A Novel Visual Medical Image Encryption for Secure Transmission of Authenticated Watermarked Medical Images

  • S. PriyaEmail author
  • B. Santhi


Secure medical data transmission is the important criteria in tele-medicine. It is helpful for getting the exact medical information at the remote specialist’s side from the local doctor. The medical image watermarking technique is used for secure medical data transmission. Electronic patient record (EPR) is embedded within the original medical image to produce the watermarked medical image for protecting the patient information. The watermarked medical image visually looks like the original medical image. Hence the attacker visually knows the medical image transmission and easily attacks the system. To avoid this situation, image encryption technique is used to change the visual structure of the watermarked medical image. Normal image encryption gives the noise-like or texture-like unknown image format which indicates an existence of some secret information as the encrypted image. To overcome this problem, this paper proposed a visual medical image encryption technique to protect the existence of the watermarked medical image. And to ensure the source authentication, a biometric based authentication is also proposed. The watermarked medical image is encrypted using the proposed visually meaning full image encryption along with the fingerprint image. Experimental results prove that the proposed method yields good results and mitigate the attacker challenges.


Medical image watermarking Image encryption Integer wavelet transform Biometric authentication 


Compliance with Ethical Standards

Conflict of interests

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.


  1. 1.
    Tan Y, Xue Y, Liang C, Zheng J, Zhang Q, Zheng J, Li Y (2018) A root privilege management scheme with revocable authorization for android devices. J Netw Comput Appl 107:69–82CrossRefGoogle Scholar
  2. 2.
    Li X, Li J, Huang F (2016) A secure cloud storage system supporting privacy-preserving fuzzy deduplication. Soft Comput 20(4):1437–1448CrossRefGoogle Scholar
  3. 3.
    Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless information hiding based on the molecular structure images of material. Computers, Materials and Continua 54(2):197–207Google Scholar
  4. 4.
    Li J, Sun L, Yan Q, Li Z, Srisa-an W, Ye H (2018) Significant permission identification for machine learning based android malware detection. IEEE Trans Ind Inf 14(7):3216–3225CrossRefGoogle Scholar
  5. 5.
    Li Y, Wang G, Nie L, Wang Q, Tan W (2018) Distance metric optimization driven convolutional neural network for age invariant face recognition. Pattern Recogn 75:51–62CrossRefGoogle Scholar
  6. 6.
    Shen H, Gao C, He D, Wu L (2015) New biometrics-based authentication scheme for multi-server environment in critical systems. J Ambient Intell Humaniz Comput 6(6):825–834CrossRefGoogle Scholar
  7. 7.
    Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714–729CrossRefGoogle Scholar
  8. 8.
    Das S, Kundu MK (2012) Effective management of medical information through a novel blind watermarking technique. J Med Syst 36(5):3339–3351CrossRefGoogle Scholar
  9. 9.
    Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10(4):722–732CrossRefGoogle Scholar
  10. 10.
    Li XW, Kim ST (2013) Optical 3D watermark based digital image watermarking for telemedicine. Opt Lasers Eng 51(12):1310–1320CrossRefGoogle Scholar
  11. 11.
    Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85(4):883–894CrossRefGoogle Scholar
  12. 12.
    Deng X, Chen Z, Zeng F, Zhang Y, Mao Y (2013) Authentication and recovery of medical diagnostic image using dual reversible digital watermarking. J Nanosci Nanotechnol 13(3):2099–2107CrossRefGoogle Scholar
  13. 13.
    Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381–8401CrossRefGoogle Scholar
  14. 14.
    Li J, Lin Q, Yu C, Ren X, Li P (2018) A QDCT-and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. Soft Comput 22(1):47–65CrossRefGoogle Scholar
  15. 15.
    Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl 76(8):10599–10633CrossRefGoogle Scholar
  16. 16.
    Solanki N, Malik SK (2014) ROI Based medical image watermarking with zero distortion and enhanced security. International Journal of Modern Education and Computer Science 6(10):40–48CrossRefGoogle Scholar
  17. 17.
    Bouslimi D, Coatrieux G, Roux C (2012) A joint encryption/watermarking algorithm for verifying the reliability of medical images. Application to echographic images, Computer methods and programs in biomedicine 106(1):47–54CrossRefGoogle Scholar
  18. 18.
    Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking for medical images. Wirel Pers Commun 92(4):1611–1624CrossRefGoogle Scholar
  19. 19.
    Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415–1433CrossRefGoogle Scholar
  20. 20.
    Kannammal A, Subha Rani S (2014) Two level security for medical images using watermarking/encryption algorithms. Int J Imaging Syst Technol 24(1):111–120CrossRefGoogle Scholar
  21. 21.
    Mousavi SM, Naghsh A, Manaf AA, Abu-Bakar SAR (2017) A robust medical image watermarking against salt and pepper noise for brain MRI images. Multimed Tools Appl 76(7):10313–10342CrossRefGoogle Scholar
  22. 22.
    Lei B, Tan EL, Chen S, Ni D, Wang T, Lei H (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41(7):3178–3188CrossRefGoogle Scholar
  23. 23.
    Ko LT, Chen JE, Shieh YS, Hsin HC, Sung TY (2012) Nested quantization index modulation for reversible watermarking and its application to healthcare information management systems. Computational and mathematical methods in medicine, vol 2012Google Scholar
  24. 24.
    Yang L, Han Z, Huang Z, Ma J (2018) A remotely keyed file encryption scheme under mobile cloud computing. J Netw Comput Appl 106:90–99CrossRefGoogle Scholar
  25. 25.
    Cai Z, Yan H, Li P, Huang ZA, Gao C (2017) Towards secure and flexible EHR sharing in mobile health cloud under static assumptions. Clust Comput 20(3):2415–2422CrossRefGoogle Scholar
  26. 26.
    Bhuiyan MZA, Wang G, Wu J, Cao J, Liu X, Wang T (2017) Dependable structural health monitoring using wireless sensor networks. IEEE Trans Dependable Secure Comput 14(4):363–376CrossRefGoogle Scholar
  27. 27.
    Zhang X, Liang C, Zhang Q, Li Y, Zheng J, Tan YA (2018) Building covert timing channels by packet rearrangement over mobile networks. Inform Sci 445:66–78MathSciNetCrossRefGoogle Scholar
  28. 28.
    Wen W, Zhang Y, Fang Y, Fang Z (2018) Image salient regions encryption for generating visually meaningful cipher text image. Neural Comput & Applic 29(3):653–663CrossRefGoogle Scholar
  29. 29.
    Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inform Sci 324:197–207MathSciNetCrossRefzbMATHGoogle Scholar
  30. 30.
    Xu J, Wei L, Zhang Y, Wang A, Zhou F, Gao CZ (2018) Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J Netw Comput Appl 107:113–124CrossRefGoogle Scholar
  31. 31.
    DICOM image database [online]

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of ComputingSASTRA Deemed to be UniversityThanjavurIndia

Personalised recommendations