Abstract
Medical images are widely used in telemedicine, sharing and electronic transmission between hospitals. While enjoying convenience, medical images also face privacy disclosure, illegal copy and malicious tamper, etc. It is highly important to ensure privacy and integrity of medical images. Cogitating the above needs, a reversible medical image watermarking algorithm for privacy protection and integrity authentication is proposed. Firstly, the medical image is divided into the ROI (Region of Interest) and RONI (Region of Non-Interest) based on active contour model. Then, the proposed “Three-Dimensional Watermarks” are generated, including authentication watermark, restoration watermark and privacy watermark, which are produced by the novel Parallel Lattice Hash Function, the proposed Neighborhood Difference Method, and the proposed encryption algorithm, respectively. Moreover, “Double-Layer Reversible Embedding Strategy Based on Difference Expansion” is modified in ROI to improve embedding capacity, and “Histogram Modification Reversible Embedding Strategy of Difference Image” is modified to adaptively acquire four or more peak points, which is more flexible than common algorithms. Experimental results confirm the efficient of the proposed scheme, and demonstrate it not only realizes privacy protection, integrity authentication, reversibility, but also holds the characteristics of higher security, larger capacity and better restoration quality.















Similar content being viewed by others
References
Alshanbari H S (2020) Medical image watermarking for ownership & tamper detection. Multimed Tools Appl1–16 https://doi.org/10.1007/s11042-020-08814-9.(on line)
Anjum R, Verma P, Verma S (2019) Multiple image watermarking for efficient storage and transmission of medical images. In Int Conf Adv Comput Data Sci pp.92-102
Davie B, Florance V, Friede A, Sheehan J, Sisk JE (2001) Bringing Health-Care Applications to the Internet A United States study of health-care applications in relation to Internet capabilities found distinct, if not unique, requirements for its evolutionary development. IEEE Int Comput 5(3):42–48
Fang LL, Qiu TS, Liu Y et al (2018) Active contour model driven by global and local intensity information for ultrasound image segmentation. Comput Math Appl 75:4286–4299
Farfoura ME, Horng S J (2010) A novel blind reversible method for watermarking relational databases. In International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010, Taipei, Taiwan, 6-9 September 2010, IEEE 11:563–569
Gangadhar Y, Giridhar Akula VS, Redd PC (2018) An evolutionary programming approach for securing medical images using watermarking scheme in invariant discrete wavelet transformation. Biomedical Signal Processing & Control 43:31–40
Gomez-Coronel S L, Moya-Albor E, Boris Escalante-Ramírez, et al (2015) Watermarked cardiac CT image segmentation using deformable models and the Hermite transform. In 10th International Symposium on Medical Information Processing and Analysis. International Society for Optics and Photonics,pp.928717.
He HJ, Zhang J, Tai HM (2008) Block-chain based fragile watermarking scheme with superior localization. In: 10th international conference on information hiding. Springer, Berlin, pp 147–160
He HJ, Zhang J, Tai HM (2009) Self-recovery fragile watermarking using block-neighborhood tampering characterization. In: 11th international conference on information hiding. Springer, Berlin, pp 132–145
Horng SJ, Rosiyadi D, Fan PZ et al (2014) An adaptive watermarking scheme for e-government document images. Multimed Tools Appl 72(3):3085–3103
Horng SJ, Rosiyadi D, Li TR, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24(7):1099–1105
Huang YL, Horng SJ, Kao TW, Run RS (2011) An improved forecasting model based on the weighted fuzzy relationship matrix combined with a PSO adaptation for enrollments. Int J Innov Comput Inf Control Ijicic 07(7A):4027–4025
Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506
Li C, Wang Y, Ma B, Zhang Z (2012) Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Computer Standards & Interfaces 34(4):367–379
Medical Image Database (2017) Available: https://medpix.nlm.nih.gov/. Last Access Year
Nazari M, Mehrabian M (2020) A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images. Multimedia tools and application. Pp.1-41 https://doi.org/10.1007/s11042-020-10032-2.(on line)
Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214–230
Parah SA, Ahad F, Sheikh JA, Loan NA, Bhat GM (2017) Watermarked cardiac and high capacity data hiding technique for E-healthcare applications. Multimed Tools Appl 76(3):3943–3975
Prasetyo H, Rosiyadi D, Harjito B et al (2019) Bit plane slicing-based progressive visual secret sharing for grayscale and color images. In proceedings of International Symposium on Electronics and Smart Devices (ISESD).
Prasetyo H, Rosiyadi D, Horng S J (2018) Modified generalized random grids-based progressive secret sharing with lossless ability for binary image. In Proceedings of International Conference on Computer, Control, Informatics and its Applications (IC3INA). IEEE
Run RS, Horng SJ, Lai JL, Kao TW, Chen RJ (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673–689
Sabbane F, Tairi H (2019) Medical image watermarking technique based on polynomial decomposition. Multimed Tools Appl 78:34129–34155
Shi H, Wang XH, Li MC et al (2017) Secure variable-capacity self-recovery watermarking scheme. Multimed Tools Appl 76(5):6941–6972
Shih FY, Zhong X (2016) High-capacity multiple regions of interest watermarking for medical images. Inf Sci 367-368:648–659
Soni G K, Rawat A, Jain S, et al (2019) A pixel-based digital medical images protection using genetic algorithm with LSB watermark technique. In Smart Systems and IoT: Innovations in Computing pp.483–492
Soualmi A, Alti A, Laouamer L (2018) A new blind medical image watermarking based on weber descriptors and Arnold chaotic map. Arab J Sci Eng 43:7893–7905
Soualmi A, Alti A, Laouamer L(2018) Toward a secure and robust medical image watermarking in untrusted environment. In The Int Conf Adv Mach Learn Technol Appl pp.693-703
Su WG, Shen YL, Wang X (2019) Two-layer reversible watermarking algorithm using difference expansion. J Comput Res Dev 56(7):1498–1505
Thakkar FN, Srivastava VK (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76:3669–3697
Thanki R, Borr AS (2019) Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing. Multimed Tools Appl 78:13905–13924
Thanki R, Borra S, Dwivedi V, Borisagar K (2017) A RONI based visible watermarking approach for medical image authentication. J Med Syst 41(9):143
Thanki R, Borra S, Dwivedi V et al (2017) An efficient medical image watermarking scheme based on FDCu-DCT. Eng Sci Technol Int J 20:1366–1379
Thanki R, Kothari A (2020) Multi-level security of medical images based on encryption and watermarking for telemedicine applications. Multimedia tools and application, pp.1-19 https://doi.org/10.1007/s11042-020-09941-z. (on line)
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Vid Technol 13(8):890–896
Ustubioglu A, Ulutas G (2017) A new medical image watermarking technique with finer tamper localization. J Digit Imaging 30:665–680
Varalakshmi LM, Florence SG (2013) An enhanced encryption algorithm for video based on multiple Huffman tables. Multimed Tools Appl 64(3):717–729
Vellaisamy S, Ramesh V (2014) Inversion attack resilient zero-watermarking scheme for medical image authentication. IRT Image Process 8:718–727
Vellaisamy S, Ramesh V (2014) Inversion attack resilient zero-watermarking scheme for medical image authentication. IET Image Process 8(12):718–727
Wan WB, Wang J, Li J et al (2020) Pattern complexity-based JND estimation for quantization watermarking. Pattern Recogn Lett 130(2):157–164
Wan WB, Wang J, Li J et al (2020) Hybrid JND model-guided watermarking method for screen content images[J]. Multimed Tools Appl 79:4907–4930
Wang J, Wan WB, Li XX et al (2020) Color image watermarking based on orientation diversity and color complexity. Expert Syst Appl 40(2):112868
Wu Y, Deng RH (2005) Security of an ill-posed operator for image authentication. IEEE Trans Circ Syst Vid Technol 15(1):161–163
Wu CH, Horng SJ, Lee PZ (2001) A new computation of shape moments via quadtree decomposition. Pattern Recogn 34(7):1319–1330
Wu X Q, Li J B, Bhatti U A, et al. (2019) Logistic map and Contourlet-based robust zero watermark for medical images[M]// innovation in medicine and healthcare systems, and multimedia 115-123
Xiang SJ, Luo XR, Shi SX (2016) A novel reversible image watermarking algorithm in homomorphic encrypted domain. Chin J Comput 39(3):571–581
Yang YJ, Chen F, Sun ZW et al (2019) Secure and efficient parallel hash function construction and its application on cloud audit. Soft Comput 23:8907–8925
Yin ZX, Niu XJ, Zhang XP (2018) Reversible data hiding in encrypted AMBTC images. Multimed Tools Appl 77:18067–18083
Zhang X (2011) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensic Secur\ 7(2):826–832
Acknowledgements
This work was supported by Liaoning Provincial Social Science Planning Fund under Grant L19BTQ001.
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shi, H., Wang, Y., Li, Y. et al. Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication. Multimed Tools Appl 80, 24631–24667 (2021). https://doi.org/10.1007/s11042-021-10853-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10853-9