Skip to main content

Mammograms Multiple Watermarking Scheme Based on Visual Cryptography

  • Conference paper
  • First Online:
Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 380))

  • 874 Accesses

Abstract

Telemedicine applications require exposing medical data over open networks, which leads to illegal exploitations. However, safety and confidentiality are required for medical images, because critical judgment is done on those images. Therefore, we propose in this paper, a medical images multiple watermarking scheme. Considering the high sensitivity of medical images, the watermark is embedded without modifying the original host image. Based on visual cryptography concept, difference expansion technique and dominant blocks extraction, this scheme achieves copyright protection by a robust watermark and image authentication by a fragile watermark. The experimental results show that the proposed method can withstand several image processing attacks, and can easily prove the integrity of the image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zain, J.M., Fauzi, A.R.M.: Medical image watermarking with tamper detection and recovery. In: Proceedings of the 28th IEEE EMBS Annual International Conference (2006)

    Google Scholar 

  2. Giakoumaki, A., Pavlopoulos, S., Koutsouris, D.: Multiple image watermarking applied to health information management. IEEE Trans. Inf. Technol. Biomed. 10(4), 722–732 (2006)

    Article  Google Scholar 

  3. Guo, X., Zhuang, T.-G.: A region-based lossless watermarking scheme for enhancing security of medical data. J. Digit. Imaging, 1–12 (2007)

    Google Scholar 

  4. Osamah, M.: Al-Qershi and Bee Ee Khoo: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J. Digit. Imaging 24(1), 114–125 (2011)

    Article  Google Scholar 

  5. Naor, N., Shamir, A.: Visual cryptography. Advances in Cryptology: Eurocrypt’94, pp. 1–12 (1995)

    Google Scholar 

  6. Hwang, R.J.: A digital copyright protection scheme based on visual cryptography. Tamkang J. Sci. Eng. 3(3), 97–106 (2001)

    Google Scholar 

  7. Abusitta, A.H.: A visual cryptography based digital image copyright protection. J. Inf. Secur. 3, 96–104 (2012)

    Google Scholar 

  8. Surekha, B., Swamy, G.N.: Sensitive digital image watermarking for copyright protection. Int. J. Netw. Secur. 15(1), 95–103 (2013)

    Google Scholar 

  9. Benyoussef, M., Mabtoul, S., El Marraki, M., Aboutajdine, D.: Blind invisible watermarking technique in DT-CWT domain using visual cryptography. ICIAP, Part I, LNCS 8156, 813–822 (2013)

    Google Scholar 

  10. Douzi, H., Mammass, D., Nouboud, F.: Faber-Schauder wavelet transformation application to edge detection and image characterization. J. Math. Imaging Vis. 14(2), 91–102 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  11. El hajji, M., Douzi, H., Harba, R.: Watermarking based on the density coefficients of Faber-Schauder wavelets. ICISP, LNCS. pp. 455–462 (2008)

    Google Scholar 

  12. Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meryem Benyoussef .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Benyoussef, M., Mabtoul, S., Marraki, M.E., Aboutajdine, D. (2016). Mammograms Multiple Watermarking Scheme Based on Visual Cryptography. In: El Oualkadi, A., Choubani, F., El Moussati, A. (eds) Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015. Lecture Notes in Electrical Engineering, vol 380. Springer, Cham. https://doi.org/10.1007/978-3-319-30301-7_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30301-7_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30299-7

  • Online ISBN: 978-3-319-30301-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics