Nowadays many medical images and patient's information are transferred between different parties to be reviewed and
evaluated by physicians who are geographically apart. Any illegal modification in this information during transmission may lead to
wrong assumptions and wrong diagnosis. Therefore, the security of medical images and patient's information has always been a
concern. In this research, we developed a new security system that combines cryptography and steganography techniques to provide
a secure distribution for both the medical images and patient's information to the other party over un-secure channel to protect it
against attackers. For cryptography we used our encryption algorithm MJEA (for Modified Jamal Encryption Algorithm); it is a
symmetric (64-bit) block encryption algorithm with (120-bit) key. For steganography we used a very simple algorithm that hides the
patient's information within the medical image by using bit-by-bit Xoring. The proposed system deals with the medical image and
patient's information as shares, the first share represents the medical image after it will be encrypted by using MJEA and the second
share represents all patient's information embedded in the medical image and encrypted by using MJEA. For more security, before
transmit the two shares they will be mixed together by using a scrambling algorithm. We adopted different simulation metrics for
evaluating the performance of the proposed system such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) and the
histogram distribution analysis. For this purpose, the proposed technique was applied on several gray scale medical images with
different sizes of patient's information. All experimental results proved the strength of the proposed system in securing both the
medical image and patient's information while transmission over unsecure channel. At the receiver side, the proposed system was
able to recover back the original medical image and the patient's information that was sent by the sender without any loss.
Published In:IJCSN Journal Volume 7, Issue 5
Date of Publication : October 2018
Pages : 289-303
Tables : 03
Dr. Jamal N. Bani Salameh :
was born in Irbed,
Jordan. He received the B.C degree in Electrical
Engineering from Mutah University, Jordan, in
1988, M.S. and Ph.D. degrees in Computer
Engineering from New Mexico State University,
U.S.A, in 2000 and 2005. Dr. Bani Salameh
became Associate Professor at the Department of
Computer Engineering of Mutah University in
2013 and has published widely in international
journals. He now works as Vice Dean of Faculty of Engineering at
Mutah University. His research interests are in the fields of wireless
computer networks, multicast routing, network security and
cryptography. Dr. Bani Salameh held a number of administrative
positions including Chairman of the IT Department, SUR College for
Applied Sciences, Oman, Sept. 2010 - Aug. 2011, Chairman of the
Computer Engineering Department, Mutah University, Jordan, Sept.
2015 - Sept. 2016.
Medical image, Patient's information, Data hiding, Telemedicine, Cryptography, Steganography
Medical information and medical images are often
closely related to patients' privacies which should be
kept secret and need to be protected while transmission
over unsecured channel for diagnosis in order to prevent
 M. Barni, F. Bartolini, "Data Hiding for Fighting
Piracy", IEEE Signal Processing Magazine, Vol. 21,
No. 2, 2004, pp. 28-39.
 V. Fotopoulos, M. Stavrinou, and A. Skodras,
"Medical Image Authentication and Self-Correction
Through an Adaptive Reversible Watermarking
Technique", in Proceedings of the 8th IEEE
International Conference on BioInformatics and
BioEngineering (BIBE'08), 2008, pp. 1-5.
 O. Pianykh, Digital Imaging and Communications in
Medicine (DICOM), Springer-Verlag, 2012.
 L. Kobayashi, S. Furuie, and P. Barreto, "Providing
Integrity and Authenticity in DICOM Images: A
novel Approach", IEEE Transactions on Information
Technology in Biomedicine, Vol. 13, Issue. 4, 2009,
 W. Stallings, Cryptography and Network Security:
Principles and Practice, Prentice Hall, 2013.
 G. Alvarez, S. Li, and L. Hemandez, "Analysis of
Security Problems in A medical Image Encryption
System", Computers in Biology and Medicine, Vol.
37, No. 3, 2007, pp. 424-427.
 U. Acharva, P. Bhat, S. Kumar, and L. Min,
"Transmission and Storage of Medical Images with
Patient Information", Computers in Biology and
Medicine, Vol. 33, No. 4, 2003, pp. 303-310.
 A. Mahmood, R. Dony, "Segmentation Based
Encryption Method for Medical Images", in
Proceedings of the 6th International Conference on
Internet Technology and Secured Transactions,
 F. Taleb, "A New Chaos Based Image Encryption
Scheme Using Chaotic Logistic Maps", in
Proceedings of the Multimedia Computing and
Systems 2014 International Conference (ICMCS),
2014, pp. 1222-1228.
 H. Chao, C. CM, S. Miaou, "A Data Hiding
Technique with Authentication, Integration, and
Confidentiality for Electronic Patient Records", IEEE
Transactions on Information Technology in
Biomedicine, Vol. 6, No. 1, 2002, pp. 46-53.
 G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland, and
R. Collorec, "Relevance of Watermarking in Medical
Imaging", in: Proceeding of IEEE-EMBS Conference
on Information Technology Application in
Biomedicine, Arlington, 2000.
 C. Cruz, R. Reyes, J. Mendoza, M. Nakano, and H.
Perez, "A Novel Verification Scheme for
Watermarking Based Image Content Authentication
Systems", Telecommunications and Radio
Engineering, Vol. 67, No. 19, 2008, pp. 1777-1790.
 A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris,
"Multiple Image Watermarking Applied to Health
Information Management", IEEE Transactions on
Information Technology in Biomedicine, Vol. 10,
No. 4, 2006, pp. 722-732.
 D. Nilanjan, P. Moumita , D. Achintya, "A Session
Based Blind Watermarking Technique Within the
NROI of Retinal Fundus Images for Authentication
Using DWT, Spread Spectrum and Harris Corner
Detection", International Journal of Modern
Engineering Research, Vol. 2, Issue. 3, 2010, pp.
 M. Soliman, A. Hassanien, N. Ghali, and H. Onsi,
"An Adaptive Watermarking Approach for Medical
Imaging Using Swarm Intelligent", International
Journal of Smart Home, Vol. 6, No. 1, 2012, pp. 37-
 X. Zhou and H. Huang, "Authenticity and Integrity of
Digital Mammography Images", IEEE Transactions
on Medical Imaging, Vol. 20, No. 8, 2001, pp. 784-
 M. E. Whitman, H. J. Mattord, Principles of
Information Security, Fourth Edition, Course
 P. Hall, Modern Cryptography: Theory and Practice,
Hewlett-Packard Company, 2003.
 M. Juneja , P. Sandhu, "Designing of Robust Image
Steganography Technique Based on LSB Insertion
and Encryption", in Proceedings of the International
Conference on Advances in Recent Technologies in
Communication and Computing, 2009, pp. 302-305.
 K. Joshi, R. Yadav, "A New LSB-S Image
Steganography Method Blend with Cryptography for
Secret Communication", in Proceedings of the Third
International Conference on Image Information,
2015, pp. 86-90.
 Y. Renaer, Z. Zhiwei, T. Shun, D. Shilei, "Image
Steganography Combined with DES Encryption Preprocessing",
in Proceedings of the Sixth International
Conference on Measuring Technology and
Mechatronics Automation, 2014, pp. 323-326.
 S. Ushll, G. Kumal, K. Boopathybagan, "A Secure
Triple Level Encryption Method Using Cryptography
and Steganography", in Proceedings of the
International Conference on Computer Science And
Network Technology, 2011, pp. 1017-1020.
 G. S. Charan, N. Kumar, B. Karthikeyan, V.
Yanathan and K. Lakshmi, "A Novel LSB Based
Image Steganography with Multi-Level Encryption",
International Conference on Innovations in
Information, Embedded and Communication Systems
(ICIIECS), Coimbatore, India, 19-20 March 2015.
 S. Laskar, K. Hemachandran, "High Capacity Data
Hiding Using LSB Steganography and Encryption",
International Journal of Database Management
Systems, Vol. 4, No. 6, 2012, pp. 57-62.
 W. Al-qwider, J. Bani Salameh, "A Novel Technique
for Securing Data Communication Systems by Using
Cryptography and Steganography", Jordanian Journal
of Computers and Information Technology (JJCIT),
Vol. 3, No. 2, 2017, pp. 110-130.  X. Zhang, "Reversible data hiding in encrypted
image", IEEE Signal Processing Letters, Vol. 18, No.
4, 2011, pp. 255-258.
 W. Hong, T. Chen, and H. Wu, "An Improved
Reversible Data Hiding in Encrypted Images Using
Side Match", IEEE Signal Processing Letters, Vol.
19, No. 4, 2011, 2012, pp. 199-202.
 A. Lavanya and V. Natarajan, "Watermarking Patient
Data in Encrypted Medical Images", in Proceedings
of the Sadhana-Academy in Engineering
Sciences,2012, Vol. 37, pp. 723-729.
 X. Zhang, "Separable Reversible Data Hiding in
Encrypted Image", IEEE Transactions on Information
Forensics and Security, Vol. 7, No. 2, 2012, pp. 826-
 D. Bouslimi, G. Coatrieux, M. Cozic, and C. Roux,
"A Joint Encryption /Watermarking System for
Verifying the Reliability of Medical Images", IEEE
Transactions on Information Technology in
Biomedicine, Vol. 16, 2012, pp. 891-899.
 S. Zhang, G. Tiegang, and L. Gao, "A Novel
Encryption Frame for Medical Image with
Watermark Based on Hyperchaotic System",
Mathematical Problems in Engineering, Vol. 11,
 W. Puech, "An Efficient Hybrid Method for Safe
Transfer of Medical Images", in Proceedings of the
2nd International Conference: E-Medical Systems,
2008, PP. 29-31.
 A. Umamageswari, U. Ferni, and G. Suresh, "A
Survey on Security in Medical Image
Communication", International Journal of Computer
Applications, Vol. 30, No.3, 2011.
 D. Bouslimi, and G. Coatrieux, "A joint
Watermarking/Encryption Algorithm for Verifying
Medical Image Integrity and Authenticity in Both
Encrypted and Spatial Domains", in Proceedings of
the 33th Annual International Conference of the
IEEE- EMBS, Massachusetts USA, 2011.
 P. Viswanathan and P. Krishna, "Randomized
Cryptographic Fusion Watermarking Medical Image
with Reversible Property", International Journal of
Computer Information Systems, Vol. 2, 2011.
 J. Bani Salameh, "A New Symmetric-Key Block
Ciphering Algorithm", Middle-East Journal of
Scientific Research (MEJSR), Vol. 12, No. 5, 2012,
 J. Bani Salameh, "An Investigation of the Use of
MJEA in Image Encryption", WSEAS Transactions
on Computers, Vol. 15, 2016, pp. 12-23.
All rights reserverd @ IJCSN International Journal www.IJCSN.org