Advertisement

Secure Multiple Watermarking Technique Using Neural Networks

  • Amit Kumar SinghEmail author
  • Basant Kumar
  • Ghanshyam Singh
  • Anand Mohan
Chapter
Part of the Multimedia Systems and Applications book series (MMSA)

Abstract

This chapter presents an algorithm for multiple watermarking based on discrete wavelet transforms (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) is proposed for healthcare applications. For identity authentication purpose, the proposed method uses three watermarks in the form of medical Lump image watermark, the doctor signature/identification code and diagnostic information of the patient as the text watermarks. In order to improve the robustness performance of the image watermark, Back Propagation Neural Network (BPNN) is applied to the extracted image watermark to reduce the noise effects on the watermarked image. The security of the image watermark is also enhanced by using Arnold transform before embedding into the cover. Further, the symptom and signature text watermarks are also encoded by lossless arithmetic compression technique and Hamming error correction code respectively. The compressed and encoded text watermark is then embedded into the cover image. Experimental results are obtained by varying the gain factor, different sizes of text watermarks and the different cover image modalities. The results are provided to illustrate that the proposed method is able to withstand a different of signal processing attacks and has been found to be giving excellent performance for robustness, imperceptibility, capacity and security simultaneously. The robustness performance of the method is also compared with other reported techniques. Finally, the visual quality of the watermarked image is evaluated by the subjective method also. This shows that the visual quality of the watermarked images is acceptable for diagnosis at different gain factors. Therefore, the proposed method may find potential application in prevention of patient identity theft in healthcare applications.

Keywords

Multimedia data Discrete wavelet transforms Discrete cosine transform Singular value decomposition Back propagation neural network Healthcare 

References

  1. 1.
    H. Nyeem, W. Boles, C. Boyd, A review of medical image watermarking requirements for teleradiology. J. Digit. Imaging 26(2), 326–343 (2013)CrossRefGoogle Scholar
  2. 2.
    A.M. Elmisery, S. Rho, D. Botvich, A distributed collaborative platform for personal health profiles in patient-driven health social network. IJDSN Hindawi Publ. Corp. 2015, 1–12 (2015)Google Scholar
  3. 3.
    A.K. Singh, B. Kumar, M. Dave, A. Mohan, Multiple watermarking on medical images using selective DWT coefficients. J. Med. Imaging Health Inf. 5(3), 607–614 (2015)CrossRefGoogle Scholar
  4. 4.
    A.K. Singh, M. Dave, A. Mohan, Robust and secure multiple watermarking in wavelet domain. A special issue on advanced signal processing technologies and systems for healthcare applications (ASPTSHA). J. Med. Imaging Health Inf. 5(2), 406–414 (2015)CrossRefGoogle Scholar
  5. 5.
    A. Giakoumaki, S. Pavlopoulos, D. Koutsouris, Secure and efficient health data management through multiple watermarking on medical images. Med. Biol. Eng. Comput. 44, 619–631 (2006)CrossRefGoogle Scholar
  6. 6.
    A. Giakoumaki, S. Pavlopoulos, D. Koutsouris, Multiple image watermarking applied to health information management. IEEE Trans. Inf. Technol. Biomed. 10, 722–732 (2006)CrossRefGoogle Scholar
  7. 7.
    A.K. Singh, Improved hybrid technique for robust and imperceptible multiple watermarking using digital images. Multimedia Tools Appl. 76(6), 8881–8900 (2017)CrossRefGoogle Scholar
  8. 8.
    M. Terry, Medical identity theft and telemedicine security. Telemed. e-Health 15(10), 928–932 (2009)CrossRefGoogle Scholar
  9. 9.
  10. 10.
  11. 11.
    A.K. Singh, B. Kumar, M. Dave, S.P. Ghrera, A. Mohan, Digital image watermarking: techniques and emerging applications, in Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (IGI Global, Hershey, 2016), pp. 246–272Google Scholar
  12. 12.
    A.K. Singh, M. Dave, A. Mohan, Hybrid technique for robust and imperceptible multiple watermarking using medical images. J. Multimedia Tools Appl. 75(14), 8381–8401 (2016)CrossRefGoogle Scholar
  13. 13.
    A. Kannammal, S. Subha Rani, Two level security for medical images using watermarking/encryption algorithms. Int. J. Imaging Syst. Technol. 24(1), 111–120 (2014)CrossRefGoogle Scholar
  14. 14.
    K. Pal, G. Ghosh, M. Bhattacharya, Biomedical image watermarking in wavelet domain for data integrity using bit majority algorithm and multiple copies of hidden information. Am. J. Biomed. Eng. 2(2), 29–37 (2012)CrossRefGoogle Scholar
  15. 15.
    A.K. Singh, M. Dave, A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wireless Personal Commun.: Int. J. 83(3), 2133–2150 (2015)CrossRefGoogle Scholar
  16. 16.
    B. Kumar, H.V. Singh, S.P. Singh, A. Mohan, Secure spread-spectrum watermarking for telemedicine applications. J. Inf. Secur. 2, 91–98 (2011)Google Scholar
  17. 17.
    B. Kumar, A. Anand, S.P. Singh, A. Mohan, High capacity spread-spectrum watermarking for telemedicine applications. World Acad. Sci. Eng. Technol. 5, 62–66 (2011)Google Scholar
  18. 18.
    I.J. Cox, J. Kilian, L.F. Thomson, S. Talal, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  19. 19.
    A.K. Singh, B. Kumar, M. Dave, A. Mohan, Robust and imperceptible spread-spectrum watermarking for telemedicine applications. Proc. Natl. Acad. Sci., India, Sect. A: Phys. Sci. 85(2), 295–301 (2015)CrossRefGoogle Scholar
  20. 20.
    A. Sharma, A.K. Singh, S.P. Ghrera, Robust and secure multiple watermarking technique for medical images. Wirel. Pers. Commun. 92(4), 1611–1624 (2017)CrossRefGoogle Scholar
  21. 21.
    R. Pandey, A.K. Singh, B. Kumar, A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology. Multimedia Tools Appl. 75(22), 14381–14397 (2016)CrossRefGoogle Scholar
  22. 22.
    Z. Wei, H. Li, J. Dai, S. Wang, Image watermarking based on genetic algorithm, in IEEE International Conference on Multimedia and Expo, Toronto, ON, pp. 1117–1120, 2006Google Scholar
  23. 23.
    V. Aslantas, A.L. Dogan, S. Ozturk, DWT-SVD based image watermarking using particle swarm optimizer, in IEEE International Conference on Multimedia and Expo, Hannover, pp. 241–244, 2008Google Scholar
  24. 24.
    V. Aslantas, S. Ozer, S. Ozturk, Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Opt. Commun. 282(14), 2806–2817 (2009)CrossRefGoogle Scholar
  25. 25.
    V. Aslantas, An optimal robust digital image watermarking based on SVD using differential evolution algorithm. Opt. Commun. 282(5), 769–777 (2009)CrossRefGoogle Scholar
  26. 26.
    A.R.N. Nilchi, A. Taheri, A new robust digital image watermarking technique based on the discrete cosine transformation and neural network, in International Symposium on Biometrics and Security Technologies, Islamabad, pp. 1–7, 2008Google Scholar
  27. 27.
    C.T. Yen, Y.J. Huang, Frequency domain digital watermark recognition using image code sequences with a back-propagation neural network, Multimedia Tools Appl. 75(16), 9745–9755 (2016)Google Scholar
  28. 28.
    E. Ganic, A.M. Eskicioglu, Robust DWT-SVD domain image watermarking: embedding data in all frequencies, in Proceedings of the 2004 Workshop on Multimedia and Security, ACM, pp. 166–174, 2004Google Scholar
  29. 29.
    N. Terzjia, M. Repges, K. Luck, W. Geisselhardt, Digital image watermarking using discrete wavelet transform: performance comparison of error correction codes, in International Association of Science and Technology for Development, 2002Google Scholar
  30. 30.
    C.-C. Lai, C.-C. Tsai, Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11), 3060–3063 (2010)CrossRefGoogle Scholar
  31. 31.
    M. Vafaei, H. Mahdavi-Nasab, H. Pourghassem, A new robust blind watermarking method based on neural networks in wavelet transform domain. World Appl. Sci. J. 22(11), 1572–1580 (2013)Google Scholar
  32. 32.
    M. Ali, C. WookAhn, P. Siarry, Differential evolution algorithm for the selection of optimal scaling factors in image watermarking. Special issue on advances in evolutionary optimization based image processing. Eng. Appl. Artif. Intell. 31, 15–26 (2014)CrossRefGoogle Scholar
  33. 33.
    A. Mehto, N. Mehra, Adaptive lossless medical image watermarking algorithm based on DCT & DWT. Proc. Computer Sci. 78, 88–94 (2016)CrossRefGoogle Scholar
  34. 34.
    T.S. Nguyen, C.C. Chang, X.Q. Yang, A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU-Int. J. Electron. Commun. 70(8), 1055–1061 (2016)CrossRefGoogle Scholar
  35. 35.
    M. Shi-chun, L. Ren-hou, D. Hong-mei, W. Yun-kuan, Decision of image watermarking strength based on artificial neural-networks, in Proceedings of the 9th International Conference on Neural Information Processing, pp. 2430–2434, 2002Google Scholar
  36. 36.
    Y. Qun-ting, G. Tie-gang, L. Fan, A novel robust watermarking scheme based on neural network, in International Conference on Intelligent Computing and Integrated Systems (ICISS), IEEE, pp. 71–75, 2010Google Scholar
  37. 37.
    N. Mohananthini, G. Yamuna, Watermarking for images using wavelet domain in Back-Propagation neural network, in Advances in Engineering, Science and Management, pp. 100–105, 2012Google Scholar
  38. 38.
    M. Barni, F. Bartolini, Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans. Image Process. 10(5), 783–791 (2001)CrossRefzbMATHGoogle Scholar
  39. 39.
    A. Zear, A.K. Singh, P. Kumar, Multiple watermarking for healthcare applications. J. Intell. Syst. (2016). doi:  10.1515/jisys-2016-0036
  40. 40.
    B. Zeng, Reduction of blocking effect in DCT-coded images using zero-masking techniques. Signal Process. 79(2), 205–211 (1999)MathSciNetCrossRefzbMATHGoogle Scholar
  41. 41.
    J.-M. Guo, H. Prasetyo, False-positive-free SVD-based image watermarking. J. Vis. Commun. Image Represent. 25(5), 1149–1163 (2014)CrossRefGoogle Scholar
  42. 42.
    F.N. Thakkar, V.K. Srivastava, A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools Appl. 76(3), 3669–3697 (2017)CrossRefGoogle Scholar
  43. 43.
    M. Cilimkovic, Neural networks and back propagation algorithm, Master Thesis, Institute of Technology, Ireland, 2013Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Amit Kumar Singh
    • 1
    Email author
  • Basant Kumar
    • 2
  • Ghanshyam Singh
    • 3
  • Anand Mohan
    • 4
  1. 1.Department of Computer Science & EngineeringJaypee University of Information TechnologyWaknaghat, SolanIndia
  2. 2.Department of Electronics and Communication EngineeringMotilal Nehru National Institute of TechnologyAllahabadIndia
  3. 3.Department of Electronics and Communication EngineeringJaypee University of Information TechnologyWaknaghat, SolanIndia
  4. 4.Department of Electronics EngineeringIndian Institute of Technology (BHU)VaranasiIndia

Personalised recommendations