Abstract
Exchange of Medical images over public networks entail a methodology to offer secrecy for the image along with confirmation for image integrity. In this paper, a region-based Firefly optimized algorithm and hybridization of DWT and Schur transforms in conjunction with multiple watermarking is recommended to endow with security requisites such as authenticity of the ownership of medical image besides origin of source for interchange of medical images in telemedicine applications. Secrecy and authenticity are offered by inserting robust multiple watermarks in the region-of-noninterest (RONI) of the medical image by means of a blind method in the discrete wavelet transform and Schur transform (DWT-Schur). The capability of imperceptibility, robustness and payload are the main parameters for the assessment of watermarking algorithm, with MRI, Ultrasound plus X-ray gray-scale medical image modalities. Simulation results make obvious the efficacy of the projected algorithm in offering the essential security benefits for applications allied to telemedicine.
Similar content being viewed by others
References
Ahmad R, Nilchi N, Taheri A (2008) A new robust digital image watermarking technique based on the discrete cosine transformation and neural network. International Symposium on Biometrics and Security Technologies, Islamabad, pp 1–7
Al-Haj A, Amer A (2014) Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 27:737–750. https://doi.org/10.1007/s10278-014-9709-9
Ali M, WookAhn C, Siarry P (2014) Differential evolution algorithm for the selection of optimal scaling factors in image watermarking, special issue on advances in evolutionary optimization based image processing. Eng Appl Artif Intell 31:15–26
Amirgholipour SK, Naghsh-Nilchi AR (2009) Robust digital image watermarking based on joint DWTDCT. IEEE Trans Image Process 3(2):42–54
Aslantas V (2009) An optimal robust digital image watermarking based on SVD using differential evolution algorithm. Opt Commun 282(5):769–777
Aslantas V, Dogan AL, Ozturk S (2008) DWT-SVD based image watermarking using particle swarm optimizer. IEEE International Conference on Multimedia and Expo, Hannover, pp 241–244
Aslantas V, Ozer S, Ozturk S (2009) Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Opt Commun 282(14):2806–2817
Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3&4):313–336
Bhatnagar G, Jonathan WUQM (2013) Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform. Futur Gener Comput Syst 29(1):182–195
Bouslimi D, And Coatrieux G (2011) A joint watermarking/encryption algorithm for verifying medical image integrity and authenticity in both encrypted and spatial domains. 33′ annual international conference of the IEEE EMBS Boston, Massachusetts USA
Chandra Mohan B, Swamy KV (2010) On the use of Schur decomposition for copyright protection of digital images. Int J Comput Electr Eng 2(4):1793–8163
Chao H, Hsu C, Miaou S (2002) A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6(1):46–53
Chauhan DS, Singh AK, Kumar B, Saini JP (2017) Quantization based multiple medical information watermarking for secure e-health. In: Quantization based multiple medical information watermarking for secure e-health, multimedia tools and applications. Springer, USA, pp 1–13. https://doi.org/10.1007/s11042-017-4886-4
Coatrieux G, Maitre H, Sankur B (2001) Strict integrity control of biomedical images. In: Proc. SPIE security watermarking multimedia contents III, SPIE, San Jose, CA, vol 4314, pp 229–240
Davie B, Florence V, Friede A, Sheehan J, Sisk J (2001) Bringing health-care applications to the internet. IEEE Internet Comput 5(3):42–46
Elizee ZA, Babazadeh A, Mohammad S, Hosseini S (2010) Optimizing product design through a particle swarm induced logistic regression model. Majlesi J Mech Eng 3(2)
Gen M, Cheng R (1997) Genetic algorithms and engineering design. Wiley, New York
Giakoumaki A, Pavlopoulos S, Koutsouris D (2004) A mulitple watermarking scheme applied to medical image management. Proceedings of the 26th annual international conference of the IEEE EMBS San Francisco, CA, USA, pp 3241–3244
Golub GH, Van Loan CF (1989) Matrix computations. Johns Hopkins Univ Press, Baltimore
Hong W, Hang M (2006) Robust digital watermarking scheme for copy right protection. IEEE Trans Signal Process 12:1–8
Kuang LQ, Zhang Y, Han X (2009) A medical image authentication system based on reversible digital watermarking. Information Science and Engineering (ICISE), 1st international conference, pp 1047–1050
Kumar C, Singh AK, Kumar P (2017) A recent survey on image watermarking techniques and its application in e-governance. Multimed Tools Appl, Springer 77:3597–3622. https://doi.org/10.1007/s11042-017-5222-8
Kundur D, Hatzinakos D (1998) Digital watermarking using multiresolution wavelet decomposition. Proc IEEE Int Conf Acoust Speech Signal Process, Seattle 12(15):2969–2972
Liew S, Zain J (2011) Tamper localization and lossless recovery watermarking scheme. Commun Comput Inf Sci 179(1):555–566
Liew S, Way S, Zain J (2012) Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 24:114–125
Mahajan LH, Patil SA (2013) Image watermarking scheme using SVD. Int J Adv Res Sci Eng 2(6):69–77
McEvoy F, Svalastoga E (2007) Security of patient and study data associated with DICOM images when transferred using compact disc media. J Digit Imaging 22(1):65–70
Memon NA, Gilani SAM (2008) NROI watermarking of medical images for content authentication. In Proceedings of 12th IEEE international multitopic conference, Karachi, Pakistan, pp 106–110
Ming-Shi W, Wei-Che C (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Comput Stand Interfaces 31(4):757–762
Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C (2010) Medical image integrity control combining digital signature and lossless watermarking. In: Garcia-Alfaro J et al (eds) Data privacy management and autonomous spontaneous security. Springer Berlin, Heidelberg, pp 153–162
Pandey R, Singh AK, Kumar B, Mohan A (2016) Iris based secure NROI multiple eye image watermarking for Teleophthalmology. Multimed Tools Appl 75(22):14381–14397
Parah SA, Sheikh JA, Ahad F, Loan NA, Mohiuddin Bhat G (2015) Information hiding in medical images: a robust medical image watermarking system for e-healthcare. Multimed Tools Appl: 1–35
Pereira S, Voloshynovskiy S, Madueño M, Marchand-Maillet S, Pun T (2001) Second generation benchmarking and application oriented evaluation. Information hiding workshop III, Pittsburgh, pp 340–353
Puech W (2008) An efficient hybrid method for safe transfer of medical images. 2nd international conference: e-medical systems, Tunisia, pp 29–31
Rosiyadi D, Horng S-J, Suryana N, Masthurah N (2012) A comparison between the hybrid using genetic algorithm and the pure hybrid watermarking scheme. Int J Comp Theory Eng (IJCTE) 4(3):329–331
Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking technique for medical images. Wirel Pers Commun 92(4):1611–1624
Singh AK (2016) Improved hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl, Springer 76:8881–8900. https://doi.org/10.1007/s11042-016-3514-z
Singh A, Tayal A (2012) Choice of wavelet from wavelet families for DWT–DCT–SVD image watermarking. Int J Comput Appl 48(17):9–14
Singh AK, Dave M, Mohan A (2014) Wavelet based image watermarking: futuristic concepts in information security. Proc Natl Acad Sci India Sect A Phys Sci 84(3):345–359
Singh AK, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381–8401
Singh AK, Dave M, Mohan A (2015) Robust and secure multiple watermarking in wavelet domain, a special issue on Advanced Signal Processing Technologies and Systems for Healthcare Applications(ASPTSHA). J Med Imaging Health Inform 5(2):406–414
Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-Spectrum in DWT domain. Wirel Pers Commun 83(3):2133–2150
Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible spread-spectrum watermarking for telemedicine applications. Proc Natl Acad Sci, India Sect A: Phys Sci 85(2):295–301. https://doi.org/10.1007/s40010-014-0197-6
Singh AK, Kumar B, Dave M, Ghrera SP, Mohan A (2016) Digital image watermarking: techniques and emerging applications. Handbook of research on modern cryptographic solutions for computer and cyber security, (IGI Global, USA), pp 246–272. https://doi.org/10.4018/978-1-5225-0105-3.ch011
Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Futur Gener Comput Syst, Elsevier:1–16. https://doi.org/10.1016/j.future.2016.11.023
Singh AK, Kumar B, Singh G, Mohan A (2017) Medical image watermarking: techniques and applications, book series on multimedia systems and applications. Springer, USA ISBN: 978-3319576985
Srivastava R, Kumar B, Singh AK, Mohan A (2017) Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach. Multimed Tools Appl, Springer US. https://doi.org/10.1007/s11042-017-5214-8
Surekha P, Sumathi S (2011) Implementation of genetic algorithm for a DWT based image watermarking scheme. Ictact J Soft Comput: Spec Issue Fuzzy Ind Process Autom 2(1):244–252
Swaraja K, Madhaveelatha Y, Reddy VSK (2016) Robust video watermarking by amalgamation of image transforms and optimized firefly algorithm. Int J Appl Eng Res 11(1):216–225
Umamageswari A, Ferni U, Suresh G (2011) A survey on security in medical image communication. Int J Comput Appl 30(3):41–45
Vafaei M, Mahdavi-Nasab H, Pourghassem H (2013) A new robust blind watermarking method based on neural networks in wavelet transform domain. World Appl Sci J 22(11):1572–1580
Velumani R, Seenivasagam V (2010) A reversible blind medical image watermarking scheme for patient identification, improved telediagnosis and tamper detection with a facial image watermark. IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp 1–8
Wei Z, Li H, Dai J, Wang S (2006) Image watermarking based on genetic algorithm. IEEE International Conference on Multimedia and Expo, Toronto, Ont., pp 1117–1120
Xia XG, Boncelet CG, Arce GR (1997) A multiresolution watermark for digital images. Proceedings of the international conference on image processing, Santa Barbara, pp 548–551
Yang E, Erdogan AT, Arslan T, Barton N (2007) An improved particle swarm optimization algorithm for power-efficient wireless sensor networks. ECSIS symposium on bio-inspired learning and intelligent system for security
Yavus E, Telatar Z (2007) Improved SVD-DWT based digital image watermarking against watermark ambiguity. In: Proceedings of the ACM symposium on applied computing, Seoul, Korea, pp 1051–1055
Yen CT, Huang YJ (2015) Frequency domain digital watermark recognition using image code sequences with a back-propagation neural network. Multimed Tools Appl. https://doi.org/10.1007/s11042-015-2718-y
Zain J, Clarke M (2005) Security in telemedicine: issues in watermarking medical images. Sciences of Electronic, Technologies of Information and Telecommunications, Tunisia
Zear A, Singh AK, Kumar P (2016) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools Appl 77:4863–4882. https://doi.org/10.1007/s11042-016-3862-8
Zear A, Singh AK, Kumar P (2016) Multiple Watermarking for Healthcare Applications. J Intell Syst, Walter de Gruyter GmbH & Co. KG, Germany 27:5–18. https://doi.org/10.1515/jisys-2016-0036
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Swaraja K Medical image region based watermarking for secured telemedicine. Multimed Tools Appl 77, 28249–28280 (2018). https://doi.org/10.1007/s11042-018-6020-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6020-7