Penyisipan Data Secara Reversible Pada Gambar Medis Menggunakan Metode Difference Expansion of Quad dan Fungsi Modulus

Aulia Arham

Abstract


The rapid advancement of the Internet of Things (IoT) brings convenience across various domains, but raises its own challenges, particularly concerning data security and privacy. Cryptography and steganography are two techniques used to secure data. Cryptography protects information by encrypting messages, while steganography hides the existence of data in other media. The embedding of data into other media like medical images necessitates specialized approaches to prevent potential distortion that may compromise their integrity. Distortion in medical images could lead to erroneous diagnoses. In this study, we introduce a reversible data embedding technique capable of returning storage media to its original state without distortion, utilizing the Difference Expansion of Quad and Modulus Function. This approach employs 2×2 pixel blocks to embed 3-bits of data. Our experiments on six medical images demonstrate that the proposed method offers substantial embedding capacity while maintaining high visual quality. The embedding capacity can reach 0.4834 bits per pixel (bpp) with a PSNR of 49.4330 dB. Experimental findings indicate that the proposed method outperforms previous techniques.

Keywords


Cryptography; Steganography; Reversible Embedding, Difference Expansion of Quad, Fungsi Modulus.

Full Text:

PDF


DOI: https://doi.org/10.15548/jostech.v4i1.8257
Abstract views : 27 times
PDF : 8 times

References


C. C. Islamy, T. Ahmad, and R. M. Ijtihadie, “Reversible data hiding based on histogram and prediction error for sharing secret data,” Cybersecurity, vol. 6, no. 1, p. 12, 2023, doi: 10.1186/s42400-023-00147-y.

M. K. Shambour and A. Gutub, “Progress of IoT Research Technologies and Applications Serving Hajj and Umrah,” Arab. J. Sci. Eng., vol. 47, no. 2, pp. 1253–1273, 2022, doi: 10.1007/s13369-021-05838-7.

S. Namasudra, D. Devi, S. Kadry, R. Sundarasekar, and A. Shanthini, “Towards DNA based data security in the cloud computing environment,” Comput. Commun., vol. 151, pp. 539–547, Feb. 2020, doi: 10.1016/j.comcom.2019.12.041.

A. A. Abba Ari et al., “Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges,” Appl. Comput. Informatics, vol. 20, no. 1/2, pp. 119–141, Jan. 2024, doi: 10.1016/j.aci.2019.11.005.

G. K. Murhty and T. Kanimozhi, “Methodologies in Steganography and Cryptography--Review,” in Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough: Volume 4, V. K. Gunjan, J. M. Zurada, and N. Singh, Eds. Cham: Springer International Publishing, 2024, pp. 205–214.

E. Öztürk, A. Ş. Mesut, and Ö. A. Fıdan, “A character based steganography using masked language modeling,” IEEE Access, p. 1, 2024, doi: 10.1109/ACCESS.2024.3354710.

P. Maniriho and T. Ahmad, “Information hiding scheme for digital images using difference expansion and modulus function,” J. King Saud Univ. Inf. Sci., vol. 31, no. 3, pp. 335–347, 2019, doi: 10.1016/j.jksuci.2018.01.011.

A. Arham, H. A. Nugroho, and T. B. Adji, “Multiple Layer Data Hiding Scheme Based on Difference Expansion of Quad,” Signal Processing, vol. 137, pp. 52–62, 2017, doi: 10.1016/j.sigpro.2017.02.001.

A. Arham and O. S. Riza, “Reversible Data Hiding Using Hybrid Method of Difference Expansion on Medical Image,” J. Ilm. Tek. Elektro Komput. dan Inform., vol. 6, no. 2, pp. 11–19, 2020, doi: 10.26555/jiteki.v6i2.16965.

A. Arham, H. A. Nugroho, and T. B. Adji, “Combination schemes Reversible Data Hiding for medical images,” in Proceedings - 2016 2nd International Conference on Science and Technology-Computer, ICST 2016, 2017, pp. 44–49, doi: 10.1109/ICSTC.2016.7877345.

A. Arham and N. Lestari, “Secure medical image watermarking based on reversible data hiding with Arnold’s cat map,” Int. J. Adv. Intell. Informatics; Vol 9, No 3 Novemb. 2023, 2023, doi: 10.26555/ijain.v9i3.1029.

A. Arham and N. Lestari, “Arnold’s cat map secure multiple-layer reversible watermarking,” Indones. J. Electr. Eng. Comput. Sci., vol. 33, no. 3, p. 1536, Mar. 2024, doi: 10.11591/ijeecs.v33.i3.pp1536-1545.

A. Arham, R. Rahmawati, and O. S. Riza, “Reversible Data Hiding pada Audio Digital Berbasis Difference Expansion,” Insearch Inf. Syst. Res. J., vol. 2, no. 01, pp. 28–35, 2022, doi: 10.15548/isrj.v2i01.4101.

J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, 2003, doi: 10.1109/TCSVT.2003.815962.

J. Tian, “Wavelet-based reversible watermarking for authentication,” in Security and Watermarking of Multimedia Contents IV, 2002, vol. 4675, pp. 679–690, doi: 10.1117/12.465329.

A. M. Alattar, “Reversible watermark using difference expansion of triplets,” in IEEE International Conference on Image Processing, ICIP’2003’, 2003, vol. 1, pp. I-501–4 vol.1, doi: 10.1109/ICIP.2003.1247008.

A. M. Alattar, “Reversible watermark using difference expansion of quads,” in IEEE International Conference on Acoustics, Speech, and Signal Processing, 2004, vol. 3, pp. iii-377–80 vol.3, doi: 10.1109/ICASSP.2004.1326560.

J.-Y. Hsiao, K.-F. Chan, and J. M. Chang, “Block-based reversible data embedding,” Signal Processing, vol. 89, no. 4, pp. 556–569, 2009, doi: 10.1016/j.sigpro.2008.10.018.

C.-L. Liu, D.-C. Lou, and C.-C. Lee, “Reversible Data Embedding Using Reduced Difference Expansion,” in Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2007, vol. 1, pp. 433–436, doi: 10.1109/IIH-MSP.2007.267.

H. Yi, S. Wei, and H. Jianjun, “Improved reduced difference expansion based reversible data hiding scheme for digital images,” in International Conference on Electronic Measurement & Instruments, 2009, pp. 4–318, doi: 10.1109/ICEMI.2009.5274054.

T. Ahmad, M. Holil, W. Wibisono, and I. Royyana Muslim, “An improved Quad and RDE-based medical data hiding method,” in Proceeding - IEEE CYBERNETICSCOM 2013: IEEE International Conference on Computational Intelligence and Cybernetics, 2013, pp. 141–145, doi: 10.1109/CyberneticsCom.2013.6865798.

M. H. A. Al Huti, T. Ahmad, and S. Djanali, “Increasing the capacity of the secret data using DEpixels blocks and adjusted RDE-based on grayscale images,” in International Conference on Information & Communication Technology and Systems, 2015, pp. 225–230, doi: 10.1109/ICTS.2015.7379903.

Z. Syahlan and T. Ahmad, “Reversible data hiding method by extending reduced difference expansion,” Int. J. Adv. Intell. Informatics, vol. 5, no. 2, pp. 101–112, 2019, doi: 10.26555/ijain.v5i2.351.

S. M. Abdullah and A. A. Manaf, “Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion Techniques,” in Networked Digital Technologies: Second International Conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part I 2, 2010, pp. 333–342, doi: 10.1007/978-3-642-14292-5_35.

M. S. Hossen, T. Ahmad, and N. J. D. L. Croix, “Data Hiding Scheme using Difference Expansion and Modulus Function,” in 2023 2nd International Conference for Innovation in Technology (INOCON), 2023, pp. 1–6, doi: 10.1109/INOCON57975.2023.10100991.

“Partners Infectious Disesase Images, Emicrobes Digital Library.” http://www.idimages.org/images/browse/ImageTechnique/ (accessed Jan. 09, 2024).


Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 JOSTECH Journal of Science and Technology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.