Advertisement

Securing Patient Data Through Multiple Watermarking and Selective Encryption

  • Amit Kumar SinghEmail author
  • Basant Kumar
  • Ghanshyam Singh
  • Anand Mohan
Chapter
Part of the Multimedia Systems and Applications book series (MMSA)

Abstract

The initial contribution in this chapter begins with proposing a robust and secure DWT, DCT and SVD based multiple watermarking techniques for protecting digital contents over unsecure networks. The proposed technique initially decomposes the host image into third level DWT where the vertical frequency band (LH2) at second level and low frequency band (LL3) at the third level DWT is selected for embedding image and text watermark respectively. Further, the proposed method addresses the issue of ownership identity authentication, multiple watermarks are embedded instead of single watermark into the same multimedia objects simultaneously, which offer the extra level of security and reduced storage and bandwidth requirements in the important applications areas such as E-health, secure multimedia contents on online social network, secured E-Voting systems, digital cinema, education and insurance companies, driver's license /passport. Moreover, the robustness image watermark is also enhanced by using Back Propagation Neural Network (BPNN), which is applied on extracted watermark to minimize the distortion effects on the watermarked image. In addition, the method addresses the issue of channel noise distortions in the identity information. This has been achieved using error correcting codes (ECCs) for encoding the text watermark before embedding into the host image. The effects of Hamming and BCH codes on the robustness of personal identity information in the form of text watermark and the cover image quality have been investigated. Further, to enhance the security of the host and watermarks the selective encryption is applied on watermarked image, where only the important multimedia data is encrypted. The proposed method has been extensively tested and analyzed against known attacks. Based on experimental results, it is established that the proposed technique achieves superior performance in respect of, robustness, security and capacity with acceptable visual quality of the watermarked image as compared to reported techniques. Finally, we have evaluated the image quality of the watermarked image by subjective method. Therefore, the proposed method may find potential solutions in prevention of personal identity theft and unauthorized multimedia content sharing on online social networks/open channel.

Keywords

Information security and privacy Online social network Image and text watermark ECCs Selective encryption Back propagation neural network Multimedia applications 

References

  1. 1.
    T. H-The, O. Banos, S. Lee, Y. Yoon, T. Le-Tien, A novel watermarking scheme for image authentication in social networks, in Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, BALI, Indonesia, Article No. 48, 2015. DOI: 10.1145/2701126.2701237
  2. 2.
    A.K. Singh, B. Kumar, M. Dave, S.P. Ghrera, A. Mohan et al., Digital image watermarking: techniques and emerging applications, in Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, ed. by B.B. Gupta (IGI Global, Hershey, 2016), pp. 246–272Google Scholar
  3. 3.
    Z. Zhang, B.B. Gupta, Social media security and trustworthiness: overview and new direction, in Future Generation Computer Systems, (Elsevier, 2016)Google Scholar
  4. 4.
    A. Zigomitros, A. Papageorgiou, C. Patsakis, Social network content management through watermarking, in 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, pp. 1381–1386, 2012Google Scholar
  5. 5.
    S. Iftikhar, M. Kamran, E.U. Munir, S.U. Khan, A reversible watermarking technique for social network data sets for enabling data trust in cyber, physical, and social computing. IEEE Syst. J. 11(1), 197–206 (2017)Google Scholar
  6. 6.
    M. Terry, Medical identity theft and telemedicine security. Telemed. e-Health 15(10), 928–932 (2009)CrossRefGoogle Scholar
  7. 7.
  8. 8.
  9. 9.
    A.K. Singh, M. Dave, A. Mohan, Robust and secure multiple watermarking in wavelet domain. A special issue on advanced signal processing technologies and systems for healthcare applications. J. Med. Imaging Health Inf. 5(2), 406–414 (2015)CrossRefGoogle Scholar
  10. 10.
    A.K. Singh, M. Dave, A. Mohan, Wavelet based image watermarking: futuristic concepts in information security. Proc. Nat. Acad. Sci. India Sect. A: Phys. Sci. 84(3), 345–359 (2014)CrossRefGoogle Scholar
  11. 11.
    S.P. Mohanty, Watermarking of digital images, M.S. Thesis, Indian Institute of Science, India, 1999Google Scholar
  12. 12.
    M.C. Wolak, Digital watermarking, in Preliminary Proposal, (Nova Southeastern University, United States, 2000)Google Scholar
  13. 13.
    N. Nikolaidis, I. Pitas, Digital image watermarking: an overview. IEEE Int. Conf. Multimedia Comput. Syst. 1, 1–6 (1999)Google Scholar
  14. 14.
    I.J. Cox, M.L. Miller, The first 50 years of electronic watermarking. EURASIP J. Adv. Signal Proc. 2002, 126–132 (2002)CrossRefzbMATHGoogle Scholar
  15. 15.
    A Kannammal, S Subha Rani, Two level security for medical images using watermarking/encryption algorithms. Int. J. Imaging Syst. Technol. 24(1), 111–120 (2014)CrossRefGoogle Scholar
  16. 16.
    A. Al-Haj, A. Amer, Secured telemedicine using region-based watermarking with tamper localization. J. Digit. Imaging 27(6), 737–750 (2014)CrossRefGoogle Scholar
  17. 17.
    Y. Xing, J. Tan, A color image watermarking scheme resistant against geometrical attacks. Radioengineering 19(1), 62–67 (2010)Google Scholar
  18. 18.
    A. Ghafoor, M. Imran, A non-blind color image watermarking scheme resistent against geometric attacks. Radioengineering 21(4), 1246–1251 (2012)Google Scholar
  19. 19.
    V. Santhi, A. Thangavelu, DC coefficients based watermarking technique for color images using singular value decomposition. Int. J. Comput. Electr. Eng. 3(1), 8–16 (2011)CrossRefGoogle Scholar
  20. 20.
    M. Zhao, Y. Dang, Color image copyright protection digital watermarking algorithm based on DWT & DCT, in 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, pp. 1–4, 12–14 Oct 2008Google Scholar
  21. 21.
    X. Xiong, A new robust color image watermarking scheme based on 3D-DCT. World J. Eng. Technol. 3, 177–183 (2015)CrossRefGoogle Scholar
  22. 22.
    H. Shi, F. Lv, Y. Cao, A blind watermarking technique for color image based on SVD with circulation. J. Software 9(7), 1749–1756 (2014)Google Scholar
  23. 23.
    N. Ramamurthy, S. Varadarajan, The robust digital image watermarking scheme with back propagation neural network in DWT domain. Int. J. Comput. Sci. Network Security 13(1), 111–117 (2013)Google Scholar
  24. 24.
    N.V. Dharwadkar, B.B. Amberker, An Efficient non blind watermarking scheme for colour images using discrete wavelet transformation. Int. J. Comput. Appl. 2(3), 60–66 (2010)Google Scholar
  25. 25.
    A. Sharma, A.K. Singh, S.P. Ghrera, Robust and secure multiple watermarking technique for medical images. Wirel. Pers. Commun. 92(4), 1611–1624 (2017)CrossRefGoogle Scholar
  26. 26.
    A. Zear, A.K. Singh, P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools Appl. (2016). doi: 10.1007/s11042-016-3862-8
  27. 27.
    R. Pandey, A.K. Singh, B. Kumar, A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology. Multimedia Tools Appl. 75(22), 14381–14397 (2016)CrossRefGoogle Scholar
  28. 28.
    S.J.J. Mary, C.S. Christopher, S.S.A. Joe, Novel scheme for compressed image authentication using LSB watermarking and EMRC6 encryption. Circuits Syst. 7, 1722–1733 (2016)CrossRefGoogle Scholar
  29. 29.
    G. Badshah, S.-C. Liew, J.M. Zain, M. Ali, Watermark compression in medical image watermarking using lempel-ziv-welch (LZW) lossless compression technique. J. Digit. Imaging 29(2), 216–225 (2016)CrossRefGoogle Scholar
  30. 30.
    J M Guo and H Prasetyo, False-positive-free SVD-based image watermarking, J. Vis. Commun. Image Represent., 25(5), 1149–1163 (2014).CrossRefGoogle Scholar
  31. 31.
    F.N. Thakkar, V.K. Srivastava, A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools Appl. 76(3), 3669–3697 (2017)Google Scholar
  32. 32.
    K. Wu, W. Yan, J. Du, A robust dual digital-image watermarking technique, in International Conference on Computational Intelligence and Security Workshop, pp. 668–671, 2007Google Scholar
  33. 33.
    C. Chemak, M.S. Bouhlel, J.C. Lapayre, A new scheme of robust image watermarking: the double watermarking algorithm, in Proceedings of the 2007 Summer Computer Simulation Conference, San Diego, California, USA, pp. 1201–1208, 2007Google Scholar
  34. 34.
    H. Shen, B. Chen, From single watermark to dual watermark: a new approach for image watermarking. Comput. Electr. Eng. 38(5), 1310–1324 (2012)CrossRefGoogle Scholar
  35. 35.
    A. Singh, A. Tayal, Choice of wavelet from wavelet families for DWT–DCT–SVD image watermarking. Int. J. Comput. Appl. 48(17), 9–14 (2012)Google Scholar
  36. 36.
    M.I. Khan, M.M. Rahman, M.I.H. Sarker, Digital watermarking for image authentication based on combined DCT, DWT, and SVD transformation. Int. J. Comput. Sci. 10(5), 223–230 (2013)Google Scholar
  37. 37.
    A. Srivastava, P. Saxena, DWT-DCT-SVD based semi blind image watermarking using middle frequency band. IOSR J. Comput. Eng. 12(2), 63–66 (2013)CrossRefGoogle Scholar
  38. 38.
    N.J. Harish, B.B.S. Kumar, A. Kusagur, Hybrid robust watermarking techniques based on DWT, DCT, and SVD. Int. J. Adv. Electr. Electr. Eng. 2(5), 137–143 (2013)Google Scholar
  39. 39.
    I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  40. 40.
    B.L. Gunjal, R.R. Manthalkar, An overview of transform domain robust digital image watermarking algorithms. J. Emerg. Trends Comput. Inf. Sci. 2(1), 13–16 (2011)Google Scholar
  41. 41.
    F. Chen, H. He, Y. Huo, H. Wang, Self-recovery fragile watermarking scheme with variable watermark payload, in Proceedings of the 10th international conference on Digital-Forensics and Watermarking, Atlantic City, NY, pp. 142–155, 2011Google Scholar
  42. 42.
    N.H. Divecha, N.N. Jani, Image watermarking algorithm using DCT, DWT and SVD. Proc. Natl. Conf. Innov. Paradigms Eng. Technol. 10, 13–16 (2012)Google Scholar
  43. 43.
    K.A. Navas, A.M. Cheriyan, M. Lekshmi, S.A. Tampy, M. Sasikumar, DWT–DCT–SVD based watermarking, in Proceedings of the 3rd International Conference on Communication Systems Software and Middleware and Workshop, Bangalore, pp. 271–274, 2008Google Scholar
  44. 44.
    B. Wang, J. Ding, Q. Wen, X. Liao, C. Liu, An Image watermarking algorithm based on DWT DCT and SVD. IEEE Int. Conf. Network Infrastruct. Dig. Content, Beijing, 1034–1038 (2009)Google Scholar
  45. 45.
    A Giakoumaki, S Pavlopoulos, and D Koutsouris, “Multiple image watermarking applied to health information management”, IEEE Trans. Inf. Technol. Biomed., Vol. 10, No. 4, pp. 722-732, 2006.CrossRefGoogle Scholar
  46. 46.
    X. Liu, A.M. Eskicioglu, Selective encryption of multimedia content in distribution networks: challenges and new directions, in 2nd International Conference on communication, internet and information technology, pp. 527–533, 2003Google Scholar
  47. 47.
    M. Alsmirat, Y. Jararweh, M. Al-Ayyoub, M.A. Shehab, B.B. Gupta, Accelerating compute intensive medical imaging segmentation algorithms using GPUs. Multimedia Tools Appl. (2016). doi: 10.1007/s11042-016-3884-2
  48. 48.
    A.K. Singh, Some new techniques of improved wavelet domain watermarking for medical images, Ph.D. Thesis, Department of Computer Engineering, NIT Kurukshetra, Haryana, India, 2015Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Amit Kumar Singh
    • 1
    Email author
  • Basant Kumar
    • 2
  • Ghanshyam Singh
    • 3
  • Anand Mohan
    • 4
  1. 1.Department of Computer Science & EngineeringJaypee University of Information TechnologyWaknaghat, SolanIndia
  2. 2.Department of Electronics and Communication EngineeringMotilal Nehru National Institute of TechnologyAllahabadIndia
  3. 3.Department of Electronics and Communication EngineeringJaypee University of Information TechnologyWaknaghat, SolanIndia
  4. 4.Department of Electronics EngineeringIndian Institute of Technology (BHU)VaranasiIndia

Personalised recommendations