Open Access
Subscription Access
Encryption Based Watermarking Technique For Security Of Medical Image
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
Keywords
Watermarking, medical image, discrete wavelet transform, singular value decomposition, quantization, chaos cryptosystem.
User
Font Size
Information
- Umamageswari A., Ferni U., Suresh G.R. ,2011."A Survey on Security in Medical Image Communication," International Journal of Computer Applications, Vol. 30, no.3.
- Joint NEMA/COCIR/JIRA Security and Privacy Committee,2003. "Defending Medical Information Systems Against Malicious Software," National Electrical Manufacturers Association-USA.
- Ravi Shah, Abhinav Agarwal and Subramaniam Ganesan, “Frequency Domain Real Time Digital Image Watermarking”, Oakland university, MI-48309, 1998.
- O. Bruyndonckx, J. -J. Quisquater, B. Macq, “Spatial method for copyright labeling of digital images”, Proceeding of IEEE Workshop on Nonlinear Signal and Image processing, Neos Marmaras, Greece, 20–22 June 1995, pp. 456–459.
- P. Moulin, M. K. Mihcak, “The data-hiding capacity of image sources”, IEEE Trans. Image Process, 2002.
- Jiwu Huang, Yun Q. Shi, Yi Shi, “Embedding image watermarks in DC components”, IEEE Trans. CSVT 10 (6) (2000) 974–979
- Frank Y. Shih, Scott Y. Y. Wu, “Combinational Image watermarking in the Spatial and Frequency domain”, Pattern Recognition, volume 36, Number 4, April 2003, pages 969-975.
- Romualdas Bausys, Arturas Kriukovas, “Reversible Watermarking Scheme for Image the International Symposium ELMAR -2006, 07-09 Authentication in Frequency domain”, 48, June, Zadar, Croatia.
- Mandeep K. and Rupinder K.2012. "REVERSIBLE WATERMARKING OF MEDICAL IMAGES: AUTHENTICATION AND RECOVERY-A SURVEY," Journal of Information and Operations Management, vol.3, Issue 1, pp-241-244.
- El- sheimy N., Salwa A.K., Tolba A.S., Abdelkader F.M. and Hisham M. E., 2010."Wavelet Packets-Based Blind Watermarking for Medical Image Management," The Open Biomedical Engineering Journal, vol.4, pp.93-98.
- Rupinder K., 2013. "A Medical Image Watermarking Technique for Embedding EPR and Its Quality Assessment Using No-Reference Metrics," I.J. Information Technology and Computer Science, vol. 2, pp. 73-79.
- Zain JM, Clarke M. Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. Int J Comput Sci Netw Secur. 2007;7(9):19–28.
- A.K. Ray, S. Padhihary, P.K. Patra and M.N. Mohanty, Development of a new algorithm based on SVD for image watermarking, in: Computational Vision and Robotics Springer, New Delhi, pp. 79-87, 2015.
- S.Kaur and R. Talwar, Arnold transform based Security Enhancement using Digital Image Watermarking with Complex Wavelet Transform, International Journal of Electronics Engineering Research.9 (2017), pp. 677-693.
- C. Kumar, A. K. Singh, P. Kumar, R. Singh and S. Singh, SPIHT-basedmultiple image watermarking in NSCTdomain, Concurrency and Computation: Practice and Experience. (2018), e4912.
- X. G. Xia, C. G. Boncelet, G. R. Arce, (1997),“A Multi-Resolution Watermark for Digital Images”, in Proceedings of the IEEE International Conference on Image Processing, vol. 1, pp:548-551.
- F. Yu, Z. Lu, H. Luo, and P. Wang, (2001), “Three-Dimensional Model Analysis and Processing”, Springer-Verlag, Berlin Heidelberg.
- S. M. Haque, (2008),“Singular Value Decomposition and Discrete Cosine Transform Based Image Watermarking”, Master's Thesis, Computer Science, Blekinge Institute of Technology, Sweden.
- M. Kutter and F.A. Petitcolas, Fair evaluation methods for image watermarking systems, Journal of Electronic Imaging. 9 (2000), 445-456.
- Chauhan, D.S.; Singh, A.K.; Kumar, B.; Saini, J.P. Quantization based multiple medical information watermarking for secure e-health. Multimed. Tools Appl. 2019, 78, 3911–3923
- Thakur, S.; Singh, A.K.; Ghrera, S.P.; Elhoseny, M. Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed. Tools Appl. 2019, 78, 3457–3470.
- S.A. Parah et al. Parah, S.A.; Sheikh, J.A.; Ahad, F.; Loan, N.A.; Bhat, G.M. Information hiding in medical images: A robust medical image watermarking system for E-healthcare. Multimed. Tools Appl. 2017, 76, 10599–10633.
- Dagadu, J.C.; Li, J. Context-based watermarking cum chaotic encryption for medical images in telemedicine applications. Multimed. Tools Appl. 2018, 77, 24289–24312.
- Mayssa Tayachi et al. Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems, 2020
- Andreja S. and Jan .T.2008."ATTACKS ON DIGITAL WAVELET IMAGE WATERMARKS", Journal of ELECTRICAL ENGINEERING, VOL. 59, NO. 3, 2008, 131–138.
Abstract Views: 322
PDF Views: 146