Skip to main content
Log in

Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recently, digital watermarking has become an important technique to preserve patients’ privacy in telemedicine applications. Since, medical information are highly sensitive, security of watermarked medical images becomes a critical issue in telemedicine applications. In this paper, two targeted attacks have been proposed against a key based color image watermarking scheme and also a non-key based one, in order to evaluate their security in telemedicine applications. The target schemes are SVD-based and QR-based color image watermarking algorithms, which their embedding procedures are quit the same. The proposed attacks exploit the prior knowledge of the watermarking algorithms to make changes in the exact embedding spaces. Thus, these changes would cause disruption in extraction procedure. Our experimental results show that the key based watermarking scheme is more secure than the non-key based one. This is because the proposed targeted attack needs to distort the key based watermarked images more than non-key based ones to remove the embedded watermarks. Our proposed targeted attacks also have more efficient performance in removing watermarks than other general attacks such as JPEG compression, Gaussian noise and etc. Finally, these attacks have been proposed to show the vulnerabilities of watermarking schemes in order to help the designers to implement more secure schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. Singular Value Decomposition

  2. Structural Similarity Index

  3. Normalized Cross Correlation

References

  1. Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik-Int J Light Electron Optics 125(1):428–434

    Article  Google Scholar 

  2. Baker K (2005) Singular value decomposition tutorial. The Ohio State University

  3. Calagna M, Guo H, Mancini LV, Jajodia S (2006) A robust watermarking system based on SVD compression. Proc 2006 ACM Sym Appl Comput, ACM: 1341–1347

  4. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography, Morgan Kaufmann

  5. Huang F, Guan ZH (2004) A hybrid SVD-DCT watermarking method based on LPSNR. Pattern Recogn Lett 25(15):1769–1775

    Article  Google Scholar 

  6. Lai CC (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284(4):938–944

    Article  Google Scholar 

  7. Ling HC, Phan RC-W, Heng SH (2011) "On the security of a hybrid SVD-DCT watermarking method based on LPSNR," advances in image and video technology. Springer, Berlin Heidelberg, pp 257–266

    Google Scholar 

  8. Loukhaoukha K, Refaey A, Zebbiche K, Nabti M (2015) On the security of robust image watermarking algorithm based on discrete wavelet transform, discrete cosine transform and singular value decomposition. Int J Appl Math Info Sci: 1159–1166

  9. Makbol NM, Khoo BE (2013) Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int J Electron Commun 67(2):102–112

    Article  Google Scholar 

  10. Meerwald P, Koidl C, Uhl A (2009) Attack on “watermarking method based on significant difference of wavelet coefficient quantization”. IEEE Trans Multimed 11(5):1037–1041

    Article  Google Scholar 

  11. Mehta R, Rajpal N (2013) A hybrid semi-blind gray scale image watermarking algorithm based on DWT-SVD using human visual system model. Contemp Comput (IC3), 2013 Sixth Int Conf. IEEE

  12. Mehta S, Nallusamy R, Marawar RV, Prabhakaran B (2013) A study of DWT and SVD based watermarking algorithms for patient privacy in medical images. Healthcare Info (ICHI), 2013 IEEE Int Conf. IEEE

  13. Mohan BC, Kumar S (2008) A robust image watermarking scheme using singular value decomposition. J Multimed 3(1):7–15

    Article  Google Scholar 

  14. Nikbakht P, Mahdavi M (2015) Targeted watermark removal of a SVD-based image. IKT2015 7th Int Conf Info Knowledge Technol, IEEE

  15. Nikbakht P, Mahdavi M (2015) Targeted dewatermarking of two non-blind SVD-based image watermarking schemes. Comput Knowledge Eng (ICCKE), 2015 5th Int Conf. IEEE

  16. Pomponiu V, Cavagnino D (2011) Security analysis of SVD-based watermarking techniques. Int J Multimed Intell Sec 2(2):120–145

    Google Scholar 

  17. Rey C, Doërr G, Csurka G, Dugelay JL (2002) Toward generic image dewatermarking. Image Process. 2002. Proc. 2002 Int Conf IEEE 3

  18. Rezazadeh S, Yazdi M (2006) A nonoblivious image watermarking system based on singular value decomposition and texture segmentation. Proc World Acad Sci, Eng Technol 13

  19. Sadicoff M, Petrie MML (2004) .Digital watermark survey and classification. Sec LACCEI Int Latin Am Caribbean Conf Eng Technol

  20. C. Song, S. Sudirman, M. Merabti and D. Llewellyn-Jones, (2010) Analysis of digital image watermark attacks. Consum Commun Netw Conf (CCNC), 2010 7th IEEE. IEEE

  21. Song W, Hou JJ, Li ZH, Huang L (2011) Chaotic system and QR factorization based robust digital image watermarking algorithm. J Cent S Univ Technol 18:116–124

    Article  Google Scholar 

  22. Su Q, Niu Y, Zou H, Liu X (2013) A blind dual color images watermarking based on singular value decomposition. Appl Math Comput 219(16):8455–8466

    MathSciNet  MATH  Google Scholar 

  23. Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94:219–235

    Article  Google Scholar 

  24. Sun S, Song W, Cong W (2009) DPCC and QR factorization-based color medical image authentication algorithm. Image Anal Signal Process, 2009. IASP 2009. Int Conf. IEEE

  25. Voloshynovskiy S, Pereira S, Pun T, Eggers JJ, Su JK (2001) Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. Commun Mag, IEEE 39(8):118–126

    Article  Google Scholar 

  26. Zhou X, Ma J, Du W (2013) SoW: a hybrid DWT-SVD based secured image watermarking. Sensor Netw Sec Technol Privacy Commun Syst (SNS & PCS), 2013 Int Conf. IEEE

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pegah Nikbakht Bideh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bideh, P.N., Mahdavi, M., Borujeni, S.E. et al. Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications. Multimed Tools Appl 77, 31713–31735 (2018). https://doi.org/10.1007/s11042-018-6218-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6218-8

Keywords

Navigation