Abstract
Digital radiological modalities in modern hospitals have led to the producing a variety of a vast amount of digital medical files. Therefore, for the medical image, the authenticity needs to ensure the image belongs to the correct patient, the integrity check to ensure the image has not been modified, and safe transfer are very big challenges. Digital watermarking is being used in broadcast and Internet monitoring, forensic tracking, copy protection, counterfeit deterrence, authentication, copyright communication and e-commerce applications. The basic idea behind digital watermarking is to embed a watermark signal into the host data with the purpose of copyright protection, access control, broadcast monitoring etc. Improvements in performance of watermarking schemes can be obtained by several methods. One way is to make use of computational intelligence techniques by considering image watermarking problem as an optimization problem. Particle swarm optimization is a relatively simple optimization technique, and it is easier to be understood compared with some other evolutionary computation methods. It is widely used in different fields including watermarking technologies. The global convergence of PSO cannot always be guaranteed because the diversity of population is decreased with evolution developed. To deal with this problem, concept of a global convergence guaranteed method called as Quantum behaved Particle Swarm Optimization (QPSO) was developed. Weighted QPSO (WQPSO) is introduced as an improved quantum-behaved particle swarm optimization algorithm. In this chapter we present a secure patient medical images and authentication scheme which enhances the security, confidentiality and integrity of medical images transmitted through the Internet. This chapter proposes a watermarking by invoking particle swarm optimization with its modifications(PSO-QPSO-WQPSO) technique in adaptive quantization index modulation and singular value decomposition in conjunction with discrete wavelet transform (DWT) and discrete cosine transform (DCT). The experimental results show that the proposed algorithm yields a watermark which is invisible to human eyes, robust against a wide variety of common attacks and reliable enough for tracing colluders.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
El Bakrawy, L.M., Ghali, N.I., Hassanien, A.E., Abraham, A.: An associative watermarking based image authentication scheme. In: The 10th International Conference on Intelligent Systems Design and Applications (ISDA2010), Cairo, Egypt, pp. 823–828 (2010)
Hassanien, A.E., Abraham, A., Grosan, C.: Spiking neural network and wavelets for hiding iris data in digital images. Soft Comput. 13(4), 401–416 (2009)
Zhang, Q., Wang, Z., Zhang, D.: Memetic algorithm-based image watermarking scheme. In: Proceedings of the 5th International Symposium on Neural Networks: Advances in Neural Networks, pp. 845–853 (2008)
Findik, O., Babaoglu, I., Ulker, E.: A color image watermarking scheme based on hybrid classification method: particle swarm optimization and k-nearest neighbor algorithm. Opt. Commun. 283(24), 4916–4922 (2010)
Sabat, S.L., Coelho, L.S., Abraham, A.: MESFET DC model parameter extraction using quantum particle swarm optimization. Microelectron. Reliab. 49, 660–666 (2009)
Braudaway, G.: Protecting publicly-available images with an invisible image watermark. Proc. IEEE Int. Conf. Image Process. 1, 524–527 (1997)
Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. IEEE 87(7), 1079–1107 (1999)
Hernandez, J., Gonzalez, F., Rodriguez, J., Nieto, G.: Performance analysis of a 2-d-multipulse amplitude modulation scheme for data hiding and watermarking of still images. IEEE J. Sel. Areas Commun. 16(4), 510–524 (1998)
Arnold, M., Schmucker, M., Wolthusen, S.D.: Techniques and Applications of Digital Watermarking and Content Protection. Artech House, Norwood (2003)
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers, San Francisco (2001)
Nikolaidis, A., Tsekeridou, S., Tefas, A., Solachidis, V.: A survey on watermarking application scenarios and related attacks. Proc. IEEE Int. Conf. Image Process. 3, 991–994 (2001)
Fitts, D.D.: Principles of Quantum Mechanics as Applied to Chemistry and Chemical Physics. University of Cambridge, Cambridge (1999)
Coelho, L.S.: A quantum particle swarm optimizer with chaotic mutation operator. Chaos Solitons Fractals 37, 1409–1418 (2008)
Phillips, A.C.: Introduction to Quantum Mechanics. British Library, London (2003)
Liu, J., Sun, J., Xu, W.: Quantum-behaved particle swarm optimization with immune operator. In: Foundations of Intelligent Systems, Lecture Notes in Computer Science, vol. 4203, pp. 77–83 (2006)
Kuk-Hyun, H., Jong-Hwan, K.: Quantum-inspired evolutionary algorithm for a class of combinatorial optimization. IEEE Trans. Evol. Comput. 6(6), 580–593 (2002)
Jang, J.S., Han, K.H., Kim, J.H.: Face detection using quantum-inspired evolutionary algorithm. In: IEEE Congress Proceeding on Evolutionary Computation, pp. 2100–2106 (2004)
Yang, J., Li, B., Zhuang, Z.Q.: Multi-universe parallel quantum genetic algorithm and its application to blind-source separation. Proc. Int. Conf. Neural Netw. Sig. Process. 1, 393–398 (2003)
Jianhua, X.: Improved quantum evolutionary algorithm combined with chaos and its application. Lect. Notes Comput. Sci. 5553, 704–713 (2009)
Xi, M., Sun, J., Xu, W.: An improved quantum-behaved particle swarm optimization algorithm with weighted mean best position. Appl. Math. Comput. 205(2), 751–759 (2008)
Kennedy, J., Eberhart, R.C.: Particle swarm optimization. IEEE Proc. Neural Netw IV(1), 1942–1948 (1995)
Kennedy, J.: Small worlds and mega-minds: effects of neighborhood topology on particle swarm performance. In: Proceedings of the 1999 Congress of Evolutionary Computation, vol. 3, pp. 1931–1938 (1999)
Aslantas, V., Dogan, A.L., Ozturk, S.: DWT-SVD based image watermarking using particle swarm optimizer. In: Proceedings of IEEE International Conference on Multimedia and Expo, pp. 241–244 (2008)
Aslantas, V.: A singular-value decomposition-based image watermarking using genetic algorithm. Int. J. Electron. Commun. 62, 386–393 (2007)
Lai, C.C., Huang, H.C., Tsai, C.C.: Image watermarking scheme using singular value decomposition and micro-genetic algorithm. In: Proceedings of International Conference on Intelligent Information Hiding and Multimedia, Signal Processing, pp. 469–472 (2008)
Qi, X., Bialkowski, S., Brimley, G.: An adaptive QIM-and SVD-based digital image watermarking scheme in the wavelet domain. In: Proceedings of IEEE International Conference on Image Processing, pp. 421–424 (2008)
Shaomin, Z., Liu, J.: A novel adaptive watermarking scheme based on human visual system and particle swarm optimization. In: Information Security Practice and Experience, Lecture Notes in Computer Science, vol. 5451, pp. 136–146 (2009)
Nikham, T., Amiri, B., Olamaei, J., Arefei, A.: An efficient hybrid evolutionary optimization algorithm based on PSO and SA for clustering. J. Zhejiang Univ. Sci. A 10(4), 512–519 (2009)
Dharwadkar, N., Amberker, B., Panchannavar, P.: Reversible fragile medical image watermarking with zero distortion. In: International Conference on Computer and Communication Technology, pp. 248–254 (2010)
Kaur, R.: A medical image watermarking technique for embedding EPR and Its quality assessment using no-reference metrics. IJITCS 5(2), 73–79 (2013)
Fakhari, P., Vahedi, E., Lucas, C.: Protecting patient privacy from unauthorized release of medical images using a bio-inspired wavelet-based watermarking approach. Digit. Sig. Process. 21(3), 433–446 (2011)
Soliman, M.M., Hassanien, A.E., Ghali, N.I., Onsi, H.M.: An adaptive watermarking approach for medical imaging using swarm intelligent. Int. J. Smart Home 6, 37–51 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Soliman, M.M., Hassanien, A.E., Onsi, H.M. (2014). An Optimized Approach for Medical Image Watermarking. In: Hassanien, A., Kim, TH., Kacprzyk, J., Awad, A. (eds) Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43616-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-662-43616-5_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43615-8
Online ISBN: 978-3-662-43616-5
eBook Packages: EngineeringEngineering (R0)