Abstract
Telemedicine is a technology-based substitute for conventional health care facilities. It symbolizes the practice of medication via indirect means. The foremost requirement for such remote healthcare practices is the communication of highly sensitive data over insecure networks, which demands very high protection of different types of health-related information such as Electronic Patient Record (EPR) and Related Medical images. Consequently, there is a stern need to develop algorithms to secure all confidential information for overall well being. This paper is an effort to propose one multilayer protection mechanism, which not only secures the patient’s transcript but also protects associated medical Images. EPR is embedded in the original medical image resulting in a watermarked medical image, which is further hidden in the reference image. But these two relevant records are given multiple strata of security before concealing and exposed to the insecure channel. Compression and Quantum Encryption of EPR are done, which is then embed into LWT transformed Medical Image, followed by scrambling and compression of all the planes of a watermarked medical image before embedding in different bands of LWT (Lifting Wavelet Transform), transformed reference image. This stride of hiding image is mandatory because original and watermarked medical images are very similar, thus prone to attacks. In order to avoid this, an image steganography technique is used to change the watermarked medical image’s visual structure, which is also referred to as visually meaningful encryption, as popular encryption algorithms give noise-like textures that can attract attackers. For authentication on the accession of records, biometric-based detection along with hash algorithm is also incorporated. Overall results (implemented using MATLAB) show that the proposed mechanism provides a highly secure and authentic medical healthcare system.
Similar content being viewed by others
References
Akhshani A, Akhavan A, Lim S-C, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17:4653–4661. https://doi.org/10.1016/j.cnsns.2012.05.033
Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:197–207. https://doi.org/10.1016/j.ins.2015.06.049
Bouslimi D, Coatrieux G, Roux C (2012) A joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic images. Comput Methods Prog Biomed 106:47–54. https://doi.org/10.1016/j.cmpb.2011.09.015
Chauhan B, Dhall S, Gupta S (2015) A comparison of various hashing techniques. Int J Comput Netw Appl 2:6
Chopra A, Gupta S, Dhall S (2019) Analysis of frequency domain watermarking techniques in presence of geometric and simple attacks. Multimed Tools Appl 79:501–554. https://doi.org/10.1007/s11042-019-08087-x
Dhall S, Bhushan B, Gupta S (2015) An in-depth analysis of various steganography techniques. Int J Secur Its Appl 9:67–94. https://doi.org/10.14257/ijsia.2015.9.8.07
Dhall S, Bhushan B, Gupta S (2016) An improved hybrid mechanism for secure data communication. Int J Comput Netw Inf Secur 8:67–79. https://doi.org/10.5815/ijcnis.2016.06.08
Elhoseny M, Ramirez-Gonzalez G, Abu-Elnasr OM, Shawkat SA, N A, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596–20608. https://doi.org/10.1109/ACCESS.2018.2817615
Gao T-G, Gu Q-L (2007) Reversible watermarking algorithm based on wavelet lifting scheme. Int Conf Wavelet Anal Pattern Recognit:5
Gholipour M (2011) Design and implementation of lifting based integer wavelet transform for image compression applications. In: Cherifi H, Zain JM, El-Qawasmeh E (eds) Digital information and communication technology and its applications. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 161–172. https://doi.org/10.1007/978-3-642-21984-9_14
https://www.hipaajournal.com/june-2019-healthcare-data-breach-report/.
Kalita M, Tuithung T, Majumder S (2019) A new steganography method using integer wavelet transform and least significant bit substitution. Comput J 62:1639–1655. https://doi.org/10.1093/comjnl/bxz014
Kannammal A, Subha Rani S (2014) Two level security for medical images using watermarking/encryption algorithms. Int J Imaging Syst Technol 24:111–120. https://doi.org/10.1002/ima.22086
Ko L-T, Chen J-E, Shieh Y-S, Hsin H-C, Sung T-Y (2012) Nested quantization index modulation for Reversible watermarking and its application to healthcare information management systems. Comput Math Methods Med 2012:1–8. https://doi.org/10.1155/2012/839161
Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Res 8:37. https://doi.org/10.1007/s13319-017-0148-5
Lei B, Tan E-L, Chen S, Ni D, Wang T, Lei H (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41:3178–3188. https://doi.org/10.1016/j.eswa.2013.11.019
Loan NA, Parah SA, Sheikh JA, Akhoon JA, Bhat GM (2017) Hiding electronic patient record (EPR) in medical images: a high capacity and computationally efficient technique for e-healthcare applications. J Biomed Inform 73:125–136. https://doi.org/10.1016/j.jbi.2017.08.002
Malik A, Gupta S, Dhall S (2020) Analysis of traditional and modern image encryption algorithms under realistic ambience. Multimed Tools Appl 79:27941–27993. https://doi.org/10.1007/s11042-020-09279-6
Masek L, Kovesi P (2003) MATLAB source code for a biometric identification system based on Iris patterns, the School of Computer Science and Software Engineering, the University of Western Australia
Moizuddin M, Winston J, Qayyum M (2017) A comprehensive survey: quantum cryptography, in: 2017 2nd international conference on anti-cyber crimes (ICACC). In: Presented at the 2017 2nd international conference on anti-cyber crimes (ICACC), IEEE, Abha, Saudi Arabia, pp 98–102. https://doi.org/10.1109/Anti-Cybercrime.2017.7905271
Mousavi SM, Naghsh A, Manaf AA, Abu-Bakar SAR (2017) A robust medical image watermarking against salt and pepper noise for brain MRI images. Multimed Tools Appl 76:10313–10342. https://doi.org/10.1007/s11042-016-3622-9
National Institute of Standards and Technology (n.d.) Federal information processing standards publication Secure Hash Standard (SHS) https://doi.org/10.6028/NIST.FIPS.180-4.
Ng RYF, Tay YH, Mok KM (2008) A review of iris recognition algorithms, in: 2008 International Symposium on Information Technology. Presented at the 2008 International symposium on information technology, IEEE, Kuala Lumpur, Malaysia, pp. 1–7. https://doi.org/10.1109/ITSIM.2008.4631656
Priya S, Santhi B (2019) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mob Netw Appl. https://doi.org/10.1007/s11036-019-01213-x
Saini R, Rana N (2014) Comparison of various biometric methods 2:7
Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking for medical images. Wirel Pers Commun 92:1611–1624. https://doi.org/10.1007/s11277-016-3625-x
Sharma G, Gupta S, Dhall S, Nagpal CK (2018a) Publicly verifiable watermarking scheme for intellectual property protection using quantum Chaos and bit plane complexity slicing. Multimed Tools Appl 77:31737–31762. https://doi.org/10.1007/s11042-018-6226-8
Sharma R, Ganotra R, Dhall S, Gupta S (2018b) Performance comparison of steganography techniques. Int J Comput Netw Inf Secur. 10:37–46. https://doi.org/10.5815/ijcnis.2018.09.04
Shelke R, Metkar S (2016) Image scrambling methods for digital image encryption, in: 2016 international conference on signal and information processing (IConSIP). In: Presented at the 2016 international conference on signal and information processing (IConSIP), IEEE, Maharashtra state, India, pp 1–6. https://doi.org/10.1109/ICONSIP.2016.7857449
Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80:1415–1433. https://doi.org/10.1007/s11277-014-2091-6
Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75:8381–8401. https://doi.org/10.1007/s11042-015-2754-7
Solanki N, Malik SK (2014) ROI based medical image watermarking with zero distortion and enhanced security. Int J Mod Educ Comput Sci 6:40–48. https://doi.org/10.5815/ijmecs.2014.10.06
Tayal N, Bansal R, Dhal S, Gupta S (2017) A novel hybrid security mechanism for data communication networks. Multimed Tools Appl 76:24063–24090. https://doi.org/10.1007/s11042-016-4111-x
Umamageswari A, Ferni Ukrit M, Suresh R, Dr.G (2011) A survey on security in medical image communication. Int J Comput Appl 30:41–45. https://doi.org/10.5120/3619-5051
Wu Y, Agaian S (2011) NPCR and UACI Randomness Tests for Image Encryption:8
Wu L, Zhang J, Deng W, He D (2009) Arnold transformation algorithm and anti-Arnold transformation algorithm, in: 2009 first international conference on information science and engineering. In: Presented at the 2009 first international conference on information science and engineering, IEEE, Nanjing, China, pp 1164–1167. https://doi.org/10.1109/ICISE.2009.347
Yan Y, Dong Z (2000) An approach to integer wavelet transform for medical image compression in PACS. Wuhan Univ J Nat Sci 5:204–206. https://doi.org/10.1007/BF02827928
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest’ declaration
On behalf of all authors, the corresponding author states that there is no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Dhall, S., Gupta, S. Multilayered highly secure authentic watermarking mechanism for medical applications. Multimed Tools Appl 80, 18069–18105 (2021). https://doi.org/10.1007/s11042-021-10531-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10531-w