Skip to main content
Log in

Multilayered highly secure authentic watermarking mechanism for medical applications

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Telemedicine is a technology-based substitute for conventional health care facilities. It symbolizes the practice of medication via indirect means. The foremost requirement for such remote healthcare practices is the communication of highly sensitive data over insecure networks, which demands very high protection of different types of health-related information such as Electronic Patient Record (EPR) and Related Medical images. Consequently, there is a stern need to develop algorithms to secure all confidential information for overall well being. This paper is an effort to propose one multilayer protection mechanism, which not only secures the patient’s transcript but also protects associated medical Images. EPR is embedded in the original medical image resulting in a watermarked medical image, which is further hidden in the reference image. But these two relevant records are given multiple strata of security before concealing and exposed to the insecure channel. Compression and Quantum Encryption of EPR are done, which is then embed into LWT transformed Medical Image, followed by scrambling and compression of all the planes of a watermarked medical image before embedding in different bands of LWT (Lifting Wavelet Transform), transformed reference image. This stride of hiding image is mandatory because original and watermarked medical images are very similar, thus prone to attacks. In order to avoid this, an image steganography technique is used to change the watermarked medical image’s visual structure, which is also referred to as visually meaningful encryption, as popular encryption algorithms give noise-like textures that can attract attackers. For authentication on the accession of records, biometric-based detection along with hash algorithm is also incorporated. Overall results (implemented using MATLAB) show that the proposed mechanism provides a highly secure and authentic medical healthcare system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Akhshani A, Akhavan A, Lim S-C, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17:4653–4661. https://doi.org/10.1016/j.cnsns.2012.05.033

    Article  MathSciNet  MATH  Google Scholar 

  2. Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:197–207. https://doi.org/10.1016/j.ins.2015.06.049

    Article  MathSciNet  MATH  Google Scholar 

  3. Bouslimi D, Coatrieux G, Roux C (2012) A joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic images. Comput Methods Prog Biomed 106:47–54. https://doi.org/10.1016/j.cmpb.2011.09.015

    Article  Google Scholar 

  4. Chauhan B, Dhall S, Gupta S (2015) A comparison of various hashing techniques. Int J Comput Netw Appl 2:6

    Google Scholar 

  5. Chopra A, Gupta S, Dhall S (2019) Analysis of frequency domain watermarking techniques in presence of geometric and simple attacks. Multimed Tools Appl 79:501–554. https://doi.org/10.1007/s11042-019-08087-x

    Article  Google Scholar 

  6. Dhall S, Bhushan B, Gupta S (2015) An in-depth analysis of various steganography techniques. Int J Secur Its Appl 9:67–94. https://doi.org/10.14257/ijsia.2015.9.8.07

    Article  Google Scholar 

  7. Dhall S, Bhushan B, Gupta S (2016) An improved hybrid mechanism for secure data communication. Int J Comput Netw Inf Secur 8:67–79. https://doi.org/10.5815/ijcnis.2016.06.08

    Article  Google Scholar 

  8. Elhoseny M, Ramirez-Gonzalez G, Abu-Elnasr OM, Shawkat SA, N A, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596–20608. https://doi.org/10.1109/ACCESS.2018.2817615

  9. Gao T-G, Gu Q-L (2007) Reversible watermarking algorithm based on wavelet lifting scheme. Int Conf Wavelet Anal Pattern Recognit:5

  10. Gholipour M (2011) Design and implementation of lifting based integer wavelet transform for image compression applications. In: Cherifi H, Zain JM, El-Qawasmeh E (eds) Digital information and communication technology and its applications. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 161–172. https://doi.org/10.1007/978-3-642-21984-9_14

    Chapter  Google Scholar 

  11. https://biometrictoday.com/iris-recognition/

  12. https://geoffboeing.com/2015/03/chaos-theory-logistic-map/

  13. https://resources.infosecinstitute.com/introduction-biometric-key-performance-indicators-standards/#gref

  14. https://www.hipaajournal.com/june-2019-healthcare-data-breach-report/.

  15. https://www.slideshare.net/khandhar/telemedicine-ppt.

  16. Kalita M, Tuithung T, Majumder S (2019) A new steganography method using integer wavelet transform and least significant bit substitution. Comput J 62:1639–1655. https://doi.org/10.1093/comjnl/bxz014

    Article  MathSciNet  Google Scholar 

  17. Kannammal A, Subha Rani S (2014) Two level security for medical images using watermarking/encryption algorithms. Int J Imaging Syst Technol 24:111–120. https://doi.org/10.1002/ima.22086

    Article  Google Scholar 

  18. Ko L-T, Chen J-E, Shieh Y-S, Hsin H-C, Sung T-Y (2012) Nested quantization index modulation for Reversible watermarking and its application to healthcare information management systems. Comput Math Methods Med 2012:1–8. https://doi.org/10.1155/2012/839161

    Article  MathSciNet  MATH  Google Scholar 

  19. Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Res 8:37. https://doi.org/10.1007/s13319-017-0148-5

    Article  Google Scholar 

  20. Lei B, Tan E-L, Chen S, Ni D, Wang T, Lei H (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41:3178–3188. https://doi.org/10.1016/j.eswa.2013.11.019

    Article  Google Scholar 

  21. Loan NA, Parah SA, Sheikh JA, Akhoon JA, Bhat GM (2017) Hiding electronic patient record (EPR) in medical images: a high capacity and computationally efficient technique for e-healthcare applications. J Biomed Inform 73:125–136. https://doi.org/10.1016/j.jbi.2017.08.002

    Article  Google Scholar 

  22. Malik A, Gupta S, Dhall S (2020) Analysis of traditional and modern image encryption algorithms under realistic ambience. Multimed Tools Appl 79:27941–27993. https://doi.org/10.1007/s11042-020-09279-6

    Article  Google Scholar 

  23. Masek L, Kovesi P (2003) MATLAB source code for a biometric identification system based on Iris patterns, the School of Computer Science and Software Engineering, the University of Western Australia

  24. Moizuddin M, Winston J, Qayyum M (2017) A comprehensive survey: quantum cryptography, in: 2017 2nd international conference on anti-cyber crimes (ICACC). In: Presented at the 2017 2nd international conference on anti-cyber crimes (ICACC), IEEE, Abha, Saudi Arabia, pp 98–102. https://doi.org/10.1109/Anti-Cybercrime.2017.7905271

    Chapter  Google Scholar 

  25. Mousavi SM, Naghsh A, Manaf AA, Abu-Bakar SAR (2017) A robust medical image watermarking against salt and pepper noise for brain MRI images. Multimed Tools Appl 76:10313–10342. https://doi.org/10.1007/s11042-016-3622-9

    Article  Google Scholar 

  26. National Institute of Standards and Technology (n.d.) Federal information processing standards publication Secure Hash Standard (SHS) https://doi.org/10.6028/NIST.FIPS.180-4.

  27. Ng RYF, Tay YH, Mok KM (2008) A review of iris recognition algorithms, in: 2008 International Symposium on Information Technology. Presented at the 2008 International symposium on information technology, IEEE, Kuala Lumpur, Malaysia, pp. 1–7. https://doi.org/10.1109/ITSIM.2008.4631656

  28. Priya S, Santhi B (2019) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mob Netw Appl. https://doi.org/10.1007/s11036-019-01213-x

  29. Saini R, Rana N (2014) Comparison of various biometric methods 2:7

    Google Scholar 

  30. Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking for medical images. Wirel Pers Commun 92:1611–1624. https://doi.org/10.1007/s11277-016-3625-x

    Article  Google Scholar 

  31. Sharma G, Gupta S, Dhall S, Nagpal CK (2018a) Publicly verifiable watermarking scheme for intellectual property protection using quantum Chaos and bit plane complexity slicing. Multimed Tools Appl 77:31737–31762. https://doi.org/10.1007/s11042-018-6226-8

    Article  Google Scholar 

  32. Sharma R, Ganotra R, Dhall S, Gupta S (2018b) Performance comparison of steganography techniques. Int J Comput Netw Inf Secur. 10:37–46. https://doi.org/10.5815/ijcnis.2018.09.04

    Article  Google Scholar 

  33. Shelke R, Metkar S (2016) Image scrambling methods for digital image encryption, in: 2016 international conference on signal and information processing (IConSIP). In: Presented at the 2016 international conference on signal and information processing (IConSIP), IEEE, Maharashtra state, India, pp 1–6. https://doi.org/10.1109/ICONSIP.2016.7857449

    Chapter  Google Scholar 

  34. Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80:1415–1433. https://doi.org/10.1007/s11277-014-2091-6

    Article  Google Scholar 

  35. Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75:8381–8401. https://doi.org/10.1007/s11042-015-2754-7

    Article  Google Scholar 

  36. Solanki N, Malik SK (2014) ROI based medical image watermarking with zero distortion and enhanced security. Int J Mod Educ Comput Sci 6:40–48. https://doi.org/10.5815/ijmecs.2014.10.06

    Article  Google Scholar 

  37. Tayal N, Bansal R, Dhal S, Gupta S (2017) A novel hybrid security mechanism for data communication networks. Multimed Tools Appl 76:24063–24090. https://doi.org/10.1007/s11042-016-4111-x

    Article  Google Scholar 

  38. Umamageswari A, Ferni Ukrit M, Suresh R, Dr.G (2011) A survey on security in medical image communication. Int J Comput Appl 30:41–45. https://doi.org/10.5120/3619-5051

    Article  Google Scholar 

  39. Wu Y, Agaian S (2011) NPCR and UACI Randomness Tests for Image Encryption:8

  40. Wu L, Zhang J, Deng W, He D (2009) Arnold transformation algorithm and anti-Arnold transformation algorithm, in: 2009 first international conference on information science and engineering. In: Presented at the 2009 first international conference on information science and engineering, IEEE, Nanjing, China, pp 1164–1167. https://doi.org/10.1109/ICISE.2009.347

    Chapter  Google Scholar 

  41. Yan Y, Dong Z (2000) An approach to integer wavelet transform for medical image compression in PACS. Wuhan Univ J Nat Sci 5:204–206. https://doi.org/10.1007/BF02827928

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sangeeta Dhall.

Ethics declarations

Conflict of interest’ declaration

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dhall, S., Gupta, S. Multilayered highly secure authentic watermarking mechanism for medical applications. Multimed Tools Appl 80, 18069–18105 (2021). https://doi.org/10.1007/s11042-021-10531-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10531-w

Keywords

Navigation