Advertisement

Secure Spread Spectrum Based Multiple Watermarking Technique for Medical Images

  • Amit Kumar SinghEmail author
  • Basant Kumar
  • Ghanshyam Singh
  • Anand Mohan
Chapter
Part of the Multimedia Systems and Applications book series (MMSA)

Abstract

In this chapter, the authors presents a new spread-spectrum based secure multiple watermarking (image and text) method for medical images in wavelet transform domain. The proposed method is applied for embedding patient identity reference as text watermark and telemedicine centre logo as the image watermark into the host medical image. The algorithm is based on secure spread-spectrum technique where pseudo-noise (PN) sequences are generated corresponding to each watermark bit of the image watermark. These PN sequences are embedded column wise into the selected wavelet coefficients in the DWT sub-band. The selection of the wavelet coefficients for embedding is performed by thresholding the coefficient values present in that column. In order to enhance the robustness of text watermarks, an error correcting code (ECC) is applied to the ASCII representation of the text watermark before embedding. The results are obtained by varying the gain factor, sub-band decomposition levels, size of watermark, and different cover images. The performance of the proposed watermarking method is analyzed against known attacks. The method was found to be robust against such attacks. Further, the performance of the proposed method has been extensively evaluated for the text watermark along with BCH code and encryption techniques. The performance of the methods are compared with other reported techniques and have been found to be giving superior performance in terms of robustness, imperceptibility, embedding capacity and security as suggested by other authors. Moreover, the performance of the multiple watermarking method is also tested with encryption and BCH error correction code simultaneously.

Keywords

Spread-spectrum DWT BCH Pseudo-noise ASCII Encryption 

References

  1. 1.
    O. Vikas, Multilingualism for cultural diversity and universal access in cyberspace: an Asian perspective, UNESCO, May 2005Google Scholar
  2. 2.
    B. Kumar, H.V. Singh, S.P. Singh, A. Mohan, Secure spread-spectrum watermarking for telemedicine applications. J. Inf. Security 2(2), 91–98 (2011)CrossRefGoogle Scholar
  3. 3.
    G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland, R. Collorec, Relevance of watermarking in medical imaging, in Proceeding of the Information Technology Applications in Biomedicine, pp. 250–255, 2000Google Scholar
  4. 4.
    C. Pujara, A. Bhardwaj, V.M. Gadre, Secured watermarking fractional wavelet domains. IETE J. Res. 53(6), 573–580 (2007)CrossRefGoogle Scholar
  5. 5.
    B. Kumar, A. Anand, S.P. Singh, A. Mohan, High capacity spread-spectrum watermarking for telemedicine applications. World Acad. Sci. Eng. Technol. 5, 58–62 (2011)Google Scholar
  6. 6.
    I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  7. 7.
    H.S. Malvar, D.A.F. Florencio, Improved spread spectrum: a new modilation technique for robust watermarking. IEEE Trans. Signal Process. 51(4), 898–905 (2003)MathSciNetCrossRefGoogle Scholar
  8. 8.
    L. Perez-Freire, F. Perez-Gonzalez, Spread-spectrum watermarking security. IEEE Trans. Inf. Forensics Security 4(1), 2–24 (2009)CrossRefGoogle Scholar
  9. 9.
    G. Xuan, C. Yang, Y. Zheng, Y.Q. Shi, Z. Ni, Reversible data hiding based on wavelet spread spectrum, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, pp. 211–214, 2004Google Scholar
  10. 10.
    B. Kumar, S.B. Kumar, D.S. Chauhan, Wavelet based imperceptible medical image watermarking using spread-spectrum, in Proceeding of 37th International Conference on Telecommunications and Signal Processing, Berlin, Germany, pp. 660–664, 2014Google Scholar
  11. 11.
    J. Domingo-Ferrer, F. Sebé, Invertible spread-spectrum watermarking for image authentication and multilevel access to precision-critical watermarked images, in Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 1–6, 2002Google Scholar
  12. 12.
    T.S. Das, V.H. Mankar, S.K. Sarkar, Spread spectrum based robust image watermark authentication, in International Conference, Madurai, India, pp. 673–676, 2007Google Scholar
  13. 13.
    A.K. Singh, B. Kumar, M. Dave, A. Mohan, Robust and imperceptible spread-spectrum watermarking for telemedicine applications. Proc. Natl. Acad. Sci., India, Sect. A: Phys. Sci. (2015). doi: 10.1007/s40010-014-0197-6
  14. 14.
    A.K. Singh, M. Dave, A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wirel. Pers. Commun. 83(3), 2133–2150 (2015)CrossRefGoogle Scholar
  15. 15.
    MedPix TM Medical Image Database available at http://rad.usuhs.mil/medpix/medpix.html
  16. 16.
    A. Giakoumaki, S. Pavlopoulos, D. Koutsouris, Secure and efficient health data management through multiple watermarking on medical images. Med. Biol. Eng. Comput. 44, 619–631 (2006)CrossRefGoogle Scholar
  17. 17.
    N. Terzija, M. Repges, K. Luck, W. Geisselhardt, Digital image watermarking using DWT: performance comparison on error correcting codes, in Visualization, Imaging, and Image Processing Proceeding (364), 2002Google Scholar
  18. 18.
    K. Wu, W. Yan, J. Du, A robust dual digital-image watermarking technique, in International Conference on Computational Intelligence and Security Workshop, pp. 668–671, 2007Google Scholar
  19. 19.
    C. Chemak, M.S. Bouhlel, J.C. Lapayre, A new scheme of robust image watermarking: the double watermarking algorithm, in Proceedings of the 2007 Summer Computer Simulation Conference, SCSC 2007, San Diego, CA, USA, pp. 1201–1208, 2007Google Scholar
  20. 20.
    H. Shen, B. Chen, From single watermark to dual watermark: a new approach for image watermarking. Comput. Electr. Eng. 38, 1310–1324 (2012)CrossRefGoogle Scholar
  21. 21.
    A. Singh, A. Tayal, Choice of wavelet from wavelet families for DWT–DCT–SVD image watermarking. Int. J. Comput. Appl. 48(17), 9–14 (2012)Google Scholar
  22. 22.
    M.I. Khan, M.M. Rahman, M.I.H. Sarker, Digital watermarking for image authentication based on combined DCT, DWT, and SVD transformation. Int. J. Comput. Sci. 10(5), 223–230 (2013)Google Scholar
  23. 23.
    A. Srivastava, P. Saxena, DWT-DCT-SVD based semi blind image watermarking using middle frequency band. IOSR J. Computer Eng. 12(2), 63–66 (2013)CrossRefGoogle Scholar
  24. 24.
    N.J. Harish, B.B.S. Kumar, A. Kusagur, Hybrid robust watermarking techniques based on DWT, DCT, and SVD. Int. J. Adv. Electr. Electron. Eng. 2(5), 137–143 (2013)Google Scholar
  25. 25.
    B.L. Gunjal, R.R. Manthalkar, An overview of transform domain robust digital image watermarking algorithms. J. Emerg. Trends Computer Inf. Sci. 2(1), 13–16 (2011)Google Scholar
  26. 26.
    F. Chen, H. He, Y. Huo, H. Wang, Self-recovery fragile watermarking scheme with variable watermark payload, Proceedings of the 10th International Conference on Digital-Forensics and Watermarking, Atlantic City, NY, pp. 142–155, 2011Google Scholar
  27. 27.
    N.H. Divecha, N.N. Jani, Image watermarking algorithm using DCT, DWT and SVD, in Proceedings on National Conference on Innovative Paradigms in Engineering and Technology, vol. 10, 2012, pp. 13–16Google Scholar
  28. 28.
    K.A. Navas, A.M. Cheriyan, M. Lekshmi, S.A. Tampy, M. Sasikumar, DWT–DCT–SVD based watermarking, in Proceedings of the 3rd International Conference on Communication Systems Software and Middleware and Workshop, Bangalore, pp. 271–274, 2008Google Scholar
  29. 29.
    B. Wang, J. Ding, Q. Wen, X. Liao, C. Liu, An image watermarking algorithm based on DWT DCT and SVD, in IEEE International Conference on Network Infrastructure and Digital Content, Beijing, pp. 1034–1038, 2009Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Amit Kumar Singh
    • 1
    Email author
  • Basant Kumar
    • 2
  • Ghanshyam Singh
    • 3
  • Anand Mohan
    • 4
  1. 1.Department of Computer Science & EngineeringJaypee University of Information TechnologyWaknaghat, SolanIndia
  2. 2.Department of Electronics and Communication EngineeringMotilal Nehru National Institute of TechnologyAllahabadIndia
  3. 3.Department of Electronics and Communication EngineeringJaypee University of Information TechnologyWaknaghat, SolanIndia
  4. 4.Department of Electronics EngineeringIndian Institute of Technology (BHU)VaranasiIndia

Personalised recommendations