A Blind Medical Image Watermarking for Secure E-Healthcare Application Using Crypto-Watermarking System

被引:12
作者
Aparna, Puvvadi [1 ]
Kishore, Polurie Venkata Vijay [2 ]
机构
[1] KL Univ, Vijayawada, Andhra Pradesh, India
[2] KL Univ, Dept Elect & Commun Engn, Vijayawada, Andhra Pradesh, India
关键词
Crypto-watermarking; electronic health record; SHA-256; embedding; extraction; face image; advanced encryption standard (AES); segmentation and active contour; TAMPER DETECTION; TRANSFORM; SCHEME;
D O I
10.1515/jisys-2018-0370
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A reliable medical image management must provide proper security for patient information. Protecting the medical information of the patients is a major concern in all hospitals. Digital watermarking is a procedure prevalently used to secure the confidentiality of medical information and maintain them, which upgrades patient health awareness. To protect the medical information, the robust and lossless patient medical information sharing system using crypto-watermarking method is proposed. The proposed system consists of two phases: (i) embedding and (ii) extraction. In this paper, we securely share three types of patient information, medical image, electronic health record (EHR), and face image from one hospital to another hospital. Initially, all the three inputs are encrypted and the information is concordant. In order to enhance the robustness of the crypto-watermarking system, the obtained bit stream is compressed, and the compressed bit streams are embedded into the cover image. The same process is repeated for the extraction process. The experimentation result is carried out using different medical images with EHR, and the effectiveness of the proposed algorithm is analyzed with the help of peak signal to noise ratio.
引用
收藏
页码:1558 / 1575
页数:18
相关论文
共 27 条
[1]  
Amirgholipour SK., 2009, JDCTA, V3, P42, DOI DOI 10.4156/JDCTA.VOL3.ISSUE2.AMIRGHOLIPOUR
[2]   An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm [J].
Aparna, Puvvadi ;
Kishore, Polurie Venkata Vijay .
JOURNAL OF INTELLIGENT SYSTEMS, 2018, 27 (01) :115-133
[3]  
AthishMon F., 2018, International Journal of Pure and Applied Mathematics, V118, P265
[4]   Tamper detection and restoring system for medical images using wavelet-based reversible data embedding [J].
Chiang, Kuo-Hwa ;
Chang-Chien, Kuang-Che ;
Chang, Ruey-Feng ;
Yen, Hsuan-Yen .
JOURNAL OF DIGITAL IMAGING, 2008, 21 (01) :77-90
[5]  
Chitrasen, 2015, IJARCCE, V4, P307, DOI DOI 10.17148/IJARCCE.2015.4170
[6]   A medical image watermarking scheme based on wavelet transform [J].
Giakoumaki, A ;
Pavlopoulos, S ;
Koutsouris, D .
PROCEEDINGS OF THE 25TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-4: A NEW BEGINNING FOR HUMAN HEALTH, 2003, 25 :856-859
[7]   Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting [J].
Golpira, Hemin ;
Daniyali, Habibollah .
2009 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT 2009), 2009, :31-36
[8]  
Kumar B., 2011, J INF SECUR, V2, P91, DOI DOI 10.4236/JIS.2011.22009
[9]   Reversible image watermarking based on integer-to-integer wavelet transform [J].
Lee, Sunil ;
Yoo, Chang D. ;
Kalker, Ton .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (03) :321-330
[10]  
Liew SC, 2010, INT CONF COMP SCI, P417, DOI 10.1109/ICCSIT.2010.5564078