Skip to main content
Log in

Medical image region based watermarking for secured telemedicine

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Exchange of Medical images over public networks entail a methodology to offer secrecy for the image along with confirmation for image integrity. In this paper, a region-based Firefly optimized algorithm and hybridization of DWT and Schur transforms in conjunction with multiple watermarking is recommended to endow with security requisites such as authenticity of the ownership of medical image besides origin of source for interchange of medical images in telemedicine applications. Secrecy and authenticity are offered by inserting robust multiple watermarks in the region-of-noninterest (RONI) of the medical image by means of a blind method in the discrete wavelet transform and Schur transform (DWT-Schur). The capability of imperceptibility, robustness and payload are the main parameters for the assessment of watermarking algorithm, with MRI, Ultrasound plus X-ray gray-scale medical image modalities. Simulation results make obvious the efficacy of the projected algorithm in offering the essential security benefits for applications allied to telemedicine.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Ahmad R, Nilchi N, Taheri A (2008) A new robust digital image watermarking technique based on the discrete cosine transformation and neural network. International Symposium on Biometrics and Security Technologies, Islamabad, pp 1–7

  2. Al-Haj A, Amer A (2014) Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 27:737–750. https://doi.org/10.1007/s10278-014-9709-9

    Article  Google Scholar 

  3. Ali M, WookAhn C, Siarry P (2014) Differential evolution algorithm for the selection of optimal scaling factors in image watermarking, special issue on advances in evolutionary optimization based image processing. Eng Appl Artif Intell 31:15–26

    Article  Google Scholar 

  4. Amirgholipour SK, Naghsh-Nilchi AR (2009) Robust digital image watermarking based on joint DWTDCT. IEEE Trans Image Process 3(2):42–54

    Google Scholar 

  5. Aslantas V (2009) An optimal robust digital image watermarking based on SVD using differential evolution algorithm. Opt Commun 282(5):769–777

    Article  Google Scholar 

  6. Aslantas V, Dogan AL, Ozturk S (2008) DWT-SVD based image watermarking using particle swarm optimizer. IEEE International Conference on Multimedia and Expo, Hannover, pp 241–244

  7. Aslantas V, Ozer S, Ozturk S (2009) Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Opt Commun 282(14):2806–2817

    Article  Google Scholar 

  8. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3&4):313–336

    Article  Google Scholar 

  9. Bhatnagar G, Jonathan WUQM (2013) Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform. Futur Gener Comput Syst 29(1):182–195

    Article  Google Scholar 

  10. Bouslimi D, And Coatrieux G (2011) A joint watermarking/encryption algorithm for verifying medical image integrity and authenticity in both encrypted and spatial domains. 33′ annual international conference of the IEEE EMBS Boston, Massachusetts USA

  11. Chandra Mohan B, Swamy KV (2010) On the use of Schur decomposition for copyright protection of digital images. Int J Comput Electr Eng 2(4):1793–8163

    Google Scholar 

  12. Chao H, Hsu C, Miaou S (2002) A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6(1):46–53

    Article  Google Scholar 

  13. Chauhan DS, Singh AK, Kumar B, Saini JP (2017) Quantization based multiple medical information watermarking for secure e-health. In: Quantization based multiple medical information watermarking for secure e-health, multimedia tools and applications. Springer, USA, pp 1–13. https://doi.org/10.1007/s11042-017-4886-4

    Chapter  Google Scholar 

  14. Coatrieux G, Maitre H, Sankur B (2001) Strict integrity control of biomedical images. In: Proc. SPIE security watermarking multimedia contents III, SPIE, San Jose, CA, vol 4314, pp 229–240

  15. Davie B, Florence V, Friede A, Sheehan J, Sisk J (2001) Bringing health-care applications to the internet. IEEE Internet Comput 5(3):42–46

    Article  Google Scholar 

  16. Elizee ZA, Babazadeh A, Mohammad S, Hosseini S (2010) Optimizing product design through a particle swarm induced logistic regression model. Majlesi J Mech Eng 3(2)

  17. Gen M, Cheng R (1997) Genetic algorithms and engineering design. Wiley, New York

    Google Scholar 

  18. Giakoumaki A, Pavlopoulos S, Koutsouris D (2004) A mulitple watermarking scheme applied to medical image management. Proceedings of the 26th annual international conference of the IEEE EMBS San Francisco, CA, USA, pp 3241–3244

  19. Golub GH, Van Loan CF (1989) Matrix computations. Johns Hopkins Univ Press, Baltimore

    MATH  Google Scholar 

  20. Hong W, Hang M (2006) Robust digital watermarking scheme for copy right protection. IEEE Trans Signal Process 12:1–8

    Google Scholar 

  21. Kuang LQ, Zhang Y, Han X (2009) A medical image authentication system based on reversible digital watermarking. Information Science and Engineering (ICISE), 1st international conference, pp 1047–1050

  22. Kumar C, Singh AK, Kumar P (2017) A recent survey on image watermarking techniques and its application in e-governance. Multimed Tools Appl, Springer 77:3597–3622. https://doi.org/10.1007/s11042-017-5222-8

    Article  Google Scholar 

  23. Kundur D, Hatzinakos D (1998) Digital watermarking using multiresolution wavelet decomposition. Proc IEEE Int Conf Acoust Speech Signal Process, Seattle 12(15):2969–2972

    Google Scholar 

  24. Liew S, Zain J (2011) Tamper localization and lossless recovery watermarking scheme. Commun Comput Inf Sci 179(1):555–566

    Google Scholar 

  25. Liew S, Way S, Zain J (2012) Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 24:114–125

    Google Scholar 

  26. Mahajan LH, Patil SA (2013) Image watermarking scheme using SVD. Int J Adv Res Sci Eng 2(6):69–77

    Google Scholar 

  27. McEvoy F, Svalastoga E (2007) Security of patient and study data associated with DICOM images when transferred using compact disc media. J Digit Imaging 22(1):65–70

    Article  Google Scholar 

  28. Memon NA, Gilani SAM (2008) NROI watermarking of medical images for content authentication. In Proceedings of 12th IEEE international multitopic conference, Karachi, Pakistan, pp 106–110

  29. Ming-Shi W, Wei-Che C (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Comput Stand Interfaces 31(4):757–762

    Article  Google Scholar 

  30. Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C (2010) Medical image integrity control combining digital signature and lossless watermarking. In: Garcia-Alfaro J et al (eds) Data privacy management and autonomous spontaneous security. Springer Berlin, Heidelberg, pp 153–162

    Chapter  Google Scholar 

  31. Pandey R, Singh AK, Kumar B, Mohan A (2016) Iris based secure NROI multiple eye image watermarking for Teleophthalmology. Multimed Tools Appl 75(22):14381–14397

    Article  Google Scholar 

  32. Parah SA, Sheikh JA, Ahad F, Loan NA, Mohiuddin Bhat G (2015) Information hiding in medical images: a robust medical image watermarking system for e-healthcare. Multimed Tools Appl: 1–35

  33. Pereira S, Voloshynovskiy S, Madueño M, Marchand-Maillet S, Pun T (2001) Second generation benchmarking and application oriented evaluation. Information hiding workshop III, Pittsburgh, pp 340–353

    Chapter  Google Scholar 

  34. Puech W (2008) An efficient hybrid method for safe transfer of medical images. 2nd international conference: e-medical systems, Tunisia, pp 29–31

  35. Rosiyadi D, Horng S-J, Suryana N, Masthurah N (2012) A comparison between the hybrid using genetic algorithm and the pure hybrid watermarking scheme. Int J Comp Theory Eng (IJCTE) 4(3):329–331

    Article  Google Scholar 

  36. Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking technique for medical images. Wirel Pers Commun 92(4):1611–1624

    Article  Google Scholar 

  37. Singh AK (2016) Improved hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl, Springer 76:8881–8900. https://doi.org/10.1007/s11042-016-3514-z

    Article  Google Scholar 

  38. Singh A, Tayal A (2012) Choice of wavelet from wavelet families for DWT–DCT–SVD image watermarking. Int J Comput Appl 48(17):9–14

    Google Scholar 

  39. Singh AK, Dave M, Mohan A (2014) Wavelet based image watermarking: futuristic concepts in information security. Proc Natl Acad Sci India Sect A Phys Sci 84(3):345–359

    Article  Google Scholar 

  40. Singh AK, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381–8401

    Article  Google Scholar 

  41. Singh AK, Dave M, Mohan A (2015) Robust and secure multiple watermarking in wavelet domain, a special issue on Advanced Signal Processing Technologies and Systems for Healthcare Applications(ASPTSHA). J Med Imaging Health Inform 5(2):406–414

    Article  Google Scholar 

  42. Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-Spectrum in DWT domain. Wirel Pers Commun 83(3):2133–2150

    Article  Google Scholar 

  43. Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible spread-spectrum watermarking for telemedicine applications. Proc Natl Acad Sci, India Sect A: Phys Sci 85(2):295–301. https://doi.org/10.1007/s40010-014-0197-6

    Article  Google Scholar 

  44. Singh AK, Kumar B, Dave M, Ghrera SP, Mohan A (2016) Digital image watermarking: techniques and emerging applications. Handbook of research on modern cryptographic solutions for computer and cyber security, (IGI Global, USA), pp 246–272. https://doi.org/10.4018/978-1-5225-0105-3.ch011

  45. Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Futur Gener Comput Syst, Elsevier:1–16. https://doi.org/10.1016/j.future.2016.11.023

    Article  Google Scholar 

  46. Singh AK, Kumar B, Singh G, Mohan A (2017) Medical image watermarking: techniques and applications, book series on multimedia systems and applications. Springer, USA ISBN: 978-3319576985

    Book  Google Scholar 

  47. Srivastava R, Kumar B, Singh AK, Mohan A (2017) Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach. Multimed Tools Appl, Springer US. https://doi.org/10.1007/s11042-017-5214-8

    Article  Google Scholar 

  48. Surekha P, Sumathi S (2011) Implementation of genetic algorithm for a DWT based image watermarking scheme. Ictact J Soft Comput: Spec Issue Fuzzy Ind Process Autom 2(1):244–252

    Article  Google Scholar 

  49. Swaraja K, Madhaveelatha Y, Reddy VSK (2016) Robust video watermarking by amalgamation of image transforms and optimized firefly algorithm. Int J Appl Eng Res 11(1):216–225

    Google Scholar 

  50. Umamageswari A, Ferni U, Suresh G (2011) A survey on security in medical image communication. Int J Comput Appl 30(3):41–45

    Google Scholar 

  51. Vafaei M, Mahdavi-Nasab H, Pourghassem H (2013) A new robust blind watermarking method based on neural networks in wavelet transform domain. World Appl Sci J 22(11):1572–1580

    Google Scholar 

  52. Velumani R, Seenivasagam V (2010) A reversible blind medical image watermarking scheme for patient identification, improved telediagnosis and tamper detection with a facial image watermark. IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp 1–8

  53. Wei Z, Li H, Dai J, Wang S (2006) Image watermarking based on genetic algorithm. IEEE International Conference on Multimedia and Expo, Toronto, Ont., pp 1117–1120

  54. Xia XG, Boncelet CG, Arce GR (1997) A multiresolution watermark for digital images. Proceedings of the international conference on image processing, Santa Barbara, pp 548–551

  55. Yang E, Erdogan AT, Arslan T, Barton N (2007) An improved particle swarm optimization algorithm for power-efficient wireless sensor networks. ECSIS symposium on bio-inspired learning and intelligent system for security

  56. Yavus E, Telatar Z (2007) Improved SVD-DWT based digital image watermarking against watermark ambiguity. In: Proceedings of the ACM symposium on applied computing, Seoul, Korea, pp 1051–1055

  57. Yen CT, Huang YJ (2015) Frequency domain digital watermark recognition using image code sequences with a back-propagation neural network. Multimed Tools Appl. https://doi.org/10.1007/s11042-015-2718-y

    Article  Google Scholar 

  58. Zain J, Clarke M (2005) Security in telemedicine: issues in watermarking medical images. Sciences of Electronic, Technologies of Information and Telecommunications, Tunisia

    Google Scholar 

  59. Zear A, Singh AK, Kumar P (2016) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools Appl 77:4863–4882. https://doi.org/10.1007/s11042-016-3862-8

    Article  Google Scholar 

  60. Zear A, Singh AK, Kumar P (2016) Multiple Watermarking for Healthcare Applications. J Intell Syst, Walter de Gruyter GmbH & Co. KG, Germany 27:5–18. https://doi.org/10.1515/jisys-2016-0036

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Swaraja K.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Swaraja K Medical image region based watermarking for secured telemedicine. Multimed Tools Appl 77, 28249–28280 (2018). https://doi.org/10.1007/s11042-018-6020-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6020-7

Keywords

Navigation