Skip to main content

Realization of an Adaptive Data Hiding System for Electronic Patient Record, Embedding in Medical Images

  • Chapter
  • First Online:

Abstract

An adaptive Electronic Patient Record (EPR) hiding system utilizing medical images as cover media has been presented in this chapter. The proposed system is based on embedding the EPR information in Discrete Cosine Transform (DCT) coefficients. Cover medical image is divided into 8 × 8 non-overlapping blocks and DCT is applied on each block. The two predefined coefficients of each 8 × 8 DCT block are used for embedding the EPR information. The proposed system uses an adaptive embedding factor based on mean of a selected block unlike the conventional way of predefining an embedding factor. In order to add an additional layer of security to the EPR, it has been encrypted before embedding it. The proposed algorithms have been evaluated using various image quality matrices like Peak Signal to Noise Ratio (PSNR), Structural Similarity Index (SSIM), and Normalized Cross Co-relation (NCC). The experimental investigations reveal that the proposed scheme is capable of providing better quality watermarked medical images compared to the conventional embedding scheme while maintaining good robustness thus it can be a better option for utilization in a typical e-health care communication system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Wakatani A (2002) Digital watermarking for ROI medical images by using compressed signature image. In: Proceedings of the 35th annual Hawaii international conference on system sciences (HICSS), pp 7–10

    Google Scholar 

  2. Parah SA, Sheikh JA, Bhat GM (2009) On the realization and design of chaotic spread spectrum modulation technique for secure data transmission. In: Proceedings of first IEEE sponsored international conference IMPACT-2009 at AMU Aligarh India, pp 241–244

    Google Scholar 

  3. Parah SA, Sheikh JA, Bhat GM (2013) On the realization of a spatial domain data hiding technique based on intermediate significant bit plane embedding (ISBPE) and post embedding pixel adjustment (PEPA). In: Proceedings of IEEE international conference on multimedia signal processing and communication technologies IMPACT, 23–25 Nov 2013, pp 51–55

    Google Scholar 

  4. Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm for optimization of scaling factors during embedding of manifold medical information: an application in ophthalmology imaging. J Med Imaging Health Inform 4(3):384–394

    Article  Google Scholar 

  5. Bhat GM, Parah SA, Sheikh JA (2014) A secure and efficient spatial domain data hiding technique based on pixel adjustment. Am J Eng Technol Res, US Library Congress, (USA) 14(2):38–44

    Google Scholar 

  6. Farhana A, Bhat GM, Sheikh JA, Parah SA (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform Elsevier. https://doi.org/10.1016/j.jbi.2017.01.006

    Article  Google Scholar 

  7. Loan NA, Sheikh JA, Bhat GM, Parah SA (2017) Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks. Multidim Syst Sign Process. https://doi.org/10.1007/s11045-017-0490-z

    Article  Google Scholar 

  8. Sheikh JA, Parah SA, Farhana A, Loan NA, Bhat GM (2016) Reversible and high capacity data hiding technique for E-healthcare applications. Multimedia Tools Appl. https://doi.org/10.1007/s11042-016-4196-2

    Article  Google Scholar 

  9. Akhoon JA, Parah SA, Sheikh JA, Bhat GM (2016) Information hiding in edges: a high capacity information hiding technique using hybrid edge detection. Multimedia Tools Appl. https://doi.org/10.1007/s11042-016-4253-x

    Article  Google Scholar 

  10. Assad UI, Parah SA, Sheikh JA, Bhat GM (2016) Realization and robustness evaluation of a blind spatial domain watermarking technique. Int J Electron. https://doi.org/10.1080/00207217.2016.1242162

    Article  Google Scholar 

  11. Alhaqbani B, Fidge C (2008) Privacy-preserving electronic health record linkage using pseudonym identifiers. In: Proceedings of 10th international conference e-health networking, applications and services, pp 108–117

    Google Scholar 

  12. Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter- block coefficient differencing. Digit Sig Process Elsevier. https://doi.org/10.1016/j.dsp.2016.02.005

    Article  Google Scholar 

  13. Peleg M, Beimel D, Dori D, Denekamp Y (2008) Situation-based access control: privacy management via modeling of patient data access scenarios. J Biomed Inform Elsevier 41:1028–1040

    Article  Google Scholar 

  14. Sudeb D, Malay KK (2013) Effective management of medical information through ROI-lossless fragile image watermarking technique. Comput Methods Programs Biomed, pp 662–675

    Google Scholar 

  15. Parah SA, Sheikh JA, Farhana A, Loan NA, Bhat GM (2015) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl. https://doi.org/10.1007/s11042-015-3127-y

    Article  Google Scholar 

  16. Darwish A Hassanien AE, Elhoseny M, Sangaiah AK, Muhammad K (2017) The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Humanized Comput First Online: 29 Dec 2017. https://doi.org/10.1007/s12652-017-0659-1

    Article  Google Scholar 

  17. Elhoseny M, Abdelaziz A, Salama A, Riad AM, Sangaiah AK, Muhammad K (2018) A hybrid model of internet of things and cloud computing to manage big data in health services applications. Future Gener Comput Syst, Available online 15 Mar 2018. In Press https://doi.org/10.1016/j.future.2018.03.005

    Article  Google Scholar 

  18. Abdelaziza A, Elhoseny M, Salama AS, Riad AM (2018) A machine learning model for improving healthcare services on cloud computing environment. Measurement 119:117–128. https://doi.org/10.1016/j.measurement.2018.01.022

    Article  Google Scholar 

  19. Ray SR, Shi JH, Jui LL, Tzong WK, Rong JC (2013) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl

    Google Scholar 

  20. Lestriandoko NH, Wirahman T (2010) Reversible watermarking using difference of virtual border for digital image protection. In: International conference on distributed framework and applications (DFmA), 2–3 Aug 2010

    Google Scholar 

  21. Suganya G, Amudha K (2014) Medical image integrity control using joint encryption and watermarking techniques

    Google Scholar 

  22. Osamah MA, Bee EK (2011) Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24:114–125

    Article  Google Scholar 

  23. Baisa LG, Suresh NM (2012) ROI based embedded watermarking of medical images for secured communication in telemedicine. World Acad Sci Eng Technol 6

    Google Scholar 

  24. Tanmay B, Sirshendu H, Chaudhuri SRB (2014) A semi-fragile blind digital watermarking technique for medical image file authentication using stationary wavelet transformation. Int J Comput Appl 104:0975–8887

    Google Scholar 

  25. Lin SD, Chen CF (2000) A robust DCT-based watermarking for copyright protection. IEEE Trans Consum Electron 46:415–421

    Article  Google Scholar 

  26. Kundu MK, Das S (2010) Lossless ROI medical image watermarking technique with enhanced security and high payload embedding. In: Proceedings of the 20th international conference of the pattern recognition Istanbul, Turkey, pp 1457–1460

    Google Scholar 

  27. Chao HM, Hsu CM, Miaou SG (2002) A data hiding technique with authentication, integration and confidentiality for electronic patient records. IEEET Trans Inf Technol Biomed 6:46–52

    Article  Google Scholar 

  28. Acharya UR, Niranjan UC, Iyenger SS, Kannathal N, Min LC (2004) Simultaneous storage of patient information with medical images in the frequency domain. Comput Methods Programs Biomed 76:13–19

    Article  Google Scholar 

  29. Kliem A, Hovestadt M, Kao O (2012) Security and communication architecture for networked medical devices in mobility-aware e-health environments. In: 2012 IEEE first international conference mobile services, pp 112–114

    Google Scholar 

  30. Maity HK, Maity SP (2012) Joint robust and reversible watermarking for medical images. In: Procedia technology 6, pp 275–282

    Article  Google Scholar 

  31. KO LT, Chen JE, Shieh YS, Sin HC, Sung TY (2012) Nested quantization index modulation for reversible watermarking & its application to healthcare information management systems. Comput Math Methods Med

    Google Scholar 

  32. Wang M, Yu J, Jiang G, Peng Z, Shao F, Luo T (2015) New fragile watermarking method for stereo image authentication with localization and recovery. AEU-Int J Electron Commun 69(1):361–370

    Google Scholar 

  33. Parah SA, Farhana A, Sheikh JA, Bhat GM (2015) On the realization of robust watermarking system for medical images. In: 12th IEEE India international conference (INDICON) on electronics, energy, environment, communication, computers, control (E3-C3), Jamia Millia Islamia, New Delhi, 17–20 Dec 2015

    Google Scholar 

  34. Frahana A, Javaid AS, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl. https://doi.org/10.1007/s11042-015-3127-y

    Article  Google Scholar 

  35. Dey N, Parah SA, Sheikh JA, Bhat GM (2017) Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption. J Global Inf Manag 26(4)

    Google Scholar 

  36. Elhoseny M, Ramírez-González G, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596–20608. https://doi.org/10.1109/access.2018.2817615

    Article  Google Scholar 

  37. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278. https://doi.org/10.1109/access.2018.2799240

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shabir A. Parah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Parah, S.A., Ahmad, I., Loan, N.A., Muhammad, K., Sheikh, J.A., Bhat, G.M. (2019). Realization of an Adaptive Data Hiding System for Electronic Patient Record, Embedding in Medical Images. In: Hassanien, A., Elhoseny, M., Ahmed, S., Singh, A. (eds) Security in Smart Cities: Models, Applications, and Challenges. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-01560-2_3

Download citation

Publish with us

Policies and ethics