An efficient watermarking technique for tamper detection and localization of medical images
- 47 Downloads
With the exponential rise of multimedia technology and networked infrastructure, electronic healthcare is coming up a big way. One of the most important challenges in an electronic healthcare setup is the authentication of medical images, received by an expert at a far-off location from the sender. With an aim to address the critical authentication issue, this paper presents a fragile watermarking technique capable of tamper detection and localization in medical/general images. We divide the cover image into 4 × 4 non overlapping pixel blocks; with each block further sub-divided into two 4 × 2 blocks, called as Upper Half Block (UHB) and Lower Half Block (LHB). The information embedded in LHB facilitates tamper detection while as that embedded in UHB facilities tamper localization. The experimental results show that, in addition to tamper detection and localization capability, the proposed technique has lesser computational complexity when compared to other state-of-art techniques. Further, the proposed scheme results in average PSNR of 51.26 dB for a payload of one bit per pixel (1bpp) indicating that the watermarked images obtained are of high visual quality.
KeywordsWatermarking Tamper detection Tamper localization Electronic health record
The authors would like to thank the Department of Science and Technology (DST) New Delhi, Government of India for providing financial support under DST Inspire Fellowship Scheme.
- Aljuaid NA, Gutub AA, Khan EA (2018) Enhancing PC data security via combining RSA cryptography and video based steganography. J Inform Secur Cybercrimes Res (JISCR) 1(1):8–18Google Scholar
- Gutub AA (2010) Pixel indicator technique for RGB image steganography. J Emerg Technol Web Intell (JETWI) 2(1):56–64Google Scholar
- Khamlichi YI, Zaz Y, Afdel K (2006) Authentication system for medical watermarked content based image. Wseas Trans Signal Process 5:826–830Google Scholar
- Marie WA, Gutub AA, Mansou HA (2010) Image based steganography using truth table based and determinate array on RGB indicator. Int J Signal Image Process (IJSIP) 1(3):196–204Google Scholar
- Parah SA, Sheikh JA, Akhoon JA, Loan NA (2018) Electronic health record hiding in Images for smart city applications: a computationally efficient and reversible information hiding technique for secure communication. Future Gener Comput Syst Elsevier. https://doi.org/10.1016/j.future.2018.02.023 CrossRefGoogle Scholar
- Patra B, Patra JC (2012) Crt-based fragile self-recovery watermarking scheme for image authentication and recovery. In: IEEE international symposium on intelligent signal processing and communication systems, (ISPACS2012), pp. 430–435Google Scholar
- Singh S, Singh R, Singh AK, Siddiqui TJ (2018) SVD-DCT based medical image watermarking in NSCT domain. In: Hassanien AE et al. (eds) Quantum computing: an environment for intelligent large scale real application. Studies in big data, vol 33. Springer, Cham, pp. 467–488. https://doi.org/10.1007/978-3-319-63639-9_20 (Print ISBN 978-3-319-63638-2) CrossRefGoogle Scholar