Abstract
This paper presents an efficient watermarking technique to enhance the performance of DWT-SVD-based approach. The method uses well-known error-correcting code (ECC) and chaotic encryption to reduce the channel noise distortion and improve the security of the technique, respectively. In the proposed method, the cover image is transformed by DWT and the sub-bands are selected for embedding the watermarks. Subsequently, the selected sub-bands are further transformed by SVD. The more robust watermark “patient report” and less robust watermark “patient medical image” is embedded into singular values of the selected DWT sub-bands. The use of transform domain techniques along with hamming code ensures that the approach offers more robustness and reliability. Inclusion of chaos-based encryption carries twofold benefits such as obscuring the watermarked content and strengthening the overall security of the projected scheme. The proposed technique offers a significant value of peak signal-to-noise ratio (PSNR), normalized correlation (NC), bit error rate (BER), number of pixel change rate (NPCR), and unified average changing intensity (UCAI) in presence of major attacks. The performance comparisons of our technique with a similar approach show that the proposed technique is superior for nine considered attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Singh, A.K., Kumar, B., Singh, S.K., Ghrera, S.P., Mohan, A.: Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Gener. Comput. Syst. 86, 926–939 (2018). https://doi.org/10.1016/j.future.2016.11.023
Priya, S., Varatharajan, R., Manogaran, G., Sundarasekar, R., Kumar, P.M.: Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. Pers. Ubiquitous Comput., 1–11 (2018). https://doi.org/10.1007/s00779-018-1131-8
Lakshmi, C., Thenmozhi, K., Rayappan, J.B., Amirtharajan, R.: Encryption and watermark-treated medical image against hacking disease—an immune convention in spatial and frequency domains. Comput. Methods Programs Biomed. 159, 11–21 (2018). https://doi.org/10.1016/j.cmpb.2018.02.021
Singh, A.K., Kumar, B., Singh, G., Mohan, A. (eds.) Medical Image Watermarking: Techniques and Applications. Book series on Multimedia Systems and Applications. Springer (2017)
Singh, A.K., Dave, M., Mohan, A.: Wavelet based image watermarking: futuristic concepts in information security. Proc. Natl. Acad. Sci., India, Sect. A 84(3), 345–359 (2014). https://doi.org/10.1007/s40010-014-0140-x
Chao, H.M., Hsu, C.M., Miaou, S.G.: A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans. Inf. Technol. Biomed. 6(1), 46–53 (2002). https://doi.org/10.1109/4233.992161
Thakur, S., Singh, A.K., Ghrera, S.P., Elhoseny, M.: Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed. Tools Appl., 1–14 (2018). https://doi.org/10.1007/s11042-018-6263-3
Singh, A.K., Kumar, B., Dave, M., Ghrera, S.P., Mohan, A.: Digital image watermarking: techniques and emerging applications. In: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, USA, IGI Global, pp. 246–272 (2016). https://doi.org/10.4018/978-1-5225-0105-3.ch011
Wu, Y., Noonan, J.P., Yang, G., Jin, H.: Image encryption using the two-dimensional logistic chaotic map. J. Electron. Imaging 21(1) (2012). https://doi.org/10.1117/1.jei.21.1.013014
Abd El-Samie, F.E., Ahmed, H.E.H., Elashry, I.F., Shahieen, M.H., Faragallah, O.S., El-Rabaie, E.-S.M., Alshebeili, S.A.: Image Encryption: A Communication Perspective. CRC Press (2013)
Bakthula, R., Shivani, S., Agarwal, S.: Self authenticating medical X-ray images for telemedicine applications. Multimed. Tools Appl., 1–18 (2017). https://doi.org/10.1007/s11042-017-4738-2
Tan, C.K., Ng, J.C., Xu, X., Poh, C.L., Guan, Y.L., Sheah, K.: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J. Digit. Imaging 24(3), 528–540 (2011). https://doi.org/10.1007/s10278-010-9295-4
Eswaraiah, R., Reddy, E.S.: Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int. J. Telemed. Appl., 13 (2014). https://doi.org/10.1155/2014/984646
Memon, N.A., Chaudhry, A., Ahmad, M., Keerio, Z.A.: Hybrid watermarking of medical images for ROI authentication and recovery. Int. J. Comput. Math. 88(10), 2057–2071 (2011). https://doi.org/10.1080/00207160.2010.543677
Wu, J.H., Chang, R.F., Chen, C.J., Wang, C.L., Kuo, T.H., Moon, W.K., Chen, D.R.: Tamper detection and recovery for medical images using near-lossless information hiding technique. J. Digit. Imaging 21(1), 59–76 (2008). https://doi.org/10.1007/s10278-007-9011-1
Singh, A.K., Kumar, B., Dave, M., Mohan, A.: Robust and imperceptible dual watermarking for telemedicine applications. Wirel. Pers. Commun. 80(4), 1415–1433 (2015). https://doi.org/10.1007/s11277-014-2091-6
Tripathi, S., Ramesh, N., Bernito, A., Neeraj, K.J.: A DWT based dual image watermarking technique for authenticity and watermark protection. An Int. J. (SIPIJ) 1(2), 33–45 (2010). https://doi.org/10.5121/sipij.2010.1204
Mahajan, L.H., Patil, S.A.: Image watermarking scheme using SVD. Int. J. Adv. Res. Sci. Eng. 2(6), 69–77 (2013)
Thakkar, F.N., Srivastava, V.K.: A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed. Tools Appl. 3(76), 3669–3697 (2016). https://doi.org/10.1007/s11042-016-3928-7
Parah, S.A., Sheikh, J.A., Ahad, F., Loan, N.A., Bhat, G.M.: Information hiding in medical images: a robust medical image watermarking system for e-healthcare. Multimed. Tools Appl. 8(76), 10599–10633 (2015). https://doi.org/10.1007/s11042-015-3127-y
Singh, A.K., Kumar, B., Dave, M., Mohan, A.: Multiple watermarking on medical images using selective discrete wavelet transform coefficients. J. Med. Imaging Health Inform. 5(3), 607–614 (2015). https://doi.org/10.1166/jmihi.2015.1432
Amri, H., Khalfallah, A., Gargouri, M., Nebhani, N., Lapayre, J.C., Bouhlel, M.S.: Medical image compression approach based on image resizing, digital watermarking and lossless compression. J. Signal Process. Syst. 87(2), 203–214 (2017). https://doi.org/10.1007/s11265-016-1150-5
MedPix online medical image database. https://medpix.nlm.nih.gov/
Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. JSAT, 31–38 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Thakur, S., Singh, A.K., Kumar, B., Ghrera, S.P. (2020). Improved DWT-SVD-Based Medical Image Watermarking Through Hamming Code and Chaotic Encryption. In: Dutta, D., Kar, H., Kumar, C., Bhadauria, V. (eds) Advances in VLSI, Communication, and Signal Processing. Lecture Notes in Electrical Engineering, vol 587. Springer, Singapore. https://doi.org/10.1007/978-981-32-9775-3_80
Download citation
DOI: https://doi.org/10.1007/978-981-32-9775-3_80
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-32-9774-6
Online ISBN: 978-981-32-9775-3
eBook Packages: EngineeringEngineering (R0)