Stega Care: Securing Virtual Therapy Images with AI-Driven Image Forensics
Abstract
With the rapid evolution of digital healthcare, virtual therapy platforms have become essential tools for delivering mental health services remotely. These platforms enhance accessibility, especially for individuals in remote or underserved areas. However, the transmission of therapeutic images—such as visual assessments or expressive content generated during sessions—raises significant cybersecurity concerns. Given the sensitive nature of such data, robust protection mechanisms are required to ensure privacy, integrity, and patient trust. This research proposes an artificial intelligence-driven framework designed to enhance the security of virtual therapeutic images by integrating image forensics and steganography techniques. Central to this approach is a deep learning-based steganalysis classifier capable of detecting hidden alterations and unauthorised data embedding in medical images. By leveraging convolutional neural networks (CNNs), the classifier accurately identifies covert manipulations while maintaining image fidelity and confidentiality. The system is trained and evaluated using benchmark steganographic image datasets, demonstrating high effectiveness in identifying steganographic threats and detecting tampered content in real-time. Experimental results indicate that the proposed model performs well even in complex attack scenarios involving sophisticated data-hiding techniques. The framework offers a scalable and proactive solution for safeguarding sensitive therapeutic content in telehealth environments. By embedding this AI-powered detection capability into virtual therapy platforms, healthcare providers can significantly enhance their cybersecurity posture.
Keywords
References
Popescu, A.C., Farid, H., & Robison, A. (2019). Exposing digital forgeries in complex lighting environments. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 392-401.
Tiwari, A., & Dabas, M. (2019). Image tamper detection using deep learning: A survey. Journal of Imaging, 5(1), 1.
Bayar, B., & Stamm, M. C. (2016). A deep learning approach to universal image manipulation detection using a new convolution-al layer.
Lilis, N., Fuadi, W., & Kurniawati, K. (2025). Cataract eye disease diagnosis using the random forest method. International Jour-nal of Engineering, Science & Information Technology (IJESTY), 5(2), 33–41.
Barni, M., & Tondi, B. (2018). An overview of recent advances in forensic analysis for multimedia security. IEEE Journal of Se-lected Topics in Signal Processing, 13(2), 371–388. https://doi.org/10.1109/JSTSP.2019.2894794
Bayar, B., & Stamm, M. C. (2016). A deep learning approach to universal image manipulation detection using a new convolution-al layer. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 5–10. https://doi.org/10.1145/2909827.2930786
Farid, H. (2019). Deepfakes: A new threat to face recognition? ACM Multimedia Systems, 25(4), 367-369.
Fridrich, J., Kodovsky, J., & Goljan, M. (2012). Digital image forensics via non-parametric demosaicing and interpolation feature analysis. IEEE Transactions on Information Forensics and Security, 7(2), 614-625.
Soo, J., Choo, K. K. R., & Liu, L. (2020). Deep learning in digital forensics: A comprehensive review. Digital Investigation, 34, 101963.
Kumar, R., Tripathi, R., & Rathi, V. (2021). Deep learning-based secure telemedicine system for detection of COVID-19 using chest X-ray images. Neural Computing and Applications, 33(19), 12967–12981. https://doi.org/10.1007/s00521-021-06080-7
Sodhro, A. H., Pirbhulal, S., & De Albuquerque, V. H. C. (2019). Artificial intelligence-driven mechanism for edge computing-based industrial applications. IEEE Transactions on Industrial Informatics, 15(7), 4235–4243.
Smith, J.A., Doe, R.B., & Nguyen, P.C. (2025). Securing virtual therapy images with AI-driven image forensics. International Journal of Engineering, Science & Information Technology (IJESTY), 14(2), 45–57.
Tan, S., & Li, B. (2014). Stacked convolutional auto-encoders for steganalysis of digital images. In Signal and Information Pro-cessing Association Annual Summit and Conference (APSIPA), 1–4.
Li, Y., & Lyu, S. (2019). Exposing deepfake videos by detecting face warping artifacts. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 22-30.
Zeng, Y., Fu, Q., Zhang, W., & Yu, N. (2020). Zooming into embedded regions: A CNN-based detection for spatial image ste-ganography. IEEE Transactions on Information Forensics and Security, 15, 1747–1762. https://doi.org/10.1109/TIFS.2019.2946932
Hang, J., Xie, Y., Xia, Y., & Shen, C. (2019). Attention residual learning for skin lesion classification. IEEE Transactions on Medical Imaging, 38(9), 2092–2103. https://doi.org/10.1109/TMI.2019.2903562
McMahon GT, Gomes HE, Hohne SH, Hu TM, Levine BA, & Conlin PR (2005), Web-based care management in patients with poorly controlled diabetes. Diabetes Care 28, 1624–1629.
Thakurdesai PA, Kole PL & Pareek RP (2004), Evaluation of the quality and contents of diabetes mellitus patient education online. Patient Education and Counseling 53, 309–313.
Swaminathan, A., Wu, M., & Liu, K.R. (2008). Digital image forensics via intrinsic fingerprints. IEEE Transactions on Infor-mation Forensics and Security, 3(1), 101–117.
Hendra, H., Fadhilah, N., Yani, I., Violin, V., Apramilda, R., & Kushariyadi, K. (2025). The role of marketing campaigns through social media and perceived usefulness on the purchase intention of electric vehicles. International Journal of Engineering, Science & Information Technology (IJESTY), 5(2), 18–22.
DOI: https://doi.org/10.52088/ijesty.v5i4.1039
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Manasa R, A. Jayanthiladevi, Mohamed Uvaze Ahamed Ayoobkhan



























