Top Banner
SECURE MEDICAL DATA TRANSMISSION MODEL FOR IOT- BASED HEALTHCARE SYSTEMS Meruva Lahari Krishna 1 , D. Chiranjevulu 2 1 PG Scholar, Dept of Electronics and Communication Engineering, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India. 2 Associate Professor, Dept of Electronics and Communication Engineering, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India. AbstractIn this paper, a novel image watermarking method is proposed which is based on discrete wave transformation (DWT), Hessenberg decomposition (HD), and singular value decomposition (SVD). First, in the embedding process, the host image is decomposed into a number of sub-bands through multilevel DWT, and the resulting coefficients of which are then used as the input for HD. The watermark is operated on the SVD at the same time. The watermark is finally embedded into the host image by the scaling factor. Fruit fly optimization algorithm, one of the natural-inspired optimization algorithms is devoted to find the scaling factor through the proposed objective evaluation function. The proposed method is compared to other research works under various spoof attacks, such as the filter, noise, JPEG compression, JPEG2000 compression, and sharpening attacks. The experimental results show that the proposed image watermarking method has a good trade-off between robustness and invisibility even for the watermarks with multiple sizes. Index Termschaotic S-block, reversible data hiding, Lossless data hiding, encryption, cryptography, SSI, BSSI. I. INTRODUCTION The explosive growth of internet usage makes information dissemination become increasingly easier than ever, leading to serious copyright infringement problems, such as unauthorized copying [1], distribution [2], [3] and modification of digitized works [4], [5]. In order to improve the effective utilization of the network information, the copyright protection is becoming particularly important [1]. As one of the widely used protection techniques, watermarking method has been applied in many fields of multimedia copyright protection [1] [5]. Watermarking is a common information embedding technique to protect the image, video and Mukt Shabd Journal Volume IX, Issue IX, SEPTEMBER/2020 ISSN NO : 2347-3150 Page No : 606
13

SECURE MEDICAL DATA TRANSMISSION MODEL FOR IOT- … · discrete wave transformation (DWT), Hessenberg decomposition (HD), and singular value decomposition (SVD). First, in the embedding

Feb 02, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • SECURE MEDICAL DATA TRANSMISSION MODEL FOR IOT-

    BASED HEALTHCARE SYSTEMS

    Meruva Lahari Krishna1, D. Chiranjevulu2

    1 PG Scholar, Dept of Electronics and Communication Engineering, Sri Sivani College of

    Engineering, Srikakulam, Andhra Pradesh, India. 2 Associate Professor, Dept of Electronics and Communication Engineering, Sri Sivani College

    of Engineering, Srikakulam, Andhra Pradesh, India.

    Abstract— In this paper, a novel image watermarking method is proposed which is based on

    discrete wave transformation (DWT), Hessenberg decomposition (HD), and singular value

    decomposition (SVD). First, in the embedding process, the host image is decomposed into a

    number of sub-bands through multilevel DWT, and the resulting coefficients of which are then

    used as the input for HD. The watermark is operated on the SVD at the same time. The

    watermark is finally embedded into the host image by the scaling factor. Fruit fly optimization

    algorithm, one of the natural-inspired optimization algorithms is devoted to find the scaling

    factor through the proposed objective evaluation function. The proposed method is compared to

    other research works under various spoof attacks, such as the filter, noise, JPEG compression,

    JPEG2000 compression, and sharpening attacks. The experimental results show that the

    proposed image watermarking method has a good trade-off between robustness and invisibility

    even for the watermarks with multiple sizes.

    Index Terms—chaotic S-block, reversible data hiding, Lossless data hiding, encryption,

    cryptography, SSI, BSSI.

    I. INTRODUCTION

    The explosive growth of internet usage makes information dissemination become increasingly

    easier than ever, leading to serious copyright infringement problems, such as unauthorized

    copying [1], distribution [2], [3] and modification of digitized works [4], [5]. In order to improve

    the effective utilization of the network information, the copyright protection is becoming

    particularly important [1]. As one of the widely used protection techniques, watermarking

    method has been applied in many fields of multimedia copyright protection [1]–[5].

    Watermarking is a common information embedding technique to protect the image, video and

    Mukt Shabd Journal

    Volume IX, Issue IX, SEPTEMBER/2020

    ISSN NO : 2347-3150

    Page No : 606

  • audio information. It integrates the key information into the modalities by invisibly modifying

    the data. Therefore, invisibility and robustness are two major metrics for evaluating the

    effectiveness of the watermarking techniques [1]. Based on these two metrics, watermarking

    techniques can be broadly classified into three groups, i.e. the robust, fragile and semifragile

    watermarking [1]. The robust watermarking is crucial for the image data protection because it

    does not significantly reduce the visual quality of the watermarked image, and can withstand

    various attacks. It is therefore widely used for copyright protection and ownership verification.

    Fragile watermarking is only used to ensure the completeness of the image rather than to verify

    actual ownership [2]. Even though it can detect any unauthorized modification or any

    modifications of the watermarked images, it also destroy the completeness of the watermark if

    any change happens. Semi-fragile watermarking combines the advantages of fragile

    watermarking and robust watermarking, with the aim to detect unauthorized manipulations while

    keeping the robustness against authorized manipulations [3]. As for the robust watermarking

    method, the watermark information is often directly embedded in the spatial domain, i.e. the

    watermark data is embedded into the host image by modifying the pixels spatially [4]. This

    operation is easy to implement but it is not robust enough against the geometric and image

    processing attacks [5]. In the meantime, the embedding process can also be completed in the

    transformed domains, e.g. the discrete cosine transform (DCT) [6]–[11], discrete Fourier

    transform (DFT) [12]–[14], discrete wave transformation (DWT) [15]–[17], and singular value

    decomposition (SVD)[18]–[20]. To ensure the robustness of the embedding algorithms,

    frequency domain analysis is utilized to find out the possible locations of the embedding

    watermark coefficients, Research shows that the human vision is more sensitive to low and

    middle frequency coefficients. Therefore, a good performance of the operation methods in the

    transformed domain can be achieved, especially when the watermarks are embedded within the

    low frequency ranges. Moreover, it is reported that the DWT-based watermarking methods have

    the advantages of multi-resolution, good energy compression, and an imperceptible visual

    quality, thus it can be used for image watermarking. However, the DWT-based watermarking is

    difficult to resist geometric attacks. This drawback can be addressed by extracting the geometric

    features of the image by using the matrix decomposition. Therefore, the method based on the

    DWT and matrix decomposition is widely used in the image watermarking to resist image

    processing and geometric attacks. The most common matrix decompositions used in the

    Mukt Shabd Journal

    Volume IX, Issue IX, SEPTEMBER/2020

    ISSN NO : 2347-3150

    Page No : 607

  • watermarking include SVD and Hessenberg decomposition (HD). The SVD provides a general

    and quantitative view on the image changes, and its structural information is crucial in predicting

    the image quality. Note that the singular vectors can represent structural information.

    Modifications in singular vectors are linked to the singular values which primarily represent the

    image luminance. Based on this, some robust watermarking methods are introduced in, which are

    based on DWT and SVD. The major concern of the SVD-based watermarking methods is the

    false positive problem, which can be solved using the encryption operation. Specifically, the

    components of SVD are encrypted by the chaotic systems, which can guarantee the

    watermarking method having a strong security performance, i.e. the false positive problem is

    solved. The matrix decomposition of HD has also been widely used for watermarking. It

    provides a method to embed the watermarks. However, the aforementioned watermarking

    methods require that the size of watermark is fixed. The watermarking methods under various

    sizes of watermarks are still required to be investigated. In addition, the performances of

    invisibility and robustness are two vital metrics for the image watermarking, and the trade-off

    between them is always a challenging. Recently, several bio-inspired algorithms are used to

    address this problem, such as differential evolution artificial bee colony (ABC) firefly algorithm,

    particle swarm optimization (PSO) and fruit fly optimization algorithm (FOA). In the approaches

    of, the FOA is used to solve the trade-off problem, and the performances are improved. In this

    paper, FOA is employed to optimize the parameters of the proposed algorithm and a trade-off

    between the invisibility and robustness is achieved. Based on these discussions, a novel image

    watermarking algorithm which combines DWT, HD and SVD is proposed in this paper. The

    performance test shows that this method has good invisibility and robustness, and does not have

    the constraint of fixed sizes of watermarks. Specifically, this work exploits an objective

    evaluation function (OEF) and FOA to find an adaptive and optimal scaling factor to achieve a

    trade-off between invisibility and robustness. The main contributions of this work include: (1)

    The proposed watermarking method satisfies the multiple sizes of watermarks, and the tradeoff

    between invisibility and robustness is achieved with a good performance; (2) OEF is proposed to

    assist in finding the optimal scaling factor to solve the contradiction between the invisibility and

    robustness, and FOA is employed to find the optimal factor; (3) HD is used to change the

    coefficients before SVD operation which can enhance the robustness of the watermarking; (4)

    Mukt Shabd Journal

    Volume IX, Issue IX, SEPTEMBER/2020

    ISSN NO : 2347-3150

    Page No : 608

  • Results show that the proposed watermarking method is robust under the attacks of filter, noise,

    JPEG compression, JPEG2000 compression and sharpening.

    II. LITERATURE SURVEY

    The appropriate background of literature and the concept of digital image watermarking are

    reviewed in this chapter. The copyright protection of multimedia content has become a critical

    issue now days due to easy copying, the latest developments in digital transmission and

    widespread of broadband networks and the internet. The transmission of information takes place

    in different forms and is used in many applications, where the communication must be done in

    secret form. Such secret communication techniques include the transfer of medical data, bank

    transfers, corporate communications, purchasing using bank cards, a large amount of information

    through emails and etc. Steganography, cryptography and watermarking are the different

    techniques used to perform secret communication. Watermarks can be embedded within images

    by modifying these values, i.e. the transform domain coefficients. In case of spatial domain,

    simple watermarks could be embedded in the images by modifying the pixel values or the Least

    Significant Bit (LSB) values. However, more robust watermarks could be embedded in the

    transform domain of images by modifying the transform domain coefficients. In 1997 Cox et al.

    presented a paper ―Secure Spread Spectrum Watermarking for Multimedia‖ , one of the most

    cited paper (cited 2985 times till April‘ 2008 as per Google Scholar search), and after that most

    of the research work is based on this work. Even though spatial domain based techniques cannot

    sustain most of the common attacks like compression, high pass or low pass filtering etc.,

    researchers present spatial domain based schemes [1].

    III. THE PROPOSED WATERMARKING SCHEME

    This paper proposes a healthcare security model for securing a medical data transmission in IoT

    environments. The proposed model composes of four continuous processes: (1) The confidential

    patient's data is encrypted using a proposed hybrid encryption scheme that is developed from

    both AES and RSA encryption algorithms. (2) The encrypted data is being concealed in a cover

    image using either 2D-DWT-1L or 2D-DWT-2L and produces a stego-image. (3) The embedded

    Mukt Shabd Journal

    Volume IX, Issue IX, SEPTEMBER/2020

    ISSN NO : 2347-3150

    Page No : 609

  • data is extracted. (4) The extracted data is decrypted to retrieve the original data. Fig. 1 shows

    the general framework of our proposed model for securing the medical data transmission at both

    the source's and the destination's sides.

    Figure 1. Diagram of the watermark embedding process

    Mukt Shabd Journal

    Volume IX, Issue IX, SEPTEMBER/2020

    ISSN NO : 2347-3150

    Page No : 610

  • In this process, A Haar-DWT was implemented. Throughout Haar-DWT, 2D-DWT-2L can be

    formulated as a consecutive transformation using low-pass and high-pass filters along the rows

    of the image; then the result decomposed along the columns of the image [21]. Fig. 2 elucidates

    this process. Fig. 2 illustrates the elemental decomposition process for C୨ ሺn, mሺ image of a

    size N ሺ M in four decomposed subband images which are referred to a high-high (HH), a high-

    low (HL), a low-high (LH), and a low-low (LL) frequency bands. Fig. 3 shows the effect of the

    decomposition process on the image.

    Fig. 2. The decomposition process of DWT-2L

    The proposed model implements the steganographic scheme. The steganographic scheme is

    composed of embedding and extraction processes. The embedding process takes a cover image C

    and a secret text message T as input and generates a stego-image S. While the extraction process

    inversely extracts the embedded message. It can be mathematically modeled as given in the

    following equations below. Throughout the embedding process, the secret text is transformed

    into an ASCII format and then divided into even and odd values. The odd values are concealed in

    vertical coefficients mentioned by LH2. The even values are concealed in diagonal coefficients

    specified by HH2. The algorithm that is used in the embedding procedure by evolved 2D-DWT-

    2L is described below.

    Mukt Shabd Journal

    Volume IX, Issue IX, SEPTEMBER/2020

    ISSN NO : 2347-3150

    Page No : 611

  • After incorporating the text into the cover image, the 2DDWT-2L technique is carried to extract

    the secret message and retrieve the cover image. The extraction algorithm is described below.

    Mukt Shabd Journal

    Volume IX, Issue IX, SEPTEMBER/2020

    ISSN NO : 2347-3150

    Page No : 612

  • Once the secret text message has been extracted, the cover image is synthesized from the

    reconstructed approximation by calling the idwt2 for the second level and then for the first level

    Decryption refers to the process of converting the encrypted data back to the user in a well-

    known format; which is the reverse of the encryption process. The same key used by the sender

    has to be used over the cipher-text throughout the encryption process. The decryption process

    can be mathematically expressed as given in the following equations below.

    FIGURE 3. new Procedure of the watermarking embedding.

    Mukt Shabd Journal

    Volume IX, Issue IX, SEPTEMBER/2020

    ISSN NO : 2347-3150

    Page No : 613

  • FIGURE 4. new Procedure of the watermarking extraction.

    The host image C and the watermark W are the input in the watermarking embedding algorithm,

    and the output is watermarked host image C ∗ . The sizes of C, W, C ∗ are M × M, N × N and M

    × M, respectively. In addition, this watermarking method can accommodate watermarks with

    multiple sizes, and the host image is decomposed by R-level DWT. The procedure of the

    watermarking embedding is shown in Fig. 1 and the detailed embedding steps are specified in the

    following steps.

    • Step 1. Based on R-level DWT, C is decomposed into the components of LL, LH, HL, HH,

    where R=log2 M N .

    • Step 2. HD is performed on LL, and it is shown as PHPT = HD(LL). (9)

    • Step 3. Apply SVD to H HUwHSwHVT w = SVD(H). (10)

    • Step 4. W is applied with SVD, i.e. UwSwV T w = SVD(W). (11) Then the operation of Uw, V

    T w is encrypted by the chaotic system which is generated by the Logistic map. This specified

    encryption is detailed in the experimental analysis of false positive problem. The encrypted two

    components are marked as Uw1 and V T w1 .

    • Step 5. Compute an embedded singular value HS∗ w by adding HSw and Sw with a scaling

    factor α by HS∗ w = HSw + αSw. (12)

    Step 6. The watermarked sub-band H ∗ is generated by using the inverse SVD, i.e. H ∗ =

    HUwHS∗ wHVT w . (13)

    • Step 7. A new low-frequency approximate sub-band LL∗ is reconstructed based on the inverse

    HD which is given by LL∗ = PH∗P T . (14)

    • Step 8. The watermarked image C ∗ is obtained by performing the inverse R-level DWT.

    In the watermarking extraction algorithm, the input is the watermarked host image C ∗ , and the

    output is extracted watermark W∗ . The size of W∗ is N×N. The procedure of the watermarking

    extraction is shown in Fig. 2 and the detailed extracting steps are shown as follows

    Mukt Shabd Journal

    Volume IX, Issue IX, SEPTEMBER/2020

    ISSN NO : 2347-3150

    Page No : 614

  • • Step 1. The watermarked host image C ∗ is decomposed into four sub-bands by R-level DWT,

    which include LLw, LHw, HLw, HHw.

    • Step 2. HD is performed on LLw by PwHwP T w = HD(LLw

    • Step 3. Apply SVD to Hw, i.e. HU∗ wHSb∗ wHV∗ w T = SVD(Hw).

    • Step 4. The extracted singular value S ∗ w is gained by S ∗ w = (HSb∗ w − HS∗ w )/α.

    • Step 5. The components Uw1 and V T w1 are decrypted by the chaotic system. Then the

    decrypted two components are marked as Uw2 and V T w2 . The extracted watermark W∗ is

    reconstructed by inverse SVD, which is described by W∗ = Uw2S ∗ wV T w2 .

    IV. EXPERIMENTAL RESULTS

    Figure 3. watermark processed images

    Mukt Shabd Journal

    Volume IX, Issue IX, SEPTEMBER/2020

    ISSN NO : 2347-3150

    Page No : 615

  • Figure 4. watermark extraction image.

    V. CONCLUSION

    In this paper, a novel image watermarking method based on DWT-HD-SVD transforms is

    proposed. Specifically, the FOA is used to find the optimal scaling factor. The invisibility and

    robustness of this method are analyzed by the numerical simulation experiments and the results

    show the watermarked host images have good visual quality, PSNRs, and SSIMs. Besides, the

    watermarks can be clearly extracted from the watermarked host image under different attacks

    with the relatively high NCs. Moreover, even for the watermarks with different sizes, the

    proposed image watermarking method can achieve a good invisibility and robustness. In

    addition, the comparison with the related works are listed and the corresponding metric values

    show that the proposed method has a better performance in terms of robustness for most attacks.

    It is worth noting that the proposed method is highly robust to defend the filter, noise, JPEG

    compression, JPEG2000 compression and sharpening attack. In the future work, the proposed

    watermarking method may be need to pay attention on resisting more attack, such as rotation

    attack and cropping attack.

    Mukt Shabd Journal

    Volume IX, Issue IX, SEPTEMBER/2020

    ISSN NO : 2347-3150

    Page No : 616

  • REFERENCES

    [1] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized-LSB data

    embedding,” IEEE Trans. Image Process., vol. 14, no. 2, pp. 253–266, Feb. 2005. [2] M. U.

    Celik, G. Sharma, and A. M. Tekalp, “Lossless watermarking for image authentication: A new

    framework and an implementation,” IEEE Trans. Image Process., vol. 15, no. 4, pp. 1042–1049,

    Apr. 2006.

    [3] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst.

    Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006.

    [4] X. Li, W. Zhang, X. Gui, and B. Yang, “A novel reversible data hiding scheme based on two-

    dimensional difference-histogram modification,” IEEE Trans. Inf. Forensics Security, vol. 8, no.

    7, pp. 1091–1100, Jul. 2013.

    [5] C. Qin, C.-C.Chang, Y.-H.Huang, and L.-T. Liao, “An inpaintingassisted reversible

    steganographic scheme using a histogram shifting mechanism,” IEEE Trans. Circuits Syst. Video

    Technol., vol. 23, no. 7, pp. 1109–1118, Jul. 2013.

    [6] W.-L. Tai, C.-M.Yeh, and C.-C. Chang, “Reversible data hiding based on histogram

    modification of pixel differences,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp.

    906–910, Jun. 2009.

    [7] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits

    Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.

    [8] Y. Hu, H.-K. Lee, and J. Li, “DE-based reversible data hiding with improved overflow

    location map,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 2, pp. 250–260, Feb.

    2009.

    [9] X. Li, B. Yang, and T. Zeng, “Efficient reversible watermarking based on adaptive

    prediction-error expansion and pixel selection,” IEEE Trans. Image Process., vol. 20, no. 12, pp.

    3524–3533, Dec. 2011.

    [10] X. Zhang, “Reversible data hiding with optimal value transfer,” IEEE Trans. Multimedia,

    vol. 15, no. 2, pp. 316–325, Feb. 2013.

    [11] T. Bianchi, A. Piva, and M. Barni, “On the implementation of the discrete Fourier transform

    in the encrypted domain,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 86–97, Mar.

    2009.

    Mukt Shabd Journal

    Volume IX, Issue IX, SEPTEMBER/2020

    ISSN NO : 2347-3150

    Page No : 617

  • [12] T. Bianchi, A. Piva, and M. Barni, “Composite signal representation for fast and storage-

    efficient processing of encrypted signals,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp.

    180–187, Mar. 2010.

    [13] M. Barni, P. Failla, R. Lazzeretti, A. Sadeghi, and T. Schneider, “Privacy-preserving ECG

    classification with branching programs and neural networks,” IEEE Trans. Inf. Forensics

    Security, vol. 6, no. 2, pp. 452–468, Jun. 2011.

    [14] Z. Erkin, T. Veugen, T. Toft, and R. Lagendijk, “Generating private recommendations

    efficiently using homomorphic encryption and data packing,” IEEE Trans. Inf. Forensics

    Security, vol. 7, no. 3, pp. 1053–1066, Jun. 2012.

    [15] M. Chandramouli, R. Iorga, and S. Chokhani, “Publication citation: Cryptographic key

    management issues & challenges in cloud services,” US Dept. Commerce, Nat. Inst. Standards

    Technol., Gaithersburg, MD, USA, Tech. Rep. 7956, 2013, pp. 1–31.

    [16] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf.

    Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.

    [17] W. Puech, M. Chaumont, and O. Strauss, “A reversible data hiding method for encrypted

    images,” Proc. SPIE, vol. 6819, pp. 1–9, Feb. 2008.

    [18] X. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Process. Lett., vol. 18,

    no. 4, pp. 255–258, Apr. 2011.

    [19] W. Hong, T.-S.Chen, and H.-Y. Wu, “An improved reversible data hiding in encrypted

    images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012.

    [20] X. Zhang, Z. Qian, G. Feng, and Y. Ren, “Efficient reversible data hiding in encrypted

    images,” J. Vis. Commun. Image Represent. vol. 25, no. 2, pp. 322–328, Feb. 2014.

    Mukt Shabd Journal

    Volume IX, Issue IX, SEPTEMBER/2020

    ISSN NO : 2347-3150

    Page No : 618