A Software Design and FPGA Implementation of Telemedicine Security System
A Software Design and FPGA Implementation of Telemedicine Security System
2023
Emad A. Elshazly
Engineering Department
Nuclear Research Center, Egyptian
Atomic Energy Authority
Cairo, Egypt.
[email protected]
Abstract—Secure data transfers in communication data. One of the most commonly accepted data hiding
applications for telemedicine play a significant role in approaches is image data hiding [2, 3].
security. In this paper, a secure telemedicine corneal data
concealment algorithm based on the pixel segmentation The two categories of data hiding strategies are transform
strategy (PSS) and generalized exploiting modification domain and spatial domain. One spatial domain strategy for
direction (GEMD) is presented. The suggested algorithm is concealing sensitive information in digital photographs is the
implemented using the Xilinx System Generator (XSG) and exploiting modification direction (EMD) algorithm. To
hardware/software co-simulation is carried out using the incorporate a significant payload and produce a satisfactory
Spartan 3E FPGA board, which offers the least embedding stego-image quality, various EMD algorithms are applied. In this
time and offers a quicker, programmable, and commercial paper, a method was put out to address the shortcomings of
hardware solution for secure communication. The proposed earlier data masking techniques. An embedding phase and an
approach can be applied in low-cost embedded system extraction phase make up the suggested approach. In each of
applications since it has high embedding speed and low them a block of pixels in the cover image is divided into two
computational complexity. The outcomes of the practical components during the hiding phase and extracting phase of the
tests of the suggested algorithm are the same as the proposed algorithm: the first component is the vector of
simulation results of the same algorithm. The suggested coordinate area (VCA) while the second component is the vector
algorithm has a high payload capacity while maintaining modification area (VMA). Each block's VCA vector is left
good stego-image quality in comparison to the earlier data
unaltered, while the VMA vector is adjusted.
concealment algorithms. The proposed algorithm presents a
practical results as the same as that of simulated results. The main contribution of this paper is to propose a more
secure data hiding and extracting algorithms based on PSS and
Keywords—Telemedicine Data Hiding, PSS, GEMD, GEMD scheme in telemedicine applications and also presented
FPGA and XSG. FPGA implementation based on XSG of the proposed
I. INTRODUCTION algorithms and compare the practical results with the simulation
results in previous work. The suggested algorithm distributes
Due to the significant advancements and quick growth in the the consequent VCA vector (which contains the VCA of each
realm of technology, the internet has emerged as the primary block pixel) uniformly according to "n" and indicates the virtual
medium for user-to-user data transmission, sharing, and adjustment on pseudorandom vectors in n-dimensions for
exchange. For private data transfer, secret data archiving, data carrying the secret data, where n = LVMA-1 and LVMA is the
alteration prevention, and access control systems for digital length of the consequent VMA vector [4–7]. The hidden
content distribution, telemedicine security is crucial. One of the information is taken out of the stego-image's pixels during the
algorithms used to secure data is data hiding. Digital extraction method. The embedding and extracting methods are
watermarking and steganography are its two basic methods [1]. created and implemented utilizing FPGA via XSG in this paper's
Digital watermarking is mostly used to safeguard electronic suggested telemedicine security system [8, 9]. The Spartan 3E
products' copyrights, but steganography is a technique for hidden FPGA board is used for the hardware/software co-simulation [3,
communication. Steganography's main objective is to covertly 10–12].
transmit data by hiding the information's existence within
another kind of media. Cover objects are the materials used to The rest of this paper is structured as follows: The proposed
conceal data. Stego-object refers to the cover and the concealed telemedicine corneal data hiding algorithm, based on PSS and
Authorized licensed use limited to: SRM University Amaravathi. Downloaded on November 04,2024 at 11:53:01 UTC from IEEE Xplore. Restrictions apply.
3rd IEEE International Conference on Electronic Engineering, Menoufia University, Egypt. ICEEM2023, 7-8 Oct. 2023
GEMD, is introduced in Section III. Section IV displays the VMA2, the VCA vector is made up of VCA1 and VCA2
FPGA implementation of the proposed hiding and extracting [7].
algorithms using XSG. Section V presents the FPGA H/W co-
simulation. Section VI presents the findings of actual
experiments and discussions. The conclusion is presented in
section VII.
II. LITERATURE SURVEY
On the basis of EMD algorithms, several image information
concealing algorithms have been created. Based on the original
EMD technique, Zhang et al. presented an information
concealing approach [4]. When utilizing this method to hide
information in digital images, where, each block of "n" pixels in
the original image carries a secret number in the (2n+1)-ary
notational system. By utilizing the relationship between "n"
neighboring pixels of the cover image, the EMD method
embeds hidden data. Each block affects just one of the two Fig. 1. The proposed telemedicine data hiding and extracting algorithms
adjacent pixels it contains when there are two adjacent pixels in (a) Hiding Phase, and (b) Extracting Phase.
a block, either by deleting 1, adding 1, or keeping the pixel
unaltered. From a geographical perspective, there are five
possible outcomes in this scenario: travelling downward,
upward, left, right, or not moving at all. The EMD approach
maintains acceptable stego-image quality while increasing the
capacity of secret data [5]. An improved exploiting modification
direction (IEMD) technique was put out by Lee et al. [6]. The
embedding capacity of this approach is 1.5 times higher than that
of the EMD algorithm. More details about the EMD working
principles can be found in [6]. Fig. 2. The PSS working principles.
By suggesting an information hiding method based on a B. The GEMD Telemedicine Data Hiding Algorithm
vector of coordinates and a strategy of pixel segmentation, they
More details about the GEMD working principles can be
also improve the EMD's ability to store secret data. The Vector
found in [6]. If the MSBs rather than the LSBs are changed, the
Modification Area (VMA) space was discovered to be
distortion of the cover image increases significantly.
insufficient, and the transmitter and receiver had to exchange
Additionally, it is much simpler to identify the MSBs that have
variable codes before they could continue to interact. The
been modified. As a result, only the LVMA LSBs dispersed over
GEMD approach was published by Kuo et al. where each (n+1)-
the VMA of the specified pair of original pixels are potentially
bit block of the binary secret data stream is hidden in "n"
changed in the suggested method. The function of extraction
consecutive pixels block of the cover image according to the
f(g1, g 2, …, g n) is [6]:
basic GEMD technique; each pixel may have 1 added to it,
deleted from it, or kept unchanged [6].
n
III. THE PROPOSED TELEMEDICINE DATA HIDING AND f GEMD ( g1 , g 2 ,...., g n ) = g i . (2 i − 1) mod( 2 n +1 ) (1)
i =1
EXTRACTING ALGORITHM
Lee et al.’s information hiding algorithm improved the The suggested embedding algorithm's steps are outlined as
capacity of secret information to be hidden using original EMD follows:
and PSS. Since both the transmitter and the receiver must Inputs Ic, the telemedicine original image and S, the
initially have the same code table, this technique does not have
secret information stream
enough room for utilization. Telemedicine information hiding
Outputs Is, the stego-image
algorithm based on PSS and GEMD data hiding method is
proposed in order to remove these drawbacks. Figure (1) shows Step 1: Determine the values of VMA and VCA for each
the proposed telemedicine data hiding and extracting pair of pixels (p1, p2) in the telemedicine original
algorithms. The proposed algorithm is performed practically image, and determine the length of VMA vector
using Xilinx system generator. LVMA.
Step 2: Calculate "n", where n = LVMA - 1.
A. Pixel Segmentation Strategy
Step 3: Create the (g1, g2,..., gn) generating vectors by
In PSS, a pair of telemedicine cover image pixels are allocating the VCA vector according to "n".
used to incorporate hidden data. Figure (2) illustrates the Step 4: Use Equation (1) to calculate the embedding
PSS working principles, where each pair of grayscale function t = f(g1, g2,..., gn).
pixels can be divided into four segments. These segments Step 5: Estimate the value of d = s – t.
are labeled VCA1, VMA1, VCA2, and VMA2, respectively.
The MSBs of the first and second pixels, respectively, of Step 6: Covert "d" into binary and before filling out the
the telemedicine original image are represented by VCA1 VMA.
and VCA2. The LSBs of the first pixel and the second pixel Step 7: Put the blocks back in their proper positions to
of the cover image respectively, are represented by VMA1 reassemble the telemedicine stego 2-pixels (p′1,
and VMA2. The VMA vector is made up of VMA1 and p′2).
Authorized licensed use limited to: SRM University Amaravathi. Downloaded on November 04,2024 at 11:53:01 UTC from IEEE Xplore. Restrictions apply.
3rd IEEE International Conference on Electronic Engineering, Menoufia University, Egypt. ICEEM2023, 7-8 Oct. 2023
C. The GEMD Telemedicine Data Extracting Algorithm strategy and GEMD embedding and extracting methods is
By following the directions in the extracting method, implemented using XSG blocksets [10].
the secret data concealed in the cover image can be
retrieved from the telemedicine stego-image. As with the
embedding technique, the extraction procedure must divide
a given pair of stego-pixels into the VMA and VCA [6].
Fig. 3. Design flow of hardware implementation of the suggested
n technique.
f GEMD ( g , g 2 ,...., g n ) = g 'i . (2 i − 1) mod( 2 n +1 )
'
1
' '
(2)
i=1 A. The pre-processing stage
The suggested extracting algorithm's steps are outlined as In the instance of the suggested telemedicine data
follows: hiding approach, the pre-processing phase is carried out
using MATLAB, which supplies the inputs to the Xilinx
Inputs Is, telemedicine stego-image blocks as a particular vector array suited for FPGA
Outputs S, stream of secret data bitstream compilation as follow:
Step 1: The telemedicine stego-image's block (p'1, p'2) • Convert a 2-D image to a 1-D one: This is done by
should be split into VMA and VCA sections for breaking a 2-D image down into a single vector of
each block. pixels. Two vectors are obtained; one with even
Step 2: Determine the length of VMA vector LVMA. indices and the other with odd indices are
Step 3: Calculate "n", where n = LVMA - 1. segregated from this single vector.
Step 4: Create "n" generating vectors, designated as (g1,
• Text: In this step, the text also is prepared in format
g2, … , gn), by allocating the VCA vector
where the Xilinx blocks can read it.
according to n.
Step 5: Estimate (g′1, g′2, … , g′n) using VMA, from (g1, While the pre-processing phase for the proposed
g2, … , gn) by follow the GEMD method and telemedicine extracting algorithm is also done using
Table (1). MATLAB, the same as in image pre-processing phase of
Step 6: Estimate and convert the secret information s = data hiding algorithm.
f(g′1, g′2, … , g′n) obtained from Eq. (2) into • Convert a 2-D image to a 1-D one: This is done by
binary. breaking a 2-D image down into a single array of
Step 7: To get the hidden secret data stream S, pixels. Two vectors are also obtained; one with
concatenate the secret data "s" that is hidden in even indices and the other with odd indices are
each block. segregated from this array.
TABLE I The Pixel adjusted quality according to "d" [8]. B. The proposed telemedicine data hiding and extracting
algorithms
The content in the VMA vector and VCA vector for
each pair of pixels of the original image determines how
the suggested telemedicine data concealment strategy is
implemented. The VMA vector is just 3 bits, while the
VCA vector of each pair of pixels in the suggested
algorithm is 13 bits. Figure (4) depicts the model-based
design for the suggested data hiding approach for the
aforementioned instance utilizing Xilinx blocksets.
The proposed telemedicine data hiding approach is
implemented in accordance with the length of bits in both
VMA and VCA coordinate vectors for each pair of pixels
IV. FPGA IMPLEMENTATION OF THE SUGGESTED DATA in cover image. In this instance, (VCA1, VMA1) = (7, 1)
HIDING AND EXTRACTING ALGORITHMS and (VCA2, VMA2) = (6, 2). Figure (4a) depicts the XSG
model-based design utilizing Xilinx blocksets to simulates
The implementation content of the suggested
the suggested data hiding steps in the proposed approach
telemedicine information hiding and extracting algorithms
for the aforementioned instance, while Figure (4b) presents
based on pixel segmentation strategy and GEMD
the construction of the subsystem in Figure (4a). Each step
embedding and extracting methods using Xilinx blocks
in the proposed hiding approach is implemented using
and Simulink blocks is investigated through three stages;
Xilinx blocksets.
the pre-processing stage, the proposed telemedicine
information hiding or extracting algorithm and the post- The model-based design of the suggested telemedicine
processing stage [10]. Figure (3) shows the design flow for data extracting algorithm is shown in Figure (5). Figure
the hardware implementation of the suggested (5a) presents the XSG model-based design utilizing Xilinx
telemedicine data hiding and extracting methods. blocksets to simulates the suggested data extracting steps
MATLAB software is used in the pre- and post-processing in the proposed extracting approach, while Figure (5b)
phase design, while the proposed telemedicine data hiding presents the construction of the subsystem in Figure (5a).
or extracting algorithms based on pixel segmentation Each step in the proposed approach is implemented using
Xilinx blocksets.
Authorized licensed use limited to: SRM University Amaravathi. Downloaded on November 04,2024 at 11:53:01 UTC from IEEE Xplore. Restrictions apply.
3rd IEEE International Conference on Electronic Engineering, Menoufia University, Egypt. ICEEM2023, 7-8 Oct. 2023
(5a)
(6a)
(6b)
Fig. 6. The hardware co-simulation for the proposed telemedicine data
hiding and extracting algorithms.
Authorized licensed use limited to: SRM University Amaravathi. Downloaded on November 04,2024 at 11:53:01 UTC from IEEE Xplore. Restrictions apply.
3rd IEEE International Conference on Electronic Engineering, Menoufia University, Egypt. ICEEM2023, 7-8 Oct. 2023
i =0 j =0
TABLE IV The hiding rate, MSE, PSNR and NCC of the proposed
algorithms.
Authorized licensed use limited to: SRM University Amaravathi. Downloaded on November 04,2024 at 11:53:01 UTC from IEEE Xplore. Restrictions apply.
3rd IEEE International Conference on Electronic Engineering, Menoufia University, Egypt. ICEEM2023, 7-8 Oct. 2023
Authorized licensed use limited to: SRM University Amaravathi. Downloaded on November 04,2024 at 11:53:01 UTC from IEEE Xplore. Restrictions apply.