Skip to main content
Log in

Review of medical image authentication techniques and their recent trends

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

There is always a need for an updated systematic review of a special subject area because of its importance for the researchers and the interested audience. This paper presents a review of medical image authentication (MIA) which is an interesting application of medical image watermarking techniques. The main objectives of medical image authentication techniques are protecting the medical images from tampering and verifying their integrity. Over the years many MIA schemes have been presented for different purposes such as detecting tampering in the medical images, localizing the tampered region, and recovering the tampered region. This paper starts by providing some basic information about the medical image watermarking techniques and their requirements, followed by a brief display for the previous review papers in this field which proves the necessity to present this review paper. Then, an overview of MIA process and its domain-based concepts are presented. Thereafter, the MIA schemes are classified according to their objectives and the domain of embedding the watermarks. The most used performance evaluation measures and metrics in the state-of-the-art are also reviewed in this paper followed by the conclusions and some recent trends of this interesting research field.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Abokhdair NO, Bt A, Manaf A (2013) A review of reversible watermarking properties, applications and techniques for medical images, pp. 6–11

  2. Abraham J, Paul V (2019) An imperceptible spatial domain color image watermarking scheme. J King Saud Univ - Comput Inf Sci 31(1):125–133. https://doi.org/10.1016/j.jksuci.2016.12.004

    Article  Google Scholar 

  3. Agrawal R, Sharma M (2014) Comparative evaluation of image watermarking method in health care. I-Manager’s J Image Process 1(1):2014

    Google Scholar 

  4. Al-Ghadi MQ (2018) Watermarking approaches for images authentication in applications with time constraints (PhD thesis), Université de Bretagne occidentale - Brest

  5. Allaf AH, Kbir MA (2019) A review of digital watermarking applications for medical image exchange security. In: The Proceedings of the Third International Conference on Smart City Applications, pp. 472–480. https://doi.org/10.1007/978-3-030-11196-0_40.

  6. Alotaibi RA, Elrefaei LA (2019) Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT). Appl Comput Inf 15(2):191–202. https://doi.org/10.1016/j.aci.2018.06.003

    Article  Google Scholar 

  7. Al-Qershi OM, Ee KB (2009) Authentication and Data Hiding Using a Reversible ROI-based Watermarking Scheme for DICOM Images. In: World Academy of Science, Engineering and Technology, pp. 801–806

  8. Al-Qershi OM, Khoo BE (2010) ROI-based tamper detection and recovery for medical images using reversible watermarking technique. Proc 2010 IEEE Int Conf Inf Theory Inf Secur ICITIS 2010, pp. 151–155. https://doi.org/10.1109/ICITIS.2010.5688743

  9. Al-Qershi OM, Khoo BE (2011) Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24(1):114–125. https://doi.org/10.1007/s10278-009-9253-1

    Article  Google Scholar 

  10. Alsaade FW (2016) Watermarking system for the security of medical image databases used in telemedicine. Res J Inf Technol 8(3):88–97. https://doi.org/10.3923/rjit.2016.88.97

    Article  Google Scholar 

  11. Alshanbari HS (2020) Medical image watermarking for ownership & tamper detection. Multimed Tools Appl:1–17. https://doi.org/10.1007/s11042-020-08814-9

  12. Alshanbari HS (2020) Medical image watermarking for ownership & tamper detection. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-08814-9.

  13. An L, Gao X, Deng C, Ji F (2010) Robust lossless data hiding: Analysis and evaluation. Proc. 2010 Int. Conf. High Perform. Comput. Simulation, HPCS 2010, pp. 512–516. https://doi.org/10.1109/HPCS.2010.5547084

  14. An L, Gao X, Deng C (2010) Reliable embedding for robust reversible watermarking. Proc 2nd Int Conf Internet Multimed Comput Serv ICIMCS’10, pp. 57–60. https://doi.org/10.1145/1937728.1937742.

  15. An L, Gao X, Li X, Tao D, Deng C, Li J (2012) Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans Image Process 21(8):3598–3611. https://doi.org/10.1109/TIP.2012.2191564

    Article  MathSciNet  MATH  Google Scholar 

  16. An L, Gao X, Yuan Y, Tao D (2012) Robust lossless data hiding using clustering and statistical quantity histogram. Neurocomputing 77(1):1–11. https://doi.org/10.1016/j.neucom.2011.06.012

    Article  Google Scholar 

  17. An L, Gao X, Yuan Y, Tao D, Deng C, Ji F (2012) Content-adaptive reliable robust lossless data embedding. Neurocomputing 79:1–11. https://doi.org/10.1016/j.neucom.2011.08.019

    Article  Google Scholar 

  18. Anand A, Singh AK (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72–80. https://doi.org/10.1016/j.comcom.2020.01.038

    Article  Google Scholar 

  19. Aparna P, Kishore PVV (2018) An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm. J Intell Syst 27(1):115–133. https://doi.org/10.1515/jisys-2017-0266

    Article  Google Scholar 

  20. Aparna P, Kishore PVV (2020) A Blind Medical Image Watermarking for Secure E-Healthcare Application Using Crypto-Watermarking System. J Intell Syst 29(1):1558–1575. https://doi.org/10.1515/jisys-2018-0370

    Article  Google Scholar 

  21. Araghi TK, Manaf AA (2019) An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Futur Gener Comput Syst 101:1223–1246. https://doi.org/10.1016/j.future.2019.07.064

    Article  Google Scholar 

  22. Arsalan M, Qureshi AS, Khan A, Rajarajan M (2017) Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique. Appl Soft Comput 51:168–179. https://doi.org/10.1016/j.asoc.2016.11.044

    Article  Google Scholar 

  23. Arumugham S, Rajagopalan S, Rayappan JBB, Amirtharajan R (2018) Networked medical data sharing on secure medium – A web publishing mode for DICOM viewer with three layer authentication. J Biomed Inform 86:90–105. https://doi.org/10.1016/j.jbi.2018.08.010

    Article  Google Scholar 

  24. Asatryan D, Asatryan N (2009) Combined spatial and frequency domain watermarking. In: Proceedings of the 7th International Conference on Computer Science and Information Technologies, pp. 323–326

  25. Assini I, Badri A, Sahel KSA, Baghdad A (2018) A robust hybrid watermarking technique for securing medical image. Int J Intell Eng Syst 11(3):169–176. https://doi.org/10.22266/IJIES2018.0630.18

    Article  Google Scholar 

  26. Azeroual A, Afdel K (2017) Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet. AEU Int J Electron Commun 79:207–218. https://doi.org/10.1016/j.aeue.2017.06.001

    Article  Google Scholar 

  27. Bagheri MH et al (2017) Advances in medical imaging for the diagnosis and management of common genitourinary cancers. Urol Oncol Semin Orig Investig 35(7):473–491. https://doi.org/10.1016/j.urolonc.2017.04.014

    Article  Google Scholar 

  28. Balamurugan G, Jayarraman DKB, Arulalan V (2014) A Survey on Medical Image Watermarking Techniques. Int J Comput Sci Netw 3(5):309–317

    Google Scholar 

  29. Bamal R, Kasana SS (2019) Dual hybrid medical watermarking using walsh-slantlet transform. Multimed Tools Appl 78(13):17899–17927. https://doi.org/10.1007/s11042-018-6820-9

    Article  Google Scholar 

  30. Bankman I (2009) Handbook of Medical Image Processing and Analysis, Academic Press, Elsevier

  31. Begum M, Uddin MS (2020) Digital image watermarking techniques: A review. Inf 11(2). https://doi.org/10.3390/info11020110.

  32. Benyoussef M, Mabtoul S, El Marraki M, Aboutajdine D (2014) Medical image watermarking for copyright protection based on visual cryptography. Int Conf Multimed Comput Syst -Proc, pp. 93–98. https://doi.org/10.1109/ICMCS.2014.6911198.

  33. Bhagat D, Bhardwaj R (2019) A Survey on Medical Images for Reversible Data Hiding Techniques. Proc. - 2019 Amity Int. Conf. Artif. Intell. AICAI 2019, no. April 2019, pp. 811–817. https://doi.org/10.1109/AICAI.2019.8701228

  34. Borra S, Thanki R, Dey N (2018) Digital image watermarking theoretical and computational advances. CRC Press

  35. Cedillo-Hernandez M, Cedillo-Hernandez A, Nakano-Miyatake M, Perez-Meana H (2020) Improving the management of medical imaging by using robust and secure dual watermarking. Biomed Signal Process Control 56:101695. https://doi.org/10.1016/j.bspc.2019.101695

    Article  Google Scholar 

  36. Celebi ME, Schaefer G (2013) Color Medical Image Analysis, Lecture Notes in Computational Vision and Biomechanics. Springer Netherlands

  37. Chaitanya K, Rao KG (2018) A novel approach to medical image watermarking for tamper detection and recovery of Region of Interest using block compression and checksum. Int J Eng Technol 7(4):2137–2148. https://doi.org/10.14419/ijet.v7i4.128554

    Article  Google Scholar 

  38. Chauhan DS, Singh AK, Adarsh A, Kumar B, Saini JP (2019) Combining Mexican hat wavelet and spread spectrum for adaptive watermarking and its statistical detection using medical images. Multimed Tools Appl 78(10):12647–12661. https://doi.org/10.1007/s11042-017-5348-8

    Article  Google Scholar 

  39. Chawla G, Haryana R, Saini CMRA, Yadav R (2012) Classification of watermarking based upon various parameters. Int J Comput Appl Inf Technol, Issue II, vol. I(Ii): 2278–7720. Available: www.ijcait.com.

  40. Chiang KH, Chang-Chien KC, Chang RF, Yen HY (2008) Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J Digit Imaging 21(1):77–90. https://doi.org/10.1007/s10278-007-9012-0

    Article  Google Scholar 

  41. Choi O, Jeon I, Yoo SW, Moon S (2013) An extended DCT domain watermarking for robot vision against geometric image attacks. J Appl Math 2013. https://doi.org/10.1155/2013/632043

  42. Chuin LS, Zain JM (2009) A Review of Medical Image Watermarking Schemes. In: Proceedings of ICSECS09 International Conference on Software Engineering and Computer Systems

  43. Coatrieux G, Lecornu L, Sankur B, Roux C (2006) A review of image watermarking applications in healthcare. Annu Int Conf IEEE Eng Med Biol - Proc, pp. 4691–4694. https://doi.org/10.1109/IEMBS.2006.259305.

  44. Cox IJ, Miller ML, Bloom JA (2002) Digital Watermarking. Morgan Kaufmann

  45. da Li L, Guo BL, Guo L (2008) Rotation, scaling and translation invariant image watermarking using feature points. J China Univ Posts Telecommun 15(2):82–87. https://doi.org/10.1016/S1005-8885(08)60089-8

    Article  Google Scholar 

  46. Dabas P, Khanna K (2013) A Study on Spatial and Transform Domain Watermarking Techniques. Int J Comput Appl 71(14):38–41

    Google Scholar 

  47. Dixit A, Dixit R (2017) A Review on Digital Image Watermarking Techniques. Int J Image Graph Signal Process 9(4):56–66. https://doi.org/10.5815/ijigsp.2017.04.07

    Article  Google Scholar 

  48. Doërr G, Dugelay J-L (2003) Video watermarking: overview and challenges. In: Handbook of Video Databases: Design and Applications

  49. Dou W, Poh CL, Guan YL (2012) An Improved Tamper Detection and Localization Scheme for Volumetric DICOM Images. J Digit Imaging 25(6):751–763. https://doi.org/10.1007/s10278-012-9518-y

    Article  Google Scholar 

  50. El-Shazly EHM (2004) Digital Image Watermarking in Transform Domains, Minufiya University

  51. Emami MS, Omar K, Sahran S, Abdullah SNHS (2014) Spatial Domain Approaches for Real-Time Ownership Identification. J Adv Inf Technol 5(1):1–4. https://doi.org/10.4304/jait.5.1.1-4

    Article  Google Scholar 

  52. Eswaraiah R, Sreenivasa Reddy E (2014) Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl vol, 2014. https://doi.org/10.1155/2014/984646.

  53. Fan T-Y, Chao H-C, Chieu B-C (2019) Lossless medical image watermarking method based on significant difference of cellular automata transform coefficient. Signal Process Image Commun 70:174–183. https://doi.org/10.1016/j.image.2018.09.015

    Article  Google Scholar 

  54. Fares K, Amine K, Salah E (2020) A robust blind color image watermarking based on Fourier transform domain. Optik (Stuttg) 208:164562. https://doi.org/10.1016/j.ijleo.2020.164562

    Article  Google Scholar 

  55. Flanders AE (2009) Medical image and data sharing: Are we there yet? Radiographics 29(5):1247–1251. https://doi.org/10.1148/rg.295095151

    Article  Google Scholar 

  56. Fu S, Zhang M, Mu C, Shen X (2018) Advancements of Medical Image Enhancement in Healthcare Applications. J Healthc Eng 2018:7035264. https://doi.org/10.1155/2018/7035264

    Article  Google Scholar 

  57. Gadhiya TD, Roy AK, Mitra SK, Mall V (2017) Use of discrete wavelet transform method for detection and localization of tampering in a digital medical image. In: 2017 IEEE Region 10 Symposium (TENSYMP), pp. 1–5. https://doi.org/10.1109/TENCONSpring.2017.8070082

  58. Gangadhar Y, Giridhar Akula VS, Reddy PC (2018) An evolutionary programming approach for securing medical images using watermarking scheme in invariant discrete wavelet transformation. Biomed Signal Process Control 43:31–40. https://doi.org/10.1016/j.bspc.2018.02.007

    Article  Google Scholar 

  59. Ganguly D, Chakraborty S, Balitanas M, Kim TH (2010) Medical imaging: A review. Commun Comput Inf Sci 78 CCIS:504–516. https://doi.org/10.1007/978-3-642-16444-6_63

    Article  Google Scholar 

  60. Gao X, An L, Li X, Tao D (2009) Reversibility improved lossless data hiding. Signal Process 89(10):2053–2065. https://doi.org/10.1016/j.sigpro.2009.04.015

    Article  MATH  Google Scholar 

  61. Gao G, Wan X, Yao S, Cui Z, Zhou C, Sun X (2017) Reversible data hiding with contrast enhancement and tamper localization for medical images. Inf Sci (NY) 385-386:250–265. https://doi.org/10.1016/j.ins.2017.01.009

    Article  Google Scholar 

  62. Giakoumaki A, Pavlopoulos S, Koutsouris D (2005) Multiple digital watermarking applied to medical imaging. Conf Proc Int Conf. IEEE Eng Med Biol Soc 4, pp. 3444–3447. Available: http://www.ncbi.nlm.nih.gov/pubmed/17280964

  63. Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10(4):722–732. https://doi.org/10.1109/TITB.2006.875655

    Article  Google Scholar 

  64. Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Secure and efficient health data management through multiple watermarking on medical images. Med Biol Eng Comput 44(8):619–631. https://doi.org/10.1007/s11517-006-0081-x

    Article  Google Scholar 

  65. Gueorguiev VE, Ivanov IE, Ivanov BI (2019) Improving quality of digital medical images. In: 2019 Second Balkan Junior Conference on Lighting (Balkan Light Junior), pp. 1–6. https://doi.org/10.1109/BLJ.2019.8883604

  66. Gull S, Loan NA, Parah SA, Sheikh JA, Bhat GM (2018) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-1158-8

  67. Gunjal BL, Manthalkar RR (2010) An overview of transform domain robust digital image watermarking algorithms. J Emerg Trends Comput Inf Sci 2(1):37–42

    Google Scholar 

  68. Guo X, Zhuang TG (2009) A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53–64. https://doi.org/10.1007/s10278-007-9043-6

    Article  Google Scholar 

  69. Guo X, Zhuang TG (2009) Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22(6):620–628. https://doi.org/10.1007/s10278-008-9120-5

    Article  Google Scholar 

  70. hang X, Liu X, Chen Y, Shu H (2018) Medical image blind integrity verification with krawtchouk moments. Int J Biomed Imaging 2018. https://doi.org/10.1155/2018/2572431.

  71. Haouzia A, Noumeir R (2008) Methods for image authentication: A survey. Multimed Tools Appl 39(1):1–46. https://doi.org/10.1007/s11042-007-0154-3

    Article  Google Scholar 

  72. Huynh-The T et al (2018) Selective bit embedding scheme for robust blind color image watermarking. Inf Sci (NY) 426:1–18. https://doi.org/10.1016/j.ins.2017.10.016

    Article  Google Scholar 

  73. Islam S, Das A, Gupta S, Gupta P (2014) Data hiding in medical images. J Comput 9(3):513–518. https://doi.org/10.4304/jcp.9.3.513-518

    Article  Google Scholar 

  74. Jennifer Ranjani J, Babu M (2018) Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding. J Intell Syst 27(1):19–30. https://doi.org/10.1515/jisys-2017-0019

    Article  Google Scholar 

  75. Kallianpur AK, Bharath MV, Manikantan K (2015) Digital image watermarking using optimized transform-domain approach. In: 2015 IEEE UP Section Conference on Electrical Computer and Electronics (UPCON), pp. 1–6. https://doi.org/10.1109/UPCON.2015.7456684

  76. Kang X, Zhao F, Chen Y, Lin G, Jing C (2020) Combining polar harmonic transforms and 2D compound chaotic map for distinguishable and robust color image zero-watermarking algorithm. J Vis Commun Image Represent 102804. https://doi.org/10.1016/j.jvcir.2020.102804.

  77. Kannammal A, Rani SS (2011) Authentication of DICOM Medical Images using Multiple fragile watermarking Techniques in Wavelet Transform Domain. Int J Comput Sci Issues 8(6):181–189

    Google Scholar 

  78. Kaur M, Kaur R (2012) Reversible watermarking of medical images: authentication and recovery-a survey. J Inf Oper Manag 3(1):241–244

    MathSciNet  Google Scholar 

  79. Kavadia C Available Online at www.ijarcs.info(2013) A review on spatial & transform domain digital watermarking techniques. Int J Adv Res Comput Sci 4(3):20–22

    Google Scholar 

  80. Kelkar V, Tuckley K, Nemade H (2017) Novel variants of a histogram shift-based reversible watermarking technique for medical images to improve hiding capacity. J Healthc Eng 2017, no. i. https://doi.org/10.1155/2017/3538979.

  81. Khor HL, Liew SC, Zain JM (2017) Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images. J Digit Imaging 30(3):328–349. https://doi.org/10.1007/s10278-016-9930-9

    Article  Google Scholar 

  82. Kishore RR (2020) A Novel and Efficient Blind Image Watermarking In Transform A Novel and Efficient Blind Domain Image Watermarking In Transform Domain. Procedia Comput Sci 167(2019):1505–1514. https://doi.org/10.1016/j.procs.2020.03.361

    Article  Google Scholar 

  83. Kishore PVV, Srinivasa Rao M, Raghava Prasad C, Anil Kumar D (2016) Medical image watermarking: Run through review. ARPN J Eng Appl Sci 11(5):2882–2899

    Google Scholar 

  84. Kulkarni MMB, Patil RT (2012) Tamper Detection & Recovery in Medical Image with secure data hiding using Reversible watermarking. Int J Emerg Technol Adv Eng 2(3):1–4

    Google Scholar 

  85. Lee H-Y (2019) Adaptive reversible watermarking for authentication and privacy protection of medical records. Multimed Tools Appl 78(14):19663–19680. https://doi.org/10.1007/s11042-019-7322-0

    Article  Google Scholar 

  86. Lee YS, Seo YH, Kim DW (2019) Blind image watermarking based on adaptive data spreading in N-level DWT subbands. Secur Commun Networks, vol. 2019. https://doi.org/10.1155/2019/8357251.

  87. Li L-D, Guo B-L (2009) Localized image watermarking in spatial domain resistant to geometric attacks. AEU Int J Electron Commun 63(2):123–131. https://doi.org/10.1016/j.aeue.2007.11.007

    Article  Google Scholar 

  88. Li L, Qian J, Pan JS (2011) Characteristic region based watermark embedding with RST invariance and high capacity. AEU Int J Electron Commun 65(5):435–442. https://doi.org/10.1016/j.aeue.2010.06.001

    Article  Google Scholar 

  89. Lipiński P (2012) On domain selection for additive, blind image watermarking. Bull Polish Acad Sci Tech Sci 60(2):317–321. https://doi.org/10.2478/v10175-012-0042-5

    Article  Google Scholar 

  90. Liu F, Wu C (2011) Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners. IET Inf Secur 5(2):121–128. https://doi.org/10.1049/iet-ifs.2009.0183

    Article  Google Scholar 

  91. Liu J, Li J, Ma J, Sadiq N, Bhatti UA, Ai Y (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and henon map. Appl Sci 9(4). https://doi.org/10.3390/app9040700.

  92. Liu X et al. (2019) A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images. IEEE Access, vol. 7, pp. 76580–76598. Available: https://repository.lboro.ac.uk/articles/A_novel_robust_reversible_watermarking_scheme_for_protecting_authenticity_and_integrity_of_medical_images/9402785.

  93. Loan NA, Parah SA, Sheikh JA, Akhoon JA, Bhat GM (2017) Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications. J Biomed Inform 73:125–136. https://doi.org/10.1016/j.jbi.2017.08.002

    Article  Google Scholar 

  94. Madhuri YU, Chaitanya K (2016) Reversible watermarking technique for data hiding, accurate tamper detection in ROI and exact recovery of ROI. IJARCCE 5(8):184–188. https://doi.org/10.17148/IJARCCE.2016.5834

    Article  Google Scholar 

  95. Maier A, Steidl S, Christlein V, Hornegger J (2018) Medical imaging systems - an introductory guide, vol. 11111. Springer Open

  96. Makbol NM, Khoo BE, Rassem TH, Loukhaoukha K (2017) A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inf Sci (NY) 417:381–400. https://doi.org/10.1016/j.ins.2017.07.026

    Article  Google Scholar 

  97. Malayil MV, Vedhanayagam M (2020) A novel image scaling based reversible watermarking scheme for secure medical image transmission. ISA Trans. https://doi.org/10.1016/j.isatra.2020.08.019.

  98. Marini E et al. (2008) Evaluation of standard watermarking techniques. Electron Imaging Secur Steganography Watermarking Multimed. Contents. Available: https://hal.archives-ouvertes.fr/hal-00250682

  99. Memon Ahmed N (2010) Watermarking of medical images for content authentication and copyright protection, vol. Doctor of, no. May, p. 195

  100. Memon NA, Chaudhry A, Ahmad M, Keerio ZA (2011) Hybrid watermarking of medical images for ROI authentication and recovery. Int J Comput Math 88(10):2057–2071. https://doi.org/10.1080/00207160.2010.543677

    Article  Google Scholar 

  101. Mohanarathinam A, Kamalraj S, Prasanna Venkatesan GKD, Ravi RV, Manikandababu CS (2019) Digital watermarking techniques for image security: a review. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-019-01500-1

  102. Mothi R, Karthikeyan M (2019) Protection of bio medical iris image using watermarking and cryptography with WPT. Measurement 136:67–73. https://doi.org/10.1016/j.measurement.2018.12.030

    Article  Google Scholar 

  103. Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking Techniques used in Medical Images: a Survey. J Digit Imaging 27(6):714–729. https://doi.org/10.1007/s10278-014-9700-5

    Article  Google Scholar 

  104. Naseem MT, Qureshi IM, Cheema TA (2013) Hash based Medical Image Authentication and Recovery using Chaos and Residue Number System. J Basic Appl Sci Res 3(6):488–495

    Google Scholar 

  105. Nguyen T-S, Chang C-C, Yang X-Q (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU Int J Electron Commun 70(8):1055–1061. https://doi.org/10.1016/j.aeue.2016.05.003

    Article  Google Scholar 

  106. Ni Z, Shi YQ, Ansari N, Su W, Sun Q, Lin X (2008) Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Trans Circ Syst Video Technol 18(4):497–509. https://doi.org/10.1109/TCSVT.2008.918761

    Article  Google Scholar 

  107. Nyeem H, Boles W, Boyd C (2013) A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326–343. https://doi.org/10.1007/s10278-012-9527-x

    Article  Google Scholar 

  108. Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. J Biomed Inform 66:214–230. https://doi.org/10.1016/j.jbi.2017.01.006

    Article  Google Scholar 

  109. Priyanka, Maheshkar S (2017) Region-based hybrid medical image watermarking for secure telemedicine applications. Multimed Tools Appl 76(3):3617–3647. https://doi.org/10.1007/s11042-016-3913-1

    Article  Google Scholar 

  110. Qasim AF, Meziane F, Aspin R (2018) Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review. Comput Sci Rev 27(2):45–60. https://doi.org/10.1016/j.cosrev.2017.11.003

    Article  MathSciNet  MATH  Google Scholar 

  111. Qasim AF, Aspin R, Meziane F, Hogg P (2019) ROI-based reversible watermarking scheme for ensuring the integrity and authenticity of DICOM MR images. Multimed Tools Appl 78(12):16433–16463. https://doi.org/10.1007/s11042-018-7029-7

    Article  Google Scholar 

  112. Radha Kumari R, Vijaya Kumar V, Naidu KR (2019) Existing trends of digital watermarking and its significant impact on multimedia streaming: A survey. Int J Adv Comput Sci Appl 10(2):126–139. https://doi.org/10.14569/ijacsa.2019.0100217

    Article  Google Scholar 

  113. Rahman AU, Sultan K, Musleh D, Aldhafferi N, Alqahtani A, Mahmud M (2018) Robust and fragile medical image watermarking: a joint venture of coding and chaos theories. J Healthc Eng 2018. https://doi.org/10.1155/2018/8137436

  114. Rahman AU, Sultan K, Aldhafferi N, Alqahtani A, and Mahmud M 2018) Reversible and fragile watermarking for medical images. Comput Math Methods Med, 2018, https://doi.org/10.1155/2018/3461382

  115. Rai A, Singh HV (2017) SVM based robust watermarking for enhanced medical image security. Multimed Tools Appl 76(18):18605–18618. https://doi.org/10.1007/s11042-016-4215-3

    Article  Google Scholar 

  116. Rai A, Singh HV (2018) Machine Learning-Based Robust Watermarking Technique for Medical Image Transmitted over LTE Network. J Intell Syst 27(1):105–114. https://doi.org/10.1515/jisys-2017-0068

    Article  Google Scholar 

  117. Rathi SC, Inamdar VS (2012) Medical Images Authentication Through Watermarking Preserving Roi. Heal Inf-An Int J 1(1):27–42

    Google Scholar 

  118. Raúl RC, Claudia FU, Trinidad-Blas GDJ (2007) Data hiding scheme for medical images. In: 17th Int. Conf. Electron. Commun. Comput. CONIELECOMP’07, Proc., no. February 2007. https://doi.org/10.1109/CONIELECOMP.2007.14

  119. Rayachoti E, Edara SR, Pradesh A, Pradesh A (2014) Block based medical image watermarking technique for tamper detection and recovery. arXiv:1412.6143 [cs.MM]

  120. Razbonyalı C, Güvenoğlu E (2016) Traditional Data Storage Methods and the Big Data Concepts. Int Res J Eng Technol 03(06):2556–2561

    Google Scholar 

  121. Roček A, Slavíček K, Dostál O, Javorník M (2016) A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters. Biomed Signal Process Control 29:44–52. https://doi.org/10.1016/j.bspc.2016.05.005

    Article  Google Scholar 

  122. Rohini S, Bairagi V (2010) Lossless Medical Image Security. Int J Appl Eng Res 1(3):536–541

    Google Scholar 

  123. Rosenbloom ST et al (2010) Generating clinical notes for electronic health record systems. Appl Clin Inform 1(3):232–243. https://doi.org/10.4338/ACI-2010-03-RA-0019

    Article  Google Scholar 

  124. Sabbane F, Tairi H (2019) Medical image watermarking technique based on polynomial decomposition. Multimed Tools Appl 78(23):34129–34155. https://doi.org/10.1007/s11042-019-08134-7

    Article  Google Scholar 

  125. Saju G (2019) An effective method for detection and localization of tampering. Int J Inf Syst Comput Sci 8(2):152–154. https://doi.org/10.30534/ijiscs/2019/36822019

    Article  MathSciNet  Google Scholar 

  126. Senapati RK, Srivastava S, Mankar P (2020) RST invariant blind image watermarking schemes based on discrete Tchebichef transform and singular value decomposition. Optik (Stuttg), 164694. https://doi.org/10.1016/j.ijleo.2020.164694

  127. Shaik A, Masilamani V (2018) Zero-Watermarking in Transform Domain and Quadtree Decomposition for under Water Images Captured by Robot. Procedia Comput Sci 133:385–392. https://doi.org/10.1016/j.procs.2018.07.047

    Article  Google Scholar 

  128. Sharma A, Singh AK, Ghrera SP (2015) Secure Hybrid Robust Watermarking Technique for Medical Images. Procedia Comput Sci 70:778–784. https://doi.org/10.1016/j.procs.2015.10.117

    Article  Google Scholar 

  129. Shehab A et al (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278. https://doi.org/10.1109/ACCESS.2018.2799240

    Article  Google Scholar 

  130. Shiguo L, Kanellopoulos D, Ruffo G (2009) Recent advances in multimedia information system security. Inform 33(1):3–24

    MathSciNet  Google Scholar 

  131. Shih FY, Zhong X (2016) High-capacity multiple regions of interest watermarking for medical images. Inf Sci (NY) 367–368:648–659. https://doi.org/10.1016/j.ins.2016.07.015

    Article  Google Scholar 

  132. Singh G (2018) A review of secure medical image watermarking. IEEE Int. Conf. Power, Control. Signals Instrum. Eng. ICPCSI 2017, no. June 2018, pp. 3105–3109. https://doi.org/10.1109/ICPCSI.2017.8392297

  133. Singh KU, Singhal A (2019) A synthesis of state of the art contributions in digital image watermarking. Int J Recent Technol Eng 8(1C2):329–340

    Google Scholar 

  134. Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381–8401. https://doi.org/10.1007/s11042-015-2754-7

    Article  Google Scholar 

  135. Singh AK, Kumar B, Singh G, Mohan A (2017) Medical image watermarking, 1st ed. Springer International Publishing

  136. Singh AK, Kumar B, Singh G, Mohan A (2017) In: Singh AK, Kumar B, Singh G, Mohan A (eds) State-of-the-Art Techniques of Image Watermarking: New Trends and Future Challenges BT - Medical Image Watermarking: Techniques and Applications. Springer International Publishing, Cham, pp 227–244

    Google Scholar 

  137. Sinha S, Singh A, Gupta R, Singh S (2018) Authentication and Tamper Detection in Tele-medicine using Zero Watermarking. Procedia Comput Sci 132:557–562. https://doi.org/10.1016/j.procs.2018.05.009

    Article  Google Scholar 

  138. Soualmi A, Alti A, Laouamer L (2018) Toward a Secure and Robust Medical Image Watermarking in Untrusted Environment. AMLTA 2018 Adv Intell Syst Comput, vol. 723, pp. 693–703. https://doi.org/10.1007/978-3-319-74690-6_68.

  139. Su Q, Niu Y, Wang Q, Sheng G (2013) A blind color image watermarking based on DC component in the spatial domain. Optik (Stuttg) 124(23):6255–6260. https://doi.org/10.1016/j.ijleo.2013.05.013

    Article  Google Scholar 

  140. Sun S, Zhang R (2017) Region of interest extraction of medical image based on improved region growing algorithm. In: International Conference on Material Science, Energy and Environmental Engineering (MSEEE 2017), vol. 125, pp. 360–364, https://doi.org/10.2991/mseee-17.2017.87

  141. Swaraja K (2018) Medical image region based watermarking for secured telemedicine. Multimed Tools Appl 77(21):28249–28280. https://doi.org/10.1007/s11042-018-6020-7

    Article  Google Scholar 

  142. Swaraja K, Meenakshi K, Padmavathi K (2020) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control 55:101665. https://doi.org/10.1016/j.bspc.2019.101665

    Article  Google Scholar 

  143. Tan CK, Ng JC, Xu X, Poh CL, Guan YL, Sheah K (2011) Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528–540. https://doi.org/10.1007/s10278-010-9295-4

    Article  Google Scholar 

  144. Tareef A, Al-Ani A, Nguyen H, Chung YY (2014) A novel tamper detection-recovery and watermarking system for medical image authentication and EPR hiding. In: 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 5554–5557. https://doi.org/10.1109/EMBC.2014.6944885

  145. Thabit R (2015) A study of robust reversible image watermarking based on Slantlet transform (PhD thesis),” Universiti Sains Malaysia

  146. Thabit R (2019) Review of Cryptography Applications in eHealth Security Systems. Int J Sci Eng Investig 8(89):110–116 Available: http://www.ijsei.com/papers/ijsei-88919-16.pdf

    Google Scholar 

  147. Thabit R, Khoo BE (2014) Capacity improved robust lossless image watermarking. IET Image Process 8(11). https://doi.org/10.1049/iet-ipr.2013.0862

  148. Thabit R, Khoo BE (2014) Robust reversible watermarking scheme using Slantlet transform matrix. J Syst Softw 88(1). https://doi.org/10.1016/j.jss.2013.09.033.

  149. Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digit Signal Process Rev J 38. https://doi.org/10.1016/j.dsp.2014.12.005

  150. Thabit R, Khoo BE (2017) Medical image authentication using SLT and IWT schemes. Multimed Tools Appl 76(1):309–332. https://doi.org/10.1007/s11042-015-3055-x

    Article  Google Scholar 

  151. Thakkar FN, Srivastava VK (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76(3):3669–3697. https://doi.org/10.1007/s11042-016-3928-7

    Article  Google Scholar 

  152. Thanki R, Borra S (2019) Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing. Multimed Tools Appl 78(10):13905–13924. https://doi.org/10.1007/s11042-018-6746-2

    Article  Google Scholar 

  153. Thanki R, Borra S, Dwivedi V, Borisagar K (2017) An efficient medical image watermarking scheme based on FDCuT–DCT. Eng Sci Technol Int J 20(4):1366–1379. https://doi.org/10.1016/j.jestch.2017.06.001

    Article  Google Scholar 

  154. Tjokorda Agung BW, Adiwijaya, Permana FP (2012) Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and Run Length Encoding (RLE) compression. Proceeding - COMNETSAT 2012 2012 IEEE Int Conf Commun Networks Satell, pp. 167–171. https://doi.org/10.1109/ComNetSat.2012.6380799

  155. Tjokorda B, Adiwijaya, Permana FP (2012) Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression. In: 2012 IEEE International Conference on Communication, Networks and Satellite (ComNetSat), pp. 167–171, https://doi.org/10.1109/ComNetSat.2012.6380799

  156. Tripathi M, Tripathi SP (2013) A review of medical image watermarking schemes 2(3):1–10

  157. Tsai DY, E. Matsuyama, and H. M. Chen (2013) Improving image quality in medical images using a combined method of undecimated wavelet transform and wavelet coefficient mapping. Int J Biomed Imaging 2013. https://doi.org/10.1155/2013/797924.

  158. Tyagi S, Singh HV, Agarwal R, Gangwar SK (2016) Digital watermarking techniques for security applications. Int Conf Emerg Trends Electr Electron Sustain Energy Syst ICETEESES 2016, pp. 379–382. https://doi.org/10.1109/ICETEESES.2016.7581413

  159. Ustubioglu A, Ulutas G (2017) A New Medical Image Watermarking Technique with Finer Tamper Localization. J Digit Imaging 30(6):665–680. https://doi.org/10.1007/s10278-017-9960-y

    Article  Google Scholar 

  160. Verma U, Sharma N (2019) Hybrid mode of medical image watermarking to enhance robustness and imperceptibility. Int J Innov Technol Explor Eng 9(1):351–359. https://doi.org/10.35940/ijitee.A4126.119119

    Article  Google Scholar 

  161. Vishwakarma VP, Sisaudia V (2018) Gray-scale image watermarking based on DE-KELM in DCT domain. Procedia Comput Sci 132(Iccids):1012–1020. https://doi.org/10.1016/j.procs.2018.05.017

    Article  Google Scholar 

  162. Voloshynovskiy S, Herrigel A, Baumgaertner N, Pun T (2000) A stochastic approach to content adaptive digital image watermarking. In: Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg, pp. 211–236

  163. Voloshynovskiy S, Pereira S, Iquise V, Pun T (2001) Attack modelling: Towards a second generation watermarking benchmark. Signal Process 81(6):1177–1214. https://doi.org/10.1016/S0165-1684(01)00039-1

    Article  MATH  Google Scholar 

  164. Wenyin Z, Shih FY (2011) Semi-fragile spatial watermarking based on local binary pattern operators. Opt Commun 284(16):3904–3912. https://doi.org/10.1016/j.optcom.2011.04.004

    Article  Google Scholar 

  165. Woo C, Du J, Pham B (2005) Multiple watermark method for privacy control and tamper detection in medical images. APRS Work Digit Image Comput, pp. 59–64. Available: http://www.aprs.org.au/wdic2005/fullproceedings.pdf

  166. Wu JHK et al (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59–76. https://doi.org/10.1007/s10278-007-9011-1

    Article  Google Scholar 

  167. Yadav J, Sehra K (2018) Large scale dual tree complex wavelet transform based robust features in PCA and SVD subspace for digital image watermarking. Procedia Comput Sci 132(Iccids):863–872. https://doi.org/10.1016/j.procs.2018.05.098

    Article  Google Scholar 

  168. Ye C, Xiong Z, Ding Y, Zhang X, Wang G, Xu F (2015) Joint fingerprinting/encryption for medical image security. Int J Secur Appl 9(1):409–418. https://doi.org/10.14257/ijsia.2015.9.1.39

    Article  Google Scholar 

  169. Yu X, Wang C, Zhou X (2017) Review on semi-fragile watermarking algorithms for content authentication of digital images. Futur Internet 9(4):1–17. https://doi.org/10.3390/fi9040056

    Article  Google Scholar 

  170. Yuan Z, Liu D, Zhang X, Su Q (2020) New image blind watermarking method based on two-dimensional discrete cosine transform. Optik (Stuttg) 204:164152. https://doi.org/10.1016/j.ijleo.2019.164152

    Article  Google Scholar 

  171. Zain JM, Clarke M (2007) Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. Int J Comput Sci Netw Secur 7(9):19–28 Available: http://arxiv.org/abs/1101.1603

    Google Scholar 

  172. Zain JM, Fauzi ARM (2006) Medical image watermarking with tamper detection and recovery. In: 2006 International Conference of the IEEE Engineering in Medicine and Biology Society. https://doi.org/10.1109/IEMBS.2006.260767

  173. Zain JM, Fauzi ARM (2007) Evaluation of medical image watermarking with tamper detection and recovery (AW-TDR). Conf Proc IEEE Eng Med Biol Soc, pp. 5661–5664. https://doi.org/10.1109/IEMBS.2007.4353631

  174. Zain JM, Fauzi ARM (2007) Evaluation of medical image watermarking with tamper detection and recovery (AW-TDR). Conf Proc IEEE Eng Med Biol Soc, pp. 5662–5665

  175. Zear A, Singh AK, Kumar P (2018) Multiple Watermarking for Healthcare Applications. J Intell Syst 27(1):5–18. https://doi.org/10.1515/jisys-2016-0036

    Article  Google Scholar 

  176. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882. https://doi.org/10.1007/s11042-016-3862-8

    Article  Google Scholar 

  177. Zhang W, Tang X, Yang Z, Niu S (2019) Multi-scale segmentation strategies in PRNU-based image tampering localization. Multimed Tools Appl 78(14):20113–20132. https://doi.org/10.1007/s11042-019-7288-y

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rasha Thabit.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thabit, R. Review of medical image authentication techniques and their recent trends. Multimed Tools Appl 80, 13439–13473 (2021). https://doi.org/10.1007/s11042-020-10421-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10421-7

Keywords

Navigation