EPR-Stego: Quality-Preserving Steganographic Framework for Securing Electronic Patient Records
Abstract
Secure medical data transmission is a fundamental requirement in telemedicine, where information is often exchanged over public networks. Protecting patient confidentiality and ensuring data integrity are crucial, particularly when sensitive medical records are involved. Steganography, an information hiding technique, offers a promising solution by embedding confidential data within medical images. This approach not only safeguards privacy but also supports authentication processes, ensuring that patient information remains secure during transmission. This study introduces EPR-Stego, a novel steganographic framework designed specifically for embedding electronic patient record (EPR) data in medical images. The key innovation of EPR-Stego lies in its mathematical strategy to minimize pixel intensity differences between neighboring pixels. By reducing usable pixel variations, the framework generates a stego image that is visually indistinguishable from the original, thereby enhancing imperceptibility while preserving diagnostic quality. Additionally, the method produces a key table, required by the recipient to accurately extract the embedded data, which further strengthens security against unauthorized access. The design of EPR-Stego aims to prevent attackers from easily detecting the presence of hidden medical information, mitigating the risk of targeted breaches. Experimental evaluations demonstrate its effectiveness, with the proposed approach achieving Peak Signal to Noise Ratio (PSNR) values between 51.71 dB and 75.59 dB, and Structural Similarity Index Measure (SSIM) scores reaching up to 0.99. These metrics confirm that the stego images maintain high visual fidelity and diagnostic reliability. Overall, EPR-Stego outperforms several existing techniques, offering a robust and secure solution for medical data transmission. By combining imperceptibility, security, and quality preservation, the framework addresses the pressing need for reliable protection of patient information in telemedicine environments
Downloads
References
X. Hu, Z. Fu, X. Zhang, and Y. Chen, “Invisible and Steganalysis-Resistant Deep Image Hiding Based on One-Way Adversarial Invertible Networks,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 7, pp. 6128–6143, Jul. 2024, doi: 10.1109/TCSVT.2023.3348291.
S. Rahman, J. Uddin, M. Zakarya, H. Hussain, A. Khan, A. Ahmed, M. Haleem, “A Comprehensive Study of Digital Image Steganographic Techniques,” IEEE Access, vol. 11, pp. 6770–6791, 2023, doi: 10.1109/ACCESS.2023.3237393.
S. N. V. J. D. Kosuru, A. Pradhan, K. A. Basith, R. Sonar, and G. Swain, “Digital Image Steganography With Error Correction on Extracted Data,” IEEE Access, vol. 11, pp. 80945–80957, 2023, doi: 10.1109/ACCESS.2023.3300918.
A. Khan and A. Sarfaraz, “Exploring information hiding in images – problems and measures: a survey,” Multimed Tools Appl, Apr. 2025, doi: 10.1007/s11042-025-20850-x.
S. Debnath, R. K. Mohapatra, and R. Dash, “Secret data sharing through coverless video steganography based on bit plane segmentation,” Journal of Information Security and Applications, vol. 78, p. 103612, Nov. 2023, doi: 10.1016/j.jisa.2023.103612.
S. Debnath, R. K. Mohapatra, and R. Dash, “A robust secret data sharing through coverless video steganography based on average DC coefficient on bit plane segmentation,” Computers and Electrical Engineering, vol. 120, p. 109766, Dec. 2024, doi: 10.1016/j.compeleceng.2024.109766.
Y. Hu and R. Zhang, “Deep data hiding‐based channel state information feedback within audio signals,” Electron Lett, vol. 59, no. 13, Jul. 2023, doi: 10.1049/ell2.12854.
E. Akhtarkavan, B. Majidi, and A. Mandegari, “Secure Medical Image Communication Using Fragile Data Hiding Based on Discrete Wavelet Transform and A₅ Lattice Vector Quantization,” IEEE Access, vol. 11, pp. 9701–9715, 2023, doi: 10.1109/ACCESS.2023.3238575.
K. Kaushik and A. Bhardwaj, “Zero-width text steganography in cybercrime attacks,” Computer Fraud & Security, vol. 2021, no. 12, pp. 16–19, Dec. 2021, doi: 10.1016/S1361-3723(21)00130-5.
R. Gurunath and D. Samanta, “A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography,” Journal of Database Management, vol. 34, no. 2, pp. 1–22, Jun. 2023, doi: 10.4018/JDM.324076.
B. Sun, Y. Li, J. Zhang, H. Xu, X. Ma, and P. Xia, “Topic Controlled Steganography via Graph-to-Text Generation,” Computer Modeling in Engineering & Sciences, vol. 136, no. 1, pp. 157–176, 2023, doi: 10.32604/cmes.2023.025082.
Moh. M. Amrulloh, T. Ahmad, and N. J. De La Croix, “Analysis of the smoothing and payload distribution method on reversible audio steganography,” in 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), IEEE, Jul. 2023, pp. 1–5. doi: 10.1109/ICCCNT56998.2023.10307703.
Md. R. I. Rifat, Md. M. Rahman, Md. A. K. Nayon, M. S. Azad, and M. R. C. Mahdy, “QSAC: Quantum-assisted Secure Audio Communication using quantum entanglement, audio steganography, and classical encryption,” Engineering Science and Technology, an International Journal, vol. 70, p. 102167, Oct. 2025, doi: 10.1016/j.jestch.2025.102167.
J. Wang and K. Wang, “A novel audio steganography based on the segmentation of the foreground and background of audio,” Computers and Electrical Engineering, vol. 123, p. 110026, Apr. 2025, doi: 10.1016/j.compeleceng.2024.110026.
G. Swain and A. Pradhan, “Image Steganography Using Remainder Replacement, Adaptive QVD and QVC,” Wirel Pers Commun, vol. 123, no. 1, pp. 273–293, Mar. 2022, doi: 10.1007/s11277-021-09131-6.
Z. K. J. Jasim and S. Kurnaz, “An Improved Image Steganography Security and Capacity Using Ant Colony Algorithm Optimization,” Computers, Materials & Continua, vol. 80, no. 3, pp. 4643–4662, 2024, doi: 10.32604/cmc.2024.055195.
Y. Tang, M. Zhang, P. Lai, Y. Yue, and F. Di, “Fixed Neural Network Image Steganography Based on Secure Diffusion Models,” Computers, Materials & Continua, vol. 84, no. 3, pp. 5733–5750, 2025, doi: 10.32604/cmc.2025.064901.
R. Sonar and G. Swain, “Steganography based on quotient value differencing and pixel value correlation,” CAAI Trans Intell Technol, vol. 6, no. 4, pp. 504–519, Dec. 2021, doi: 10.1049/cit2.12050.
A. Pradhan, K. R. Sekhar, and G. Swain, “Image steganography using add-sub based QVD and side match,” in Digital Media Steganography, Elsevier, 2020, pp. 81–97. doi: 10.1016/B978-0-12-819438-6.00013-X.
H. Zarrabi, A. Emami, P. Khadivi, N. Karimi, and S. Samavi, “BlessMark: a blind diagnostically-lossless watermarking framework for medical applications based on deep neural networks,” Multimed Tools Appl, vol. 79, no. 31–32, pp. 22473–22495, Aug. 2020, doi: 10.1007/s11042-020-08698-9.
K. J. Devi, P. Singh, J. K. Dash, H. K. Thakkar, S. Tanwar, and A. Alabdulatif, “Secure transmission of medical images in multi-cloud e-healthcare applications using data hiding scheme,” Journal of Information Security and Applications, vol. 79, p. 103655, Dec. 2023, doi: 10.1016/j.jisa.2023.103655.
Rr. D. A. Anandha, N. J. de La Croix, and T. Ahmad, “A Steganographic Scheme to Protect Medical Data Using Radiological Images,” in 2023 IEEE 15th International Conference on Computational Intelligence and Communication Networks (CICN), IEEE, Dec. 2023, pp. 369–374. doi: 10.1109/CICN59264.2023.10402248.
A. Arham and N. Lestari, “Secure medical image watermarking based on reversible data hiding with Arnold’s cat map,” International Journal of Advances in Intelligent Informatics, vol. 9, no. 3, p. 445, Oct. 2023, doi: 10.26555/ijain.v9i3.1029.
M. A. Hameed, M. Hassaballah, R. Abdelazim, and A. K. Sahu, “A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement,” International Journal of Cognitive Computing in Engineering, vol. 5, pp. 379–397, 2024, doi: 10.1016/j.ijcce.2024.08.002.
W. He and Z. Cai, “Reversible Data Hiding Based on Dual Pairwise Prediction-Error Expansion,” IEEE Transactions on Image Processing, vol. 30, pp. 5045–5055, 2021, doi: 10.1109/TIP.2021.3078088.
W. He and Z. Cai, “Reversible Data Hiding Based on Dual Pairwise Prediction-Error Expansion,” IEEE Transactions on Image Processing, vol. 30, pp. 5045–5055, 2021, doi: 10.1109/TIP.2021.3078088.
R. Karakis, “MI-STEG: A Medical Image Steganalysis Framework Based on Ensemble Deep Learning,” Computers, Materials & Continua, vol. 74, no. 3, pp. 4649–4666, 2023, doi: 10.32604/cmc.2023.035881.
W. Ding, H. Zhang, R. Reulke, and Y. Wang, “Reversible image data hiding based on scalable difference expansion,” Pattern Recognit Lett, vol. 159, pp. 116–124, Jul. 2022, doi: 10.1016/j.patrec.2022.05.014.
M. A. Ahmad. M. Elloumi, A. H. Samak, A. M. Al-Sharafi, A. Alqazzaz, M. A. Kaid, C. Iliopoulus, “Hiding patients’ medical reports using an enhanced wavelet steganography algorithm in DICOM images,” Alexandria Engineering Journal, vol. 61, no. 12, pp. 10577–10592, Dec. 2022, doi: 10.1016/j.aej.2022.03.056.
F. Kahlessenane, A. Khaldi, R. Kafi, and S. Euschi, “A robust blind medical image watermarking approach for telemedicine applications,” Cluster Comput, vol. 24, no. 3, pp. 2069–2082, Sep. 2021, doi: 10.1007/s10586-020-03215-x.
H. S. Alshanbari, “Medical image watermarking for ownership & tamper detection,” Multimed Tools Appl, vol. 80, no. 11, pp. 16549–16564, May 2021, doi: 10.1007/s11042-020-08814-9.
B. Latreche, A. Merrad, A. Benziane, H. Naimi, and S. Saadi, “A robust dual-layer medical image watermarking scheme based on matrix factorization in the LWT domain for E-healthcare applications,” Multimed Tools Appl, vol. 84, no. 25, pp. 29883–29913, Oct. 2024, doi: 10.1007/s11042-024-20331-7.
E. E.-D. Hemdan, “An efficient and robust watermarking approach based on single value decompression, multi-level DWT, and wavelet fusion with scrambled medical images,” Multimed Tools Appl, vol. 80, no. 2, pp. 1749–1777, Jan. 2021, doi: 10.1007/s11042-020-09769-7.
A. Martín, A. Hernández, M. Alazab, J. Jung, and D. Camacho, “Evolving Generative Adversarial Networks to improve image steganography,” Expert Syst Appl, vol. 222, p. 119841, Jul. 2023, doi: 10.1016/j.eswa.2023.119841.
Y. Yao, J. Wang, Q. Chang, Y. Ren, and W. Meng, “High invisibility image steganography with wavelet transform and generative adversarial network,” Expert Syst Appl, vol. 249, p. 123540, Sep. 2024, doi: 10.1016/j.eswa.2024.123540.
S. Rustad, D. R. I. M. Setiadi, A. Syukur, and P. N. Andono, “Inverted LSB image steganography using adaptive pattern to improve imperceptibility,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 6, pp. 3559–3568, Jun. 2022, doi: 10.1016/j.jksuci.2020.12.017.
N. Khalil, A. Sarhan, and M. A. M. Alshewimy, “A secure image steganography based on LSB technique and 2D chaotic maps,” Computers and Electrical Engineering, vol. 119, p. 109566, Nov. 2024, doi: 10.1016/j.compeleceng.2024.109566.
R. Panigrahi and N. Padhy, “An effective steganographic technique for hiding the image data using the LSB technique,” Cyber Security and Applications, vol. 3, p. 100069, Dec. 2025, doi: 10.1016/j.csa.2024.100069.
M. Z. Ali, O. Riaz, H. M. Hasnain, W. Sharif, T. Ali, and G. S. Choi, “Elevating Image Steganography: A Fusion of MSB Matching and LSB Substitution for Enhanced Concealment Capabilities,” Computers, Materials & Continua, vol. 79, no. 2, pp. 2923–2943, 2024, doi: 10.32604/cmc.2024.049139.
J. Stankowski and A. Dziembowski, “IV-PSNR: Software for immersive video objective quality evaluation,” SoftwareX, vol. 24, p. 101592, Dec. 2023, doi: 10.1016/j.softx.2023.101592.
N. J. D. La Croix, T. Ahmad, and F. Han, “Enhancing Secret Data Detection Using Convolutional Neural Networks With Fuzzy Edge Detection,” IEEE Access, vol. 11, pp. 131001–131016, 2023, doi: 10.1109/ACCESS.2023.3334650.
Copyright (c) 2025 Wardatul Amalia Safitri, Hammuda Arsyad, Ntivuguruzwa Jean De La Croix, Tohari Ahmad, Jennifer Batamuliza, Ahmad Hoirul Basori

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlikel 4.0 International (CC BY-SA 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).


.png)
.png)
.png)
.png)
.png)