Skip to main content

A Review of Digital Watermarking Applications for Medical Image Exchange Security

  • Conference paper
  • First Online:

Abstract

In this paper, we present the usage of watermarking techniques in medical imaging, and especially for security goals, the watermarking is considered a great solution to protect the personal data of patients during the medical images and telemedicine data exchange. This paper is devised in two part. The first one is reserved for an overview on image watermarking with a presentation of the most important requirements of watermarking (robustness, imperceptibility and capacity). We offer also the general scheme of watermarking with the two essential phases and different types of attacks. Furthermore, we present a classification of watermarking techniques based on various parameters such as: insertion domain, human perception and detection methods, in the end of the section we display some metrics and benchmarks for analysis the performance of the watermarking technique. The second part is reserved for the usage of watermarking techniques in medical imaging especially for integrity verification, authentication and data hiding, we also discuss a literature review on watermarking techniques for medical image. In addition we present the concept of telemedicine and telehealth fields and the importance of watermarking in the modern health care.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Desai, H.V., Beri, P., Raj, D.J.: Steganography, Cryptography, Watermarking: A Comparative Study. p. 3, (2010)

    Google Scholar 

  2. Fridrich, J.: Applications of data hiding in digital images. In: Tutorial for the ISSPA, Conference in Melbourne, Australia, Nov-1998

    Google Scholar 

  3. Tao, H., Chongmin, L., Jasni, M.Z., Ahmed, N.A.: Robust Image Watermarking Theories and Techniques: A Review

    Google Scholar 

  4. Mitesh, P., Alpesh, C.: The study of various attacks on digital watermarking technique. Int. J. Adv. Res. Comput. Eng. Technol (IJARCET), (2014)

    Google Scholar 

  5. Boreiry, M., Keyvanpour, M.-R.: Classification of watermarking methods based on watermarking approaches. pp. 73–76 (2017)

    Google Scholar 

  6. Chawla, G., Saini, R., Yadav, R.: Classification of watermarking based upon various parameters. Int. J. Comput. Appl. 4 (2012)

    Google Scholar 

  7. Song, C., Sudirman, S., Merabti, M.: Recent Advances And Classification of Watermarking Techniques in Digital Images, p. 6

    Google Scholar 

  8. Naveed, A., Saleem, Y., Ahmed, N., Rafiq, A.: Performance Evaluation and Watermark Security Assessment of Digital Watermarking Techniques, p. 6 (2015)

    Google Scholar 

  9. Kuttera, M., Petitcolasb, F.A.P.: A Fair Benchmark for Image Watermarking Systems p. 14

    Google Scholar 

  10. Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack modelling: towards a second generation watermarking benchmark. Sig. Process. 81(6), 1177–1214 (2001)

    Article  Google Scholar 

  11. Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Signal Process. 66(3), 385–403 (1998)

    Article  Google Scholar 

  12. Weinstein, R.S., et al.: Telemedicine, telehealth, and mobile health applications that work: Opportunities and Barriers, Am. J. Med. 183–187, (2014)

    Article  Google Scholar 

  13. Karen, M.Z.: Telemedicine: History, Applications, and Impact on Librarianship. US National Library of Medicine National Institutes of Health (1996)

    Google Scholar 

  14. Abhinav, S., Chandan, S.: Medical image authentication through watermarking. Int. J. Adv. Res. Comput. Sci. Technol. (2014)

    Google Scholar 

  15. Memon, N.A., Asmatullah, C., Mushtaq, A., Zulfiqar Ali, K.: Hybrid watermarking of medical images for ROI authentication and recovery. Int. J. Comput. Math., 2057–2071, (2011)

    Article  Google Scholar 

  16. Gunjal, B.L., Mali, S.N.: ROI based embedded watermarking of medical images for secured communication in telemedicine, 6(8), 6 (2012)

    Google Scholar 

  17. Al-Qershi, O.M., Khoo, B.E.: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J. Digit. Imaging 24(1), 114–125 (2011)

    Article  Google Scholar 

  18. Hajjaji, M.A., Ridha, H., Abdellatif, M., El-Bey, B.: ‘Tatouage des Images Médicales en Vue d’Intégrité et de Confidentialité des Données’, p. 7

    Google Scholar 

  19. Boris, V.: ‘Technique multicouches pour le tatouage d’images et adaptation aux flux vidéo MPEG-2 et MPEG-4’, Grenoble INPG, (2003)

    Google Scholar 

  20. Vassaux, B., Bas, P., Chassery, J.M.:‘Tatouage d’images par étalement de spectre : apport de la technique CDMA en mode multicouche’ 8 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Hassani Allaf .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Allaf, A.H., Kbir, M.A. (2019). A Review of Digital Watermarking Applications for Medical Image Exchange Security. In: Ben Ahmed, M., Boudhir, A., Younes, A. (eds) Innovations in Smart Cities Applications Edition 2. SCA 2018. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-11196-0_40

Download citation

Publish with us

Policies and ethics