Skip to main content
Log in

Multi-level security of medical images based on encryption and watermarking for telemedicine applications

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a robust and hybrid domain watermarking scheme is proposed for the security of medical images in telemedicine applications. The secret identity of the patient is inserting into the cover medical image using the hybridization of ridgelet transform and singular value decomposition for the purposed of identification and authentication. For better security of watermarked medical image, the Arnold scrambling based encryption is applying to it before sending it at the receiver end. The main advantage of this scheme is multi-level security where secret patient information is inserted to cover medical image to get a secure watermarked medical image using watermarking. Then, encryption is applied to the watermarked medical image to generate its encrypted version. Thus, this proposed scheme provides multi-level security using watermarking and encryption. The advantage of multi-level security in the proposed scheme is that if an imposter or attacker tries to get patient identity from the medical image, he or she requires multiple information in terms of extraction steps and keys, etc. The other reason for proposed this scheme that it improves the payload capacity of many existing watermarking schemes. Experimental results of the scheme indicated that the proposed scheme provides high imperceptibility and more robustness against various types of attacks. Further, the performance of the proposed scheme is found better than existing medical watermarking schemes. Furthermore, quality checking of watermarked medical image is done by various quality measures which are indicated that the quality of the image has fulfilled the benefits of secure telemedicine applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) SVD-based robust image Steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement. 139:426–437

    Article  Google Scholar 

  2. Ashour AS, Dey N (2017) Security of multimedia contents: A brief. In Intelligent Techniques in Signal Processing for Multimedia Security (pp. 3–14). Springer, Cham

  3. Babu S, Kapinaiah V (2019) Medical image authentication using quartic digital signature algorithm. International Journal of Intelligent Information Systems 7(4):38–41

    Article  Google Scholar 

  4. Banerjee S, Chakraborty S, Dey N, Pal AK, Ray R (2015) High payload watermarking using a residue number system. International Journal of Image, Graphics and Signal Processing 3:1–8

    Article  Google Scholar 

  5. Borra S, Lakshmi HR (2015) Visual cryptography based lossless watermarking for sensitive images. In International Conference on Swarm, evolutionary, and memetic computing (pp. 29-39). Springer, Cham

  6. Borra S, Thanki R (2019) Crypto-watermarking scheme for tamper detection of medical images. Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, 1–11

  7. Borra S, Thanki R (2019) A FRT-SVD based blind medical watermarking technique for telemedicine applications. Int J Digit Crime Foren (IJDCF) 11(2):13–33

    Article  Google Scholar 

  8. Cox IJ, Miller ML, Bloom JA (2000) Watermarking applications and their properties. In Information Technology: Coding and Computing, 2000. Proceedings. International Conference on (pp. 6-10). IEEE

  9. Kim C, Shin D, Leng L, Yang CN (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71–79

    Article  Google Scholar 

  10. Kim C, Shin D, Leng L, Yang CN (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101–114

    Article  Google Scholar 

  11. Kutter M, Petitcolas FA (1999) Fair benchmark for image watermarking systems. In Security and Watermarking of Multimedia Contents (Vol. 3657, pp. 226-240). International Society for Optics and Photonics

  12. Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554

    Google Scholar 

  13. Leng L, Zhang J, Chen G, Khan MK, Alghathbar K (2011) Two-directional two-dimensional random projection and its variations for face and palmprint recognition. In International conference on computational science and its applications (pp. 458-470). Springer, Berlin, Heidelberg

  14. Leng L, Zhang S, Bi X, Khan MK (2012) Two-dimensional cancelable biometric scheme. In 2012 International Conference on Wavelet Analysis and Pattern Recognition (pp. 164-169). IEEE

  15. Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76(1):333–354

    Article  Google Scholar 

  16. Li M, Liang T, He YJ (2013) Arnold transform based image scrambling method. In: 3rd International Conference on Multimedia Technology. Atlantis Press, China, pp 1302–1309

  17. Medical Image Database. Available: https://medpix.nlm.nih.gov/. Last Access Year: 2017

  18. Menon V, Du Q, Fowler JE (2016) Fast SVD with random Hadamard projection for hyperspectral dimensionality reduction. IEEE Geosci Remote Sens Lett 13(9):1275–1279

    Article  Google Scholar 

  19. Pirbhulal S, Samuel OW, Wu W, Sangaiah AK, Li G (2019) A joint resource-aware and medical data security framework for wearable healthcare systems. Futur Gener Comput Syst 95:382–391

    Article  Google Scholar 

  20. Priya S, Santhi B (2019) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mobile Networks and Applications, 1–8

  21. Roy S, Pal AK (2017) A robust blind hybrid image watermarking scheme in RDWT-DCT domain using Arnold scrambling. Multimed Tools Appl 76(3):3577–3616

    Article  Google Scholar 

  22. Singh, A. K., Kumar, B., Singh, G., & Mohan, A. (Eds.). (2017). Medical image watermarking: techniques and applications. Springer

  23. Singh S, Singh R, Singh AK, Siddiqui TJ (2018) SVD-DCT based medical image watermarking in NSCT domain. In Quantum Computing: An Environment for Intelligent Large-Scale Real Application (pp. 467–488). Springer, Cham

  24. Suckling J (1994) The mammographic image analysis society digital mammogram database. Exerpta Medica. Int Congr Ser 24(1069):375–378

    Google Scholar 

  25. Surekha B, Swamy GN (2011) A spatial domain public image watermarking. International Journal of Security and Its Applications 5(1):1–12

    Google Scholar 

  26. Thakur S, Singh AK, Ghrera SP, Mohan A (2018) Chaotic based secure watermarking approach for medical images. Multimedia Tools and Applications, 1–14

  27. Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78(3):3457–3470

    Article  Google Scholar 

  28. Thanki R, Borra S (2018) A color image steganography in hybrid FRT–DWT domain. J inform secur appl 40:92–102

    Google Scholar 

  29. Thanki R, Borra S (2018) Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing. Multimedia Tools and Applications, 1–20

  30. Thanki, R., & Borra, S. (2019). Medical imaging and its security in telemedicine applications. Springer International Publishing

  31. Thanki RM, Kothari AM (2017) Digital watermarking: technical art of hiding a message. Intelligent analysis of multimedia information (pp. 431–466). IGI global

  32. Thanki R, Borra S, Dwivedi V, Borisagar K (2017) An efficient medical image watermarking scheme based on FDCuT–DCT. Eng Sci Technol Int J 20(4):1366–1379

    Google Scholar 

  33. University of South Carolina SIPI Image Database: http://sipi.usc.edu/database/database.php, Last Access Year: 2017

  34. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–38

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rohit Thanki.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thanki, R., Kothari, A. Multi-level security of medical images based on encryption and watermarking for telemedicine applications. Multimed Tools Appl 80, 4307–4325 (2021). https://doi.org/10.1007/s11042-020-09941-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09941-z

Keywords

Navigation