A Secure Medical Image Watermarking Technique for E-Healthcare Applications

  • Nasir N. Hurrah
  • Shabir A. Parah
  • Javaid A. Sheikh


The rapid rise in the exchange of the medical information for remote/continuous diagnosis via internet using different software’s and digital gadgets has ensured better health monitoring. This exchange, however, has given rise to many security issues which may occur due to noise in communication channels, mishandling of devices or unauthorized tempering. Thus, there is need of ensuring privacy, data integrity and copyright protection in order to provide better technological efficiency. For securing medical content digital watermarking techniques have proved to provide better solutions. In this chapter an efficient watermarking technique is proposed for exchanging patient information in an e-healthcare system. A robust watermarking technique using Singular Value Decomposition (SVD) for embedding the secret logo in the transform domain coefficients is presented. The hybrid combination of Discrete Cosine Transform (DCT) and SVD ensures very high robustness of the watermark and hence is suitable for copyright applications. The security has been ensured by encrypting the watermark before embedding by chaos encryption. The proposed technique has been analysed in presence of various signal processing/geometrical attacks and shows very high robustness of the watermark. The experimental results obtained prove the efficiency of the technique and as such can be used in e-healthcare.


Robust watermark Discrete cosine transform Singular value decomposition Security Encryption E-healthcare 



This publication is an outcome of the R&D work undertaken project under the Visvesvaraya PhD Scheme of Ministry of Electronics & Information Technology, Government of India, being implemented by Digital India Corporation and in part is supported by Department of Science and Technology (DST) New Delhi under DST inspire scheme.


  1. 1.
    Loan NA, Parah SA, Sheikh JA, Akhoon JA, Bhat GM (2017). Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications. Journal of biomedical informatics, 73, 125-136.CrossRefGoogle Scholar
  2. 2.
    Parah SA, Sheikh JA, Ahad F, Bhat GM (2018). High Capacity and Secure Electronic Patient Record (EPR) Embedding in Color Images for IoT Driven Healthcare Systems. In Internet of Things and Big Data Analytics Toward Next-Generation Intelligence (pp. 409-437). Springer, Cham.Google Scholar
  3. 3.
    Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2008) Digital Watermarking and Steganography, 2nd edn. (Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2008).CrossRefGoogle Scholar
  4. 4.
    Kumar C, Singh AK, Kumar P, Singh R, Singh S. SPIHT-based multiple image watermarking in NSCT domain. Concurrency and Computation: Practice and Experience, Wiley, DOI:10.1002/cpe.4912.Google Scholar
  5. 5.
    Singh, AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Generation Computer Systems. Elsevier, pp.1-16, DOI: 10.1016/j.future.2016.11.023.CrossRefGoogle Scholar
  6. 6.
  7. 7.
    Parah SA, Ahad F, Sheikh JA, Loan NA, Bhat GM (2016c) A New Reversible and high capacity data hiding technique for e-healthcare applications, Multimedia Tools and Applications, Springer, DOI: 10.1007/s11042-016-4196-2.CrossRefGoogle Scholar
  8. 8.
    Kumar C, Singh AK, Kumar P (2018) A recent survey on image watermarking techniques and its application in e-governance. Multimedia Tools and Applications, Springer, 77(3), pp. 3597–3622, DOI: 10.1007/s11042-017-5222-8.CrossRefGoogle Scholar
  9. 9.
    Ahad F, Loan NA, Parah SA, Sheikh JA, Bhat GM, (2016a) Pixel repetition technique: a high capacity and reversible data hiding method for e-healthcare applications, Intelligent Techniques in Signal Processing for Multimedia Security, Vol. 660, Springer, DOI: 10.1007/978-3-319-44790-2_17.Google Scholar
  10. 10.
    Parah SA, Sheikh JA, Akhoon JA, Loan NA (2018) Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication. Future Generation Computer Systems.Google Scholar
  11. 11.
    Parah SA, Ahmad I, Loan NA, Muhammad K, Sheikh JA, Bhat GM. (2019). Realization of an adaptive data hiding system for electronic patient record, embedding in medical images. In Security in smart cities: models, applications, and challenges (pp. 47–70). Springer, Cham.Google Scholar
  12. 12.
    Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017). Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications, 76(8), 10599-10633.CrossRefGoogle Scholar
  13. 13.
    Singh L, Singh AK, Singh PK (2018) Secure data hiding techniques: A survey, Multimedia Tools and Applications, Multimed. Tools Appl., Springer DOI: 10.1007/s11042-018-6407-5.Google Scholar
  14. 14.
    Natasa Zivic: Robust Image Authentication in the Presence of Noise. springer (2015).Google Scholar
  15. 15.
    Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2015d) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications. 2017 Apr 1;76(8):10599-633. Springer.Google Scholar
  16. 16.
    Chang CC, Chen KN, Lee CF, Liu LJ. A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 2011;84(9):1462–70.CrossRefGoogle Scholar
  17. 17.
    Loan NA, Hurrah NN, Parah SA, Sheikh JA (2017) High capacity reversible stenographic technique based on image resizing and pixel permutation. In Image Information Processing (ICIIP), 2017 Fourth International Conference on (pp. 1-6). IEEE.Google Scholar
  18. 18.
    Kumar, C., Singh, A. K., & Kumar, P. (2018). Improved wavelet-based image watermarking through SPIHT. Multimedia Tools and Applications, Springer, pp. 1-14, DOI: 10.1007/s11042-018-6177-0.Google Scholar
  19. 19.
    Lin S, Chen CF (2000) A robust dct-based watermarking for copyright protection. IEEE Transactions on Consumer Electronics, 46 (3), 415–421.CrossRefGoogle Scholar
  20. 20.
    Srivastava R, Kumar B, Singh AK, Mohan A (2018) Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach. Multimedia Tools and Applications, 77(13), 16447-16459, Springer US DOI: 10.1007/s11042-017-5214-8.CrossRefGoogle Scholar
  21. 21.
    Parah SA, Sheikh JA, Loan NA and Bhat GM (2016b) Robust and blind watermarking technique in DCT domain using inter-block coefficient, Digital Signal Processing, Elsevier, DOI: 10.1016/j.dsp.2016.02.005.CrossRefGoogle Scholar
  22. 22.
    Sheikh JA, Parah SA, Assad UI, Bhat GM (2016b) Realization and robustness evaluation of a blind spatial domain watermarking technique’, International Journal of Electronics, DOI: 10.1080/00207217.2016.1242162.CrossRefGoogle Scholar
  23. 23.
    Singh AK, Kumar B, Singh G, Mohan A (Eds.) (2017). Medical image watermarking: techniques and applications. Springer, ISBN: 978-3319576985.Google Scholar
  24. 24.
    Parah S, Sheikh J, Bhat, GM (2012a) On the realization of secure and efficient data hiding system using ISB and LSB technique, Engineering E-Transaction, Malaysia, Vol. 7, No. 2, pp.48–53, ISSN: 1823-6379.Google Scholar
  25. 25.
    Parah S, Sheikh J, Bhat GM (2013a) High capacity data embedding using joint intermediate significant bit and least significant technique’, International Journal of Information Engineering and Applications, Vol. 2, No. 11, pp.1–11.Google Scholar
  26. 26.
    Hurrah NN, Loan NA, Parah SA, Sheikh JA (2017, December). A transform domain based robust color image watermarking scheme for single and dual attacks. In Image Information Processing (ICIIP), 2017 Fourth International Conference on (pp. 1-5). IEEE.Google Scholar
  27. 27.
    Hurrah NN, Parah SA, Loan NA, Sheikh JA, Elhoseny M, Muhammad K, (2019). Dual watermarking framework for privacy protection and content authentication of multimedia. Future Generation Computer Systems, 94, 654–673. DOI: 10.1016/j.future.2018.02.023.Google Scholar
  28. 28.
    Loan NA, Parah SA, Sheikh JA, Bhat GM (2017) Utilizing neighbourhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks, Multidimentional Systems and Signal Processing, DOI: 10.1007/s11045-017-0490-z.MathSciNetCrossRefGoogle Scholar
  29. 29.
    Ahad F, Parah SA, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique, Journal of Biomedical Informatics, February, Vol. 66, pp.214–230 [online] DOI: (accessed 21 September 2017).
  30. 30.
    Kavitha KJ, Shan PB (2018) Joint Digital Water Marking for Medical Images for Improving Security. Biomedical and Pharmacology Journal, 11(2).Google Scholar
  31. 31.
    Loan NA, Parah SA, Sheikh JA, Bhat GM (2016b) A robust and computationally efficient digital watermarking technique using inter block pixel differencing, Multimedia Forensics and Security, Vol. 115, Springer DOI: 10.1007/978-3-319-44270-9_10.Google Scholar
  32. 32.
    Abhilasha Sharma, Amit Kumar Singh and S P Ghrera, Sharma, Secure Hybrid Robust Watermarking Technique for Medical Images. Procedia Computer Science 70 (2015), 778 – 784.CrossRefGoogle Scholar
  33. 33.
    Verma VS, Jha RK, Ojha A (2015) Significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Systems with Applications, 42(21), pp.8184-8197.CrossRefGoogle Scholar
  34. 34.
    Kang X, Huang J, Shi YQ, Lin Y (2003) A DWT-DFT composite watermarking scheme robust to both affine transform and jpeg compression. IEEE T. Circ. Syst. Vid. 13, 776–786 (2003). doi:10.1109/TCSVT.2003.815957.CrossRefGoogle Scholar
  35. 35.
    LP Feng, LB Zheng, P Cao, in 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT). A DWT-DCT Based Blind Watermarking Algorithm for Copyright Protection, vol. 7, (2010), pp. 455–458. doi:10.1109/ICCSIT.2010.5565101.Google Scholar
  36. 36.
    RH Laskar, M Choudhury, K Chakraborty, S Chakraborty, in Computer Networks and Intelligent Computing. Communications in Computer and Information Science. A Joint DWT-DCT Based Robust Digital Watermarking Algorithm for Ownership Verification of Digital Images, vol. 157 (Springer Berlin, Germany, 2011), pp. 482–491. doi:10.1007/978-3-642-22786-8_61.Google Scholar
  37. 37.
    Benoraira A, Benmahammed K, Boucenna N (2015) Blind image watermarking technique based on differential embedding in DWT and DCT domains. EURASIP Journal on Advances in Signal Processing, 2015(1), p.55.Google Scholar
  38. 38.
    Thakur S, Singh AK, Ghrera SP, Mohamed Elhoseny (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications, Multimedia Tools and Applications, Springer, pp. 1-14, DOI: 10.1007/s11042-018-6263-3CrossRefGoogle Scholar
  39. 39.
    Parah SA, Sheikh JA, Bhat GM (2015e) Hiding in encrypted images: a three tier security data hiding system, Multidimensional Systems and Signal Processing, September, Springer, DOI: 10.1007/s11045-015-0358-z.CrossRefGoogle Scholar
  40. 40.
    Thakur, S., Singh, A. K., Ghrera, S. P., & Mohan, A. (2018). Chaotic based secure watermarking approach for medical images. Multimedia Tools and Applications, 1-14. Springer, DOI: 10.1007/s11042-018-6691-0.Google Scholar
  41. 41.
    Shao Z, Shang Y, Zhang Y, Liu X, Guo G (2016) Robust watermarking using orthogonal Fourier–Mellin moments and chaotic map for double images. Signal Processing, 120, pp.522-531.CrossRefGoogle Scholar
  42. 42.
    Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang Y (2015) An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Communications in Nonlinear Science and Numerical Simulation, 23(1), 2015, 294-310.MathSciNetCrossRefGoogle Scholar
  43. 43.
    Kanso A, Ghebleh M (2015) An efficient and robust image encryption scheme for medical applications. Communications in Nonlinear Science and Numerical Simulation, vol. 24, no. 1, 2015, pp. 98-116.MathSciNetCrossRefGoogle Scholar
  44. 44.
    Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access, 6, 19876-19897.CrossRefGoogle Scholar
  45. 45.
    Lin YK, A data hiding scheme based upon DCT coefficient modification Comput. Standards Int., vol. 36, no. 56, pp. 855-862, 2014.CrossRefGoogle Scholar
  46. 46.
    MedPix™ Medical Image Database, available at:, .
  47. 47.
    Openi™ Medical Image Database, available at:
  48. 48.
    The USC-SIPI Image Database, available at:
  49. 49.
    Zhang H, Wang C, Zhou X (2017) A robust image watermarking scheme based on SVD in the spatial domain. Future Internet, 9(3), 45.Google Scholar
  50. 50.
    Yuefeng Z, & Li, L. (2015). Digital image watermarking algorithms based on dual transform domain and self-recovery. International Journal on Smart Sensing & Intelligent Systems, 8(1).Google Scholar
  51. 51.
    Thanki R, Borra S, Dwivedi V, Borisagar K (2017) An efficient medical image watermarking scheme based on FDCuT–DCT. Engineering Science and Technology, an International Journal, 20(4), 1366-1379.CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Nasir N. Hurrah
    • 1
  • Shabir A. Parah
    • 1
  • Javaid A. Sheikh
    • 1
  1. 1.Department of Electronics and Instrumentation TechnologyUniversity of KashmirSrinagarIndia

Personalised recommendations