Reference Hub4
Multiple Blind Watermarking Framework for Security and Integrity of Medical Images in E-Health Applications

Multiple Blind Watermarking Framework for Security and Integrity of Medical Images in E-Health Applications

Abdallah Soualmi, Adel Alti, Lamri Laouamer
Copyright: © 2021 |Volume: 11 |Issue: 1 |Pages: 16
ISSN: 2155-6997|EISSN: 2155-6989|EISBN13: 9781799862024|DOI: 10.4018/IJCVIP.2021010101
Cite Article Cite Article

MLA

Soualmi, Abdallah, et al. "Multiple Blind Watermarking Framework for Security and Integrity of Medical Images in E-Health Applications." IJCVIP vol.11, no.1 2021: pp.1-16. http://doi.org/10.4018/IJCVIP.2021010101

APA

Soualmi, A., Alti, A., & Laouamer, L. (2021). Multiple Blind Watermarking Framework for Security and Integrity of Medical Images in E-Health Applications. International Journal of Computer Vision and Image Processing (IJCVIP), 11(1), 1-16. http://doi.org/10.4018/IJCVIP.2021010101

Chicago

Soualmi, Abdallah, Adel Alti, and Lamri Laouamer. "Multiple Blind Watermarking Framework for Security and Integrity of Medical Images in E-Health Applications," International Journal of Computer Vision and Image Processing (IJCVIP) 11, no.1: 1-16. http://doi.org/10.4018/IJCVIP.2021010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Nowadays, e-health applications carry the most advanced information and communication technologies for ensuring quality, remote healthcare services, and support diagnostics. These applications are sharing and transmitting of medical data over the internet, which makes them serious targets for alteration and illegal access. Image watermarking presents a compelling solution for protecting patient's information and ensures medical image integrity. This paper gives a new secure framework to protect medical data based on blind multiple watermarking schemes. The proposed approach consists of combining LWT (lifting wavelet transform), QR decomposition, and Arnold chaotic map in transform domain for the first watermark, while for the second watermark is encrusted in the spatial domain. During the de-watermarking process, both extracted watermarks are compared to detect any alterations during transmitting. The experimentation results demonstrate that the suggested method achieves good image fidelity and alters detection and robustness contra different kinds of attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.