Region-Based Hybrid Medical Image Watermarking Scheme for Robust and Secured Transmission in IoMT

被引:42
作者
Singh, Priyanka [1 ]
Devi, K. Jyothsna [1 ]
Thakkar, Hiren Kumar [2 ]
Kotecha, Ketan [3 ]
机构
[1] SRM Univ AP, Dept Comp Sci & Engn, Amaravati 522502, India
[2] Marwadi Univ, Dept Comp Engn, Rajkot 360006, Gujarat, India
[3] Symbiosis Int Univ, Symbiosis Ctr Appl Artificial Intelligence, Pune 412115, Maharashtra, India
关键词
Medical diagnostic imaging; Watermarking; Authentication; Robustness; Image coding; Image segmentation; Discrete wavelet transforms; DWT-SVD; Internet of Medical Things (IoMT); structural saliency map; hiding capacity map; pseudo random key; medical image watermarking; SALIENCY DETECTION; DCT; SVD; TRANSFORM; WAVELET;
D O I
10.1109/ACCESS.2022.3143801
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growth in Internet and digital technology, Internet of Medical Things (IoMT) and Telemedicine have become buzzwords in healthcare. A large number of medical images and information is shared through a public network in these applications. This paper proposes a region-based hybrid Medical Image Watermarking (MIW) scheme to ensure the authenticity, authorization, integrity, and confidentiality of the medical images transmitted through a public network in IoMT. In the proposed scheme, medical images are partitioned into Region of Interest (RoI) and Region of Non-Interest (RoNI). To ascertain integrity of RoI, tamper detection and recovery bits are embedded in RoI in the medical image. RoI is watermarked using adaptive Least Significant Bit (LSB) substitution with respect to the hiding capacity map for higher RoI imperceptibility and accuracy in tamper detection and recovery. Electronic Patient Record (EPR) is compressed using Huffman coding and encrypted using a pseudo-random key (secret key) to provide higher confidentiality and payload. QR code of hospital logo, Encrypted EPR, and RoI recovery bits are interleaved in RoNI using Discrete Wavelet Transform-Singular Value Decomposition (DWT-SVD) hybrid transforms to achieve a robust watermark. The proposed scheme is tested under various geometric and non-geometric attacks such as filtering, compression, rotation, salt and pepper noise and shearing. The evaluation results demonstrate that the proposed scheme has high imperceptibility, robustness, security, payload, tamper detection, and recovery accuracy under image processing attacks. Therefore, the proposed scheme can be used in the transmission of medical images and EPR in IoMT. Relevance of the proposed scheme is established by its superior performance in comparison to some of the popular existing schemes.
引用
收藏
页码:8974 / 8993
页数:20
相关论文
共 53 条
[1]   Robust and hybrid SVD-based image watermarking schemes: A survey [J].
Ahmadi, Sajjad Bagheri Baba ;
Zhang, Gongxuan ;
Wei, Songjie .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (1-2) :1075-1117
[2]   An efficient lossless robust watermarking scheme by integrating redistributed invariant wavelet and fractional Fourier transforms [J].
Ali, Musrrat ;
Ahn, Chang Wook ;
Pant, Millie .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (10) :11751-11773
[3]   A robust image watermarking technique using SVD and differential evolution in DCT domain [J].
Ali, Musrrat ;
Ahn, Chang Wook ;
Pant, Millie .
OPTIK, 2014, 125 (01) :428-434
[4]   Medical image watermarking for ownership & tamper detection [J].
Alshanbari, Hanan S. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (11) :16549-16564
[5]   An efficient visual saliency detection model based on Ripplet transform [J].
Andrushia, A. Diana ;
Thangarajan, R. .
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2017, 42 (05) :671-685
[6]  
[Anonymous], 2014, Comput., Commun. Manuf.
[7]   A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD [J].
Balasamy, K. ;
Suganyadevi, S. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (05) :7167-7186
[8]   Analysis of Digital Image Watermarking Techniques through Hybrid Methods [J].
Begum, Mahbuba ;
Uddin, Mohammad Shorif .
ADVANCES IN MULTIMEDIA, 2020, 2020
[9]  
Bentley J. L, 1977, DIVIDE CONQUER LINEA, V7, P2
[10]   A secure image watermarking for tamper detection and localization [J].
Bhalerao, Siddharth ;
Ansari, Irshad Ahmad ;
Kumar, Anil .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) :1057-1068