scholar] [CrossRef]
  15. Ibrahim, R.; Kuan, T.S. Steganography Algorithm to Hide Secret Message inside an Image. Comput. Technol. Appl. 2011, 2, 102–108. [Google Scholar]
  16. Mantos, P.L.K.; Maglogiannis, I. Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images. J. Med Syst. 2016, 40, 156. [Google Scholar] [CrossRef]
  17. National Electrical Manufacturers Association. Digital Imaging and Communications in Medicine (DICOM). Available online: https://www.dicomstandard.org/current/ (accessed on 12 March 2020).
  18. Wu, S.; Zhong, S.; Liu, Y. Deep residual learning for image steganalysis. Multimed. Tools Appl. 2018, 77, 10437–10453. [Google Scholar] [CrossRef]
  19. Jain, M.; Lenka, S.K. Diagonal queue medical image steganography with Rabin cryptosystem. Brain Inform. 2016, 3, 39–51. [Google Scholar] [CrossRef] [Green Version]
  20. Satish, K.; Jayakar, T.; Tobin, C.; Madhavi, K.; Murali, K. Chaos based spread spectrum image steganography. IEEE Trans. Consum. Electron. 2004, 50, 587–590. [Google Scholar] [CrossRef]
  21. Jain, M.; Kumar, A. RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem. Int. J. Mach. Learn. Cybern. 2017, 8, 1695–1705. [Google Scholar] [CrossRef]
  22. Jain, M.; Kumar, A.; Choudhary, R.C. Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem. Brain Inform. 2017, 4, 95–106. [Google Scholar] [CrossRef] [Green Version]
  23. Ambika.; Biradar, R.L. Secure medical image steganography through optimal pixel selection by EH-MB pipelined optimization technique. Health Technol. 2020, 10, 231–247. [Google Scholar] [CrossRef]
  24. Rajendran, S.; Doraipandian, M. Chaotic Map Based Random Image Steganography Using LSB Technique. Int. J. Netw. Secur. 2017, 19, 593–598. [Google Scholar] [CrossRef]
  25. Huang, Z. Stationary distribution of stochastic nuclear spin generator systems. J. Nonlinear Sci. Appl. 2016, 9, 5410–5427. [Google Scholar] [CrossRef] [Green Version]
  26. Sachdev, P.; Sarathy, R. Periodic and chaotic solutions for a nonlinear system arising from a nuclear spin generator. Chaos Solitons Fractals 1994, 4, 2015–2041. [Google Scholar] [CrossRef]
  27. Molaei, M.; Umut, O. Generalized synchronization of nuclear spin generator system. Chaos, Solitons Fractals 2008, 37, 227–232. [Google Scholar] [CrossRef]
  28. Nikolov, S.; Nedev, V.; Zlatanov, V. A Numerical Investigation of the Modified Sherman Systems. Eng. Mech. 2011, 18, 127–142. [Google Scholar]
  29. Nikolov, S.; Bozhov, B.; Nedev, V.; Zlatanov, V. The Sherman system: Bifurcations, regular and chaotic behaviour. Comptes Rendus De L’Academie Bulg. Des Sci. 2003, 56, 5–19. [Google Scholar]
  30. Sherman, S. A third-order nonlinear system arising from a nuclear spin generator. Contrib. Differ. Equations 1963, 2, 197–227. [Google Scholar]
  31. IEEE Standard for Floating-Point Arithmetic. IEEE Std 754-2008. 2008, pp. 1–70. Available online: https://ieeexplore.ieee.org/document/4610935 (accessed on 12 March 2020).
  32. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef] [Green Version]
  33. Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E.; Leigh, S.; Levenson, M.; Vangel, M.; Banks, D.; Heckert, A.; et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application; NIST Special Publication 800-22: Revision 1a; Lawrence, E., Bassham, III, Eds.; NIST: Gaithersburg, MD, USA, 2010.
  34. Walker, J. A Pseudorandom Number Sequence Test Program. Available online: https://www.fourmilab.ch/random/ (accessed on 12 March 2020).
  35. Digital Imaging and Communications in Medicine (DICOM). Supplement 55: Attribute Level Confidentiality (Including De-Identification); Technical Report; National Electrical Manufacturers Association (NEMA): Rosslyn, VA, USA, 2002. [Google Scholar]
  36. Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [Green Version]
  37. Thiyagarajan, P.; Aghila, G. Reversible dynamic secure steganography for medical image using graph coloring. Health Policy Technol. 2013, 2, 151–161. [Google Scholar] [CrossRef]
  38. Dong, P.; Brankov, J.G.; Galatsanos, N.P.; Yang, Y.; Davoine, F. Digital watermarking robust to geometric distortions. IEEE Trans. Image Process. 2005, 14, 2140–2150. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  39. Elhoseny, M.; Ramírez-González, G.; Abu-Elnasr, O.M.; Shawkat, S.A.; Arunkumar, N.; Farouk, A. Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 2018, 6, 20596–20608. [Google Scholar] [CrossRef]
Figure 1. Nuclear spin generator in 3D phase space.
Figure 1. Nuclear spin generator in 3D phase space.
Entropy 22 00501 g001
Figure 2. Nuclear spin generator time series.
Figure 2. Nuclear spin generator time series.
Entropy 22 00501 g002
Figure 3. Illustration of embedding a message using the BOOST method and input levels interval [ 20 , 48 ] : (a) the original input image Brain IM_0001; and (b,c) the location of embedded message.
Figure 3. Illustration of embedding a message using the BOOST method and input levels interval [ 20 , 48 ] : (a) the original input image Brain IM_0001; and (b,c) the location of embedded message.
Entropy 22 00501 g003
Figure 4. (a,e,i) Input images Brain IM_0001, Knee IM_0001, and Liver IM_0001; (b,f,j) their histograms; (c,g,k) stego images; and (d,h,l) their histograms.
Figure 4. (a,e,i) Input images Brain IM_0001, Knee IM_0001, and Liver IM_0001; (b,f,j) their histograms; (c,g,k) stego images; and (d,h,l) their histograms.
Entropy 22 00501 g004
Table 1. National Institute of Standards and Technology (NIST) test suite results.
Table 1. National Institute of Standards and Technology (NIST) test suite results.
NIST Testp-ValuePass RateResults
Frequency0.6336492972/3000Success
Block frequency0.0149962964/3000Success
Cumulative sums forward0.9288572976/3000Success
Cumulative sums reverse0.0530592977/3000Success
Runs0.2151952970/3000Success
Longest run of ones0.1581332974/3000Success
Rank0.8519392971/3000Success
Spectral0.5523832955/3000Success
Non overlapping templates0.4892102970/3000Success
Overlapping templates0.1176612967/3000Success
Universal0.8006262971/3000Success
Approximate entropy0.0924112971/3000Success
Serial first0.6468362963/3000Success
Serial second0.4100552970/3000Success
Linear complexity0.3708212974/3000Success
Table 2. NIST Random excursion test results.
Table 2. NIST Random excursion test results.
Statep-ValuePass RateResult
−40.0428391793/1819Success
−30.1760431792/1819Success
−20.9588051800/1819Success
−10.8216111791/1819Success
+10.9058741801/1819Success
+20.9321631804/1819Success
+30.3955831798/1819Success
+40.6955641793/1819Success
Table 3. NIST Random excursion variant test results.
Table 3. NIST Random excursion variant test results.
Statep-ValuePass RateResult
−90.1369791804/1819Success
−80.2180221805/1819Success
−70.4589641806/1819Success
−60.2501281805/1819Success
−50.3682091805/1819Success
−40.2105211806/1819Success
−30.8216111805/1819Success
−20.3654461800/1819Success
−10.4758361796/1819Success
+10.9276571804/1819Success
+20.1836471805/1819Success
+30.4579191799/1819Success
+40.1881101795/1819Success
+50.2864621798/1819Success
+60.7503771794/1819Success
+70.9578441793/1819Success
+80.9167821794/1819Success
+90.5425191798/1819Success
Table 4. Mean-Square Error(MSE) and Peak Signal-to-Noise Ratio (PSNR) results.
Table 4. Mean-Square Error(MSE) and Peak Signal-to-Noise Ratio (PSNR) results.
Input ImageImage SizeMaximum PayloadPercent VolumeAvailable LevelsInput LevelsMessage (Bytes)MSEPSNR (dB)
Brain IM_0001336 × 33683,17973.681083 [ 50 , 146 ] 10500.0191113.5238
Brain IM_0002336 × 33683,36273.84851 [ 50 , 146 ] 10500.0192113.4977
Brain IM_0003336 × 33683,55774.01823 [ 50 , 146 ] 10500.0191113.5218
Brain IM_0004336 × 33683,34173.82875 [ 50 , 146 ] 10500.0190113.5319
Brain IM_0005336 × 33683,88374.30834 [ 50 , 146 ] 10500.0191113.5198
Knee IM_0001720 × 720249,14848.06449 [ 30 , 56 ] 10420.0041120.1618
Knee IM_0002720 × 720250,53148.33426 [ 30 , 56 ] 10420.0043120.0302
Knee IM_0003720 × 720251,86748.59461 [ 30 , 56 ] 10420.0043120.0263
Knee IM_0004720 × 720256,83448.54453 [ 30 , 56 ] 10420.0042120.0637
Knee IM_0005720 × 720260,96950.34444 [ 30 , 56 ] 10420.0042120.0558
Liver IM_0001480 × 480109,63147.58481 [ 20 , 68 ] 11190.0098116.4055
Liver IM_0002480 × 480112,99249.04581 [ 20 , 68 ] 11190.0100116.3465
Liver IM_0003480 × 480114,10749.53626 [ 20 , 68 ] 11190.0103116.2160
Liver IM_0004480 × 480115,67050.20643 [ 20 , 68 ] 11190.0098116.4325
Liver IM_0005480 × 480116,37350.51624 [ 20 , 68 ] 11190.0098116.4383
Table 5. Bit Error Rate (BER), Normalized Cross-Correlation (NCC), and SSIM (Structural SIMilarity) results.
Table 5. Bit Error Rate (BER), Normalized Cross-Correlation (NCC), and SSIM (Structural SIMilarity) results.
ImageBERNCCSSIM
Brain IM_00010.00120.99999710.9999787
Brain IM_00020.00120.99999500.9999757
Brain IM_00030.00120.99999340.9999838
Brain IM_00040.00120.99999680.9999769
Brain IM_00050.00120.99999550.9999809
Knee IM_00010.000260.99999790.9999806
Knee IM_00020.000270.99999820.9999794
Knee IM_00030.000270.99999790.9999720
Knee IM_00040.000270.99999800.9999682
Knee IM_00050.000260.99999760.9999581
Liver IM_00010.000610.99999820.9998838
Liver IM_00020.000620.99999730.9998954
Liver IM_00030.000640.99999700.9999311
Liver IM_00040.000610.99999830.9999308
Liver IM_00050.000610.99999840.9999253
Table 6. Normalized correlation (NC) results against cropping attack.
Table 6. Normalized correlation (NC) results against cropping attack.
Cropping AttackBrain IM_0001Knee IM_0001Liver IM_0001
Percent 10 % 0.9990.98720.9858
20 % 0.9810.97290.9724
30 % 0.89440.94550.9093
Table 7. Comparison of our medical image steganography with other techniques.
Table 7. Comparison of our medical image steganography with other techniques.
AlgorithmMinimum Calculated PSNR (dB)Capacity Bits per PixelMaximum Calculated BER
Proposed113.500.740.0012
[16] Mantos 2016103.680.5-
[37] Thiyagarajan 201374.36-0.004
[22] Jain 2017 Improved72.170.37-
[39] Elhoseny 201857.02-0.0

Share and Cite

MDPI and ACS Style

Stoyanov, B.; Stoyanov, B. BOOST: Medical Image Steganography Using Nuclear Spin Generator. Entropy 2020, 22, 501. https://doi.org/10.3390/e22050501

AMA Style

Stoyanov B, Stoyanov B. BOOST: Medical Image Steganography Using Nuclear Spin Generator. Entropy. 2020; 22(5):501. https://doi.org/10.3390/e22050501

Chicago/Turabian Style

Stoyanov, Bozhidar, and Borislav Stoyanov. 2020. "BOOST: Medical Image Steganography Using Nuclear Spin Generator" Entropy 22, no. 5: 501. https://doi.org/10.3390/e22050501

APA Style

Stoyanov, B., & Stoyanov, B. (2020). BOOST: Medical Image Steganography Using Nuclear Spin Generator. Entropy, 22(5), 501. https://doi.org/10.3390/e22050501

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop