Skip to main content

A Robust Zero-Watermarking Algorithm for Encrypted Medical Images in the DWT-DFT Encrypted Domain

  • Conference paper
  • First Online:
Innovation in Medicine and Healthcare 2016 (InMed 2016)

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 60))

Included in the following conference series:

Abstract

In order to protect personal information, numerous works has been done in watermarking field. However, there still leaves some problems to be solved: (1) most of the watermarking methods were processed in the plaintext domains, which leave latent risk of exposing host image information, thus it is needed to encrypt the host image and process the watermarking scheme in the encrypted domain; (2) numerous image encryption methods had been searched, while not all of them can meet the robustness requirements when applied in the encrypted domain; (3) for some special fields of watermarking applications, medical images, for example, image integrity is an important criterion that should be strictly taken into account. Thus, that kind of watermarking methods which applies by modifying the pixel values are not suitable in this situation. In order to achieve information hiding in such kind of images, special techniques which do not change image integrity is needed. (4) By utilizing homomorphic encryption scheme, one can process watermark extraction without decrypting the encrypted watermarked image first, while it cost too much time in image encryption and decryption, the computational speed need to be improved. Based on the points mentioned above, we proposed a robust zero-watermarking scheme in the DWT-DFT encrypted domain, which embeds and extracts watermark without modifying the pixel values. Firstly, we encrypted both original medical image and watermark image. Then, we extract the DWT-DFT low frequency coefficients as encrypted medical images’ feature vector. In watermark embedding and extraction phases, we adopt zero-watermarking technique to ensure integrity of medical images. Taking “db2” wavelet transform for example, we conduct the experiments on the visual quality and robustness of our watermarking scheme. Experimental results demonstrate that our algorithm achieves not only good watermarking robustness, but also ideal computation speed in the homomorphic encrypted domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bianchi, T., Piva, A.: Secure watermarking for multimedia content protection: a review of its benefits and open issues. Sig. Process. 30(2), 87–96 (2013)

    Article  Google Scholar 

  2. Li, S., Chen, G., Cheung, A., Bhargava, B., Lo, K.-T.: On the design of perceptual MPEG video encryption algorithms. IEEE Trans. Circ. Syst. Video Technol. 17, 214–223 (2007)

    Article  Google Scholar 

  3. Zhang, G., Liu, Q.: A novel image encryption method based on total shuffling scheme. Opt. Commun. 284, 2775–2780 (2011)

    Article  Google Scholar 

  4. Rial, A., Deng, M., Bianchi, T., Piva, A., Preneel, B.: A provably secure anonymous buye-seller watermarking protocol. IEEE Trans. Inform. Forensics Sec. 5(4), 920–931 (2010)

    Article  Google Scholar 

  5. Deng, M., Bianchi, T., Piva, A., Preneel, B.: An efficient buyer-seller watermarking protocol based on composite signal representation. In: Proceedings of 11th ACM Workshop Multimedia and Security, pp.9–18. Princeton, NJ (2009)

    Google Scholar 

  6. Abdallah, Hanaa A., Faragallah, Osama S., Elsayed, Hala S., et al.: Robust image watermarking method using homomorphic block-based KLT. Optik 127(4), 2374–2381 (2016)

    Article  Google Scholar 

  7. Li, Z., Zhu, X., Lian, Y., et al.: Constructing secure content-dependent watermarking scheme using homomorphic encryption. IEEE Int. Conf. Multimedia Expo, 627–630 (2007)

    Google Scholar 

  8. Zheng, Peijia, Huang, Jiwu: Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain. IEEE Trans. Image Process. 22(6), 2455–2468 (2013)

    Article  MathSciNet  Google Scholar 

  9. Bianchi, T., Piva, A., Barni, M.: On the implementation of the discrete Fourier transform in the encrypted domain. IEEE Trans. Inf. Forensics Secur. 4(1), 86–97 (2009)

    Article  Google Scholar 

  10. Zheng, P., Huang, J.: Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking. In: Proceedings of 14th Information Hiding Conference, pp. 240–254 (2012)

    Google Scholar 

  11. Kang, X., Huang, J., Shi, Y., Lin, Y.: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circ. Syst. Video Technol. 13 (8), 776–786 (2003)

    Google Scholar 

  12. Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169–180 (1978)

    MathSciNet  Google Scholar 

  13. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. Advances in Cryptology—EUROCRYPT’ 99, pp. 223–238. Springer(1999)

    Google Scholar 

  14. Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299 (1984)

    Article  MathSciNet  MATH  Google Scholar 

  15. Failla, P., Sutcu, Y., Barni, M.: Esketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics. In: Proceedings of the 12th ACM Workshop on Multimedia and Security, ACM, pp.241–246 (2010)

    Google Scholar 

Download references

Acknowledgments

This work was supported by National Natural Science Foundation of China (No.61263033), International Science and Technology Cooperation Project of China (NO. KJHZ 2015-04) and the Institutions of Higher Learning Scientific Research Special Project of Hainan province, China (NO. Hnkyzx2014-2).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jingbing Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Dong, J., Li, J. (2016). A Robust Zero-Watermarking Algorithm for Encrypted Medical Images in the DWT-DFT Encrypted Domain. In: Chen, YW., Tanaka, S., Howlett, R., Jain, L. (eds) Innovation in Medicine and Healthcare 2016. InMed 2016. Smart Innovation, Systems and Technologies, vol 60. Springer, Cham. https://doi.org/10.1007/978-3-319-39687-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-39687-3_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-39686-6

  • Online ISBN: 978-3-319-39687-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics