A Review of Digital Watermarking Applications for Medical Image Exchange Security

  • A. Hassani AllafEmail author
  • M. Ait Kbir
Conference paper
Part of the Lecture Notes in Intelligent Transportation and Infrastructure book series (LNITI)


In this paper, we present the usage of watermarking techniques in medical imaging, and especially for security goals, the watermarking is considered a great solution to protect the personal data of patients during the medical images and telemedicine data exchange. This paper is devised in two part. The first one is reserved for an overview on image watermarking with a presentation of the most important requirements of watermarking (robustness, imperceptibility and capacity). We offer also the general scheme of watermarking with the two essential phases and different types of attacks. Furthermore, we present a classification of watermarking techniques based on various parameters such as: insertion domain, human perception and detection methods, in the end of the section we display some metrics and benchmarks for analysis the performance of the watermarking technique. The second part is reserved for the usage of watermarking techniques in medical imaging especially for integrity verification, authentication and data hiding, we also discuss a literature review on watermarking techniques for medical image. In addition we present the concept of telemedicine and telehealth fields and the importance of watermarking in the modern health care.


Watermarking Medical imaging Medical image watermarking (MIW) E-health Telemedicine 


  1. 1.
    Desai, H.V., Beri, P., Raj, D.J.: Steganography, Cryptography, Watermarking: A Comparative Study. p. 3, (2010)Google Scholar
  2. 2.
    Fridrich, J.: Applications of data hiding in digital images. In: Tutorial for the ISSPA, Conference in Melbourne, Australia, Nov-1998Google Scholar
  3. 3.
    Tao, H., Chongmin, L., Jasni, M.Z., Ahmed, N.A.: Robust Image Watermarking Theories and Techniques: A ReviewGoogle Scholar
  4. 4.
    Mitesh, P., Alpesh, C.: The study of various attacks on digital watermarking technique. Int. J. Adv. Res. Comput. Eng. Technol (IJARCET), (2014)Google Scholar
  5. 5.
    Boreiry, M., Keyvanpour, M.-R.: Classification of watermarking methods based on watermarking approaches. pp. 73–76 (2017)Google Scholar
  6. 6.
    Chawla, G., Saini, R., Yadav, R.: Classification of watermarking based upon various parameters. Int. J. Comput. Appl. 4 (2012)Google Scholar
  7. 7.
    Song, C., Sudirman, S., Merabti, M.: Recent Advances And Classification of Watermarking Techniques in Digital Images, p. 6Google Scholar
  8. 8.
    Naveed, A., Saleem, Y., Ahmed, N., Rafiq, A.: Performance Evaluation and Watermark Security Assessment of Digital Watermarking Techniques, p. 6 (2015)Google Scholar
  9. 9.
    Kuttera, M., Petitcolasb, F.A.P.: A Fair Benchmark for Image Watermarking Systems p. 14Google Scholar
  10. 10.
    Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack modelling: towards a second generation watermarking benchmark. Sig. Process. 81(6), 1177–1214 (2001)CrossRefGoogle Scholar
  11. 11.
    Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Signal Process. 66(3), 385–403 (1998)CrossRefGoogle Scholar
  12. 12.
    Weinstein, R.S., et al.: Telemedicine, telehealth, and mobile health applications that work: Opportunities and Barriers, Am. J. Med. 183–187, (2014)CrossRefGoogle Scholar
  13. 13.
    Karen, M.Z.: Telemedicine: History, Applications, and Impact on Librarianship. US National Library of Medicine National Institutes of Health (1996)Google Scholar
  14. 14.
    Abhinav, S., Chandan, S.: Medical image authentication through watermarking. Int. J. Adv. Res. Comput. Sci. Technol. (2014)Google Scholar
  15. 15.
    Memon, N.A., Asmatullah, C., Mushtaq, A., Zulfiqar Ali, K.: Hybrid watermarking of medical images for ROI authentication and recovery. Int. J. Comput. Math., 2057–2071, (2011)CrossRefGoogle Scholar
  16. 16.
    Gunjal, B.L., Mali, S.N.: ROI based embedded watermarking of medical images for secured communication in telemedicine, 6(8), 6 (2012)Google Scholar
  17. 17.
    Al-Qershi, O.M., Khoo, B.E.: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J. Digit. Imaging 24(1), 114–125 (2011)CrossRefGoogle Scholar
  18. 18.
    Hajjaji, M.A., Ridha, H., Abdellatif, M., El-Bey, B.: ‘Tatouage des Images Médicales en Vue d’Intégrité et de Confidentialité des Données’, p. 7Google Scholar
  19. 19.
    Boris, V.: ‘Technique multicouches pour le tatouage d’images et adaptation aux flux vidéo MPEG-2 et MPEG-4’, Grenoble INPG, (2003)Google Scholar
  20. 20.
    Vassaux, B., Bas, P., Chassery, J.M.:‘Tatouage d’images par étalement de spectre : apport de la technique CDMA en mode multicouche’ 8 (2000)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.LIST Laboratory, Faculty of Sciences and TechnologiesTangierMorocco

Personalised recommendations