Abstract
Modern healthcare systems are based on managing diagnostic information of patients through E-health. E-health refers to the Internet enabled healthcare applications involving transacting personal health records or information and other internet based services including e-Pharmacy where security threats is a major concern . This paper introduces a hybrid watermarking and encryption technique for copyright protection and authentication of medical images. The medical image is watermarked in wavelet domain where in the Electronic Health Record (EHR) is used as watermark and hospital logo as the reference image. Embedding of the EHR data is based on energy band selection and in reference to the bit location in the reference image A Composite algorithm for improved image security is proposed by taking the advantages of DNA based image encryption and genetic algorithms (GA). A number of deoxyribonucleic acid (DNA) masks are created using logistic map function and DNA conversion rules. Then encryption is performed on the watermarked image to generate a number of cipher images. Genetic algorithm (GA) is applied to find the best DNA mask in iterative manner until the condition is met. The experimental results demonstrate the capability of the proposed scheme to the available security attributes in both frequency and encryption domain while minimizing image distortion and also resists to various attacks.
Similar content being viewed by others
References
Abdullah AH, Ensystifar R, Lee M (2012) A hybrid encryption algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66:806–816
Adleman L (1994) Molecular computation of solutions to combinatorial problems. Science 266:1021–1024
Ali H-M, Abdellatif M, Bourennane E-B (2011) A watermarking of medical image: method based LSB. J Emerg Trends Comput Inf Sci 2(12):714–721
An L, Gao X, Li X (2012) Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans Image Process 21:3598–3611
Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85:883–894
Blumentha D, Marilyn Tavenner RN (2010) The “meaningful use” regulation for electronic health records. J Med 363:501–504
Bouslimi D, Coatrieux G, Roux C (2012) A joint encryption / watermarking algorithm for verifying the reliability of medical images: application to echographic images. J Comput Methods Prog Biomed 106:47–54
Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11:585–595
Celland CT, Risca V, Bancroft C (1999) Hiding messages in DNA microdots. Nature 399:533–534
Chang C-C, Kieu TD (2010) A reversible data hiding scheme using complementary embedding strategy. Inf Sci 180:3045–3058
Chang C-C, Tai W-L, Lin C-C (2006) A reversible data hiding scheme based on side match vector quantization. IEEE Trans Cir Syst Video Technol 16:1301–1308
Chao HM, Hsu CM, Miaou SG (2002) A data- hiding technique with authentication, integration and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6:46–53
Cheddad A, Condell J, Curan K, MC Kevitt P (2010) Digital image steganography: survey and analysis of current methods. J Signal Process 90:727–752
Coatrieux G, Maitre H, Sankur B, Rolland Y, Collores R (2000) Relevance of watermarking in medical imaging information technology applications in biomedicine. IEEE-EMBS Conference, Arlington, pp 250–255
Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking: chapter III. Morgan Kaufmann Publishers, San Francisco, pp 41–82
Desai D, Prasad A, Crasto J (2012) Chaos based system for image encryption. Int J Comput Sci Inf Technol 3(4):4809–4811
Drezner Z, Misevicius A (2013) Enhancing the performance of hybrid genetic algotihms by differential improvement. Comput Oper Res 40:1038–1046
DyerJD HRJ, DozierGV BJE (2012) Aerospace design optimization using a steady state real-coded genetic algorithm. Appl Math Comput 218:4710–4730
Enayatifar R, Abdullah AH, Lee M (2013) A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption. Opt Lasers Eng 51:1066–1077
Enayatifar R, Sadaei HJ, Abdullah AH, Gani A (2013) Imperialist competitive algorithm combined with refined high –order weighted fuzzy time series (RHWFTS-ICA) for short term load forecasting. Energy Convers Manag 76:1104–1116
Enayatifar R, Yousefi M, Abdullah AH, Darus AN (2013) MOICA: a novel multi objective approach based on imperialist competitive algorithm. J Appl Math Comput Model 219:8829–8841
Enayatifar R, Yousefi M, Abdullah AH, Darus AN (2013) A novel harmony search algorithm based on learning automata. Commun Nonlinear Sci Numer Simul 18:3481–3497
Gehani A, LaBean TH, Reif JH (2000) DNA-based cryptography dimacs series in discrete mathematics and theoretical. Int J Computer Appl 70:233–249
Hoglund H (2013) Estimating discretionary accruals using a grouping genetic algorithm. Expert Syst Appl 40:2366–2372
Hsu W, Taira RK, El-Saden S, Kangarloo H (2012) Context based electronic health record: toward patient specific healthcare. IEEE Trans Inf Technol 16:228–234
Hu J, Chen H-H, Hou T-W (2010) A hybrid public key infrastructure solution for HIPAA privacy/security regulations. J Comput Stand Interfaces 32:274–280
Khan M, Shah T (2014) A literature review on image encryption techniques. J 3D Res 28–53
King OD, Gaborit P (2007) Binary templates for comma-free DNA codes. J Discret Appl Math 155:831–839
Kuo H-C, Lin C-H (2013) A directed genetic algorithm for global optimization. Appl Math Comput 219:7348–64
Leier A, Richter C, Banzhaf W, Rauhe H (1997) Cryptography with DNA binary stands. BioSystems 57:9–22
Lian SG (2009) Efficient image or video encryption based on spatiotemporal chaos system. Int J Chaos, Solitons Fractals 40:2509–2510
Lipton RJ (1995) Using DNA to solve NP complete problems. J Comput Syst Sci 268:542–545
Liu H, Wang X, Abdurahman K (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12:1457–1466
Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rules and chaotic maps. J Appl Soft Comput 12:1457–1466
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24:926–934
Pember M (2015) Clarian health: clinical excellence through quality and patient safety, health information management systems, cases, strategies and solutions. 3rd ed., Health Informatics series, pp 53–62
Pisarchik AN, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Physica D: Nonlinear Phenom 237:2638–2648
Ulutus M, Ulutas G, Nabiyev VV (2011) Medical image security and EPR hiding using Shamir’s secret sharing scheme. J Syst Softw 84:341–353
Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85:290–299
Xue XL, Zhang Q (2010) An image fusion encryption algorithm based on DNA sequence and multi-chaotic maps. J Comput Theory Nanosci 7:397–403
Yousefi M, Enayatifar R, Darus AN, Abdullah AH (2013) Optimization of plate –fin heat exchangers by an improved harmony search algorithm. J Appl Therm Eng 50:877–885
Yousefi M, Enayatifar R, Darus AN (2012) An optimal design of plate-fin heat exchangers by a hybrid evolutionary algorithm. Int J Commun Heat Mass Transfer 39:258–263
Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. J Math Comput Model 52:2028–2035
Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52:2028–2035
Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. J Math Comput Model 52:2018–2035
Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyper chaotic system. Int J Light Electron Opt 124:3596–3600
Zhang Q, Xue X and Wei X (2012) A novel image encryption algorithm based on DNA subsequence operation. Sci World J Article ID 286741
Zhu Z-I, Zhang W, Wong K-W, Yu H (2011) A chaos based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171–1186
Acknowledgments
This research was supported by the research fund of University Grants Commission (UGC), India. (Project No: 42-1017/2013 (SR)).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Anusudha, K., Venkateswaran, N. & Valarmathi, J. Secured medical image watermarking with DNA codec. Multimed Tools Appl 76, 2911–2932 (2017). https://doi.org/10.1007/s11042-015-3213-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-3213-1