Skip to main content

Protection of Patients’ Data Privacy by Tamper Detection and Localization in Watermarked Medical Images

  • Conference paper
  • First Online:
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2020 (AISI 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1261))

  • 3008 Accesses

Abstract

Sharing medical documents among different specialists in different hospitals has become popular as a result of modern communication technologies. Accordingly, protecting patients’ data and authenticity against any unauthorized access or modification is a must. Watermarking technique is one of the solutions to protect patients’ information against any signal processing or geometric attacks. This paper uses a tamper detection and localization watermarking technique. It embeds a Quick Response (QR) code generated from the patient’s information into a medical image. In the extraction step, it can detect if the QR image is attached or not. The proposed approach detects signal processing and geometric attacks and localizes the tamper resulting from text addition, content removal and copy and paste attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mousavi, S.M., Naghsh, A., Abu-Bakar, S.A.R.: Watermarking techniques used in medical images: a survey. J. Digit. Imaging 27(6), 714–729 (2014). https://doi.org/10.1007/s10278-014-9700-5

    Article  Google Scholar 

  2. Kuang, L.Q., Zhang, Y., Han, X.: A Medical image authentication system based on reversible digital watermarking. In: 2009 1st International Conference on Information Science and Engineering (ICISE), pp. 1047–1050 (2009)

    Google Scholar 

  3. Bhatnagar, G., Jonathan, W.U.Q.M.: Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform. Future Gener. Comput. Syst. 29(1), 182–195 (2013)

    Article  Google Scholar 

  4. Thanki, R., Borra, S., Dwivedi, V., Borisagar, K.: An efficient medical image watermarking scheme based on FDCuT–DCT. Eng. Sci. Technol. Int. J. 20(4), 1366–1379 (2017)

    Google Scholar 

  5. Navas, K.A., Thampy, S.A., Sasikumar, M.: EPR hiding in medical images for telemedicine. Int. J. Electron. Commun. Eng. 2(2), 223–226 (2008)

    Google Scholar 

  6. Munch, H., Engelmann, U., Schroter, A., Meinzer, H.P.: The integration of medical images with the electronic patient record and their webbased distribution. Acad. Radiol. 11(6), 661–668 (2004)

    Article  Google Scholar 

  7. Rahman, A.U., Sultan, K., Musleh, D., Aldhafferi, N., Alqahtani, A., Mahmud, M.: Robust and fragile medical image watermarking: a joint venture of coding and chaos theories. J. Healthcare Eng. (2018)

    Google Scholar 

  8. Jabade, V.S., Gengaje, S.R.: Literature review of wavelet. Int. J. Comput. Appl. 31(1), 28–35 (2011)

    Google Scholar 

  9. Adnan, W.W., Hitam, S., Abdul-Karim, S., Tamjis, M.R.: A review of image watermarking. In: Proceedings of Student Conference on Research and Development, Swedan (2003)

    Google Scholar 

  10. Chandrakar, N., Bagga, J.: Performance comparison of digital image watermarking techniques: a survey. Int. J. Comput. Appl. Technol. Res. 2(2), 126–130 (2013)

    Google Scholar 

  11. Saqib, M., Naaz, S.: Spatial and frequency domain digital image watermarking techniques for copyright protection. Int. J. Eng. Sci. Technol. (IJEST) 9(6), 691–699 (2017)

    Google Scholar 

  12. Laouamer, L., AlShaikh, M., Nana, L., Pascu, A.C.: Robust watermarking scheme and tamper detection based on threshold versus intensity. J. Innov. Digit. Ecosyst. 2(1–2), 1–12 (2015)

    Google Scholar 

  13. Ahmad, A., Sinha, G.R., Kashyap, N.: 3-level DWT image watermarking against frequency and geometrical attacks. Int. J. Comput. Netw. Inf. Secur. 6(12), 58 (2014)

    Google Scholar 

  14. Zengzhen, M.: Image quality assessment in multiband DCT domain based on SSIM. Optik Int. J. Light Electron Opt. 125(12), 6470–6473 (2014)

    Article  Google Scholar 

  15. Benhocine, A., Laouamer, L., Nana, L., Pascu, A.C.: New images watermarking scheme based on singular value decomposition. J. Inf. Hiding Multimed. Signal Process. 4(1), 9–18 (2013)

    Google Scholar 

  16. Kaur, M., Kaur, R.: Reversible watermarking of medical images authentication and recovery-a survey. Inf. Oper. Manage. 3(1), 241–244 (2012)

    MathSciNet  Google Scholar 

  17. Mousavi, S.M., Naghsh, A., Abu-Bakar, S.A.R.: Watermarking techniques used in medical images: a survey. Digit. Imaging 27(6), 714–729 (2014)

    Article  Google Scholar 

  18. Mohanty, S.P., Ramakrishnan, K.R.: A dual watermarking technique for images. In: Proceedings of the 7th ACM International Multimedia, pp. 49–51 (1999)

    Google Scholar 

  19. Alomari, R.S., Al-aer, A.: A fragile watermarking algorithm for content authentication. Int. J. Comput. Inf. Sci. 2(1), 27–37 (2004)

    Google Scholar 

  20. Zhao, Y.: Dual domain semi-fragile watermarking for image authentication (2003)

    Google Scholar 

  21. Yu, X., Wang, C., Zhou, X.: Review on semi-fragile watermarking algorithms for content authentication of digital images. Future Internet 56(9), 1–17 (2017)

    Google Scholar 

  22. Lin, E.T., Podilchuk, C.I., Delp III, E.J.: Detection of image alterations using semifragile watermarks. In: Proceedings of the SPIE—Security and Watermarking of Multimedia Contents II, USA (2000)

    Google Scholar 

  23. Hosny, K.M., Darwish, M.M., Li, K., Salah, A.: Parallel multi-Core CPU and GPU for fast and robust medical image watermarking. In: IEEE Access (2018)

    Google Scholar 

  24. Gull, S., Loan, N.A., Parah, S.A., Sheikh, J.A., Bhat, G.M.: An efficient watermarking technique for tamper detection and localization of medical images. J. Ambient Intell. Humaniz. Comput. 11(5), 1799–1808 (2018)

    Article  Google Scholar 

  25. Yahya, A.N., Jalab, H.A., Wahid, A., Noor, R.M.: Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. J. King Saud Univ. – Comput. Inf. Sci. 27(4), 393–401 (2015)

    Google Scholar 

  26. Sharma, A., Singh, A.K., Ghrera, S.P.: Robust and secure multiple watermarking for medical images. Wireless Pers. Commun. 92(4), 1611–1624 (2018)

    Article  Google Scholar 

  27. Zhang, L., Zhou, P.P.: Localized affine transform resistant watermarking in region-of-interest. Telecommun. Syst. 44(3), 205–220 (2010)

    Article  Google Scholar 

  28. Moghaddam, M.E., Nemati, N.: A robust color image watermarking technique using modified imperialist competitive algorithm. Forensic Sci. Int. 233(1), 193–200 (2013)

    Article  Google Scholar 

  29. ElSaadawy, A.H., ELSayed, A.S., Al-Berry, M.N., Roushdy, M.: Reversible watermarking for protecting patient’s data privacy using an EPR-generated QR code. In: AICV (2020)

    Google Scholar 

  30. OPENi Medica Image dtabase. https://openi.nlm.nih.gov/. Accessed 10 Sep 2019

  31. Shimonski, R.J., Eaton, W., Khan, U., Gordienko, Y.: Exploring the sniffer pro interface. In: Sniffer Pro Network Optimization and Troubleshooting Handbook, pp. 105–158 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alaa H. ElSaadawy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

ElSaadawy, A.H., ELSayed, A.S., Al-Berry, M.N., Roushdy, M. (2021). Protection of Patients’ Data Privacy by Tamper Detection and Localization in Watermarked Medical Images. In: Hassanien, A.E., Slowik, A., Snášel, V., El-Deeb, H., Tolba, F.M. (eds) Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2020. AISI 2020. Advances in Intelligent Systems and Computing, vol 1261. Springer, Cham. https://doi.org/10.1007/978-3-030-58669-0_33

Download citation

Publish with us

Policies and ethics