Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 3, pp 3457–3470 | Cite as

Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications

  • Sriti Thakur
  • Amit Kumar SinghEmail author
  • Satya Prakash Ghrera
  • Mohamed Elhoseny
Article

Abstract

In this paper, we present a robust and secure watermarking approach using transform domain techniques for tele-health applications. The patient report/identity is embedding into the host medical image for the purpose of authentication, annotation and identification. For better confidentiality, we apply the chaos based encryption algorithm on watermarked image in a less complex manner. Experimental results clearly indicated that the proposed technique is highly robust and sufficient secure for various forms of attacks without any significant distortions between watermarked and cover image. Further, the performance evaluation of our method is found better to existing state-of-the-art watermarking techniques under consideration. Furthermore, quality analysis of the watermarked image is estimated by subjective measure which is beneficial in quality driven healthcare industry.

Keywords

DWT DCT SVD Chaos Robustness 

Notes

Acknowledgments

The authors thank the anonymous reviewers for helpful and constructive comments that greatly contributed to improving this article.

References

  1. 1.
    Abd El-Samie FE, Ahmed HEH, Elashry IF, Shahieen MH, Faragallah OS, El-Rabaie ESM, Alshebeili SA (2013) Image encryption: a communication perspective. CRC Press, Boca RatonCrossRefGoogle Scholar
  2. 2.
    AK Singh M, Dave AM (2015) Robust and secure multiple watermarking in wavelet domain. Journal of Medical Imaging and Health Informatics 5(2):406–414CrossRefGoogle Scholar
  3. 3.
    AK Singh B, Kumar MD, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5(3):607–614CrossRefGoogle Scholar
  4. 4.
    AK Singh BK, Singh SK, Dave M, VK Singh PK, Ghrera SP, PK Gupta AM (2017) Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications. Multimedia Tools and Applications 76(5):7563–7573CrossRefGoogle Scholar
  5. 5.
    Al-Haj A (2014) Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 27(6):737–750CrossRefGoogle Scholar
  6. 6.
    Al-Haj A, Mohammad A (2017) Crypto-Watermarking of Transmitted Medical Images. J Digit Imaging 30(1):26–38CrossRefGoogle Scholar
  7. 7.
    Bakthula R, Shivani S, Agarwal S (2018) Self authenticating medical X-ray images for telemedicine applications. Multimedia Tools and Applications 77(7):8375–8392CrossRefGoogle Scholar
  8. 8.
    Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470CrossRefGoogle Scholar
  9. 9.
    Chauhan DS, Singh AK, Kumar B, JP Saini (2017) Quantization based multiple medical information watermarking for secure e-Health. Multimedia Tools and Applications, pp. 1–13Google Scholar
  10. 10.
    Dhole VS, Patil NN (2015) Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks. In: Proc. International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 752–757Google Scholar
  11. 11.
    El’Arbi M, Ben Amar C (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Image Process 8(11):619–626CrossRefGoogle Scholar
  12. 12.
    Elhoseny M, Ramírez-González G, Abu-Elnasr OM, Shawkat SA, Arunkumar N (2018) Secure Medical Data Transmission Model for IoT-based Healthcare Systems. IEEE Access.  https://doi.org/10.1109/ACCESS.2018.2817615
  13. 13.
    Eswaraiah R, Reddy ES (2014) Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. International journal of telemedicine and applications, pp. 13Google Scholar
  14. 14.
    Giakoumaki A, Perakis K, Tagaris A, Koutsouris D (2006) Digital watermarking in telemedicine applications - towards enhanced data security and accessibility. In: Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, New York City, pp. 6328–6331Google Scholar
  15. 15.
    Hsu CS, SF T (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283(9):1737–1743CrossRefGoogle Scholar
  16. 16.
    JH W, Chang RF, Chen CJ, Wang CL, Kuo TH, Moon TH, Chen DR (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59–76CrossRefGoogle Scholar
  17. 17.
    Kannammal A, Subha Rani S (2014) Two level security for medical images using watermarking/encryption algorithms. Int J Imaging Syst Technol 24(1):111–120CrossRefGoogle Scholar
  18. 18.
    Khan MI, Rahman M, Sarker M, Hasan I (2013) Digital watermarking for image authentication based on combined DCT, DWT and SVD Transformation. Int J Comput Sci Issues 10(5):223–230Google Scholar
  19. 19.
    Memon NA, Chaudhry A, Ahmad M, Keerio ZA (2011) Hybrid watermarking of medical images for ROI authentication and recovery. Int J Comput Math 88(10):2057–2071CrossRefGoogle Scholar
  20. 20.
    NIST Releases Report on Securing Medical Records: https://cltc.berkeley.edu/2015/06/30/nist_mobile_medical_records/
  21. 21.
    Pandey R, Singh AK, Kumar B, Mohan A (2016) Iris based secure NROI multiple eye image watermarking for tele-ophthalmology. Multimedia Tools and Applications 75(22):14381–14397CrossRefGoogle Scholar
  22. 22.
    Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2015) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications 8(76):10599–10633Google Scholar
  23. 23.
    Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. J Biomed Inform 66(C):214–230CrossRefGoogle Scholar
  24. 24.
    Patra B, Patra JC (2012) Crt-based fragile self-recovery watermarking scheme for image authentication and recovery. IEEE International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS), Taipei, pp 430–435Google Scholar
  25. 25.
    Pavelin A, Klapan I, Kovač M, Katić M, Stevanović R, Rakić M, Klapan N (2006) A Functional Telemedicine Environment in the Framework of the Croatian. Healthcare Information System. In Remote Cardiology Consultations Using Advanced Medical Technology (Applications for NATO Operations), Vol. 372, pp. 79–93Google Scholar
  26. 26.
    Preda RO (2014) Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain. 10th International Conference on Communications, IEEE, Bucharest, pp. 1–4Google Scholar
  27. 27.
    Serikawa S, H L (2014) Underwater Image Dehazing Using Joint Trilateral Filter. Comput Electr Eng 40(1):41–50CrossRefGoogle Scholar
  28. 28.
    Sharma A, Singh AK, Ghrera SP (2017) Robust and Secure Multiple Watermarking Technique for Medical Images. Wirel Pers Commun 92(4):1611–1624CrossRefGoogle Scholar
  29. 29.
    Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and Robust Fragile Watermarking Scheme for Medical Images. IEEE Access 6(1):10269–10278CrossRefGoogle Scholar
  30. 30.
    Shih FY, Zhong X, Chang IC, Satoh SI (2018) An adjustable-purpose image watermarking technique by particle swarm optimization. Multimedia Tools and Applications 77(2):1623–1642CrossRefGoogle Scholar
  31. 31.
    Singh AK (2015) Some new techniques of improved wavelet domain watermarking for medical images. PhD thesis, Department of Computer Engineering, NIT Kurukshetra, Haryana, IndiaGoogle Scholar
  32. 32.
    Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible image watermarking in DWT–DCT–SVD domain. Natl Acad Sci Lett 37(4):351–358CrossRefGoogle Scholar
  33. 33.
    Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415–1433CrossRefGoogle Scholar
  34. 34.
    Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Futur Gener Comput Syst:1–16.  https://doi.org/10.1016/j.future.2016.11.023
  35. 35.
    Singh AK, Kumar B, Singh G, Mohan A (2017) Medical Image Watermarking: Techniques and Applications”, book series on Multimedia Systems and Applications, ISBN: 978–3319576985Google Scholar
  36. 36.
    Tan CK, Ng JC, X X, Poh CL, Guan YL, Sheah K (2011) Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528–540CrossRefGoogle Scholar
  37. 37.
    Thakkar FN, Srivastava VK (2016) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools and Applications 3(76):3669–3697Google Scholar
  38. 38.
    Trivedy S, Pal AK (2017) A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection. Iranian Journal of Science and Technology, Trans Electrical Engineering 41(2):103–113CrossRefGoogle Scholar
  39. 39.
    Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), pp. 31–38Google Scholar
  40. 40.
    Y W, JP Noonan G, Yang HJ (2012) Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging 21(1).  https://doi.org/10.1117/1.JEI.21.1.013014
  41. 41.
    Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools and Applications 77(4):4863–4882CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Sriti Thakur
    • 1
  • Amit Kumar Singh
    • 1
    Email author
  • Satya Prakash Ghrera
    • 1
  • Mohamed Elhoseny
    • 2
  1. 1.Department of CSEJUITSolanIndia
  2. 2.Faculty of Computer and InformationMansoura UniversityEl MansûraEgypt

Personalised recommendations