Advertisement

An efficient watermarking technique for tamper detection and localization of medical images

  • Solihah Gull
  • Nazir A. Loan
  • Shabir A. Parah
  • Javaid A. Sheikh
  • G. M. Bhat
Original Research
  • 47 Downloads

Abstract

With the exponential rise of multimedia technology and networked infrastructure, electronic healthcare is coming up a big way. One of the most important challenges in an electronic healthcare setup is the authentication of medical images, received by an expert at a far-off location from the sender. With an aim to address the critical authentication issue, this paper presents a fragile watermarking technique capable of tamper detection and localization in medical/general images. We divide the cover image into 4 × 4 non overlapping pixel blocks; with each block further sub-divided into two 4 × 2 blocks, called as Upper Half Block (UHB) and Lower Half Block (LHB). The information embedded in LHB facilitates tamper detection while as that embedded in UHB facilities tamper localization. The experimental results show that, in addition to tamper detection and localization capability, the proposed technique has lesser computational complexity when compared to other state-of-art techniques. Further, the proposed scheme results in average PSNR of 51.26 dB for a payload of one bit per pixel (1bpp) indicating that the watermarked images obtained are of high visual quality.

Keywords

Watermarking Tamper detection Tamper localization Electronic health record 

Notes

Acknowledgements

The authors would like to thank the Department of Science and Technology (DST) New Delhi, Government of India for providing financial support under DST Inspire Fellowship Scheme.

References

  1. Aljuaid NA, Gutub AA, Khan EA (2018) Enhancing PC data security via combining RSA cryptography and video based steganography. J Inform Secur Cybercrimes Res (JISCR) 1(1):8–18Google Scholar
  2. Almazrooie M, Samsudin A, Gutub AA, Salleh MS, Omar MA, Hassan SA (2018) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J King Saud Univ Comput Inform Sci Elsevier.  https://doi.org/10.1016/j.jksuci.2018.02.006 CrossRefGoogle Scholar
  3. Ansari IA, Pant M, Ahn CW (2015) Svd based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239CrossRefGoogle Scholar
  4. Azeroual A, Afdel K (2017) Real-time image tamper localisation based on fragile watermarking and Faber-Schauder wavelet. Int J Commun (AEÜ) 79:207–218CrossRefGoogle Scholar
  5. Caragata D, Assad SE, Luduena M (2015) An improved fragile watermarking algorithm for jpeg images. Int J Electron Commun 69(12):1783–1794CrossRefGoogle Scholar
  6. Chauhan DS, Singh AK, Adarsh A, Kumar B, Saini JP (2017) Combining Mexican hat wavelet and spread spectrum for adaptive watermarking and its statistical detection using medical images. Multimedia Tools Appl.  https://doi.org/10.1007/s11042-017-5348-8 CrossRefGoogle Scholar
  7. Gutub AA (2010) Pixel indicator technique for RGB image steganography. J Emerg Technol Web Intell (JETWI) 2(1):56–64Google Scholar
  8. Gutub AA, Aljuaid NA (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. J Comput Hardw Eng.  https://doi.org/10.63019/jche.v1i2.513 CrossRefGoogle Scholar
  9. Gutub AA, Aljuaid NA, Khan EA (2017) Counting-based secret sharing technique for multimedia applications. Multimedia Tools Appl Int J Springer.  https://doi.org/10.1007/s11042-017-5293-6 CrossRefGoogle Scholar
  10. Khamlichi YI, Zaz Y, Afdel K (2006) Authentication system for medical watermarked content based image. Wseas Trans Signal Process 5:826–830Google Scholar
  11. Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506CrossRefGoogle Scholar
  12. Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174–185CrossRefGoogle Scholar
  13. Loan NA, Parah SA, Sheikh JA, Akhoon JA, Bhat GM (2017) Hiding Electronic Patient Record (EPR) in medical images: a high capacity and computationally efficient technique for e-healthcare applications. J Biomed Inform 73:125–136CrossRefGoogle Scholar
  14. Marie WA, Gutub AA, Mansou HA (2010) Image based steganography using truth table based and determinate array on RGB indicator. Int J Signal Image Process (IJSIP) 1(3):196–204Google Scholar
  15. Mohanty SP, Sengupta A, Guturu P, Kougianos E (2017) Every you want to know about watermarking from paper marks to hardware protection. IEEE Consum Electron Mag.  https://doi.org/10.1109/MCE.2017.2684980 CrossRefGoogle Scholar
  16. Nguyen TS, Chang CC, Yang XQ (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. Int J Electron Commun 70(8):1055–1061CrossRefGoogle Scholar
  17. Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind Watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Process Elsevier,  https://doi.org/10.1016/j.dsp.2016.02.005 CrossRefGoogle Scholar
  18. Parah SA, Ahad F, Sheikh JA, Bhat GM (2017a) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform.  https://doi.org/10.1016/j.jbi.2017.01.006 CrossRefGoogle Scholar
  19. Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017b) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools Appl 76(8):10599–10633CrossRefGoogle Scholar
  20. Parah SA, Sheikh JA, Akhoon JA, Loan NA (2018) Electronic health record hiding in Images for smart city applications: a computationally efficient and reversible information hiding technique for secure communication. Future Gener Comput Syst Elsevier.  https://doi.org/10.1016/j.future.2018.02.023 CrossRefGoogle Scholar
  21. Patra B, Patra JC (2012) Crt-based fragile self-recovery watermarking scheme for image authentication and recovery. In: IEEE international symposium on intelligent signal processing and communication systems, (ISPACS2012), pp. 430–435Google Scholar
  22. Qasim AF, Meziane F, Aspin R (2018) Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review. Comput Sci Rev Elsevier 27:45–60MathSciNetCrossRefGoogle Scholar
  23. Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Visual Commun Image Represent 30:312–327CrossRefGoogle Scholar
  24. Sengupta A (2015) Intellectual property cores protection designs for CE products. IEEE Consumer Electron Mag.  https://doi.org/10.1109/MCE.2015.2484745 CrossRefGoogle Scholar
  25. Singh AK (2017) improved hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools Appl Springer 76(6):8881–8900.  https://doi.org/10.1007/s11042-016-3514-z USCrossRefGoogle Scholar
  26. Singh D, Singh SK (2016a) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools Appl 76(1):953–977CrossRefGoogle Scholar
  27. Singh D, Singh SK (2016b) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Visual Commun Image Represent 38:775–789CrossRefGoogle Scholar
  28. Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Gener Comput Syst Elsevier.  https://doi.org/10.1016/j.future.2016.11.023 CrossRefGoogle Scholar
  29. Singh AK, Kumar B, Singh G, Mohan A (2017) Medical image watermarking: techniques and applications, book series on multimedia systems and applications. Springer, USA (ISBN: 978–3319576985) CrossRefGoogle Scholar
  30. Singh S, Singh R, Singh AK, Siddiqui TJ (2018) SVD-DCT based medical image watermarking in NSCT domain. In: Hassanien AE et al. (eds) Quantum computing: an environment for intelligent large scale real application. Studies in big data, vol 33. Springer, Cham, pp. 467–488.  https://doi.org/10.1007/978-3-319-63639-9_20 (Print ISBN 978-3-319-63638-2) CrossRefGoogle Scholar
  31. Sreenivas K, Prasad VK (2018) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern Springer 9(7):1193–1218CrossRefGoogle Scholar
  32. Thakur S, Singh AK, Ghrera SP, Mohamed E (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools Appl Springer.  https://doi.org/10.1007/s11042-018-6263-3 CrossRefGoogle Scholar
  33. Tiwari A, Sharma M, Tamrakar RK (2017) Watermarking based image authentication and tamper detection algorithm using vector quantization approach. Int J Commun (AEÜ) 78:114–123CrossRefGoogle Scholar
  34. Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308CrossRefGoogle Scholar
  35. Zear A, Singh A, Kumar P (2016) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools Appl.  https://doi.org/10.1007/s11042-016-3862-8 CrossRefGoogle Scholar
  36. Zhang J, Zhang Q,.Lv H (2013) A novel image tamper localization and recovery algorithm based on watermarking technology. Optik Int J Light Electron Opt 124(23):6367–6371CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  • Solihah Gull
    • 1
  • Nazir A. Loan
    • 1
  • Shabir A. Parah
    • 1
  • Javaid A. Sheikh
    • 1
  • G. M. Bhat
    • 2
  1. 1.Department of Electronics and Instrumentation TechnologyUniversity of KashmirSrinagarIndia
  2. 2.Department of Electronics EngineeringInstitute of TechnologySrinagarIndia

Personalised recommendations