Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

19.08.2016

Robust and Secure Multiple Watermarking for Medical Images

verfasst von: Abhilasha Sharma, Amit Kumar Singh, Satya Prakash Ghrera

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents a robust and secure region of interest and non-region of interest based watermarking method for medical images. The proposed method applies the combination of discrete wavelet transform and discrete cosine transforms on the cover medical image for the embedding of image and electronic patient records (EPR) watermark simultaneously. The embedding of multiple watermarks at the same time provides extra level of security and important for the patient identity verification purpose. Further, security of the image and EPR watermarks is enhancing by using message-digest (MD5) hash algorithm and Rivest–Shamir–Adleman respectively before embedding into the medical cover image. In addition, Hamming error correction code is applying on the encrypted EPR watermark to enhance the robustness and reduce the possibility bit error rates which may result into wrong diagnosis in medical environments. The robustness of the method is also extensively examined for known attacks such as salt & pepper, Gaussian, speckle, JPEG compression, filtering, histogram equalization. The method is found to be robust for hidden watermark at acceptable quality of the watermarked image. Therefore, the hybrid method is suitable for avoidance of the patient identity theft/alteration/modification and secure medical document dissemination over the open channel for medical applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Matheson, L. R., Mitchell, S. G., Shamoon, T. G., Tarjan, R. E., & Zane, F. (1998). Robustness and security of digital watermarks. Financial Cryptography, 1465, 227–240.CrossRef Matheson, L. R., Mitchell, S. G., Shamoon, T. G., Tarjan, R. E., & Zane, F. (1998). Robustness and security of digital watermarks. Financial Cryptography, 1465, 227–240.CrossRef
2.
Zurück zum Zitat Coatrieux, G., Lecornu, L., Roux, Ch., & Sankur, B. (2006). A review of image watermarking applications in healthcare. In Proceedings of the 28th annual international conference engineering in medicine and biology society, EMBS’06, IEEE, New York (pp. 4691–4694). Coatrieux, G., Lecornu, L., Roux, Ch., & Sankur, B. (2006). A review of image watermarking applications in healthcare. In Proceedings of the 28th annual international conference engineering in medicine and biology society, EMBS’06, IEEE, New York (pp. 4691–4694).
3.
Zurück zum Zitat Mohanty, S. P. (2000). Digital watermarking: A tutorial review. Report, IISc. Bangalore, India. Mohanty, S. P. (2000). Digital watermarking: A tutorial review. Report, IISc. Bangalore, India.
4.
Zurück zum Zitat Coatrieux, G., Maitre, H., Sankur, B., Rolland, Y., & Collorec, R. (2000). Relevance of watermarking in medical imaging. In Proceedings of IEEE conference on information technology applications in biomedicine, Arlington, USA (pp. 250–255). Coatrieux, G., Maitre, H., Sankur, B., Rolland, Y., & Collorec, R. (2000). Relevance of watermarking in medical imaging. In Proceedings of IEEE conference on information technology applications in biomedicine, Arlington, USA (pp. 250–255).
5.
Zurück zum Zitat Moumen, C., & Benslama, M. (2012). Cyrptography of medical images. In Proceedings of the progress in electromagnetics research symposium, Kuala Lumpur, March 27–30 (pp. 42–48). Moumen, C., & Benslama, M. (2012). Cyrptography of medical images. In Proceedings of the progress in electromagnetics research symposium, Kuala Lumpur, March 2730 (pp. 42–48).
6.
Zurück zum Zitat Chao, H. M., Hsu, C. M., & Miaou, S. G. (2002). A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Transactions on Information Technology in Biomedicine, 6(1), 46–53.CrossRef Chao, H. M., Hsu, C. M., & Miaou, S. G. (2002). A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Transactions on Information Technology in Biomedicine, 6(1), 46–53.CrossRef
7.
Zurück zum Zitat Annamalai, U., & Thanushkodi, K. (2013). Medical image authentication with enhanced watermarking technique through visual cryptography. Journal of Theoretical and Applied Information Technology, 57(3), 484–494. Annamalai, U., & Thanushkodi, K. (2013). Medical image authentication with enhanced watermarking technique through visual cryptography. Journal of Theoretical and Applied Information Technology, 57(3), 484–494.
8.
Zurück zum Zitat Singh, A. K., Dave, M., & Mohan, A. (2015). Robust and secure multiple watermarking in wavelet domain. A special issue on advanced signal processing technologies and systems for healthcare applications. Journal of Medical Imaging and Health Informatics, 5(2), 406–414.CrossRef Singh, A. K., Dave, M., & Mohan, A. (2015). Robust and secure multiple watermarking in wavelet domain. A special issue on advanced signal processing technologies and systems for healthcare applications. Journal of Medical Imaging and Health Informatics, 5(2), 406–414.CrossRef
9.
Zurück zum Zitat Rey, C., & Dugelay, J. L. (2002). A survey of watermarking algorithm for image authentication. EURASIP Journal on Applied Signal Processing, 6, 613–621.CrossRefMATH Rey, C., & Dugelay, J. L. (2002). A survey of watermarking algorithm for image authentication. EURASIP Journal on Applied Signal Processing, 6, 613–621.CrossRefMATH
10.
Zurück zum Zitat Mousavi, S. M., Naghsh, A., & Abu-Bakar, S. A. R. (2014). Watermarking techniques used in medical images: A survey. Journal of Digital Imaging, 27(6), 714–729.CrossRef Mousavi, S. M., Naghsh, A., & Abu-Bakar, S. A. R. (2014). Watermarking techniques used in medical images: A survey. Journal of Digital Imaging, 27(6), 714–729.CrossRef
11.
Zurück zum Zitat Singh, A. K., Kumar, B., Dave, M., & Mohan, A. (2015). Robust and imperceptible dual watermarking for telemedicine applications. Wireless Personal Communications, 80(4), 1415–1433.CrossRef Singh, A. K., Kumar, B., Dave, M., & Mohan, A. (2015). Robust and imperceptible dual watermarking for telemedicine applications. Wireless Personal Communications, 80(4), 1415–1433.CrossRef
12.
Zurück zum Zitat Singh, A. K., Dave, M., & Mohan, A. (2014). Wavelet based image watermarking: futuristic concepts in information security. Proceedings of the National Academy of Sciences, India, Section A: Physical Sciences, 84(3), 345–359.CrossRef Singh, A. K., Dave, M., & Mohan, A. (2014). Wavelet based image watermarking: futuristic concepts in information security. Proceedings of the National Academy of Sciences, India, Section A: Physical Sciences, 84(3), 345–359.CrossRef
13.
Zurück zum Zitat Zhang, L., & Zhou, P. P. (2010). Localized affine transform resistant watermarking in region-of-interest. Telecommunication Systems, 44(3), 205–220.CrossRef Zhang, L., & Zhou, P. P. (2010). Localized affine transform resistant watermarking in region-of-interest. Telecommunication Systems, 44(3), 205–220.CrossRef
14.
Zurück zum Zitat Yang, C. Y., & Hu, W. C. (2010). Reversible data hiding in the spatial and frequency domains. International Journal of Image Processing, 3(6), 373–382. Yang, C. Y., & Hu, W. C. (2010). Reversible data hiding in the spatial and frequency domains. International Journal of Image Processing, 3(6), 373–382.
15.
Zurück zum Zitat Zain, J., & Clarke, M. (2005). Security in telemedicine: Issue in watermarking medical images. In Proceedings of 3rd international conference on science of electronic, technologies of information and telecommunications, Tunisia, March 27–31, 2005. Zain, J., & Clarke, M. (2005). Security in telemedicine: Issue in watermarking medical images. In Proceedings of 3rd international conference on science of electronic, technologies of information and telecommunications, Tunisia, March 27–31, 2005.
16.
Zurück zum Zitat Memon, N. A., & Gilani, S. A. M. (2008). NROI watermarking of medical images for content authentication. In Proceedings of 12th IEEE international multitopic conference, Karachi, Pakistan (pp. 106–110). Memon, N. A., & Gilani, S. A. M. (2008). NROI watermarking of medical images for content authentication. In Proceedings of 12th IEEE international multitopic conference, Karachi, Pakistan (pp. 106–110).
17.
Zurück zum Zitat Navas, K. A., Thampy, S. A., & Sasikumar, M. (2008). EPR hiding in medical images for telemedicine. In Proceedings of the world academy of science, engineering and technology, Rome (pp. 292–295). Navas, K. A., Thampy, S. A., & Sasikumar, M. (2008). EPR hiding in medical images for telemedicine. In Proceedings of the world academy of science, engineering and technology, Rome (pp. 292–295).
18.
Zurück zum Zitat Singh, A. K., Kumar, B., Dave, M., & Mohan, A. (2015). Multiple watermarking on medical images using selective DWT coefficients. Journal of Medical Imaging and Health Informatics, 5(3), 607–614.CrossRef Singh, A. K., Kumar, B., Dave, M., & Mohan, A. (2015). Multiple watermarking on medical images using selective DWT coefficients. Journal of Medical Imaging and Health Informatics, 5(3), 607–614.CrossRef
19.
Zurück zum Zitat Paar, C., & Pelzl, J. (2009). Understanding cryptography: A textbook for students and practitioners (3rd ed., pp. 29–53). New York: Springer.MATH Paar, C., & Pelzl, J. (2009). Understanding cryptography: A textbook for students and practitioners (3rd ed., pp. 29–53). New York: Springer.MATH
20.
Zurück zum Zitat Bouslimi, D., Coatrieux, G., Cozic, M., & Roux, C. (2012). A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Transactions on Information Technology in Biomedicine, 16(5), 891–899.CrossRef Bouslimi, D., Coatrieux, G., Cozic, M., & Roux, C. (2012). A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Transactions on Information Technology in Biomedicine, 16(5), 891–899.CrossRef
21.
Zurück zum Zitat Wong, P. W., & Memon, N. (2001). Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 10(10), 1593–1601.MATH Wong, P. W., & Memon, N. (2001). Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 10(10), 1593–1601.MATH
22.
Zurück zum Zitat Liew, S. C., Liew, S. W., & Zain, J. M. (2010). Reversible medical image watermarking for tamper detection and recovery with run length encoding compression. Proceedings of the World Academy of Science, Engineering and Technology, 4, 12–29. Liew, S. C., Liew, S. W., & Zain, J. M. (2010). Reversible medical image watermarking for tamper detection and recovery with run length encoding compression. Proceedings of the World Academy of Science, Engineering and Technology, 4, 12–29.
23.
Zurück zum Zitat Nakhaie, A. A., & Shokouhi, S. B. (2011). No reference medical image quality measurement based on spread spectrum and discrete wavelet transform using ROI processing. In Proceedings of the 24th Canadian conference on electrical and computer engineering, Niagara Falls (pp. 121–125), 8–11 May 2011. Nakhaie, A. A., & Shokouhi, S. B. (2011). No reference medical image quality measurement based on spread spectrum and discrete wavelet transform using ROI processing. In Proceedings of the 24th Canadian conference on electrical and computer engineering, Niagara Falls (pp. 121–125), 8–11 May 2011.
24.
Zurück zum Zitat Rodriguez-Colin, R., Claudia, F.-U., Trinidad-Blas, G. D. J. (2007). Data hiding scheme for medical images. In Proceedings of the 17th international conference on electronics, communications and computers, Cholula, Puebla (pp. 32–37), 26–28 February 2007. Rodriguez-Colin, R., Claudia, F.-U., Trinidad-Blas, G. D. J. (2007). Data hiding scheme for medical images. In Proceedings of the 17th international conference on electronics, communications and computers, Cholula, Puebla (pp. 32–37), 26–28 February 2007.
25.
Zurück zum Zitat Kaur, R. (2013). A medical image watermarking technique for embedding EPR and its quality assessment using no-reference metrics. International Journal of Information Technology and computer Science, 02, 73–79.CrossRef Kaur, R. (2013). A medical image watermarking technique for embedding EPR and its quality assessment using no-reference metrics. International Journal of Information Technology and computer Science, 02, 73–79.CrossRef
26.
Zurück zum Zitat Kannammal, A., & Rani, S. S. (2014). Two level security for medical images using watermarking/encryption algorithms. International Journal of imaging system and technology, 24(1), 111–120.CrossRef Kannammal, A., & Rani, S. S. (2014). Two level security for medical images using watermarking/encryption algorithms. International Journal of imaging system and technology, 24(1), 111–120.CrossRef
27.
Zurück zum Zitat Al-Haj, A., & Alaa’Amer, (2014). Secured telemedicine using region-based watermarking with tamper localization. Journal of Digital Imaging, 27(6), 737–750.CrossRef Al-Haj, A., & Alaa’Amer, (2014). Secured telemedicine using region-based watermarking with tamper localization. Journal of Digital Imaging, 27(6), 737–750.CrossRef
28.
Zurück zum Zitat Pandey, R., Singh, A. K., Kumar, B., & Mohan, A. (2016). Iris based secure NROI multiple eye image watermarking for teleophthalmology. Multimedia Tools and Applications. doi:10.1007/s11042-016-3536-6. Pandey, R., Singh, A. K., Kumar, B., & Mohan, A. (2016). Iris based secure NROI multiple eye image watermarking for teleophthalmology. Multimedia Tools and Applications. doi:10.​1007/​s11042-016-3536-6.
29.
Zurück zum Zitat Sasaki, Y. (2011). Collisions of MMO-MD5 and their impact on original MD5. Progress in Cryptology—AFRICACRYPT 2011 (Vol. 6737, pp. 117–133). Sasaki, Y. (2011). Collisions of MMO-MD5 and their impact on original MD5. Progress in Cryptology—AFRICACRYPT 2011 (Vol. 6737, pp. 117–133).
30.
Zurück zum Zitat Sasaki, Y., & Aoki, K. (2008). Preimage attacks on step-reduced MD5. Information Security and Privacy, 5107, 282–296.MATH Sasaki, Y., & Aoki, K. (2008). Preimage attacks on step-reduced MD5. Information Security and Privacy, 5107, 282–296.MATH
31.
32.
Zurück zum Zitat Lien, B. K., Chen, S. K., Wang, W. S., & King, K. P. (2015). Dispersed data hiding using hamming code with recovery capability. Genetic and Evolutionary Computing, 329, 179–187. Lien, B. K., Chen, S. K., Wang, W. S., & King, K. P. (2015). Dispersed data hiding using hamming code with recovery capability. Genetic and Evolutionary Computing, 329, 179–187.
Metadaten
Titel
Robust and Secure Multiple Watermarking for Medical Images
verfasst von
Abhilasha Sharma
Amit Kumar Singh
Satya Prakash Ghrera
Publikationsdatum
19.08.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3625-x

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt