Abstract
In this paper, a robust and hybrid domain watermarking scheme is proposed for the security of medical images in telemedicine applications. The secret identity of the patient is inserting into the cover medical image using the hybridization of ridgelet transform and singular value decomposition for the purposed of identification and authentication. For better security of watermarked medical image, the Arnold scrambling based encryption is applying to it before sending it at the receiver end. The main advantage of this scheme is multi-level security where secret patient information is inserted to cover medical image to get a secure watermarked medical image using watermarking. Then, encryption is applied to the watermarked medical image to generate its encrypted version. Thus, this proposed scheme provides multi-level security using watermarking and encryption. The advantage of multi-level security in the proposed scheme is that if an imposter or attacker tries to get patient identity from the medical image, he or she requires multiple information in terms of extraction steps and keys, etc. The other reason for proposed this scheme that it improves the payload capacity of many existing watermarking schemes. Experimental results of the scheme indicated that the proposed scheme provides high imperceptibility and more robustness against various types of attacks. Further, the performance of the proposed scheme is found better than existing medical watermarking schemes. Furthermore, quality checking of watermarked medical image is done by various quality measures which are indicated that the quality of the image has fulfilled the benefits of secure telemedicine applications.
Similar content being viewed by others
References
Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) SVD-based robust image Steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement. 139:426–437
Ashour AS, Dey N (2017) Security of multimedia contents: A brief. In Intelligent Techniques in Signal Processing for Multimedia Security (pp. 3–14). Springer, Cham
Babu S, Kapinaiah V (2019) Medical image authentication using quartic digital signature algorithm. International Journal of Intelligent Information Systems 7(4):38–41
Banerjee S, Chakraborty S, Dey N, Pal AK, Ray R (2015) High payload watermarking using a residue number system. International Journal of Image, Graphics and Signal Processing 3:1–8
Borra S, Lakshmi HR (2015) Visual cryptography based lossless watermarking for sensitive images. In International Conference on Swarm, evolutionary, and memetic computing (pp. 29-39). Springer, Cham
Borra S, Thanki R (2019) Crypto-watermarking scheme for tamper detection of medical images. Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, 1–11
Borra S, Thanki R (2019) A FRT-SVD based blind medical watermarking technique for telemedicine applications. Int J Digit Crime Foren (IJDCF) 11(2):13–33
Cox IJ, Miller ML, Bloom JA (2000) Watermarking applications and their properties. In Information Technology: Coding and Computing, 2000. Proceedings. International Conference on (pp. 6-10). IEEE
Kim C, Shin D, Leng L, Yang CN (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71–79
Kim C, Shin D, Leng L, Yang CN (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101–114
Kutter M, Petitcolas FA (1999) Fair benchmark for image watermarking systems. In Security and Watermarking of Multimedia Contents (Vol. 3657, pp. 226-240). International Society for Optics and Photonics
Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554
Leng L, Zhang J, Chen G, Khan MK, Alghathbar K (2011) Two-directional two-dimensional random projection and its variations for face and palmprint recognition. In International conference on computational science and its applications (pp. 458-470). Springer, Berlin, Heidelberg
Leng L, Zhang S, Bi X, Khan MK (2012) Two-dimensional cancelable biometric scheme. In 2012 International Conference on Wavelet Analysis and Pattern Recognition (pp. 164-169). IEEE
Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76(1):333–354
Li M, Liang T, He YJ (2013) Arnold transform based image scrambling method. In: 3rd International Conference on Multimedia Technology. Atlantis Press, China, pp 1302–1309
Medical Image Database. Available: https://medpix.nlm.nih.gov/. Last Access Year: 2017
Menon V, Du Q, Fowler JE (2016) Fast SVD with random Hadamard projection for hyperspectral dimensionality reduction. IEEE Geosci Remote Sens Lett 13(9):1275–1279
Pirbhulal S, Samuel OW, Wu W, Sangaiah AK, Li G (2019) A joint resource-aware and medical data security framework for wearable healthcare systems. Futur Gener Comput Syst 95:382–391
Priya S, Santhi B (2019) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mobile Networks and Applications, 1–8
Roy S, Pal AK (2017) A robust blind hybrid image watermarking scheme in RDWT-DCT domain using Arnold scrambling. Multimed Tools Appl 76(3):3577–3616
Singh, A. K., Kumar, B., Singh, G., & Mohan, A. (Eds.). (2017). Medical image watermarking: techniques and applications. Springer
Singh S, Singh R, Singh AK, Siddiqui TJ (2018) SVD-DCT based medical image watermarking in NSCT domain. In Quantum Computing: An Environment for Intelligent Large-Scale Real Application (pp. 467–488). Springer, Cham
Suckling J (1994) The mammographic image analysis society digital mammogram database. Exerpta Medica. Int Congr Ser 24(1069):375–378
Surekha B, Swamy GN (2011) A spatial domain public image watermarking. International Journal of Security and Its Applications 5(1):1–12
Thakur S, Singh AK, Ghrera SP, Mohan A (2018) Chaotic based secure watermarking approach for medical images. Multimedia Tools and Applications, 1–14
Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78(3):3457–3470
Thanki R, Borra S (2018) A color image steganography in hybrid FRT–DWT domain. J inform secur appl 40:92–102
Thanki R, Borra S (2018) Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing. Multimedia Tools and Applications, 1–20
Thanki, R., & Borra, S. (2019). Medical imaging and its security in telemedicine applications. Springer International Publishing
Thanki RM, Kothari AM (2017) Digital watermarking: technical art of hiding a message. Intelligent analysis of multimedia information (pp. 431–466). IGI global
Thanki R, Borra S, Dwivedi V, Borisagar K (2017) An efficient medical image watermarking scheme based on FDCuT–DCT. Eng Sci Technol Int J 20(4):1366–1379
University of South Carolina SIPI Image Database: http://sipi.usc.edu/database/database.php, Last Access Year: 2017
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–38
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Thanki, R., Kothari, A. Multi-level security of medical images based on encryption and watermarking for telemedicine applications. Multimed Tools Appl 80, 4307–4325 (2021). https://doi.org/10.1007/s11042-020-09941-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09941-z