Abstract
The initial contribution in this chapter begins with proposing a robust and secure DWT, DCT and SVD based multiple watermarking techniques for protecting digital contents over unsecure networks. The proposed technique initially decomposes the host image into third level DWT where the vertical frequency band (LH2) at second level and low frequency band (LL3) at the third level DWT is selected for embedding image and text watermark respectively. Further, the proposed method addresses the issue of ownership identity authentication, multiple watermarks are embedded instead of single watermark into the same multimedia objects simultaneously, which offer the extra level of security and reduced storage and bandwidth requirements in the important applications areas such as E-health, secure multimedia contents on online social network, secured E-Voting systems, digital cinema, education and insurance companies, driver's license /passport. Moreover, the robustness image watermark is also enhanced by using Back Propagation Neural Network (BPNN), which is applied on extracted watermark to minimize the distortion effects on the watermarked image. In addition, the method addresses the issue of channel noise distortions in the identity information. This has been achieved using error correcting codes (ECCs) for encoding the text watermark before embedding into the host image. The effects of Hamming and BCH codes on the robustness of personal identity information in the form of text watermark and the cover image quality have been investigated. Further, to enhance the security of the host and watermarks the selective encryption is applied on watermarked image, where only the important multimedia data is encrypted. The proposed method has been extensively tested and analyzed against known attacks. Based on experimental results, it is established that the proposed technique achieves superior performance in respect of, robustness, security and capacity with acceptable visual quality of the watermarked image as compared to reported techniques. Finally, we have evaluated the image quality of the watermarked image by subjective method. Therefore, the proposed method may find potential solutions in prevention of personal identity theft and unauthorized multimedia content sharing on online social networks/open channel.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
T. H-The, O. Banos, S. Lee, Y. Yoon, T. Le-Tien, A novel watermarking scheme for image authentication in social networks, in Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, BALI, Indonesia, Article No. 48, 2015. DOI:10.1145/2701126.2701237
A.K. Singh, B. Kumar, M. Dave, S.P. Ghrera, A. Mohan et al., Digital image watermarking: techniques and emerging applications, in Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, ed. by B.B. Gupta (IGI Global, Hershey, 2016), pp. 246–272
Z. Zhang, B.B. Gupta, Social media security and trustworthiness: overview and new direction, in Future Generation Computer Systems, (Elsevier, 2016)
A. Zigomitros, A. Papageorgiou, C. Patsakis, Social network content management through watermarking, in 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, pp. 1381–1386, 2012
S. Iftikhar, M. Kamran, E.U. Munir, S.U. Khan, A reversible watermarking technique for social network data sets for enabling data trust in cyber, physical, and social computing. IEEE Syst. J. 11(1), 197–206 (2017)
M. Terry, Medical identity theft and telemedicine security. Telemed. e-Health 15(10), 928–932 (2009)
D. Bowman., http://www.fiercehealthit.com/story/researchers-use-digital-watermarks-protect-medical-images, 2012
M. Ollove., www.usatoday.com/story/…/stateline-identity-thefts-medical…/5279351 , 2014
A.K. Singh, M. Dave, A. Mohan, Robust and secure multiple watermarking in wavelet domain. A special issue on advanced signal processing technologies and systems for healthcare applications. J. Med. Imaging Health Inf. 5(2), 406–414 (2015)
A.K. Singh, M. Dave, A. Mohan, Wavelet based image watermarking: futuristic concepts in information security. Proc. Nat. Acad. Sci. India Sect. A: Phys. Sci. 84(3), 345–359 (2014)
S.P. Mohanty, Watermarking of digital images, M.S. Thesis, Indian Institute of Science, India, 1999
M.C. Wolak, Digital watermarking, in Preliminary Proposal, (Nova Southeastern University, United States, 2000)
N. Nikolaidis, I. Pitas, Digital image watermarking: an overview. IEEE Int. Conf. Multimedia Comput. Syst. 1, 1–6 (1999)
I.J. Cox, M.L. Miller, The first 50 years of electronic watermarking. EURASIP J. Adv. Signal Proc. 2002, 126–132 (2002)
A Kannammal, S Subha Rani, Two level security for medical images using watermarking/encryption algorithms. Int. J. Imaging Syst. Technol. 24(1), 111–120 (2014)
A. Al-Haj, A. Amer, Secured telemedicine using region-based watermarking with tamper localization. J. Digit. Imaging 27(6), 737–750 (2014)
Y. Xing, J. Tan, A color image watermarking scheme resistant against geometrical attacks. Radioengineering 19(1), 62–67 (2010)
A. Ghafoor, M. Imran, A non-blind color image watermarking scheme resistent against geometric attacks. Radioengineering 21(4), 1246–1251 (2012)
V. Santhi, A. Thangavelu, DC coefficients based watermarking technique for color images using singular value decomposition. Int. J. Comput. Electr. Eng. 3(1), 8–16 (2011)
M. Zhao, Y. Dang, Color image copyright protection digital watermarking algorithm based on DWT & DCT, in 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, pp. 1–4, 12–14 Oct 2008
X. Xiong, A new robust color image watermarking scheme based on 3D-DCT. World J. Eng. Technol. 3, 177–183 (2015)
H. Shi, F. Lv, Y. Cao, A blind watermarking technique for color image based on SVD with circulation. J. Software 9(7), 1749–1756 (2014)
N. Ramamurthy, S. Varadarajan, The robust digital image watermarking scheme with back propagation neural network in DWT domain. Int. J. Comput. Sci. Network Security 13(1), 111–117 (2013)
N.V. Dharwadkar, B.B. Amberker, An Efficient non blind watermarking scheme for colour images using discrete wavelet transformation. Int. J. Comput. Appl. 2(3), 60–66 (2010)
A. Sharma, A.K. Singh, S.P. Ghrera, Robust and secure multiple watermarking technique for medical images. Wirel. Pers. Commun. 92(4), 1611–1624 (2017)
A. Zear, A.K. Singh, P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools Appl. (2016). doi:10.1007/s11042-016-3862-8
R. Pandey, A.K. Singh, B. Kumar, A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology. Multimedia Tools Appl. 75(22), 14381–14397 (2016)
S.J.J. Mary, C.S. Christopher, S.S.A. Joe, Novel scheme for compressed image authentication using LSB watermarking and EMRC6 encryption. Circuits Syst. 7, 1722–1733 (2016)
G. Badshah, S.-C. Liew, J.M. Zain, M. Ali, Watermark compression in medical image watermarking using lempel-ziv-welch (LZW) lossless compression technique. J. Digit. Imaging 29(2), 216–225 (2016)
J M Guo and H Prasetyo, False-positive-free SVD-based image watermarking, J. Vis. Commun. Image Represent., 25(5), 1149–1163 (2014).
F.N. Thakkar, V.K. Srivastava, A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools Appl. 76(3), 3669–3697 (2017)
K. Wu, W. Yan, J. Du, A robust dual digital-image watermarking technique, in International Conference on Computational Intelligence and Security Workshop, pp. 668–671, 2007
C. Chemak, M.S. Bouhlel, J.C. Lapayre, A new scheme of robust image watermarking: the double watermarking algorithm, in Proceedings of the 2007 Summer Computer Simulation Conference, San Diego, California, USA, pp. 1201–1208, 2007
H. Shen, B. Chen, From single watermark to dual watermark: a new approach for image watermarking. Comput. Electr. Eng. 38(5), 1310–1324 (2012)
A. Singh, A. Tayal, Choice of wavelet from wavelet families for DWT–DCT–SVD image watermarking. Int. J. Comput. Appl. 48(17), 9–14 (2012)
M.I. Khan, M.M. Rahman, M.I.H. Sarker, Digital watermarking for image authentication based on combined DCT, DWT, and SVD transformation. Int. J. Comput. Sci. 10(5), 223–230 (2013)
A. Srivastava, P. Saxena, DWT-DCT-SVD based semi blind image watermarking using middle frequency band. IOSR J. Comput. Eng. 12(2), 63–66 (2013)
N.J. Harish, B.B.S. Kumar, A. Kusagur, Hybrid robust watermarking techniques based on DWT, DCT, and SVD. Int. J. Adv. Electr. Electr. Eng. 2(5), 137–143 (2013)
I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)
B.L. Gunjal, R.R. Manthalkar, An overview of transform domain robust digital image watermarking algorithms. J. Emerg. Trends Comput. Inf. Sci. 2(1), 13–16 (2011)
F. Chen, H. He, Y. Huo, H. Wang, Self-recovery fragile watermarking scheme with variable watermark payload, in Proceedings of the 10th international conference on Digital-Forensics and Watermarking, Atlantic City, NY, pp. 142–155, 2011
N.H. Divecha, N.N. Jani, Image watermarking algorithm using DCT, DWT and SVD. Proc. Natl. Conf. Innov. Paradigms Eng. Technol. 10, 13–16 (2012)
K.A. Navas, A.M. Cheriyan, M. Lekshmi, S.A. Tampy, M. Sasikumar, DWT–DCT–SVD based watermarking, in Proceedings of the 3rd International Conference on Communication Systems Software and Middleware and Workshop, Bangalore, pp. 271–274, 2008
B. Wang, J. Ding, Q. Wen, X. Liao, C. Liu, An Image watermarking algorithm based on DWT DCT and SVD. IEEE Int. Conf. Network Infrastruct. Dig. Content, Beijing, 1034–1038 (2009)
A Giakoumaki, S Pavlopoulos, and D Koutsouris, “Multiple image watermarking applied to health information management”, IEEE Trans. Inf. Technol. Biomed., Vol. 10, No. 4, pp. 722-732, 2006.
X. Liu, A.M. Eskicioglu, Selective encryption of multimedia content in distribution networks: challenges and new directions, in 2nd International Conference on communication, internet and information technology, pp. 527–533, 2003
M. Alsmirat, Y. Jararweh, M. Al-Ayyoub, M.A. Shehab, B.B. Gupta, Accelerating compute intensive medical imaging segmentation algorithms using GPUs. Multimedia Tools Appl. (2016). doi:10.1007/s11042-016-3884-2
A.K. Singh, Some new techniques of improved wavelet domain watermarking for medical images, Ph.D. Thesis, Department of Computer Engineering, NIT Kurukshetra, Haryana, India, 2015
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Singh, A.K., Kumar, B., Singh, G., Mohan, A. (2017). Securing Patient Data Through Multiple Watermarking and Selective Encryption. In: Singh, A., Kumar, B., Singh, G., Mohan, A. (eds) Medical Image Watermarking. Multimedia Systems and Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-57699-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-57699-2_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57698-5
Online ISBN: 978-3-319-57699-2
eBook Packages: Computer ScienceComputer Science (R0)