Skip to main content
Log in

Context-based watermarking cum chaotic encryption for medical images in telemedicine applications

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we propose a security system for secure transmission of medical images in telemedicine applications. The system couples an IWT-LSB watermarking and an encryption based on random permutation and chaos, to ensure confidentiality, integrity, authentication and nonrepudiation of medical images. We use IWT due to the sensitive nature of medical images and the need to retain diagnostic quality after image reconstruction. During the watermarking phase, the medical image is decomposed into wavelet sub-bands. Electronic patient record and extracted context information are then embedded in the least significant bits of the detail sub-band (host) coefficients. During encryption, the reconstructed watermarked medical image is randomly permuted and the permuted pixels diffused with a chaotic key stream to produce the cipher watermarked image. Experimental results and analyzes show that the system provides sufficient security against various forms of attacks. Furthermore, we propose a security architecture for the system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Abdel-Nabi H, Al-Haj A (2017) Efficient joint encryption and data hiding algorithm for medical images security. In: 2017 8th international conference on information and communication systems (ICICS), pp 147–152. IEEE

  2. Abowd GD, Dey AK, Brown PJ, Davies N, Smith M, Steggles P (1999) Towards a better understanding of context and context-awareness. In: International Symposium on Handheld and Ubiquitous Computing, pp 304–307. Springer

  3. Al-Haj A, Mohammad A et al (2017) Crypto-watermarking of transmitted medical images. J Digit Imaging 30(1):26–38

    Article  Google Scholar 

  4. Al-Haj A et al (2014) Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 27(6):737–750

    Article  Google Scholar 

  5. Al-Husainy MAF (2012) A novel encryption method for image security, vol 6, pp 1–8

  6. AlShaikh M, Laouamer L, Nana L, Pascu AC (2017) Efficient and robust encryption and watermarking technique based on a new chaotic map approach. Multimedia Tools Appl 76(6):8937–8950

    Article  Google Scholar 

  7. Ansari IA, Pant M (2016) Multipurpose image watermarking in the domain of dwt based on svd and abc. Pattern Recognition Letters

  8. Ashtiyani M, Birgani PM, Hosseini HM (2008) Chaos-based medical image encryption using symmetric cryptography. In: 3rd international conference on information and communication technologies: from theory to applications, 2008. ICTTA 2008, pp 1–5. IEEE

  9. Badshah G, Liew SC, Zain JM, Ali M (2016) Watermark compression in medical image watermarking using lempel-ziv-welch (lzw) lossless compression technique. J Digit Imaging 29(2):216–225

    Article  Google Scholar 

  10. Bouslimi D, Coatrieux G (2016) A crypto-watermarking system for ensuring reliability control and traceability of medical images. Signal Process Image Commun 47:160–169

    Article  Google Scholar 

  11. Bouslimi D, Coatrieux G, Cozic M, Roux C (2012) A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Trans Inf Technol Biomed 16(5):891–899

    Article  Google Scholar 

  12. Calderbank A, Daubechies I, Sweldens W, Yeo BL (1998) Wavelet transforms that map integers to integers. Appl Comput Harmon Anal 5(3):332–369

    Article  MathSciNet  MATH  Google Scholar 

  13. Cancellaro M, Battisti F, Carli M, Boato G, De Natale FG, Neri A (2011) A commutative digital image watermarking and encryption method in the tree structured haar transform domain. Signal Process Image Commun 26(1):1–12

    Article  MATH  Google Scholar 

  14. Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R (2000) Relevance of watermarking in medical imaging. In: 2000 IEEE EMBS international conference on information technology applications in biomedicine, 2000. Proceedings, pp 250–255. IEEE

  15. Coatrieux G, Quantin C, Montagner J, Fassa M, Allaert FA, Roux C (2008) Watermarking medical images with anonymous patient identification to verify authenticity. In: MIE, vol 136, pp 667–672

  16. Covington MJ, Fogla P, Zhan Z, Ahamad M (2002) A context-aware security architecture for emerging applications. In: Computer Security Applications Conference, 2002. Proceedings. 18th Annual, pp 249–258. IEEE

  17. Cox IJ, Miller ML, Bloom JA, Honsinger C (2002) Digital watermarking, vol 1558607145. Springer, Berlin

    Google Scholar 

  18. Cui J, Liu Y, Xu Y, Zhao H, Zha H (2013) Tracking generic human motion via fusion of low-and high-dimensional approaches. IEEE Trans Syst Man Cybern Syst Hum 43(4):996–1002

    Article  Google Scholar 

  19. Dey AK, Abowd GD, Salber D (2001) A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Hum Comput Interact 16(2):97–166

    Article  Google Scholar 

  20. Dridi M, Hajjaji MA, Bouallegue B, Mtibaa A (2016) Cryptography of medical images based on a combination between chaotic and neural network. IET Image Process 10(11):830–839

    Article  Google Scholar 

  21. Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin If (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Lasers Eng 71:33–41

    Article  Google Scholar 

  22. Fu C, Meng WH, Zhan YF, Zhu ZL, Lau FC, Chi KT, Ma HF (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010

    Article  Google Scholar 

  23. Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Secure and efficient health data management through multiple watermarking on medical images. Med Biol Eng Comput 44(8):619

    Article  Google Scholar 

  24. Gross T, Specht M (2001) Awareness in context-aware information systems. In: Mensch & Computer 2001, pp 173–182. Springer

  25. Habutsu T, Nishio Y, Sasase I, Mori S (1991) A secret key cryptosystem by iterating a chaotic map. In: Eurocrypt, vol 91, pp 127–136. Springer

  26. Hajizadeh M, Helfroush MS, Dehghani MJ, Tashk A (2010) A robust blind image watermarking method using local maximum amplitude wavelet coefficient quantization. Advances Elect Comput Engineer 10(3):96–101

    Article  Google Scholar 

  27. Khalifa N, Filali RL, Benrejeb M (2015) On secure image transmission combining chaotic encryption and watermarking using dead beat synchronization of 4d henon maps. In: 2015 3rd International Conference on Control, Engineering & Information Technology (CEIT), pp 1–4. IEEE

  28. Kumar B, Anand A, Singh S, Mohan A (2011) High capacity spread-spectrum watermarking for telemedicine applications. World Acad Sci Eng Technol 79:2011

    Google Scholar 

  29. Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127–133

    Article  Google Scholar 

  30. Lima J, Madeiro F, Sales F (2015) Encryption of medical images based on the cosine number transform. Signal Process Image Commun 35:1–8

    Article  Google Scholar 

  31. Liu L, Cheng L, Liu Y, Jia Y, Rosenblum DS (2016) Recognizing complex activities by a probabilistic interval-based model. In: AAAI, vol 30, pp 1266–1272

  32. Maheshkar S et al Region-based hybrid medical image watermarking for secure telemedicine applications. Multimedia Tools and Applications pp. 1–31

  33. Maheshkar S et al (2017) Region-based hybrid medical image watermarking for secure telemedicine applications. Multimedia Tools Appl 76(3):3617–3647

    Article  Google Scholar 

  34. Memon NA, Chaudhry A, Ahmad M, Keerio ZA (2011) Hybrid watermarking of medical images for roi authentication and recovery. Int J Comput Math 88(10):2057–2071

    Article  Google Scholar 

  35. Memon NA, Gilani SAM (2011) Watermarking of chest ct scan medical images for content authentication. Int J Comput Math 88(2):265–280

    Article  MATH  Google Scholar 

  36. Metkar SP, Lichade MV (2013) Digital image security improvement by integrating watermarking and encryption technique. In: 2013 IEEE international conference on signal processing, computing and control (ISPCC), pp 1–6. IEEE

  37. Mitchell K (2002) A survey of context-awareness. University of Lancaster, Lancaster

    Google Scholar 

  38. Mitra A, Rao YS, Prasanna S et al (2006) A new image encryption approach using combinational permutation techniques. Int J Comput Sci 1(2):127–131

    Google Scholar 

  39. Nyeem H, Boles W, Boyd C (2013) A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326–343

    Article  Google Scholar 

  40. Paar C, Pelzl J (2009) Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media, Berlin

    MATH  Google Scholar 

  41. Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for e-healthcare. Multimedia Tools Appl 76(8):10,599–10,633

    Article  Google Scholar 

  42. Parvees MM, Samath JA, Bose BP (2016) Secured medical images-a chaotic pixel scrambling approach. J Med Syst 40(11):232

    Article  Google Scholar 

  43. Pascoe J (1998) Adding generic contextual capabilities to wearable computers. In: 2nd international symposium on wearable computers, 1998. Digest of Papers, pp 92–99. IEEE

  44. Piva A, Bianchi T, De Rosa A (2010) Secure client-side st-dm watermark embedding. IEEE Trans Inf Forensics Secur 5(1):13–26

    Article  Google Scholar 

  45. Prasanna S, Ashalatha M, Nirmala S, Haribhat K (2000) Study of permutations in the context of speech privacy. In: Proceeding of ECCAP, pp 99–106

  46. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2016) Chaos based crossover and mutation for securing dicom image. Comput Biol Med 72:170–184

    Article  Google Scholar 

  47. Rial A, Deng M, Bianchi T, Piva A, Preneel B (2010) A provably secure anonymous buyer–seller watermarking protocol. IEEE Trans Inf Forensics Secur 5(4):920–931

    Article  Google Scholar 

  48. Roussaki I, Strimpakou M, Kalatzis N, Anagnostou M, Pils C (2006) Hybrid context modeling: A location-based scheme using ontologies. In: 4th annual IEEE international conference on pervasive computing and communications workshops (PERCOMW’06), pp 6–pp. IEEE

  49. Salomon D (2004) Data compression: the complete reference. Springer Science & Business Media, Berlin

  50. Singh AK, Dave M, Mohan A (2015) Robust and secure multiple watermarking in wavelet domain. J Med Imaging Health Inf 5(2):406–414

    Article  Google Scholar 

  51. Solanki N, Malik SK (2014) Roi based medical image watermarking with zero distortion and enhanced security. Int J Modern Ed Comput Sci 6(10):40

    Article  Google Scholar 

  52. Tashk A, Danyali H, Alavianmehr MA (2012) A modified dual watermarking scheme for digital images with tamper localization/detection and recovery capabilities. In: 2012 9th international isc conference on information security and cryptology (ISCISC), pp 60–65. IEEE

  53. Thabit R, Khoo BE (2017) Medical image authentication using slt and iwt schemes. Multimedia Tools Appl 76(1):309–332

    Article  Google Scholar 

  54. Wang H, Ye JM, Liang HF, Miao ZH (2017) A medical image encryption algorithm based on synchronization of time-delay chaotic system. Adv Manuf 5:1–7

    Article  Google Scholar 

  55. Yoshida T, Mori H, Shigematsu H (1983) Analytic study of chaos of the tent map: band structures, power spectra, and critical behaviors. J Stat Phys 31(2):279–308

    Article  MathSciNet  Google Scholar 

  56. Zhang X, Qin C, Sun G (2012) Reversible data hiding in encrypted images using pseudorandom sequence modulation. In: International Workshop on Digital Watermarking, pp 358–367. Springer

  57. Zhou X, Huang H, Lou SA (2000) Secure method for sectional image archiving and transmission. In: Medical Imaging 2000: PACS Design and Evaluation: Engineering and Clinical Issues, vol 3980, pp 390–400. International Society for Optics and Photonics

  58. Zimmermann A, Lorenz A, Oppermann R (2007) An operational definition of context. In: International and Interdisciplinary Conference on Modeling and Using Context, pp 558–571. Springer

Download references

Acknowledgements

This paper was supported by the National Natural Science Foundation of China (Grant No. 61370073), the National High Technology Research and Development Program of China (Grant No. 2007AA01Z423), the project of Science and Technology Department of Sichuan Province.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joshua C. Dagadu.

Ethics declarations

Conflict of interests

There are no conflicts of interest

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dagadu, J.C., Li, J. Context-based watermarking cum chaotic encryption for medical images in telemedicine applications. Multimed Tools Appl 77, 24289–24312 (2018). https://doi.org/10.1007/s11042-018-5725-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5725-y

Keywords

Navigation