Measuring Fidelity of Steganography Approach in Securing Clinical Data Sharing Platform using Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Measure (SSIM)
Abstract
In the vast digital landscape, the practice of data hiding finds multifaceted applications, ranging from simple hobbyist endeavors to critical tasks like safeguarding user privacy and ensuring covert data transmission. One of the gaping vulnerabilities in many contemporary systems is the transparency with which information is stored, making it easily interpretable. Such clear visibility can be a gateway for potential leaks, false portrayals, or even be manipulated for various malevolent intents. Consequently, as a countermeasure, steganography emerges at the forefront, extensively being resourceful in the revolutionized data storage concept, the cloud technology. Unfortunately, most earlier image steganography methods could only conceal one type of file, audio, text, image within an image, rendering them monodynamic. This study focuses on the novel application of steganography towards embedding information across multiple images to facilitate security of clinical data sharing platform as opposed to traditional single-image methods. The implementation was carried out using Ruby on Rails architecture, leveraging the ChunkyPNG library. With the analyses of image texture features, adaptive payload distribution strategies were devised and compared with the established single-image steganographic techniques. Interestingly, our findings show employing strategies based on texture complexity and distortion distribution greatly enhances security, making it more resilient to modern pooled steganalysis. The exceptionally high PSNR values consistently above 90dB, coupled with SSIM values nearing 1, collectively underscore the near-identical nature of our original and stego images. This convergence of both metrics emphasizes the effectiveness of our steganographic methods, suggesting minimal distortions and high fidelity. Such compelling outcomes not only validate the methodology employed but also accentuate its potential for applications demanding subtle data concealment. In essence, the combined insights from PSNR and SSIM robustly affirm the project's success in achieving high-quality steganographic results.DOI:
https://doi.org/10.31449/inf.v49i11.5661Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







