Open Access Open Access  Restricted Access Subscription Access

Robust Watermarking Method for Secure Transmission of Medical Images in EHR Systems


Affiliations
1 University of Science and Technology of Oran (USTO), Algeria
 

Confidentiality of Electronic Health Record (EHR) and privacy are two important security requirements for healthcare systems. Many devices on the EHR network utilize little or no encryption, which makes data in transit vulnerable to exploitative attacks, such as Man-in-the-Middle and other filtration methods. Recently, watermarking algorithms as an efficient response to these requirements is in the underline. In this paper, we present a robust watermarking method conceived as part of an Electronic Health Record platform. In this method a chaotic encryption and blind medical image watermarking technique was incorporated into the system as an authorization mechanism to ensure confidentiality and integrity of electronic health information. We present a hybrid watermarking method based on a combination of discrete wavelet transform (DWT), hessenberg Decomposition (HD), Singular value decomposition (SVD) and an original chaos crypto system based on the Arnold Transform (AT) of Singular Value Decomposition. In order to spread the robustness of our algorithm and provide additional security, an improved SVD-AT embedding and extraction procedure has been used to scramble the EHR data in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The low frequency wavelet coefficients are selected to carry this scrambled-watermark. In extraction process, the stored used plain image is obtained from the trusted authority server to complete the verification process. The receiver should compare the unsigned watermark with the extracted watermark again. The verification can be done before clinical procedures and diagnosis. The proposed watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is performed.

Keywords

Watermarking, Medical Image, Discrete Wavelet Transform, Singular Value Decomposition, Arnold Transform, e-Health, Chaos, Hessenberg Decomposition, EHR Modeling.
User
Notifications
Font Size

  • Joint NEMA/COCIR/JIRA Security and Privacy Committee,2003. "Defending Medical Information Systems Against Malicious Software," National Electrical Manufacturers Association-USA.
  • Umamageswari A., Ferni U., Suresh G.R. ,2011."A Survey on Security in Medical Image Communication, «International Journal of Computer Applications, Vol. 30, no.3.
  • Ravi Shah, Abhinav Agarwal and Subramaniam Ganesan, “Frequency Domain Real Time Digital Image Watermarking”, Oakland university, MI-48309, 1998.
  • Husrev T. Sencar, Ali N. Akansu, in Data Hiding Fundamentals and Applications, 2004.
  • Frank Y. Shih, Scott Y. Y. Wu, “Combinational Image watermarking in the Spatial and Frequency domain”, Pattern Recognition, volume 36, Number 4, April 2003, pages 969-975.
  • Jiwu Huang, Yun Q. Shi, Yi Shi, “Embedding image watermarks in DC components”, IEEE Trans. CSVT 10 (6) (2000) 974–979.
  • William Puech et Jose M Rodrigues, A new crypto-watermarking method for medical images safe transfer, 2004 12th European Signal Processing Conference,2004, p. 1481-1484.
  • B. Macq, F. Dewey, Trusted Headers for Medical Images in Proceedings of the DFG VIII-DII Watermarking Workshop, Erlangen, Germany, Oct. 1999.
  • A.K. Ray, S. Padhihary, P.K. Patra and M.N. Mohanty, Development of a new algorithm based on SVD for image watermarking, in: Computational Vision and Robotics Springer, New Delhi, pp. 79-87, 2015.
  • Rajendra Acharya et al., « Simultaneous storage of patient information with medical images in the frequency domain », in : Computer methods and programs in biomedicine 76.1 (2004), p. 13-19.
  • S.Kaur and R. Talwar, Arnold transform based Security Enhancement using Digital Image Watermarking with Complex Wavelet Transform, International Journal of Electronics Engineering Research.9 (2017), pp. 677-693.
  • C. Kumar, A. K. Singh, P. Kumar, R. Singh and S. Singh, SPIHT-basedmultiple image watermarking in NSCTdomain, Concurrency and Computation: Practice and Experience. (2018), e4912.
  • Abderrahmane Daham and Mohamed ouslim ,Encryption Based Watermarking Technique For Security Of Medical Image , International Journal of Computer Science & Information Technology (IJCSIT), February 2022, Volume 14, Number 1.
  • S. M. Haque, (2008),“Singular Value Decomposition and Discrete Cosine Transform Based Image Watermarking”, Master's Thesis, Computer Science, Blekinge Institute of Technology, Sweden.
  • Rupinder K., 2013. "A Medical Image Watermarking Technique for Embedding EPR and Its Quality Assessment Using No-Reference Metrics," I.J. Information Technology and Computer Science, vol. 2, pp. 73-79.
  • Chauhan, D.S.; Singh, A.K.; Kumar, B.; Saini, J.P. Quantization based multiple medical information watermarking for secure e-health. Multimed. Tools Appl. 2019, 78, 3911–3923
  • Zain JM, Clarke M. Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. Int J Comput Sci Netw Secur. 2007;7(9):19–28.
  • Dagadu, J.C.; Li, J. Context-based watermarking cum chaotic encryption for medical images in telemedicine applications. Multimed. Tools Appl. 2018, 77, 24289–24312.
  • A. Daham, M. Ouslim, Y. Hafed and W. Djaber, "Robust Watermarking Method to Secure Medical Images Applied to Ehealth," 2022 13th International Conference on Information and Communication Systems (ICICS), 2022, pp. 379-385, doi: 10.1109/ICICS55353.2022.9811160.
  • Ashraf Afifi Efficient Arnold and Singular Value Decomposition based Chaotic Image Encryption International Journal of Advanced Computer Science and Applications, Vol. 10, No. 3, 2019.
  • Thakur, S.; Singh, A.K.; Ghrera, S.P.; Elhoseny, M. Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed. Tools Appl. 2019, 78, 3457–3470.
  • S.A. Parah et al. Parah, S.A.; Sheikh, J.A.; Ahad, F.; Loan, N.A.; Bhat, G.M. Information hiding in medical images: A robust medical image watermarking system for E-healthcare. Multimed. Tools Appl. 2017, 76, 10599–10633.
  • M. Kutter and F.A. Petitcolas, Fair evaluation methods for image watermarking systems, Journal of Electronic Imaging. 9 (2000), 445-456.
  • Mayssa Tayachi et al. Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems, 2020.
  • Huang, H.-C.; Chu, S.-C.; Pan, J.-S.; Huang, C.-Y.; Liao, B.-Y. Tabu Search Based Multi-Watermarks Embedding Algorithm with Multiple Description Coding. Inf. Sci. 2011, 181, 3379–3396.

Abstract Views: 189

PDF Views: 113




  • Robust Watermarking Method for Secure Transmission of Medical Images in EHR Systems

Abstract Views: 189  |  PDF Views: 113

Authors

Abderrahmane Daham
University of Science and Technology of Oran (USTO), Algeria
Mohamed Ouslim
University of Science and Technology of Oran (USTO), Algeria

Abstract


Confidentiality of Electronic Health Record (EHR) and privacy are two important security requirements for healthcare systems. Many devices on the EHR network utilize little or no encryption, which makes data in transit vulnerable to exploitative attacks, such as Man-in-the-Middle and other filtration methods. Recently, watermarking algorithms as an efficient response to these requirements is in the underline. In this paper, we present a robust watermarking method conceived as part of an Electronic Health Record platform. In this method a chaotic encryption and blind medical image watermarking technique was incorporated into the system as an authorization mechanism to ensure confidentiality and integrity of electronic health information. We present a hybrid watermarking method based on a combination of discrete wavelet transform (DWT), hessenberg Decomposition (HD), Singular value decomposition (SVD) and an original chaos crypto system based on the Arnold Transform (AT) of Singular Value Decomposition. In order to spread the robustness of our algorithm and provide additional security, an improved SVD-AT embedding and extraction procedure has been used to scramble the EHR data in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The low frequency wavelet coefficients are selected to carry this scrambled-watermark. In extraction process, the stored used plain image is obtained from the trusted authority server to complete the verification process. The receiver should compare the unsigned watermark with the extracted watermark again. The verification can be done before clinical procedures and diagnosis. The proposed watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is performed.

Keywords


Watermarking, Medical Image, Discrete Wavelet Transform, Singular Value Decomposition, Arnold Transform, e-Health, Chaos, Hessenberg Decomposition, EHR Modeling.

References