Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images

  • S. Priya
  • R. Varatharajan
  • Gunasekaran Manogaran
  • Revathi Sundarasekar
  • Priyan Malarvizhi Kumar
Original Article


Digital watermarking is a technique that provides security and authentication for digital image transmission. In general, patient reports are stored in the form of a medical image. A medical image shared through the Internet can be easily modified by an unauthorized user. In order to overcome this risk, we have proposed a method, namely, Paillier homomorphic cryptosystem with poker shuffling transformation-based watermarking method for ensuring security for the digital medical images. In this paper, the watermarking process initially is done at an encrypted DWT-DCT domain. Paillier homomorphic cryptosystem is used for encrypting the original image. The watermark image is scrambled using poker shuffling transformation to generate the scrambled image. This is followed by the encryption of the scrambled image. The embedding process is used for generating an encrypted watermark image. The extraction process involves the decryption of encrypted watermark image for getting the original and the watermark image. The medical data is collected from the private hospitals. The experimental results have established the improvement in the robustness of our proposed watermarking system in an encrypted DWT-DCT domain apart from providing security for the digital image transmission.


Digital watermarking Poker shuffling transformation Paillier homomorphic cryptosystem DWT-DCT encrypted domain 


  1. 1.
    Lenarczyk P, Piotrowski Z (2013) Parallel blind digital image watermarking in spatial and frequency domains, in Telecommun Syst, Springer, 287–303. doi:
  2. 2.
    Wolfgang RB, Podilchuk CI, Delp EJ (1999) Perceptual watermarks for digital images and video. IEEE 87:1108–1126CrossRefGoogle Scholar
  3. 3.
    Darazi R, Callau P, Macq B (2010) Secure and HVS-adaptive exhibition spread transform dither modulation watermarking for digital cinema. IEEE.
  4. 4.
    Vahedi E, Zoroofi RA, Mohsen S (2011) Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles. In Elsevier Digital Signal Processing 22:153–162Google Scholar
  5. 5.
    Wang Z, Shanxiang L, Feng J, Sheng Y (2012) A digital image watermarking algorithm based on chaos and fresnel transform. IEEE.
  6. 6.
    Wang Y, Bai X, Van S (2013) Digital image watermarking based On texture block and edge detection in the discrete wavelet domain. IEEE, Harbin, ChinGoogle Scholar
  7. 7.
    Poljicak A, Mandic L, Agic D (2011) Discrete Fourier transform–based watermarking method with an optimal implementation radius. In Journal of Electronic Imaging 20(3) 033008, SPIE and IS&TGoogle Scholar
  8. 8.
    Chen B, Coatrieux G, Chen G, Coatrieux JL, Shu H (2014) Full 4-D quaternion discrete Fourier transform based watermarking for color images. In Conference of Digital Signal Processing, ElsevierGoogle Scholar
  9. 9.
    Kaur R, Jindal S (2014) Robust digital image watermarking in high frequency band using median filter function based on DWT-SVD, IEEEGoogle Scholar
  10. 10.
    Li XW, Kim ST (2013) Optical 3D watermark based digital image watermarking for telemedicine, Elsevier LtdGoogle Scholar
  11. 11.
    Agreste S, Puccio L (2011) Wavelet-based watermarking algorithms: theory, application and critical aspects. Taylor & Francis. doi:
  12. 12.
    Makbol NM, Khoo BE (2014) A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. In proceeding of Digital Signal Processing 33, Elsevier, 134–147Google Scholar
  13. 13.
    Lin CY, Chang SF (2000) Semi-fragile watermarking for authenticating JPEG visual content, In proceeding of Electronic Imaging, spiedigitallibraryGoogle Scholar
  14. 14.
    Shen H, Chen B (2012) From single watermark to dual watermark: a new approach for image watermarking, Elsevier Ltd. doi:
  15. 15.
    Ghaderi K, Akhlaghia F, Moradi P (2013) A new robust semi-blind digital image watermarking approach based on LWT-SVD and fractal images. In proceeding of ICEE, IEEEGoogle Scholar
  16. 16.
    Zheng P, Huang J (2013) Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking. SpringGoogle Scholar
  17. 17.
    Li L, Li S, Abraham A, Pan JS (2012) Geometrically invariant image watermarking using polar harmonic transforms. Elsevier LtdGoogle Scholar
  18. 18.
    Maiorana E, Solachidis V, Campisi P (2013) Robust multi-bit watermarking for HDR images in the Radon-DCT domain. ISPA, TriesteCrossRefGoogle Scholar
  19. 19.
    Santhi V, Arulmozhivarman P (2013) Hadamard transform based adaptive visible/invisible watermarking scheme for digital images, In journal of information security and applications 18167–179, Elsevier LtdGoogle Scholar
  20. 20.
    Xie G, Shen H (2005) Toward improved wavelet-based watermarking using the pixel-wise masking model. In: IEEE international conference on image processing (ICIP’05), vol. 1Google Scholar
  21. 21.
    Xie G, Shen H (2006) A new fusion based blind logo-watermarking algorithm. IEICE Trans Inf Syst E89-D:1173–1180CrossRefGoogle Scholar
  22. 22.
    Pappa CK, Vijayaraj M, Subbulakshmi M (2017) An optimal approach for watermarking using MRC4 encryption scheme. Clust Comput, 1–9Google Scholar
  23. 23.
    AlShaikh M, Laouamer L, Nana L, Pascu AC (2017) Efficient and robust encryption and watermarking technique based on a new chaotic map approach. Multimed Tools Appl 76(6):8937–8950CrossRefGoogle Scholar
  24. 24.
    Xiang S, Luo X (2017) Efficient reversible data hiding in encrypted image with public key cryptosystem. EURASIP J Adv Signal Process 2017(1):59Google Scholar
  25. 25.
    Lopez D, Manogaran G (2016) Big data architecture for climate change and disease dynamics, Eds. Geetam S. Tomar et al. The human element of big data: issues, analytics, and performance, CRC PressGoogle Scholar
  26. 26.
    Manogaran G, Lopez D (2017) Disease surveillance system for big climate data processing and dengue transmission. Int J Ambient Comput Intell 8(2):1–25CrossRefGoogle Scholar
  27. 27.
    Manogaran G, Lopez D (2017) Spatial cumulative sum algorithm with big data analytics for climate change detection. Comput Electr EngGoogle Scholar
  28. 28.
    Lopez D, Manogaran G, Jagan J (2017) Modelling the H1N1 influenza using mathematical and neural network approaches. Biomed Res 28(8):1–5Google Scholar
  29. 29.
    Lopez D, Gunasekaran M, Murugan BS, Kaur H, Abbas KM (2014) Spatial BigData analytics of influenza epidemic in Vellore, India. In Proc. 2014 I.E. International Conference onBig Data (pp. 19–24). IEEEGoogle Scholar
  30. 30.
    Lopez D, Gunasekaran M (2015) Assessment of vaccination strategies using fuzzy multicriteria decision making. In Proc. Proceedings of the Fifth International Conference on Fuzzy and NeuroComputing (FANCCO-2015) (pp. 195–208). Springer InternationalGoogle Scholar
  31. 31.
    Lopez D, Sekaran G (2016) Climate change and disease dynamics—a big data perspective. Int J Infect Dis 45:23–24CrossRefGoogle Scholar
  32. 32.
    Manogaran G, Vijayakumar V, Varatharajan R, Kumar PM, Sundarasekar R, Hsu CH Machine learning based big data processing framework for Cancer diagnosis using hidden Markov model and GM clustering. Wirel Pers Commun, 1–18Google Scholar
  33. 33.
    Varatharajan R, Manogaran G, Priyan MK (2017) A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimed Tools Appl, 1–21Google Scholar
  34. 34.
    Thota C, Sundarasekar R, Manogaran G, Varatharajan R, Priyan MK (2018) Centralized fog computing security platform for IoT and cloud in healthcare system. In Exploring the Convergence of Big Data and the Internet of Things (pp. 141-154). IGI globalGoogle Scholar
  35. 35.
    Manogaran G, Lopez D (2016) Health data analytics using scalable logistic regression with stochastic gradient descent. Int J Adv Intell Paradigms 9:1–15Google Scholar
  36. 36.
    Manogaran G, Thota C, Lopez D, Vijayakumar V, Abbas KM, Sundarsekar R (2017). Big data knowledge system in healthcare. In Internet of Things and big data technologies for next generation healthcare (pp. 133–157). Springer International PublishingGoogle Scholar
  37. 37.
    Manogaran G, Lopez D (2017) Disease surveillance system for big climate data processing and dengue transmission. Int J Ambient Comput Intell (IJACI) 8(2):88–105CrossRefGoogle Scholar
  38. 38.
    Manogaran G, Lopez D, Thota C, Abbas KM, Pyne S, Sundarasekar R (2017) Big data analytics in healthcare Internet of Things. In Innovative healthcare systems for the 21st century (pp. 263–284). Springer International PublishingGoogle Scholar
  39. 39.
    Manogaran G, Lopez D (2017) A survey of big data architectures and machine learning algorithms in healthcare. Int J Biomed Eng Technol 25(2–4):182–211CrossRefGoogle Scholar
  40. 40.
    Manogaran G, Thota C, Lopez D (2018) Human-computer interaction with big data analytics. In HCI challenges and privacy preservation in big data security (pp. 1–22). IGI GlobalGoogle Scholar
  41. 41.
    Kumar PM, Gandhi U, Varatharajan R, Manogaran G, Jidhesh R, Vadivel T (2017) Intelligent face recognition and navigation system using neural learning for smart security in internet of things. Clust Comput, 1–12Google Scholar
  42. 42.
    Lopez D, Manogaran G (2017) Parametric model to predict H1N1 influenza in Vellore District, Tamil Nadu, India. In Handbook of statistics (Vol. 37, pp. 301–316). ElsevierGoogle Scholar
  43. 43.
    Manogaran G, Varatharajan R, Priyan MK (2017) Hybrid recommendation system for heart disease diagnosis based on multiple kernel learning with adaptive neuro-fuzzy inference system. Multimed Tools Appl, 1–21Google Scholar
  44. 44.
    Varatharajan R, Manogaran G, Priyan MK, Balaş VE, Barna C (2017) Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimed Tools Appl, 1–21Google Scholar
  45. 45.
    Varatharajan R, Vasanth K, Gunasekaran M, Priyan M, Gao XZ (2017) An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images. Comput Electr EngGoogle Scholar
  46. 46.
    Varatharajan R, Manogaran G, Priyan MK, Sundarasekar R (2017) Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust Comput, 1–10Google Scholar
  47. 47.
    Manogaran G, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R, Thota C (2017) A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting. Futur Gener Comput SystGoogle Scholar
  48. 48.
    Manickam A, Devarasan E, Manogaran G, Priyan MK, Varatharajan R, Hsu CH, Krishnamoorthi R (2018) Score level based latent fingerprint enhancement and matching using SIFT feature. Multimed Tools Appl, 1–21Google Scholar
  49. 49.
    Gandhi UD, Kumar PM, Varatharajan R, Manogaran G, Sundarasekar R, Kadu S (2018) HIoTPOT: surveillance on IoT devices against recent threats. Wirel Pers Commun, 1–16Google Scholar
  50. 50.
    Rawal BS, Vijayakumar V, Manogaran G, Varatharajan R, Chilamkurti N Secure disintegration protocol for privacy preserving cloud storage. Wirel Pers Commun, 1–17Google Scholar

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2018

Authors and Affiliations

  • S. Priya
    • 1
  • R. Varatharajan
    • 2
  • Gunasekaran Manogaran
    • 3
  • Revathi Sundarasekar
    • 4
  • Priyan Malarvizhi Kumar
    • 5
  1. 1.Bharathiyar College of Engineering & TechnologyKaraikalIndia
  2. 2.Sri Ramanujar Engineering CollegeChennaiIndia
  3. 3.University of CaliforniaDavisUSA
  4. 4.Anna UniversityChennaiIndia
  5. 5.VIT UniversityVelloreIndia

Personalised recommendations