Jaccard-based Random Distribution with Least and Most Significant Bit Hiding Methods for Highly Patients MRI Protected Privacy

Ali Jaber Tayh Albderi - University of AL-Qadisiyah, Iraq
Dhiah Al-Shammary - University of AL-Qadisiyah, Iraq
Lamjed Ben Said - University of Tunis, ISG, Tunisia


Citation Format:



DOI: http://dx.doi.org/10.30630/joiv.7.3-2.2385

Abstract


In this study, the main goal is to improve patient care by making it easier for patient data and pictures to be sent between medical centers without problems. Still, one of the biggest problems with telemedicine is keeping patient information private and ensuring data is safe. This is especially important because even small changes to patient information could have serious consequences, such as wrong evaluations and lower-quality care. This study develops a new model that uses the unique Jaccard distribution of the least significant bit (LSB) and the most significant bit (MSB) to solve this complex problem. The goal of this model is to hide much information about a patient in the background of an MRI cover picture. The careful creation of this model is a crucial part of the current study, as it will ensure a solid way to hide information securely. A more advanced method is also suggested, which involves randomly putting private text in different places on the cover picture. This plan is meant to strengthen security steps and keep private patient information secret. The peak signal-to-noise ratio (PSNR), the structural similarity index measure (SSIM), and the mean square error (MSE) all improved significantly when this method was tested in the real world. With these convincing results, the study shows telemedicine is more effective than traditional methods for keeping patient data safe. This proves that the model and method shown have the potential to greatly improve patient privacy and data accuracy in telemedicine systems, which would improve the general quality of health care.


Keywords


Jaccard; Random distribution; bit hiding method; MRI method; IT

Full Text:

PDF

References


Ahmad, M. A., Elloumi, M., Samak, A. H., Al-Sharafi, A. M., Alqazzaz, A., Kaid, M. A., & Iliopoulos, C. (2022). Hiding patients' medical reports using an enhanced wavelet steganography algorithm in DICOM images. Alexandria Engineering Journal, 61(12), 10577–10592. https://doi.org/10.1016/j.aej.2022.03.056

Ali, M. A., Hussin, N., Flayyih, H. H., Haddad, H., Al-Ramahi, N. M., Almubaydeen, T. H., Hussein, S. A., & Hasan Abunaila, A. S. (2023). A Multidimensional View of Intellectual Capital and Dynamic Innovative Performance. Journal of Risk and Financial Management, 16(3). https://doi.org/10.3390/jrfm16030139

Apriyansyah, Unik, M., & Mukhtar, H. (2020). Implementasi Sistem Keamanan Pesan Text Dengan Teknik Steganografi Menggunakan Metode Least Significant Bit ( LSB ). Jurnal Computer Science and Information Technology, 1(1), 8–12.

Baharav, T. Z., Kamath, G. M., Tse, D. N., & Shomorony, I. (2020). Spectral Jaccard Similarity: A New Approach to Estimating Pairwise Sequence Alignments. Patterns, 1(6), 100081. https://doi.org/10.1016/j.patter.2020.100081

Clark, K., Vendt, B., Smith, K., Freymann, J., Kirby, J., Koppel, P., Moore, S., Phillips, S., Maffitt, D., Pringle, M., Tarbox, L., & Prior, F. (2013). The cancer imaging archive (TCIA): Maintaining and operating a public information repository. Journal of Digital Imaging, 26(6), 1045–1057. https://doi.org/10.1007/s10278-013-9622-7

Elhadad, A., Ghareeb, A., & Abbas, S. (2021). A blind and high-capacity data hiding of DICOM medical images based on fuzzification concepts. Alexandria Engineering Journal, 60(2), 2471–2482. https://doi.org/10.1016/j.aej.2020.12.050

Gutub, A. A. A., & Alaseri, K. A. (2021). Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing. Journal of King Saud University - Computer and Information Sciences, 33(9), 1108–1120. https://doi.org/10.1016/j.jksuci.2019.06.014

Ibaida, A., Khalil, I., & Al-Shammary, D. (2010). Embedding patients confidential data in ECG signal for healthcare information systems. 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC'10, 3891–3894. https://doi.org/10.1109/IEMBS.2010.5627671

Kadhim, I. J., Premaratne, P., & Vial, P. J. (2020). Improved image steganography based on super-pixel and coefficient-plane-selection. Signal Processing, 171. https://doi.org/10.1016/j.sigpro.2020.107481

Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. (2019). Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing, 335, 299–326. https://doi.org/10.1016/j.neucom.2018.06.075

Kosub, S. (2019). A note on the triangle inequality for the Jaccard distance. Pattern Recognition Letters, 120, 36–38. https://doi.org/10.1016/j.patrec.2018.12.007

Liao, X., Yin, J., Guo, S., Li, X., & Sangaiah, A. K. (2018). Medical JPEG image steganography based on preserving inter-block dependencies. Computers and Electrical Engineering, 67, 320–329. https://doi.org/10.1016/j.compeleceng.2017.08.020

Lu, M., Qin, Z., Cao, Y., Liu, Z., & Wang, M. (2014). Scalable news recommendation using multi-dimensional similarity and Jaccard-Kmeans clustering. Journal of Systems and Software, 95, 242–251. https://doi.org/10.1016/j.jss.2014.04.046

T. Abd, Y. S. Mezaal, M. S. Shareef, S. K. Khaleel, H. H. Madhi, and S. F. Abdulkareem, "Iraqi e-government and cloud computing development based on unified citizen identification," Period. Eng. Nat. Sci., vol. 7, no. 4, pp. 1776–1793, 2019, doi: 10.21533/pen.v7i4.840.

U. Matthew, J. Kazaure, and N. Okafor, "Contemporary Development in E-Learning Education, Cloud Computing Technology & Internet of Things," EAI Endorsed Trans. Cloud Syst., vol. 7, no. 20, p. 169173, 2018, doi: 10.4108/eai.31-3-2021.169173.

A. M. Sayaf et al., "Factors Influencing University Students' Adoption of Digital Learning Technology in Teaching and Learning," Sustainability, vol. 2022, p. 493, 2022, [Online]. Available: https://doi.org/10.3390/su14010493.

I. Nanos, V. Manthou, and E. Androutsou, "Cloud Computing Adoption Decision in E-government," Springer Proc. Bus. Econ., pp. 125–145, 2019, doi: 10.1007/978-3-319-95666-4_9.

A.Surachman, “Analisis penerimaan sistem informasi perpustakaan (sipus) terpadu versi 3 di lingkungan universitas gadjah mada (ugm),†2008.

M. A. Almaiah and A. Al-Khasawneh, "Investigating the main determinants of mobile cloud computing adoption in university campus," Educ. Inf. Technol., vol. 25, no. 4, pp. 3087–3107, 2020, doi: 10.1007/s10639-020-10120-8.

K. K. Hiran and A. Henten, "An integrated TOE–DoI framework for cloud computing adoption in the higher education sector: case study of Sub-Saharan Africa, Ethiopia," Int. J. Syst. Assur. Eng. Manag., vol. 11, no. 2, pp. 441–449, 2020, doi: 10.1007/s13198-019-00872-z.

H. R. Kawulur, I. Subekti, M. M. Ibrahim, U. N. Manado, F. Condition, and S. C. Computing, "Perceived Usefulness, Perceived Ease of Use, Facilitating Condition, Social Influence, and Personal Innovativeness of Accounting Students Cloud Computing Adoption," vol. 05, no. 02, pp. 141–151, 2022.

S. Kumar, A. H. Al-badi, S. Madhumohan, and M. H. Al-kharusi, "Computers in Human Behavior Predicting motivators of cloud computing adoption : A developing country perspective," Comput. Human Behav., vol. 62, pp. 61–69, 2016, doi: 10.1016/j.chb.2016.03.073.

M. Kumar, V. Kumar, H. Glaude, C. De Lichy, A. Alok, and R. Gupta, "Protoda: Efficient Transfer Learning for Few-Shot Intent Classification," 2021 IEEE Spok. Lang. Technol. Work. SLT 2021 - Proc., pp. 966–972, 2021, doi: 10.1109/SLT48900.2021.9383495.

Y. Liu, B. Schiele, and Q. Sun, "An Ensemble of Epoch-Wise Empirical Bayes for Few-Shot Learning," Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 12361 LNCS, pp. 404–421, 2020, doi: 10.1007/978-3-030-58517-4_24.

C. Xie, M. Tan, B. Gong, J. Wang, A. L. Yuille, and Q. V. Le, "Adversarial examples improve image recognition," Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., pp. 816–825, 2020, doi: 10.1109/CVPR42600.2020.00090

T. Banerjee, N. R. Thurlapati, V. Pavithra, S. Mahalakshmi, D. Eledath, and V. Ramasubramanian, "Few-shot learning for frame-wise phoneme recognition: Adaptation of matching networks," Eur. Signal Process. Conf., vol. 2021-Augus, pp. 516–520, 2021, doi: 10.23919/EUSIPCO54536.2021.9616234.

T. Banerjee, N. R. Thurlapati, V. Pavithra, S. Mahalakshmi, D. Eledath, and V. Ramasubramanian, "Few-shot learning for frame-wise phoneme recognition: Adaptation of matching networks," Eur. Signal Process. Conf., vol. 2021-Augus, pp. 516–520, 2021, doi: 10.23919/EUSIPCO54536.2021.9616234.

R. Panthong and A. Srivihok, "Wrapper Feature Subset Selection for Dimension Reduction Based on Ensemble Learning Algorithm," Procedia Comput. Sci., vol. 72, pp. 162–169, 2015, doi: 10.1016/j.procs.2015.12.117.

S. Visalakshi and V. Radha, "A literature review of feature selection techniques and applications: Review of feature selection in data mining," 2014 IEEE Int. Conf. Comput. Intell. Comput. Res. IEEE ICCIC 2014, no. 1997, 2015, doi: 10.1109/ICCIC.2014.7238499.

Y. Wang, Y. Li, Y. Song, X. Rong, and S. Zhang, "Improvement of ID3 algorithm based on simplified information entropy and coordination degree," Algorithms, vol. 10, no. 4, pp. 1–18, 2017, doi: 10.3390/a10040124.

F. Harahap, A. Y. N. Harahap, E. Ekadiansyah, R. N. Sari, R. Adawiyah, and C. B. Harahap, "Implementation of Naïve Bayes Classification Method for Predicting Purchase," 2018 6th Int. Conf. Cyber IT Serv. Manag. CITSM 2018, no. Citsm, pp. 1–5, 2019, doi: 10.1109/CITSM.2018.8674324.