Wavelet-Assisted Steganography and Visual Secret Sharing for Privacy-Preserving Medical Image Exchange

Authors

  • Mr. D. Jayanayudu Associate Professor, Department of ECE, Siddhartha Institute of science & Technology, Puttur, Andhra Pradesh, India Author
  • Nandyala Yeshaswini UG, Department of ECE, Siddhartha Institute of science & Technology, Puttur, Andhra Pradesh, India Author
  • Sandulo Tharun Teja UG, Department of ECE, Siddhartha Institute of science & Technology, Puttur, Andhra Pradesh, India Author
  • K. Veera Gnaneswar Reddy UG, Department of ECE, Siddhartha Institute of science & Technology, Puttur, Andhra Pradesh, India Author
  • Atturu Prasad UG, Department of ECE, Siddhartha Institute of science & Technology, Puttur, Andhra Pradesh, India Author

Keywords:

Medical Image Security, Wavelet-Assisted Steganography, Visual Secret Sharing, DICOM Image, Privacy Preservation, Random Grid Encryption, Secure Medical Image Exchange

Abstract

Medical exchange of images should be secure to ensure patient privacy and not compromise diagnostic quality. The paper describes a wavelet-based steganography and secret sharing scheme of medical image sharing to ensure privacy. In the first step medical images are pre-processed to make them clear and free of noise without compromising the diagnostic value. The wavelet-based steganography is used to embed sensitive patient metadata into the medical image, resulting in stego images that are visually identical to the originals. In order to increase the security, the stego images are encrypted and broken into various random blurred shares by the use of visual secret sharing methodologies such that the individual shares do not reflect any significant information. The reconstruction process is authorized where the required shares are combined and the original medical image and metadata are restored. The experimental evidence proves the proposed approach to provide satisfactory image quality regarding PSNR 15.7-16.0 dB and SSIM 0.847-0.857, which indicate that there is a structural similarity between the original and stego images. The analysis of histogram demonstrates that there is little statistical disparity and the system is resistant to steganalysis attacks. The system is found to be reliable in reconstruction with 100% accuracy in recovery and classification accuracy is found to be approximately 58 which shows the strength and practicability of the method. All in all, the suggested framework is a useful solution to the issue of safe and privacy-saving medical image exchange within a healthcare setting.

Downloads

Download data is not yet available.

References

RI. Aouissaoui, T. Bakir, and A. Sakly, “Robustly correlated key-medical image for DNA-chaos based encryption,” IET Image Processing, vol. 15, no. 12, pp. 2770–2786, 2021.

K. Clark et al., “The cancer imaging archive (TCIA): Maintaining and operating a public information repository,” Journal of Digital Imaging, vol. 26, no. 6, pp. 1045–1057, 2013.

S. T. Kamal, K. M. Hosny, T. M. Elgindy, M. M. Darwish, and M. M. Fouda, “A new image encryption algorithm for grey and color medical images,” IEEE Access, vol. 9, pp. 37855–37865, 2021.

O. Kafri and E. Keren, “Encryption of pictures and shapes by random grids,” Optics Letters, vol. 12, pp. 377–379, 1987.

H. Kaur and J. Rani, “A survey on different techniques of steganography,” MATEC Web of Conferences, vol. 57, p. 02003, 2016.

S. Kumar and R. K. Sharma, “Improving contrast in random grids based visual secret sharing,” International Journal of Security and Its Applications, vol. 6, no. 1, pp. 9–28, 2012.

T.-C. Lu and T. N. Vo, “Reversible steganography techniques: A survey,” in Digital Media Steganography, M. Hassaballah, Ed. Academic Press, 2020, pp. 189–213.

P. Mishra, C. Bhaya, A. K. Pal, and A. K. Singh, “A medical image cryptosystem using bit-level diffusion with DNA coding,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, 2021.

M. Mustra, K. Delac, and M. Grgic, “Overview of the DICOM standard,” vol. 1, pp. 39–44, 2008.

R. Maurya, A. K. Kannojiya, and B. Rajitha, “An extended visual cryptography technique for medical image security,” in Proc. 2nd Int. Conf. Innovative Mechanisms for Industry Applications (ICIMIA), 2020, pp. 415–421.

N. C. Mhala and A. R. Pais, “An improved and secure visual secret sharing (VSS) scheme for medical images,” in Proc. 11th Int. Conf. Communication Systems & Networks (COMSNETS), 2019, pp. 823–828.

M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology—EUROCRYPT’94, A. De Santis, Ed. Springer, 1995, pp. 1–12.

Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–362, 2006.

R. Praveenkumar, “Medical image encryption,” in Cryptographic and Information Security Approaches for Images and Videos. CRC Press, 2018, pp. 297–320.

J. Weir and W. Yan, “A comprehensive study of visual cryptography,” Trans. Data Hiding Multim. Secur., vol. 5, pp. 70–105, 2010.

S. Yin, J. Liu, and L. Teng, “Improved elliptic curve cryptography with homomorphic encryption for medical image encryption,” International Journal of Network Security, vol. 22, no. 3, pp. 419–424, 2020.

X. Yan, X. Liu, and C.-N. Yang, “An enhanced threshold visual secret sharing based on random grids,” Journal of Real-Time Image Processing, vol. 14, pp. 61–73, 2018..

Downloads

Published

25-03-2026

Issue

Section

Research Articles

How to Cite

[1]
Mr. D. Jayanayudu, Nandyala Yeshaswini, Sandulo Tharun Teja, K. Veera Gnaneswar Reddy, and Atturu Prasad, Trans., “Wavelet-Assisted Steganography and Visual Secret Sharing for Privacy-Preserving Medical Image Exchange”, Int J Sci Res Sci & Technol, vol. 13, no. 2, pp. 328–337, Mar. 2026, Accessed: Apr. 29, 2026. [Online]. Available: https://mail.ijsrst.com/index.php/home/article/view/IJSRST261333