A Review of Digital Watermarking Applications for Medical Image Exchange Security
Abstract
In this paper, we present the usage of watermarking techniques in medical imaging, and especially for security goals, the watermarking is considered a great solution to protect the personal data of patients during the medical images and telemedicine data exchange. This paper is devised in two part. The first one is reserved for an overview on image watermarking with a presentation of the most important requirements of watermarking (robustness, imperceptibility and capacity). We offer also the general scheme of watermarking with the two essential phases and different types of attacks. Furthermore, we present a classification of watermarking techniques based on various parameters such as: insertion domain, human perception and detection methods, in the end of the section we display some metrics and benchmarks for analysis the performance of the watermarking technique. The second part is reserved for the usage of watermarking techniques in medical imaging especially for integrity verification, authentication and data hiding, we also discuss a literature review on watermarking techniques for medical image. In addition we present the concept of telemedicine and telehealth fields and the importance of watermarking in the modern health care.
Keywords
Watermarking Medical imaging Medical image watermarking (MIW) E-health TelemedicineReferences
- 1.Desai, H.V., Beri, P., Raj, D.J.: Steganography, Cryptography, Watermarking: A Comparative Study. p. 3, (2010)Google Scholar
- 2.Fridrich, J.: Applications of data hiding in digital images. In: Tutorial for the ISSPA, Conference in Melbourne, Australia, Nov-1998Google Scholar
- 3.Tao, H., Chongmin, L., Jasni, M.Z., Ahmed, N.A.: Robust Image Watermarking Theories and Techniques: A ReviewGoogle Scholar
- 4.Mitesh, P., Alpesh, C.: The study of various attacks on digital watermarking technique. Int. J. Adv. Res. Comput. Eng. Technol (IJARCET), (2014)Google Scholar
- 5.Boreiry, M., Keyvanpour, M.-R.: Classification of watermarking methods based on watermarking approaches. pp. 73–76 (2017)Google Scholar
- 6.Chawla, G., Saini, R., Yadav, R.: Classification of watermarking based upon various parameters. Int. J. Comput. Appl. 4 (2012)Google Scholar
- 7.Song, C., Sudirman, S., Merabti, M.: Recent Advances And Classification of Watermarking Techniques in Digital Images, p. 6Google Scholar
- 8.Naveed, A., Saleem, Y., Ahmed, N., Rafiq, A.: Performance Evaluation and Watermark Security Assessment of Digital Watermarking Techniques, p. 6 (2015)Google Scholar
- 9.Kuttera, M., Petitcolasb, F.A.P.: A Fair Benchmark for Image Watermarking Systems p. 14Google Scholar
- 10.Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack modelling: towards a second generation watermarking benchmark. Sig. Process. 81(6), 1177–1214 (2001)CrossRefGoogle Scholar
- 11.Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Signal Process. 66(3), 385–403 (1998)CrossRefGoogle Scholar
- 12.Weinstein, R.S., et al.: Telemedicine, telehealth, and mobile health applications that work: Opportunities and Barriers, Am. J. Med. 183–187, (2014)CrossRefGoogle Scholar
- 13.Karen, M.Z.: Telemedicine: History, Applications, and Impact on Librarianship. US National Library of Medicine National Institutes of Health (1996)Google Scholar
- 14.Abhinav, S., Chandan, S.: Medical image authentication through watermarking. Int. J. Adv. Res. Comput. Sci. Technol. (2014)Google Scholar
- 15.Memon, N.A., Asmatullah, C., Mushtaq, A., Zulfiqar Ali, K.: Hybrid watermarking of medical images for ROI authentication and recovery. Int. J. Comput. Math., 2057–2071, (2011)CrossRefGoogle Scholar
- 16.Gunjal, B.L., Mali, S.N.: ROI based embedded watermarking of medical images for secured communication in telemedicine, 6(8), 6 (2012)Google Scholar
- 17.Al-Qershi, O.M., Khoo, B.E.: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J. Digit. Imaging 24(1), 114–125 (2011)CrossRefGoogle Scholar
- 18.Hajjaji, M.A., Ridha, H., Abdellatif, M., El-Bey, B.: ‘Tatouage des Images Médicales en Vue d’Intégrité et de Confidentialité des Données’, p. 7Google Scholar
- 19.Boris, V.: ‘Technique multicouches pour le tatouage d’images et adaptation aux flux vidéo MPEG-2 et MPEG-4’, Grenoble INPG, (2003)Google Scholar
- 20.Vassaux, B., Bas, P., Chassery, J.M.:‘Tatouage d’images par étalement de spectre : apport de la technique CDMA en mode multicouche’ 8 (2000)Google Scholar