Abstract
The rapid rise in the exchange of the medical information for remote/continuous diagnosis via internet using different software’s and digital gadgets has ensured better health monitoring. This exchange, however, has given rise to many security issues which may occur due to noise in communication channels, mishandling of devices or unauthorized tempering. Thus, there is need of ensuring privacy, data integrity and copyright protection in order to provide better technological efficiency. For securing medical content digital watermarking techniques have proved to provide better solutions. In this chapter an efficient watermarking technique is proposed for exchanging patient information in an e-healthcare system. A robust watermarking technique using Singular Value Decomposition (SVD) for embedding the secret logo in the transform domain coefficients is presented. The hybrid combination of Discrete Cosine Transform (DCT) and SVD ensures very high robustness of the watermark and hence is suitable for copyright applications. The security has been ensured by encrypting the watermark before embedding by chaos encryption. The proposed technique has been analysed in presence of various signal processing/geometrical attacks and shows very high robustness of the watermark. The experimental results obtained prove the efficiency of the technique and as such can be used in e-healthcare.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Loan NA, Parah SA, Sheikh JA, Akhoon JA, Bhat GM (2017). Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications. Journal of biomedical informatics, 73, 125-136.
Parah SA, Sheikh JA, Ahad F, Bhat GM (2018). High Capacity and Secure Electronic Patient Record (EPR) Embedding in Color Images for IoT Driven Healthcare Systems. In Internet of Things and Big Data Analytics Toward Next-Generation Intelligence (pp. 409-437). Springer, Cham.
Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2008) Digital Watermarking and Steganography, 2nd edn. (Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2008).
Kumar C, Singh AK, Kumar P, Singh R, Singh S. SPIHT-based multiple image watermarking in NSCT domain. Concurrency and Computation: Practice and Experience, Wiley, DOI:10.1002/cpe.4912.
Singh, AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Generation Computer Systems. Elsevier, pp.1-16, DOI: 10.1016/j.future.2016.11.023.
Parah SA, Ahad F, Sheikh JA, Loan NA, Bhat GM (2016c) A New Reversible and high capacity data hiding technique for e-healthcare applications, Multimedia Tools and Applications, Springer, DOI: 10.1007/s11042-016-4196-2.
Kumar C, Singh AK, Kumar P (2018) A recent survey on image watermarking techniques and its application in e-governance. Multimedia Tools and Applications, Springer, 77(3), pp. 3597–3622, DOI: 10.1007/s11042-017-5222-8.
Ahad F, Loan NA, Parah SA, Sheikh JA, Bhat GM, (2016a) Pixel repetition technique: a high capacity and reversible data hiding method for e-healthcare applications, Intelligent Techniques in Signal Processing for Multimedia Security, Vol. 660, Springer, DOI: 10.1007/978-3-319-44790-2_17.
Parah SA, Sheikh JA, Akhoon JA, Loan NA (2018) Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication. Future Generation Computer Systems.
Parah SA, Ahmad I, Loan NA, Muhammad K, Sheikh JA, Bhat GM. (2019). Realization of an adaptive data hiding system for electronic patient record, embedding in medical images. In Security in smart cities: models, applications, and challenges (pp. 47–70). Springer, Cham.
Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017). Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications, 76(8), 10599-10633.
Singh L, Singh AK, Singh PK (2018) Secure data hiding techniques: A survey, Multimedia Tools and Applications, Multimed. Tools Appl., Springer DOI: 10.1007/s11042-018-6407-5.
Natasa Zivic: Robust Image Authentication in the Presence of Noise. springer (2015).
Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2015d) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications. 2017 Apr 1;76(8):10599-633. Springer.
Chang CC, Chen KN, Lee CF, Liu LJ. A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 2011;84(9):1462–70.
Loan NA, Hurrah NN, Parah SA, Sheikh JA (2017) High capacity reversible stenographic technique based on image resizing and pixel permutation. In Image Information Processing (ICIIP), 2017 Fourth International Conference on (pp. 1-6). IEEE.
Kumar, C., Singh, A. K., & Kumar, P. (2018). Improved wavelet-based image watermarking through SPIHT. Multimedia Tools and Applications, Springer, pp. 1-14, DOI: 10.1007/s11042-018-6177-0.
Lin S, Chen CF (2000) A robust dct-based watermarking for copyright protection. IEEE Transactions on Consumer Electronics, 46 (3), 415–421.
Srivastava R, Kumar B, Singh AK, Mohan A (2018) Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach. Multimedia Tools and Applications, 77(13), 16447-16459, Springer US DOI: 10.1007/s11042-017-5214-8.
Parah SA, Sheikh JA, Loan NA and Bhat GM (2016b) Robust and blind watermarking technique in DCT domain using inter-block coefficient, Digital Signal Processing, Elsevier, DOI: 10.1016/j.dsp.2016.02.005.
Sheikh JA, Parah SA, Assad UI, Bhat GM (2016b) Realization and robustness evaluation of a blind spatial domain watermarking technique’, International Journal of Electronics, DOI: 10.1080/00207217.2016.1242162.
Singh AK, Kumar B, Singh G, Mohan A (Eds.) (2017). Medical image watermarking: techniques and applications. Springer, ISBN: 978-3319576985.
Parah S, Sheikh J, Bhat, GM (2012a) On the realization of secure and efficient data hiding system using ISB and LSB technique, Engineering E-Transaction, Malaysia, Vol. 7, No. 2, pp.48–53, ISSN: 1823-6379.
Parah S, Sheikh J, Bhat GM (2013a) High capacity data embedding using joint intermediate significant bit and least significant technique’, International Journal of Information Engineering and Applications, Vol. 2, No. 11, pp.1–11.
Hurrah NN, Loan NA, Parah SA, Sheikh JA (2017, December). A transform domain based robust color image watermarking scheme for single and dual attacks. In Image Information Processing (ICIIP), 2017 Fourth International Conference on (pp. 1-5). IEEE.
Hurrah NN, Parah SA, Loan NA, Sheikh JA, Elhoseny M, Muhammad K, (2019). Dual watermarking framework for privacy protection and content authentication of multimedia. Future Generation Computer Systems, 94, 654–673. DOI: 10.1016/j.future.2018.02.023.
Loan NA, Parah SA, Sheikh JA, Bhat GM (2017) Utilizing neighbourhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks, Multidimentional Systems and Signal Processing, DOI: 10.1007/s11045-017-0490-z.
Ahad F, Parah SA, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique, Journal of Biomedical Informatics, February, Vol. 66, pp.214–230 [online] DOI: https://doi.org/10.1016/j.jbi.2017.01.006 (accessed 21 September 2017).
Kavitha KJ, Shan PB (2018) Joint Digital Water Marking for Medical Images for Improving Security. Biomedical and Pharmacology Journal, 11(2).
Loan NA, Parah SA, Sheikh JA, Bhat GM (2016b) A robust and computationally efficient digital watermarking technique using inter block pixel differencing, Multimedia Forensics and Security, Vol. 115, Springer DOI: 10.1007/978-3-319-44270-9_10.
Abhilasha Sharma, Amit Kumar Singh and S P Ghrera, Sharma, Secure Hybrid Robust Watermarking Technique for Medical Images. Procedia Computer Science 70 (2015), 778 – 784.
Verma VS, Jha RK, Ojha A (2015) Significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Systems with Applications, 42(21), pp.8184-8197.
Kang X, Huang J, Shi YQ, Lin Y (2003) A DWT-DFT composite watermarking scheme robust to both affine transform and jpeg compression. IEEE T. Circ. Syst. Vid. 13, 776–786 (2003). doi:10.1109/TCSVT.2003.815957.
LP Feng, LB Zheng, P Cao, in 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT). A DWT-DCT Based Blind Watermarking Algorithm for Copyright Protection, vol. 7, (2010), pp. 455–458. doi:10.1109/ICCSIT.2010.5565101.
RH Laskar, M Choudhury, K Chakraborty, S Chakraborty, in Computer Networks and Intelligent Computing. Communications in Computer and Information Science. A Joint DWT-DCT Based Robust Digital Watermarking Algorithm for Ownership Verification of Digital Images, vol. 157 (Springer Berlin, Germany, 2011), pp. 482–491. doi:10.1007/978-3-642-22786-8_61.
Benoraira A, Benmahammed K, Boucenna N (2015) Blind image watermarking technique based on differential embedding in DWT and DCT domains. EURASIP Journal on Advances in Signal Processing, 2015(1), p.55.
Thakur S, Singh AK, Ghrera SP, Mohamed Elhoseny (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications, Multimedia Tools and Applications, Springer, pp. 1-14, DOI: 10.1007/s11042-018-6263-3
Parah SA, Sheikh JA, Bhat GM (2015e) Hiding in encrypted images: a three tier security data hiding system, Multidimensional Systems and Signal Processing, September, Springer, DOI: 10.1007/s11045-015-0358-z.
Thakur, S., Singh, A. K., Ghrera, S. P., & Mohan, A. (2018). Chaotic based secure watermarking approach for medical images. Multimedia Tools and Applications, 1-14. Springer, DOI: 10.1007/s11042-018-6691-0.
Shao Z, Shang Y, Zhang Y, Liu X, Guo G (2016) Robust watermarking using orthogonal Fourier–Mellin moments and chaotic map for double images. Signal Processing, 120, pp.522-531.
Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang Y (2015) An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Communications in Nonlinear Science and Numerical Simulation, 23(1), 2015, 294-310.
Kanso A, Ghebleh M (2015) An efficient and robust image encryption scheme for medical applications. Communications in Nonlinear Science and Numerical Simulation, vol. 24, no. 1, 2015, pp. 98-116.
Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access, 6, 19876-19897.
Lin YK, A data hiding scheme based upon DCT coefficient modification Comput. Standards Int., vol. 36, no. 56, pp. 855-862, 2014.
MedPixâ„¢ Medical Image Database, available at: http://rad.usuhs.mil/medpix/medpix.html, https://medpix.nlm.nih.gov/home .
Openiâ„¢ Medical Image Database, available at: https://openi.nlm.nih.gov/index.php.
The USC-SIPI Image Database, available at: http://sipi.usc.edu/database/.
Zhang H, Wang C, Zhou X (2017) A robust image watermarking scheme based on SVD in the spatial domain. Future Internet, 9(3), 45.
Yuefeng Z, & Li, L. (2015). Digital image watermarking algorithms based on dual transform domain and self-recovery. International Journal on Smart Sensing & Intelligent Systems, 8(1).
Thanki R, Borra S, Dwivedi V, Borisagar K (2017) An efficient medical image watermarking scheme based on FDCuT–DCT. Engineering Science and Technology, an International Journal, 20(4), 1366-1379.
Acknowledgments
This publication is an outcome of the R&D work undertaken project under the Visvesvaraya PhD Scheme of Ministry of Electronics & Information Technology, Government of India, being implemented by Digital India Corporation and in part is supported by Department of Science and Technology (DST) New Delhi under DST inspire scheme.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Hurrah, N.N., Parah, S.A., Sheikh, J.A. (2019). A Secure Medical Image Watermarking Technique for E-Healthcare Applications. In: Singh, A., Mohan, A. (eds) Handbook of Multimedia Information Security: Techniques and Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-15887-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-15887-3_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15886-6
Online ISBN: 978-3-030-15887-3
eBook Packages: Computer ScienceComputer Science (R0)