Skip to main content

Securing Patient Data Through Multiple Watermarking and Selective Encryption

  • Chapter
  • First Online:
Medical Image Watermarking

Part of the book series: Multimedia Systems and Applications ((MMSA))

  • 636 Accesses

Abstract

The initial contribution in this chapter begins with proposing a robust and secure DWT, DCT and SVD based multiple watermarking techniques for protecting digital contents over unsecure networks. The proposed technique initially decomposes the host image into third level DWT where the vertical frequency band (LH2) at second level and low frequency band (LL3) at the third level DWT is selected for embedding image and text watermark respectively. Further, the proposed method addresses the issue of ownership identity authentication, multiple watermarks are embedded instead of single watermark into the same multimedia objects simultaneously, which offer the extra level of security and reduced storage and bandwidth requirements in the important applications areas such as E-health, secure multimedia contents on online social network, secured E-Voting systems, digital cinema, education and insurance companies, driver's license /passport. Moreover, the robustness image watermark is also enhanced by using Back Propagation Neural Network (BPNN), which is applied on extracted watermark to minimize the distortion effects on the watermarked image. In addition, the method addresses the issue of channel noise distortions in the identity information. This has been achieved using error correcting codes (ECCs) for encoding the text watermark before embedding into the host image. The effects of Hamming and BCH codes on the robustness of personal identity information in the form of text watermark and the cover image quality have been investigated. Further, to enhance the security of the host and watermarks the selective encryption is applied on watermarked image, where only the important multimedia data is encrypted. The proposed method has been extensively tested and analyzed against known attacks. Based on experimental results, it is established that the proposed technique achieves superior performance in respect of, robustness, security and capacity with acceptable visual quality of the watermarked image as compared to reported techniques. Finally, we have evaluated the image quality of the watermarked image by subjective method. Therefore, the proposed method may find potential solutions in prevention of personal identity theft and unauthorized multimedia content sharing on online social networks/open channel.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. T. H-The, O. Banos, S. Lee, Y. Yoon, T. Le-Tien, A novel watermarking scheme for image authentication in social networks, in Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, BALI, Indonesia, Article No. 48, 2015. DOI:10.1145/2701126.2701237

  2. A.K. Singh, B. Kumar, M. Dave, S.P. Ghrera, A. Mohan et al., Digital image watermarking: techniques and emerging applications, in Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, ed. by B.B. Gupta (IGI Global, Hershey, 2016), pp. 246–272

    Google Scholar 

  3. Z. Zhang, B.B. Gupta, Social media security and trustworthiness: overview and new direction, in Future Generation Computer Systems, (Elsevier, 2016)

    Google Scholar 

  4. A. Zigomitros, A. Papageorgiou, C. Patsakis, Social network content management through watermarking, in 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, pp. 1381–1386, 2012

    Google Scholar 

  5. S. Iftikhar, M. Kamran, E.U. Munir, S.U. Khan, A reversible watermarking technique for social network data sets for enabling data trust in cyber, physical, and social computing. IEEE Syst. J. 11(1), 197–206 (2017)

    Google Scholar 

  6. M. Terry, Medical identity theft and telemedicine security. Telemed. e-Health 15(10), 928–932 (2009)

    Article  Google Scholar 

  7. D. Bowman., http://www.fiercehealthit.com/story/researchers-use-digital-watermarks-protect-medical-images, 2012

  8. M. Ollove., www.usatoday.com/story/…/stateline-identity-thefts-medical…/5279351 , 2014

  9. A.K. Singh, M. Dave, A. Mohan, Robust and secure multiple watermarking in wavelet domain. A special issue on advanced signal processing technologies and systems for healthcare applications. J. Med. Imaging Health Inf. 5(2), 406–414 (2015)

    Article  Google Scholar 

  10. A.K. Singh, M. Dave, A. Mohan, Wavelet based image watermarking: futuristic concepts in information security. Proc. Nat. Acad. Sci. India Sect. A: Phys. Sci. 84(3), 345–359 (2014)

    Article  Google Scholar 

  11. S.P. Mohanty, Watermarking of digital images, M.S. Thesis, Indian Institute of Science, India, 1999

    Google Scholar 

  12. M.C. Wolak, Digital watermarking, in Preliminary Proposal, (Nova Southeastern University, United States, 2000)

    Google Scholar 

  13. N. Nikolaidis, I. Pitas, Digital image watermarking: an overview. IEEE Int. Conf. Multimedia Comput. Syst. 1, 1–6 (1999)

    Google Scholar 

  14. I.J. Cox, M.L. Miller, The first 50 years of electronic watermarking. EURASIP J. Adv. Signal Proc. 2002, 126–132 (2002)

    Article  MATH  Google Scholar 

  15. A Kannammal, S Subha Rani, Two level security for medical images using watermarking/encryption algorithms. Int. J. Imaging Syst. Technol. 24(1), 111–120 (2014)

    Article  Google Scholar 

  16. A. Al-Haj, A. Amer, Secured telemedicine using region-based watermarking with tamper localization. J. Digit. Imaging 27(6), 737–750 (2014)

    Article  Google Scholar 

  17. Y. Xing, J. Tan, A color image watermarking scheme resistant against geometrical attacks. Radioengineering 19(1), 62–67 (2010)

    Google Scholar 

  18. A. Ghafoor, M. Imran, A non-blind color image watermarking scheme resistent against geometric attacks. Radioengineering 21(4), 1246–1251 (2012)

    Google Scholar 

  19. V. Santhi, A. Thangavelu, DC coefficients based watermarking technique for color images using singular value decomposition. Int. J. Comput. Electr. Eng. 3(1), 8–16 (2011)

    Article  Google Scholar 

  20. M. Zhao, Y. Dang, Color image copyright protection digital watermarking algorithm based on DWT & DCT, in 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, pp. 1–4, 12–14 Oct 2008

    Google Scholar 

  21. X. Xiong, A new robust color image watermarking scheme based on 3D-DCT. World J. Eng. Technol. 3, 177–183 (2015)

    Article  Google Scholar 

  22. H. Shi, F. Lv, Y. Cao, A blind watermarking technique for color image based on SVD with circulation. J. Software 9(7), 1749–1756 (2014)

    Google Scholar 

  23. N. Ramamurthy, S. Varadarajan, The robust digital image watermarking scheme with back propagation neural network in DWT domain. Int. J. Comput. Sci. Network Security 13(1), 111–117 (2013)

    Google Scholar 

  24. N.V. Dharwadkar, B.B. Amberker, An Efficient non blind watermarking scheme for colour images using discrete wavelet transformation. Int. J. Comput. Appl. 2(3), 60–66 (2010)

    Google Scholar 

  25. A. Sharma, A.K. Singh, S.P. Ghrera, Robust and secure multiple watermarking technique for medical images. Wirel. Pers. Commun. 92(4), 1611–1624 (2017)

    Article  Google Scholar 

  26. A. Zear, A.K. Singh, P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools Appl. (2016). doi:10.1007/s11042-016-3862-8

  27. R. Pandey, A.K. Singh, B. Kumar, A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology. Multimedia Tools Appl. 75(22), 14381–14397 (2016)

    Article  Google Scholar 

  28. S.J.J. Mary, C.S. Christopher, S.S.A. Joe, Novel scheme for compressed image authentication using LSB watermarking and EMRC6 encryption. Circuits Syst. 7, 1722–1733 (2016)

    Article  Google Scholar 

  29. G. Badshah, S.-C. Liew, J.M. Zain, M. Ali, Watermark compression in medical image watermarking using lempel-ziv-welch (LZW) lossless compression technique. J. Digit. Imaging 29(2), 216–225 (2016)

    Article  Google Scholar 

  30. J M Guo and H Prasetyo, False-positive-free SVD-based image watermarking, J. Vis. Commun. Image Represent., 25(5), 1149–1163 (2014).

    Article  Google Scholar 

  31. F.N. Thakkar, V.K. Srivastava, A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools Appl. 76(3), 3669–3697 (2017)

    Google Scholar 

  32. K. Wu, W. Yan, J. Du, A robust dual digital-image watermarking technique, in International Conference on Computational Intelligence and Security Workshop, pp. 668–671, 2007

    Google Scholar 

  33. C. Chemak, M.S. Bouhlel, J.C. Lapayre, A new scheme of robust image watermarking: the double watermarking algorithm, in Proceedings of the 2007 Summer Computer Simulation Conference, San Diego, California, USA, pp. 1201–1208, 2007

    Google Scholar 

  34. H. Shen, B. Chen, From single watermark to dual watermark: a new approach for image watermarking. Comput. Electr. Eng. 38(5), 1310–1324 (2012)

    Article  Google Scholar 

  35. A. Singh, A. Tayal, Choice of wavelet from wavelet families for DWT–DCT–SVD image watermarking. Int. J. Comput. Appl. 48(17), 9–14 (2012)

    Google Scholar 

  36. M.I. Khan, M.M. Rahman, M.I.H. Sarker, Digital watermarking for image authentication based on combined DCT, DWT, and SVD transformation. Int. J. Comput. Sci. 10(5), 223–230 (2013)

    Google Scholar 

  37. A. Srivastava, P. Saxena, DWT-DCT-SVD based semi blind image watermarking using middle frequency band. IOSR J. Comput. Eng. 12(2), 63–66 (2013)

    Article  Google Scholar 

  38. N.J. Harish, B.B.S. Kumar, A. Kusagur, Hybrid robust watermarking techniques based on DWT, DCT, and SVD. Int. J. Adv. Electr. Electr. Eng. 2(5), 137–143 (2013)

    Google Scholar 

  39. I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  40. B.L. Gunjal, R.R. Manthalkar, An overview of transform domain robust digital image watermarking algorithms. J. Emerg. Trends Comput. Inf. Sci. 2(1), 13–16 (2011)

    Google Scholar 

  41. F. Chen, H. He, Y. Huo, H. Wang, Self-recovery fragile watermarking scheme with variable watermark payload, in Proceedings of the 10th international conference on Digital-Forensics and Watermarking, Atlantic City, NY, pp. 142–155, 2011

    Google Scholar 

  42. N.H. Divecha, N.N. Jani, Image watermarking algorithm using DCT, DWT and SVD. Proc. Natl. Conf. Innov. Paradigms Eng. Technol. 10, 13–16 (2012)

    Google Scholar 

  43. K.A. Navas, A.M. Cheriyan, M. Lekshmi, S.A. Tampy, M. Sasikumar, DWT–DCT–SVD based watermarking, in Proceedings of the 3rd International Conference on Communication Systems Software and Middleware and Workshop, Bangalore, pp. 271–274, 2008

    Google Scholar 

  44. B. Wang, J. Ding, Q. Wen, X. Liao, C. Liu, An Image watermarking algorithm based on DWT DCT and SVD. IEEE Int. Conf. Network Infrastruct. Dig. Content, Beijing, 1034–1038 (2009)

    Google Scholar 

  45. A Giakoumaki, S Pavlopoulos, and D Koutsouris, “Multiple image watermarking applied to health information management”, IEEE Trans. Inf. Technol. Biomed., Vol. 10, No. 4, pp. 722-732, 2006.

    Article  Google Scholar 

  46. X. Liu, A.M. Eskicioglu, Selective encryption of multimedia content in distribution networks: challenges and new directions, in 2nd International Conference on communication, internet and information technology, pp. 527–533, 2003

    Google Scholar 

  47. M. Alsmirat, Y. Jararweh, M. Al-Ayyoub, M.A. Shehab, B.B. Gupta, Accelerating compute intensive medical imaging segmentation algorithms using GPUs. Multimedia Tools Appl. (2016). doi:10.1007/s11042-016-3884-2

  48. A.K. Singh, Some new techniques of improved wavelet domain watermarking for medical images, Ph.D. Thesis, Department of Computer Engineering, NIT Kurukshetra, Haryana, India, 2015

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Singh, A.K., Kumar, B., Singh, G., Mohan, A. (2017). Securing Patient Data Through Multiple Watermarking and Selective Encryption. In: Singh, A., Kumar, B., Singh, G., Mohan, A. (eds) Medical Image Watermarking. Multimedia Systems and Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-57699-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57699-2_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57698-5

  • Online ISBN: 978-3-319-57699-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics