Wavelet-Assisted Steganography and Visual Secret Sharing for Privacy-Preserving Medical Image Exchange
Keywords:
Medical Image Security, Wavelet-Assisted Steganography, Visual Secret Sharing, DICOM Image, Privacy Preservation, Random Grid Encryption, Secure Medical Image ExchangeAbstract
Medical exchange of images should be secure to ensure patient privacy and not compromise diagnostic quality. The paper describes a wavelet-based steganography and secret sharing scheme of medical image sharing to ensure privacy. In the first step medical images are pre-processed to make them clear and free of noise without compromising the diagnostic value. The wavelet-based steganography is used to embed sensitive patient metadata into the medical image, resulting in stego images that are visually identical to the originals. In order to increase the security, the stego images are encrypted and broken into various random blurred shares by the use of visual secret sharing methodologies such that the individual shares do not reflect any significant information. The reconstruction process is authorized where the required shares are combined and the original medical image and metadata are restored. The experimental evidence proves the proposed approach to provide satisfactory image quality regarding PSNR 15.7-16.0 dB and SSIM 0.847-0.857, which indicate that there is a structural similarity between the original and stego images. The analysis of histogram demonstrates that there is little statistical disparity and the system is resistant to steganalysis attacks. The system is found to be reliable in reconstruction with 100% accuracy in recovery and classification accuracy is found to be approximately 58 which shows the strength and practicability of the method. All in all, the suggested framework is a useful solution to the issue of safe and privacy-saving medical image exchange within a healthcare setting.
Downloads
References
RI. Aouissaoui, T. Bakir, and A. Sakly, “Robustly correlated key-medical image for DNA-chaos based encryption,” IET Image Processing, vol. 15, no. 12, pp. 2770–2786, 2021.
K. Clark et al., “The cancer imaging archive (TCIA): Maintaining and operating a public information repository,” Journal of Digital Imaging, vol. 26, no. 6, pp. 1045–1057, 2013.
S. T. Kamal, K. M. Hosny, T. M. Elgindy, M. M. Darwish, and M. M. Fouda, “A new image encryption algorithm for grey and color medical images,” IEEE Access, vol. 9, pp. 37855–37865, 2021.
O. Kafri and E. Keren, “Encryption of pictures and shapes by random grids,” Optics Letters, vol. 12, pp. 377–379, 1987.
H. Kaur and J. Rani, “A survey on different techniques of steganography,” MATEC Web of Conferences, vol. 57, p. 02003, 2016.
S. Kumar and R. K. Sharma, “Improving contrast in random grids based visual secret sharing,” International Journal of Security and Its Applications, vol. 6, no. 1, pp. 9–28, 2012.
T.-C. Lu and T. N. Vo, “Reversible steganography techniques: A survey,” in Digital Media Steganography, M. Hassaballah, Ed. Academic Press, 2020, pp. 189–213.
P. Mishra, C. Bhaya, A. K. Pal, and A. K. Singh, “A medical image cryptosystem using bit-level diffusion with DNA coding,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, 2021.
M. Mustra, K. Delac, and M. Grgic, “Overview of the DICOM standard,” vol. 1, pp. 39–44, 2008.
R. Maurya, A. K. Kannojiya, and B. Rajitha, “An extended visual cryptography technique for medical image security,” in Proc. 2nd Int. Conf. Innovative Mechanisms for Industry Applications (ICIMIA), 2020, pp. 415–421.
N. C. Mhala and A. R. Pais, “An improved and secure visual secret sharing (VSS) scheme for medical images,” in Proc. 11th Int. Conf. Communication Systems & Networks (COMSNETS), 2019, pp. 823–828.
M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology—EUROCRYPT’94, A. De Santis, Ed. Springer, 1995, pp. 1–12.
Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–362, 2006.
R. Praveenkumar, “Medical image encryption,” in Cryptographic and Information Security Approaches for Images and Videos. CRC Press, 2018, pp. 297–320.
J. Weir and W. Yan, “A comprehensive study of visual cryptography,” Trans. Data Hiding Multim. Secur., vol. 5, pp. 70–105, 2010.
S. Yin, J. Liu, and L. Teng, “Improved elliptic curve cryptography with homomorphic encryption for medical image encryption,” International Journal of Network Security, vol. 22, no. 3, pp. 419–424, 2020.
X. Yan, X. Liu, and C.-N. Yang, “An enhanced threshold visual secret sharing based on random grids,” Journal of Real-Time Image Processing, vol. 14, pp. 61–73, 2018..
Downloads
Published
Issue
Section
License
Copyright (c) 2026 International Journal of Scientific Research in Science and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.
https://creativecommons.org/licenses/by/4.0