Next Article in Journal
Effective Multi-Object Tracking via Global Object Models and Object Constraint Learning
Next Article in Special Issue
ST-DeepGait: A Spatiotemporal Deep Learning Model for Human Gait Recognition
Previous Article in Journal
Design and Implementation of a New Training Flight Simulator System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy

1
Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan
2
Department of Electronic Engineering, National Quemoy University, Kinmen 89250, Taiwan
3
AI Research Center, Hon Hai (Foxconn) Research Institute, Taipei City 114699, Taiwan
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(20), 7942; https://doi.org/10.3390/s22207942
Submission received: 22 September 2022 / Revised: 8 October 2022 / Accepted: 15 October 2022 / Published: 18 October 2022
(This article belongs to the Special Issue Biometrics Recognition Based on Sensor Technology)

Abstract

:
How to hide messages in digital images so that messages cannot be discovered and tampered with is a compelling topic in the research area of cybersecurity. The interpolation-based reversible data hiding (RDH) scheme is especially useful for the application of medical image management. The biometric information of patients acquired by biosensors is embedded into an interpolated medical image for the purpose of authentication. The proposed scheme classifies pixel blocks into complex and smooth ones according to each block’s dynamic range of pixel values. For a complex block, the minimum-neighbor (MN) interpolation followed by DIM embedding is applied, where DIM denotes the difference between the block’s interpolated pixel values and the maximum pixel values. For a smooth block, the block mean (BM) interpolation is followed by a prediction error histogram (PEH) embedding and a difference expansion (DE) embedding is applied. Compared with previous methods, this adaptive strategy ensures low distortion due to embedding for smooth blocks while it provides a good payload for complex blocks. Our scheme is suitable for both medical and general images. Experimental results confirm the effectiveness of the proposed scheme. Performance comparisons with state-of-the-art schemes are also given. The peak signal to noise ratio (PSNR) of the proposed scheme is 10.32 dB higher than the relevant works in the best case.

1. Introduction

Hiding information that does not want to be discovered or tampered with in digital image carriers is a hot issue in the research area of information security. According to the application purpose, it can be divided into steganography and watermarking. Typically, people use watermarking techniques for copyright protection and steganography for covert communication. Data hiding methods can also be divided into two kinds: reversible and irreversible, depending on the receiver’s ability to recover the cover digital image. Reversible data hiding (RDH) [1,2,3,4,5,6,7,8,9,10,11,12,13] can recover the primary digital image after reading the embedded secret messages. While irreversible data hiding (IRDH) [14,15] cannot recover the primary digital image from the message-embedded confidential image completely without loss. Nevertheless, the IRDH method is usually able to embed more messages than the RDH method.
Recently, many RDH schemes based on the interpolated cover image were proposed [16,17,18,19,20,21,22,23,24,25,26,27,28,29,30], which can embed more secret data than traditional RDH methods while preserving a good visual quality of confidential images. The interpolation-based RDH scheme is especially useful for the application of medical image management. Since the visual quality of clinical images is directly related to the diagnosis, perceptible distortion is unacceptable. Therefore, it is more desirable to keep the original pixel value unchanged. The cover image is usually generated by upsampling with interpolation technology in the interpolation-based RDH method. Then, the confidential message is hidden into the interpolated pixels only. In this way, after extracting the confidential data, we only need to delete the interpolated pixels from the confidential image, and we can recover the primary image perfectly.
In e-healthcare information management, if we can store and transmit the biometric information of a patient together with its corresponding medical image, an authentication procedure can be executed to ensure correct usage of the medical image. Moreover, we need to hide the information in its corresponding medical image with the least distortion to prevent misdiagnosis. The interpolation-based RDH method provides a good solution for this demand.
The key techniques for interpolation-based RDH are the interpolation method and the data embedding method. Previous work in interpolation technology includes the neighbor mean interpolation (NMI) [16,17,18], the interpolation by neighboring pixel (INP) [19], and the pixel repetition technology, etc. In 2021, Mandal et al. [20] published an improved interpolation technology, which gives an interpolated pixel value toward the minimum value of the block. Then, the difference between the interpolated value and the maximum value (DIM) of the block is applied to embed secret data. Since the gap is enlarged, its embedding capacity also increases. Moreover, the difference expansion (DE) [4,5] is applied to embed a second layer of confidential messages, which further increases the embedding capacity. In 2020, Geetha et al. [21] published a method that uses the last significant bit (LSB) substitution after re-interpolation, resulting in a good visual quality of the confidential images at low payloads. Many other existing RDH methods are also applicable to the interpolation-based RDH scheme.
The scheme published by Mandal et al. [20], in 2021, provides a good embedding capacity compared to other existing schemes. However, when the dynamic extent of pixel values in a block is large, the DE embedding in the second layer leads to severe distortion of the pixel value. We propose an adaptive strategy that first classifies pixel blocks into two types: smooth pixel blocks and complex pixel blocks. Then, different pixel value interpolation and data embedding strategies are designed to fit the feature of the given block. The analysis of the experimental results shows that our proposed strategy is effective both on general images and medical images.
The proposed scheme is elaborated in this paper through the following sections. Some of the related work is briefly described in Section 2. Section 3 presents the proposed adaptive RDH scheme. Section 4 not only provides its own experimental data and compares it with related works but also analyzes the experimental results. Finally, we summarize the proposed scheme in Section 5.

2. Related Works

In this section, we introduce two fundamental tools for data hiding, including difference expansion (DE) and the prediction error histogram (PEH), which are used in the related and the proposed RDH schemes. Then, an interpolation-based RDH scheme proposed by Mandal et al. is discussed, which is the main reference of our RDH scheme.

2.1. Difference Expansion (DE)

In the differential expansion (DE) [4,5] method, we process the primary image with pixel pairs as the unit of operation. For each pixel pair, the mean value and difference value are calculated first. Centered at the mean value, the difference value is evenly double-expanded outward. We can hide a bit of the confidential message in a pixel pair by switching the difference value between an adjacent pair of even and odd difference values. The formulas for DE are given by:
μ = 𝓈 + 𝓉 2 , 𝒹 = | 𝓈 𝓉 | , 𝒹 = 2 × 𝒹 + b .
𝓈 = { μ + 𝒹 / 2 ,             if   𝓈 > 𝓉 , μ 𝒹 / 2 ,           otherwise .
𝓉 = { μ 𝒹 / 2 ,             if   𝓈 > 𝓉 , μ + 𝒹 / 2 ,           otherwise .
The variables ( 𝓈 ,   𝓉 ) denote the cover pixel pair, μ is the average value, 𝒹 is the difference, b is a binary secret bit, 𝒹 is the modified difference, and ( 𝓈 , 𝓉 ) is the marked pixel pair. When we want to extract the information, the secret bit can be read from the new pixel pair by:
μ = 𝓈 + 𝓉 2 , 𝒹 = | 𝓈 𝓉 | ,   b = mod ( 𝒹 , 2 ) , 𝒹 = 𝒹 / 2 . 𝓈 = { μ + 𝒹 / 2 ,     if   𝓈 > 𝓉 , μ 𝒹 / 2 ,     otherwise . 𝓉 = { μ 𝒹 / 2 ,     if   𝓈 > 𝓉 , μ + 𝒹 / 2 ,     otherwise .

2.2. Prediction Error Histogram (PEH)

There are many PEH-based RDH techniques [8,9,10] and the differences between these algorithms mainly focus on two aspects, which are PEH generation and the PEH modification. For PEH generation, researchers have published various prediction schemes to improve the prediction accuracy and thus generate a more concentrated histogram; for PEH modification, researchers have also proposed many PEH shifting methods to enhance the data embedding rate of confidential images and reduce the expansion distortion. In this paper, we use a commonly applied histogram shifting method to modify PEH. After obtaining the predicted pixel value D , we use Equation (5) to calculate the prediction error E and embed the confidential message into the predicted values using the rules given in Equation (6). The corresponding process is illustrated in Figure 1a, where bins 0 and −1 are merged back to bin 0; bins 1 and 2 are merged back to 1; and secret bits are extracted during the process:
E = 𝒟 D ,
D = { 𝒟 + b ,     if   E = 1 , 𝒟 b ,     if   E = 0 , 𝒟 + 1 ,     if   E > 1 , 𝒟 1 ,     if   E < 0 .
When we need to extract data, we first obtain the gap E between the marked pixel-value D and the predicted pixel-value D by Equation (7). Then, we can read the confidential message by the rule of Equation (8) while recovering the original gap. The corresponding process is illustrated in Figure 1b, where bins 0 and 1 are selected as the target of embedding; the outside bins are shifted outward to vacate the required embedding space:
E = D D ,
D = { D + 1 , b = 1 ,     if   E = 1 , D 1 , b = 1 ,             if   E = 2 , D , b = 0 ,                   if   E = 0 , D , b = 0 ,                   if   E = 1 , D 1 ,                       if   E > 2 , D + 1 ,                     if   E < 1 .

2.3. Mandal et al.’s Method [20]

In the method published by Mandal et al. [20], a processing unit of the primary image is a pixel block of size 2 × 2 . Each unit is upsampled into a block of the size 3 × 3 . The inserted pixel values are interpolated using the minimum pixel value and its neighboring pixel values (MN). The data embedding includes two phases. In the first phase, the difference gap between the interpolated pixel value and the maximum pixel value (DIM) is exploited to embed confidential messages with an adjustable length. In the second phase, the interpolated pixels are grouped into two pairs and embedded confidential messages using DE.
An example of Mandal et al.’s RDH processing is given in Figure 2. As shown in Figure 2, the MN interpolation technique is first applied to calculate the three interpolated pixel values: I ( 1 , 2 ) = 69 , I ( 2 , 1 ) = 70 , and I ( 2 , 2 ) = 69 . In the first embedding phase, DIM is used to estimate the payload of each interpolated pixel. According to the estimated payloads, secret data s 1 = ( 101 ) 2 , s 2 = ( 111 ) 2 , and s 3 = ( 010 ) 2 are embedded to obtain I ( 1 , 2 ) = 74 , I ( 2 , 1 ) = 77 , and I ( 2 , 2 ) = 71 . In the second phase, we first use I ( 1 , 2 ) = 74 and I ( 2 , 2 ) = 71 as a pair for DE embedding. The secret data s 4 = 1 is embedded to obtain I ( 1 , 2 ) = 76 and I ( 2 , 2 ) = 69 . Then, we use I ( 2 , 1 ) = 77 and I ( 2 , 2 ) = 69 as a pair for DE embedding. The secret data s 5 = 0 is embedded to obtain I ( 2 , 1 ) = 81 and I ( 2 , 2 ) = 65 .
In the first phase, DIM in the processing block is exploited to embed data. The larger the difference, the larger the value available for modification, which means that more secret bits can be embedded in the gap. However, the payload would be very small when the neighboring pixel values of a cover image change smoothly. Moreover, DE embedding is applied in the second phase to further improve the ability of the program to embed information. However, the visual quality of the confidential image is greatly degraded when the pixel value difference is large.
In most medical images, the background of the image usually contains a large smooth area, which is not suitable for the application of this RDH method. Moreover, the visual quality of a medical image is a very crucial concern. Therefore, severe degradation after data embedding is not allowed.

3. Proposed Scheme

A typical medical image usually contains both a large area of complex textures and a smooth background. For the image blocks with complex textures, we can take advantage of their complexity to embed multiple secret bits as in the DIM method of [20]. However, the additional DE embedding in the second phase results in a large displacement of pixel values, which results in significant visual distortion, so our scheme does not apply an additional DE embedding for such blocks. For the blocks with smooth textures, the payloads of the pixels for the DIM method are usually zero since the pixel values are very close. So, the proposed scheme adopts an alternative interpolation and embedding method to effectively embed secret bits while preserving low distortion.
As illustrated in Figure 3, we follow the interpolation-based framework proposed by Mandal et al. [20] except that the processing order of image blocks is slightly modified. The original medical image is divided into 2 × 2 -sized blocks in an overlapped manner both row-wise and column-wise and the blocks are processed in the raster scanning order.
The dynamic range of pixel values for an image block is defined as the gray level range between the minimum and the maximum pixel values. In order to ensure that the medical images with hidden data have a good visual quality that will not lead to a misdiagnosis, the dynamic range of the pixel values within the processing block is utilized to hide the biometric information. Specifically, the interpolated pixel values modified by the data embedding should not exceed the dynamic range of the original pixel values regardless of whether they are above or below. Otherwise, false noises or contours may occur, and this may lead to misdiagnosis by the physician. However, the dynamic range of the image blocks is not the same. The blocks with a large dynamic range can be used to embed many data bits while the others are not suitable for this treatment. Therefore, we classify the pixel blocks into complex blocks and smooth blocks and process them using different methods.
The dynamic range of the pixel values in each block is calculated as shown in Figure 4. When the dynamic range of a block is larger than the given threshold, we consider the block to be a complex block; conversely, it is considered to be a smooth block. Meanwhile, the original image is upsampled to obtain a cover image with spaces to be inserted for later use. The detailed processing for image upsampling and block classification is given in Algorithm 1. According to the type of the processing block, a specified interpolation method and embedding method are applied to hide the patient’s biometric information acquired by the biosensors. When a confidential image is received, the receiver first discriminates the block type and extracts the biometric data accordingly. After confirming the patient’s biometric information, the confidential image is downsampled to generate the original image. The overall flowcharts of the embedding and the extraction stages are given in Figure 5.
Algorithm 1 Image Upsampling and Block Classification
Input:Original cover image O I - sized   × N ,   threshold   value   T .
Output: Vacated cover image - sized   ( 2 1 ) × ( 2 N 1 ) .
Step 1: Upsample the × N -sized image O I by zero-interlacing to obtain a ( 2 1 ) × ( 2 N 1 ) )-sized image I , whose values are given by
( , 𝒽 ) = { O I ( + 1 ) / 2 , ( 𝒽 + 1 ) / 2 ) ,   , 𝒽 odd , 0 ,     otherwise .      (9)
Step 2:Image O I is divided into overlapped 2 × 2 pixel blocks given by
B ( 𝓈 , 𝓉 ) = O I ( 𝓈 : 𝓈 + 1 , 𝓉 : 𝓉 + 1 ) ,   1 < 𝓈 < ( 1 ) ,   1 < 𝓉 < ( N 1 ) .    (10)
Step 3: The dynamic range p D R of each block B ( 𝓈 , 𝓉 ) is calculated by
p m a x = max { B ( 𝓈 , 𝓉 ) } = max { O I ( 𝓈 : 𝓈 + 1 , 𝓉 : 𝓉 + 1 ) } ,
p m i n = min { B ( 𝓈 , 𝓉 ) } = min { O I ( 𝓈 : 𝓈 + 1 , 𝓉 : 𝓉 + 1 ) } ,    (11)
p D R = p m a x p m i n .  
If   p D R > T ,   B ( 𝓈 , 𝓉 ) is a complex block; else, it is a smooth block.

3.1. Data Embedding Stage

After determining the type of all blocks, all the blocks B ( 𝓈 , 𝓉 ) , 1 < 𝓈 < ( 1 ) ,   1 < 𝓉 < ( N 1 ) are processed in the raster scan order. When the block B ( 𝓈 , 𝓉 ) is to be processed, its corresponding upsampled vacated block ( 2 𝓈 1 : 2 𝓈 + 1 , 2 𝓉 1 : 2 𝓉 + 1 ) serves as the current processing unit. Depending on the block type of ( 𝓈 , 𝓉 ) , two different data embedding processes for complex blocks and smooth blocks are presented as follows.

3.1.1. Data Embedding for Complex Blocks

For complex pixel blocks, the dynamic range of pixel values within the block is relatively large. The data hiding strategy is to embed EPR by filling DIM. To maximize the payload, an interpolated pixel value that is closer to the minimum pixel value of its neighbors is helpful. The MN interpolation method and DIM embedding method proposed by Mandal et al. [20] in 2020 is a successful one. We adopt MN interpolation and DIM embedding, in their first embedding phase, as the embedding method for the complex blocks in our scheme. For the convenience of interpretation, we change the dummy variables in the vacated pixel block ( 2 𝓈 1 : 2 𝓈 + 1 , 2 𝓉 1 : 2 𝓉 + 1 ) into ( : + 2 , 𝒽 : 𝒽 + 2 ) . The data embedding process for complex blocks is given in Algorithm 2.
Algorithm 2 Data Embedding for Complex Blocks
Input: Cover block ( : + 2 , 𝒽 : 𝒽 + 2 ) , secret data S , maximum payload n m a x .
Output:Marked block ^ ( : + 2 , 𝒽 : 𝒽 + 2 ) .
Step 1:Calculate the interpolated pixel values by
p m i n = min { ( : + 2 , 𝒽 : 𝒽 + 2 ) } ,
( , 𝒽 + 1 ) = ( 2 × p m i n + ( ( , 𝒽 ) + ( , 𝒽 + 2 ) ) / 2 ) / 3 ,
( + 1 , 𝒽 ) = ( 2 × p m i n + ( ( , 𝒽 ) + ( + 2 , 𝒽 ) ) / 2 ) / 3 ,    (12)
( + 1 , 𝒽 + 1 ) = ( p m i n + ( + 1 , 𝒽 ) + ( , 𝒽 + 1 ) ) / 3 .
Step 2:Calculate the difference values by
p m a x = max { ( : + 2 , 𝒽 : 𝒽 + 2 ) } , 𝒹 1 = p m a x ( , 𝒽 + 1 ) ,
𝒹 2 = p m a x ( + 1 , 𝒽 ) , 𝒹 3 = p m a x ( + 1 , 𝒽 + 1 ) .    (13)
Step 3:Calculate the payload for each interpolated pixel by
n r = min ( log 2   𝒹 r , n m a x ) , r = 1 , 2 , 3 .    (14)
Step 4:Retrieve n 1 ,   n 2 , and n 3 secret bits from S and convert to decimal values s 1 ,   s 2 , and s 3 . Then, add to the interpolated pixel values as
^ ( , 𝒽 + 1 ) = ( , 𝒽 + 1 ) + s 1 ,
^ ( + 1 , 𝒽 ) = ( + 1 , 𝒽 ) + s 2 ,    (15)
^ ( + 1 , 𝒽 + 1 ) = ( + 1 , 𝒽 + 1 ) + s 3 .
As shown in Figure 6, we give an example to illustrate the interpolation and the DIM data hiding strategy of our scheme for a complex block. Three interpolated pixel values ( 1 , 2 ) = 69 , ( 2 , 1 ) = 70 , and ( 2 , 2 ) = 69 are calculated using MN interpolation. Then, the payloads for each interpolated pixel are calculated. According to the payloads, the data s 1 = ( 101 ) 2 = 5 , s 2 = ( 111 ) 2 = 7 , and s 3 = ( 010 ) 2 = 2 are retrieved from the binary secret stream. Finally, the marked pixel values ^ ( 1 , 2 ) = 74 , ^ ( 2 , 1 ) = 77 and ^ ( 2 , 2 ) = 71 can be calculated.

3.1.2. Data Embedding for Smooth Blocks

For smooth pixel blocks, the dynamic range of pixel values in the block is relatively small. This characteristic provides a very good basis for PEH and DE embedding. Therefore, we design a completely different strategy for pixel value interpolation and data embedding of smooth blocks.
The proposed scheme uses the block mean (BM) as the interpolated pixel values for smooth blocks. Then, the data embedding procedure includes two layers, an ordered PEH (O-PEH) embedding and a DE embedding. For the O-PEH embedding, three interpolated pixels are embedded with secret data in a predefined order. The resulting pixel values are further grouped into two pairs and embedded with secret data using DE.
Since the interpolated pixel values are mutually equal, they are always embeddable, using O-PEH, in the first embedding layer. The resulting pixel values deviate by no more than 2; therefore, the expansion range of DE embedding is also very small. The overall embedding strategy can ensure a good payload and small distortion of the pixel values. The data embedding procedure for smooth blocks is summarized in Algorithm 3.
Algorithm 3 Data Embedding for Smooth Blocks
Input:Cover block ( : + 2 , 𝒽 : 𝒽 + 2 ) , secret data S .
Output:Stego block ^ ( : + 2 , 𝒽 : 𝒽 + 2 ) .
Step 1:Execute the BM interpolation by
B M = ( , 𝒽 ) + ( + 2 , 𝒽 ) + ( , 𝒽 + 2 ) + ( + 2 , 𝒽 + 2 ) 4 (16)
( , 𝒽 + 1 ) = ( + 1 , 𝒽 ) = ( + 1 , 𝒽 + 1 ) = B M .
Step 2:Embed layer 1:
Embed layer 1: Calculate PEs of the interpolated pixels in the order given by
P E 1 = ( + 1 , 𝒽 + 1 ) ( , 𝒽 + 1 ) ,
P E 2 = ( , 𝒽 + 1 ) ( + 1 , 𝒽 + 1 ) ,
P E 3 = ( + 1 , 𝒽 ) ( + 1 , 𝒽 + 1 ) .
(17)
 
Embed 1-bit of secret data b from S to the leading pixel in (16) by
= { + b ,     if   P E = 1 b ,     if   P E = 0 + 1 ,     if   P E > 1 1 ,     if   P E < 0 (18)
Step 3:Embed layer 2:
Apply DE to embed 1-bit of secret data from S according to the following processes
{ ( , 𝒽 + 1 ) , ( + 1 , 𝒽 + 1 ) } D E { ( , 𝒽 + 1 ) , ( + 1 , 𝒽 + 1 ) } ,
{ ( + 1 , 𝒽 ) , ( + 1 , 𝒽 + 1 ) } D E { ( + 1 , 𝒽 ) , ( + 1 , 𝒽 + 1 ) } .
(19)
Step 4:Record ( , 𝒽 + 1 ) , ( + 1 , 𝒽 ) , and ( + 1 , 𝒽 + 1 ) as ^ ( , 𝒽 + 1 ) , ^ ( + 1 , 𝒽 ) and ^ ( + 1 , 𝒽 + 1 ) , respectively.
As shown in Figure 7, we give an example to illustrate the BM interpolation and two-layer embedding strategy for smooth pixel blocks. The seed pixels are 73, 68, 75, and 78; and the secret data stream is assumed to be ‘10,110′. We first use the block mean as the interpolated pixel values ( 1 , 2 ) = ( 2 , 1 ) = ( 2 , 2 ) = 74 . Then, the proposed O-PEH is applied first. The secret data b 1 = 1 is embedded to ( 2 , 2 ) and it results in ( 2 , 2 ) = 73 . The next two secret bits b 2 = 0 and b 3 = 1 are then embedded to and ( 2 , 1 ) , and the resulting pixel values are ( 1 , 2 ) = 74 and ( 2 , 1 ) = 75 . In the second embedding layer, we first use ( 1 , 2 ) and ( 2 , 2 ) as a group for DE embedding and embed secret data b 4 = 1 , and ( 1 , 2 ) = 75 and ( 2 , 2 ) = 72 are obtained. Finally, ( 2 , 1 ) and ( 2 , 2 ) are used as a group for DE embedding and to embed secret data b 5 = 0 , and ( 2 , 1 ) = 76 and ( 2 , 2 ) = 70 are obtained.

3.2. Data Extraction Stage

After people receive a stego medical image, the stego medical image is first divided into pixel blocks sized 3 × 3 that overlap between rows and columns with a stride of 2 to ensure that the processing units are exactly the same as the embedding. Then, the dynamic range of pixel values for each block is calculated to classify the blocks into complex and smooth types. The data extraction algorithms for complex and smooth blocks are described in the following subsections. After extracting the secret data, the confidential image is downsampled to obtain the original medical image.

3.2.1. Data Extraction for Complex Pixel Blocks

For a complex pixel block, we first calculate the interpolated pixel values using the seed pixel values so that we can obtain the gap between each original interpolated pixel value and the maximum value. The payload for each interpolated pixel is therefore obtained. Then, we obtain our secret data by converting the difference between the confidential pixel value and the maximum value back to the binary secret bits with the length determined by its payload. The extraction procedure of complex blocks is summarized in Algorithm 4.
An example of data extraction for complex blocks is shown in Figure 8. The original interpolated pixel values ( 1 , 2 ) = 69 , ( 2 , 1 ) = 70 , and ( 2 , 2 ) = 69 are calculated first. Then, the difference values with respect to p m a x = 78 are calculated to determine the payloads. Finally, the difference between each stego pixel value and original interpolated value is calculated and converted to binary bits according to its payload as shown in the figure.
Algorithm 4 Data Extraction for Complex Blocks
Input: Stego block ^ ( : + 2 , 𝒽 : 𝒽 + 2 ) , maximum payload n m a x .
Output: Secret data S .
Step 1:Calculate the original interpolated pixel values by
( , 𝒽 + 1 ) = ( 2 × p m i n + ( ^ ( , 𝒽 ) + ^ ( , 𝒽 + 2 ) ) / 2 ) / 3 ,
( + 1 , 𝒽 ) = ( 2 × p m i n + ( ^ ( , 𝒽 ) + ^ ( + 2 , 𝒽 ) ) / 2 ) / 3 ,    (20)
( + 1 , 𝒽 + 1 ) = ( p m i n + ^ ( + 1 , 𝒽 ) + ^ ( , 𝒽 + 1 ) ) / 3 .
Step 2:Calculate the difference values by
Step 3: d 1 = p m a x ( , 𝒽 + 1 ) ,
d 2 = p m a x ( + 1 , 𝒽 ) ,   (21)
d 3 = p m a x ( + 1 , 𝒽 + 1 ) .
Calculate the payload of each interpolated pixel by
n r = min ( log 2 d r , n m a x ) ,   r = 1 , 2 , 3 .    (22)
Step 4:Calculate the difference values and restore secret bits according to n r .
s 1 = ^ ( , 𝒽 + 1 ) ( , 𝒽 + 1 ) ,
s 2 = ^ ( + 1 , 𝒽 ) ( + 1 , 𝒽 ) ,    (23)
s 3 = ^ ( + 1 , 𝒽 + 1 ) ( + 1 , 𝒽 + 1 ) .

3.2.2. Data Extraction for Smooth Pixel Blocks

For a smooth pixel block, the data extraction operation is executed according to the reverse embedding order of the pixel block. We first restore the secret bits hidden in the second layer. In this layer, the second pair of pixels is processed and then the first pair. Finally, the secret bits hidden in the first layer are also extracted in the reverse order of PEH (RO-PEH). Algorithm 5 summarizes the data extraction process of the smooth block.
Algorithm 5 Data Extraction for Smooth Blocks
Input:Stego block ^ ( : + 2 , 𝒽 : 𝒽 + 2 ) .
Output:Secret data S .
Extract layer 2:
Step 1:Apply RDE, (4), to extract secret data according to the following steps
{ ^ ( + 1 , 𝒽 ) , ^ ( + 1 , 𝒽 + 1 ) } R D E { ( + 1 , 𝒽 ) , ( + 1 , 𝒽 + 1 ) } ,
{ ^ ( , 𝒽 + 1 ) , ( + 1 , 𝒽 + 1 ) } R D E { ( , 𝒽 + 1 ) , ( + 1 , 𝒽 + 1 ) } .
(24)
Extract layer 1:
Step 2:Apply RPEH, Equations (7) and (8), to extract secret data according to the following steps
{ ( + 1 , 𝒽 ) , ( + 1 , 𝒽 + 1 ) } R P E H { ( + 1 , 𝒽 ) , ( + 1 , 𝒽 + 1 ) } ,
{ ( , 𝒽 + 1 ) , ( + 1 , 𝒽 + 1 ) } R P E H { ( , 𝒽 + 1 ) , ( + 1 , 𝒽 + 1 ) } ,
{ ( + 1 , 𝒽 + 1 ) , ( , 𝒽 + 1 ) } R P E H { ( + 1 , 𝒽 + 1 ) , ( , 𝒽 + 1 ) } .
(25)
An example of data extraction for smooth blocks is shown in Figure 9. In the extraction of the second layer, the stego pixel pair { ^ ( 2 , 1 ) = 76 ,   ^ ( 2 , 2 ) = 70 } is applied to extract b 5 = 0 and recover to { ( 2 , 1 ) = 75 , ( 2 , 2 ) = 72 } . Then, the pixel pair { ^ ( 1 , 2 ) = 75 , ( 2 , 2 ) = 72 } is applied to extract b 4 = 1 and recover to { ( 1 , 2 ) = 74 , ( 2 , 2 ) = 73 } . The extraction of the first layer is processed as follows. The prediction errors of pixel ( 2 , 1 ) = 75 and ( 1 , 2 ) = 74 with respect to ( 2 , 2 ) = 73 are calculated to extract b 3 = 1 , b 2 = 0 and recover to ( 2 , 1 ) = 74 , ( 1 , 2 ) = 74 . Finally, the prediction error of pixel ( 2 , 2 ) = 73 with respect to ( 1 , 2 ) = 74 is calculated to extract b 1 = 1 and recover to ( 2 , 2 ) = 74 .

3.3. Overflow and Underflow

In the process of embedding secret information, extreme pixel values may cause overflow or underflow problems. In the embedding process of a complex block, pixel values are always modified within the dynamic range of the seed pixel values. Therefore, there is no overflow/underflow problem.
The smooth pixel blocks of the block mean valued 0 and 255 are left unembedded to prevent overflow/underflow of the first-layer embedding while the smooth pixel blocks of the block mean valued within the ranges 1 to 3 and 253 to 254 are only processed with the first-layer embedding to prevent the overflow/underflow of the second-layer embedding.

4. Experimental Results and Discussion

Our proposed adaptive RDH scheme was implemented on the Windows PC operating system using MATLAB version R2017a. We first verified the feasibility of our proposed adaptive RDH scheme with nine standard grayscale test images sized 512 × 512 , and then tested it on the six medical images shown in Figure 10. We regarded the binary secret data S produced by a random number generator as the EPR to be embedded in the image. The threshold for block type classification was set to 5. The performance of the adaptive RDH scheme was evaluated with the peak signal to noise ratio (PSNR), the structural similarity (SSIM), and the embedding capability (EC). PSNR is a metric used to measure the visual quality of confidential images. Here, we adopted the PSNR definition in [2] as follows:
PSNR = 10 log 10 ( H × W × ( 255 ) 2 i = 1 H j = 1 W ( G i j G ^ i j ) 2 ) ,
where H × W is the size of the cover image, and G i j and G ^ i j denote the pixel values of the cover image and the stego-image, respectively. To know whether the confidential image is close to a natural image or not, we first downsample a test image to obtain the small image. Then, it is processed by the proposed scheme to obtain a confidential image. Finally, the PSNR value of the confidential image is measured according to the given test image. Through the experiments, if the PSNR value is larger than 30 dB, it means that the distortion caused by information embedding is not detectable by the human eye. Of course, the higher the PSNR value, the less distortion due to hidden data. By minimizing the alteration of the pixel values, confidential images with a high PSNR value can be obtained.
SSIM is also a metric used to evaluate the similarity between the original image and the stego-image, as shown in Equation (27):
SSIM = ( 2 μ x μ y + c 1 ) ( 2 σ x y + c 2 ) ( μ x 2 + μ y 2 + c 1 ) ( σ x 2 + σ y 2 + c 2 )
where μ x and μ y denote the mean of images x and y , respectively; σ x , σ y , σ x y denote the standard deviation and covariance of images x and y , respectively; and c 1 and c 2 are two constants to avoid division by zero. The SSIM metric takes into account both image luminance, contrast, and structure information, which is closer to the benchmark of the human visual system; the higher the SSIM value, the more similar the original image and the stego image are.
EC, measured in bits per pixel, is defined as the total amount of payload in bits divided by the total amount of pixels in the interpolated cover image.

4.1. Experimental Results for Standard Grayscale Images

Our proposed adaptive RDH scheme was compared with the interpolation-based RDH schemes, proposed by Mandal et al. [20] and Geetha et al. [21], using the standard grayscale images. The values of EC, PSNR, and SSIM for the compared schemes are listed in Table 1. Since the scheme proposed by Geetha et al. [21] uses LSB substitution, its embedding capability is a fixed value and the features of the pixel blocks are not taken into consideration. In comparison with [21], our scheme provides a better EC with a comparable SSIM. Although the PSNR value of our scheme is lower than that of [21], the distortion is imperceptible when its value is higher than 30 dB. Mandal et al.’s scheme [20] provides the highest EC among the three schemes; however, its PSNR and SSIM are the worst. Our proposed adaptive RDH scheme has a good balance between PSNR and EC by taking the block feature into consideration. Numerically, the PSNR values obtained by our proposed adaptive RDH scheme are all greater than 30 dB, which means that the difference between the confidential image obtained by the proposed scheme and the original test image is relatively small, and the confidential image looks like a natural one.

4.2. Experimental Results for Medical Images

Since the interpolation-based RDH schemes are designed for the special purpose of embedding patient information into medical images, the performance of our proposed adaptive RDH scheme on medical images is the main concern. Figure 11 shows the original image and its corresponding confidential image with 2 bpp secret data embedded, and images showing the difference between the original medical images and their confidential images. The difference images (aiii–fiii) in Figure 11 show almost nothing, which indicates that the proposed scheme does not look much different from the original image after hiding and will not draw the eavesdropper’s attention.
Table 2 shows the PSNR values of our proposed adaptive RDH scheme for the medical images in Figure 10, where the embedding rate ranges from 0.25 to 2 bpp. From the table, we can clearly see that PSNR of the proposed scheme reaches 53.3405 dB in a low embedding rate, which indicates that our proposed adaptive RDH scheme does not cause significant distortion to the images. In a high embedding rate, PSNR of our proposed adaptive RDH scheme is still more than 36 dB.
A comparison of the proposed scheme with related works is given in Table 3, where p and q represent the number of bits that can be embedded in edge pixels and non-edge pixels in [27], respectively, and k is the number of bits per embedding in [30]. From the table, we can find that our proposed adaptive RDH scheme significantly outperforms most of the related works in terms of both EC and PSNR, which means that our scheme can hide more biometric information while preserving a better visual quality than the others. For [19,26,29], our scheme wins over these schemes both in terms of EC and PSNR. In [27], when p = 4 , q = 3 , EC of [27] is similar to that of our proposed adaptive RDH scheme, but PSNR of [27] is worse than that of our proposed adaptive RDH scheme. When p = 4 , q = 4 , EC of [27] can reach 3 bpp and PSNR of the image is obviously much worse. While the proposed scheme is slightly inferior to [27] in terms of EC, we are able to maintain PSNR of the image at a relatively good level. In [30], when k = 2 , the scheme loses to the proposed scheme in both EC and PSNR. When k = 3 , although the proposed scheme is slightly inferior to [30] in terms of EC, the higher value of PSNR of our steganographic image makes the image carrying information less detectable during transmission.
The PSNR value with respect to the payload of three related schemes for the test images given in Figure 10 are plotted in Figure 12. As shown in the figures, our scheme maintains a superior visual quality under an equal payload. When the payload is larger than 1.5 bpp, the PSNR value of Geetha et al.’s scheme [21] degrades significantly.
The method published by Mandal et al. [20] treats all pixel blocks the same. When executing DE embedding in its second data hiding phase, the large pixel value differences cause the pixel values to be drastically modified, which significantly reduces the PSNR value of the stego image. In our scheme, the pixel blocks are classified into smooth and complex ones in advance. During data hiding, DE embedding of complex blocks is omitted, which effectively improves the PSNR value. For the smooth blocks, the block mean interpolation ensures a controllable difference value between interpolated pixels and DE can be safely executed without leading to significant distortion. The experimental data confirms the effectiveness of the proposed strategy. With this strategy, our scheme is not only able to achieve good visual quality scores on general grayscale images but is also able to embed more secret messages on medical images. The proposed scheme provides a high PSNR value at a low hiding volume. As the embedded volume increases, PSNR of the proposed scheme does not decrease drastically as in [21] but decreases smoothly.

5. Conclusions

A new interpolation-based RDH scheme was proposed for hiding patient biometric information in medical images. The pixel blocks were classified into complex and smooth ones. Different methods were applied to process the two different categories. For complex blocks, the dynamic range of pixel values were preserved during data embedding. For smooth blocks, two layers of an electronic patient record can be embedded with a slight distortion in the pixel values. Compared to [20], our adaptive scheme uses the same MN interpolation and DIM embedding to ensure a high payload for the image blocks with complex textures but removes the DE embedding part of [20], which causes high distortion for the complex blocks. For the smooth image blocks, MN interpolation and DIM embedding methods cannot provide a satisfactory payload, so we adopted BM interpolation and DE embedding to ensure a good payload while preserving low distortion. From the experimental results, we can conclude that our proposed adaptive scheme can embed a satisfactory amount of biometric information with the least degree of image distortion. Our proposed adaptive scheme was also compared with state-of-the-art schemes. The performance improvement confirms the excellence of our proposed adaptive scheme.
In the application of medical image management, when the embedding capacity is large enough, the extra space can be applied to embed electronic patient records. In the future, we will focus on designing an RDH scheme that combines the hiding of patient biometric information and electronic diagnosis records.

Author Contributions

Conceptualization and methodology, H.-X.C. and J.-H.H.; software, H.-X.C.; validation, H.-X.C., J.-H.H., C.-C.C. and Y.-H.L.; writing—original draft preparation, H.-X.C. and J.-H.H.; writing—review and editing, H.-X.C., J.-H.H. and C.-C.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chang, C.-C. Adversarial Learning for Invertible Steganography. IEEE Access 2020, 8, 198425–198435. [Google Scholar] [CrossRef]
  2. Chi, H.; Chang, C.-C.; Liu, Y. An SMVQ compressed data hiding scheme based on multiple linear regression prediction. Connect. Sci. 2020, 33, 495–514. [Google Scholar] [CrossRef]
  3. Chang, C.-C.; Li, C.-T.; Shi, Y.-Q. Privacy-Aware Reversible Watermarking in Cloud Computing Environments. IEEE Access 2018, 6, 70720–70733. [Google Scholar] [CrossRef]
  4. Hu, Y.; Lee, H.-K.; Li, J. DE-Based Reversible Data Hiding with Improved Overflow Location Map. IEEE Trans. Circuits Syst. Video Technol. 2008, 19, 250–260. [Google Scholar] [CrossRef]
  5. Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 890–896. [Google Scholar] [CrossRef] [Green Version]
  6. Coatrieux, G.; Le Guillou, C.; Cauvin, J.-M.; Roux, C. Reversible Watermarking for Knowledge Digest Embedding and Reliability Control in Medical Images. IEEE Trans. Inf. Technol. Biomed. 2008, 13, 158–165. [Google Scholar] [CrossRef]
  7. Liu, L.; Wang, A.; Chang, C.-C. Separable Reversible Data Hiding in Encrypted Images with High Capacity Based on Median-Edge Detector Prediction. IEEE Access 2020, 8, 29639–29647. [Google Scholar] [CrossRef]
  8. Chi, H.-X.; Horng, J.-H.; Chang, C.-C. Reversible Data Hiding Based on Pixel-Value-Ordering and Prediction-Error Triplet Expansion. Mathematics 2021, 9, 1703. [Google Scholar] [CrossRef]
  9. He, W.; Xiong, G.; Weng, S.; Cai, Z.; Wang, Y. Reversible data hiding using multi-pass pixel-value-ordering and pairwise prediction-error expansion. Inf. Sci. 2018, 467, 784–799. [Google Scholar] [CrossRef]
  10. Li, X.; Li, B.; Yang, B.; Zeng, T. General Framework to Histogram-Shifting-Based Reversible Data Hiding. IEEE Trans. Image Process. 2013, 22, 2181–2191. [Google Scholar] [CrossRef]
  11. Manohar, K.; Kieu, T.D. A centroid based vector quantization reversible data hiding technique. Multimedia Tools Appl. 2019, 78, 25273–25298. [Google Scholar] [CrossRef]
  12. Gao, K.; Horng, J.-H.; Chang, C.-C. A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix. IEEE Access 2020, 8, 174325–174341. [Google Scholar] [CrossRef]
  13. Bao, F.; Deng, R.; Ooi, B.; Yang, Y. Tailored Reversible Watermarking Schemes for Authentication of Electronic Clinical Atlas. IEEE Trans. Inf. Technol. Biomed. 2005, 9, 554–563. [Google Scholar] [CrossRef]
  14. Chang, C.C.; Chou, Y.C.; Kieu, T.D. An Information Hiding Scheme Using Sudoku. In Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control, Dalian, China, 18–20 June 2008; pp. 17–22. [Google Scholar]
  15. Das, S.; Muhammad, K.; Bakshi, S.; Mukherjee, I.; Sa, P.K.; Sangaiah, A.K.; Bruno, A. Lip biometric template security framework using spatial steganography. Pattern Recognit. Lett. 2018, 126, 102–110. [Google Scholar] [CrossRef]
  16. Abadi, M.; Danyali, H.; Helfroush, M.S. Reversible Watermarking Based on Interpolation Error Histogram Shifting. In Proceedings of the 2010 5th International Symposium on Telecommunications, Tehran, Iran, 4–6 December 2010; pp. 840–845. [Google Scholar] [CrossRef]
  17. Luo, L.; Chen, Z.; Chen, M.; Zeng, X.; Xiong, Z. Reversible Image Watermarking Using Interpolation Technique. IEEE Trans. Inf. Forensics Secur. 2009, 5, 187–193. [Google Scholar] [CrossRef]
  18. Jung, K.-H.; Yoo, K.-Y. Data hiding method using image interpolation. Comput. Stand. Interfaces 2009, 31, 465–470. [Google Scholar] [CrossRef]
  19. Lee, C.-F.; Huang, Y.-L. An efficient image interpolation increasing payload in reversible data hiding. Expert Syst. Appl. 2012, 39, 6712–6719. [Google Scholar] [CrossRef]
  20. Mandal, P.C.; Mukherjee, I.; Chatterji, B.N. High capacity reversible and secured data hiding in images using interpolation and difference expansion technique. Multimedia Tools Appl. 2020, 80, 3623–3644. [Google Scholar] [CrossRef]
  21. Geetha, R.; Geetha, S. Embedding electronic patient information in clinical images: An improved and efficient reversible data hiding technique. Multimedia Tools Appl. 2020, 79, 12869–12890. [Google Scholar] [CrossRef]
  22. Lu, T.-C. Interpolation-based hiding scheme using the modulus function and re-encoding strategy. Signal Process. 2018, 142, 244–259. [Google Scholar] [CrossRef]
  23. Shaik, A. High-capacity reversible data hiding using 2D parabolic interpolation. Multimedia Tools Appl. 2018, 78, 9717–9735. [Google Scholar] [CrossRef]
  24. Hu, J.; Li, T. Reversible steganography using extended image interpolation technique. Comput. Electr. Eng. 2015, 46, 447–455. [Google Scholar] [CrossRef]
  25. Lee, C.-F.; Weng, C.-Y.; Kao, C.-Y. Reversible data hiding using Lagrange interpolation for prediction-error expansion embedding. Soft Comput. 2018, 23, 9719–9731. [Google Scholar] [CrossRef]
  26. Mohammad, A.A.; Al-Haj, A.; Farfoura, M. An improved capacity data hiding technique based on image interpolation. Multimedia Tools Appl. 2018, 78, 7181–7205. [Google Scholar] [CrossRef]
  27. Loan, N.A.; Parah, S.A.; Sheikh, J.A.; Akhoon, J.A.; Bhat, G.M. Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications. J. Biomed. Informatics 2017, 73, 125–136. [Google Scholar] [CrossRef]
  28. Bhardwaj, R. Hiding patient information in medical images: An encrypted dual image reversible and secure patient data hiding algorithm for E-healthcare. Multimedia Tools Appl. 2021, 81, 1125–1152. [Google Scholar] [CrossRef]
  29. Jana, M.; Joardar, S.; Jana, B. A New Reversible Data Hiding Scheme by Altering Interpolated Pixels Exploiting Neighbor Mean Interpolation (NMI). In Computational Intelligence in Pattern Recognition; Springer: Singapore, 2022; pp. 393–402. [Google Scholar] [CrossRef]
  30. Jana, S.; Jana, B.; Lu, T.C.; Vo, T.N. Reversible data hiding scheme exploiting center folding with fuzzy weight strategy. J. Inf. Secur. Appl. 2022, 69, 103276. [Google Scholar] [CrossRef]
Figure 1. Illustration of data embedding and extraction based on histogram shifting; (a) Data embedding process; (b) Data extraction process.
Figure 1. Illustration of data embedding and extraction based on histogram shifting; (a) Data embedding process; (b) Data extraction process.
Sensors 22 07942 g001
Figure 2. An example of the MN interpolation and the data embedding with the DIM and DE methods.
Figure 2. An example of the MN interpolation and the data embedding with the DIM and DE methods.
Sensors 22 07942 g002
Figure 3. Image dividing, upsampling, and processing order of blocks; (a) Image dividing and processing order; (b) Processing order of upsampled image blocks.
Figure 3. Image dividing, upsampling, and processing order of blocks; (a) Image dividing and processing order; (b) Processing order of upsampled image blocks.
Sensors 22 07942 g003
Figure 4. An example of pixel block classification.
Figure 4. An example of pixel block classification.
Sensors 22 07942 g004
Figure 5. Flowcharts of the embedding and the extraction stages; (a) Flowchart of the embedding stage; (b) Flowchart of the extraction stage.
Figure 5. Flowcharts of the embedding and the extraction stages; (a) Flowchart of the embedding stage; (b) Flowchart of the extraction stage.
Sensors 22 07942 g005
Figure 6. Example of interpolation and data embedding for complex blocks.
Figure 6. Example of interpolation and data embedding for complex blocks.
Sensors 22 07942 g006
Figure 7. Example of interpolation and data embedding for smooth blocks.
Figure 7. Example of interpolation and data embedding for smooth blocks.
Sensors 22 07942 g007
Figure 8. Example of data extraction for complex blocks.
Figure 8. Example of data extraction for complex blocks.
Sensors 22 07942 g008
Figure 9. Example of data extraction for smooth blocks.
Figure 9. Example of data extraction for smooth blocks.
Sensors 22 07942 g009
Figure 10. Six medical test images; (a) Brain CT scan image (i); (b) Brain CT scan image (ii); (c) Thorax X-ray image (i); (d) Thorax X-ray image (ii); (e) Brain MRI scan image (i); (f) Brain MRI scan image (ii).
Figure 10. Six medical test images; (a) Brain CT scan image (i); (b) Brain CT scan image (ii); (c) Thorax X-ray image (i); (d) Thorax X-ray image (ii); (e) Brain MRI scan image (i); (f) Brain MRI scan image (ii).
Sensors 22 07942 g010
Figure 11. The original images, the confidential images, and the different images; (aifi) The cover images; (aiifii) The confidential images; (aiiifiii) The difference between the cover images and the confidential images.
Figure 11. The original images, the confidential images, and the different images; (aifi) The cover images; (aiifii) The confidential images; (aiiifiii) The difference between the cover images and the confidential images.
Sensors 22 07942 g011aSensors 22 07942 g011bSensors 22 07942 g011c
Figure 12. Comparison of PSNR on medical images; (a) Brain CT scan image (i); (b) Brain CT scan image (ii); (c) Thorax X-ray image (i); (d) Thorax X-ray image (ii); (e) Brain MRI scan image (i); (f) Brain MRI scan image (ii).
Figure 12. Comparison of PSNR on medical images; (a) Brain CT scan image (i); (b) Brain CT scan image (ii); (c) Thorax X-ray image (i); (d) Thorax X-ray image (ii); (e) Brain MRI scan image (i); (f) Brain MRI scan image (ii).
Sensors 22 07942 g012aSensors 22 07942 g012b
Table 1. Comparison of PSNR, SSIM and EC with related works.
Table 1. Comparison of PSNR, SSIM and EC with related works.
ImagesProposed Scheme[20][21]
ECPSNRSSIMECPSNRSSIMECPSNRSSIM
Airplane1.93 35.30 0.95 2.17 33.23 0.92 1.50 39.46 0.94
Baboon2.73 31.57 0.94 3.19 29.40 0.86 1.50 39.44 0.97
Boat2.30 33.68 0.94 2.70 31.65 0.86 1.50 39.43 0.95
Couple2.33 33.49 0.94 2.56 32.05 0.87 1.50 39.41 0.95
Elaine2.29 34.06 0.92 2.50 33.10 0.83 1.50 39.45 0.94
Goldhill2.32 33.56 0.93 2.72 31.62 0.84 1.50 39.43 0.95
Lena2.05 35.00 0.94 2.39 33.03 0.88 1.50 39.44 0.94
Man2.35 33.22 0.92 2.73 31.15 0.85 1.50 39.49 0.95
Peppers2.06 35.26 0.94 2.42 33.13 0.88 1.50 39.42 0.94
Table 2. PSNR for different EC values.
Table 2. PSNR for different EC values.
EC0.25 bpp0.50 bpp0.75 bpp1.00 bpp1.25 bpp1.50 bpp1.75 bpp2.00 bpp
Images 
CT (i)53.340544.095341.199739.426338.262438.276738.237638.2550
CT (ii)45.620842.520140.942539.786138.908838.141437.615537.5999
X-ray (i)47.091943.266440.994339.447638.172837.344237.225337.2143
X-ray (ii)52.855545.190342.080339.938939.069639.100239.101139.0826
MRI (i)46.062242.445240.645839.361838.047537.773737.760137.7896
MRI (ii)43.743541.015139.331638.118637.228636.714036.427336.3968
Table 3. Comparison of PSNR and EC with related works.
Table 3. Comparison of PSNR and EC with related works.
ImagesProposed[19][26][27] (p = 4, q = 3)[27] (p = 4, q = 4)[29][30] (k = 2)[30] (k = 3)
ECPSNRECPSNRECPSNRECPSNRECPSNRECPSNRECPSNRECPSNR
Airplane1.9335.301.3422.910.8727.372.3333.063.0030.851.526.471.4832.082.9531.92
Baboon2.7331.572.2720.491.7521.222.41 29.60 3.0028.581.525.55\\\\
Lena2.0535.001.3222.320.8630.242.33 34.40 3.0031.561.526.851.4833.452.9533.23
Peppers2.0635.261.2922.450.8528.042.3233.663.0031.17\\1.4831.002.2030.88
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Chi, H.-X.; Horng, J.-H.; Chang, C.-C.; Li, Y.-H. Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy. Sensors 2022, 22, 7942. https://doi.org/10.3390/s22207942

AMA Style

Chi H-X, Horng J-H, Chang C-C, Li Y-H. Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy. Sensors. 2022; 22(20):7942. https://doi.org/10.3390/s22207942

Chicago/Turabian Style

Chi, Heng-Xiao, Ji-Hwei Horng, Chin-Chen Chang, and Yung-Hui Li. 2022. "Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy" Sensors 22, no. 20: 7942. https://doi.org/10.3390/s22207942

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop