Robust and Secure Multiple Watermarking for Medical Images

被引:52
作者
Sharma, Abhilasha [1 ]
Singh, Amit Kumar [1 ]
Ghrera, Satya Prakash [1 ]
机构
[1] Jaypee Univ Informat Technol, Dept Comp Sci & Engn, Solan, Himachal Prades, India
关键词
Image watermarking; EPR; DICOM; DWT; DCT; RSA; MD5; Hamming ECC; ROI and NROI; AUTHENTICATION;
D O I
10.1007/s11277-016-3625-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper presents a robust and secure region of interest and non-region of interest based watermarking method for medical images. The proposed method applies the combination of discrete wavelet transform and discrete cosine transforms on the cover medical image for the embedding of image and electronic patient records (EPR) watermark simultaneously. The embedding of multiple watermarks at the same time provides extra level of security and important for the patient identity verification purpose. Further, security of the image and EPR watermarks is enhancing by using message-digest (MD5) hash algorithm and Rivest-Shamir-Adleman respectively before embedding into the medical cover image. In addition, Hamming error correction code is applying on the encrypted EPR watermark to enhance the robustness and reduce the possibility bit error rates which may result into wrong diagnosis in medical environments. The robustness of the method is also extensively examined for known attacks such as salt & pepper, Gaussian, speckle, JPEG compression, filtering, histogram equalization. The method is found to be robust for hidden watermark at acceptable quality of the watermarked image. Therefore, the hybrid method is suitable for avoidance of the patient identity theft/alteration/modification and secure medical document dissemination over the open channel for medical applications.
引用
收藏
页码:1611 / 1624
页数:14
相关论文
共 32 条
  • [1] Secured Telemedicine Using Region-Based Watermarking with Tamper Localization
    Al-Haj, Ali
    Amer, Alaa'
    [J]. JOURNAL OF DIGITAL IMAGING, 2014, 27 (06) : 737 - 750
  • [2] Annamalai Umaamaheshvari, 2013, Journal of Theoretical and Applied Information Technology, V57, P484
  • [3] [Anonymous], LECT NOTES COMPUTER
  • [4] A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images
    Bouslimi, Dalel
    Coatrieux, Gouenou
    Cozic, Michel
    Roux, Christian
    [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2012, 16 (05): : 891 - 899
  • [5] A data-hiding technique with authentication, integration, and confidentiality for electronic patient records
    Chao, HM
    Hsu, CM
    Miaou, SG
    [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2002, 6 (01): : 46 - 53
  • [6] Coatrieux G, 2006, Conf Proc IEEE Eng Med Biol Soc, V2006, P4691
  • [7] Relevance of watermarking in medical imaging
    Coatrieux, G
    Maître, H
    Sankur, B
    Rolland, Y
    Collorec, R
    [J]. 2000 IEEE EMBS INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY APPLICATIONS IN BIOMEDICINE, PROCEEDINGS, 2000, : 250 - 255
  • [8] Two Level Security for Medical Images Using Watermarking/Encryption Algorithms
    Kannammal, A.
    Rani, S. Subha
    [J]. INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2014, 24 (01) : 111 - 120
  • [9] Kaur Rupinder, 2013, International Journal of Information Technology and Computer Science, V5, P73, DOI 10.5815/ijitcs.2013.02.08
  • [10] Dispersed Data Hiding Using Hamming Code with Recovery Capability
    Lien, Brian K.
    Chen, Shan-Kang
    Wang, Wei-Sheng
    King, Kuan-Pang
    [J]. GENETIC AND EVOLUTIONARY COMPUTING, 2015, 329 : 179 - 187