Skip to main content
Log in

Iris based secure NROI multiple eye image watermarking for teleophthalmology

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a new secure multiple text and image watermarking scheme on cover eye image using fusion of discrete wavelet transforms (DWT) and singular value decomposition (SVD) for Teleophthalmology. Secure Hash Algorithm (SHA-512) is used for generating hash corresponding to iris part of the cover digital eye image and this unique hash parameter is used for enhancing the security feature of the proposed watermarking technique. Simultaneous embedding of four different watermarks (i.e. Signature, index, caption and reference watermark) in form of image and text using fusion of discrete wavelet transforms (DWT) and singular value decomposition (SVD) is achieved in this paper. The suggested technique initially divides the digital eye image into Region of interest (ROI) containing iris and Non-Region of interest (NROI) part where the text and image watermarks are embedded into the Non-Region of interest (NROI) part of the DWT cover image. The selection of DWT decomposition level for embedding the text and image watermarks depends on size, different characteristics and robustness requirements of medical watermark. The performance in terms of Normalized Correlation (NC) and bit error rate (BER) of the developed scheme is evaluated and analyzed against known signal processing attacks and ‘Checkmark’ attacks. The method is found to be robust against all the considered attacks. The proposed multilevel watermarking method correctly extracts the embedded watermarks without error and is robust against the all considered attacks without significant degradation of the medical image quality of the watermarked image. Therefore the proposed method may find potential application in secure and compact medical data transmission for teleophthalmology applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Aggeliki G, Pavlopoulos S, Koutsouris D (2006) Secure and efficient health data management through multiple watermarking on medical images. Med Biol Eng Comput 44(8):619–631

    Article  Google Scholar 

  2. Ahmed F, Siyal MY, Abbas VU (2010) A secure and robust hash-based scheme for image authentication. Signal Process 90(5):1456–1470

    Article  MATH  Google Scholar 

  3. Al-Haj A, Amer A (2014) Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 27(6):737–750

  4. Badshah G, Liew S-C, Zain JM, Ali M (2015) Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique, J Digit Imaging:1–10

  5. Bouslimi D, Coatrieux G, Cozic M, Roux C (2012) A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Trans Inf Technol Biomed 16:891–899

    Article  Google Scholar 

  6. Das S, Kundu MK (2013) Effective management of medical information through ROI-lossless fragile image watermarking technique”. Comput Methods Prog Biomed 111(3):662–675

    Article  MathSciNet  Google Scholar 

  7. Dhanalakshmi R, Thaiyalnayaki K (2010) Dual watermarking scheme with encryption. Int J Comput Sci Inf Secur 7(1):248–253

    Google Scholar 

  8. Eswaraiah R, Sreenivasa Reddy E (2014) Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl 2014(2014):1–10

  9. Gunjal BL, Mali SN (2012) ROI based embedded watermarking of medical images for secured communication in telemedicine”. Int J Comput Commun Eng 6(48):293–298

    Google Scholar 

  10. Guo J-M, Prasetyo H (2014) False-positive-free SVD-based image watermarking. Journal of Visual Communication and Image Representation 25(5):1149–1163

    Article  Google Scholar 

  11. Hajjaji MA, Bourennane E-B, Abdelali AB, Mtibaa A (2014) Combining Haar wavelet and Karhunen Loeve transforms for medical images watermarking. BioMed Res Int 2014:1-15

  12. Jianfeng L, Meng W, Junping D, Qianru H, Li L, Chin-Chen C (2015) Multiple watermark scheme based on DWT-DCT quantization for medical images. J Inf Hiding Multimedia Signal Process Ubiquit Int 6(3):458–472

    Google Scholar 

  13. Kahate A (2013) Cryptography and network security, TMH 2nd edition. Mcgraw Hill Education, India

  14. Kannammal A, Subha Rani S (2014) Two Level Security for Medical Images Using Watermarking/Encryption Algorithms. Int J Imaging Syst Technol 24:111–120

    Article  Google Scholar 

  15. Kundu MK, Das S (2010). Lossless ROI medical image watermarking technique with enhanced security and high payload embedding. 20th International Conference on Pattern Recognition (ICPR), Istanbul, Turkey, pp. 1457–1460, August 2010

  16. Lai C-C, Tsai C-C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063

    Article  Google Scholar 

  17. Lin W-H, Horng S-J, Kao T-W, Fan P, Lee C-L, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746–757

    Article  Google Scholar 

  18. Lin W-H, Wang Y-R, Horng S-J, Kao T-W, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11509–11516

    Article  Google Scholar 

  19. Lin W-H, Wang Y-R, Horng S-J (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36(6):9869–9878

    Article  Google Scholar 

  20. Mahajan LH, Patil SA (2013) Image watermarking scheme using SVD. Int J Adv Res Sci Eng 2(6):69–77

    Google Scholar 

  21. Memon NA, Gilani SAM (2008) NROI watermarking of medical images for content authentication, In: Proceedings of 12th IEEE international multi topic conference, Karachi, Pakistan, pp. 106–110, 2008

  22. Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714–729

    Article  Google Scholar 

  23. Paar C, Pelzl J (2009) Understanding cryptography: a textbook for students and practitioners,3rd edition, Springer, pp.29-53

  24. Pal K, Ghosh G, Bhattacharya M (2012) Biomedical image watermarking in wavelet domain for data integrity using bit majority algorithm and multiple copies of hidden information. Am J Biomed Eng 2(2):29–37

    Article  Google Scholar 

  25. Pal K, Mankar VH, Das TS, Sarkar SK (2010) Contour detection and recovery through bio-medical watermarking for telediagnosis. Int J Tomogr Simul™ 14(S10):109–119

    Google Scholar 

  26. PC Su, Wang HJ, Kuo CCJ (1999) Digital image watermarking in regions of interest, Proceedings of 1999 PICS 52nd annual conference Savannah, Georgia, pp. 295–300, 1999

  27. Pereira S, Voloshynovskiy S, Madueño M, Marchand-Maillet S, Pun T (2001) Second generation benchmarking and application oriented evaluation, In information hiding workshop III, Pittsburgh, PA, USA, pp. 340–353, 2001

  28. Rey C, Dugelay JL (2002) A survey of watermarking algorithm for image authentication. EURASIP J Appl Signal Process 2002(1):613–621

    Article  MATH  Google Scholar 

  29. Singh AK (2015) Some new techniques of improved wavelet domain watermarking for medical images, PhD Thesis, National Institute of Technology Kurukshetra, Haryana, India, 2015

  30. Singh AK, Dave M, Mohan A (2014) Wavelet based image watermarking: futuristic concepts in information security. Proc Natl Acad Sci India Sect A: Phys Sci 84(3):345–359

    Article  Google Scholar 

  31. Singh AK, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. J Multimedia Tools Appl. doi:10.1007/s11042-015-2754-7

  32. Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wirel Pers Commun: Int J 83(3):2133–2150

    Article  Google Scholar 

  33. Singh AK, Dave M, Mohan A (2015) Robust and secure multiple watermarking in wavelet domain, a special issue on Advanced Signal Processing Technologies and Systems for Healthcare Applications(ASPTSHA). J Med Imaging Health Inform 5(2):406–414

    Article  Google Scholar 

  34. Singh AK, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective DWT coefficients. J Med Imaging Health Inform 5(3):607–614

  35. Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415–1433

    Article  Google Scholar 

  36. Wong PW, Memon N (2001) Secret and public key image watermarking scheme for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601

    Article  MATH  Google Scholar 

  37. Yang C-Y, Hu W-C (2010) Reversible data hiding in the spatial and frequency domains. Int J Image Process 3(6):373–384

    Google Scholar 

  38. Zain J, Clarke M (2005) Security in telemedicine: issue in watermarking medical images. In: Proceedings of 3rd International conference on science of electronic, technologies of information and telecommunications, TUNISIA, March 27–31, 2005

  39. Zain JM, Clarke M (2007) Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. Int J ComputSci Netw Secur 7(9):19–28

    Google Scholar 

  40. Zhang L, Zhou P-P (2010) Localized affine transform resistant watermarking in region-of-interest. Telecommun Syst 44(3):205–220

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pandey, R., Singh, A.K., Kumar, B. et al. Iris based secure NROI multiple eye image watermarking for teleophthalmology. Multimed Tools Appl 75, 14381–14397 (2016). https://doi.org/10.1007/s11042-016-3536-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3536-6

Keywords

Navigation