Skip to main content

Wavelet and LSB-Based Encrypted Watermarking Approach to Hide Patient’s Information in Medical Image

  • Conference paper
  • First Online:
Proceedings of International Joint Conference on Advances in Computational Intelligence

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

Weak protection of patients’ data in medical institutions becomes a threat both for the medical institute or health care and patient. Different techniques are developing day by day to ensure the security and authentication of digital data in the medical field. Watermarking is one of the most widespread technologies to ensure the authentication of digital data and copyright protection of the user. In this paper, an algorithm has been proposed which is based on a joint watermarking and encryption technique to securely hide patient’s secret information. In the research, an initialization vector (IV) generation is proposed which is basically used to encrypt patient’s information using the advanced encryption standard (AES) technique in output feedback mode. The embedding of a watermark in the image is accomplished using a wavelet-based DWT technique and least significant bit (LSB) substitution. It has been found that the proposed algorithm is efficient and secured in many cases after observing different factors like imperceptibility, MSE, PSNR, and correlation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. 4 ways to protect your organization from a data breach. Bottomline Technologies, December 14, 2015

    Google Scholar 

  2. Kour J, Verma D (2014) Steganography techniques-a review paper. Int J Emerg Res Manage Technol 3(5):132–135 (2014). ISSN: 2278-9359

    Google Scholar 

  3. Mandhani NK (2005) Watermarking using decimal sequences. Master thesis submitted to the Graduate Faculty of the Louisiana State University, India, vol. xxix, no. 1

    Google Scholar 

  4. Gaur P, Manglani N (2015) Image watermarking using LSB technique. Int J Eng Res General Sci 3(3)

    Google Scholar 

  5. Fu C, Meng W-H, Zhan Y-F et al (2013) An efficient and secure medical image protection scheme based on chaotic maps. Sci Direct J Comput Biol Med

    Google Scholar 

  6. Bigdeli N, Farid Y, Afshar K (2012) A novel image encryption/decryption scheme based on chaotic neural networks. Eng Appl Artif Intell 753–765

    Google Scholar 

  7. Priya S, Santhi B (2019) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Springer Science+Business Media, LLC, part of Springer Nature

    Google Scholar 

  8. Moniruzzaman Md, Kayum A, Hossain F (2014) Wavelet based watermarking approach of hiding patient’s information in medical image for medical image authentication, pp 374–378

    Google Scholar 

  9. Deb Das S, Kundu MK (2011) Hybrid contourlet-DCT based robust image watermarking technique applied to medical data management. In: 4th International Conference on Pattern Recognition and Machine Intelligence, PReMI, Moscow, Russia, Proceedings, pp 286–292

    Google Scholar 

  10. Amutha V, Zion M (2014) A secured joint encrypted watermarking in medical image using block cipher algorithm transform. In: 2014 international conference on innovations in engineering and technology (ICIET’14), vol 3, Special issue 3

    Google Scholar 

  11. Bansal S, Mehta G (2017) Comparative analysis of joint encryption and watermarking algorithm for biomedical image. In: 7th international conference on cloud computing, data science & engineering confluence, pp 609–612

    Google Scholar 

  12. He HJ, Zhang JS, Tai HM (2006) A wavelet-based fragile watermarking scheme for secure image authentication. In: International workshop on digital watermarking, pp 422–432

    Google Scholar 

  13. Boato G, Conci N, Conotter V, De Natale FGB, Fontanari C (2008) Multimedia asymmetric watermarking and encryption. Electron Lett 44(9):601–602

    Google Scholar 

  14. Mokhnache S, Bekkouche T, Chikouche D (2018) A robust watermarking scheme based on DWT and DCT using image gradient. Int J Appl Eng Res 13(4):1900–1907 (2018). ISSN 0973-4562

    Google Scholar 

  15. Mamuti M, Kazan S (2019) A novel digital image watermarking scheme for medical image. Int J Comput Sci Mob Comput 8(4):198–203 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Faiza Huma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huma, F., Jahan, M., Rashid, I.B., Yousuf, M.A. (2021). Wavelet and LSB-Based Encrypted Watermarking Approach to Hide Patient’s Information in Medical Image. In: Uddin, M.S., Bansal, J.C. (eds) Proceedings of International Joint Conference on Advances in Computational Intelligence. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-16-0586-4_8

Download citation

Publish with us

Policies and ethics