Skip to main content
Top
Published in: Arabian Journal for Science and Engineering 4/2021

03-01-2021 | Research Article-Computer Engineering and Computer Science

Tamper Detection and Self-Recovery of Medical Imagery for Smart Health

Authors: Muzamil Hussan, Shabir A. Parah, Solihah Gull, G. J. Qureshi

Published in: Arabian Journal for Science and Engineering | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Social Internet of Things (SIoT) is one of the emerging research areas which integrates the Internet of Things (IoT) with social networking concepts. It envisages better information sharing, by overcoming the scalability issues in IoT. It is supposed to overhaul the smart health industry, as it is a flexible compared to conventional IoT based solutions. It however poses many challenges with data authentication and privacy, being a couple of such issues that need to be addressed. In this paper, we present an efficient watermarking method for tamper detection, localization, and self-recovery of medical images for SIoT-based smart health networks. The cover image is initially divided into four equal parts, with each part progressively divided into 4 × 4 non-overlapping blocks. A watermark is prepared from a group of randomly chosen four, 4 × 4 blocks, determined by chaotic mapping. The information is embedded into 4 sub-blocks mapped utilizing chaotic sequence such that the restoration process can be carried out even if three sub-blocks out of four containing the information, get tampered with. The proposed technique is found to restore almost 1/3rd of the tampered image and produces a high-quality image with the average Peak Signal-to-Noise Ratio value of above 33 dB after the restoration process. The performance of the proposed method for various collage attacks shows its efficacy over other state-of-the-art techniques making it a potential candidate for SIoT driven smart health systems.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Pattar S., et al.: Progressive search algorithm for service discovery in an IoT ecosystem. In: 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE (2019) Pattar S., et al.: Progressive search algorithm for service discovery in an IoT ecosystem. In: 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE (2019)
3.
go back to reference Hao, F.; Pei, Z.; Yang, L.T.: Diversified top-k maximal clique detection in Social Internet of Things. Future Gener. Comput. Syst. 107, 408–417 (2020)CrossRef Hao, F.; Pei, Z.; Yang, L.T.: Diversified top-k maximal clique detection in Social Internet of Things. Future Gener. Comput. Syst. 107, 408–417 (2020)CrossRef
4.
go back to reference Imran, M.; Sohail, J.; Naveen, C.; Joel, J.P.C.R.: Enabling technologies for social internet of things. Future Gener. Comput. Syst. 715–717 (2019) Imran, M.; Sohail, J.; Naveen, C.; Joel, J.P.C.R.: Enabling technologies for social internet of things. Future Gener. Comput. Syst. 715–717 (2019)
5.
go back to reference Roopa, M.S.; Santosh, P.; Rajkumar, B.; et al.: Social Internet of Things (SIoT): foundations, thrust areas, systematic review and future directions. Comput. Commun. 139, 32–57 (2019)CrossRef Roopa, M.S.; Santosh, P.; Rajkumar, B.; et al.: Social Internet of Things (SIoT): foundations, thrust areas, systematic review and future directions. Comput. Commun. 139, 32–57 (2019)CrossRef
6.
go back to reference He, H.; Chen, F.; Tai, H.M.; Kalker, T.; Zhang, J.: Performance analysis of a blockneighborhood-based selfrecovery fragile watermarking scheme. IEEE Trans. Inf. For. Secur. 7(1), 185–196 (2012)CrossRef He, H.; Chen, F.; Tai, H.M.; Kalker, T.; Zhang, J.: Performance analysis of a blockneighborhood-based selfrecovery fragile watermarking scheme. IEEE Trans. Inf. For. Secur. 7(1), 185–196 (2012)CrossRef
7.
go back to reference Islam, M.; Roy, A.; Laskar, R.H.: SVM-based robust image watermarking technique in LWT domain using different sub-bands. Neural Comput. Appl. 32, 1–25 (2020) Islam, M.; Roy, A.; Laskar, R.H.: SVM-based robust image watermarking technique in LWT domain using different sub-bands. Neural Comput. Appl. 32, 1–25 (2020)
8.
go back to reference Korus, P.; Dziech, A.: Adaptive self-embedding scheme with controlled reconstruction performance. IEEE Trans. Inf. For. Secur. 9(2), 169–181 (2014)CrossRef Korus, P.; Dziech, A.: Adaptive self-embedding scheme with controlled reconstruction performance. IEEE Trans. Inf. For. Secur. 9(2), 169–181 (2014)CrossRef
9.
go back to reference Kundur, D.; Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE 87(7), 1167–1180 (1999)CrossRef Kundur, D.; Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE 87(7), 1167–1180 (1999)CrossRef
11.
go back to reference Qi, X.; Xin, X.: A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J. Vis. Commun. Image Represent. 30, 312–327 (2015)CrossRef Qi, X.; Xin, X.: A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J. Vis. Commun. Image Represent. 30, 312–327 (2015)CrossRef
14.
go back to reference He, H.J.; Zhang, J.S.; Chen, F.: Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89(8), 1557–1566 (2009)CrossRef He, H.J.; Zhang, J.S.; Chen, F.: Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89(8), 1557–1566 (2009)CrossRef
18.
go back to reference Gull, S.; Loan, N.A.; Parah, S.A.; et al.: An efficient watermarking technique for tamper detection and localization of medical images. J. Ambient Intell. Hum. Comput. 11, 1179–1808 (2018) Gull, S.; Loan, N.A.; Parah, S.A.; et al.: An efficient watermarking technique for tamper detection and localization of medical images. J. Ambient Intell. Hum. Comput. 11, 1179–1808 (2018)
20.
go back to reference Chang, Y.F.; Tai, W.L.A.: block-based watermarking scheme for image tamper detection and selfrecovery. Opto-Electron. Rev. 21(2), 182–190 (2013)MathSciNetCrossRef Chang, Y.F.; Tai, W.L.A.: block-based watermarking scheme for image tamper detection and selfrecovery. Opto-Electron. Rev. 21(2), 182–190 (2013)MathSciNetCrossRef
22.
go back to reference Singh, D.; Singh, S.K.: Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J. Vis. Commun. Image Represent. 38, 775–789 (2016)CrossRef Singh, D.; Singh, S.K.: Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J. Vis. Commun. Image Represent. 38, 775–789 (2016)CrossRef
23.
go back to reference Sarreshtedari, S.; Akhaee, M.A.: A source-channel coding approach to digital image protection and selfrecovery. IEEE Trans. Image Process. 24(7), 2266–2277 (2015)MathSciNetCrossRef Sarreshtedari, S.; Akhaee, M.A.: A source-channel coding approach to digital image protection and selfrecovery. IEEE Trans. Image Process. 24(7), 2266–2277 (2015)MathSciNetCrossRef
24.
go back to reference Cao, F.; An, B.; Wang, J.; Ye, D.; Wang, H.: Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46, 52–60 (2017)CrossRef Cao, F.; An, B.; Wang, J.; Ye, D.; Wang, H.: Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46, 52–60 (2017)CrossRef
25.
go back to reference Shehab, A.; Elhoseny, M.; Muhammad, K.; et al.: Secure and robust fragile watermarking scheme for medical images. IEEE Access 6, 10269–10278 (2018)CrossRef Shehab, A.; Elhoseny, M.; Muhammad, K.; et al.: Secure and robust fragile watermarking scheme for medical images. IEEE Access 6, 10269–10278 (2018)CrossRef
26.
go back to reference Zhang, Z.; Sun, H.; Gao, S.; Jin, S.: Self-recovery reversible image watermarking algorithm. PLoS One 13(6), e0199143 (2018)CrossRef Zhang, Z.; Sun, H.; Gao, S.; Jin, S.: Self-recovery reversible image watermarking algorithm. PLoS One 13(6), e0199143 (2018)CrossRef
28.
go back to reference Li, K.F.; Chen, T.F.; Wu, S.C.: Image tamper detection and recovery system based on discrete wavelet transformation. In: Proceedings of IEEE Paci_c Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233),Victoria, BC, Canada, vol. 1, pp. 164–167 (2001). https://doi.org/10.1109/pacrim.2001.953548 Li, K.F.; Chen, T.F.; Wu, S.C.: Image tamper detection and recovery system based on discrete wavelet transformation. In: Proceedings of IEEE Paci_c Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233),Victoria, BC, Canada, vol. 1, pp. 164–167 (2001). https://​doi.​org/​10.​1109/​pacrim.​2001.​953548
30.
go back to reference Naskar, R.; Chakraborty, R.S.: A generalized tamper localization approach for reversible watermarking algorithms. ACM Trans. Multimedia Comput. Commun. Appl. 9(3), 19:1–19:22 (2013)CrossRef Naskar, R.; Chakraborty, R.S.: A generalized tamper localization approach for reversible watermarking algorithms. ACM Trans. Multimedia Comput. Commun. Appl. 9(3), 19:1–19:22 (2013)CrossRef
35.
go back to reference Parah, S.; Sheikh, J.; Loan, N.; Ahad, F.; Bhat, G.: Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks. Multidimension. Syst. Signal Process. 29(3), 1095–1117 (2017)MathSciNetCrossRef Parah, S.; Sheikh, J.; Loan, N.; Ahad, F.; Bhat, G.: Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks. Multidimension. Syst. Signal Process. 29(3), 1095–1117 (2017)MathSciNetCrossRef
36.
go back to reference Parah, S.; Sheikh, J.; Dey, N.; Bhat, G.M.: Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption. J. Glob. Inf. Manag. 26(4), 80–102 (2017)CrossRef Parah, S.; Sheikh, J.; Dey, N.; Bhat, G.M.: Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption. J. Glob. Inf. Manag. 26(4), 80–102 (2017)CrossRef
Metadata
Title
Tamper Detection and Self-Recovery of Medical Imagery for Smart Health
Authors
Muzamil Hussan
Shabir A. Parah
Solihah Gull
G. J. Qureshi
Publication date
03-01-2021
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering / Issue 4/2021
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-020-05135-9

Other articles of this Issue 4/2021

Arabian Journal for Science and Engineering 4/2021 Go to the issue

Research Article-Computer Engineering and Computer Science

Optimal Design of Transmission Shafts Using a Vortex Search Algorithm

Research Article-Computer Engineering and Computer Science

Design and Analysis of Pattern Matching Algorithms Based on QuRAM Processing

Premium Partners