Skip to main content

Pixel Repetition Technique: A High Capacity and Reversible Data Hiding Method for E-Healthcare Applications

  • Chapter
  • First Online:
Intelligent Techniques in Signal Processing for Multimedia Security

Part of the book series: Studies in Computational Intelligence ((SCI,volume 660))

Abstract

Electronic healthcare is changing the world worldwide scenario of the conventional healthcare. Transmission of medical images in e-healthcare system is of greater importance, because of the valuable information carried out by them for the purpose of tele-diagnosis and tele-medicine. For successful tele-diagnosis, it is imperative that the medical images should not be tampered with during transit. In this chapter, a high capacity and reversible data hiding system utilizing Pixel Repetition Technique (PRT) has been proposed. The usage of PRT for preprocessing reduces the computational complexity drastically. The proposed system is capable of any sort of tamper detection. This has been achieved by embedding a fragile watermark (computed from checksum of the cover medium blocks) in addition to electronic patient record (EPR). Block-wise division of cover image and intermediate significant bit (ISB) substitution have been used for data embedding. A detailed experimentation carried out shows that besides supporting high payload and reversibility our technique is capable of detecting any tamper caused due to signal processing and geometric attacks. Further, less computational complexity makes the proposed scheme an ideal candidate for real-time electronic healthcare applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dey N, Samanta S, Yang XS, Das A, Chaudhuri SS (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput 5(5):315–326

    Article  Google Scholar 

  2. Shabir AP, Frahana A, Javaid AS, Bhat GM (2015) On the realization of robust watermarking system for medical images. In: 12th IEEE India international conference (INDICON) on electronics, energy, environment, communication, computers, control (E3-C3), 17–20 December 2015, Jamia Millia Islamia, New Delhi

    Google Scholar 

  3. Shabir AP, Javaid AS, Mohiuddin GB (2015) Hiding in encrypted images: a three tier security data hiding system. Multidimension Syst Signal Process. doi:10.1007/s11045-015-0358-z

    Google Scholar 

  4. Dey N, Das P, Roy AB, Das A, Chaudhuri SS (2012) DWT-DCT-SVD based intravascular ultrasound video watermarking. In: 2012 world congress on information and communication technologies (WICT), IEEE, pp. 224–229

    Google Scholar 

  5. Shabir AP, Javaid AS, Mohiuddin GB (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40(1):70–82

    Article  Google Scholar 

  6. Mohamed MA (2013) A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine. Egypt Informat J 14:1–13

    Article  MathSciNet  Google Scholar 

  7. Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC), IEEE, pp 1–6

    Google Scholar 

  8. Shabir AP, Javaid AS, Mohiuddin GB (2012) High capacity data embedding using joint intermediate significant bit and least significant technique. Int J Inf Eng Appl 2(11). ISSN 2224-5782(print) ISSN 2225-0506 (online)

    Google Scholar 

  9. Bhat GM, Shabir AP, Javaid AS (2010) FPGA implementation of novel complex PN code generator based data scrambler and descrambler. Int J Sci Technol Thail 4(01):125–135

    Google Scholar 

  10. Shabir AP, Shazia A (2015) Robustness analysis of a digital image watermarking technique for various frequency bands in DCT domain. In: Proceedings of IEEE international conference iNiS, 21–23 December, Indore, India

    Google Scholar 

  11. Shabir AP, Javaid AS, Mohiuddin GB (2014) A secure and robust information hiding technique for covert communication. Int J Electron 102(8):1253–1266. doi:10.1080/00207217.2014.954635

    Google Scholar 

  12. Shabir AP, Jahangir AA, Javaid AS, Nazir AL, Farhana A, Bhat GM (2015) A high capacity data hiding scheme based on edge detection and even-odd plane separation. In: 12th IEEE India international conference (INDICON) on electronics, energy, environment, communication, computers, control (E3-C3), 17–20 December 2015, Jamia Millia Islamia, New Delhi

    Google Scholar 

  13. Acharjee S, Chakraborty S, Samanta S, Azar AT, Hassanien AE, Dey N (2014) Highly secured multilayered motion vector watermarking. In: Advanced machine learning technologies and applications, Springer International Publishing, pp 121–134

    Google Scholar 

  14. Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm for optimization of scaling factors during embedding of manifold medical information: an application in ophthalmology imaging. J Med Imaging Health Inform 4(3):384–394

    Article  Google Scholar 

  15. Shabir AP, Javaid AS, Mohiuddin GB (2014) A secure and efficient spatial domain data hiding technique based on pixel adjustment. Am J Eng Technol Res 14(2):38–44

    Google Scholar 

  16. Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: 2014 international conference on electronic systems, signal processing and computing technologies (ICESC), IEEE, pp 105–110

    Google Scholar 

  17. Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) An edge based blind watermarking technique of medical images without devalorizing diagnostic parameters. In: 2013 international conference on advances in technology and engineering (ICATE), IEEE, pp 1–5

    Google Scholar 

  18. Shabir AP, Javaid AS, Farhana A, Nazir AL, Bhat GM (2015) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools Appl. doi:10.1007/s11042-015-3127-y

    Google Scholar 

  19. Baiying L, Ee-Leng T, Siping C, Dong N, Tianfu W, Haijun L (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41:3178–3188

    Article  Google Scholar 

  20. Arijit KP, Nilanjan D, Sourav S, Achintya D, Sheli SC (2013) A hybrid reversible watermarking technique for color biomedical images. In: IEEE international conference on computational intelligence and computing research, IEEE, 978-1-4799-1597-2/13

    Google Scholar 

  21. Pal AK, Das P, Dey N (2013) Odd-even embedding scheme based modified reversible watermarking technique using Blueprint. arXiv preprint arXiv:1303.5972

  22. Rahimi F, Rabbani H (2011) A dual adaptive watermarking scheme in contourlet domain for DICOM images. Biomedical Engineering Online

    Google Scholar 

  23. Malay KK, Sudeb D (2010) Lossless ROI medical image watermarking technique with enhanced security and high payload embedding. In: IEEE international conference on pattern recognition, pp 1457–1460

    Google Scholar 

  24. Jianfeng L, Meng W, Junping D, Qianru H, Li L, Chin-Chen C (2015) Multiple watermark scheme based on DWT-DCT quantization for medical images. J Inf Hiding Multimedia Signal Process, 6. ISSN 2073-4212

    Google Scholar 

  25. Solanki N, Malik SK (2014) ROI based medical image watermarking with zero distortion and enhanced security. Int J Educ Comput Sci 10:40–48

    Article  Google Scholar 

  26. Sumalatha L, Rosline KG, Vijaya VK (2012) A simple block based content watermarking scheme for image authentication and tamper detection. Int J Soft Comput Eng (IJSCE) 2

    Google Scholar 

  27. Guo X, Zhuan T (2009) Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22:620–628

    Article  Google Scholar 

  28. Abhilasha S, Malay KD (2014) A blind and fragile watermarking scheme for tamper detection of medical images preserving ROI. In: International conference on medical imaging, m-health and emerging communication systems (MedCom), IEEE

    Google Scholar 

  29. Moniruzzaman M, Hawlader MAK, Hossain MF (2014) Wavelet based watermarking approach of hiding patient information in medical image for medical image authentication. In: 17th international conference on computer and information technology, Daffodil International University, Dhaka, Bangladesh, IEEE

    Google Scholar 

  30. Lee C-F, Huang Y-L (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39:6712–6719

    Article  Google Scholar 

  31. Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layer embedding. Optik 125:3972–3976

    Article  Google Scholar 

  32. Hu J, Li T (2015) Reversible steganography using extended image interpolation technique. Comput Electr Eng. doi:10.1016/j.compeleceng.2015.04.014

    Google Scholar 

  33. Kamran AK, Malik SA (2014) A high capacity reversible watermarking approach for authenticating images: exploiting down-sampling, histogram processing, and block selection. Inf Sci 256:162–183

    Article  Google Scholar 

  34. Naheed T, Usman I, Khan TM, Dar AH, Shafique MF (2013) Intelligent reversible watermarking technique in medical images using GA and PSO. Optik. doi:10.1016/j.ijleo.2013.10.2014

    Google Scholar 

  35. Arsalan M, Sana AM, Asifullah K (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85:883–894

    Article  Google Scholar 

  36. HK Maity, SP Maity (2012) Joint robust and reversible watermarking for medical images. In: 2nd international conference on communication, computing and security [ICCCS-2012], Elsevier, Procedia Technology, vol 6, pp 275–282

    Google Scholar 

  37. Tsai P, Yu CH, Hsiu LY (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Sig Process 89:1129–1143

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. A. Parah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Parah, S.A., Ahad, F., Sheikh, J.A., Loan, N.A., Bhat, G.M. (2017). Pixel Repetition Technique: A High Capacity and Reversible Data Hiding Method for E-Healthcare Applications. In: Dey, N., Santhi, V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44790-2_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44789-6

  • Online ISBN: 978-3-319-44790-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics