Skip to main content
Log in

Robust and Secure Multiple Watermarking for Medical Images

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper presents a robust and secure region of interest and non-region of interest based watermarking method for medical images. The proposed method applies the combination of discrete wavelet transform and discrete cosine transforms on the cover medical image for the embedding of image and electronic patient records (EPR) watermark simultaneously. The embedding of multiple watermarks at the same time provides extra level of security and important for the patient identity verification purpose. Further, security of the image and EPR watermarks is enhancing by using message-digest (MD5) hash algorithm and Rivest–Shamir–Adleman respectively before embedding into the medical cover image. In addition, Hamming error correction code is applying on the encrypted EPR watermark to enhance the robustness and reduce the possibility bit error rates which may result into wrong diagnosis in medical environments. The robustness of the method is also extensively examined for known attacks such as salt & pepper, Gaussian, speckle, JPEG compression, filtering, histogram equalization. The method is found to be robust for hidden watermark at acceptable quality of the watermarked image. Therefore, the hybrid method is suitable for avoidance of the patient identity theft/alteration/modification and secure medical document dissemination over the open channel for medical applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Matheson, L. R., Mitchell, S. G., Shamoon, T. G., Tarjan, R. E., & Zane, F. (1998). Robustness and security of digital watermarks. Financial Cryptography, 1465, 227–240.

    Article  Google Scholar 

  2. Coatrieux, G., Lecornu, L., Roux, Ch., & Sankur, B. (2006). A review of image watermarking applications in healthcare. In Proceedings of the 28th annual international conference engineering in medicine and biology society, EMBS’06, IEEE, New York (pp. 4691–4694).

  3. Mohanty, S. P. (2000). Digital watermarking: A tutorial review. Report, IISc. Bangalore, India.

  4. Coatrieux, G., Maitre, H., Sankur, B., Rolland, Y., & Collorec, R. (2000). Relevance of watermarking in medical imaging. In Proceedings of IEEE conference on information technology applications in biomedicine, Arlington, USA (pp. 250–255).

  5. Moumen, C., & Benslama, M. (2012). Cyrptography of medical images. In Proceedings of the progress in electromagnetics research symposium, Kuala Lumpur, March 2730 (pp. 42–48).

  6. Chao, H. M., Hsu, C. M., & Miaou, S. G. (2002). A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Transactions on Information Technology in Biomedicine, 6(1), 46–53.

    Article  Google Scholar 

  7. Annamalai, U., & Thanushkodi, K. (2013). Medical image authentication with enhanced watermarking technique through visual cryptography. Journal of Theoretical and Applied Information Technology, 57(3), 484–494.

    Google Scholar 

  8. Singh, A. K., Dave, M., & Mohan, A. (2015). Robust and secure multiple watermarking in wavelet domain. A special issue on advanced signal processing technologies and systems for healthcare applications. Journal of Medical Imaging and Health Informatics, 5(2), 406–414.

    Article  Google Scholar 

  9. Rey, C., & Dugelay, J. L. (2002). A survey of watermarking algorithm for image authentication. EURASIP Journal on Applied Signal Processing, 6, 613–621.

    Article  MATH  Google Scholar 

  10. Mousavi, S. M., Naghsh, A., & Abu-Bakar, S. A. R. (2014). Watermarking techniques used in medical images: A survey. Journal of Digital Imaging, 27(6), 714–729.

    Article  Google Scholar 

  11. Singh, A. K., Kumar, B., Dave, M., & Mohan, A. (2015). Robust and imperceptible dual watermarking for telemedicine applications. Wireless Personal Communications, 80(4), 1415–1433.

    Article  Google Scholar 

  12. Singh, A. K., Dave, M., & Mohan, A. (2014). Wavelet based image watermarking: futuristic concepts in information security. Proceedings of the National Academy of Sciences, India, Section A: Physical Sciences, 84(3), 345–359.

    Article  Google Scholar 

  13. Zhang, L., & Zhou, P. P. (2010). Localized affine transform resistant watermarking in region-of-interest. Telecommunication Systems, 44(3), 205–220.

    Article  Google Scholar 

  14. Yang, C. Y., & Hu, W. C. (2010). Reversible data hiding in the spatial and frequency domains. International Journal of Image Processing, 3(6), 373–382.

    Google Scholar 

  15. Zain, J., & Clarke, M. (2005). Security in telemedicine: Issue in watermarking medical images. In Proceedings of 3rd international conference on science of electronic, technologies of information and telecommunications, Tunisia, March 27–31, 2005.

  16. Memon, N. A., & Gilani, S. A. M. (2008). NROI watermarking of medical images for content authentication. In Proceedings of 12th IEEE international multitopic conference, Karachi, Pakistan (pp. 106–110).

  17. Navas, K. A., Thampy, S. A., & Sasikumar, M. (2008). EPR hiding in medical images for telemedicine. In Proceedings of the world academy of science, engineering and technology, Rome (pp. 292–295).

  18. Singh, A. K., Kumar, B., Dave, M., & Mohan, A. (2015). Multiple watermarking on medical images using selective DWT coefficients. Journal of Medical Imaging and Health Informatics, 5(3), 607–614.

    Article  Google Scholar 

  19. Paar, C., & Pelzl, J. (2009). Understanding cryptography: A textbook for students and practitioners (3rd ed., pp. 29–53). New York: Springer.

    MATH  Google Scholar 

  20. Bouslimi, D., Coatrieux, G., Cozic, M., & Roux, C. (2012). A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Transactions on Information Technology in Biomedicine, 16(5), 891–899.

    Article  Google Scholar 

  21. Wong, P. W., & Memon, N. (2001). Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 10(10), 1593–1601.

    MATH  Google Scholar 

  22. Liew, S. C., Liew, S. W., & Zain, J. M. (2010). Reversible medical image watermarking for tamper detection and recovery with run length encoding compression. Proceedings of the World Academy of Science, Engineering and Technology, 4, 12–29.

    Google Scholar 

  23. Nakhaie, A. A., & Shokouhi, S. B. (2011). No reference medical image quality measurement based on spread spectrum and discrete wavelet transform using ROI processing. In Proceedings of the 24th Canadian conference on electrical and computer engineering, Niagara Falls (pp. 121–125), 8–11 May 2011.

  24. Rodriguez-Colin, R., Claudia, F.-U., Trinidad-Blas, G. D. J. (2007). Data hiding scheme for medical images. In Proceedings of the 17th international conference on electronics, communications and computers, Cholula, Puebla (pp. 32–37), 26–28 February 2007.

  25. Kaur, R. (2013). A medical image watermarking technique for embedding EPR and its quality assessment using no-reference metrics. International Journal of Information Technology and computer Science, 02, 73–79.

    Article  Google Scholar 

  26. Kannammal, A., & Rani, S. S. (2014). Two level security for medical images using watermarking/encryption algorithms. International Journal of imaging system and technology, 24(1), 111–120.

    Article  Google Scholar 

  27. Al-Haj, A., & Alaa’Amer, (2014). Secured telemedicine using region-based watermarking with tamper localization. Journal of Digital Imaging, 27(6), 737–750.

    Article  Google Scholar 

  28. Pandey, R., Singh, A. K., Kumar, B., & Mohan, A. (2016). Iris based secure NROI multiple eye image watermarking for teleophthalmology. Multimedia Tools and Applications. doi:10.1007/s11042-016-3536-6.

    Google Scholar 

  29. Sasaki, Y. (2011). Collisions of MMO-MD5 and their impact on original MD5. Progress in Cryptology—AFRICACRYPT 2011 (Vol. 6737, pp. 117–133).

  30. Sasaki, Y., & Aoki, K. (2008). Preimage attacks on step-reduced MD5. Information Security and Privacy, 5107, 282–296.

    MATH  Google Scholar 

  31. Munuera, C. (2015). Hamming codes for wet paper steganography. Designs, Codes and Cryptography, 76(1), 101–111.

    Article  MathSciNet  MATH  Google Scholar 

  32. Lien, B. K., Chen, S. K., Wang, W. S., & King, K. P. (2015). Dispersed data hiding using hamming code with recovery capability. Genetic and Evolutionary Computing, 329, 179–187.

    Google Scholar 

  33. http://www.bangahospitals.com/mandav_hospital.php.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, A., Singh, A.K. & Ghrera, S.P. Robust and Secure Multiple Watermarking for Medical Images. Wireless Pers Commun 92, 1611–1624 (2017). https://doi.org/10.1007/s11277-016-3625-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3625-x

Keywords

Navigation