Skip to main content
Log in

Watermarking techniques for medical data authentication: a survey

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the widespread growth of medical images and improved communication and computer technologies in recent years, authenticity of the images has been a serious issue for E-health applications. In order to this, various notable watermarking techniques are developed by potential researchers. However, those techniques are unable to solve many issues that are necessary to be measured in future investigations. This paper surveys various watermarking techniques in medical domain. Along with the survey, general concepts of watermarking, major characteristics, recent applications, concepts of embedding and recovery process of watermark, and the summary of various techniques (in tabular form) are highlighted in brief. Further, major issues associated with medical image watermarking are also discussed to find out research directions for fledgling researchers and developers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Abbasi R, Xu L, Amin F, Luo B (2019) Efficient lossless compression based reversible data hiding using multilayered n-bit localization. Security and Communication Networks 2019:1–13

    Article  Google Scholar 

  2. AbdulazizShehab ME, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278

    Article  Google Scholar 

  3. Abdulrahman AK, Ozturk S (2019) A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimed Tools Appl 78:17027–17049

    Article  Google Scholar 

  4. Acharya U R, SubbannaBhat P, Kumar S, Min LC (2003) Transmission and storage of medical images with patient information. Comput Biol Med 33(4):303–310

    Article  Google Scholar 

  5. Aditi Z, Singh AK, Kumar P (2016) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882

    Google Scholar 

  6. Agarwal N, Singh AK, Singh PK (2019) Survey of robust and imperceptible watermarking. Multimed Tools Appl 78:8603–8633

    Article  Google Scholar 

  7. Ahvanooey MT, Li Q, Shim HJ, Huang Y (2018) A comparative analysis of information hiding techniques for copyright protection of text documents. Hindawi Security and Communication Networks 2018:1–22

    Article  Google Scholar 

  8. Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156

    Article  MathSciNet  Google Scholar 

  9. Al-qdah M (2018) Secure watermarking technique for medical images with visual evaluation. Signal & Image Processing: An International Journal (SIPIJ) 9(1):1–9

    Google Scholar 

  10. Al-Qershi OM, Khoo BE (2011) Authentication and data hiding using a hybrid ROIbased watermarking scheme for DICOM images. J Digit Imaging 24(1):114–125

    Article  Google Scholar 

  11. Al-Shayea TK, Mavromoustakis CX, MongayBatalla J, Mastorakis G (2019) A hybridized methodology of different wavelet transformations targeting medical images in IoT infrastructure. Measurement 148:1–14

    Article  Google Scholar 

  12. Ansari IA, Pant M, Ahn CW (2015) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239

    Article  Google Scholar 

  13. Ansari IA, Pant M, Ahn CW (2016) Robust and false positive free watermarking in IWT domain using SVD and ABC. Eng Appl Artif Intell 49:114–125

    Article  Google Scholar 

  14. Aparna P, Kishore PVV (2019) Bio-metric based efficient medical image watermarking in E-healthcare application. IET Image Process 13(3):421–428

    Article  Google Scholar 

  15. Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85(4):883–894

    Article  Google Scholar 

  16. Badshah G, Liew S-C, Zain JM, Ali M (2016) Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. J Digit Imaging 29(2):216–225

    Article  Google Scholar 

  17. Bamal R, Kasana SS (2017) Slantlet based hybrid watermarking technique for medical images. Multimed Tools Appl 77:1–26

    Google Scholar 

  18. Bamal R, Kasana SS (2019) Dual hybrid medical watermarking using Walsh-slantlet transform. Multimed Tools Appl 78(13):17899–17927

    Article  Google Scholar 

  19. Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:197–207

    Article  MathSciNet  MATH  Google Scholar 

  20. Boneh D, Shaw J (1998) Collusion-secure fingerprinting for digital data. IEEE Trans Inf Theory 44(5):1897–1905

    Article  MathSciNet  MATH  Google Scholar 

  21. Borra S, Thanki R, Dey N, Borisagar K (2018) Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing. Smart Health 12:35–48

    Article  Google Scholar 

  22. Chang CC, Lin PY (2008) Adaptive watermark mechanism for rightful ownership protection. J Syst Softw 81:1118–1129

    Article  Google Scholar 

  23. Chen TH, Horng GB, Lee WB (2005) A publicly verifiable copyright-proving scheme resistant to malicious attacks, IEEE trans. Ind Electron 52:327–334

    Article  Google Scholar 

  24. Das S, Kundu MK (2013) Effective management of medical information through ROIlossless fragile image watermarking technique. Comput Methods Prog Biomed 111(3):662–675

    Article  Google Scholar 

  25. V. S. Dhole and N. N. Patil, (2015) Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks, in. International conference computer communication control autom. (ICCUBEA), pp. 752–757.

  26. El’Arbi M, Ben Amar C (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Image Process 8(11):619–626

    Article  Google Scholar 

  27. Ganic E, Eskicioglu AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies, In. Proceedings of the 2004 Workshop on multimedia and security. ACM, pp:166–174

  28. Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Secure and efficient health data management through multiple watermarking on medical images. Medical & Biological Engineering & Computing 44(8):619–631

    Article  Google Scholar 

  29. Gull, Solihah, Loan, Nazir A, Parah, Shabir A, Sheikh, Javaid A, Bhat, G. M (2018) An efficient watermarking technique for tamper detection and localization of medical images, Journal of Ambient Intelligence and Humanized Computing, pp. 1–10.

  30. Guo X, Zhuang TG (2009) A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53–64

    Article  Google Scholar 

  31. Hajjaji MA, Mtibaa A, Bourennane E-B (2011) A watermarking of medical image: method based “LSB”. Journal of Emerging Trends in Computing and Information Sciences 2(12):656–663

    Google Scholar 

  32. Hassan B, Ahmed R, Li B, Hassan O (2019) An imperceptible medical image watermarking framework for automated diagnosis of retinal pathologies in an eHealth arrangement. IEEE Access 7:69758–69775

    Article  Google Scholar 

  33. https://hostingfacts.com/internet-facts-stats/

  34. Huang, Song, Zhang, Wei, Feng, Wei, & Yang, Huaqian. (2008) Blind watermarking scheme based on neural network, In. 7th World Congress on Intelligent Control and Automation, Chongqing, pp. 5985–5989.

  35. Jia S, Zhou Q, Zhou H (2017) A novel color image watermarking scheme based on DWT and QR decomposition. Journal of Applied Science and Engineering 20(2):193–200

    Google Scholar 

  36. Jung K, Yoo K (2009) Data hiding method using image interpolation. Comput Stand Interfaces 31:465–447

    Article  Google Scholar 

  37. Kelkar V, Mehta JH, Tuckley K (2018) A novel robust reversible watermarking technique based on prediction error expansion for medical images. Advances in Intelligent Systems and Computingbook series (AISC) 703:131–143

    Article  Google Scholar 

  38. Kim K-S, Lee M-J, Lee H-Y, Lee H-K (2009) Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recogn 42(11):3083–3096

    Article  MATH  Google Scholar 

  39. Kumar B, Singh HV, Singh SP, Mohan A (2011) Secure spread-spectrum watermarking for telemedicine applications. J Inf Secur 2(2):91–98

    Google Scholar 

  40. Kumar B, AnimeshAnand S, Singh P, Mohan A (2011) High Capacity Spread-Spectrum Watermarking for Telemedicine Applications, world academy of science. Eng Technol 5(7):782–786

    Google Scholar 

  41. Kumar C, Singh AK, Kumar P (2017) A recent survey on image watermarking techniques and its application in e-governance. Multimed Tools Appl 77(3):3597–3622

    Article  Google Scholar 

  42. Kundu, M. K, Das, S (2010) Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding, In. 20th International Conference on Pattern Recognition, pp 1461–1464.

  43. Lach, J, Mangione-Smith, W. H, Potkonjak, M (1998) FPGA fingerprinting techniques for protecting intellectual property, IEEE Custom Integrated Circuits Conference, pp 299–302

  44. Lee H-Y (2019) Adaptive reversible watermarking for authentication and privacy protection of medical records. Multimed Tools Appl 78:19663–19680

    Article  Google Scholar 

  45. Lee, Sin-Joo, Jung, Sung-Hwan (2001) A survey of watermarking techniques applied to multimedia, In. ISIE, IEEE International Symposium on Industrial Electronics Proceedings, pp 272–277

  46. Lee, Sin-Joo, Jung, Sung-Hwan (2001) A survey of watermarking techniques applied to multimedia, In. ISIE, IEEE International Symposium on Industrial Electronics Proceedings , pp 272–277

  47. Li XW, Kim ST (2013) Optical 3D watermark based digital image watermarking for telemedicine. Opt Lasers Eng 51(12):1310–1320

    Article  Google Scholar 

  48. Eugene T. Lin, Edward J. Delp (1999) A review of data hiding in digital images, Image Processing, Image Quality, Image Capture Systems Conference, PICS, pp 274–278

  49. Lin C-C, Tai W-L, Chang C-C (2008) Multilevel reversible data hiding based on histogram modifcation of diference images. Pattern Recogn 41(12):3582–3591

    Article  MATH  Google Scholar 

  50. Tong Liu, Zheng-ding Qiu. (2002) The survey of digital watermarking-based image authentication techniques, In. 6th International Conference on Signal Processing, pp 1556–1559.

  51. Liu Q, Xuemei J (2006) Design and Realization of a Meaningful Digital Watermarking Algorithm Based on RBF Neural Network, in. Sixth World Congress on Intelligent Control and Automation, WCICA 1:2878–2881

    Google Scholar 

  52. Liu L, Chang C-C, Wang A (2015) Reversible data hiding scheme based on histogram shifting of n-bit planes. Multimed Tools Appl 75:11311–11326

    Article  Google Scholar 

  53. Liu Y, Qu X, Xin G (2016) A ROI-based reversible data hiding scheme in encrypted medical images. J Vis Commun Image Represent 39:51–57

    Article  Google Scholar 

  54. Liu J, Li J, Ma J, NaveedSadiq UAB, Yang A (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Appl Sci 9(4):1–23

    Google Scholar 

  55. Ma B, Li B, Wang X-Y, Wang C-P, Jian L, Shi Y-Q (2019) Code division multiplexing and machine learning based reversible data hiding scheme for medical image. Security and Communication Networks 2019:1–9

    Google Scholar 

  56. Mazurczyk W, Wendzel S (2018) Information hiding: challenges for forensic experts. Commun ACM 61(1):86–94

    Article  Google Scholar 

  57. Mohanty SP, Sengupta A, Guturu P, Kougianos E (2017) Everything you want to know about watermarking from paper marks to hardware protection. IEEE Consumer Electronics Magazine 6(3):83–91

    Article  Google Scholar 

  58. Salwa A.K. Mostafa, Naser El- sheimy, A.S. Tolba, F.M. Abdelkader, Hisham M. Elhindy(2010). Wavelet packets-based blind watermarking for medical image management, The Open Biomedical Engineering Journal, 4(1), pp. 93–98.

  59. Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714–729

    Article  Google Scholar 

  60. Naheed T, Imran U, Tariq MK, Amir HD, Muhammad FS (2014) Intelligent reversible watermarking technique in medical images using GA and PSO, Optik. Elsevier 125(11):2515–2525

    Google Scholar 

  61. J. Nayak, , P. S. Bhat, M. S. Kuniar, R. Acharya U (2004) Reliabletransmission and storage of medical images with patient information using error control codes, in. IEEE INDICON, First India Annual Conference, pp 147–150.

  62. Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3):354–361

    Article  Google Scholar 

  63. Ou B, Zhao Y, Ni R (2012) Reversible watermarking using optional prediction error histogram modification. Neuro computing 93:67–76

    Google Scholar 

  64. Parah, Shabir A, Ahmad, Ifshan, Loan, Nazir A, Muhammad, Khan, Sheikh, Javaid A, Bha, G. M (2018) Realization of an Adaptive Data Hiding System for Electronic Patient Record, Embedding in Medical Images, Intelligent Transportation and Infrastructure book series (LNITI), pp. 47–70.

  65. Parah SA, Bashir A, MisbahManzoor AG, Firdous M, Loan NA, Sheikh JA (2019) Secure and reversible data hiding scheme for healthcare system using magic rectangle and a new interpolation technique. Healthcare Data Analytics and Management, pp:267–309

  66. B. Patra and J. C. Patra, (2012) Crt-based fragile self-recovery watermarking scheme for image authentication and recovery, in. IEEE Int. Symp. Intell. Signal process. Commun. Syst. (ISPACS), pp. 430–435.

  67. Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. IEEE 87(7):1062–1078

    Article  Google Scholar 

  68. Potdar, V. M, Han, S, Chang, E (2005) A Survey of Digital Image Watermarking Techniques, In: INDIN '05. 3rd IEEE International Conference on Industrial Informatics

  69. Prabhishek S, Chadha RS (2013) A survey of digital watermarking techniques, applications and attacks. International Journal of Engineering and Innovative Technology (IJEIT) 2(9):165–175

    Google Scholar 

  70. Preda RO (2014) Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain, in. In: 10th Int. Conf. IEEE Commun. (COMM), pp, pp 1–4

    Google Scholar 

  71. Priya, S, Santhi, B (2019) A Novel Visual Medical Image Encryption for Secure Transmission of Authenticated Watermarked Medical Images, Mobile Networks and Applications, pp. 1–8.

  72. Priya S, Santhi B, Swaminathan P, Raja Mohan J (2017) Hybrid transform based reversible watermarking technique for medical images in telemedicine applications. Optik – International Journal for Light Electron Optics 154:655–671

    Google Scholar 

  73. Puech, William, Rodrigues, José M (2004) A new crypto-watermarking method for medical images safe transfer, In. 12th European Signal Processing Conference, pp 1481–1484.

  74. Qasim AF, Meziane F, Aspin R (2018) Digital watermarking: applicability for developing trust in medical imaging workflows state of the art review. Computer Science Review 27:45–60

    Article  MathSciNet  MATH  Google Scholar 

  75. Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312–327

    Article  Google Scholar 

  76. Rahman MA, Rabbi MF (2015) Non-blind DWT-SVD based watermarking technique for RGB image. Global Journal of Research In Engineering 15(4)

  77. Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Transactions on Circuits and Systems for Video Technology 19(7):989–999

    Article  Google Scholar 

  78. Sahu K, Malviya P (2018) A survey on robust image watermarking techniques and different applications. International Journal of Scientific Research & Engineering Trends 4(4):656–659

    Google Scholar 

  79. Seenivasagam V, Velumani R (2013) A QR code based zero-watermarking scheme for authentication of medical images in Teleradiology cloud. Computational and Mathematical Methods in Medicine 2013:1–16

    Article  MathSciNet  MATH  Google Scholar 

  80. Y. Shantikumar Singh, B. Pushpa Devi, Kh. Manglem Singh (2013) A review of different techniques on digital image watermarking scheme, International Journal of Engineering Research, 2(3), pp. 194–200

  81. Shih FY, Wu Y-T (2005) Robust watermarking and compression for medical images based on genetic algorithms. Inf Sci 175(3):200–216

    Article  MathSciNet  Google Scholar 

  82. Shih FY, Wu Y-T (2005) Robust watermarking and compression for medical images based on genetic algorithms. InfSci 175(3):200–216

    MathSciNet  Google Scholar 

  83. Shih FY, Zhong X (2016) High-capacity multiple regions of interest watermarking for medical images. InfSci 367:648–659

    Google Scholar 

  84. Shih FY, Zhong X (2016) High-capacity multiple regions of interest watermarking for medical images. Inf Sci 367(11):648–659

    Article  Google Scholar 

  85. Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools Applications 76(6):8881–8900

    Article  Google Scholar 

  86. Harsh Vikram Singh, AnkurRai (2018) Medical image watermarking in transform domain, Smart Innovations in Communication and Computational Sciences, pp 485–493.

  87. Singh AK (2019) Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed Tools Appl 78:30523–30533

    Article  Google Scholar 

  88. Singh D, Singh SK (2016) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools Appl 76(1):953–977

    Article  Google Scholar 

  89. Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Visual Communication Image Represent 38:775–789

    Article  Google Scholar 

  90. Singh AK, Kumar B, Dave M, Mohan A (2014) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415–1433

    Article  Google Scholar 

  91. Singh AK, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75:8381–8401

    Article  Google Scholar 

  92. Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5(3):607–614

    Article  Google Scholar 

  93. Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-Spectrum in DWT domain. Wirel Pers Commun 83(3):2133–2150

    Article  Google Scholar 

  94. Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381–8401

    Article  Google Scholar 

  95. Singh P, Raman B, Roy PP (2016) A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform. Multimed Tools Appl 76(3):3871–3897

    Article  Google Scholar 

  96. Singh AK, Kumar B, Singh G, Mohan A (2017) Medical Image Watermarking: Techniques and Applications, book series on multimedia systems and applications. Springer, USA

    Book  Google Scholar 

  97. Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2018) Multiple watermarking technique for securing online social network contents using Back propagation neural network. Futur Gener Comput Syst 86:926–939

    Article  Google Scholar 

  98. Singh N, Joshi S, Birla S (2019) Color image watermarking with watermark authentication against false positive detection using SVD. In International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), pp 399–405

    Google Scholar 

  99. Soliman MM, Hassanien AE, Ghali NI, Onsi HM (2012) An adaptive watermarking approach for medical imaging using swarm intelligent. International Journal of Smart Home 6(1):37–50

    Google Scholar 

  100. Tan CK, Ng JC, Xu X, Poh CL, Gua YL, Sheah K (2011) Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528–540

    Article  Google Scholar 

  101. Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digital Signal Processing 38:77–94

    Article  Google Scholar 

  102. Thakur, S, Singh, A. K, Ghrera, S.P, Dave, M (2018) Watermarking Techniques and Its Applications in Tele-Health: A Technical Survey, In: Cryptographic and Information Security Approaches for Images and Videos By S. Ramakrishnan Chapter −17, pp. 467–511.

  103. Thakur, S, Singh, A. K, Ghrera, S. P, Mohan, A (2018) Chaotic based secure watermarking approach for medical images, Multimedia Tools and Applications, pp. 1–14.

  104. Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78(3):3457–3470

    Article  Google Scholar 

  105. Thanki R, Borisagar K (2015) Biometric watermarking technique based on CS theory and fast discrete Curvelet transform for face and fingerprint protection. Advances in Signal Processing and Intelligent Recognition Systems 425:133–144

    Article  Google Scholar 

  106. Thodi DM, Rodríguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730

    Article  MathSciNet  Google Scholar 

  107. Umamageswari A, Ukrit MF, Suresh DGR (2011) A survey on security in medical image communication. International Journal of Computer Applications 30(3):41–45

    Article  Google Scholar 

  108. Wagner, N. R (1983) Fingerprinting, IEEE Symposium on Security and Privacy, pp 18–22

  109. Wakatani, A (2002) Digital watermarking for ROI medical images by using compressed signature image, In. 35th Annual Hawaii International Conference on System Sciences.

  110. Wang XT, Chang CC, Nguyen TS, Li MC (2013) Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Zdigit Signal Process 23(2):569–577

    Article  MathSciNet  Google Scholar 

  111. Wang CP, Wang XY, Xia ZQ, Zhang C, Chen XJ (2016) Geometrically resilient color image zero-watermarking algorithm based on quaternion exponent moments. J Vis Commun Image Represent 41:247–259

    Article  Google Scholar 

  112. Wang CP, Wang XY, Chen XJ, Zhang C (2017) Robust zero-watermarking algorithm based on polar complex exponential transform and logistic mapping. Multimed Tools Appl 76:26355–26376

    Article  Google Scholar 

  113. Muhammad WildanIskandar, Adiwijaya (2019) An implementation of text hiding in medical images based on graph coloring for android devices, J Phys Conf Ser, 1192, pp. 1–9.

  114. Wu, Y, Noonan, J.P, Agaian, S (2011) NPCR and UACI randomness tests for image encryption, Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), pp. 31–38

  115. Xuan G, Yang C, Zhen Y, Shi YQ, Ni Z (2005) Reversible data hiding using integer wavelet transform and companding technique. Lect Notes Comput Sci 3304:115–124

    Article  Google Scholar 

  116. Zain, J. M, Baldwin, L. P, Larke, C. M, (2004) Reversible watermarking for authentication of DICOM images, in. IEEE Intl. Conf. Engineering in medicine and biology, pp. 3237-3240.

  117. ZhiqiuXiaa XW, WenjieZhoua RL, ChunpengWange CZ (2018) Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms. Signal Process 157:108–118

    Google Scholar 

  118. Zhong X, Shih FY (2018) A high-capacity reversible watermarking scheme based on shape decomposition for medical images. Int J Pattern Recognit Artif Intell 1950001:1–19

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Singh.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anand, A., Singh, A.K. Watermarking techniques for medical data authentication: a survey. Multimed Tools Appl 80, 30165–30197 (2021). https://doi.org/10.1007/s11042-020-08801-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08801-0

Keywords

Navigation