| Literature DB >> 33519293 |
A H Mohsin1,2, A A Zaidan1, B B Zaidan1, K I Mohammed1, O S Albahri1, A S Albahri1,3, M A Alsalem1.
Abstract
Secure updating and sharing for large amounts of healthcare information (such as medical data on coronavirus disease 2019 [COVID-19]) in efficient and secure transmission are important but challenging in communication channels amongst hospitals. In particular, in addressing the above challenges, two issues are faced, namely, those related to confidentiality and integrity of their health data and to network failure that may cause concerns about data availability. To the authors' knowledge, no study provides secure updating and sharing solution for large amounts of healthcare information in communication channels amongst hospitals. Therefore, this study proposes and discusses a novel steganography-based blockchain method in the spatial domain as a solution. The novelty of the proposed method is the removal and addition of new particles in the particle swarm optimisation (PSO) algorithm. In addition, hash function can hide secret medical COVID-19 data in hospital databases whilst providing confidentiality with high embedding capacity and high image quality. Moreover, stego images with hash data and blockchain technology are used in updating and sharing medical COVID-19 data between hospitals in the network to improve the level of confidentiality and protect the integrity of medical COVID-19 data in grey-scale images, achieve data availability if any connection failure occurs in a single point of the network and eliminate the central point (third party) in the network during transmission. The proposed method is discussed in three stages. Firstly, the pre-hiding stage estimates the embedding capacity of each host image. Secondly, the secret COVID-19 data hiding stage uses PSO algorithm and hash function. Thirdly, the transmission stage transfers the stego images based on blockchain technology and updates all nodes (hospitals) in the network. As proof of concept for the case study, the authors adopted the latest COVID-19 research published in the Computer Methods and Programs in Biomedicine journal, which presents a rescue framework within hospitals for the storage and transfusion of the best convalescent plasma to the most critical patients with COVID-19 on the basis of biological requirements. The validation and evaluation of the proposed method are discussed.Entities:
Keywords: Availability; Blockchain; COVID-19; High capacity; Integrity; Medical data; Particle swarm optimisation; Spatial domain; Steganography
Year: 2021 PMID: 33519293 PMCID: PMC7821848 DOI: 10.1007/s11042-020-10284-y
Source DB: PubMed Journal: Multimed Tools Appl ISSN: 1380-7501 Impact factor: 2.757
Fig. 1Intelligence-integrated concept to identify the most appropriate CP for a corresponding prioritised patient with COVID-19 [19]
Fig. 2Decentralised hospital architecture for the storage and exchange of the information of patients with COVID-19
Fig. 3Sequential order of the new steganography method based on blockchain and PSO algorithm for COVID-19 data
Fig. 4Algorithm 1: Finding the best bit location in the host image for hiding medical COVID-19 data
Fig. 5Raster order
Fig. 6Two orders of pixel scanning. a Pixel scanning order 1. b Pixel scanning order 2
Particle definitions
| Particle name | Value range | Length | Description |
|---|---|---|---|
| Direction | 0 to 15 | 4 Bits | Direction of the host image pixel scanning. |
| X-offset | 0 to 225 | 8 Bits | X-offset of the starting point. |
| Y-offset | 0 to 225 | 8 Bits | Y-offset of the starting point. |
| Bit-planes | 0 to 15 | 4 Bits | Used LSBs for secret bit insertion. |
| X-side length | 0 to 225 | 8 Bits | Dimension of the window in the X-axis. |
| Y-side length | 0 to 225 | 8 Bits | Dimension of the window in the Y-axis. |
All possible cases of host image scanning
| Direction | Row | Column | Type | Argument |
|---|---|---|---|---|
| 0 | Top to bottom | Left to right | Triangle | Columns then rows |
| 1 | Top to bottom | Right to left | Triangle | Columns then rows |
| 2 | Bottom to top | Left to right | Triangle | Columns then rows |
| 3 | Bottom to top | Right to left | Triangle | Columns then rows |
| 4 | Top to bottom | Left to right | Square | Columns then rows |
| 5 | Top to bottom | Right to left | Square | Columns then rows |
| 6 | Bottom to top | Left to right | Square | Columns then rows |
| 7 | Bottom to top | Right to left | Square | Columns then rows |
| 8 | Top to bottom | Left to right | Triangle | Rows then columns |
| 9 | Top to bottom | Right to left | Triangle | Rows then columns |
| 10 | Bottom to top | Left to right | Triangle | Rows then columns |
| 11 | Bottom to top | Right to left | Triangle | Rows then columns |
| 12 | Top to bottom | Left to right | Square | Rows then columns |
| 13 | Top to bottom | Right to left | Square | Rows then columns |
| 14 | Bottom to top | Left to right | Square | Rows then columns |
| 15 | Bottom to top | Right to left | Square | Rows then columns |
Possible values of bit-plane particles
| Value | Description | Value | Description |
|---|---|---|---|
| 0000 | Use none of the LSB | 1000 | Use the fourth LSB |
| 0001 | Use the first LSB | 1001 | Use the first and fourth LSBs |
| 0010 | Use the second LSB | 1010 | Use the second and fourth LSBs |
| 0011 | Use the first and second LSBs | 1011 | Use the first, second and fourth LSBs |
| 0100 | Use the third LSB | 1100 | Use the third and fourth LSBs |
| 0101 | Use the first and third LSBs | 1101 | Use the first, third and fourth LSBs |
| 0110 | Use the second and third LSBs | 1110 | Use the second, third and fourth LSBs. |
| 0111 | Use the first, second and third LSBs | 1111 | Use the four LSBs |
Fig. 7Processing stages
Fig. 8Algorithm 2: LBS data COVID-19 hiding based on PSO algorithm and hash function
Fig. 9Dividing the secret COVID-19 data into blocks according to the host images’ embedding capacity
Particle definitions
| Particle name | Value range | Length | Description |
|---|---|---|---|
| SB-Pole | 0 to 1 | 1 Bit | Pole of secret bits. |
| SB-Dire | 0 to 1 | 1 Bit | Direction of secret bits. |
| BP-Dire | 0 to 1 | 1 Bit | Direction of bit planes. |
| Data block number | 0 to 225 | 8 Bits | Number of secret COVID-19 data blocks embedded in one host image. |
| Host image number | 0 to 225 | 8 Bits | Number of host image used for embedding one block of secret COVID-19 data. |
| Genesis image number | 0 to 225 | 8 Bits | Number of host image used for embedding the first block of secret COVID-19 data. |
| HC-SD | Any value | 256 | Hash of current block of secret COVID-19 data |
| HN-SD | Any value | 256 | Hash of next block of secret COVID-19 data |
| HL-SD | Any value | 256 | Hash of last block of secret COVID-19 data |
Possible values for SB-Pole, SB-Dire and BP-Dire particles
| Particle name | Value | Description |
|---|---|---|
| SB-Pole | 0 | In this case, the secret bits are unchanged. |
| 1 | In this case, the secret bits are changed to be opposite. | |
| SB-Dire | 0 | In this case, no change is made to the secret bits. |
| 1 | In this case, the secret bits are reversed from end to beginning. | |
| BP-Dire | 0 | In this case, bit-planes are used from most significant bit (MSB) to LSB. |
| 1 | In this case, bit-planes are used from LSB to MSB. |
Fig. 10Hiding secret medical COVID-19 data in host image
Fig. 11Storage and retrieval of stego images in the node database
Fig. 12Ledger for each node (hospital) in the network
Fig. 13Peer-to-peer transmission based on blockchain technology
Fig. 14Peer-to-peer architecture of COVID-19 data transmission based on blockchain technology
Fig. 15Flowchart of the secret image extraction process