Abstract
This paper presents a robust and secure region of interest and non-region of interest based watermarking method for medical images. The proposed method applies the combination of discrete wavelet transform and discrete cosine transforms on the cover medical image for the embedding of image and electronic patient records (EPR) watermark simultaneously. The embedding of multiple watermarks at the same time provides extra level of security and important for the patient identity verification purpose. Further, security of the image and EPR watermarks is enhancing by using message-digest (MD5) hash algorithm and Rivest–Shamir–Adleman respectively before embedding into the medical cover image. In addition, Hamming error correction code is applying on the encrypted EPR watermark to enhance the robustness and reduce the possibility bit error rates which may result into wrong diagnosis in medical environments. The robustness of the method is also extensively examined for known attacks such as salt & pepper, Gaussian, speckle, JPEG compression, filtering, histogram equalization. The method is found to be robust for hidden watermark at acceptable quality of the watermarked image. Therefore, the hybrid method is suitable for avoidance of the patient identity theft/alteration/modification and secure medical document dissemination over the open channel for medical applications.
Similar content being viewed by others
References
Matheson, L. R., Mitchell, S. G., Shamoon, T. G., Tarjan, R. E., & Zane, F. (1998). Robustness and security of digital watermarks. Financial Cryptography, 1465, 227–240.
Coatrieux, G., Lecornu, L., Roux, Ch., & Sankur, B. (2006). A review of image watermarking applications in healthcare. In Proceedings of the 28th annual international conference engineering in medicine and biology society, EMBS’06, IEEE, New York (pp. 4691–4694).
Mohanty, S. P. (2000). Digital watermarking: A tutorial review. Report, IISc. Bangalore, India.
Coatrieux, G., Maitre, H., Sankur, B., Rolland, Y., & Collorec, R. (2000). Relevance of watermarking in medical imaging. In Proceedings of IEEE conference on information technology applications in biomedicine, Arlington, USA (pp. 250–255).
Moumen, C., & Benslama, M. (2012). Cyrptography of medical images. In Proceedings of the progress in electromagnetics research symposium, Kuala Lumpur, March 27–30 (pp. 42–48).
Chao, H. M., Hsu, C. M., & Miaou, S. G. (2002). A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Transactions on Information Technology in Biomedicine, 6(1), 46–53.
Annamalai, U., & Thanushkodi, K. (2013). Medical image authentication with enhanced watermarking technique through visual cryptography. Journal of Theoretical and Applied Information Technology, 57(3), 484–494.
Singh, A. K., Dave, M., & Mohan, A. (2015). Robust and secure multiple watermarking in wavelet domain. A special issue on advanced signal processing technologies and systems for healthcare applications. Journal of Medical Imaging and Health Informatics, 5(2), 406–414.
Rey, C., & Dugelay, J. L. (2002). A survey of watermarking algorithm for image authentication. EURASIP Journal on Applied Signal Processing, 6, 613–621.
Mousavi, S. M., Naghsh, A., & Abu-Bakar, S. A. R. (2014). Watermarking techniques used in medical images: A survey. Journal of Digital Imaging, 27(6), 714–729.
Singh, A. K., Kumar, B., Dave, M., & Mohan, A. (2015). Robust and imperceptible dual watermarking for telemedicine applications. Wireless Personal Communications, 80(4), 1415–1433.
Singh, A. K., Dave, M., & Mohan, A. (2014). Wavelet based image watermarking: futuristic concepts in information security. Proceedings of the National Academy of Sciences, India, Section A: Physical Sciences, 84(3), 345–359.
Zhang, L., & Zhou, P. P. (2010). Localized affine transform resistant watermarking in region-of-interest. Telecommunication Systems, 44(3), 205–220.
Yang, C. Y., & Hu, W. C. (2010). Reversible data hiding in the spatial and frequency domains. International Journal of Image Processing, 3(6), 373–382.
Zain, J., & Clarke, M. (2005). Security in telemedicine: Issue in watermarking medical images. In Proceedings of 3rd international conference on science of electronic, technologies of information and telecommunications, Tunisia, March 27–31, 2005.
Memon, N. A., & Gilani, S. A. M. (2008). NROI watermarking of medical images for content authentication. In Proceedings of 12th IEEE international multitopic conference, Karachi, Pakistan (pp. 106–110).
Navas, K. A., Thampy, S. A., & Sasikumar, M. (2008). EPR hiding in medical images for telemedicine. In Proceedings of the world academy of science, engineering and technology, Rome (pp. 292–295).
Singh, A. K., Kumar, B., Dave, M., & Mohan, A. (2015). Multiple watermarking on medical images using selective DWT coefficients. Journal of Medical Imaging and Health Informatics, 5(3), 607–614.
Paar, C., & Pelzl, J. (2009). Understanding cryptography: A textbook for students and practitioners (3rd ed., pp. 29–53). New York: Springer.
Bouslimi, D., Coatrieux, G., Cozic, M., & Roux, C. (2012). A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Transactions on Information Technology in Biomedicine, 16(5), 891–899.
Wong, P. W., & Memon, N. (2001). Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 10(10), 1593–1601.
Liew, S. C., Liew, S. W., & Zain, J. M. (2010). Reversible medical image watermarking for tamper detection and recovery with run length encoding compression. Proceedings of the World Academy of Science, Engineering and Technology, 4, 12–29.
Nakhaie, A. A., & Shokouhi, S. B. (2011). No reference medical image quality measurement based on spread spectrum and discrete wavelet transform using ROI processing. In Proceedings of the 24th Canadian conference on electrical and computer engineering, Niagara Falls (pp. 121–125), 8–11 May 2011.
Rodriguez-Colin, R., Claudia, F.-U., Trinidad-Blas, G. D. J. (2007). Data hiding scheme for medical images. In Proceedings of the 17th international conference on electronics, communications and computers, Cholula, Puebla (pp. 32–37), 26–28 February 2007.
Kaur, R. (2013). A medical image watermarking technique for embedding EPR and its quality assessment using no-reference metrics. International Journal of Information Technology and computer Science, 02, 73–79.
Kannammal, A., & Rani, S. S. (2014). Two level security for medical images using watermarking/encryption algorithms. International Journal of imaging system and technology, 24(1), 111–120.
Al-Haj, A., & Alaa’Amer, (2014). Secured telemedicine using region-based watermarking with tamper localization. Journal of Digital Imaging, 27(6), 737–750.
Pandey, R., Singh, A. K., Kumar, B., & Mohan, A. (2016). Iris based secure NROI multiple eye image watermarking for teleophthalmology. Multimedia Tools and Applications. doi:10.1007/s11042-016-3536-6.
Sasaki, Y. (2011). Collisions of MMO-MD5 and their impact on original MD5. Progress in Cryptology—AFRICACRYPT 2011 (Vol. 6737, pp. 117–133).
Sasaki, Y., & Aoki, K. (2008). Preimage attacks on step-reduced MD5. Information Security and Privacy, 5107, 282–296.
Munuera, C. (2015). Hamming codes for wet paper steganography. Designs, Codes and Cryptography, 76(1), 101–111.
Lien, B. K., Chen, S. K., Wang, W. S., & King, K. P. (2015). Dispersed data hiding using hamming code with recovery capability. Genetic and Evolutionary Computing, 329, 179–187.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sharma, A., Singh, A.K. & Ghrera, S.P. Robust and Secure Multiple Watermarking for Medical Images. Wireless Pers Commun 92, 1611–1624 (2017). https://doi.org/10.1007/s11277-016-3625-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3625-x