Multimedia Tools and Applications

, Volume 76, Issue 8, pp 10599–10633 | Cite as

Information hiding in medical images: a robust medical image watermarking system for E-healthcare

  • Shabir A. Parah
  • Javaid A. Sheikh
  • Farhana Ahad
  • Nazir A. Loan
  • G. M. Bhat
Article

Abstract

Electronic transmission of the medical images is one of the primary requirements in a typical Electronic-Healthcare (E-Healthcare) system. However this transmission could be liable to hackers who may modify the whole medical image or only a part of it during transit. To guarantee the integrity of a medical image, digital watermarking is being used. This paper presents two different watermarking algorithms for medical images in transform domain. In first technique, a digital watermark and Electronic Patients Record (EPR) have been embedded in both regions; Region of Interest (ROI) and Region of Non-Interest (RONI). In second technique, Region of Interest (ROI) is kept untouched for tele-diagnosis purpose and Region of Non-Interest (RONI) is used to hide the digital watermark and EPR. In either algorithm 8 × 8 block based Discrete Cosine Transform (DCT) has been used. In each 8 × 8 block two DCT coefficients are selected and their magnitudes are compared for embedding the watermark/EPR. The selected coefficients are modified by using a threshold for embedding bit a ‘0’ or bit ‘1’ of the watermark/EPR. The proposed techniques have been found robust not only to singular attacks but also to hybrid attacks. Comparison results viz-a - viz payload and robustness show that the proposed techniques perform better than some existing state of art techniques. As such the proposed algorithms could be useful for e-healthcare systems.

Keywords

Region of interest Region of non interest Discrete cosine transform Robustness 

References

  1. 1.
    Baiying L, Ee-Leng T, Siping C, Dong N, Tianfu W, Haijun L (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41:3178–3188CrossRefGoogle Scholar
  2. 2.
    Bousilimi D, Coatrieux G, Roux C (2012) A joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic image. Comput Methods Programs Biomed 106:47–54CrossRefGoogle Scholar
  3. 3.
    Chen YH, Chang TY, Li CY (2011) High throughput DA- based DCT with high accuracy error compensated adder tree. IEEE Trans VLSI Syst 19:709–714CrossRefGoogle Scholar
  4. 4.
    Coatrieux G, Montagner J, Huang H, Roux C (2007) Mixed reversible and RONI watermarking for medical image reliability protection. 29th International conference of the IEEE. Eng Med Biol Soc Lyon 5653–6Google Scholar
  5. 5.
    Das S, Kundu MK (2012) Effective management of medical information through a novel blind watermarking technique. J Med Syst 36:3339–3351CrossRefGoogle Scholar
  6. 6.
    Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. Int J Electron Commun 68:244–253CrossRefGoogle Scholar
  7. 7.
    Fotopoulos V, Stavrinou ML, Skodras AN (2008) Medical image authentication and self-correcting through an adaptive reversible watermarking technique. Proceedings of 8th IEEE International Conference on Bio Informatics and Bio Engineering (BIBE2008) 1–5Google Scholar
  8. 8.
    Ghulam MB, Muhammad M, Shabir AP, Javaid A (2010) Field programmable gate array (FPGA) implementation of novel complex PN-code-generator-based data scrambler and descrambler. Maejo Int J Sci Technol 4(1):125–135Google Scholar
  9. 9.
    Giakoumaki, Pavlopoulos AS, Koutsouris D (2010) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 4:722–732Google Scholar
  10. 10.
    Liqiang N, Meng W, Luming Z, Shuicheng Y, Zhang B, Tat-Seng C (2015) Disease inference from health-related questions via sparse deep learning. IEEE Trans Knowl Data Eng 27(8):2107–2119CrossRefGoogle Scholar
  11. 11.
    Liqiang N, Mohammad A, Tao L, Jialie S, Tat-Seng C (2014) A joint local–global approach for medical terminology assignment. In Proc. Int. ACM SIGIR Conf., 2014Google Scholar
  12. 12.
    Liqiang N, Tao L, Mohammad A, Jialie S, Tat-Seng C (2014) WenZher: comprehensive vertical search for healthcare domain. (2014). The 37th International ACM SIGIR Conference on Research and Development in Information Retrieval(SIGIR’14). doi: 10.1145/2600428.2611176
  13. 13.
    Liqiang N, Yi-Liang Z, Mohammad A, Jialie S, Tat-Seng C (2015) Bridging the vocabulary Gap between health seekers and healthcare knowledge. IEEE Trans Knowl Data Eng 27(2):396–409CrossRefGoogle Scholar
  14. 14.
    Navas KA, Thampy SA, Sasikumar M (2008) EPR hiding in medical images for telemedicine. Proc World Acad Sci Eng Technol Rome 292–295Google Scholar
  15. 15.
    Osamah M, Al-Qershi O, Khoo BE (2009) Authentication and data hiding using a reversible ROI-based watermarking scheme for DICOM images. Int J Inf Commun Eng 5:801–806Google Scholar
  16. 16.
    Priya RL, Sadasivam V (2014) A survey on watermarking techniques, requirements, application for medical images. J Theor Appl Inf Technol 65Google Scholar
  17. 17.
    Rahimi F, Rabbani H (2011) A dual adaptive watermarking scheme in contourlet domain for DICOM images. Biomed Eng OnlineGoogle Scholar
  18. 18.
    Rao NA, Meena Kumari V (2011) Watermarking in medical imaging for security and authentication. Taylor & Francis Inf Secur J A Global Perspect 20:148–155CrossRefGoogle Scholar
  19. 19.
    Raul RC, Claudia FU, Gershom de JTB (2007) Data hiding scheme for medical image. IEEE 17th International Conference on Electronics Communications and Computers (CONIELECOMP’07)Google Scholar
  20. 20.
    Shabir AP, Javaid AS, Muheed H, Ghulam MB (2014) A Secure and robust information hiding technique for covert communication. Int J Electron 102:1253–1266Google Scholar
  21. 21.
    Shabir AP, Javaid AS, Umer IA, Ghulam MB (2015) Hiding in encrypted images: a three tier data hiding scheme. Multidim Syst Sign Process 1–24Google Scholar
  22. 22.
    Shabir AP, Javaid AS, Ghulam MB (2014) Fragility evaluation of intermediate significant bit embedding (ISBE) based digital image watermarking scheme for content authentication. International Conference on Advances in Electronics, Computers and Communications (ICAECC), 1–6Google Scholar
  23. 23.
    Shabir AP, Javaid AS, Ghulam MB (2014) A secure and efficient spatial domain data hiding technique based on pixel adjustment. Am J Eng Technol Res 14(2):33–39Google Scholar
  24. 24.
    Shaoqing R, Kaiming H, Ross G, Jian S (2015) Faster R-CNN: towards real-time object detection with region proposal networks. Computer Vision and pattern recognition. In arXiv:1506.01497Google Scholar
  25. 25.
    Singh R (2001) Emerging technologies that will change the world: digital rights management. MIT Technol Rev. http://www.technologyreview.com/infotech/12264
  26. 26.
    Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine application. Wirel Pres Commun 80:1415–1433CrossRefGoogle Scholar
  27. 27.
    Solanki N, Malik SK (2014) ROI based medical image watermarking with zero distortion and enhanced security. Int J Educ Comput Sci 10:40–48CrossRefGoogle Scholar
  28. 28.
    Soliman MM, Hassanien AE, Ghali NI, Onsi HM (2012) An adaptive watermarking approach for medical imaging using swarm intelligent. Int J Smart Home 6:37–50Google Scholar
  29. 29.
    Subhashini D, Nalini P, Chandrasekhar G (2012) Comparison analysis of spatial Domain and compressed Domain steganographic techniques. Int J Eng Res & Technol (IJERT) 1Google Scholar
  30. 30.
    Wakatani A (2002) Digital watermarking for ROI medical images by using compressed signature image. Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS) 7–10 Jan 2002Google Scholar
  31. 31.
    Yan Y, Elisa R, Gaowen L, Nicu S (2015) Egocentric daily activity recognition via multitask clustering. IEEE Trans Image Process 24(10):2984–2995MathSciNetCrossRefGoogle Scholar
  32. 32.
    Zitnick CL, Doll’ar P (2014) Edge boxes: locating object proposals from edges. In ECCVGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  • Shabir A. Parah
    • 1
  • Javaid A. Sheikh
    • 1
  • Farhana Ahad
    • 1
  • Nazir A. Loan
    • 1
  • G. M. Bhat
    • 1
  1. 1.Department of Electronics and Instrumentation TechnologyUniversity of KashmirSrinagarIndia

Personalised recommendations