Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 10, pp 12647–12661 | Cite as

Combining Mexican hat wavelet and spread spectrum for adaptive watermarking and its statistical detection using medical images

  • D. S. Chauhan
  • A. K. SinghEmail author
  • A. Adarsh
  • B. Kumar
  • J. P. Saini
Article

Abstract

This paper present a secure medical image watermarking technique applying spread-spectrum concept in wavelet transform domain is proposed. In the first step, discrete wavelet transform(DWT) decomposes the cover medical image into four frequency sub-bands using Mexican hat as mother wavelet and then corresponding to each pixel of the binary watermark a pair of Pseudo-Noise (PN) is embedded into a horizontal (HL) and a vertical (LH) sub-band. In order to maintain the imperceptibility of the watermarked image, strength of the generated PN sequence pair is adjusted according to specified document to watermark ratio (DWR). For the extraction the watermark, statistical profile of DWT coefficients of watermarked image is determined and the obtained probability distribution function (pdf) is utilized for designing the watermark detection procedure. Proposed detector considers the best fitted Cauchy statistical model of heavy-tailed family, which accurately models the non-Gaussian DWT coefficients of an image. The robustness of the method is examined for various kinds of attacks with varying watermark to document ratio. Further, experimental results show that the proposed technique offer more robustness than other state-of-the-art method.

Keywords

DWT Spread-spectrum Probability distribution function Cauchy statistical model Medical image LRT WDR PSNR NC 

Notes

Acknowledgments

The Author’s are sincerely thankful to the potential/ anonymous reviewer’s for their critical comments and suggestions to improve the quality of the paper.

References

  1. 1.
    Agung BW Tjokorda, Adiwijaya, Permana FP (2012) Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression. In: Proc. of  the 2012 International Conference on Communication, Networks and Satellite, Bali, pp. 167–171Google Scholar
  2. 2.
    Al-Haj A, Amer A (2014) Secured telemedicine using region-basedwatermarking with tamper localization. J Digit Imaging 2(6):737–750CrossRefGoogle Scholar
  3. 3.
    Al-Qershi OM, Khoo BE (2010) ROI–based tamper detection and recovery for medical images using reversible watermarking technique. In: Proc of the IEEE International Conference on Information Theory and Information Security, Beijing, pp 151–155Google Scholar
  4. 4.
    Alsaade FW (2016) Watermarking system for the security of medical image databases used in telemedicine. Res J Inf Technol 8(3):88–97Google Scholar
  5. 5.
    Badshah G, Liew SC, Zain JM, Ali M (2016) Watermarking of ultrasound medical images in teleradiology using compressed watermark. Journal of Medical Imaging (Bellingham) 3(1):216–225Google Scholar
  6. 6.
    Balakrishnan N, Voinov V, Nikulin MS (2013) Chi-squared goodness of fit tests with applications. First Edition, Academic PressGoogle Scholar
  7. 7.
    Briassouli A, Tsakalides P, Stouraiti A (2005) Hidden messages in heavy-tails: DCT-domain Watermarkdetection using alpha-stable models. IEEE Trans Multimedia 7(4):700–715CrossRefGoogle Scholar
  8. 8.
    Chauhan DS, Singh AK, Kumar B, Saini JP (2017) Quantization based multiple medical information watermarking for secure e-health, multimedia tools and applications, pp 1–13.  https://doi.org/10.1007/s11042-017-4886-4
  9. 9.
    Eggers JJ, Girod B (2001) Quantization effects on digital watermarks. Signal Proc 81(2):239–263Google Scholar
  10. 10.
    Eswaraiah R, Reddy ES (2014) A fragile ROI-based medical image watermarking technique with tamper detection and recovery. In: Proc. of 2014 fourth international conference on communication systems and network technologies, Bhopal, pp 896–899Google Scholar
  11. 11.
    Eswaraiah R, Reddy ES (2015) Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Process 9(8):615–625CrossRefGoogle Scholar
  12. 12.
    Giakoumaki A, Perakis K, Tagaris A, Koutsouris D (2006) Digital watermarking in telemedicine applications-towards enhanced data security and accessibility. In: Proc. of the 28th annual international Conference of the IEEE Engineering in Medicine and Biology Society, New York City, USA, pp 6328–6331Google Scholar
  13. 13.
    Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Secure and efficient health data management throughmultiple watermarking on medical images. Med Biol Eng Comput 44(8):619–631Google Scholar
  14. 14.
    Hajjaji MA, El-Bay B, Abdelali AB, Mtibaa A (2014) Combining Haar wavelet and Karhunen Loevetransforms for medical images watermarking. Biomed Res Int 2014:1–15, Article ID 313078Google Scholar
  15. 15.
    Kannammal A, Subha Rani S (2014) Two level security for medical imagesusing watermarking/encryption algorithms. Int J Imaging Syst Technol 24(1):111–120CrossRefGoogle Scholar
  16. 16.
    Kaur L, Chauhan RC, Saxena SC (2005) Space- frequency quantiser design for ultrasound image compression based on minimum description length criterion. Med Biol Eng Comput 43(1):33–39CrossRefGoogle Scholar
  17. 17.
    Kumar B, Singh SP, Mohan A, Anand A, Singh HV (2009) Statistical modelling of wavelet coefficients of ct scan image. In: Proc. of the International Conference on Emerging Trends in Electronic and Photonic Devices & Systems, Varanasi, India, pp 162–165Google Scholar
  18. 18.
    Kumar B, Singh HV, Singh SP, Mohan A (2011) Secure spread-spectrum watermarking for telemedicine applications. J Inf Secur 2(2):91–98Google Scholar
  19. 19.
    Kundu MK, Das S (2010) Lossless ROI medical image watermarking technique with enhanced security andhigh payload embedding. In: Proc. of the 20th International Conference On Pattern Recognition (ICPR), Istanbul, Turkey, pp 1457–1460Google Scholar
  20. 20.
    Kwitt R, Meerwald P, Uhl A (2008) A lightweight Rao-Cauchy detector for additive watermarking in the DWT-domain. In: Proc. of the 10th ACM workshop on multimedia and security, Oxford, UK, pp 33–41 Google Scholar
  21. 21.
    Kwitt R, Meerwaldand P, Uhl A (2009) Efficient detection of additive watermarking in the DWT-domain. In: Proc. of the 17th European signal processing conference, Glasgow, UK, pp 2072–2076Google Scholar
  22. 22.
    Lam EY (2004) Statistical modelling of the wavelet coefficients with different bases and decomposition levels. IEE Proceedings - Vision, Image and Signal Processing 151(3):203–206CrossRefGoogle Scholar
  23. 23.
    Masek J, Burget R, Karasek J, Uher V, Guney S (2013) Evolutionary improved object detector for ultrasound images. In: 36th International Conference on Telecommunications and Signal processing, Italy, pp 586–590Google Scholar
  24. 24.
    MedPix™Medical Image Database available at http://rad.usuhs.mil/medpix/medpix.html
  25. 25.
    Pandey R, Singh AK, Kumar B, Mohan A (2016) Iris based secure NROI multiple eye image watermarkingfor Teleophthalmology. Multimed Tools Appl 75(22):14381–14397CrossRefGoogle Scholar
  26. 26.
    Pavelin A, Klapan I, Kovac M, Katic M, Stevanovic R, Rakic M, Klapan N (2006) A Functional telemedicine environment in the framework of the Croatian healthcare information system. In: Remote Cardiology Consultations Using Advanced Medical Technology Vol. 372, IOS press, pp 79–93Google Scholar
  27. 27.
    Priya S, Santhi B, Swaminathan P (2014) Study on medical image watermarkingTechniques. J Appl Sci 14(14):1638–1642CrossRefGoogle Scholar
  28. 28.
    Priyanka, Maheshkar S (2017) Region-based hybrid medical image watermarking for secure telemedicine applications. Multimed Tools Appl 76(3):3617–3647CrossRefGoogle Scholar
  29. 29.
    Rahman SMM, Ahmad MQ, Swamy MNS (2009) A new statistical detector for DWT-based additive image watermarking using the gauss–Hermite expansion. IEEE Trans Image Process 18(8):1782–1796MathSciNetCrossRefzbMATHGoogle Scholar
  30. 30.
    Rocek A, Slavicek K, Dostal O, Javornik M (2016) A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility. Biomed Signal Process Control 29:44–52CrossRefGoogle Scholar
  31. 31.
    Sharma A, Singh AK, Ghrera SP (2016) Robust and secure multiple watermarking technique for medical images. Wirel Pers Commun 92(4):1611–1624CrossRefGoogle Scholar
  32. 32.
    Singh AK, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarkingusing medical images. Multimed Tools Appl 75(14):8381–8401CrossRefGoogle Scholar
  33. 33.
    Singh AK, Dave M, Mohan A (2015) Robust and secure multiple watermarking in wavelet domain. Journal of Medical Imaging and Health Informatics 5(2):406–414CrossRefGoogle Scholar
  34. 34.
    Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-Spectrum in DWT domain. Wirel Pers Commun 83(3):2133–2150CrossRefGoogle Scholar
  35. 35.
    Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective DWT coefficients. Journal of Medical Imaging and Health Informatics 5(3):607–614CrossRefGoogle Scholar
  36. 36.
    Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible spread-Spectrum watermarking for telemedicine applications. Proc Natl Acad Sci, India, Sect A 85(2):295–301CrossRefGoogle Scholar
  37. 37.
    Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Futur Gener Comput Syst:1–16.  https://doi.org/10.1016/j.future.2016.11.023
  38. 38.
    Singh AK, Kumar B, Singh G, Mohan A (2017) Medical image watermarking: techniques and applications, book series on multimedia systems and applications, Springer, USA, ISBN: 978-3319576985Google Scholar
  39. 39.
    Zear A, Singh AK, Kumar P (2016) Multiple watermarking for healthcare applications. J Intell Syst.  https://doi.org/10.1515/jisys-2016-0036

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  • D. S. Chauhan
    • 1
  • A. K. Singh
    • 2
    Email author
  • A. Adarsh
    • 3
  • B. Kumar
    • 3
  • J. P. Saini
    • 4
  1. 1.Department of Electronics & Communication EngineeringFeroze Gandhi Institute of Engineering & TechnologyRaebareliIndia
  2. 2.Department of Computer Sc. & EngineeringJaypee University of Information TechnologyWaknaghat, SolanIndia
  3. 3.Department of Electronics & Communication EngineeringMotilal Nehru National Institute of TechnologyAllahabadIndia
  4. 4.Department of Electronics EngineeringBundelkhand Institute of Engineering & TechnologyJhansiIndia

Personalised recommendations