Skip to main content

A Secure Medical Image Watermarking Technique for E-Healthcare Applications

  • Chapter
  • First Online:

Abstract

The rapid rise in the exchange of the medical information for remote/continuous diagnosis via internet using different software’s and digital gadgets has ensured better health monitoring. This exchange, however, has given rise to many security issues which may occur due to noise in communication channels, mishandling of devices or unauthorized tempering. Thus, there is need of ensuring privacy, data integrity and copyright protection in order to provide better technological efficiency. For securing medical content digital watermarking techniques have proved to provide better solutions. In this chapter an efficient watermarking technique is proposed for exchanging patient information in an e-healthcare system. A robust watermarking technique using Singular Value Decomposition (SVD) for embedding the secret logo in the transform domain coefficients is presented. The hybrid combination of Discrete Cosine Transform (DCT) and SVD ensures very high robustness of the watermark and hence is suitable for copyright applications. The security has been ensured by encrypting the watermark before embedding by chaos encryption. The proposed technique has been analysed in presence of various signal processing/geometrical attacks and shows very high robustness of the watermark. The experimental results obtained prove the efficiency of the technique and as such can be used in e-healthcare.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Loan NA, Parah SA, Sheikh JA, Akhoon JA, Bhat GM (2017). Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications. Journal of biomedical informatics, 73, 125-136.

    Article  Google Scholar 

  2. Parah SA, Sheikh JA, Ahad F, Bhat GM (2018). High Capacity and Secure Electronic Patient Record (EPR) Embedding in Color Images for IoT Driven Healthcare Systems. In Internet of Things and Big Data Analytics Toward Next-Generation Intelligence (pp. 409-437). Springer, Cham.

    Google Scholar 

  3. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2008) Digital Watermarking and Steganography, 2nd edn. (Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2008).

    Chapter  Google Scholar 

  4. Kumar C, Singh AK, Kumar P, Singh R, Singh S. SPIHT-based multiple image watermarking in NSCT domain. Concurrency and Computation: Practice and Experience, Wiley, DOI:10.1002/cpe.4912.

    Google Scholar 

  5. Singh, AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Generation Computer Systems. Elsevier, pp.1-16, DOI: 10.1016/j.future.2016.11.023.

    Article  Google Scholar 

  6. https://online.norwich.edu/academic-programs/masters/nursing/resources/infographics/healthcare-data-breaches-the-costs-and-solutions.

  7. Parah SA, Ahad F, Sheikh JA, Loan NA, Bhat GM (2016c) A New Reversible and high capacity data hiding technique for e-healthcare applications, Multimedia Tools and Applications, Springer, DOI: 10.1007/s11042-016-4196-2.

    Article  Google Scholar 

  8. Kumar C, Singh AK, Kumar P (2018) A recent survey on image watermarking techniques and its application in e-governance. Multimedia Tools and Applications, Springer, 77(3), pp. 3597–3622, DOI: 10.1007/s11042-017-5222-8.

    Article  Google Scholar 

  9. Ahad F, Loan NA, Parah SA, Sheikh JA, Bhat GM, (2016a) Pixel repetition technique: a high capacity and reversible data hiding method for e-healthcare applications, Intelligent Techniques in Signal Processing for Multimedia Security, Vol. 660, Springer, DOI: 10.1007/978-3-319-44790-2_17.

    Google Scholar 

  10. Parah SA, Sheikh JA, Akhoon JA, Loan NA (2018) Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication. Future Generation Computer Systems.

    Google Scholar 

  11. Parah SA, Ahmad I, Loan NA, Muhammad K, Sheikh JA, Bhat GM. (2019). Realization of an adaptive data hiding system for electronic patient record, embedding in medical images. In Security in smart cities: models, applications, and challenges (pp. 47–70). Springer, Cham.

    Google Scholar 

  12. Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017). Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications, 76(8), 10599-10633.

    Article  Google Scholar 

  13. Singh L, Singh AK, Singh PK (2018) Secure data hiding techniques: A survey, Multimedia Tools and Applications, Multimed. Tools Appl., Springer DOI: 10.1007/s11042-018-6407-5.

    Google Scholar 

  14. Natasa Zivic: Robust Image Authentication in the Presence of Noise. springer (2015).

    Google Scholar 

  15. Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2015d) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications. 2017 Apr 1;76(8):10599-633. Springer.

    Google Scholar 

  16. Chang CC, Chen KN, Lee CF, Liu LJ. A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 2011;84(9):1462–70.

    Article  Google Scholar 

  17. Loan NA, Hurrah NN, Parah SA, Sheikh JA (2017) High capacity reversible stenographic technique based on image resizing and pixel permutation. In Image Information Processing (ICIIP), 2017 Fourth International Conference on (pp. 1-6). IEEE.

    Google Scholar 

  18. Kumar, C., Singh, A. K., & Kumar, P. (2018). Improved wavelet-based image watermarking through SPIHT. Multimedia Tools and Applications, Springer, pp. 1-14, DOI: 10.1007/s11042-018-6177-0.

    Google Scholar 

  19. Lin S, Chen CF (2000) A robust dct-based watermarking for copyright protection. IEEE Transactions on Consumer Electronics, 46 (3), 415–421.

    Article  Google Scholar 

  20. Srivastava R, Kumar B, Singh AK, Mohan A (2018) Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach. Multimedia Tools and Applications, 77(13), 16447-16459, Springer US DOI: 10.1007/s11042-017-5214-8.

    Article  Google Scholar 

  21. Parah SA, Sheikh JA, Loan NA and Bhat GM (2016b) Robust and blind watermarking technique in DCT domain using inter-block coefficient, Digital Signal Processing, Elsevier, DOI: 10.1016/j.dsp.2016.02.005.

    Article  Google Scholar 

  22. Sheikh JA, Parah SA, Assad UI, Bhat GM (2016b) Realization and robustness evaluation of a blind spatial domain watermarking technique’, International Journal of Electronics, DOI: 10.1080/00207217.2016.1242162.

    Article  Google Scholar 

  23. Singh AK, Kumar B, Singh G, Mohan A (Eds.) (2017). Medical image watermarking: techniques and applications. Springer, ISBN: 978-3319576985.

    Google Scholar 

  24. Parah S, Sheikh J, Bhat, GM (2012a) On the realization of secure and efficient data hiding system using ISB and LSB technique, Engineering E-Transaction, Malaysia, Vol. 7, No. 2, pp.48–53, ISSN: 1823-6379.

    Google Scholar 

  25. Parah S, Sheikh J, Bhat GM (2013a) High capacity data embedding using joint intermediate significant bit and least significant technique’, International Journal of Information Engineering and Applications, Vol. 2, No. 11, pp.1–11.

    Google Scholar 

  26. Hurrah NN, Loan NA, Parah SA, Sheikh JA (2017, December). A transform domain based robust color image watermarking scheme for single and dual attacks. In Image Information Processing (ICIIP), 2017 Fourth International Conference on (pp. 1-5). IEEE.

    Google Scholar 

  27. Hurrah NN, Parah SA, Loan NA, Sheikh JA, Elhoseny M, Muhammad K, (2019). Dual watermarking framework for privacy protection and content authentication of multimedia. Future Generation Computer Systems, 94, 654–673. DOI: 10.1016/j.future.2018.02.023.

    Google Scholar 

  28. Loan NA, Parah SA, Sheikh JA, Bhat GM (2017) Utilizing neighbourhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks, Multidimentional Systems and Signal Processing, DOI: 10.1007/s11045-017-0490-z.

    Article  MathSciNet  Google Scholar 

  29. Ahad F, Parah SA, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique, Journal of Biomedical Informatics, February, Vol. 66, pp.214–230 [online] DOI: https://doi.org/10.1016/j.jbi.2017.01.006 (accessed 21 September 2017).

  30. Kavitha KJ, Shan PB (2018) Joint Digital Water Marking for Medical Images for Improving Security. Biomedical and Pharmacology Journal, 11(2).

    Google Scholar 

  31. Loan NA, Parah SA, Sheikh JA, Bhat GM (2016b) A robust and computationally efficient digital watermarking technique using inter block pixel differencing, Multimedia Forensics and Security, Vol. 115, Springer DOI: 10.1007/978-3-319-44270-9_10.

    Google Scholar 

  32. Abhilasha Sharma, Amit Kumar Singh and S P Ghrera, Sharma, Secure Hybrid Robust Watermarking Technique for Medical Images. Procedia Computer Science 70 (2015), 778 – 784.

    Article  Google Scholar 

  33. Verma VS, Jha RK, Ojha A (2015) Significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Systems with Applications, 42(21), pp.8184-8197.

    Article  Google Scholar 

  34. Kang X, Huang J, Shi YQ, Lin Y (2003) A DWT-DFT composite watermarking scheme robust to both affine transform and jpeg compression. IEEE T. Circ. Syst. Vid. 13, 776–786 (2003). doi:10.1109/TCSVT.2003.815957.

    Article  Google Scholar 

  35. LP Feng, LB Zheng, P Cao, in 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT). A DWT-DCT Based Blind Watermarking Algorithm for Copyright Protection, vol. 7, (2010), pp. 455–458. doi:10.1109/ICCSIT.2010.5565101.

    Google Scholar 

  36. RH Laskar, M Choudhury, K Chakraborty, S Chakraborty, in Computer Networks and Intelligent Computing. Communications in Computer and Information Science. A Joint DWT-DCT Based Robust Digital Watermarking Algorithm for Ownership Verification of Digital Images, vol. 157 (Springer Berlin, Germany, 2011), pp. 482–491. doi:10.1007/978-3-642-22786-8_61.

    Google Scholar 

  37. Benoraira A, Benmahammed K, Boucenna N (2015) Blind image watermarking technique based on differential embedding in DWT and DCT domains. EURASIP Journal on Advances in Signal Processing, 2015(1), p.55.

    Google Scholar 

  38. Thakur S, Singh AK, Ghrera SP, Mohamed Elhoseny (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications, Multimedia Tools and Applications, Springer, pp. 1-14, DOI: 10.1007/s11042-018-6263-3

    Article  Google Scholar 

  39. Parah SA, Sheikh JA, Bhat GM (2015e) Hiding in encrypted images: a three tier security data hiding system, Multidimensional Systems and Signal Processing, September, Springer, DOI: 10.1007/s11045-015-0358-z.

    Article  Google Scholar 

  40. Thakur, S., Singh, A. K., Ghrera, S. P., & Mohan, A. (2018). Chaotic based secure watermarking approach for medical images. Multimedia Tools and Applications, 1-14. Springer, DOI: 10.1007/s11042-018-6691-0.

    Google Scholar 

  41. Shao Z, Shang Y, Zhang Y, Liu X, Guo G (2016) Robust watermarking using orthogonal Fourier–Mellin moments and chaotic map for double images. Signal Processing, 120, pp.522-531.

    Article  Google Scholar 

  42. Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang Y (2015) An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Communications in Nonlinear Science and Numerical Simulation, 23(1), 2015, 294-310.

    Article  MathSciNet  Google Scholar 

  43. Kanso A, Ghebleh M (2015) An efficient and robust image encryption scheme for medical applications. Communications in Nonlinear Science and Numerical Simulation, vol. 24, no. 1, 2015, pp. 98-116.

    Article  MathSciNet  Google Scholar 

  44. Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access, 6, 19876-19897.

    Article  Google Scholar 

  45. Lin YK, A data hiding scheme based upon DCT coefficient modification Comput. Standards Int., vol. 36, no. 56, pp. 855-862, 2014.

    Article  Google Scholar 

  46. MedPix™ Medical Image Database, available at: http://rad.usuhs.mil/medpix/medpix.html, https://medpix.nlm.nih.gov/home .

  47. Openi™ Medical Image Database, available at: https://openi.nlm.nih.gov/index.php.

  48. The USC-SIPI Image Database, available at: http://sipi.usc.edu/database/.

  49. Zhang H, Wang C, Zhou X (2017) A robust image watermarking scheme based on SVD in the spatial domain. Future Internet, 9(3), 45.

    Google Scholar 

  50. Yuefeng Z, & Li, L. (2015). Digital image watermarking algorithms based on dual transform domain and self-recovery. International Journal on Smart Sensing & Intelligent Systems, 8(1).

    Google Scholar 

  51. Thanki R, Borra S, Dwivedi V, Borisagar K (2017) An efficient medical image watermarking scheme based on FDCuT–DCT. Engineering Science and Technology, an International Journal, 20(4), 1366-1379.

    Article  Google Scholar 

Download references

Acknowledgments

This publication is an outcome of the R&D work undertaken project under the Visvesvaraya PhD Scheme of Ministry of Electronics & Information Technology, Government of India, being implemented by Digital India Corporation and in part is supported by Department of Science and Technology (DST) New Delhi under DST inspire scheme.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hurrah, N.N., Parah, S.A., Sheikh, J.A. (2019). A Secure Medical Image Watermarking Technique for E-Healthcare Applications. In: Singh, A., Mohan, A. (eds) Handbook of Multimedia Information Security: Techniques and Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-15887-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15887-3_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15886-6

  • Online ISBN: 978-3-030-15887-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics