Advertisement

Watermarking in Biomedical Signal Processing

  • Nilanjan Dey
  • Amira S. Ashour
  • Sayan Chakraborty
  • Sukanya Banerjee
  • Evgeniya Gospodinova
  • Mitko Gospodinov
  • Aboul Ella Hassanien
Chapter
Part of the Studies in Computational Intelligence book series (SCI, volume 660)

Abstract

Recently, by means of technological innovation in communication networks and information, it has assisted healthcare experts across the world to seek high-quality diagnosis as well as to communicate each other as second opinions via enabling extensive and faster access to the patients’ electronic medical records, such as medical images. Medical images are extremely precious owing to its importance in diagnosis, education, and research. Recently, telemedicine applications in telediagnoisis, teleconsulting, telesurgery, and remote medical education play an imperative role in the advancement of the healthcare industry. Nevertheless, medical images are endured security risk, such as images tampering to comprise false data which may direct to wrong diagnosis and treatment. Consequently, watermarking of medical images offers the compulsory control over the flow of medical information. It is the typically used data hiding technique in the biomedical information security domain and legal authentication. In the field of telemedicine, exchange of medical signals is a very common practice. The signals are transmitted through the web and the wireless unguided media. The security and the authenticity are the matter of concern due to the various attacks on the web. Any type of the signals vulnerability in the biomedical data is not acceptable for the sake of proper diagnosis. A watermark is used to prove the ownership of the exchanged data. The logos of the hospitals or medical centers and electronic patient’s report card can be added to the biomedical signals as a watermark to establish the property right. This work provides an extensive view about the existing research works in the field of watermarking techniques on different biomedical signals. It includes the design and evaluation parameters serving as a guideline in the watermarking schemes′ development and benchmarking. This work also provides the comparative study between different watermarking methods. It reviews several aspects about digital watermarking in the medical domain. Also, it presented the properties of watermarking and several applications of watermarking. Meanwhile, it discusses the requirements and challenges that the biomedical watermarking process face.

Keywords

Watermarking Telemedicine Biomedical signal Watermarking techniques Watermarking challenges 

References

  1. 1.
    Ledzewicz U, Schattler H (2002) Sufficient conditions for optimality of controls in biomedical systems. In: Proceedings of the 41st IEEE conference on decision and control 3: 3524–3529Google Scholar
  2. 2.
    Al Giakoumaki, Perakis K, Tagaris A, Koutsouris D (2006) Digital watermarking in telemedicine applications-towards enhanced data security and accessibility. Conf Proc IEEE Eng Med Biol Soc. 1:6328–6331Google Scholar
  3. 3.
    Moghadas A, Jamshidi M, Shaderam M (2008) Telemedicine in healthcare system. World Automation Congress (WAC 2008), pp 1–6Google Scholar
  4. 4.
    Barni M, Bartolini FD (2004) Data hiding for fighting piracy. IEEE Signal Process Mag 21(2):28–39CrossRefGoogle Scholar
  5. 5.
    Coatrieux G, Maître H, Sankur B, Rolland Y, Collorec R (2000) Relevance of Watermarking in Medical Imaging. Conf. Proc. IEEE Int. ITAB, USA, pp 250–255Google Scholar
  6. 6.
    Delp E (2005) Multimedia security: the 22nd century approach! Proc Workshop Multimed Syst 11(2):95–97CrossRefGoogle Scholar
  7. 7.
    Kumari G, Kumar B, Sumalatha L, Krishna V (2009) Secure and robust digital watermarking on grey level images. Int J Adv Sci Technol 11Google Scholar
  8. 8.
    Miyazaki A, Okamoto A (2002) Analysis and improvement of correlation-based watermarking methods for digital images. Kyushu UniversityGoogle Scholar
  9. 9.
    Jin C, Zhang X, Chao Y, Xu H (2008) Behavior authentication technology using digital watermark. In: International conference on multimedia and information technology (MMIT ‘08), pp 7–10Google Scholar
  10. 10.
    Jin C, Wang S, Jin S, Zhang Q, Ye J (2009) Robust digital watermark technique for copyright protection. In: International symposium on information engineering and electronic commerce (IEEC ‘09), pp 237–240Google Scholar
  11. 11.
    Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C (2010) Watermarking to enforce medical image access and usage control policy. In: 2010 Sixth international conference on signal-image technology and internet-based systems (SITIS), pp 251–260Google Scholar
  12. 12.
    Li M, Narayanan S, Poovendran R (2004) Tracing medical images using multi-band watermarks. In: 26th Conference of the IEEE annual international engineering in medicine and biology society (IEMBS ‘04) 2:3233–3236Google Scholar
  13. 13.
    Kishore P, Venkatram N, Sarvya C, Reddy L (2014) Medical image watermarking using RSA encryption in wavelet domain. In: 2014 First international conference on networks & soft computing (ICNSC), pp 258–262Google Scholar
  14. 14.
    Serdean C (2002) Spread spectrum-based video watermarking algorithms for copyright protection. PhD thesis, University of PlymouthGoogle Scholar
  15. 15.
    Hu Y, Kwong S (2001) Wavelet domain visible watermarking. IEE Electron Lett 37(20):1219–1220CrossRefGoogle Scholar
  16. 16.
    Mohanty S, Guturu P, Kougianos E, Pati N (2006) A novel invisible color image watermarking scheme using image adaptive watermark creation and robust insertion-extraction. In: Proceedings of the 8th IEEE international symposium on multimedia (ISM), pp 153–160Google Scholar
  17. 17.
    Razafindradina H, Karim A (2013) Blind and robust images watermarking based on wavelet and edge insertion. Int J Cryptogr Inf Secur (IJCIS) 3(3)Google Scholar
  18. 18.
    Kumar Y, Vishwakarma P, Nath R (2012) Semi-blind color image watermarking on high frequency band using DWT-SVD. Int J Eng Res Dev 4(3):57–61Google Scholar
  19. 19.
    Dharwadkar N, Amberker B (2010) An efficient non-blind watermarking scheme for color images using discrete wavelet transformation. Int J Comput Appl 2(3)Google Scholar
  20. 20.
    Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital Watermarking and Steganography. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA. ISBN 978-0123725851Google Scholar
  21. 21.
    Kumar A, Pooja K (2010) Steganography—a data hiding technique. Int J Comput Appl 9(7)Google Scholar
  22. 22.
    Caldelli R, Filippini F, Becarelli R (2010) Review article reversible watermarking techniques: an overview and a classification. Hindawi Publishing Corporation EURASIP Journal on Information Security 2010:1–19. doi: 10.1155/2010/134546 CrossRefGoogle Scholar
  23. 23.
    Maeder A, Planitz B (2005) Medical image watermarking for multiple modalities. In: 34th Workshop proceedings on applied imagery and pattern recognition (AIPR 2005), 19–21 October 2005, Washington, DC, USAGoogle Scholar
  24. 24.
    Tsai A, Luh J, Lin T (2012) A modified multi-channel emg feature for upper limb motion pattern recognition. In: 2012 Annual international conference of the IEEE engineering in medicine and biology society 2012:3596–3599Google Scholar
  25. 25.
    Gut R (2000) High-precision EMG signal decomposition using communication techniques. IEEE Trans Signal Process 48(9)Google Scholar
  26. 26.
    Wang Z, Ning X, Zhang Y, Gonghuan (2002) Nonlinear dynamic characteristics analysis of synchronous 12-lead ECG signals. IEEE Eng Mag Med Biol 19(5)Google Scholar
  27. 27.
    Lisha S, Minfen S, Congtao X (2002) Nonlinear analysis of EEG signals based on the parametric bispectral estimation. In: 2002 6th international conference on signal processing, vol 1Google Scholar
  28. 28.
    Velasquez-martinez L, Murillo-rendon S, Castellanos-dominguez G (2012) Relevance and redundancy analysis of PCG signals in the detection of heart murmurs by anova. In: 2012 XVII symposium of image, signal processing, and artificial vision (STSIVA), pp 190–195Google Scholar
  29. 29.
    Abdullatif M, Zeki A, Chebil J, Gunawan T (2013) Properties of digital image watermarking. In: 2013 IEEE 9th international colloquium on signal processing and its applications, 8–10 Mac. 2013, Kuala Lumpur, MalaysiaGoogle Scholar
  30. 30.
    Katariya S (2012) Digital watermarking: review. Int J Eng Innov Technol (IJEIT) 1(2)Google Scholar
  31. 31.
    Cagalaban G, Kim S (2011) Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption. In: 2011 13th international conference on advanced communication technology (ICACT), pp 863–867Google Scholar
  32. 32.
    Alhaqbani F, Fidge C (2008) Privacy-preserving electronic health record linkage using pseudonym identifiers. In: Proceedings of 10th international conference on e-Health, Networking, applications and services, pp 108–117Google Scholar
  33. 33.
    Coatrieux G, Lamard M, Daccache W, Puentes J, Roux C (2005) A low distortion and reversible watermark: application to angiographic images of the retina. In Proceedings of international conference of the IEEE-EMBS, pp 2224–2227Google Scholar
  34. 34.
    Coatrieux G, Sankur B, Maître H (2001) Strict Integrity Control of Biomedical Images. Proc. Electronic Imaging, Security and Watermarking of Multimedia Contents. SPIE, USA, pp 229–240CrossRefGoogle Scholar
  35. 35.
    Li M, Poovendran R, Narayanan S (2005) Protecting patient privacyagainst unauthorized release of medical images in a group communication environment. Comput Med Imaging Graph 29(5):367–383CrossRefGoogle Scholar
  36. 36.
    Zhou X, Huang H, Lou S (2001) Authenticity and integrity of digital mammography images. IEEE Trans Med Imaging 20(8):784–791CrossRefGoogle Scholar
  37. 37.
    Wakatani A (2002) Digital watermarking for ROI medical images by using compressed signature image. In: Proceedings of 35th Hawaii international conference on system sciences, pp 2043–2048Google Scholar
  38. 38.
    Gupta N, Sharma M (2012) Invisible multiple watermarking with minimum distortion using DWT-DCT-CDMA. Int J Comput Sci Eng Technol (IJCSET) 3(8)Google Scholar
  39. 39.
    Coatrieux G, Lecornu L, Sankur B, Roux C (2006) A review of image watermarking applications in healthcare. In: International conference IEEE engineering in medicine and biology society, New York, NY, pp 4691–4694Google Scholar
  40. 40.
    Bouslimi D, Coatrieux G, Roux C (2012) A joint encryption/watermarking system for verifying the reliability of medical images. Comput Methods Biomed 106(1):47–54CrossRefGoogle Scholar
  41. 41.
    Poonkuntran S, Rajesh R, Eswaran P (2009) Wavetree watermarking: an authentication scheme for fundus images. In: Proceedings of IEEE international conference on emerging trends in computing, pp 507–511Google Scholar
  42. 42.
    Cao F, Huang X, Zhou Q (2003) Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27(2–3):185–196CrossRefGoogle Scholar
  43. 43.
    Umaamaheshvari A, Thanuskodi K (2012) Survey of watermarking algorithms for medical images. Int J Eng Trends Technol 3(3)Google Scholar
  44. 44.
    Ni R, Ruan Q, Zhao Y (2008) Pinpoint authentication watermarking based on a chaotic system. Int J Forensic Sci 179(1):54–62CrossRefGoogle Scholar
  45. 45.
    Al-Qershi B (2010) Reversible watermarking scheme based on two-dimensional difference expansion (2DDE). In: Second international conference on computer research and development, pp 228–232. doi: 10.1109/ICCRD.2010.76
  46. 46.
    Zhang X, Wang S, Qian Z, Feng G (2010) Reversible fragile watermarking for locating tampered blocks in JPEG images. Sig Process 90(12):3026–3036zbMATHCrossRefGoogle Scholar
  47. 47.
    Chaing K, Chang-Chien K, Chang R, Yen H (2008) Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J Digit Imaging 21(1):77–90CrossRefGoogle Scholar
  48. 48.
    Li C, Yang F (2003) One dimensional neighbor forming strategy for fragile watermarking. J Electron Imaging 12(2):284–291CrossRefGoogle Scholar
  49. 49.
    Avcibas I, Nasir M, Sankur B (2001) Steganalysis based on image quality metrics. In: 2001 IEEE fourth workshop on multimedia signal processing, pp 517–522Google Scholar
  50. 50.
    Planitz B, Maeder A (2005) Medical image watermarking: a study on image degradation. In: Proceedings of Australian pattern recognition society (APRS), pp 3–8Google Scholar
  51. 51.
    Viswanathan P, Krishna P (2014) A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology. IEEE J Biomed Health Inform 18(3):753–764CrossRefGoogle Scholar
  52. 52.
    Perwej Y, Parwej F, Perwej A (2012) An adaptive watermarking technique for the copyright of digital images and digital image protection. Int J Multimed Its Appl (IJMA) 4(2)Google Scholar
  53. 53.
    Durvey M, Satyarhi D (2014) A review paper on digital watermarking. IJETTCS 3(4):99–105Google Scholar
  54. 54.
    Singh Y, Devi B, Singh K (2013) A review of different techniques on digital image watermarking. IJER 2(3):193–199Google Scholar
  55. 55.
    Mller M, Cox J, kalker T (1999) A review of watermark principal and practices. In: Parhi KK, Nishitani T (eds) Digital signal processing in multimedia system. Marcell Dekar Inc., pp 461–485Google Scholar
  56. 56.
    Nyeem H, Boles W, Boyd C (2014) Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP Journal on Advances in Signal Processing 2014EURASIP, 2014:135Google Scholar
  57. 57.
    Raul R, Claudia F, Trinidad-Bias G (2007) Data hiding scheme for medical images. In: Proceedings of the 17th international conference on electronics, communications and computers (CONIELECOMP ‘07), pp 32Google Scholar
  58. 58.
    Singh P, Chadha R (2013) A survey of digital watermarking techniques, applications and attacks. Int J Eng Innov Technol (IJEIT) 2(9)Google Scholar
  59. 59.
    Voloshynovskiy S, Pun T, Eggers J, Su J (2001) Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Commun Mag 39(8):118–126CrossRefGoogle Scholar
  60. 60.
    Kong X, Feng R (2001) Watermarking medical signals for telemedicine. IEEE Trans Inf Technol Biomed 5(3):195–201CrossRefGoogle Scholar
  61. 61.
    Engin M, Çidam O, Engin E (2005) Wavelet transformation based watermarking technique for human electrocardiogram (ECG). J Med Syst 29(6):589–594CrossRefGoogle Scholar
  62. 62.
    He X, Tseng K, Huang H, Chen S, Tu S, Zeng F, Pan J (2012) Wavelet-based quantization watermarking for ECG Signals. In: 2012 International conference on computing, measurement, control and sensor network (CMCSN), Taiyuan, China, July 7–9, pp 233–236Google Scholar
  63. 63.
    Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference communications, devices and intelligent systems (CODIS), pp 624–627Google Scholar
  64. 64.
    Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri S (2012) Embedding of blink frequency in electrooculography signal using difference expansion based reversible watermarking technique. Buletinul Ştiinţific Al Universităţii “Politehnica” Din Timişoara, Seria Electronică Şi Telecomunicaţii Transactions On Electronics And Communications 57(71)Google Scholar
  65. 65.
    Nambakhsh M, Ahmadian A, Ghavami M, Dilmaghani R, Karimi-Fard S (2006) A novel blind watermarking of ECG signals on medical images using EZW algorithm. In: Proceedings of the 28th annual international conference of the IEEE engineering in medicine and biology society (Embs’06), New York, USA, 30 Aug 3 Sept 1:3274–3277Google Scholar
  66. 66.
    Kaur S, Farooq O, Singhal R, Ahuja B (2010) Digital watermarking of ECG data for secure wireless communication. In: Proceedings of the 2010 international conference on recent trends in information, telecommunication and computing (Itc2010), Kochi, Kerala, India, 12–13 March, pp 140–144Google Scholar
  67. 67.
    Ibaida A, Khalil I, Van Dhiah A (2010) Embedding patients confidential data in ecg signal for healthcare information system. In: Proceeding of the 32nd annual international conference of the IEEE Embs, Buenos Aires, Argentina, 31 Aug 4 Sept., pp 3891–3894Google Scholar
  68. 68.
    Ibaida A, Khalil I, Van Schyndel R (2011) A low complexity high capacity ECG signal watermark for wearable sensor-net health monitoring system. In: Proceedings of the computing in cardiology (Cinc), Hangzhou, China, 18–21 Sept, pp 393–396Google Scholar
  69. 69.
    Yina G, Dawei Z (2012) Single channel surface electromyography blind recognition model based on watermarking. J Vib Control 18(1):42–47CrossRefGoogle Scholar
  70. 70.
    Tseng K, He X, Kung W, Chen S, Liao M, Huang H (2014) Wavelet-based watermarking and compression for ECG signals with verification evaluation. Sensors (Basel) 14(2):3721–3736CrossRefGoogle Scholar
  71. 71.
    Dey N, Biswas D, Roy A, Das A (2012) DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal. In: 2012 12th International conference on intelligent systems design and applications (ISDA), pp 680, 685Google Scholar
  72. 72.
    Dey N, Mukhopadhyay S, Das A, Chaudhuri S (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graphics Signal Process (IJIGSP) 7:33–46CrossRefGoogle Scholar
  73. 73.
    Chen S, Guo Y, Huang H, Kung W, Tseng K, Tu S (2014) Hiding patients confidential datainthe ECG signal via a transform-domain quantization scheme. J Med Syst 38(6):1–8Google Scholar
  74. 74.
    Sikander B, Ishtiaq M, Jaffar M, Tariq M, Mirza A (2010) Adaptive digital watermarking of images using genetic algorithm. In: 2010 International conference on information science and applications (ICISA). pp 1–8Google Scholar
  75. 75.
    Kosgharghory S (2011) Hybrid of particle swarm optimization with evolutionary operators to fragile image watermarking based DCT. Int J Comput Sci Inf Technol (ijcsit) 3(3)Google Scholar
  76. 76.
    Soliman M, Hassanien A, Ghali N, Onsi H (2012) An adaptive watermarking approach for medical imaging using swarm intelligent. Int J Smart Home 6(1)Google Scholar
  77. 77.
    Lei B, Tan E, Chen S, Ni D, Wang T, Lei H (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41(7):3178–3188CrossRefGoogle Scholar
  78. 78.
    Naheed T, Usman I, Khan T, Dar A, Shafique M (2014) Intelligent reversible watermarking technique in medical images using GA and PSO. Optik Int J Light Electron Optics 125(11)Google Scholar
  79. 79.
    Reddy V, Siddaiah P (2015) Hybrid LWT-SVD watermarking optimized using metaheuristic algorithms along with encryption for medical image security. Int J Signal Image Process 6(1):75–95CrossRefGoogle Scholar
  80. 80.
    Memon N, Gilani S, Ali A (2009) Watermarking of CT scan medical images for content authentication. In: International conference on information and communication technologies, 2009 (ICICT ‘09), pp 175, 180Google Scholar
  81. 81.
    Liu J, He X (2005) A review study on digital watermarking. In: First international conference on information and communication technologies (ICICT 2005), pp 337–341Google Scholar
  82. 82.
    Zkou X, Huang H, Lou S (2001) Authenticity and integrity of digital mammography images. IEEE Trans Med Imaging 20(8):784–791CrossRefGoogle Scholar
  83. 83.
    Sebe F, Ferrer T, Herrera J (2000) Spatial domain image watermarking robust against compression, filtering, cropping and scaling. Springer Image Comput 2:44–53zbMATHGoogle Scholar
  84. 84.
    Nikolaidis N, Pitas I (1998) Robust image watermarking in spatial domain. IEEE Signal Process Trans 66(3):385–403zbMATHGoogle Scholar
  85. 85.
    Nandi S, Roy S, Dansana J, Karaa WB, Ray R, Chowdhury SR, Chakraborty S, Dey N (2014) Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system. Int J Comput Netw Inf Secur 6(11):1Google Scholar
  86. 86.
    Cao F, Huang H, Zhou X (2003) Medical image security in a HIPAA mandated PACS environment. Computerized medical imaging and graphics. IEEE Trans Image Process 27(2–3):185–196Google Scholar

Copyright information

© Springer International Publishing Switzerland 2017

Authors and Affiliations

  • Nilanjan Dey
    • 1
  • Amira S. Ashour
    • 2
  • Sayan Chakraborty
    • 1
  • Sukanya Banerjee
    • 3
  • Evgeniya Gospodinova
    • 4
  • Mitko Gospodinov
    • 4
  • Aboul Ella Hassanien
    • 5
  1. 1.Department of Information TechnologyTechno India College of TechnologyKolkataIndia
  2. 2.Department of Electronics and Electrical Communications Engineering, Faculty of EngineeringTanta UniversityTantaEgypt
  3. 3.Department of CSEJISCEKalyaniIndia
  4. 4.Institute of Systems Engineering and RoboticsBulgarian Academy of SciencesSofiaBulgaria
  5. 5.Scientific Research GroupCairoUniversityGizaEgypt

Personalised recommendations