Skip to main content
Log in

A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, an algorithm for multiple watermarking based on discrete wavelet transforms (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) has been proposed for healthcare applications. For identity authentication purpose, the proposed method uses three watermarks in the form of medical Lump image watermark, the doctor signature/identification code and diagnostic information of the patient as the text watermarks. In order to improve the robustness performance of the image watermark, Back Propagation Neural Network (BPNN) is applied to the extracted image watermark to reduce the noise effects on the watermarked image. The security of the image watermark is also enhanced by using Arnold transform before embedding into the cover. Further, the symptom and signature text watermarks are also encoded by lossless arithmetic compression technique and Hamming error correction code respectively. The compressed and encoded text watermark is then embedded into the cover image. Experimental results are obtained by varying the gain factor, different sizes of text watermarks and the different cover image modalities. The results are provided to illustrate that the proposed method is able to withstand a different of signal processing attacks and has been found to be giving excellent performance for robustness, imperceptibility, capacity and security simultaneously. The robustness performance of the method is also compared with other reported techniques. Finally, the visual quality of the watermarked image is evaluated by the subjective method also. This shows that the visual quality of the watermarked images is acceptable for diagnosis at different gain factors. Therefore the proposed method may find potential application in prevention of patient identity theft in healthcare applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Agbaje MO, Awodele O, Ogbonna AC (2015) Applications of digital watermarking to cyber security (Cyber Watermarking), Proceedings of Informing Science & IT Education Conference (InSITE), pp 1–11

  2. Ahmad R, Nilchi N, Taheri A (2008) A new robust digital image watermarking technique based on the discrete cosine transformation and neural network. International Symposium on Biometrics and Security Technologies, Islamabad, pp 1–7

  3. Ahmed KA, Ahmad HA, Gaydecki P (2009) A blind block based DCT watermarking technique for gray level images using one dimensional Walsh coding. International conference on Current Trends in Information Technology, Dubai, pp 1–6

  4. Ahmidi N, Safabakhsh R (2004) A novel DCT-based approach for secure color image watermarking. Proc Int Conf Inf Technol: Coding Comput (ITCC) 2:709–713

    Google Scholar 

  5. Ali M, WookAhn C, Siarry P (2014) Differential evolution algorithm for the selection of optimal scaling factors in image watermarking, Special issue on Advances in Evolutionary Optimization Based Image Processing. Eng Appl Artif Intell 31:15–26

    Article  Google Scholar 

  6. Aslantas V (2009) An optimal robust digital image watermarking based on SVD using differential evolution algorithm. Opt Commun 282(5):769–777

    Article  Google Scholar 

  7. Aslantas V, Dogan AL, Ozturk S (2008) DWT-SVD based image watermarking using particle swarm optimizer. IEEE International Conference on Multimedia and Expo, Hannover, pp 241–244

    Google Scholar 

  8. Aslantas V, Ozer S, Ozturk S (2009) Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Opt Commun 282(14):2806–2817

    Article  Google Scholar 

  9. Barni M, Bartolini F (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791

    Article  MATH  Google Scholar 

  10. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3&4):313–336

    Article  Google Scholar 

  11. Bowman D (2012) http://www.fiercehealthit.com/story/researchers-use-digital-watermarks-protect-medical-images

  12. Chang CC, Tsai P, Lin CC (2005) SVD-based digital image watermarking scheme. Pattern Recogn Lett 26(10):1577–1586

    Article  Google Scholar 

  13. Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography : survey and analyses of current methods. Signal Process 90(3):727–752

    Article  MATH  Google Scholar 

  14. Chung KL, Yang WN, Huang YH, Wu ST, Hsu YC (2007) On SVD-based watermarking algorithm. Appl Math Comput 188(1):54–57

    MathSciNet  MATH  Google Scholar 

  15. Elmisery AM, Rho S, Botvich D (2015) A distributed collaborative platform for personal health profiles in patient-driven health social network. International Journal of Distributed Sensor Networks (IJDSN), Hindawi Publishing Corporation, Vol. 2015, pp 1–12

  16. Fan MQ, Wang HX, Li SK (2008) Restudy on SVD based watermarking scheme. Appl Math Comput 203(2):926–930

    MathSciNet  MATH  Google Scholar 

  17. Ganic E, Eskicioglu AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies. Proceedings of the 2004 Workshop on Multimedia and Security, ACM, pp 166–174

  18. Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Secure and efficient health data management through multiple watermarking on medical images. Med Biol Eng Comput 44:619–631

    Article  Google Scholar 

  19. Guo J-M, Prasetyo H (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent 25(5):1149–1163

    Article  Google Scholar 

  20. Hagan MT, Menhaj MB (1994) Training feed forward networks with the Marquardt algorithm. IEEE Trans Neural Netw 5(6):989–993

    Article  Google Scholar 

  21. Jacobs RA (1988) Increased rates of convergence through learning rate adaptation. Neural Netw 1(4):295–308

    Article  Google Scholar 

  22. Lai C-C, Tsai C-C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063

    Article  Google Scholar 

  23. Makbol NM, Khoo BE, Rassem TH (2016) Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process 10(1):34–52

    Article  Google Scholar 

  24. Mehto A, Mehra N (2016) Adaptive lossless medical image watermarking algorithm based on DCT & DWT. Proced Comput Sci 78:88–94

    Article  Google Scholar 

  25. Mei S-c, Li R-h, Dang H-m, Wang Y-k (2002) Decision of image watermarking strength based on artificial neural-networks. Proceedings of the 9th International Conference on Neural Information Processing, pp 2430–2434

  26. Mohananthini N, Yamuna G (2012) Watermarking for images using wavelet domain in Back- Propagation neural network. Adv Eng Sci Manag 100–105

  27. Muhammad K, Sajjad M, Irfan M, Rho S, Baik SW (2015) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimed Tools Appl: Int J. doi:10.1007/s11042-015-2671-9

    Google Scholar 

  28. Nguyen TS, Chang CC, Yang XQ (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU-Int J Electron Commun 70(8):1055–1061

    Article  Google Scholar 

  29. Niu Y, Cui X, Li Q, Ding J (2016) A SVD-based color image watermark algorithm in DWT domain. Adv Graph Commun Packaging Technol Mater, pp 303–309

  30. Nyeem H, Boles W, Boyd C (2013) A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326–343

    Article  Google Scholar 

  31. Ollove M (2014) www.usatoday.com/story/…/stateline-identity-thefts-medical…/5279351

  32. Parashar P, Singh RK (2014) A survey: digital image watermarking techniques. Int J Signal Process Image Process Pattern Recognit 7(6):111–124

    Google Scholar 

  33. Potdar VM, Han S, Chang E (2005) A survey of digital image watermarking techniques. 3rd IEEE International Conference on Industrial Informatics, pp 709–716

  34. Priya RL, Sadasivam V (2014) A survey on watermarking techniques, requirements, applications for medical images. J Theor Appl Inf Technol 65(1):103–120

    Google Scholar 

  35. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1(3):32–44

    Article  Google Scholar 

  36. Rumelhart DE, Hinton GE, Williams RJ (1986) Learning internal representations by error propagation, Parallel distributed processing: explorations in the microstructure of cognition. Vol. 1, Chapter 8, the M.I.T. Press, Cambridge, pp 318–362

  37. Singh R (2015) Digital image watermarking: an overview. Int J Res (IJR) 2(05):1087–1094

    Google Scholar 

  38. Singh AK (2016) Improved hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools and Applications: An International Journal, Springer, 10.1007/s11042-016-3514-z

  39. Singh P, Chadha RS (2013) A survey of digital watermarking techniques, applications and attacks. Int J Eng Innov Technol 2(9):165–175

    Google Scholar 

  40. Singh AK, Dave M, Mohan A (2015) Robust and secure multiple watermarking in wavelet domain, A Special Issue on Advanced Signal Processing Technologies and Systems for Healthcare Applications(ASPTSHA). J Med Imaging Health Inform 5(2):406–414

    Article  Google Scholar 

  41. Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wirel Pers Commun: Int J 83(3):2133–2150

    Article  Google Scholar 

  42. Singh AK, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl: Int J. doi:10.1007/s11042-015-2754-7. Springer

  43. Singh AK, B Kumar, M Dave, Ghrera SP, Mohan A (2016) Digital image watermarking: techniques and emerging applications. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, IGI Global, USA, pp 246–272, 2016. DOI: 10.4018/978-1-5225-0105-3.ch011

  44. Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective DWT Coefficients. J Med Imaging Health Inform 5(3):607–614

    Article  Google Scholar 

  45. Terry M (2009) Medical identity theft and telemedicine security. Telemed e-Health 15(10):928–932

    Article  Google Scholar 

  46. Terzjia N, Repges M, Luck K, Geisselhardt W (2002) Digital image watermarking using discrete wavelet transform: performance comparison of error correction codes. International Association of Science and Technology for Development

  47. Vafaei M, Mahdavi-Nasab H, Pourghassem H (2013) A new robust blind watermarking method based on neural networks in wavelet transform domain. World Appl Sci J 22(11):1572–1580

    Google Scholar 

  48. Vogl TP, Mangis JK, Zigler AK, Zink WT, Alkon DL (1998) Accelerating the convergence of the backpropagation method. Biol Cybern 59(4):256–264

    Google Scholar 

  49. Wei Z, Li H, Dai J, Wang S (2006) Image watermarking based on Genetic algorithm. IEEE International Conference on Multimedia and Expo, Toronto, Ont., pp 1117–1120

  50. Yang Q-t, Gao T-g, Fan L (2010) A novel robust watermarking scheme based on neural network. International Conference on Intelligent Computing and Integrated Systems (ICISS), IEEE, pp 71–75

  51. Yen CT, Huang YJ (2015) Frequency domain digital watermark recognition using image code sequences with a back-propagation neural network. Multimed Tools Appl: Int J. doi:10.1007/s11042-015-2718-y

    Google Scholar 

  52. Zeng B (1999) Reduction of blocking effect in DCT-coded images using zero-masking techniques. Signal Process 79(2):205–211

    Article  MATH  Google Scholar 

Download references

Acknowledgments

The Author’s are sincerely thankful to the potential/ anonymous reviewer’s for their critical comments and suggestions to improve the quality of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zear, A., Singh, A.K. & Kumar, P. A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77, 4863–4882 (2018). https://doi.org/10.1007/s11042-016-3862-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3862-8

Keywords

Navigation