Abstract
In e-healthcare applications integrity of the received information is of prime importance for ensuring the accurate diagnosis. The integrity of electronic medical record (EMR) is possible only when the medical images and other relevant data received are tamper free. Reversibility of medical images after certain degree of processing is always a desired property in medical images as it aids proper diagnosis. This paper proposes a novel reversible image authentication (RIA) scheme for tamper detection and authentication of medical images. In the proposed RIA scheme, the medical image is divided into 4 × 4 blocks followed by embedding fragile watermark bit (for authentication) in each of these blocks. Along with authentication, the localization of tamper is achieved accurately by using LSB embedding along with mean modification approach. The security of the watermark has been enhanced with Arnold cat map, Gray coding and AES-128 encryption. The experimental results show that the scheme offers better fragility against all intentional/unintentional signal processing attacks. The comparison results between proposed RIA scheme and similar state-of-the-art schemes show superiority of our scheme in terms of imperceptivity, fragility and tamper localization. For a payload of 16 kb, the average PSNR achieved for 50 Gray scale images of size 512 × 512 is more than 47 dB. In addition, the scheme offers very less complexity; the embedding and extraction times are around 0.6 s and 0.5 s respectively. Given the features of proposed scheme it could serve as a potential candidate for transfer of EMR in an e-healthcare system.
Similar content being viewed by others
References
Abd El-Latif AA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075–21083. https://doi.org/10.1109/ACCESS.2018.2820603
Agrawal S, Kumar M (2016) Reversible Data Hiding for Medical Images using Integer-to-Integer Wavelet Transform. IEEE Student’s conference on electrical, Electronics and Computer Science. https://doi.org/10.1109/SCEECS.2016.7509266
Al-Otum HM (2014) Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique. J Vis Commun Image Represent 25(5):1064–1081
Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239
Arnol'd VI, Avez A (1968) Ergodic problems of classical mechanics. Benjamin, New York
Benrhouma O, Hermassi H, El-Latif AAA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75:8695–8718
Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470
Cox I, Miller M, Bloom J, Miller M, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann, San Francisco
Digital Guardian. Top 10 biggest healthcare data breaches of all time (2018). Available at: https://digitalguardian.com/blog/top-10-biggest-healthcare-data-breaches-all-time.
Hamza R, Muhammad K, Lv Z, Titouna F (2017) Secure video summarization framework for personalized wireless capsule endoscopy. Pervasive and Mobile Computing 41:436–450
Hamza R, Titouna F (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Information Security Journal: A Global Perspective 25(4–6):162–179
Hassan B, Ahmed R, Li B, Hassan O (2019) An imperceptible medical image watermarking framework for automated diagnosis of retinal pathologies in an eHealth arrangement. IEEE Access 7:69758–69775
Health Care IT News. The biggest healthcare data breaches in 2018 (so far). (2018) Available at: https://www.healthcareitnews.com/projects/biggest-healthcare-data-breaches-2018-so-far.
Hong W, Chen M, Chen TS (2017) An efficient reversible image authentication method using improved PVO and LSB substitution techniques. Signal Process Image Commun 58:111–122
Huang Y, Niu B, Guan H, Zhang S (2019) Enhancing image watermarking with adaptive embedding parameter and PSNR guarantee. IEEE Transactions on Multimedia 21(10):2447–2460
Hurrah NN, Loan NA, Parah SA, Sheikh JA (2017) A transform domain based robust color image watermarking scheme for single and dual attacks. 2017 Fourth International Conference on Image Information Processing (ICIIP), vol 00, no pp 1–5 IEEE
Hurrah NN, Parah SA, Loan NA, Sheikh JA, Elhoseny M, Muhammad K (2018). Available at) Dual watermarking framework for privacy protection and content authentication of multimedia. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2018
Hurrah NN, Parah SA, Sheikh JA, Al. Turjamaan F, Mohammad K (2019) Secure data transmission framework for confidentiality in IoTs. In ad hoc networks, Elsevier
Kumar VC, Natarajan V (2016) Hybrid local prediction error-based difference expansion reversible watermarking for medical images. Comput Electr Eng 53:333–345
Li M, Xiao D, Zhang Y (2016) Attack and improvement of the fidelity preserved fragile watermarking of digital images. Arab J Sci Eng 41(3):941–950
Liu X, Lin C, Yuan S (2018) Blind dual watermarking for color images’ authentication and copyright protection. IEEE Transactions on Circuits and Systems for Video Technology 28(5):1047–1055
Nazir AL, Nasir NH, Shabir AP, Lee JW, Javaid AS, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876–19897
Nguyen TS, Chang CC, Chung TF (2014) A tamper-detection scheme for BTC compressed images with high-quality images. KSII Trans Internet Inf Syst 8(6):2005–2021
Nguyen TS, Chang CC, Yang XQ (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU-International Journal of Electronics and Communications 70(8):1055–1061
Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl 76(8):10599–10633
Parah SA, Sheikh JA, Dey N, Bhat GM (2017) Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption. Journal of Global Information Management (JGIM) 25(4):80–102
Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Processing 53:11–24
Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312–327
Roy A, Chakraborty RS (2019) Towards optimal prediction error expansion based reversible image watermarking. IEEE Transactions on Circuits and Systems for Video Technology. https://doi.org/10.1109/TCSVT.2019.2911042,1
Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278
Singh D, Singh SK (2017) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):953–977
Sivakannan S, Thirugnanam G, Sheeba JC (2016) An efficient ICA and DWT combined approach for medical image watermarking technique. World Appl Sci J 34(9):1197–1203
Tiwari A, Sharma M, Tamrakar RK (2017) Watermarking based image authentication and tamper detection algorithm using vector quantization approach. AEU-International Journal of Electronics and Communications 78:114–123
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Wojtowicz W, Ogiela MR (2016) Digital images authentication scheme based on bimodal biometric watermarking in an independent domain. J Vis Commun Image Represent 38:1–10
Wu NI, Hwang MS (2007) Data hiding: current status and key issues. IJ Network Security 4(1):1–9
Wu Y, Xiang Y, Guo Y, Tang J, Yin Z (2019) An improved reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans Multimed 1
Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273:329–351
Zhang H, Wang C, Zhou X (2017) Fragile watermarking for image authentication using the characteristic of SVD. Algorithms 10(1):27
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Hurrah, N.N., Parah, S.A. & Sheikh, J.A. Embedding in medical images: an efficient scheme for authentication and tamper localization. Multimed Tools Appl 79, 21441–21470 (2020). https://doi.org/10.1007/s11042-020-08988-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08988-2