Skip to main content

Advertisement

Log in

Secured medical image watermarking with DNA codec

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Modern healthcare systems are based on managing diagnostic information of patients through E-health. E-health refers to the Internet enabled healthcare applications involving transacting personal health records or information and other internet based services including e-Pharmacy where security threats is a major concern . This paper introduces a hybrid watermarking and encryption technique for copyright protection and authentication of medical images. The medical image is watermarked in wavelet domain where in the Electronic Health Record (EHR) is used as watermark and hospital logo as the reference image. Embedding of the EHR data is based on energy band selection and in reference to the bit location in the reference image A Composite algorithm for improved image security is proposed by taking the advantages of DNA based image encryption and genetic algorithms (GA). A number of deoxyribonucleic acid (DNA) masks are created using logistic map function and DNA conversion rules. Then encryption is performed on the watermarked image to generate a number of cipher images. Genetic algorithm (GA) is applied to find the best DNA mask in iterative manner until the condition is met. The experimental results demonstrate the capability of the proposed scheme to the available security attributes in both frequency and encryption domain while minimizing image distortion and also resists to various attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Abdullah AH, Ensystifar R, Lee M (2012) A hybrid encryption algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66:806–816

    Article  Google Scholar 

  2. Adleman L (1994) Molecular computation of solutions to combinatorial problems. Science 266:1021–1024

    Article  Google Scholar 

  3. Ali H-M, Abdellatif M, Bourennane E-B (2011) A watermarking of medical image: method based LSB. J Emerg Trends Comput Inf Sci 2(12):714–721

    Google Scholar 

  4. An L, Gao X, Li X (2012) Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans Image Process 21:3598–3611

    Article  MathSciNet  MATH  Google Scholar 

  5. Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85:883–894

    Article  Google Scholar 

  6. Blumentha D, Marilyn Tavenner RN (2010) The “meaningful use” regulation for electronic health records. J Med 363:501–504

    Google Scholar 

  7. Bouslimi D, Coatrieux G, Roux C (2012) A joint encryption / watermarking algorithm for verifying the reliability of medical images: application to echographic images. J Comput Methods Prog Biomed 106:47–54

    Article  Google Scholar 

  8. Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11:585–595

    Article  Google Scholar 

  9. Celland CT, Risca V, Bancroft C (1999) Hiding messages in DNA microdots. Nature 399:533–534

    Article  Google Scholar 

  10. Chang C-C, Kieu TD (2010) A reversible data hiding scheme using complementary embedding strategy. Inf Sci 180:3045–3058

    Article  Google Scholar 

  11. Chang C-C, Tai W-L, Lin C-C (2006) A reversible data hiding scheme based on side match vector quantization. IEEE Trans Cir Syst Video Technol 16:1301–1308

    Article  Google Scholar 

  12. Chao HM, Hsu CM, Miaou SG (2002) A data- hiding technique with authentication, integration and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6:46–53

    Article  Google Scholar 

  13. Cheddad A, Condell J, Curan K, MC Kevitt P (2010) Digital image steganography: survey and analysis of current methods. J Signal Process 90:727–752

    Article  MATH  Google Scholar 

  14. Coatrieux G, Maitre H, Sankur B, Rolland Y, Collores R (2000) Relevance of watermarking in medical imaging information technology applications in biomedicine. IEEE-EMBS Conference, Arlington, pp 250–255

    Google Scholar 

  15. Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking: chapter III. Morgan Kaufmann Publishers, San Francisco, pp 41–82

    Book  Google Scholar 

  16. Desai D, Prasad A, Crasto J (2012) Chaos based system for image encryption. Int J Comput Sci Inf Technol 3(4):4809–4811

    Google Scholar 

  17. Drezner Z, Misevicius A (2013) Enhancing the performance of hybrid genetic algotihms by differential improvement. Comput Oper Res 40:1038–1046

    Article  MATH  Google Scholar 

  18. DyerJD HRJ, DozierGV BJE (2012) Aerospace design optimization using a steady state real-coded genetic algorithm. Appl Math Comput 218:4710–4730

    Google Scholar 

  19. Enayatifar R, Abdullah AH, Lee M (2013) A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption. Opt Lasers Eng 51:1066–1077

    Article  Google Scholar 

  20. Enayatifar R, Sadaei HJ, Abdullah AH, Gani A (2013) Imperialist competitive algorithm combined with refined high –order weighted fuzzy time series (RHWFTS-ICA) for short term load forecasting. Energy Convers Manag 76:1104–1116

    Article  Google Scholar 

  21. Enayatifar R, Yousefi M, Abdullah AH, Darus AN (2013) MOICA: a novel multi objective approach based on imperialist competitive algorithm. J Appl Math Comput Model 219:8829–8841

    MATH  Google Scholar 

  22. Enayatifar R, Yousefi M, Abdullah AH, Darus AN (2013) A novel harmony search algorithm based on learning automata. Commun Nonlinear Sci Numer Simul 18:3481–3497

    Article  MathSciNet  MATH  Google Scholar 

  23. Gehani A, LaBean TH, Reif JH (2000) DNA-based cryptography dimacs series in discrete mathematics and theoretical. Int J Computer Appl 70:233–249

    MATH  Google Scholar 

  24. Hoglund H (2013) Estimating discretionary accruals using a grouping genetic algorithm. Expert Syst Appl 40:2366–2372

    Article  Google Scholar 

  25. Hsu W, Taira RK, El-Saden S, Kangarloo H (2012) Context based electronic health record: toward patient specific healthcare. IEEE Trans Inf Technol 16:228–234

    Article  Google Scholar 

  26. Hu J, Chen H-H, Hou T-W (2010) A hybrid public key infrastructure solution for HIPAA privacy/security regulations. J Comput Stand Interfaces 32:274–280

    Article  Google Scholar 

  27. Khan M, Shah T (2014) A literature review on image encryption techniques. J 3D Res 28–53

  28. King OD, Gaborit P (2007) Binary templates for comma-free DNA codes. J Discret Appl Math 155:831–839

    Article  MathSciNet  MATH  Google Scholar 

  29. Kuo H-C, Lin C-H (2013) A directed genetic algorithm for global optimization. Appl Math Comput 219:7348–64

    MathSciNet  MATH  Google Scholar 

  30. Leier A, Richter C, Banzhaf W, Rauhe H (1997) Cryptography with DNA binary stands. BioSystems 57:9–22

    Google Scholar 

  31. Lian SG (2009) Efficient image or video encryption based on spatiotemporal chaos system. Int J Chaos, Solitons Fractals 40:2509–2510

    Article  MATH  Google Scholar 

  32. Lipton RJ (1995) Using DNA to solve NP complete problems. J Comput Syst Sci 268:542–545

    Google Scholar 

  33. Liu H, Wang X, Abdurahman K (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12:1457–1466

    Article  Google Scholar 

  34. Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rules and chaotic maps. J Appl Soft Comput 12:1457–1466

    Article  Google Scholar 

  35. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24:926–934

    Article  Google Scholar 

  36. Pember M (2015) Clarian health: clinical excellence through quality and patient safety, health information management systems, cases, strategies and solutions. 3rd ed., Health Informatics series, pp 53–62

  37. Pisarchik AN, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Physica D: Nonlinear Phenom 237:2638–2648

    Article  MathSciNet  MATH  Google Scholar 

  38. Ulutus M, Ulutas G, Nabiyev VV (2011) Medical image security and EPR hiding using Shamir’s secret sharing scheme. J Syst Softw 84:341–353

    Article  Google Scholar 

  39. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85:290–299

    Article  Google Scholar 

  40. Xue XL, Zhang Q (2010) An image fusion encryption algorithm based on DNA sequence and multi-chaotic maps. J Comput Theory Nanosci 7:397–403

    Article  Google Scholar 

  41. Yousefi M, Enayatifar R, Darus AN, Abdullah AH (2013) Optimization of plate –fin heat exchangers by an improved harmony search algorithm. J Appl Therm Eng 50:877–885

    Article  Google Scholar 

  42. Yousefi M, Enayatifar R, Darus AN (2012) An optimal design of plate-fin heat exchangers by a hybrid evolutionary algorithm. Int J Commun Heat Mass Transfer 39:258–263

    Article  Google Scholar 

  43. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. J Math Comput Model 52:2028–2035

    Article  MathSciNet  MATH  Google Scholar 

  44. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52:2028–2035

    Article  MathSciNet  MATH  Google Scholar 

  45. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. J Math Comput Model 52:2018–2035

    MathSciNet  MATH  Google Scholar 

  46. Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyper chaotic system. Int J Light Electron Opt 124:3596–3600

    Article  Google Scholar 

  47. Zhang Q, Xue X and Wei X (2012) A novel image encryption algorithm based on DNA subsequence operation. Sci World J Article ID 286741

  48. Zhu Z-I, Zhang W, Wong K-W, Yu H (2011) A chaos based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171–1186

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by the research fund of University Grants Commission (UGC), India. (Project No: 42-1017/2013 (SR)).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Anusudha.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anusudha, K., Venkateswaran, N. & Valarmathi, J. Secured medical image watermarking with DNA codec. Multimed Tools Appl 76, 2911–2932 (2017). https://doi.org/10.1007/s11042-015-3213-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3213-1

Keywords

Navigation