Skip to main content

Advertisement

Log in

Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we present a robust and secure watermarking approach using transform domain techniques for tele-health applications. The patient report/identity is embedding into the host medical image for the purpose of authentication, annotation and identification. For better confidentiality, we apply the chaos based encryption algorithm on watermarked image in a less complex manner. Experimental results clearly indicated that the proposed technique is highly robust and sufficient secure for various forms of attacks without any significant distortions between watermarked and cover image. Further, the performance evaluation of our method is found better to existing state-of-the-art watermarking techniques under consideration. Furthermore, quality analysis of the watermarked image is estimated by subjective measure which is beneficial in quality driven healthcare industry.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1

Similar content being viewed by others

References

  1. Abd El-Samie FE, Ahmed HEH, Elashry IF, Shahieen MH, Faragallah OS, El-Rabaie ESM, Alshebeili SA (2013) Image encryption: a communication perspective. CRC Press, Boca Raton

    Book  Google Scholar 

  2. AK Singh M, Dave AM (2015) Robust and secure multiple watermarking in wavelet domain. Journal of Medical Imaging and Health Informatics 5(2):406–414

    Article  Google Scholar 

  3. AK Singh B, Kumar MD, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5(3):607–614

    Article  Google Scholar 

  4. AK Singh BK, Singh SK, Dave M, VK Singh PK, Ghrera SP, PK Gupta AM (2017) Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications. Multimedia Tools and Applications 76(5):7563–7573

    Article  Google Scholar 

  5. Al-Haj A (2014) Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 27(6):737–750

    Article  Google Scholar 

  6. Al-Haj A, Mohammad A (2017) Crypto-Watermarking of Transmitted Medical Images. J Digit Imaging 30(1):26–38

    Article  Google Scholar 

  7. Bakthula R, Shivani S, Agarwal S (2018) Self authenticating medical X-ray images for telemedicine applications. Multimedia Tools and Applications 77(7):8375–8392

    Article  Google Scholar 

  8. Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470

    Article  Google Scholar 

  9. Chauhan DS, Singh AK, Kumar B, JP Saini (2017) Quantization based multiple medical information watermarking for secure e-Health. Multimedia Tools and Applications, pp. 1–13

  10. Dhole VS, Patil NN (2015) Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks. In: Proc. International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 752–757

  11. El’Arbi M, Ben Amar C (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Image Process 8(11):619–626

    Article  Google Scholar 

  12. Elhoseny M, Ramírez-González G, Abu-Elnasr OM, Shawkat SA, Arunkumar N (2018) Secure Medical Data Transmission Model for IoT-based Healthcare Systems. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2817615

  13. Eswaraiah R, Reddy ES (2014) Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. International journal of telemedicine and applications, pp. 13

  14. Giakoumaki A, Perakis K, Tagaris A, Koutsouris D (2006) Digital watermarking in telemedicine applications - towards enhanced data security and accessibility. In: Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, New York City, pp. 6328–6331

  15. Hsu CS, SF T (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283(9):1737–1743

    Article  Google Scholar 

  16. JH W, Chang RF, Chen CJ, Wang CL, Kuo TH, Moon TH, Chen DR (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59–76

    Article  Google Scholar 

  17. Kannammal A, Subha Rani S (2014) Two level security for medical images using watermarking/encryption algorithms. Int J Imaging Syst Technol 24(1):111–120

    Article  Google Scholar 

  18. Khan MI, Rahman M, Sarker M, Hasan I (2013) Digital watermarking for image authentication based on combined DCT, DWT and SVD Transformation. Int J Comput Sci Issues 10(5):223–230

    Google Scholar 

  19. Memon NA, Chaudhry A, Ahmad M, Keerio ZA (2011) Hybrid watermarking of medical images for ROI authentication and recovery. Int J Comput Math 88(10):2057–2071

    Article  Google Scholar 

  20. NIST Releases Report on Securing Medical Records: https://cltc.berkeley.edu/2015/06/30/nist_mobile_medical_records/

  21. Pandey R, Singh AK, Kumar B, Mohan A (2016) Iris based secure NROI multiple eye image watermarking for tele-ophthalmology. Multimedia Tools and Applications 75(22):14381–14397

    Article  Google Scholar 

  22. Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2015) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications 8(76):10599–10633

    Google Scholar 

  23. Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. J Biomed Inform 66(C):214–230

    Article  Google Scholar 

  24. Patra B, Patra JC (2012) Crt-based fragile self-recovery watermarking scheme for image authentication and recovery. IEEE International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS), Taipei, pp 430–435

    Google Scholar 

  25. Pavelin A, Klapan I, Kovač M, Katić M, Stevanović R, Rakić M, Klapan N (2006) A Functional Telemedicine Environment in the Framework of the Croatian. Healthcare Information System. In Remote Cardiology Consultations Using Advanced Medical Technology (Applications for NATO Operations), Vol. 372, pp. 79–93

  26. Preda RO (2014) Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain. 10th International Conference on Communications, IEEE, Bucharest, pp. 1–4

  27. Serikawa S, H L (2014) Underwater Image Dehazing Using Joint Trilateral Filter. Comput Electr Eng 40(1):41–50

    Article  Google Scholar 

  28. Sharma A, Singh AK, Ghrera SP (2017) Robust and Secure Multiple Watermarking Technique for Medical Images. Wirel Pers Commun 92(4):1611–1624

    Article  Google Scholar 

  29. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and Robust Fragile Watermarking Scheme for Medical Images. IEEE Access 6(1):10269–10278

    Article  Google Scholar 

  30. Shih FY, Zhong X, Chang IC, Satoh SI (2018) An adjustable-purpose image watermarking technique by particle swarm optimization. Multimedia Tools and Applications 77(2):1623–1642

    Article  Google Scholar 

  31. Singh AK (2015) Some new techniques of improved wavelet domain watermarking for medical images. PhD thesis, Department of Computer Engineering, NIT Kurukshetra, Haryana, India

  32. Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible image watermarking in DWT–DCT–SVD domain. Natl Acad Sci Lett 37(4):351–358

    Article  Google Scholar 

  33. Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415–1433

    Article  Google Scholar 

  34. Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Futur Gener Comput Syst:1–16. https://doi.org/10.1016/j.future.2016.11.023

  35. Singh AK, Kumar B, Singh G, Mohan A (2017) Medical Image Watermarking: Techniques and Applications”, book series on Multimedia Systems and Applications, ISBN: 978–3319576985

  36. Tan CK, Ng JC, X X, Poh CL, Guan YL, Sheah K (2011) Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528–540

    Article  Google Scholar 

  37. Thakkar FN, Srivastava VK (2016) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools and Applications 3(76):3669–3697

    Google Scholar 

  38. Trivedy S, Pal AK (2017) A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection. Iranian Journal of Science and Technology, Trans Electrical Engineering 41(2):103–113

    Article  Google Scholar 

  39. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), pp. 31–38

  40. Y W, JP Noonan G, Yang HJ (2012) Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging 21(1). https://doi.org/10.1117/1.JEI.21.1.013014

  41. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools and Applications 77(4):4863–4882

    Article  Google Scholar 

Download references

Acknowledgments

The authors thank the anonymous reviewers for helpful and constructive comments that greatly contributed to improving this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thakur, S., Singh, A.K., Ghrera, S.P. et al. Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78, 3457–3470 (2019). https://doi.org/10.1007/s11042-018-6263-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6263-3

Keywords

Navigation