1 Introduction

The World Health Organisation first reported a novel coronavirus on December 31, 2019 [16]. The coronavirus disease 2019 (COVID-19) pandemic is the largest shock to the world in recent decades and has caused an extraordinary impact on human lives [17, 84]. Different countries have contributed varying technologies that can help medical and healthcare providers stop this pandemic [18, 93]. These contributions describe several of the major threats to individual and collective human health, as well as the values and recommendations that need consideration to counteract such threats in the future [83]. Sustainable health systems and social care need improvements to satisfy the current needs [3, 6, 11,12,13, 25, 42, 49, 50, 54, 80, 85, 88, 114, 115, 119]. Considerable healthcare data for COVID-19 are generated daily from medical institutions, hospitals and individuals to enhance the understanding of the disease whilst considering environment and lifestyle when conducting disease treatment. Moreover, integration between hospitals is necessary to help doctors in the rapid delivery of COVID-19 treatment [19]. This integration should ensure secure full-field communication channels amongst hospitals. For a clear view of how to support the security of health system in integrating hospitals with considerable healthcare data for COVID-19 communication channels, five sequential questions are raised and answered as follows.

  • First question: What is the main challenge and issues in this study?

Secure updating and sharing such large amounts of healthcare data in efficient and secure transmission are important but challenging. Potential contributors state that these issues have not been thoroughly investigated [32, 58]. In addition, challenges arise because more private health data of people with COVID-19 are collected and exchanged amongst hospitals and clinical laboratories. In particular, to settle the secure updating and sharing challenges, two issues are faced. Firstly, patients with COVID-19 and hospitals are becoming increasingly concerned about the integrity and confidentiality of their health data [28, 69]. Many state-of-the-art approaches focus on improving data providers’ responsibilities to detect data disclosure activities [30]. However, protecting the access to patient data and providing immediate notifications of data disclosure risks are urgently needed. Secondly, hundreds of health systems are in use today, but most of these systems adopt a centralised architecture that suffers from a single point of failure that may cause concerns for data availability. Systems have little or even no communication and cooperation in securing data of patients with COVID-19 [55]. Moreover, health providers are supposed to follow rules or laws (such as the Health Insurance Portability and Accountability Act of 1996 [31]). However, many laws still do not cover different entities that may have access to patient data and therefore should be accountable for their data operations, which also need auditing [43, 46].

  • Second question: ‘What are the recommended technologies for such challenges and their issues?’

Two technologies are recommended to address the updating and sharing challenges and their issues [65]. Firstly; steganography technology can be used to improve the confidentiality payload and robustness integrity of stenographic transactions in distributed hospitals. This technique can provide the confidentiality that represents high image quality, high embedding capacity and attack resistance [8, 20,21,22, 33, 36, 38,39,40, 47, 51, 56, 57, 62, 63, 71, 73,74,75,76,77,78,79, 81, 89, 90, 96, 100,101,102,103,104,105,106,107,108,109,110,111]. However, no study has yet focused on the integrity of secret data after retrieval from stego images and discovered tampering during data storage in the database. Therefore, essential improvements are needed for data protection regarding the data hiding method [122]. The channels used in conventional steganographic techniques are not secure and often result in privacy leakage on the part of the sender [4, 7, 9, 10, 29, 34, 41, 48, 72, 86, 98]. Therefore, hashes can be used to develop a new steganography method to achieve confidentiality and integrity during the transmissions between the communication channels. Secondly, blockchain technology can be used to maintain a continuous updating and sharing of all transactions across distributed hospital network for data-based decentralise communication, and to improve the level of confidentiality and maintain data availability despite network failure. That is, data availability is ensured regardless whether any single point of the network has a failure connection. Moreover, the central point (third party) in the network is eliminated during the transmission. In conclusion, the combination between the steganography and blockchain technology can ensure the updating and sharing of medical COVID-19 data with high level of security.

  • Third question: ‘What are the current scenarios for academic literature that attempt to use steganography based blockchain?’

Literature has limited attempts to use steganography based on blockchain but not on COVID-19 frameworks or other medical data. For instance, a security system to secure digital documents, such as smart contracts, is proposed by relying on steganographic encoder and decoder for hidden messages and use the quick response (QR) code for user document validation [70]. Initially, the user document is inserted and subjected to a validation using the QR code. Subsequently, nodes are formed and finally stored in the blockchain before the normalisation phase. Another study proposed a blockchain-based technique for data hiding to ensure the protection of digital video data privacy [122]. Group encoding and multi-field embedding are also proposed to improve the payload and robustness of the steganography transaction [29]. However, the blockchain comprises hashes as signatures to achieve video integrity and retrieve video information in the destination; the proposed blockchain-based data hiding technique showed no remarkable improvement in data protection. A patient verification framework based on steganography and blockchain technique using finger vein biometrics [66] is also proposed. However, data hiding was only used in the database and not during data transmission. Thus, a steganography-based blockchain technique and covert communication that ensure secure updating and sharing of the communication channel with high confidentiality payload, integrity and availability of data during network failure remains a requirement.

Given the above discussion, two important questions are raised: ‘What is the case study adopted as proof of concept that presents the medical COVID-19 data?’ and ‘What is the contribution and novelty of the present study?’ A complete solution is needed to overcome the challenges cited above.

As proof of concept that presents the medical COVID-19 data for the case study, we adopted a previous rescue framework [19] within a hospital for the storage and transfusion of the best convalescent plasma (CP) to the most critical patients with COVID-19 on the basis of biological requirements data. Figure 1 shows the framework.

Fig. 1
figure 1

Intelligence-integrated concept to identify the most appropriate CP for a corresponding prioritised patient with COVID-19 [19]

As shown in Fig. 1, the framework presented in [19] is adopted in one hospital. Firstly, ABO compatibility is achieved after classifying donors into the four blood types to indicate the suitability and safety of plasma for administration, and the list of tested CPs is refined using machine learning techniques. Secondly, patient prioritisation is carried out using a constructed patient decision matrix via a novel multi-criteria decision-making (MCDM) method called subjective and objective decision by opinion score method (SODOSM). MCDM is an extension of the decision theory that covers any multi-objective decision and solves numerous problems either for healthcare or other domains. A decision matrix is constructed on the basis of an intersection between the evaluation criteria used and rank/prioritise a set of alternatives based on the evaluation criteria [1, 2, 5, 14, 15, 23, 24, 26, 37, 45, 52, 59,60,61, 87, 120, 121, 123]. Then, patients with emergency cases are classified based on their blood type to be matched with the list of tested donor CPs, which are prioritised using the constructed CP decision matrix (refer to [19] for more details). At present, each hospital should adopt this framework and the process needs generalisation across all hospitals in one platform to help doctors accelerate treatments. Thus, sharing and updating patient and donor data [44, 64, 68] in secure communication channels of hospital networks are now necessary. The reason behind using this framework is its possible adoption amongst distributed hospitals in decentralised telemedicine based on recommended blockchain technology [19].

From the above points, the use of steganography-based blockchain can provide a complete solution for secure updating and sharing challenges with the integrity, availability, and confidentiality of patient and donor data when transactions between hospital nodes contain the information in stego images. This system can provide a secure communication channel for stegano-message delivery [82, 92] in two ways. (i) Channel security is ensured by using a distributed storage schema and an immutable chain of blocks. Thus, manipulating the communication history is virtually impossible. (ii) The blockchain network is a peer-to-peer network that does not require a third-party provider for message delivery to establish communication; hence, the network is not prone to any form of availability attack.

The main contribution of this study is a novel steganography-based blockchain method in the spatial domain. The novelty of the proposed method involves the removal and addition of new particles of the particle swarm optimisation (PSO) algorithm and hash function to hide secret medical COVID-19 data in hospital databases whilst providing confidentiality with high embedding capacity and high image quality. Moreover, stego images with hash data and blockchain technology are used in updating and sharing medical COVID-19 data between hospitals in the network, to improve the level of confidentiality and protect the integrity of medical COVID-19 data in grey-scale images, ensure data availability regardless whether any single point of the network has failure connection and eliminate the central point (third party) in the network during the transmission. The proposed method is discussed in three stages. Firstly, the pre-hiding stage estimates the embedding capacity of each host image. Secondly, the secret COVID-19 data hiding stage uses PSO algorithm and hash function. Thirdly, the secret medical COVID-19 data transmission transfers the stego images based on blockchain technology and updates all nodes (hospitals) in the network, as shown in Fig. 2. This proposed method also partitions data for a multicast delivery on better efficiency.

Fig. 2
figure 2

Decentralised hospital architecture for the storage and exchange of the information of patients with COVID-19

This paper is organised as follows. The proposed steganography method is presented in Section 2. The validation and evaluation tools used are illustrated in Section 3. The claims and limitation of this study are listed in Section 4. Finally, the conclusions and suggestions for future study are presented in Section 5.

2 Proposed steganography method based on blockchain and PSO algorithm

A new steganography method for concealing secret messages inside a host image based on PSO algorithm is previously proposed [65]. This algorithm is used to find the best bit locations for hiding secret data in host images [67]. The benefit of this method is to reduce the distortion of stego images. The best location refers to places where the secret data can be embedded with the least chances of distortion. This method determines the starting pixel, number of least significant bits (LSBs) used per pixel and the scanning image’s pixel sequence for message bit embedment. The present study develops and proposes a new steganography method in the spatial domain by removing and adding new particles of the PSO algorithm and using blockchain technology to hide medical data of patients with COVID-19. Moreover, the proposed steganography method is classified into three stages: pre-hiding, secret data hiding, and secret COVID-19 medical data transmission. Generally, information-hiding schemes are evaluated based on the transparency, reliability and capacity of the hidden information, mainly its robustness to tampering and signal processing distortions and the computational speed of the scheme in secret data embedment and extraction [35, 53, 95, 97, 99, 112, 113, 116, 117]. However, the relevance of each of these measures depends on their intended application. Therefore, this study aims to achieve the aforementioned goals for secure updating and sharing as much as possible in addition to the information security requirements (confidentiality, integrity and availability) for the medical data of patients with COVID-19. The secret data hiding in each node (hospital) and medical data transmission to another node (hospital) in a decentralised architecture are explained in the following general procedure. Figure 3 shows the sequential steps of the new steganography method based on blockchain and PSO algorithm.

Fig. 3
figure 3

Sequential order of the new steganography method based on blockchain and PSO algorithm for COVID-19 data

As shown in Fig. 3, the sequential steps start with the input of large-scale secret data and grey-scale host images. In the pre-hiding stage, Algorithm 1 (see Section 2.1) is proposed to estimate the embedding capacity of each host image. In the secret hiding stage, Algorithm 2 (see Section 2.2) is proposed to hide the secret medical data using PSO algorithm and hash function. The output of stages 1, 2 and 3 is a stego image that contains one part of the secret data with less distortion and high level of confidentiality. Moreover, stego images with hash data provide a level of benefits in terms of integrity when the stego images are transmitted to other nodes (hospitals) in the network. In the final stage, blockchain technology is used to update and share the medical data by transfer the stego images to all nodes (hospitals) in the network, to improve the level of confidentiality and protect the integrity medical COVID-19 data in grey-scale images, achieve data availability if any of a single point of network is failure connection and eliminate the central point (third party) in the network during the transmission process.

2.1 Pre-hiding stage

This stage will be discussed before starting the steganography process to:

  1. 1.

    Allow each node (server in decentralised hospital architecture) to estimate the host images (estimate the capacity of host images for hiding secret COVID-19 data) to reduce the time of hiding secret COVID-19 data;

  2. 2.

    Reduce the time consumed by the PSO algorithm in selecting the best bit locations in the host images for hiding secret COVID-19 data;

  3. 3.

    Enhance the quality of stego images (reduce the distortion) by embedding the secret COVID-19 data according to the host images’ capacity (no more, no less);

  4. 4.

    Label all host images in each node according to their capacity for hiding secret COVID-19 data.

Most of the recent technologies can utilise various forms of carrier messages, such as image, text and video. However, image file remains the most common form of carrier message because it can be easily sent during active communication between two parties. Images can exist in three different forms: binary (black and white), grey scale and red–green–blue (RGB) images. The study [65] that served as the benchmark of the current study used grey-scale images; therefore, the current study will adopt grey-scale images. The procedures defined in Algorithm 1 will be performed to estimate the host images’ embedding capacity (Fig. 4).

Fig. 4
figure 4

Algorithm 1: Finding the best bit location in the host image for hiding medical COVID-19 data

2.1.1 Finding the best bit location in the host image for hiding

The best bit location is the location where message bits could be embedded with the least chance of distortion. The start pixel, the number of LSB used in each pixel and the pixel sequence of the scanning image are determined using this method to conceal the message bits. The raster order of pixels in the LSB substitution method refers to the pixels’ order in the cover image. These pixels are scanned from left to right and from the first row to the last row of the cover image. Assume an image with a 5 × 5 dimension, the raster order of the pixels will be as depicted in Fig. 5.

Fig. 5
figure 5

Raster order

The major aim of this concept is to transform the steganography problem into a search and optimisation problem [27, 91, 118]. The order presented in Fig. 6a and b perhaps depicts a better order compared with the raster order. As a result, various positions and orders in the carrier image could serve as the ideal position for secret COVID-19 data embedment as they produce various peak signal-to-noise ratios (PSNRs). Hence, the problem of pixel scanning direction has 16 possible solutions. If a new method is designed to check all the possible orders and identify the best order for a given carrier image, then basic LSB steganography may be used to improve the result.

Fig. 6
figure 6

Two orders of pixel scanning. a Pixel scanning order 1. b Pixel scanning order 2

The host image is divided into four equal parts [11]; therefore, row-wise image pixel scanning is done from top to bottom or reverse, whereas column-wise scanning is done from right to left or reverse. The PSO particles for each part in the proposed method are as follows:

$$ \mathrm{Particle}=\left[\mathrm{Direction}\ \mathrm{X}-\mathrm{offset},\mathrm{Y}-\mathrm{offset},\mathrm{bit}-\mathrm{planes},\mathrm{X}-\mathrm{side}\ \mathrm{length},\mathrm{Y}-\mathrm{side}\ \mathrm{length}\right]. $$

The particles’ definitions are shown in Table 1, and all possible cases of host image scanning are shown in Table 2.

Table 1 Particle definitions
Table 2 All possible cases of host image scanning

where the X-offset length ≤ the number of host columns and the Y-offset length < the number of host rows, because the last row is used for hiding all the particle bits as proposed in this study. Particle bits are embedded in the last row of the cover image for subsequent extraction during steganalysis. The pixels of the cover image can be scanned in 16 possible directions, but the particle representation in the proposed method has a length of 4 bits. The beginning of the scanning point can be represented as two particles (X-offset and Y-offset) with a length of 8 bits each. The LSB planes in the pixels of the cover image (bit-planes) are defined by showing all the possible bit-plane values as shown in Table 3.

Table 3 Possible values of bit-plane particles

Consequently, the proposed approach will classify the particles into three sets. The first set of particles includes those that point out secret bit insertion in the host image and is used to estimate the capacity of host images. The second set of particles is those used to effect changes in medical secret COVID-19 data to improve its adaptability with the host image. The third set of particles is used for the transmission of secret medical COVID-19 data (stego images) based on blockchain technology. The second and third sets of particles are used in secret COVID-19 data hiding and sego image transmission stages, respectively. The output of this first stage will be the host image’s embedding capacity as shown in Fig. 7.

Fig. 7
figure 7

Processing stages

2.2 Secret medical data hiding stage

In this stage, the secret medical COVID-19 data is embedded in host images based on the finding from the pre-hiding stage, which determines the embedding capacity of each host image. All the procedures of this stage are defined in Algorithm 2 shown in Fig. 8. The time consumption of the hiding process will be calculated only in this stage because the first stage will be performed before the COVID-19 data hiding process.

Fig. 8
figure 8

Algorithm 2: LBS data COVID-19 hiding based on PSO algorithm and hash function

This stage can be divided into two steps:

2.2.1 Calculating the size of secret medical data (block of secret COVID-19 data)

In this step, the secret COVID-19 data is reduced to blocks according to the host images’ size, which is the output of the previous stage (pre-hiding), and then the blocks of secret COVID-19 data are converted into binary data to prepare for embedding into the host image as explained in the next step. The advantages of this step are as follows:

  • The secret COVID-19 data is hidden according to the embedding capacity of each host image.

  • The secret COVID-19 data embeded in specific host images will be incomplete (distributed in many host images); therefore, the security level of steganography is enhanced compared with other steganography methods that embed secret COVID-19 data completely in one image. This complete embedment will increase the vulnerability of the image to attack. Moreover, the quality of the stego image will be high because the embedding will be done according to the capacity of host images. The output of this step is shown in Fig. 9.

Fig. 9
figure 9

Dividing the secret COVID-19 data into blocks according to the host images’ embedding capacity

2.2.2 Hiding the block of secret medical COVID-19 data in host images

In this step, the blocks of secret COVID-19 data are hidden in the host images as mentioned in Algorithm 2. The particles of the PSO algorithm used in this stage are defined in Table 4. Direction X-offset, Y-offset, bit-planes, X-side length, Y-side length, data block number, host image number, Genesis image number, HC-SD. HN-SD, HL-SD.

Table 4 Particle definitions

The secret bit pole (SB-Pole) was determined by using the direction of secret bits (SB-Dire) to define the message bits’ direction, whereas the last particle is determined by the bit plane’s direction (BP-Dire) to show the direction of the LSB planes. The last three particles are illustrated in Table 5.

Table 5 Possible values for SB-Pole, SB-Dire and BP-Dire particles

This stage hides the secret medical COVID-19 data in host images using the particles defined in this stage (Fig. 10).

Fig. 10
figure 10

Hiding secret medical COVID-19 data in host image

The output of this stage is shown in Fig. 11. All the stego images are stored in the node (hospital database) as chains of stego images. The hash for each secret medical COVID-19 data block is calculated and set as the particles as shown in Table 4 before embedding into the stego image to be used as the reference to point out the previous and next stego images during data retrieval.

Fig. 11
figure 11

Storage and retrieval of stego images in the node database

As shown in Fig. 11, this stage has two directions. The black arrow refers to the hiding direction, in which each block of secret medical COVID-19 data is embedded in one host image (according to the embedding capacity of the host image). In this case, the secret COVID-19 data is randomly distributed in many stego images to complicate hiding and increase security against any attempt to steganalysis by any attacker (extracting the secret medical COVID-19 data from one stego image will be not useful, because the extracted secret COVID-19 data is incomplete). Each node (hospital) has its own record called ledger, which stores all the hashes for the blocks of the secret COVID-19 data (Fig. 12). This ledger is used during the retrieval of secret COVID-19 data from stego images (to extract the complete secret medical COVID-19 data) and the transmission of stego images to all nodes in the network, which is explained in the next section.

Fig. 12
figure 12

Ledger for each node (hospital) in the network

2.3 Secret medical COVID-19 data (stego images) transmission stage

Covert communication refers to a secret and secure form of communication that can only be detected by the participants. Such communication is performed in a manner that keeps outsiders from sniffing or realising the existence of conversations. However, conventional steganography approaches normally rely on nonsecure channels, which are associated with privacy leakage on the part of the sender, because of their reliance on a third-party provider for the delivery of the stegano-message. This third-party provider can easily interfere with the communication process, especially when the information or message is wrongly classified or filtered. Another problem of the conventional steganography technique is that it exposes the identity of the sender (such as IP or email addresses) to the public, and such information could be used by an outsider to further analyse the communication pattern or interrupt the propagation of the stegano-message. Although the secrecy of the content may still be retained because of encryption, the identity of the sender and the communication time can easily be recognised [29]. Therefore, blockchain technology was used in the proposed steganography method to enhance the security level during the stego image transmission stage, as well as during the COVID-19 data hiding process. Hashing was used to hide the secret COVID-19 data as explained in the previous section, and blockchain was used in stego image transmission in the decentralised architecture as explained in the following procedures:

  1. 1.

    The decentralised architecture based on blockchain technology has no central point (third party) that verifies the transaction between any nodes (hospitals) in the network as the connection will be by pair.

  2. 2.

    Based on blockchain technology, all nodes (hospitals) in the network will receive the COVID-19 data immediately without the need to verify the transaction from any third party when any node transfers any secret COVID-19 data to any node in the network. The validity of the transaction needs to be verified by at least 50% of the nodes in the network; this procedure will make tampering the transaction hard for any attacker.

  3. 3.

    The transmission will proceed as a chain of COVID-19 data blocks that contain the secret medical COVID-19 data when any node (hospital) sends the medical secret COVID-19 data (stego image) to all nodes (hospitals) in the network based on blockchain technology. Each block contains the payload (stego image of COVID-19 data), the hash of this image (current stego image) and the hash of the previous stego image except the first block called the Genesis block, which contains only the payload (stego image of COVID-19 data) and the hash of the first stego image.

  4. 4.

    The hash of the Genesis block will be stored in the ledger of the nodes (each node in the network) that received the block of COVID-19 data.

  5. 5.

    The node will check the value of the hash of the Genesis block, which has been stored in the ledger with the hash of the Genesis block coming with this block, when the second block of COVID-19 data reaches the node (each node in the network), which contains the hash of the second block, the previous block (Genesis block) and payload.

  6. 6.

    If the hashes are similar, then the COVID-19 data content is not tampered.

  7. 7.

    The same process will be implemented with each block of COVID-19 data to check the integrity of the stego images.

  8. 8.

    After finishing all the transactions, the ledger in each node will contain all the hashes of the stego image to ensure the integrity of the transmitted COVID-19 data and will use this hash during the retrieval of the secret COVID-19 data from the stego images.

The benefits of using blockchain technology in stego image transmission are to:

  1. 1.

    Enhance the level of security when hiding secret COVID-19 data during steganography by distributing the secret COVID-19 data in multi-host images and using hashes as pointers during the retrieval of the secret COVID-19 data (see secret COVID-19 data hiding stage);

  2. 2.

    Ensure the integrity of COVID-19 data during the transmission and retrieval of secret COVID-19 data from stego images;

  3. 3.

    Ensure the availability of the secret COVID-19 data in all the nodes in the network.

The diagram of the peer-to-peer transmission in a decentralised architecture is illustrated in Fig. 13, which depicts the transmission of the stego images with COVID-19 data from one node to all nodes in the network.

Fig. 13
figure 13

Peer-to-peer transmission based on blockchain technology

The transmission in decentralised hospital architecture is illustrated in Fig. 14, which shows that all nodes (hospitals) are connected with each other as peers without a central point. The data is received and updated in real time. The network will not be affected in case of network failure and node failure as other nodes will still provide the services.

Fig. 14
figure 14

Peer-to-peer architecture of COVID-19 data transmission based on blockchain technology

2.4 Secret COVID-19 data retrieval

The embedded secret COVID-19 data can be extracted by the reverse process as shown in Fig. 15. The information is extracted from the last row of the stego image. The procedure of retrieving the secret COVID-19 data can be summarise as follows:

  1. 1.

    Extract the information from the last row in the last stego image (the last stego image contains the last part of the secret COVID-19 data).

  2. 2.

    Check the hash of the last stego image extracted in 1 with the last stego image in the ledger. If the result matches, then no tampering happened in the stego image content during its storage in the database.

  3. 3.

    Implement stenography method based on PSO algorithm in reverse to obtain the secret COVID-19 data from the stego image.

  4. 4.

    Check the hash of the next stego image (N−1) extracted in 1 to know the next stego image that contains the second block of secret COVID-19 data (see secret COVID-19 data hiding stage).

  5. 5.

    Repeat 2, 3 and 4 until the next stego image has no Hash.

  6. 6.

    Aggregate all the parts of the secret COVID-19 data blocks to obtain the final secret COVID-19 data.

Fig. 15
figure 15

Flowchart of the secret image extraction process

3 Validation and evaluation of the proposed method

The findings of the proposed method in this study should be validated to check whether the proposed method is appropriate for the purpose of securing the hiding and transmission of secret COVID-19 data, as well as overcoming the identified limitations and producing the expected performance. Moreover, the validation process will determine whether the proposed method has achieved all the requirements in relation to the goals of this study.

The validation stage for the proposed steganography method can be achieved by discussing security analysis using two types of attack; most biometric systems are prone to two types of attack, namely, spoofing and brute-force attacks [94]. For spoofing, we consider that an attacker spoofs the user via phishing or a similar method to access the node and then analyse the resistance of the proposed steganography method against this type of attack. For brute-force attacks, we assume that an attacker is attempting to guess the hash via brute-force attack.

The stego image (hidden secret COVID-19 data inside a host image) is evaluated through existing methods using PSNR value, mean square error (MSE) and histogram following the same evaluation method of the benchmark methods to prove its effectiveness over the other steganography methods referred in literature.

  1. 1.

    The PSNR value between the cover and stego images is calculated using the following equation

$$ PSNR=10\times {\mathit{\log}}_{10}\ \frac{(255)^2}{\mathrm{MSE}} $$
(1)

where MSE is the mean square error between the cover and stego images.

  1. 2.

    The MSE value is calculated using Eq. 2

$$ MSE=\frac{1}{W\times H}{\sum}_{i=1}^w{\sum}_{j=1}^H{\left({x}_{ij}-{y}_{ij}\right)}^2 $$
(2)

where xij and yij are the value of each pixel in the host image and stego image, respectively.

4 Claims and limitation of study

The general claims of this study is proposed and a novel steganography-based block chain method in spatial domain for secure updating and sharing the data of donors and patients with COVID-19 during the transmission channels is discussed. The main claims of this study are briefly stated as follows:

  1. 1.

    The use of hashes when hiding secret COVID-19 data can secure the integrity of the data after retrieval from stego images. This steganography method is state-of-the-art given that no other has focused on the integrity of secret COVID-19 information within distributed hospitals after retrieval.

  2. 2.

    According to literature, all the previous steganography methods hide secret data in one host image (complete secret data); the proposed method divides secret COVID-19 data into several parts and hides them in multi-host images, then uses the hash as a pointer between stego images amongst hospitals. This manner of hiding makes the proposed method very difficult to break by any attacker. Moreover, the expected stego image has a high level of quality because the host image’s embedding capacity is estimated before hiding the secret data (not more or less than the embedding capacity). This step provides a high level of confidentiality.

  3. 3.

    According to literature, stego image transmission is challenging; therefore, blockchain is used for stego image transmission in distributed hospitals to increase the security of transmission of COVID-19 data and to eliminate the third party. Moreover, the secret data has a high level of confidentiality.

  4. 4.

    The proposed method has the ability to avoid network failure during disasters on the basis of used the blockchain technology. This ability ensures data availability regardless whether any single point of network has failure connection. This feature is important in terms of providing medical care services during the COVID-19 pandemic.

The limitation of this study is that the proposed method in this study has not been tested on real data of infected cases due to the lockdown and global pandemic. Collecting real datasets of patients with COVID-19 and recovered donors is difficult during these times.

5 Conclusion and future work

This study presents a novel method of secret medical data hiding, which can be adopted as a new framework and covert communication between hospitals with decentralised architecture when transmitting healthcare information of patients with COVID-19. This method can classify plasma donors and determine priority patients (SODOSM) according to the highest emergency and plasma data to be matched with the data of tested donor CPs based on the decision matrix. In terms of secure updating and sharing, the proposed steganography method based on PSO algorithm and hash function can hide secret medical COVID-19 data in hospital databases whilst providing confidentiality with high embedding capacity and high image quality. Moreover, stego images with hash data and blockchain technology are used in updating and sharing medical COVID-19 data between hospitals in the network, to improve the level of confidentiality and ensure the protection of the integrity medical COVID-19 data in grey-scale images, ensure data availability regardless whether any single point of the network has a failure connection and eliminate the central point (third party) in the network during the transmission. Overall, blockchain technology can be used to develop future electronic voting systems, which can be deployed to fulfil the principles of democratic elections. However, the privacy of public blockchains remains a critical issue because of long-term privacy concerns. The proposed method to secure the recently published framework within a hospital for the storage and transfusion of the best CP to the most critical patients with COVID-19 on the basis of biological requirements can be simulated and implemented in the future to serve as a guide for providing healthcare services with secret COVID-19 data during the abovementioned challenges and issues.