Skip to main content

Watermarking in Biomedical Signal Processing

  • Chapter
  • First Online:
Intelligent Techniques in Signal Processing for Multimedia Security

Abstract

Recently, by means of technological innovation in communication networks and information, it has assisted healthcare experts across the world to seek high-quality diagnosis as well as to communicate each other as second opinions via enabling extensive and faster access to the patients’ electronic medical records, such as medical images. Medical images are extremely precious owing to its importance in diagnosis, education, and research. Recently, telemedicine applications in telediagnoisis, teleconsulting, telesurgery, and remote medical education play an imperative role in the advancement of the healthcare industry. Nevertheless, medical images are endured security risk, such as images tampering to comprise false data which may direct to wrong diagnosis and treatment. Consequently, watermarking of medical images offers the compulsory control over the flow of medical information. It is the typically used data hiding technique in the biomedical information security domain and legal authentication. In the field of telemedicine, exchange of medical signals is a very common practice. The signals are transmitted through the web and the wireless unguided media. The security and the authenticity are the matter of concern due to the various attacks on the web. Any type of the signals vulnerability in the biomedical data is not acceptable for the sake of proper diagnosis. A watermark is used to prove the ownership of the exchanged data. The logos of the hospitals or medical centers and electronic patient’s report card can be added to the biomedical signals as a watermark to establish the property right. This work provides an extensive view about the existing research works in the field of watermarking techniques on different biomedical signals. It includes the design and evaluation parameters serving as a guideline in the watermarking schemes′ development and benchmarking. This work also provides the comparative study between different watermarking methods. It reviews several aspects about digital watermarking in the medical domain. Also, it presented the properties of watermarking and several applications of watermarking. Meanwhile, it discusses the requirements and challenges that the biomedical watermarking process face.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ledzewicz U, Schattler H (2002) Sufficient conditions for optimality of controls in biomedical systems. In: Proceedings of the 41st IEEE conference on decision and control 3: 3524–3529

    Google Scholar 

  2. Al Giakoumaki, Perakis K, Tagaris A, Koutsouris D (2006) Digital watermarking in telemedicine applications-towards enhanced data security and accessibility. Conf Proc IEEE Eng Med Biol Soc. 1:6328–6331

    Google Scholar 

  3. Moghadas A, Jamshidi M, Shaderam M (2008) Telemedicine in healthcare system. World Automation Congress (WAC 2008), pp 1–6

    Google Scholar 

  4. Barni M, Bartolini FD (2004) Data hiding for fighting piracy. IEEE Signal Process Mag 21(2):28–39

    Article  Google Scholar 

  5. Coatrieux G, Maître H, Sankur B, Rolland Y, Collorec R (2000) Relevance of Watermarking in Medical Imaging. Conf. Proc. IEEE Int. ITAB, USA, pp 250–255

    Google Scholar 

  6. Delp E (2005) Multimedia security: the 22nd century approach! Proc Workshop Multimed Syst 11(2):95–97

    Article  Google Scholar 

  7. Kumari G, Kumar B, Sumalatha L, Krishna V (2009) Secure and robust digital watermarking on grey level images. Int J Adv Sci Technol 11

    Google Scholar 

  8. Miyazaki A, Okamoto A (2002) Analysis and improvement of correlation-based watermarking methods for digital images. Kyushu University

    Google Scholar 

  9. Jin C, Zhang X, Chao Y, Xu H (2008) Behavior authentication technology using digital watermark. In: International conference on multimedia and information technology (MMIT ‘08), pp 7–10

    Google Scholar 

  10. Jin C, Wang S, Jin S, Zhang Q, Ye J (2009) Robust digital watermark technique for copyright protection. In: International symposium on information engineering and electronic commerce (IEEC ‘09), pp 237–240

    Google Scholar 

  11. Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C (2010) Watermarking to enforce medical image access and usage control policy. In: 2010 Sixth international conference on signal-image technology and internet-based systems (SITIS), pp 251–260

    Google Scholar 

  12. Li M, Narayanan S, Poovendran R (2004) Tracing medical images using multi-band watermarks. In: 26th Conference of the IEEE annual international engineering in medicine and biology society (IEMBS ‘04) 2:3233–3236

    Google Scholar 

  13. Kishore P, Venkatram N, Sarvya C, Reddy L (2014) Medical image watermarking using RSA encryption in wavelet domain. In: 2014 First international conference on networks & soft computing (ICNSC), pp 258–262

    Google Scholar 

  14. Serdean C (2002) Spread spectrum-based video watermarking algorithms for copyright protection. PhD thesis, University of Plymouth

    Google Scholar 

  15. Hu Y, Kwong S (2001) Wavelet domain visible watermarking. IEE Electron Lett 37(20):1219–1220

    Article  Google Scholar 

  16. Mohanty S, Guturu P, Kougianos E, Pati N (2006) A novel invisible color image watermarking scheme using image adaptive watermark creation and robust insertion-extraction. In: Proceedings of the 8th IEEE international symposium on multimedia (ISM), pp 153–160

    Google Scholar 

  17. Razafindradina H, Karim A (2013) Blind and robust images watermarking based on wavelet and edge insertion. Int J Cryptogr Inf Secur (IJCIS) 3(3)

    Google Scholar 

  18. Kumar Y, Vishwakarma P, Nath R (2012) Semi-blind color image watermarking on high frequency band using DWT-SVD. Int J Eng Res Dev 4(3):57–61

    Google Scholar 

  19. Dharwadkar N, Amberker B (2010) An efficient non-blind watermarking scheme for color images using discrete wavelet transformation. Int J Comput Appl 2(3)

    Google Scholar 

  20. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital Watermarking and Steganography. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA. ISBN 978-0123725851

    Google Scholar 

  21. Kumar A, Pooja K (2010) Steganography—a data hiding technique. Int J Comput Appl 9(7)

    Google Scholar 

  22. Caldelli R, Filippini F, Becarelli R (2010) Review article reversible watermarking techniques: an overview and a classification. Hindawi Publishing Corporation EURASIP Journal on Information Security 2010:1–19. doi:10.1155/2010/134546

    Article  Google Scholar 

  23. Maeder A, Planitz B (2005) Medical image watermarking for multiple modalities. In: 34th Workshop proceedings on applied imagery and pattern recognition (AIPR 2005), 19–21 October 2005, Washington, DC, USA

    Google Scholar 

  24. Tsai A, Luh J, Lin T (2012) A modified multi-channel emg feature for upper limb motion pattern recognition. In: 2012 Annual international conference of the IEEE engineering in medicine and biology society 2012:3596–3599

    Google Scholar 

  25. Gut R (2000) High-precision EMG signal decomposition using communication techniques. IEEE Trans Signal Process 48(9)

    Google Scholar 

  26. Wang Z, Ning X, Zhang Y, Gonghuan (2002) Nonlinear dynamic characteristics analysis of synchronous 12-lead ECG signals. IEEE Eng Mag Med Biol 19(5)

    Google Scholar 

  27. Lisha S, Minfen S, Congtao X (2002) Nonlinear analysis of EEG signals based on the parametric bispectral estimation. In: 2002 6th international conference on signal processing, vol 1

    Google Scholar 

  28. Velasquez-martinez L, Murillo-rendon S, Castellanos-dominguez G (2012) Relevance and redundancy analysis of PCG signals in the detection of heart murmurs by anova. In: 2012 XVII symposium of image, signal processing, and artificial vision (STSIVA), pp 190–195

    Google Scholar 

  29. Abdullatif M, Zeki A, Chebil J, Gunawan T (2013) Properties of digital image watermarking. In: 2013 IEEE 9th international colloquium on signal processing and its applications, 8–10 Mac. 2013, Kuala Lumpur, Malaysia

    Google Scholar 

  30. Katariya S (2012) Digital watermarking: review. Int J Eng Innov Technol (IJEIT) 1(2)

    Google Scholar 

  31. Cagalaban G, Kim S (2011) Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption. In: 2011 13th international conference on advanced communication technology (ICACT), pp 863–867

    Google Scholar 

  32. Alhaqbani F, Fidge C (2008) Privacy-preserving electronic health record linkage using pseudonym identifiers. In: Proceedings of 10th international conference on e-Health, Networking, applications and services, pp 108–117

    Google Scholar 

  33. Coatrieux G, Lamard M, Daccache W, Puentes J, Roux C (2005) A low distortion and reversible watermark: application to angiographic images of the retina. In Proceedings of international conference of the IEEE-EMBS, pp 2224–2227

    Google Scholar 

  34. Coatrieux G, Sankur B, Maître H (2001) Strict Integrity Control of Biomedical Images. Proc. Electronic Imaging, Security and Watermarking of Multimedia Contents. SPIE, USA, pp 229–240

    Chapter  Google Scholar 

  35. Li M, Poovendran R, Narayanan S (2005) Protecting patient privacyagainst unauthorized release of medical images in a group communication environment. Comput Med Imaging Graph 29(5):367–383

    Article  Google Scholar 

  36. Zhou X, Huang H, Lou S (2001) Authenticity and integrity of digital mammography images. IEEE Trans Med Imaging 20(8):784–791

    Article  Google Scholar 

  37. Wakatani A (2002) Digital watermarking for ROI medical images by using compressed signature image. In: Proceedings of 35th Hawaii international conference on system sciences, pp 2043–2048

    Google Scholar 

  38. Gupta N, Sharma M (2012) Invisible multiple watermarking with minimum distortion using DWT-DCT-CDMA. Int J Comput Sci Eng Technol (IJCSET) 3(8)

    Google Scholar 

  39. Coatrieux G, Lecornu L, Sankur B, Roux C (2006) A review of image watermarking applications in healthcare. In: International conference IEEE engineering in medicine and biology society, New York, NY, pp 4691–4694

    Google Scholar 

  40. Bouslimi D, Coatrieux G, Roux C (2012) A joint encryption/watermarking system for verifying the reliability of medical images. Comput Methods Biomed 106(1):47–54

    Article  Google Scholar 

  41. Poonkuntran S, Rajesh R, Eswaran P (2009) Wavetree watermarking: an authentication scheme for fundus images. In: Proceedings of IEEE international conference on emerging trends in computing, pp 507–511

    Google Scholar 

  42. Cao F, Huang X, Zhou Q (2003) Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27(2–3):185–196

    Article  Google Scholar 

  43. Umaamaheshvari A, Thanuskodi K (2012) Survey of watermarking algorithms for medical images. Int J Eng Trends Technol 3(3)

    Google Scholar 

  44. Ni R, Ruan Q, Zhao Y (2008) Pinpoint authentication watermarking based on a chaotic system. Int J Forensic Sci 179(1):54–62

    Article  Google Scholar 

  45. Al-Qershi B (2010) Reversible watermarking scheme based on two-dimensional difference expansion (2DDE). In: Second international conference on computer research and development, pp 228–232. doi:10.1109/ICCRD.2010.76

  46. Zhang X, Wang S, Qian Z, Feng G (2010) Reversible fragile watermarking for locating tampered blocks in JPEG images. Sig Process 90(12):3026–3036

    Article  MATH  Google Scholar 

  47. Chaing K, Chang-Chien K, Chang R, Yen H (2008) Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J Digit Imaging 21(1):77–90

    Article  Google Scholar 

  48. Li C, Yang F (2003) One dimensional neighbor forming strategy for fragile watermarking. J Electron Imaging 12(2):284–291

    Article  Google Scholar 

  49. Avcibas I, Nasir M, Sankur B (2001) Steganalysis based on image quality metrics. In: 2001 IEEE fourth workshop on multimedia signal processing, pp 517–522

    Google Scholar 

  50. Planitz B, Maeder A (2005) Medical image watermarking: a study on image degradation. In: Proceedings of Australian pattern recognition society (APRS), pp 3–8

    Google Scholar 

  51. Viswanathan P, Krishna P (2014) A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology. IEEE J Biomed Health Inform 18(3):753–764

    Article  Google Scholar 

  52. Perwej Y, Parwej F, Perwej A (2012) An adaptive watermarking technique for the copyright of digital images and digital image protection. Int J Multimed Its Appl (IJMA) 4(2)

    Google Scholar 

  53. Durvey M, Satyarhi D (2014) A review paper on digital watermarking. IJETTCS 3(4):99–105

    Google Scholar 

  54. Singh Y, Devi B, Singh K (2013) A review of different techniques on digital image watermarking. IJER 2(3):193–199

    Google Scholar 

  55. Mller M, Cox J, kalker T (1999) A review of watermark principal and practices. In: Parhi KK, Nishitani T (eds) Digital signal processing in multimedia system. Marcell Dekar Inc., pp 461–485

    Google Scholar 

  56. Nyeem H, Boles W, Boyd C (2014) Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP Journal on Advances in Signal Processing 2014EURASIP, 2014:135

    Google Scholar 

  57. Raul R, Claudia F, Trinidad-Bias G (2007) Data hiding scheme for medical images. In: Proceedings of the 17th international conference on electronics, communications and computers (CONIELECOMP ‘07), pp 32

    Google Scholar 

  58. Singh P, Chadha R (2013) A survey of digital watermarking techniques, applications and attacks. Int J Eng Innov Technol (IJEIT) 2(9)

    Google Scholar 

  59. Voloshynovskiy S, Pun T, Eggers J, Su J (2001) Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Commun Mag 39(8):118–126

    Article  Google Scholar 

  60. Kong X, Feng R (2001) Watermarking medical signals for telemedicine. IEEE Trans Inf Technol Biomed 5(3):195–201

    Article  Google Scholar 

  61. Engin M, Çidam O, Engin E (2005) Wavelet transformation based watermarking technique for human electrocardiogram (ECG). J Med Syst 29(6):589–594

    Article  Google Scholar 

  62. He X, Tseng K, Huang H, Chen S, Tu S, Zeng F, Pan J (2012) Wavelet-based quantization watermarking for ECG Signals. In: 2012 International conference on computing, measurement, control and sensor network (CMCSN), Taiyuan, China, July 7–9, pp 233–236

    Google Scholar 

  63. Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference communications, devices and intelligent systems (CODIS), pp 624–627

    Google Scholar 

  64. Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri S (2012) Embedding of blink frequency in electrooculography signal using difference expansion based reversible watermarking technique. Buletinul Ştiinţific Al Universităţii “Politehnica” Din Timişoara, Seria Electronică Şi Telecomunicaţii Transactions On Electronics And Communications 57(71)

    Google Scholar 

  65. Nambakhsh M, Ahmadian A, Ghavami M, Dilmaghani R, Karimi-Fard S (2006) A novel blind watermarking of ECG signals on medical images using EZW algorithm. In: Proceedings of the 28th annual international conference of the IEEE engineering in medicine and biology society (Embs’06), New York, USA, 30 Aug 3 Sept 1:3274–3277

    Google Scholar 

  66. Kaur S, Farooq O, Singhal R, Ahuja B (2010) Digital watermarking of ECG data for secure wireless communication. In: Proceedings of the 2010 international conference on recent trends in information, telecommunication and computing (Itc2010), Kochi, Kerala, India, 12–13 March, pp 140–144

    Google Scholar 

  67. Ibaida A, Khalil I, Van Dhiah A (2010) Embedding patients confidential data in ecg signal for healthcare information system. In: Proceeding of the 32nd annual international conference of the IEEE Embs, Buenos Aires, Argentina, 31 Aug 4 Sept., pp 3891–3894

    Google Scholar 

  68. Ibaida A, Khalil I, Van Schyndel R (2011) A low complexity high capacity ECG signal watermark for wearable sensor-net health monitoring system. In: Proceedings of the computing in cardiology (Cinc), Hangzhou, China, 18–21 Sept, pp 393–396

    Google Scholar 

  69. Yina G, Dawei Z (2012) Single channel surface electromyography blind recognition model based on watermarking. J Vib Control 18(1):42–47

    Article  Google Scholar 

  70. Tseng K, He X, Kung W, Chen S, Liao M, Huang H (2014) Wavelet-based watermarking and compression for ECG signals with verification evaluation. Sensors (Basel) 14(2):3721–3736

    Article  Google Scholar 

  71. Dey N, Biswas D, Roy A, Das A (2012) DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal. In: 2012 12th International conference on intelligent systems design and applications (ISDA), pp 680, 685

    Google Scholar 

  72. Dey N, Mukhopadhyay S, Das A, Chaudhuri S (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graphics Signal Process (IJIGSP) 7:33–46

    Article  Google Scholar 

  73. Chen S, Guo Y, Huang H, Kung W, Tseng K, Tu S (2014) Hiding patients confidential datainthe ECG signal via a transform-domain quantization scheme. J Med Syst 38(6):1–8

    Google Scholar 

  74. Sikander B, Ishtiaq M, Jaffar M, Tariq M, Mirza A (2010) Adaptive digital watermarking of images using genetic algorithm. In: 2010 International conference on information science and applications (ICISA). pp 1–8

    Google Scholar 

  75. Kosgharghory S (2011) Hybrid of particle swarm optimization with evolutionary operators to fragile image watermarking based DCT. Int J Comput Sci Inf Technol (ijcsit) 3(3)

    Google Scholar 

  76. Soliman M, Hassanien A, Ghali N, Onsi H (2012) An adaptive watermarking approach for medical imaging using swarm intelligent. Int J Smart Home 6(1)

    Google Scholar 

  77. Lei B, Tan E, Chen S, Ni D, Wang T, Lei H (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41(7):3178–3188

    Article  Google Scholar 

  78. Naheed T, Usman I, Khan T, Dar A, Shafique M (2014) Intelligent reversible watermarking technique in medical images using GA and PSO. Optik Int J Light Electron Optics 125(11)

    Google Scholar 

  79. Reddy V, Siddaiah P (2015) Hybrid LWT-SVD watermarking optimized using metaheuristic algorithms along with encryption for medical image security. Int J Signal Image Process 6(1):75–95

    Article  Google Scholar 

  80. Memon N, Gilani S, Ali A (2009) Watermarking of CT scan medical images for content authentication. In: International conference on information and communication technologies, 2009 (ICICT ‘09), pp 175, 180

    Google Scholar 

  81. Liu J, He X (2005) A review study on digital watermarking. In: First international conference on information and communication technologies (ICICT 2005), pp 337–341

    Google Scholar 

  82. Zkou X, Huang H, Lou S (2001) Authenticity and integrity of digital mammography images. IEEE Trans Med Imaging 20(8):784–791

    Article  Google Scholar 

  83. Sebe F, Ferrer T, Herrera J (2000) Spatial domain image watermarking robust against compression, filtering, cropping and scaling. Springer Image Comput 2:44–53

    MATH  Google Scholar 

  84. Nikolaidis N, Pitas I (1998) Robust image watermarking in spatial domain. IEEE Signal Process Trans 66(3):385–403

    MATH  Google Scholar 

  85. Nandi S, Roy S, Dansana J, Karaa WB, Ray R, Chowdhury SR, Chakraborty S, Dey N (2014) Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system. Int J Comput Netw Inf Secur 6(11):1

    Google Scholar 

  86. Cao F, Huang H, Zhou X (2003) Medical image security in a HIPAA mandated PACS environment. Computerized medical imaging and graphics. IEEE Trans Image Process 27(2–3):185–196

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nilanjan Dey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Dey, N. et al. (2017). Watermarking in Biomedical Signal Processing. In: Dey, N., Santhi, V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44790-2_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44789-6

  • Online ISBN: 978-3-319-44790-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics