Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 10, pp 13905–13924 | Cite as

Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing

  • Rohit ThankiEmail author
  • Surekha Borra
Article
  • 45 Downloads

Abstract

With the rapid growth in communication and computing technologies, transmission of digital images and medical images over the Internet is on the rise. In such scenario, there is a special need to meet the security and privacy issues and challenges of an individual and Intellectual Property (IP) owners. It is highly important for an individual to keep his/her personal images against invalid manipulation by the impostors. Hence developments of authentication and tamper detection techniques are the need of the hour. In this paper, a new hybrid non-blind fragile watermarking technique is proposed for tamper detection of images and for securing the copyrights of sensitive images. A combination of Compressive Sensing (CS) theory, Discrete Wavelet Transform (DWT), and Non-Subsampled Contourlet Transform (NSCT) are employed to achieve security, high embedding capacity, and authenticity. In this technique, the requirements are achieved by inserting encrypted watermark in lower frequency contourlet coefficients of cover images. The experimental results prove that this proposed technique provides high security, high imperceptibility, authenticity and tamper detection of various common signal processing and geometrical attacks.

Keywords

Authentication Contourlet transform (CT) Fragile Medical image Non-blind watermarking Security 

Notes

References

  1. 1.
    Banerjee S, Chakraborty S, Dey N, Pal AK, Ray R (2015) High payload watermarking using residue number system. In J Image Graph Sign Proc 3:1–8Google Scholar
  2. 2.
    Barani MJ, Valandar MY, Ayubi P (2015 A secure watermark embedding approach based on chaotic map for image tamper detection. In Information and Knowledge Technology (IKT), 2015 7th Conference on (pp. 1–5). IEEEGoogle Scholar
  3. 3.
    Baraniuk R (2007) Compressive sensing [lecture notes]. IEEE Signal Process Mag 24(4):118–121CrossRefGoogle Scholar
  4. 4.
    Borra S, Lakshmi HR, Dey N, Ashour A, Shi F (2017) Digital image watermarking tools: state-of-the-art. Front Artificial Intel Appl 296:450–459Google Scholar
  5. 5.
    Candes E (2006) Compressive Sampling. In Proceedings of the international congress of mathematicians (Vol. 3, pp. 1433–1452)Google Scholar
  6. 6.
    Carlin S, Curran K (2011) Cloud computing security. Int J Ambient Comput Intel 3(1):14–19CrossRefGoogle Scholar
  7. 7.
    Da Cunha A, Zhou J, Do M (2006) The nonsubsampled Contourlet transform: theory, design, and applications. IEEE Trans Image Process 15(10):3089–3101CrossRefGoogle Scholar
  8. 8.
    Dey N, Ashour A, Chakraborty S, Banerjee S, Gospodinova E, Gospodinov M, Hassanien A (2017) Watermarking in Biomedical Signal Processing. Intel Tech Sign Proc Multimed Sec 345–369Google Scholar
  9. 9.
    Do M, Vetterli M (2005) The Contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14(12):2091–2106CrossRefGoogle Scholar
  10. 10.
    Donoho D (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289–1306MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Fridrich J, Goljan M (1999) Images with self-correcting capabilities. In Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on (Vol. 3, pp. 792–796). IEEEGoogle Scholar
  12. 12.
    Ghosal SK, Mandal JK (2014) Binomial transform based fragile watermarking for image authentication. J Inform Sec Appl 19(4–5):272–281Google Scholar
  13. 13.
    Kutter M, Petitcolas F (1999) A fair benchmark for image watermarking systems. Electron Imaging’99 Sec Watermark Multimed Cont 3657:1–14Google Scholar
  14. 14.
    MedPix™ Medical Image Database available at http://rad.usuhs.mil/medpix/medpix.html, https://medpix.nlm.nih.gov/home, Last Access Year: 2017
  15. 15.
    Nagesh P, Li B (2009) Compressive Imaging of Color Images. In Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on (pp. 1261–1264). IEEEGoogle Scholar
  16. 16.
    Qian Z, Feng G (2010) Inpainting assisted self-recovery with decreased embedding data. IEEE Sign Proc Lett 17(11):929–932CrossRefGoogle Scholar
  17. 17.
    Qin C, Chang CC, Chen PY (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150CrossRefGoogle Scholar
  18. 18.
    Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293CrossRefGoogle Scholar
  19. 19.
    Rajeswari P, Raju SV, Ashour AS, Dey N (2017) Multi-fingerprint unimodel-based biometric authentication supporting cloud computing. In Intelligent techniques in signal processing for multimedia security (pp. 469–485). Springer, ChamGoogle Scholar
  20. 20.
    Raval M, Rege R (2003) Discrete Wavelet Transform based Multiple Watermarking Scheme. In TENCON 2003. Conference on Convergent Technologies for the Asia-Pacific Region (Vol. 3, pp. 935–938). IEEEGoogle Scholar
  21. 21.
    Singh A (2015) Some New Techniques of Improved Wavelet domain watermarking for Medical Images. Ph.D. Thesis, NIT KurukshetraGoogle Scholar
  22. 22.
    Suthaharan S (2004) Fragile image watermarking using a gradient image for improved localization and security. Pattern Recogn Lett 25(16):1893–1903CrossRefGoogle Scholar
  23. 23.
    Tchepnda C, Moustafa H, Labiod H, Bourdon G (2009) Vehicular networks security: attacks, requirements, challenges and current contributions. Int J Amb Comput Intel (IJACI) 1(1):39–52CrossRefGoogle Scholar
  24. 24.
    Thakkar F, Srivastava V (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76(3):3669–3697CrossRefGoogle Scholar
  25. 25.
    Thanki R, Borra S (2018) Medical Imaging and its Security in Telemedicine Applications. SpringerGoogle Scholar
  26. 26.
    Thanki R, Borra S, Dwivedi V, Borisagar K (2017) A Steganographic approach for secure communication of medical images based on DCT-SVD and compressed sensing (CS) theory. Imaging Sci J 65(8):458–468CrossRefGoogle Scholar
  27. 27.
    Thanki RM, Dwivedi VJ, Borisagar KR (2018) Multibiometric Watermarking with Compressive Sensing Theory: Techniques and Applications. SpringerGoogle Scholar
  28. 28.
    Tropp J, Gilbert A (2007) Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans Inf Theory 53(12):4655–4666MathSciNetCrossRefzbMATHGoogle Scholar
  29. 29.
    University of South Carolina SIPI Image Database: http://sipi.usc.edu/database/database.php, Last Access Year: 2017
  30. 30.
    Vidakovic B (1999) Statistical Modelling by Wavelets. Wiley, 115–116Google Scholar
  31. 31.
    Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601CrossRefzbMATHGoogle Scholar
  32. 32.
    Yan J (2009) Wavelet matrix. Department of Electrical and Computer Engineering. University of Victoria, VictoriaGoogle Scholar
  33. 33.
    Yang CW, Shen JJ (2010) Recover the tampered image based on VQ indexing. Signal Process 90(1):331–343CrossRefzbMATHGoogle Scholar
  34. 34.
    Zhang X, Wang S (2008) Fragile watermarking with error-free restoration capability. IEEE Trans Multimed 10(8):1490–1499CrossRefGoogle Scholar
  35. 35.
    Zhang X, Wang S, Qian Z, Feng G (2010) Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process 90(12):3026–3036CrossRefzbMATHGoogle Scholar
  36. 36.
    Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495MathSciNetCrossRefzbMATHGoogle Scholar
  37. 37.
    Zhang H, Wang C, Zhou X (2017) Fragile watermarking for image authentication using the characteristic of SVD. Algorithms 10(1):27MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Faculty of Technology and EngineeringC. U. Shah UniversityWadhwan CityIndia
  2. 2.Department of ECEK. S. Institute of TechnologyBangaloreIndia

Personalised recommendations