Skip to main content
Log in

Robust watermarking method in DFT domain for effective management of medical imaging

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

In general, management of medical data is achieved by several issues of medical information such as authentication, security, integrity, privacy, among others. Because medical images and their related electronic patient record (EPR) data are stored separately; the probability of corruption of this information or their detachment from the corresponding EPR data could be very high. Losing data from the corresponding medical image may lead to a wrong diagnostic. Digital watermarking has recently emerged as a suitable solution to solve some of the problems associated with the management of medical images. This paper proposes a robust watermarking method for medical images to avoid their detachment from the corresponding EPR data in which the watermark is embedded using the digital imaging and communications in medicine standard metadata together with cryptographic techniques. In order to provide a high robustness of the watermark while preserving at the same time a high quality of the watermarked images, the generated watermark is embedded into the magnitude of the middle frequencies of the discrete Fourier transform of the original medical image. During the detection process, the watermark data bits are recovered and detected using the bit correct rate criterion. Extensive experiments were carried out, and the performance of the proposed method is evaluated in terms of imperceptibility, payload, robustness and detachment detection. Quantitative evaluation of the watermarked images is performed by using three of the more common metrics: the peak signal-to-noise ratio, structural similarity index and visual information fidelity. Experimental results show the watermark robustness against several of the more aggressive geometric and signal processing distortions. The receiver operating characteristics curves also show the desirable detachment detection performance of the proposed method. A comparison with the previously reported methods with similar purposes respect to the proposed method is also provided.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Coatrieux, G., Maître, H., Sankur, B., Rolland, Y., Collorec, R.: Relevance of watermarking in medical imaging. In: IEEE-embs Information Technology Applications in, Biomedicine, pp. 250–255 (2000)

  2. Coatrieux, G., Quantin, C., Montagner, J., Fassa, M., Allaert, F.A., Roux, Ch.: Watermarking medical images with anonymous patient identification to verify authenticity. J. Stud. Health Technol. Inform. 136, 667–672 (2008)

    Google Scholar 

  3. Navas, K.A., Sasikumar, M.: Survey of medical image watermarking algorithms. In: Proceedings of the Internation Conference Sciences of Electronics, Technologies of Information and Telecommunications, pp. 25–29 (2007)

  4. Zain, J.M., Fauzi. A.R., Aziz. A.: Clinical evaluation of watermarked medical images. In: Proceedings of the 28th IEEE EMBS Annual International Conference, pp. 5459–5462 (2006)

  5. Guo, X., Zhuang, T.G.: A region-based lossless watermarking scheme for enhancing security of medical data. J. Digit. Imaging 22(1), 53–64 (2009)

    Article  Google Scholar 

  6. Nergui, M., Acharya, U.S., Acharya, U.R., Yu, W.: Reliable and robust transmission and storage techniques for medical images with patient information. J. Med. Syst. 34(6), 1129–1139 (2010)

    Article  Google Scholar 

  7. Wu, J.H., Chang, R.F., Chen, C.J., Wang, C.L., Kuo, T.H., Moon, W.K., Chen, D.-R.: Tamper detection and recovery for medical images using near-lossless information hiding technique. J. Digit. Imaging 21(1), 59–76 (2008)

    Google Scholar 

  8. Osamah, M., Al-Qershi, O., Khoo, B.E.: Authentication and data hiding using a reversible ROI-based watermarking scheme for DICOM images. Int. J. Inf. Commun. Eng. 5(2), 801–806 (2009)

    Google Scholar 

  9. Zain, J.M., Fauzi, A.R.M.: Medical image watermarking with tamper detection and recovery. In: Proceedings of the 28th IEEE EMBS Annual International Conference, pp. 3270–3273 (2006)

  10. Das, S., Kundu, M.K.: Effective management of medical information through a novel blind watermarking technique. J. Med. Syst. 36, 3339–3351 (2012)

    Article  Google Scholar 

  11. Manasrah, T., Al-Haj, A.: Management of medical images using wavelets-based multi-watermarking algorithm. In: International Conference on Innovations in Information Technology (IIT 2008), pp. 697–701 (2008). doi:10.1109/INNOVATIONS.2008.4781697

  12. Rahimi, F., Rabbani, H.: A dual adaptive watermarking scheme in contourlet domain for DICOM images. Biomed. Eng. Online 10(53), 1–18 (2011)

    Google Scholar 

  13. Rodriguez, R., Feregrino, C., Martinez, J.: Robust watermarking scheme applied to radiological medical images. IEICE Trans. Inf. Syst. 91(3), 862–864 (2008)

    Article  Google Scholar 

  14. Mostafa, S.A.K., El-sheimy, N., Tolba, A.S., Abdelkader, F.M., Elhindy, H.M.: Wavelet packets-based blind watermarking for medical image management. Open Biomed. Eng. J. 4, 93–98 (2010)

    Article  Google Scholar 

  15. Barni, M., Bartolini, F.: Data hiding for fighting piracy. IEEE Signal Process. Mag. 21(2), 28–39 (2004)

    Article  Google Scholar 

  16. Lacy, J., Quackenbush, S., Reibman, A., Snyder, J.: Intellectual property protection systems and digital watermarking. Opt. Express 3, 478–484 (1998)

    Article  Google Scholar 

  17. Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking digital image and video data. IEEE Signal Process. Mag. 17, 20–46 (2000)

    Article  Google Scholar 

  18. Barni, M., Bartolini, F.: Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker, New York (2004)

  19. Mintzer, F., Braudaway, G.W., Yeung, M.M.: Effective and ineffective digital watermarks. In: IEEE International Conference on Image Processing, pp. 9–12 (1997)

  20. Schneier, B.: Applied Cryptography, 2nd edn. Wiley, New York (1996)

    Google Scholar 

  21. Dobbertin, H., Bosselaers, A., Preneel, B.: RIPEMD-160, a strengthened version of RIPEMD. In: Gollmann, D. (ed.) Fast Software Encryption, LNCS, vol. 1039, pp. 71–82. Springer, Berlin (1996). doi:10.1007/3-540-60865-6_44

  22. Bosselaers, A., Dobbertin, H., Preneel, B.: The RIPEMD-160 cryptographic hash function. Dr. Dobb’s J. 22(1), 24–28 (January 1997)

  23. Bovik, A.C.: Handbook of Image and Video Processing. Academic Press, New York (2005)

    Google Scholar 

  24. Okman, O., Akar, G.: Quantization index modulation-based image watermarking using digital holography. J. Opt. Soc. Am. A 24, 243–252 (2007)

    Article  Google Scholar 

  25. Tang, C.W., Hang, H.M.: A feature-based robust digital image watermarking scheme. IEEE Trans. Signal Process. 51(4), 950–959 (2003)

    Article  MathSciNet  Google Scholar 

  26. Sheikh, H.R., Bovik, A.C.: Image information and visual quality. IEEE Trans. Image Process. 15(2), 430–444 (2006)

    Article  Google Scholar 

  27. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

Download references

Acknowledgments

We thank the Post-Doctoral Scholarships Program and PAPIIT IN-112513 project from DGAPA in the National Autonomous University of Mexico (UNAM) and the National Polytechnic Institute (IPN) of Mexico by the support provided during the realization of this research. The authors also thank the Mexican Institute Social Security (IMSS) for providing us the medical images used to carry out this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manuel Cedillo-Hernandez.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Cedillo-Hernandez, M., Garcia-Ugalde, F., Nakano-Miyatake, M. et al. Robust watermarking method in DFT domain for effective management of medical imaging. SIViP 9, 1163–1178 (2015). https://doi.org/10.1007/s11760-013-0555-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-013-0555-x

Keywords

Navigation