Advertisement

Reversible Watermarking for Protecting Patient’s Data Privacy Using an EPR-Generated QR Code

  • Alaa H. ElSaadawyEmail author
  • Ahmed S. ELSayed
  • M. N. Al-Berry
  • Mohamed Roushdy
Conference paper
  • 120 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1153)

Abstract

As a result of the modern communication technology and the transmission of medical images from one place to another, watermarking has become urgent to protect copyright, authentication and integrity of medical images and patient’s information. This paper proposes a solution to the authentication and integrity problems by proposing a fragile reversible watermarking scheme. The proposed scheme generates a Quick Response (QR) code from the patient’s data and uses it as a watermark hidden in the medical image. The proposed scheme resulted in an average Peak Signal to Noise Ratio (PSNR) of 51.25 dB for a payload of one bit per pixel (1 bpp), Structural Similarity Index Measure (SSIM) of 0.99 and Mean Squared Error (MSE) of 0.488 indicating that the watermarked images obtained are of high visual quality.

Keywords

Watermarking QR code Fragile Medical imaging Tamper detection 

References

  1. 1.
    Abbasi, F., Memon, N.A.: Reversible watermarking for the security of medical image databases. In: IEEE (2018)Google Scholar
  2. 2.
    Memon, N.A., Gilani, S.A.M.: NROI watermarking of medical images for content authentication. In: Proceedings of 12th International IEEE Multi-topic Conference (INMIC 2008), pp. 106–110 (2008)Google Scholar
  3. 3.
    Mousavi, S.M., Naghsh, A., Abu-Bakar, S.A.R.: Watermarking techniques used in medical images: a survey. J. Digit. Imaging 27, 714–729 (2014)CrossRefGoogle Scholar
  4. 4.
    Coatrieux, G., Montanger, J., Huang, H., Roux, Ch.: Mixed reversible and RONI watermarking for medical image reliability protection. In: 29th IEEE International Conference of EMBS, Lyon (2007)Google Scholar
  5. 5.
    Kuang, L.Q., Zhang, Y., Han, X.: A medical image authentication system based on reversible digital watermarking. In: 2009 1st International Conference, pp. 1047–1050 (2009)Google Scholar
  6. 6.
    Bhatnagar, G., Jonathan, W.U.Q.M.: Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform. Future Gen. Comput. Syst. 29, 182–195 (2013)CrossRefGoogle Scholar
  7. 7.
    Pan, W., Coatrieux, G., Cuppens-Boulahia, N., Cuppens, F., Roux, C.: Medical image integrity control combining digital signature and lossless watermarking. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., Roudier, Y. (eds.) Data Privacy Management and Autonomous Spontaneous Security, pp. 153–162. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  8. 8.
    Agrawal, R., Sharma, M.: Patient record data hiding in medical images using M-ary modulation. Res. J. Eng. Sci. 5(9), 5–10 (2016)Google Scholar
  9. 9.
    Chang, Y.J., Wang, R.Z., Lin, J.C.: Sharing based fragile watermarking method for authentication and self recovery of image tampering. EURASIP J. Adv. Signal Process. (2008)Google Scholar
  10. 10.
    Memon, N.A., Keerio, Z.A., Abbasi, F.: Dual watermarking of CT scan medical images for content authentication and copyright protection. In: Shaikh, F.K., et. al. (eds.) IMTIC 2013, Communications in Computer and Information Science, vol. 14, pp. 173–183. Springer (2014)Google Scholar
  11. 11.
    Zain, J.M., Clarke, M.: Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. Int. J. Comput. Sci. Netw. Secur. 7(9), 19–28 (2007)Google Scholar
  12. 12.
    Wu, N.-I., Hwang, M.-S.: Data hiding current status and key issues. Int. J. Netw. Secur. 4(1), 1–9 (2007)Google Scholar
  13. 13.
    Punidha, R., Sivaram, M.: Integer wavelet transform based approach for high robustness of audio signal transmission. Int. J. Pure Appl. Math. 116(23), 295–303 (2017)Google Scholar
  14. 14.
    Ramos, R., Valdez-Salas, B., Zlatev, R., Wiener, M.S., Rull, J.M.B.: The discrete wavelet transform and its application for noise removal in localized corrosion measurements. Hindawi Int. J. Corros. 2017, 1–7 (2017)CrossRefGoogle Scholar
  15. 15.
    Ahmed, N., Natarajan, T., Rao, K.R.: Discrete cosine transform. IEEE Trans. Comput. C-23(1), 90–93 (1974)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Heylena, K., Dams, T.: An image watermarking tutorial tool using matlab. In: Mathematics of Data/Image Pattern Recognition, Compression, and Encryption with Applications XI, Proceedings of SPIE, pp. 1–12 (2008)Google Scholar
  17. 17.
    Mohanty, S.P., Ramakrishnan, K.R.: A dual watermarking technique for images. In: Proceedings of the 7th ACM International Multimedia. ACM Press (1999)Google Scholar
  18. 18.
    Memon, N.A., Chaudhry, A., Ahmad, M., Keerio, Z.A.: Hybrid watermarking of medical images for ROI authentication and recovery. Int. J. Comput. Math. 88(10), 2057–2071 (2011)CrossRefGoogle Scholar
  19. 19.
    Jabade, V.S., Gengaje, S.R.: Literature review of wavelet-based digital image watermarking techniques. Int. J. Comput. Appl. 31(1), 28–35 (2011)Google Scholar
  20. 20.
    Memon, N.A., Gilani, S.A.M.: Watermarking of chest CT scan medical images for content authentication. Int. J. Comput. Math. 88(2), 265–280 (2010)CrossRefGoogle Scholar
  21. 21.
    Kaur, M., Kaur, R.: Reversible watermarking of medical images authentication and recovery-a survey. J. Inf. Oper. Manag. 39(1), 241–244 (2012)Google Scholar
  22. 22.
    Kaya, V., Elbasi, E.: Robust medical image watermarking using frequency domain and least significant bits algorithms. In: IEEE (2018)Google Scholar
  23. 23.
    Jane, O., Elbasi, E.: A new approach in non-blind watermarking method based on DWT and SVD via LU decomposition. Turkish J. Electr. Eng. Comput. Sci. 22(5), 1354–1366 (2013)Google Scholar
  24. 24.
    Gull, S., Loan, N.A., Parah, S.A., Sheikh, J.A., Bhat, G.M.: An efficient watermarking technique for tamper detection and localization of medical images. J. Ambient Intell. Humaniz. Comput. (2018)Google Scholar
  25. 25.
    Shehab, A., Elhoseny, M., Muhammad, K., Sangaiah, A.K., Yang, P., Huang, H., Hou, G.: Secure and robust fragile watermarking scheme for medical images. Digit. Object Identifier 6, 10269–10278 (2018)Google Scholar
  26. 26.
    Li, M., Liang, T., He, Y.: Arnold transform based image scrambling method. In: 2013, 3rd International Conference on Multimedia Technology (ICMT 2013) (2013)Google Scholar
  27. 27.
    Sharma, A., Singh, A.K., Ghrera, S.P.: Robust and secure multiple watermarking for medical images. Wireless Pers. Commun. 92, 1611–1624 (2016)CrossRefGoogle Scholar
  28. 28.
    Kavitha, K.J., Shan, P.B.: An efficient medical image watermarking technique using integer wavelet transform and quick/fast response codes. Int. J. Intell. Syst. Technol. Appl. 18(3), 271–280 (2019)Google Scholar
  29. 29.
    Singh, R.P., Dwivedi, S.S.: Advanced medical image watermarking technique of hiding patient information for medical image authentication. Int. J. Eng. Tech. Res. (IJETR) 8(5), 22–29 (2018)Google Scholar
  30. 30.
    Singh, C., Ranade, S.K.: Geometrically invariant and high capacity image watermarking scheme using accurate radial transform. Opt. Laser Technol. 54, 176–184 (2013)CrossRefGoogle Scholar
  31. 31.
    Hosny, K.M., Darwish, M.M., Li, K., Salah, A.: Parallel multi-core CPU and GPU for fast and robust medical image watermarking. IEEE Access 6, 77212–77225 (2018)CrossRefGoogle Scholar
  32. 32.
    Zhangetal, H.: Affine Legendre moment invariants for image watermarking robust to geometric distortions. IEEE Trans. Image Process. 20(8), 2189–2199 (2011)MathSciNetCrossRefGoogle Scholar
  33. 33.
    Tsougenis, E.D., Papakostas, G.A., Koulouriotis, D.E., Tourassis, V.D.: Performance evaluation of moment-based watermarking methods: a review. J. Syst. Softw. 85(8), 1864–1884 (2013)CrossRefGoogle Scholar
  34. 34.
    https://openi.nlm.nih.gov/. Accessed 31 Aug 2019

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Alaa H. ElSaadawy
    • 1
    Email author
  • Ahmed S. ELSayed
    • 1
  • M. N. Al-Berry
    • 1
  • Mohamed Roushdy
    • 2
  1. 1.Faculty of Computer and Information SciencesAin Shams UniversityCairoEgypt
  2. 2.Faculty of Computers and Information TechnologyFuture University in EgyptNew CairoEgypt

Personalised recommendations