Journal of Medical Systems

, Volume 36, Issue 5, pp 3339–3351 | Cite as

Effective Management of Medical Information Through A Novel Blind Watermarking Technique

  • Sudeb DasEmail author
  • Malay Kumar Kundu
Original Paper


Medical Data Management (MDM) domain consists of various issues of medical information like authentication, security, privacy, retrieval and storage etc. Medical Image Watermarking (MIW) techniques have recently emerged as a leading technology to solve the problems associated with MDM. This paper proposes a blind, Contourlet Transform (CNT) based MIW scheme, robust to high JPEG and JPEG2000 compression and simultaneously capable of addressing a range of MDM issues like medical information security, content authentication, safe archiving and controlled access retrieval etc. It also provides a way for effective data communication along with automated medical personnel teaching. The original medical image is first decomposed by CNT. The Low pass subband is used to embed the watermark in such a way that enables the proposed method to extract the embedded watermark in a blind manner. Inverse CNT is then applied to get the watermarked image. Extensive experiments were carried out and the performance of the proposed scheme is evaluated through both subjective and quantitative measures. The experimental results and comparisons, confirm the effectiveness and efficiency of the proposed technique in the MDM paradigm.


Digital watermarking Contourlet Compression Medical imaging EHR/PHR DICOM 



The authors thank the editor and the anonymous reviewers for their careful work and valuable suggestions. We would also like to thank Machine Intelligence Unit, Indian Statistical Institute, Kolkata-108 (Internal Academic Project) for providing facilities to carry out this work. We are grateful to Dr. Pradip Kumar Das (Dept. of Radiology, Sonoscan Healthcare (P) Limited, Malda, West Bengal) for the subjective evaluation of the watermarked images.


  1. 1.
    Siegel, E. L., and Kolodner, R. M., Filmless radiology. New York: Springer, 1999.CrossRefGoogle Scholar
  2. 2.
    Kaihara, S., Realization of the computerized patient record; relevance and unsolved problems. Int. J. Med. Inform. 1(49):1–8, 1998.CrossRefGoogle Scholar
  3. 3.
    Coatrieux, G., Maitre, H., Sankur, B., Rolland, Y., and Collorec, R., Relevance of watermarking in medical imaging. In: Proc. IEEE EMBS Information Technology Applications in Biomedicine, pp. 250–255, 2000.Google Scholar
  4. 4.
    Coatrieux, G., Maitre, H., and Sankur, B., Strict integrity control of biomedical images. In: Proc. SPIE Security Watermarking Multimedia Contents III, Vol. 4314, pp. 229–240, 2001.Google Scholar
  5. 5.
    Rao, N. V., and Meena Kumari, V., Watermarking in medical imaging for security and authentication. Information Security Journal: A Global Perspective 20(3):148–155, 2011.CrossRefGoogle Scholar
  6. 6.
    Petitcolas, F. A. P., Anderson, R. J., and Kuhn, M. G., Information hiding—a survey. In: Proc. IEEE Special Issue on Protection of Multimedia Content, Vol. 87(7), pp. 1062–1078, 1999.Google Scholar
  7. 7.
    Cox, I. J., and Miller, M. L., The first 50 years of electronic watermarking. EURASIP J. Appl. Signal Process. - Emerging Applications of Multimedia Data Hiding 2002(2):126–132, 2002.zbMATHGoogle Scholar
  8. 8.
    Guo, X., and Zhuang, T. G., A region-based lossless watermarking scheme for enhancing security of medical data. J. Digit. Imaging 22(1):53–64, 2009.CrossRefGoogle Scholar
  9. 9.
    Giakoumaki, A., Pavlopoulos, S., and Koutsouris, D., Multiple image watermarking applied to health information management. IEEE Trans. Inf. Technol. Biomed. 10(4):722–732.Google Scholar
  10. 10.
    Nergui, M., Acharya, U. S., Acharya, U. R., and Yu, W., Reliable and robust transmission and storage techniques for medical images with patient information. J. Med. Syst. 34(6):1129–1139, 2010.CrossRefGoogle Scholar
  11. 11.
    Zain, J. M., and Fauzi, A. R. M., Medical image watermarking with tamper detection and recovery. In: Proc. of the 28th IEEE EMBS Annual International Conference, pp. 3270–3273, 2006.Google Scholar
  12. 12.
    Kundu, M. K., and Das, S., Lossless ROI medical image watermarking technique with enhanced security and high payload embedding. In: Proc. International Conference on Patter Recognition, pp. 1457–1460, 2010.Google Scholar
  13. 13.
    Chao, H. M., Hsu, C. M., and Miaou, S. G., A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans. Inf. Technol. Biomed. 6(1):46–53, 2002.CrossRefGoogle Scholar
  14. 14.
    Wu, J. H., Chang, R. F., Chen, C. J., Wang, C. L., Kuo, T. H., Moon, W. K., and Chen, D.-R., Tamper detection and recovery for medical images using near-lossless information hiding technique. J. Digit. Imaging 21(1):59–76, 2008.CrossRefGoogle Scholar
  15. 15.
    Manasrah, T., and Al-Haj, A., Management of medical images using wavelets-based multi-watermarking algorithm. In: Proc. International Conference on Innovations in Information Technology, pp. 697–701, 2008.Google Scholar
  16. 16.
    Lee, H.-K., Kim, H.-J., Kwon, K.-R., and Lee, J.-K., ROI medical image watermarking using DWT and bit-plane. In: Proc. Asia-Pacific Conf. Communica., pp. 512–515, 2005.Google Scholar
  17. 17.
    Das, S., and Kundu, M. K., Hybrid contourlet-DCT based robust image watermarking technique applied to medical data management. In Proc. 4th International Conference on Pattern Recognition and Machine Intelligence, pp. 286–292, 2011.Google Scholar
  18. 18.
    Navas, K. A., and Sasikumar, M., Survey of medical image watermarking algorithms. In: Proc. Internation Conf. Sciences of Electronics, Technologies of Information and Telecommunications, pp. 25–29, 2007.Google Scholar
  19. 19.
    Robinson, G. P., Tagare, H. D., Duncan, J. S., and Jaffe, C. C., Medical image collection indexing: Shape-based retrieval using KD-trees. Comput. Med. Imaging Graph. 20(4):209–217, 1996.CrossRefGoogle Scholar
  20. 20.
    Do, M. N., and Vetterli, M., The contourlet transform: An efficient directional multiresolution image representation. IEEE Trans. Image Process. 14(12):2091–2106, 2005.MathSciNetCrossRefGoogle Scholar
  21. 21.
    Burt, P. J., and Adelson, E. H., The Laplacian pyramid as a compact image code. IEEE Trans. Commun. 31(4):532–540, 1983.CrossRefGoogle Scholar
  22. 22.
    Bamberger, R. H., and Smith, M. J. T., A filter bank for the directional decomposition of images: Theory and design. IEEE Trans. Signal Process. 40(4):882–893, 1992.CrossRefGoogle Scholar
  23. 23.
    Wang, Z., Bovik, A. C., Sheikh, H. R., and Simoncelli, E. P., Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 13(4):600–612, 2004.CrossRefGoogle Scholar
  24. 24.
    Watson, A. B., DCT quantization matrices visually optimized for individual images. In: Proc. SPIE: Human Vision, Visual Processing and Digital Display IV, Vol. 1913, pp. 202–216, 1993.Google Scholar
  25. 25.
    Pereira, S., Voloshynovskiy, S., Madueno, M., Marchand-Maillet, S., and Pun, T., Second generation benchmarking and application oriented evaluation. In: Proc. of the 4th International Workshop on Information Hiding, IHW ’01, pp. 340–353, 2001.Google Scholar
  26. 26.
    Mostafa, S. A. K., El-sheimy, N., Tolba, A. S., Abdelkader, F. M., and Elhindy, H. M., Wavelet packets-based blind watermarking for medical image management. Open Biomed. Eng. J. 4:93–98, 2010.CrossRefGoogle Scholar
  27. 27.
    Rahimi, F., and Rabbani, H., A dual adaptive watermarking scheme in contourlet domain for DICOM images, Biomed. Eng. Online 10(53):1–18, 2011.Google Scholar
  28. 28.
    Huang, W.-T., Tan, S.-Y., Chang, Y.-J., and Chen, C.-H., A robust watermarking technique for copyright protection using discrete wavelet transform. J. WSEAS Trans. Comput. 9(5):485–495, 2010.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  1. 1.Machine Intelligence UnitIndian Statistical InstituteKolkata-108India

Personalised recommendations