Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter September 23, 2016

Multiple Watermarking for Healthcare Applications

  • Aditi Zear , Amit Kumar Singh EMAIL logo and Pardeep Kumar

Abstract

In this paper, an algorithm for multiple digital watermarking based on discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) was proposed for healthcare applications such as tele-ophthalmology, tele-medicine, tele-diagnosis, and tele-consultancy services. Multiple watermarks were used in this algorithm to reduce the consequences of medical identity thefts. In the embedding process, the cover medical image was decomposed into third-level DWT. Low-frequency bands (LH2 and LL3) were transformed by DCT, and then SVD was applied to DCT coefficients. Two watermarks in the form of images were also transformed by DCT and then SVD. The singular values of the watermark information were embedded in the singular value of the cover medical image. Watermarks were extracted using an extraction algorithm. In order to enhance the robustness performance of the image watermarks, back-propagation neural network was applied to the extracted watermarks to reduce the effects of different noise applied on the watermarked image. Results were obtained by varying the gain factor and the different cover image modalities. Experimental results were provided to illustrate that the proposed method is able to withstand a variety of signal processing attacks, and has been found to give excellent performance in terms of robustness and imperceptibility. The performance of the method was also compared with other reported techniques. Further, the visual quality of the proposed method was also evaluated by a subjective method.

Acknowledgments

The authors are sincerely thankful to the anonymous reviewers for their critical comments and suggestions to improve the quality of the paper.

Bibliography

[1] M. Agbaje, O. Awodele and C. Ogbonna, Applications of digital watermarking to cyber security (cyber watermarking), in: Proceedings of Informing Science & IT Education Conference (InSITE), Florida, USA, pp. 1–11, 2015.10.28945/2138Search in Google Scholar

[2] K. A. Ahmed, H. A. Ahmad and P. Gaydecki, A blind block based DCT watermarking technique for gray level images using one dimensional Walsh coding, in: Current Trends in Information Technology (CTIT), Dubai, pp. 1–6, 2009.10.1109/CTIT.2009.5423140Search in Google Scholar

[3] N. Ahmidi and R. Safabakhsh, A novel DCT-based approach for secure color image watermarking, in: IEEE Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC), Las Vegas, Nevada, USA, vol. 2, pp. 709–713, 2004.10.1109/ITCC.2004.1286738Search in Google Scholar

[4] M. Ali, C. W. Ahn and P. Siarry, Differential evolution algorithm for the selection of optimal scaling factors in image watermarking, Eng. Appl. Artif. Intell.31 (2014), 15–26.10.1016/j.engappai.2013.07.009Search in Google Scholar

[5] V. Aslantas, An optimal robust digital image watermarking based on SVD using differential evolution algorithm, Optics Commun.282 (2009), 769–777.10.1016/j.optcom.2008.11.024Search in Google Scholar

[6] V. Aslantas, A. L. Dogan and S. Ozturk, DWT-SVD based image watermarking using Particle Swarm Optimizer, in: IEEE International Conference on Multimedia and Expo (ICME), Hannover, Germany, 978 1-4244-2571-6/08, pp. 241–244, 2008.Search in Google Scholar

[7] V. Aslantas, S. Ozer and S. Ozturk, Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms, Optics Commun.282 (2009), 2806–2817.10.1016/j.optcom.2009.04.034Search in Google Scholar

[8] M. Barni and F. Bartolini, Improved wavelet-based watermarking through pixel-wise masking, IEEE Trans. Image Process.10 (2001), 783–791.10.1109/83.918570Search in Google Scholar PubMed

[9] W. Bender, D. Gruhl, N. Morimoto and A. Lu, Techniques for data hiding, IBM Syst. J.35 (1996), 313–336.10.1147/sj.353.0313Search in Google Scholar

[10] D. Bowman, http://www.fiercehealthit.com/story/researchers-use-digital-watermarks-protect-medical-images, 2012. Accessed 8 August, 2012.Search in Google Scholar

[11] C. C. Chang, P. Tsai and C. C. Lin, SVD-based digital image watermarking scheme, Pattern Recogn. Lett.26 (2005), 1577–1586.10.1016/j.patrec.2005.01.004Search in Google Scholar

[12] A. Cheddad, J. Condell, K. Curran and P. McKevitt, Digital image steganography: survey and analyses of current methods, Signal Process.90 (2010), 727–752.10.1016/j.sigpro.2009.08.010Search in Google Scholar

[13] K. L. Chung, W. N. Yang, Y. H. Huang, S. T. Wu and Y. C. Hsu, On SVD-based watermarking algorithm, Appl. Math. Comput.188 (2007), 54–57.10.1016/j.amc.2006.09.117Search in Google Scholar

[14] K. Deb, Md. S. Al-Seraj, Md. M. Hoque and Md. I. H. Sarkar, Combined DWT-DCT based digital image watermarking technique for copyright protection, in: International Conference on Electrical and Computer Engineering, Dhaka, Bangladesh, pp. 20–22, 2012.10.1109/ICECE.2012.6471586Search in Google Scholar

[15] Digital Watermarking Alliance, http://www.digitalwatermarkingalliance.org/faqs.asp, Accessed 7 January, 2016.Search in Google Scholar

[16] M. Q. Fan, H. X. Wang and S. K. Li, Restudy on SVD based watermarking scheme, Appl. Math. Comput.203 (2008), 926–930.10.1016/j.amc.2008.05.003Search in Google Scholar

[17] E. Ganic and A. M. Eskicioglu, Robust DWT-SVD domain image watermarking: embedding data in all frequencies, in: Workshop on Multimedia and Security, Magdeburg, Germany, ACM, pp. 166–174, 2004.10.1145/1022431.1022461Search in Google Scholar

[18] J. M. Guo and H. Prasetyo, False-positive-free SVD-based image watermarking, J. Visual Commun. Image Represent.25 (2014), 1149–1163.10.1016/j.jvcir.2014.03.012Search in Google Scholar

[19] M. T. Hagan and M. B. Menhaj, Training feed forward networks with the Marquardt algorithm, IEEE Trans. Neural Netw.5 (1994), 989–993.10.1109/72.329697Search in Google Scholar

[20] R. A. Jacobs, Increased rates of convergence through learning rate adaptation, Neural Netw.1 (1988), 295–308.10.1016/0893-6080(88)90003-2Search in Google Scholar

[21] N. Kashyap and G. R. Sinha, Image watermarking using 3-level discrete wavelet transform (DWT), Int. J. Modern Educ. Comput. Sci. (IJMECS)3 (2012), 50–56.10.5815/ijmecs.2012.03.07Search in Google Scholar

[22] R. Kaur and S. Jindal, Semi-blind image watermarking using high frequency band based on DWT-SVD, in: IEEE 6th International Conference on Emerging Trends in Engineering and Technology (ICETET), Nagpur, India, pp. 19–24, 2013.10.1109/ICETET.2013.5Search in Google Scholar

[23] R. Liu and T. Tan, An SVD-based watermarking scheme for protecting rightful ownership, IEEE Trans. Multimedia4 (2002), pp. 121–128.10.1109/6046.985560Search in Google Scholar

[24] N. M. Makbol, B. E. Khoo and T. H. Rassem, Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics, Image Process.IET10.1 (2016), 34–52.10.1049/iet-ipr.2014.0965Search in Google Scholar

[25] S. C. Mei, R. H. Li, H. M. Dang and Y. K. Wang, Decision of image watermarking strength based on artificial neural-networks, in: Proceedings of the 9th International Conference on Neural Information Processing (ICONIP) Singapore, IEEE, vol. 5, pp. 2430–2434, 2002.Search in Google Scholar

[26] N. Mohananthini and G. Yamuna, Watermarking for images using wavelet domain in Back-Propagation neural network, in: Advances in Engineering, Science and Management, pp. 100–105, 2012.Search in Google Scholar

[27] A. R. N. Nilchi and T. Ayoub, A new robust digital image watermarking technique based on the discrete cosine transformation and neural network, in: International Symposium on Biometrics and Security Technologies, Islamabad, pp. 1–7, 2008.Search in Google Scholar

[28] Y. Niu, X. Cui, Q. Li and J. Ding, A SVD-based color image watermark algorithm in DWT domain, in: Advanced Graphic Communications, Packaging Technology and Materials, pp. 303–309, 2016.10.1007/978-981-10-0072-0_39Search in Google Scholar

[29] M. Ollove, www.usatoday.com/story/.../stateline-identity-thefts-medical.../5279351, 2014, Accessed 7 February, 2014.Search in Google Scholar

[30] R. Pandey, A. K. Singh, B. Kumar and A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology, Multimed. Tools Appl. (2016), DOI: 10.1007/s11042-016-3536-6.Search in Google Scholar

[31] P. Parashar and R. K. Singh, A survey: digital image watermarking techniques, Int. J. Signal Process. Image Process. Pattern Recognit.7 (2014), 111–124.10.14257/ijsip.2014.7.6.10Search in Google Scholar

[32] V. M. Potdar, S. Han and E. Chang, A survey of digital image watermarking techniques, in: ‘INDIN 05’ Industrial Informatics, 3rd IEEE International Conference, Vienna, Austria, pp. 709–716, 2005.Search in Google Scholar

[33] N. Provos and P. Honeyman, Hide and seek: an introduction to steganography, IEEE Security Privacy99 (2003), 32–44.10.1109/MSECP.2003.1203220Search in Google Scholar

[34] D. E. Rumelhart, G. E. Hinton and R. J. Williams, Learning internal representations by error propagation, in: Parallel Data Processing, D. Rumelhart, J. McClelland, eds., vol. 1, pp. 318–362, chapter 8, MIT Press, Cambridge, 1986.10.21236/ADA164453Search in Google Scholar

[35] S. Shrestha, Hybrid DWT-DCT algorithm for image and video compression applications, Master Thesis, Department of Electrical and Computer Engineering University of Saskatchewan Saskatoon, Saskatchewan, Canada, 2010.10.1109/ISSPA.2010.5605474Search in Google Scholar

[36] A. K. Singh, Improved hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimed. Tools Appl. (2016), 10.1007/s11042-016-3514-z.10.1007/s11042-016-3514-zSearch in Google Scholar

[37] R. Singh, Digital image watermarking: an overview, Int. J. Res.2 (2015), 1087–1094.Search in Google Scholar

[38] P. Singh and R. S. Chadha, A survey of digital watermarking techniques, applications and attacks, Int. J. Eng. Innov. Technol.2 (2013), 165–175.Search in Google Scholar

[39] A. K. Singh, M. Dave and A. Mohan, Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain, Natl. Acad. Sci. Lett.37 (2014), 351–358.10.1007/s40009-014-0241-8Search in Google Scholar

[40] A. K. Singh, M. Dave and A. Mohan, Hybrid technique for robust and imperceptible multiple watermarking using medical images, J. Multimed. Tools Appl.75 (2015), 8381–8401.10.1007/s11042-015-2754-7Search in Google Scholar

[41] A. K. Singh, M. Dave and A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain, Wireless Personal Commun.83 (2015), 2133–2150.10.1007/s11277-015-2505-0Search in Google Scholar

[42] A. K. Singh, B. Kumar, M. Dave and A. Mohan, Multiple watermarking on medical images using selective DWT coefficients, J. Med. Imaging Health Inform.5 (2015), 607–614.10.1166/jmihi.2015.1432Search in Google Scholar

[43] A. K. Singh, M. Dave and A. Mohan, Hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimed. Tools Appl.75 (2016), 8381–8401.10.1007/s11042-015-2754-7Search in Google Scholar

[44] T. S. Tagare and S. Kuri, Digital image watermarking – an overview, Int. J. Comput. Sci. Inform. Eng. Technol.3 (2013), 2277–4408.Search in Google Scholar

[45] M. Terry, Medical identity theft and telemedicine security, Telemed. e-Health15 (2009), 928–932.10.1089/tmj.2009.9932Search in Google Scholar

[46] M. Vafaei, H. Mahdavi-Nasab and H. Pourghassem, A new robust blind watermarking method based on neural networks in wavelet transform domain, World Appl. Sci. J.22 (2013), 1572–1580.Search in Google Scholar

[47] T. P. Vogl, J. K. Mangis, A. K. Zigler, W. T. Zink and D. L. Alkon, Accelerating the convergence of the backpropagation method, Biol. Cybern.59 (1998), 256–264.Search in Google Scholar

[48] Q. T. Yang, T. G. Gao and L. Fan, A novel robust watermarking scheme based on neural network, in: International Conference on Intelligent Computing and Integrated Systems (ICISS), Guilin, China, IEEE, pp. 71–75, 2010.Search in Google Scholar

[49] C. T. Yen and Y. J. Huang, Frequency domain digital watermark recognition using image code sequences with a back-propagation neural network, Multimed. Tools Appl.75 (2016), 9745–9755.10.1007/s11042-015-2718-ySearch in Google Scholar

[50] P. T. Yu, H. H. Tsai and J. S. Lin, Digital watermarking based on neural networks for color images, Signal Process.81 (2001), 663–671.10.1016/S0165-1684(00)00239-5Search in Google Scholar

[51] A. Zear, A. K. Singh and P. Kumar, Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications, A Special Issue on Recent Trends in Security of Mobile Cloud Computing and the Internet of Things, Int. J. Inform. Comput. Security, InderScience (2016), http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijics. Accessed 9 August, 2016.Search in Google Scholar

[52] W. Zhicheng, L. Hao, D. Jufeng and W. Sashuang, Image watermarking based on genetic algorithm, in: IEEE International Conference on Multimedia and Expo, ICME 1-4244-0367-7/06, Toronto, ON, Canada, pp. 1117–1120, 2006.Search in Google Scholar

Received: 2016-04-13
Published Online: 2016-09-23
Published in Print: 2018-01-26

©2018 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 23.4.2024 from https://www.degruyter.com/document/doi/10.1515/jisys-2016-0036/html
Scroll to top button