Abstract
Smart healthcare systems play a vital role in the current era of Internet of Things (IoT) and Cyber-Physical Systems (CPS); i.e. Industry 4.0. Medical data security has become the integral part of smart hospital applications to ensure data privacy and patient data security. Usually, patient medical reports and diagnostic images are transferred to the specialist physician in other hospitals for effective diagnostics. Therefore, the transmission of medical data over the internet has attained significant interest among many researchers. The three main challenges associated with the e-healthcare systems are the following: (1) ensuring authentication of medical information; (2) transmission of medical image and patient health record (PHR) should not cause data mismatch/detachment; and (3) medical image should not be modified accidentally or intentionally as they are transmitted over the insecure medium. Thus, it is highly essential to ensure the integrity of the medical image, especially the region of interest (ROI) before taking any diagnostic decisions. Watermarking is a well-known technique used to overcome these challenges. The current research work has developed a watermarking algorithm to ensure integrity and authentication of the medical data and image. In this paper, a novel watermarking algorithm is designed based on Integer Wavelet Transform (IWT), combined chaotic map, recovery bit generation and SHA-256 to address the objective as mentioned earlier. The paper’s significant contribution is divided into four phases, namely, watermark generation and data embedding phase, authentication phase, tamper detection phase and localisation and lossless recovery phase. Experiments are carried out to prove that the developed IWT-based data embedding scheme offers high robustness to the data embedded in region of non-interest (RONI), detects and localises the tampered blocks inside ROI with 100% accuracy and recovers the tampered segments of ROI with zero MSE. Further, a comparison is made with the state-of-art schemes to verify the sternness of the developed system.
Graphical abstract
Similar content being viewed by others
References
Mohammed ZF, Abdulla AA (2020) Thresholding-based white blood cells segmentation from microscopic blood images. UHD J Sci Technol 4:9–17. https://doi.org/10.21928/uhdjst.v4n1y2020
Ibaida A, Khalil I (2013) Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Trans Biomed Eng 60:3322–3330
Zhou XQ, Huang HK, Member S, Lou SL (2001) Authenticity and integrity of digital mammography images. IEEE Trans Med Imaging 20:784–791
Rajendra Acharya U, Anand D, Subbanna Bhat PA, NU C (2001) Compact storage of medical images with patient information. IEEE Trans Inf Technol Biomed 5:320–323
Podilchuk CI, Delp EJ (2001) Digital watermarking: algorithms and applications. IEEE Signal Process Mag 18:33–46. https://doi.org/10.1109/79.939835
Verma VS, Jha RK (2015) An overview of robust digital image watermarking. IETE Tech Rev 32:479–496. https://doi.org/10.1080/02564602.2015.1042927
Kamran M, Farooq M (2012) An information-preserving watermarking scheme for right protection of EMR systems. IEEE Trans Knowl Data Eng 24:1950–1962. https://doi.org/10.1109/TKDE.2011.223
Kobayashi LOM, Furuie SS, Barreto PSLM (2009) Providing integrity and authenticity in DICOM images: a novel approach. IEEE Trans Inf Technol Biomed 13:582–589. https://doi.org/10.1109/TITB.2009.2014751
Gao G, Wan X, Yao S, Cui Z, Zhou C, Sun X (2017) Reversible data hiding with contrast enhancement and tamper localization for medical images. Inf Sci (Ny) 385–386:250–265. https://doi.org/10.1016/j.ins.2017.01.009
Guo X, Zhuang T-G (2009) A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22:53–64. https://doi.org/10.1007/s10278-007-9043-6
Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA Chaos Blend to Secure Medical Privacy. IEEE Trans Nanobioscience 16:850–858. https://doi.org/10.1109/TNB.2017.2780881
Coatrieux G, Le Guillou C, Cauvin JM, Roux C (2009) Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Inf Technol Biomed 13:158–165. https://doi.org/10.1109/TITB.2008.2007199
Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10:722–732. https://doi.org/10.1109/TITB.2006.875655
Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278. https://doi.org/10.1109/ACCESS.2018.2799240
Coatrieux G, Huang H, Shu H et al (2013) A watermarking-based medical image integrity control system and an image moment signature for tampering characterization. IEEE J Biomed Heal Informatics 17:1057–1067. https://doi.org/10.1109/JBHI.2013.2263533
Suneja A, Walia E (2013) Fragile and blind watermarking technique based on Weber’s law for medical image authentication. IET Comput Vis 7:9–19. https://doi.org/10.1049/iet-cvi.2012.0109
Dou W, Poh CL, Guan YL (2012) An improved tamper detection and localization scheme for volumetric DICOM images. J Digit Imaging 25:751–763. https://doi.org/10.1007/s10278-012-9518-y
Tan CK, Ng JC, Xu X, Poh CL, Guan YL, Sheah K (2011) Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24:528–540. https://doi.org/10.1007/s10278-010-9295-4
Ustubioglu A, Ulutas G (2017) A new medical image watermarking technique with finer tamper localization. J Digit Imaging 30:665–680. https://doi.org/10.1007/s10278-017-9960-y
Badshah G, Liew S-C, Zain JM, Ali M (2016) Watermarking of ultrasound medical images in teleradiology using compressed watermark. J Med imaging (Bellingham, Wash) 3:17001. https://doi.org/10.1117/1.JMI.3.1.017001
Khor HL, Liew SC, Zain JM (2017) Region of interest-based tamper detection and lossless recovery watermarking scheme (ROI-DR) on ultrasound medical images. J Digit Imaging 30:328–349. https://doi.org/10.1007/s10278-016-9930-9
Liew SC, Liew SW, Zain JM (2013) Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 26:316–325. https://doi.org/10.1007/s10278-012-9484-4
Badshah G, Liew SC, Zain JM, Ali M (2015) Secured telemedicine using whole image as watermark with tamper localization and recovery capabilities. J Inf Process Syst 11:601–615. https://doi.org/10.3745/JIPS.03.0044
Das S, Kundu MK (2013) Effective management of medical information through ROI-lossless fragile image watermarking. Comput Methods Prog Biomed 111:662–675. https://doi.org/10.1016/j.cmpb.2013.05.027
Al-Qershi OM, Khoo BE (2011) Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24:114–125. https://doi.org/10.1007/s10278-009-9253-1
Liu Y, Qu X, Xin G, Liu P (2015) ROI-based reversible data hiding scheme for medical images with tamper detection. IEICE Trans Inf Syst E98:769–774
Eswaraiah R, Sreenivasa Reddy E (2014) Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl 2014:1–10. https://doi.org/10.1155/2014/984646
Eswaraiah R, Sreenivasa Reddy E (2015) Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Process 9:615–625. https://doi.org/10.1049/iet-ipr.2014.0986
Wu JHK, Chang RF, Chen CJ, Wang CL, Kuo TH, Moon WK, Chen DR (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21:59–76. https://doi.org/10.1007/s10278-007-9011-1
Mohanty A, Kar A (2013) An improved IWT based algorithm for transmission and security of telemedicine. In: Lect. Notes Electr. Eng. 173–181
Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184. https://doi.org/10.1016/j.compbiomed.2016.03.020
Amirtharajan R, Balaguru Rayappan JB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inf Sci (Ny) 193:115–124. https://doi.org/10.1016/j.ins.2012.01.010
Chan C-K, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37:469–474. https://doi.org/10.1016/j.patcog.2003.08.007
Acknowledgements
They also wish to acknowledge SASTRA Deemed to be University, Thanjavur, India, for extending infrastructural support to carry out this work.
Funding
The authors wish to express their sincere thanks to the INSPIRE Fellowship (No. DST/INSPIRE Fellowship/2015/IF150628), Department of Science and Technology (DST), India for their financial support.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ravichandran, D., Praveenkumar, P., Rajagopalan, S. et al. ROI-based medical image watermarking for accurate tamper detection, localisation and recovery. Med Biol Eng Comput 59, 1355–1372 (2021). https://doi.org/10.1007/s11517-021-02374-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11517-021-02374-2