Skip to main content
Log in

Numbering with spiral pattern to prove authenticity and integrity in medical images

  • Theoretical Advances
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

With the rapid development of technology in digital multimedia, manipulation and misconduct of digital data are soaring. The watermarking procedure is seen as helpful to protect the security of digital images which are highly confidential such as medical images. In this study, an efficient watermarking method for greyscale images is proposed. The scheme is designed to achieve good numbering pattern, exact detection and image recovery. The proposed scheme uses a unique spiral pattern numbering before implementing the block-based mechanism for embedding. The experiment tests the difference between using normal pattern and unique spiral pattern in numbering, and the results show that the proposed method produces a great quality value of embedded image with great tamper localization and recovery ability. This function can help in proving authenticity and integrity of medical images in the system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Coatrieux G, Lecornu L, Sankur B, Roux C (2006) A review of image watermarking applications in healthcare. In: Annual international conference of the IEEE engineering in medicine and biology—proceedings, pp 4691–4694. doi:10.1109/IEMBS.2006.259305

  2. Walia E, Suneja A (2013) Fragile and blind watermarking technique based on Weber’s law for medical image authentication. IET Comput Vis 7(1):9–19. doi:10.1049/iet-cvi.2012.0109

    Article  Google Scholar 

  3. Bouslimi D, Coatrieux G, Cozic M, Roux CH (2012) A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images. IEEE Trans Inf Technol Biomed 16(5):891–899

    Article  Google Scholar 

  4. Chen M, Chen Z, Zeng X, Xiong Z (2010) Model order selection in reversible image watermarking. IEEE J Select Top Sig Process 4(3):592–604. doi:10.1109/JSTSP.2010.2049222

    Article  Google Scholar 

  5. Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux Ch (2013) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forensics Secur 8(1):111–120

    Article  Google Scholar 

  6. Coatrieux G, Huang H, Shu H, Luo L, Roux Ch (2013) A watermarking based medical image integrity control and an image moment signature for tampering characterization. IEEE J Biomed Health Inf 17(6):111–120

    Google Scholar 

  7. Huang H, Coatrieux G, Shu H, Luo L, Roux Ch (2012) Blind integrity verification of medical images. IEEE Trans Inf Technol Biomed 16(6):1122–1126

    Article  Google Scholar 

  8. Rao NV, Kumari VM (2011) Watermarking in medical imaging for security and authentication. Inf Secur J A Glob Perspect 20:148–155. doi:10.1080/19393555.2011.561154

    Article  Google Scholar 

  9. Liew SC, Zain JM (2011) Tamper localization and lossless recovery watermarking scheme. Commun Comput Inf Sci 179(1):555–566

    Google Scholar 

  10. Liew SC, Zain JM (2011) The usage of block average intensity in tamper localization for image watermarking. In: 4th International congress on image and signal processing, pp 1044–1048. doi:10.1109/CISP.2011.6100301

  11. Naskar R, Chakraborty RS (2012) Performance of reversible digital image watermarking under error-prone data communication: a simulation-based study. IET Image Process 6(6):728–737. doi:10.1049/iet-ipr.2011.0160

    Article  Google Scholar 

  12. He S, Kirovski D, Wu M (2009) High-fidelity data embedding for image annotation. IEEE Trans Image Process 18(2):429–435. doi:10.1109/TIP.2008.2008733

    Article  MATH  MathSciNet  Google Scholar 

  13. Macq B, Deweyand F (1999) Trusted headers for medical images. In: DFG VIII-DII watermarking workshop, Erlangen, Germany

  14. Viswanathan P, Krishna PV (2014) A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology. IEEE J Biomed Health Inf 18(3):753–764. doi:10.1109/JBHI.2013.2281322

    Article  Google Scholar 

  15. Coatrieux G, Le Guillou C, Cauvin J-M, Roux Ch (2009) Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Inf Technol Biomed 13(2):158–165. doi:10.1109/TITB.2008.2007199

    Article  Google Scholar 

  16. Liew SC, Zain JM (2012) Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 26(2):316–325. doi:10.1007/s10278-012-9484-4

    Article  Google Scholar 

  17. Cox IJ, Miller ML, Linnartz JMG, Kalker T (1999) A review of watermarking principles and practices. In: Parhi KK, Nishitani T (eds) Digital signal processing for multimedia systems. Marcel Dekker, New York, pp 461–482

    Google Scholar 

  18. Kang X, Huang J, Shi YQ, Lin Y (2003) A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans Circuits Syst Video Technol 13:776–786

    Article  Google Scholar 

  19. Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601

    Article  MATH  Google Scholar 

  20. Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. Sig Process 89(4):675–679

    Article  MATH  Google Scholar 

  21. Zhang X, Wang S, Qian Z, Feng G (2010) Reversible fragile watermarking for locating tampered blocks in JPEG images. Sig Process 90(12):3026–3036

    Article  MATH  Google Scholar 

  22. Franco-Contreras J, Coatrieux G, Cuppens F, Cuppens-Boulahia N, Roux C (2014) Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans Inf Forensics Secur 9(3):397–410. doi:10.1109/TIFS.2013.2294240

    Article  Google Scholar 

  23. Zain JM (2014) Strict authentication watermarking with JPEG compression (SAW-JPEG) for medical images. Eur J Sci Res 42(2): 232–241. http://arxiv.org/ftp/arxiv/papers/1101/1101.5188.pdf. Accessed Oct 23 2014

  24. Qiang S, Hongbin Z (2010) Image tamper detection and recovery using dual watermark. In: 2010 6th International conference on wireless communications, networking and mobile computing, WiCOM. doi:10.1109/WICOM.2010.5600689

  25. Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Sig Process 91(4):728–739. doi:10.1016/j.sigpro.2010.07.019

    Article  MATH  Google Scholar 

  26. Lin H, Yang S, Xu L (2011) Watermark algorithm for color image authentication and restoration. In: 2011 International conference on electronic and mechanical engineering and information technology watermark, pp 2773–2776. doi:10.1109/EMEIT.2011.6023677

  27. Li C, Wang Y, Ma B, Zhang Z (2012) Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput Stand Interfaces 34(4):367–379. doi:10.1016/j.csi.2012.01.003

    Article  Google Scholar 

  28. Tjokorda ABW, Adiwijaya FP, Permana FP (2012) Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression. In: COMNETSAT 2012, pp 167–171. doi:10.1109/ComNetSat.2012.6380799

  29. Naseem MT, Qureshi IM, Muzaffar MZ (2013) Chaos based invertible authentication of medical images. In: 2013 IEEE 9th international conference on emerging technologies (ICET), pp 1–5. doi:10.1109/ICET.2013.6743549

  30. Bourbakis NG (1997) Image data compression-encryption using G-scan patterns. In: IEEE international conference on systems, man, and cybernetics. Computational Cybernetics and Simulation 2: 1117–1120. doi:10.1109/ICSMC.1997.638099

  31. Hung PA, Sooraksa P, Klomkarn K (2013) Extended baker map using scan patterns for image encryption. In: 2013 International conference on information technology and electrical engineering, vol 1. pp. 119–123. doi:10.1109/ICITEED.2013.6676223

  32. Maniccam SS, Bourbakis NG (2001) Lossless image compression and encryption using SCAN. Pattern Recogn 34(6):1229–1245

    Article  MATH  Google Scholar 

  33. Mahmood IA, Moheimani SOR (2010) Spiral scanning: an alternative to conventional raster scanning in high-speed scanning probe microscopes. American control conference (ACC), 2010, pp 5757–5762. doi:10.1109/ACC.2010.5530444

  34. Rana MS, Pota HR, Petersen IR (2014) Spiral scanning with improved control for faster imaging of AFM. IEEE Trans Nanotechnol 13(3):541–550. doi:10.1109/TNANO.2014.2309653

    Article  Google Scholar 

  35. Zain JM, Fauzi ARM (2006) Medical image watermarking with tamper detection and recovery. The 28th annual international conference of the IEEE Engineering in Medicine and Biology Society, New York, USA. doi:10.1109/IEMBS.2006.260767

  36. Fridrich J, Goljan M, Baldoza AC (2000) New fragile authentication watermark for images. International conference on image processing (ICIP 2000). IEEE Computer Society, Vancouver, BC, pp 446–449. doi:10.1109/ICIP.2000.900991

  37. Lin C, Chang S (2001) A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol 11(2):153–168. doi:10.1109/76.905982

    Article  Google Scholar 

  38. Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11(6):585–595. doi:10.1109/TIP.2002.1014990

    Article  Google Scholar 

  39. Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron 46(1):31–39. doi:10.1109/30.826378

    Article  Google Scholar 

  40. Zain JM, Clarke M, Baldwin P (2004) The effect of reversible LSB manipulation to the quality of image. In: PREP2004, University of Hertfordshire

  41. Hisham SI, Muhammad AN, Zain JM, Badshah G, Arshad NW (2013) Digital watermarking for recovering attack areas of medical images using spiral numbering. In: The 10th international conference on electronics, computer and computation, ICECCO, Ankara, Turkey, pp 285–288 (doi: 10.1109/ICECCO.2013.6718284)

  42. Hisham SI, Muhammad AN, Zain JM, Badshah G (2013) Localization watermarking for authentication of text images in quran with spiral manner numbering. In: Proceedings in the Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences (NOORIC 2013), Madinah, 22–25 Dec 2013

  43. Wong PW (1998) A public key watermark for image verification and authentication. In: Proceedings of IEEE International conference on image processing (ICIP), NY, USA, Oct 4–7, pp 425–429. doi:10.1109/ICIP.1998.723526

  44. Vellaisamy S, Ramesh V (2014) Inversion attack resilient zero-watermarking scheme for medical image authentication. IET Image Process 8(12):718–727. doi:10.1049/iet-ipr.2013.0558

    Article  Google Scholar 

  45. Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. Electron Lett 44(13):800–801. doi:10.1049/el:20080522

    Article  Google Scholar 

  46. Syifak IH, Zain JM, Liew SC (2013) A quick glance at digital watermarking in medical images. Biomed Eng Res J 2(2):79–87

    Google Scholar 

  47. Al-Qershi OM, Ee B (2013) Khoo. Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold. Sig Process 93:154–162. doi:10.1016/j.sigpro.2012.07.012

    Article  Google Scholar 

  48. Velumani R, Seenivasagam V (2010) A reversible blind medical image watermarking scheme for patient identification, improved telediagnosis and tamper detection with a facial image watermark. IEEE international conference computational intelligence and computing research (ICCIC), 28–29 Dec 2010, pp 1–8. doi:10.1109/ICCIC.2010.5705832)

  49. Kobayashi LOM, Furuie SS, Barreto PSLM (2009) Providing integrity and authenticity in DICOM images: a novel approach. IEEE Trans Inf Technol Biomed 13(4):582–589. doi:10.1109/TITB.2009.2014751

    Article  Google Scholar 

  50. Naskar R, Chakraborty RS (2012) Reversible watermarking utilising weighted median-based prediction. IET Image Process 6(5):507–520. doi:10.1049/iet-ipr.2011.0244

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jasni Mohamad Zain.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hisham, S.I., Muhammad, A.N., Badshah, G. et al. Numbering with spiral pattern to prove authenticity and integrity in medical images. Pattern Anal Applic 20, 1129–1144 (2017). https://doi.org/10.1007/s10044-016-0552-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10044-016-0552-0

Keywords

Navigation