Skip to main content

Advertisement

Log in

ROI-based medical image watermarking for accurate tamper detection, localisation and recovery

  • Original Article
  • Published:
Medical & Biological Engineering & Computing Aims and scope Submit manuscript

Abstract

Smart healthcare systems play a vital role in the current era of Internet of Things (IoT) and Cyber-Physical Systems (CPS); i.e. Industry 4.0. Medical data security has become the integral part of smart hospital applications to ensure data privacy and patient data security. Usually, patient medical reports and diagnostic images are transferred to the specialist physician in other hospitals for effective diagnostics. Therefore, the transmission of medical data over the internet has attained significant interest among many researchers. The three main challenges associated with the e-healthcare systems are the following: (1) ensuring authentication of medical information; (2) transmission of medical image and patient health record (PHR) should not cause data mismatch/detachment; and (3) medical image should not be modified accidentally or intentionally as they are transmitted over the insecure medium. Thus, it is highly essential to ensure the integrity of the medical image, especially the region of interest (ROI) before taking any diagnostic decisions. Watermarking is a well-known technique used to overcome these challenges. The current research work has developed a watermarking algorithm to ensure integrity and authentication of the medical data and image. In this paper, a novel watermarking algorithm is designed based on Integer Wavelet Transform (IWT), combined chaotic map, recovery bit generation and SHA-256 to address the objective as mentioned earlier. The paper’s significant contribution is divided into four phases, namely, watermark generation and data embedding phase, authentication phase, tamper detection phase and localisation and lossless recovery phase. Experiments are carried out to prove that the developed IWT-based data embedding scheme offers high robustness to the data embedded in region of non-interest (RONI), detects and localises the tampered blocks inside ROI with 100% accuracy and recovers the tampered segments of ROI with zero MSE. Further, a comparison is made with the state-of-art schemes to verify the sternness of the developed system.

Graphical abstract

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Mohammed ZF, Abdulla AA (2020) Thresholding-based white blood cells segmentation from microscopic blood images. UHD J Sci Technol 4:9–17. https://doi.org/10.21928/uhdjst.v4n1y2020

    Article  Google Scholar 

  2. Ibaida A, Khalil I (2013) Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Trans Biomed Eng 60:3322–3330

    Article  Google Scholar 

  3. Zhou XQ, Huang HK, Member S, Lou SL (2001) Authenticity and integrity of digital mammography images. IEEE Trans Med Imaging 20:784–791

    Article  CAS  Google Scholar 

  4. Rajendra Acharya U, Anand D, Subbanna Bhat PA, NU C (2001) Compact storage of medical images with patient information. IEEE Trans Inf Technol Biomed 5:320–323

    Article  Google Scholar 

  5. Podilchuk CI, Delp EJ (2001) Digital watermarking: algorithms and applications. IEEE Signal Process Mag 18:33–46. https://doi.org/10.1109/79.939835

    Article  Google Scholar 

  6. Verma VS, Jha RK (2015) An overview of robust digital image watermarking. IETE Tech Rev 32:479–496. https://doi.org/10.1080/02564602.2015.1042927

    Article  Google Scholar 

  7. Kamran M, Farooq M (2012) An information-preserving watermarking scheme for right protection of EMR systems. IEEE Trans Knowl Data Eng 24:1950–1962. https://doi.org/10.1109/TKDE.2011.223

    Article  Google Scholar 

  8. Kobayashi LOM, Furuie SS, Barreto PSLM (2009) Providing integrity and authenticity in DICOM images: a novel approach. IEEE Trans Inf Technol Biomed 13:582–589. https://doi.org/10.1109/TITB.2009.2014751

    Article  PubMed  Google Scholar 

  9. Gao G, Wan X, Yao S, Cui Z, Zhou C, Sun X (2017) Reversible data hiding with contrast enhancement and tamper localization for medical images. Inf Sci (Ny) 385–386:250–265. https://doi.org/10.1016/j.ins.2017.01.009

    Article  Google Scholar 

  10. Guo X, Zhuang T-G (2009) A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22:53–64. https://doi.org/10.1007/s10278-007-9043-6

    Article  PubMed  Google Scholar 

  11. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA Chaos Blend to Secure Medical Privacy. IEEE Trans Nanobioscience 16:850–858. https://doi.org/10.1109/TNB.2017.2780881

    Article  PubMed  Google Scholar 

  12. Coatrieux G, Le Guillou C, Cauvin JM, Roux C (2009) Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Inf Technol Biomed 13:158–165. https://doi.org/10.1109/TITB.2008.2007199

    Article  PubMed  Google Scholar 

  13. Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10:722–732. https://doi.org/10.1109/TITB.2006.875655

    Article  PubMed  Google Scholar 

  14. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278. https://doi.org/10.1109/ACCESS.2018.2799240

    Article  Google Scholar 

  15. Coatrieux G, Huang H, Shu H et al (2013) A watermarking-based medical image integrity control system and an image moment signature for tampering characterization. IEEE J Biomed Heal Informatics 17:1057–1067. https://doi.org/10.1109/JBHI.2013.2263533

    Article  Google Scholar 

  16. Suneja A, Walia E (2013) Fragile and blind watermarking technique based on Weber’s law for medical image authentication. IET Comput Vis 7:9–19. https://doi.org/10.1049/iet-cvi.2012.0109

    Article  Google Scholar 

  17. Dou W, Poh CL, Guan YL (2012) An improved tamper detection and localization scheme for volumetric DICOM images. J Digit Imaging 25:751–763. https://doi.org/10.1007/s10278-012-9518-y

    Article  PubMed  PubMed Central  Google Scholar 

  18. Tan CK, Ng JC, Xu X, Poh CL, Guan YL, Sheah K (2011) Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24:528–540. https://doi.org/10.1007/s10278-010-9295-4

    Article  PubMed  Google Scholar 

  19. Ustubioglu A, Ulutas G (2017) A new medical image watermarking technique with finer tamper localization. J Digit Imaging 30:665–680. https://doi.org/10.1007/s10278-017-9960-y

    Article  PubMed  PubMed Central  Google Scholar 

  20. Badshah G, Liew S-C, Zain JM, Ali M (2016) Watermarking of ultrasound medical images in teleradiology using compressed watermark. J Med imaging (Bellingham, Wash) 3:17001. https://doi.org/10.1117/1.JMI.3.1.017001

    Article  Google Scholar 

  21. Khor HL, Liew SC, Zain JM (2017) Region of interest-based tamper detection and lossless recovery watermarking scheme (ROI-DR) on ultrasound medical images. J Digit Imaging 30:328–349. https://doi.org/10.1007/s10278-016-9930-9

    Article  PubMed  PubMed Central  Google Scholar 

  22. Liew SC, Liew SW, Zain JM (2013) Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 26:316–325. https://doi.org/10.1007/s10278-012-9484-4

    Article  PubMed  Google Scholar 

  23. Badshah G, Liew SC, Zain JM, Ali M (2015) Secured telemedicine using whole image as watermark with tamper localization and recovery capabilities. J Inf Process Syst 11:601–615. https://doi.org/10.3745/JIPS.03.0044

    Article  Google Scholar 

  24. Das S, Kundu MK (2013) Effective management of medical information through ROI-lossless fragile image watermarking. Comput Methods Prog Biomed 111:662–675. https://doi.org/10.1016/j.cmpb.2013.05.027

    Article  Google Scholar 

  25. Al-Qershi OM, Khoo BE (2011) Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24:114–125. https://doi.org/10.1007/s10278-009-9253-1

    Article  PubMed  Google Scholar 

  26. Liu Y, Qu X, Xin G, Liu P (2015) ROI-based reversible data hiding scheme for medical images with tamper detection. IEICE Trans Inf Syst E98:769–774

    Article  Google Scholar 

  27. Eswaraiah R, Sreenivasa Reddy E (2014) Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl 2014:1–10. https://doi.org/10.1155/2014/984646

    Article  Google Scholar 

  28. Eswaraiah R, Sreenivasa Reddy E (2015) Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Process 9:615–625. https://doi.org/10.1049/iet-ipr.2014.0986

    Article  Google Scholar 

  29. Wu JHK, Chang RF, Chen CJ, Wang CL, Kuo TH, Moon WK, Chen DR (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21:59–76. https://doi.org/10.1007/s10278-007-9011-1

    Article  PubMed  Google Scholar 

  30. Mohanty A, Kar A (2013) An improved IWT based algorithm for transmission and security of telemedicine. In: Lect. Notes Electr. Eng. 173–181

  31. Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184. https://doi.org/10.1016/j.compbiomed.2016.03.020

    Article  PubMed  Google Scholar 

  32. Amirtharajan R, Balaguru Rayappan JB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inf Sci (Ny) 193:115–124. https://doi.org/10.1016/j.ins.2012.01.010

    Article  Google Scholar 

  33. Chan C-K, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37:469–474. https://doi.org/10.1016/j.patcog.2003.08.007

    Article  Google Scholar 

Download references

Acknowledgements

They also wish to acknowledge SASTRA Deemed to be University, Thanjavur, India, for extending infrastructural support to carry out this work.

Funding

The authors wish to express their sincere thanks to the INSPIRE Fellowship (No. DST/INSPIRE Fellowship/2015/IF150628), Department of Science and Technology (DST), India for their financial support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rengarajan Amirtharajan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ravichandran, D., Praveenkumar, P., Rajagopalan, S. et al. ROI-based medical image watermarking for accurate tamper detection, localisation and recovery. Med Biol Eng Comput 59, 1355–1372 (2021). https://doi.org/10.1007/s11517-021-02374-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11517-021-02374-2

Keywords

Navigation