Joint Digital Water Marking for Medical Images for Improving Security

Digital watermarking is one of the most efficient techniques to provide the highest secureness to the transmission of data like images or videos over the internet. Quite over the medical data which incorporates the EHR (Electronic Health Record) and medical images and conjointly the military data are crucial whose protection and privacy is extremely a lot of essential issues. To secure this data, the Digital watermarking plays a major role so that it will guarantee authentication, integrity, confidentiality and reliability. In the case of medical images, even a small change or modifications are strictly prohibited as it might lead to the incorrect diagnosis of the disease. Therefore, securing medical image is extremely essential. So as to provide high security for each patient’s data and also the various medical scanning images, we can employ the Digital Water Marking (DWM) technique. The DWM technique may be implemented in two ways: Spatial domain technique and Frequency domain technique. Although the spatial implementation is extremely straightforward and a very simple method, most of the implementations are done using frequency or transform/remodel domain strategies since it provides additional details and high effectiveness. The DWM may be implemented using numerous transform/remodel techniques like Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), also with the combination of these remodel techniques. Nowadays the work is also extended using a combination of transforming/remodel and spatial domain techniques. In this article the Digital Water Marking is being implemented by employing a combination of a transform technique DWT and a spatial domain technique SVD to provide security to the medical images and also the system efficiency is checked for numerous attacks.

Telemedicine is playing a vital role as it made easy for everybody to transfer the EHR (Electronic Health record) which may include the medical scanned images from any remote places.This technology made easy for the doctors to ask for higher diagnosis details and for the patients to save time and money.During the transmission of the information over the network, the data may undergo malicious attacks and modifications.The malicious attacks may include geometrical variations, various noises such as Gaussian, salt & pepper, etc. and the modifications may be regionally or globally.In some of the cases this information may be used for making money.And more over a small change in the medical report of a patient may lead to the disastrous decisions even by the expertise doctors.Therefore, there is a need for providing security to the medical information and much research work is being done by many of the researchers to provide high security to the medical information.

Information security methods
There are several methodologies available for protecting the information and some of them are: Steganography, Cryptography and Digital Water Marking.
The function of these hiding techniques and their diagrams are given below:

•
Steganography is one of the data embedding techniques in which case we may hide the information content into another cover image and this embedded information is not seen by the human eye.

•
Cryptography is another hiding technique in which case the information is embedded in the non-readable format.

•
Digital Water Marking technique is another hiding technique where we may embed information into another cover image without much distortion.The embedded information may in any form like text, image, barcode, QR code etc.
As this technique mostly employed on the digital data, it is named as Digital Water Marking.This technique provides not only the security for the information, but also provides authenticity, copyright protection and integrity Among the three embedding techniques mentioned above, the most appropriate methodology for securing the medical image is Digital Water Marking [6].Digital Water Marking (DWM) for medical scanned images is implemented in numerous ways, but no complete algorithm is available to satisfy all the necessities for securing the medical image or information.Therefore till today there exist a space for digital watermarking for medical images and also the medical videos for improving security, reliability, credibility and privacy.Therefore a novel approach is anticipated here to improve the quality, reliability, authenticity and confidentiality [1] & [4] to the medical image.

DWM implementation methods
The Digital Water Marking is primarily implemented in two ways: Frequency domain The pixel level technique often referred as the spatial domain technique is a technique in which the watermark is directly embedded in the pixels, whereas in the latter case, often referred as the transform domain, the pixels are transformed into frequency values and then in these newly formed signals the information is embedded.Some of the spatial domain methods are as follows [7]  In IWT function, the losses are not ensured and coding tasks may be performed very easily, whereas DWT provides the fractional value of filter and loss could also be inevitable.Both spatial and transform domain methods have advantages and disadvantages.The positives of both the methods may be combined to enhance the potential of the system.Also the malicious attacks may be avoided by implementing strong and efficient algorithms [14].
To enhance the security, multiple watermarks may be embedded in the medical images [13] and to reduce the distortion the size of the watermark may also be reduced.In other words, we can say that the data payload should be less to avoid the damage to the information which may achieved by converting the watermark information into barcode or Quick Response (QR) code.
Since this article is mainly on medical images [MI], the DWM for MI may classified as:

Initial steps
In the flow chart shown below, primarily the cover medical image and the watermark image are read from the database of a hospital.The watermark information may include the details or thumb impression of a patient.If the cover medical image is color image, then it is transformed in to grey medical image and resized to the specified size, for ex.512×512 and additionally the watermark image is also changed in to binary image and resized to the size of the cover medical image, for ex.512×512.
After reading the information from the database, the watermark embedding and watermark extraction process are carried out.In Figure4 and Figure5 the image selection and the watermark embedding process are shown.

Watermark Embedding process
In the flow diagram shown above, we can see that the embedding method is carried out by combining the spatial and frequency domain watermarking technique which incorporates DWT, SVD and cryptography [5] & [9] techniques.
The embedding method at the transmitter aspect is described below: a.
Decompose the cover medical image in to four sub-bands by applying 4-level DWT.b.
Apply SVD to the 4 th level HH band of the cover image and also to the watermark image.c.
In the above steps three components are generated U, S and V for both original and watermark image.The singular value of both the images is exchanged to generate the modified 4 th level HH band.d.
The U and v components of the watermark image may be used with a pseudorandom number to generate the signature.e.
This generated signature may be used as a secret key and hidden in the original image before transmission.f.Now the modified 4 th level HH band and LL band are combined along with the remaining  In this work, twenty secret keys are used for evaluating the performance of the algorithm.
To check the efficiency of the algorithm, various quality metrics like Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), false positive, false negative, and mean of decoding are evaluated.
During the embedding process, a secret key was hidden in the medical image [8] to provide security while transmitting the data over the network.At the receiver, we will receive watermarked image and in order to retrieve this image, no original image is required; instead it requires the secret key to extract the information.If the input secret key on the receiver is wrong, then it is not possible for us to proceed with the further steps.This ensures increased security for the information.

Watermark construction and extraction process
The flow chart for watermark construction and extraction are as shown below.
At the receiver the watermarked medical image is received and using this data, the watermark is extracted and compared with the original watermark and the system robustness is evaluated.In order to construct the watermark, the following steps are performed: 1.
Read the watermarked image.2.
Apply 3-level DWT to the watermarked image.

3.
Apply SVD to the HH band of 3 rd level decomposition.

4.
Extract the singular values from the HH band.

5.
Use these singular values along with the U and V components of the original watermark.
The detailed diagram of watermark extraction is shown in the below figure.The extracted signature is compared with the original signature.If match is found, then the watermark is extracted otherwise an error message will be displayed.

REsulTs
In this experiment the watermark embedding and watermark retrieval algorithm is executed using MATLAB 2015a.The various quality metrics of the system are calculated so as to assess the performance of the technique being utilized.The Peak to signal noise quantitative relation (PSNR) which can be used for examination of the initial and watermarked medical image, mean sq.error (MSE) to examine the error distinction between the 2 pictures, mean of correct and wrong secret writing, variance, false acceptance and false rejection of the system are evaluated to investigate the enforced system.The below figure shows the results obtained: The below tables shows the results obtained for twenty different keys.
In this procedure the maximum value obtained are listed as below: Mean for decoding Correct: 0.01743, Mean for decoding wrong: -0.002116, SSIM (Max)=0.8997,PSNR(Max)=45.0199,Standard deviation for Correct decoding :0.041898,Standard deviation for Wrong decoding :0.039029, false positive=/0.17,false rejection=0.5 and the maximum time taken for performing embedding and extraction process is minimum of 138.25 and a maximum of 217.46 seconds.

DIscussIon
In this paper, Joint digital watermark for medical images is proposed.The PSNR, SSIM, MSE, is achieved to the optimum value.The authentication of the system is verified by cryptography technique.Still the more efficiency may be obtained by using the advanced versions of the watermarking embedding and extraction algorithms and also we may look for the techniques in order to reduce data payload so that we may avoid the much damage to the medical image.

Fig. 5 .
Fig. 5. Flow chart for showing Water mark embedding process

Fig. 8 .Fig. 9 .
Fig. 8. Cover Image, Watermark image (Patient information, thumb impression), Watermarked image and the Extracted image for the correct key

•
DWM in Region of Interest (ROI) • DWM in Region of Non Interest (RONI) • DWM in ROI & RONI Implementation In this article the DWM technique is implemented by combining the spatial method: Singular Value Decomposition (SVD), the frequency domain method: DWT and cryptography technique: symmetrical key generation [11] & [12].This technology is popularly known as Joint watermarking (JDWM).The proposed flow diagram for the implementation of Digital water marking for medical pictures is shown in Figure4, Figure5, Figure6 and Figure7.

Fig. 10 .
Fig. 10.Graphs showing Standard vs Mean and false positive vs False negative

Table 1 .
SSIM, PSNR and MSE values for 20 secret keys

Table 2 .
False positive and false negative value for 20 keys