Advertisement

Security of Biometric and Biomedical Images Using Sparse Domain Based Watermarking Technique

  • Rohit Thanki
  • Surekha Borra
  • Deven Trivedi
Chapter

Abstract

The biomedical images and biometric images is composed of vital wellbeing data, critical unique identity and conduct data of human. Hence, pictures identified with these two data types must be kept secret and must be secured over transmission medium. In this chapter, a new sparse domain image watermarking is proposed, performance examined and correlated with the existing watermarking systems. The proposed technique utilizes the sparsity property of Discrete Wavelet Transform (DWT) and Compressive Sensing (CS) hypothesis procedure to accomplish high strength and security. This technique hides secret watermark data into encoded cover image rather than the frequency coefficients of the original cover image. The scrambled cover image is created from CS hypothesis. In this method, different kinds of biomedical images and ear biometric image are used as cover images and a binary logo is utilized as watermark. The logo is implanted into sparse measurements of cover image using noise sequences and constant gain factor to achieve blind extraction of watermark image. The CS hypothesis guarantees security to cover picture and is safe against different watermarking attacks. Exploratory outcomes demonstrated that the proposed system gives strength against different sorts of image processing attacks in term of normalized correlation (NC).

Keywords

Biometric Compressive sensing Discrete wavelet transform Sparse domain image watermarking 

References

  1. 1.
    Borra, S., Lakshmi, H., Dey, N., Ashour, A., Shi, F.: Digital Image Watermarking Tools: State-of-the-Art. Frontiers in Artificial Intelligence and Applications 296, 450 – 459 (2017).Google Scholar
  2. 2.
    Thanki, R., Kothari, A.: Digital Watermarking: Technical Art of Hiding a Message. Intelligent Analysis of Multimedia Information, 431 – 466 (2016).Google Scholar
  3. 3.
    Borra, S., Swamy, G.: Sensitive Digital Image Watermarking for Copyright Protection. International Journal of Network Security 15(2), 95 – 103 (2013).Google Scholar
  4. 4.
    Langelaar, G., Setyawan, I., Lagendijk, R.: Watermarking of Digital Image and Video Data – A State of Art Review. IEEE Signal Processing Magazine. 20 – 46 (2000).Google Scholar
  5. 5.
    Singh, S., Singh, R., Singh, A. K., & Siddiqui, T. J.: SVD-DCT Based Medical Image Watermarking in NSCT Domain. In Quantum Computing: An Environment for Intelligent Large Scale Real Application (pp. 467-488). Springer, Cham (2018).Google Scholar
  6. 6.
    Kumar, B., Kumar, S. B., and Chauhan, D. S.: Wavelet based imperceptible medical image watermarking using spread-spectrum. Telecommunications and Signal Processing (TSP), 2015 38th International Conference on (pp. 1-5). IEEE (2015).Google Scholar
  7. 7.
    Singh, A. K., Kumar, B., Singh, G., & Mohan, A.: Secure Spread Spectrum Based Multiple Watermarking Technique for Medical Images. Medical Image Watermarking (pp. 125–157). Springer, Cham (2017).Google Scholar
  8. 8.
    Rege, P., Inamdar, V.: Dual watermarking technique with multiple biometric watermarks. Sadhana © Indian Academy of Science 29(1), 3 – 26 (2014).Google Scholar
  9. 9.
    Inamdar, V., Rege, P. and Arya, M.: Offline Handwritten Signature based Blind Biometric Watermarking and Authentication Technique using Biorthogonal Wavelet Transform. International Journal of Computer Applications 11(1), 19 – 27 (2010).CrossRefGoogle Scholar
  10. 10.
    Yamac, M., Cagatay, D. and Sankur, B.: Hiding Data in Compressive Sensed Measurements” A Conditionally Reversible Data Hiding Scheme for Compressively Sensed Measurements’, Digital Signal Processing 48, 188 – 200 (2016).MathSciNetCrossRefGoogle Scholar
  11. 11.
    Priya, S., Santhi, B., Swaminathan, P., Raja Mohan, J.: Hybrid Transform Based Reversible Watermarking Technique for Medical Images in Telemedicine Applications. Optik – International Journal for Light Electron Optics,  https://doi.org/10.1016/j.ijleo.2017.07.060 (2017).CrossRefGoogle Scholar
  12. 12.
    Yassin, N.: Digital Watermarking for Telemedicine Applications: A Review. International Journal of Computer Applications 129(17) (2015).Google Scholar
  13. 13.
    Singh, A.: Some New Techniques of Improved Wavelet Domain Watermarking for Medical Images. Ph.D. Thesis (2015).Google Scholar
  14. 14.
    Singh, A., Kumar, B., Dave, M. and Mohan, A.: Multiple Watermarking on Medical Images using Selective Discrete Wavelet Transform Coefficients. Journal of Medical Imaging and Health Informatics 5(3), 607 – 614 (2015).CrossRefGoogle Scholar
  15. 15.
    Singh, A., Dave, M. and Mohan, A.: Hybrid Technique for Robust and Imperceptible Dual Watermarking using Error Correcting Codes for Application in Telemedicine. International Journal of Electronics Security and Digital Forensics 6(4), 285 – 305 (2014).CrossRefGoogle Scholar
  16. 16.
    Thanki, R., Borra, S., Dwivedi, V., & Borisagar, K.: An efficient medical image watermarking scheme based on FDCuT–DCT. Engineering Science and Technology, an International Journal, 20(4), 1366–1379 (2017).Google Scholar
  17. 17.
    Kaya, V. and Elbasi, E.: Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms. World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering 4(8) (2017).Google Scholar
  18. 18.
    Priyanka and Maheshkar, S.: Region-based Hybrid Medical Image Watermarking for Secure Telemedicine Applications. Multimedia Tools and Applications 76(3), 3617 – 3647 (2017).CrossRefGoogle Scholar
  19. 19.
    Selvam, P., Santhi, B., Swaminathan, P. and Rajamohan, J.: Hybrid Transform based Reversible Watermarking Technique for Medical Images in Telemedicine Applications. Optik-International Journal for Light and Electron Optics 145, 655 – 671 (2017).CrossRefGoogle Scholar
  20. 20.
    Singh, A. and Dutta, M.: A Reversible Data Hiding Scheme for Efficient Management of Tele-Ophthalmological Data. Ophthalmology: Breakthroughs in Research and Practice, pp. 172 (2018)Google Scholar
  21. 21.
    Thakkar, F. and Srivastava, V.: A Blind Medical Image Watermarking: DWT – SVD based Robust and Secure Approach for Telemedicine Applications. Multimedia Tools and Applications 76(3), 3669 – 3697 (2017).CrossRefGoogle Scholar
  22. 22.
    Parah, S., Javaid, S., Ahad, F., Loan, N. and Bhat, G.: Information Hiding in Medical Images: a Robust Medical Image Watermarking System for E-healthcare. Multimedia Tools and Applications 76(8), 10599 – 10633 (2017).CrossRefGoogle Scholar
  23. 23.
    Dey, N., Ashour, A. S., Chakraborty, S., Banerjee, S. and Gospodinova, E., Gospodinov, M., & Hassanien, A. E.: Watermarking in Biomedical Signal Processing. In Intelligent Techniques in Signal Processing for Multimedia Security (pp. 345–369), Springer International Publishing (2017).Google Scholar
  24. 24.
    Dey, N., Biswas, D., Roy, A., Das, A. and Chaudhuri, S.: DWT-DCT-SVD based Blind Watermarking Technique of Gray Image in Electrooculogram Signal. 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA), 680 – 685 (2012).Google Scholar
  25. 25.
    Dey, N., Das, P., Roy, A., Das, A. and Chaudhuri, S.: DWT-DCT-SVD based Intravascular Ultrasound Video Watermarking. 2012 World Congress on Information and Communication Technologies (WICT), 224 – 229 (2012).Google Scholar
  26. 26.
    Chakraborty, S., Samanta, S., Biswas, D., Dey, N. and Chaudhuri, S. S.: Particle swarm optimization-based parameter optimization technique in medical information hiding. In Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on (pp. 1–6). IEEE (2013).Google Scholar
  27. 27.
    Biswas, D., Das, P., Maji, P., Dey, N. and Chaudhuri, S. S.: Visible watermarking within the region of non-interest of medical images based on fuzzy C-means and Harris corner detection. Computer Science & Information Technology, 161 – 168 (2013).Google Scholar
  28. 28.
    Dey, N., Bose, S., Das, A., Chaudhuri, S. S., Saba, L., Shafique, S. ... and Suri, J. S.: Effect of watermarking on diagnostic preservation of atherosclerotic ultrasound video in stroke telemedicine. Journal of medical systems 40(4), 91 (2016).Google Scholar
  29. 29.
    Thanki, R. M., Dwivedi, V. J. and Borisagar, K. R.: Multibiometric Watermarking with Compressive Sensing Theory: Techniques and Applications. Springer (2018).Google Scholar
  30. 30.
    Tamijeselvy, P., Palanisamy, V., Elakkiya, S.: A novel watermarking images based on wavelet based contourlet transform energized by biometrics. WSEAS Transactions on Computers 12(3), 105 – 115 (2013).Google Scholar
  31. 31.
    Inamdar, V., Rege, P.: Face features based biometric watermarking of digital image using singular value decomposition for fingerprinting. International Journal of Security and Its Applications 6(2), 47 – 60 (2012).Google Scholar
  32. 32.
    Jundale, V. and Patil, S.: Biometric Speech Watermarking Technique in Images Using Wavelet Transform. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE). 33 – 39 (2010).Google Scholar
  33. 33.
    Vatsa, M., Singh, R. and Noore, A.: Feature Based RDWT Watermarking for Multimodal Biometric System. Image and Vision Computing 27(3), 293 – 304 (2009).CrossRefGoogle Scholar
  34. 34.
    Noore, A., Singh, R., Vatsa, M. and Houck, M.: Enhancing Security of Fingerprints through Contextual Biometric Watermarking. Forensic Science International 169(2), 188 – 194 (2007).CrossRefGoogle Scholar
  35. 35.
    Noore, A., Singh, R., Vatsa, M., Houck, M. and Morris, K.: Robust Biometric Image Watermarking for Fingerprint and Face Template Protection. IEICE Electronics Express 3(2), 23 – 28 (2007).Google Scholar
  36. 36.
    Vatsa, M., Singh, R. and Noore, A.: Improving Biometric Recognition Accuracy and Robustness Using DWT and SVM Watermarking. IEICE Electronics Express 1(12), 362 – 367 (2005).CrossRefGoogle Scholar
  37. 37.
    Paunwala, M. and Patnaik, S.: Biometric Template Protection with DCT Based Watermarking. Machine Vision and Applications 25(1), 263 – 275 (2014).CrossRefGoogle Scholar
  38. 38.
    Behera, B. and Govindan, V.: Improved Multimodal Biometric Watermarking in Authentication Systems Based on DCT and Phase Congruency Model. International Journal of Computer Science and Network 2(3), 123 – 129 (2013).Google Scholar
  39. 39.
    Isa, M. and Aljareh, S.: Biometric Image Protection based on Discrete Cosine Transform Watermarking Technique. Proceeding of International Conference on Engineering and Technology (ICET). 1 – 5 (2012).Google Scholar
  40. 40.
    Zebbiche, K., Khelifi, F. and Bouridane, A.: Region Based Watermarking of Biometric Images: Case Study in Fingerprint Images. International Journal of Digital Multimedia Broadcasting, 1 – 13 (2008).CrossRefGoogle Scholar
  41. 41.
    C. Kumar, A. K. Singh and P. Kumar: A Recent Survey on Image Watermarking Techniques and its Application in E-governance. Multimedia Tools and Applications, 1 – 26 (2017).Google Scholar
  42. 42.
    R. Srivastava, B. Kumar, A. K. Singh and A. Mohan: Computationally Efficient Joint Imperceptible Image Watermarking and JPEG Compression: A Green Computing Approach. Multimedia Tools and Applications, 1 – 13 (2017).Google Scholar
  43. 43.
    D. S. Chauhan, A. K. Singh, A. Adarsh, B. Kumar and J. P. Saini: Combining Mexican Hat Wavelet and Spread Spectrum for Adaptive Watermarking and its Statistical Detection using Medical Images. Multimedia Tools and Applications, 1 – 15 (2017).Google Scholar
  44. 44.
    A. Zear, A. K. Singh and P. Kumar: A Proposed Secure Multiple Watermarking Technique based on DWT, DCT and SVD for Application in Medicine. Multimedia Tools and Applications, 1 – 20 (2016).Google Scholar
  45. 45.
    R. Pandey, A. K. Singh, B. Kumar and A. Mohan: Iris based Secure NROI Multiple Eye Image Watermarking for Teleophthalmology. Multimedia Tools and Applications, 75(22), 14381 – 14397 (2016).CrossRefGoogle Scholar
  46. 46.
    Donoho, D.: Compressed Sensing. IEEE Transaction on Information Theory 52(4), 1289 – 1306 (2006).MathSciNetCrossRefGoogle Scholar
  47. 47.
    Candes, E.: Compressive Sampling. Proceedings of the International Congress of Mathematicians. 1 – 20 (2006).Google Scholar
  48. 48.
    Tropp, J. and Gilbert, A.: Signal Recovery from Random Measurements via Orthogonal Matching Pursuit. IEEE Transactions on Information Theory 53(12), 4655 – 4666 (2007).MathSciNetCrossRefGoogle Scholar
  49. 49.
    Cox, I. J., Kilian, J., Leighton, F. T., and Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE transactions on image processing 6(12), 1673 – 1687 (1997).CrossRefGoogle Scholar
  50. 50.
    Zhang, Z., Wu, L., Gao, S., Sun, H., and Yan, Y.: Robust Reversible Watermarking Algorithm Based on RIWT and Compressed Sensing. Arabian Journal for Science and Engineering 43(2), 979 – 992 (2018).CrossRefGoogle Scholar
  51. 51.
    B. Vidakovic: Statistical Modelling by Wavelets. Wiley, pp. 115–116 (1999).Google Scholar
  52. 52.
    J. Yan: Wavelet Matrix. Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada (2009).Google Scholar
  53. 53.
    P. Saxena, Y. Khandelwal and R. Khandelwal: Haar Transform for The Numerical Solutions of Ordinary Differential Equations and Boundary Value Problem with Maple. International Journal of Engineering, Management and Sciences, 4(4), 8 – 12 (2017).Google Scholar
  54. 54.
    MedPixTM Medical Image Database available at http://rad.usuhs.mil/medpix/medpix.html, https://medpix.nlm.nih.gov/home
  55. 55.
    For AMI Ear Database. Available: http://www.ctim.es/research_works/ami_ear_database/
  56. 56.
    Kutter, M. and Petitcolas, F.: Fair Benchmark for Image Watermarking Systems. Security and Watermarking of Multimedia Contents 3657, 226 – 239 (1999).Google Scholar
  57. 57.
    Jarjes, A., Wang, K, Mohammed, G.: Improved greedy snake model for detecting accurate pupil contour. In Proceedings of 3rd International Conference on Advanced Computer Control (ICACC). 515 – 519 (2011).Google Scholar
  58. 58.
    Anwar, A., Ghany, K., Elmahdy, H.: Human ear recognition using geometrical features extraction. Procedia Computer Science 65, 529 – 537 (2015).CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Rohit Thanki
    • 1
  • Surekha Borra
    • 2
  • Deven Trivedi
    • 3
  1. 1.C. U. Shah UniversityWadhwan CityIndia
  2. 2.K. S. Institute of TechnologyBangaloreIndia
  3. 3.G. H. Patel College of Engineering and TechnologyVallabh VidyanagarIndia

Personalised recommendations