Skip to main content
Log in

Information hiding in medical images: a robust medical image watermarking system for E-healthcare

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Electronic transmission of the medical images is one of the primary requirements in a typical Electronic-Healthcare (E-Healthcare) system. However this transmission could be liable to hackers who may modify the whole medical image or only a part of it during transit. To guarantee the integrity of a medical image, digital watermarking is being used. This paper presents two different watermarking algorithms for medical images in transform domain. In first technique, a digital watermark and Electronic Patients Record (EPR) have been embedded in both regions; Region of Interest (ROI) and Region of Non-Interest (RONI). In second technique, Region of Interest (ROI) is kept untouched for tele-diagnosis purpose and Region of Non-Interest (RONI) is used to hide the digital watermark and EPR. In either algorithm 8 × 8 block based Discrete Cosine Transform (DCT) has been used. In each 8 × 8 block two DCT coefficients are selected and their magnitudes are compared for embedding the watermark/EPR. The selected coefficients are modified by using a threshold for embedding bit a ‘0’ or bit ‘1’ of the watermark/EPR. The proposed techniques have been found robust not only to singular attacks but also to hybrid attacks. Comparison results viz-a - viz payload and robustness show that the proposed techniques perform better than some existing state of art techniques. As such the proposed algorithms could be useful for e-healthcare systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31

Similar content being viewed by others

References

  1. Baiying L, Ee-Leng T, Siping C, Dong N, Tianfu W, Haijun L (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41:3178–3188

    Article  Google Scholar 

  2. Bousilimi D, Coatrieux G, Roux C (2012) A joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic image. Comput Methods Programs Biomed 106:47–54

    Article  Google Scholar 

  3. Chen YH, Chang TY, Li CY (2011) High throughput DA- based DCT with high accuracy error compensated adder tree. IEEE Trans VLSI Syst 19:709–714

    Article  Google Scholar 

  4. Coatrieux G, Montagner J, Huang H, Roux C (2007) Mixed reversible and RONI watermarking for medical image reliability protection. 29th International conference of the IEEE. Eng Med Biol Soc Lyon 5653–6

  5. Das S, Kundu MK (2012) Effective management of medical information through a novel blind watermarking technique. J Med Syst 36:3339–3351

    Article  Google Scholar 

  6. Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. Int J Electron Commun 68:244–253

    Article  Google Scholar 

  7. Fotopoulos V, Stavrinou ML, Skodras AN (2008) Medical image authentication and self-correcting through an adaptive reversible watermarking technique. Proceedings of 8th IEEE International Conference on Bio Informatics and Bio Engineering (BIBE2008) 1–5

  8. Ghulam MB, Muhammad M, Shabir AP, Javaid A (2010) Field programmable gate array (FPGA) implementation of novel complex PN-code-generator-based data scrambler and descrambler. Maejo Int J Sci Technol 4(1):125–135

    Google Scholar 

  9. Giakoumaki, Pavlopoulos AS, Koutsouris D (2010) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 4:722–732

    Google Scholar 

  10. Liqiang N, Meng W, Luming Z, Shuicheng Y, Zhang B, Tat-Seng C (2015) Disease inference from health-related questions via sparse deep learning. IEEE Trans Knowl Data Eng 27(8):2107–2119

    Article  Google Scholar 

  11. Liqiang N, Mohammad A, Tao L, Jialie S, Tat-Seng C (2014) A joint local–global approach for medical terminology assignment. In Proc. Int. ACM SIGIR Conf., 2014

  12. Liqiang N, Tao L, Mohammad A, Jialie S, Tat-Seng C (2014) WenZher: comprehensive vertical search for healthcare domain. (2014). The 37th International ACM SIGIR Conference on Research and Development in Information Retrieval(SIGIR’14). doi:10.1145/2600428.2611176

  13. Liqiang N, Yi-Liang Z, Mohammad A, Jialie S, Tat-Seng C (2015) Bridging the vocabulary Gap between health seekers and healthcare knowledge. IEEE Trans Knowl Data Eng 27(2):396–409

    Article  Google Scholar 

  14. Navas KA, Thampy SA, Sasikumar M (2008) EPR hiding in medical images for telemedicine. Proc World Acad Sci Eng Technol Rome 292–295

  15. Osamah M, Al-Qershi O, Khoo BE (2009) Authentication and data hiding using a reversible ROI-based watermarking scheme for DICOM images. Int J Inf Commun Eng 5:801–806

    Google Scholar 

  16. Priya RL, Sadasivam V (2014) A survey on watermarking techniques, requirements, application for medical images. J Theor Appl Inf Technol 65

  17. Rahimi F, Rabbani H (2011) A dual adaptive watermarking scheme in contourlet domain for DICOM images. Biomed Eng Online

  18. Rao NA, Meena Kumari V (2011) Watermarking in medical imaging for security and authentication. Taylor & Francis Inf Secur J A Global Perspect 20:148–155

    Article  Google Scholar 

  19. Raul RC, Claudia FU, Gershom de JTB (2007) Data hiding scheme for medical image. IEEE 17th International Conference on Electronics Communications and Computers (CONIELECOMP’07)

  20. Shabir AP, Javaid AS, Muheed H, Ghulam MB (2014) A Secure and robust information hiding technique for covert communication. Int J Electron 102:1253–1266

    Google Scholar 

  21. Shabir AP, Javaid AS, Umer IA, Ghulam MB (2015) Hiding in encrypted images: a three tier data hiding scheme. Multidim Syst Sign Process 1–24

  22. Shabir AP, Javaid AS, Ghulam MB (2014) Fragility evaluation of intermediate significant bit embedding (ISBE) based digital image watermarking scheme for content authentication. International Conference on Advances in Electronics, Computers and Communications (ICAECC), 1–6

  23. Shabir AP, Javaid AS, Ghulam MB (2014) A secure and efficient spatial domain data hiding technique based on pixel adjustment. Am J Eng Technol Res 14(2):33–39

    Google Scholar 

  24. Shaoqing R, Kaiming H, Ross G, Jian S (2015) Faster R-CNN: towards real-time object detection with region proposal networks. Computer Vision and pattern recognition. In arXiv:1506.01497

  25. Singh R (2001) Emerging technologies that will change the world: digital rights management. MIT Technol Rev. http://www.technologyreview.com/infotech/12264

  26. Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine application. Wirel Pres Commun 80:1415–1433

    Article  Google Scholar 

  27. Solanki N, Malik SK (2014) ROI based medical image watermarking with zero distortion and enhanced security. Int J Educ Comput Sci 10:40–48

    Article  Google Scholar 

  28. Soliman MM, Hassanien AE, Ghali NI, Onsi HM (2012) An adaptive watermarking approach for medical imaging using swarm intelligent. Int J Smart Home 6:37–50

    Google Scholar 

  29. Subhashini D, Nalini P, Chandrasekhar G (2012) Comparison analysis of spatial Domain and compressed Domain steganographic techniques. Int J Eng Res & Technol (IJERT) 1

  30. Wakatani A (2002) Digital watermarking for ROI medical images by using compressed signature image. Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS) 7–10 Jan 2002

  31. Yan Y, Elisa R, Gaowen L, Nicu S (2015) Egocentric daily activity recognition via multitask clustering. IEEE Trans Image Process 24(10):2984–2995

    Article  MathSciNet  Google Scholar 

  32. Zitnick CL, Doll’ar P (2014) Edge boxes: locating object proposals from edges. In ECCV

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shabir A. Parah.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Parah, S.A., Sheikh, J.A., Ahad, F. et al. Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl 76, 10599–10633 (2017). https://doi.org/10.1007/s11042-015-3127-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3127-y

Keywords

Navigation