A Novel Approch for Digital Image Watermarking Using Cryptography (original) (raw)

A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine

Egyptian Informatics Journal, 2013

Nowadays; modern Hospital Data Management Systems (HDMSs) are applied in a computer network; in addition medicinal equipments produce medical images in a digital form. HDMS must store and exchange these images in a secured environment to provide image integrity and patient privacy. The reversible watermarking techniques can be used to provide the integrity and the privacy. In this paper, a security technique based on watermarking and encryption is proposed to be used for Digital Imaging and Communications in Medicine (DICOM). It provides patient authentication, information confidentiality and integrity based on reversible watermark. To achieve integrity service at the sender side; a hash value based on encrypted MD5 is determined from the image. And to satisfy the reversible feature; R-S-Vector is determined from the image and is compressed based on a Huffman compression algorithm. After that to provide confidentiality and authentication services: the compressed R-S-Vector, the hash value and patient ID are concatenated to form a watermark then this watermark is encrypted using AES encryption technique, finally the watermark is embedded inside the medical image. Experimental results prove that the proposed technique can provide patient authentication services, image integrity service and information confidentiality service with excellent efficiency. Concluded results for all tested DICOM medical images and natural images show the following: BER equals 0, both of SNR and PSNR are consistent and have large values, and MSE has low value; the average values of SNR, PSNR and MSE are 52 dB, 57 dB and 0.12 respectively. Therefore, watermarked images have high imperceptibility, invisibility and transparency. In addition, the watermark extracted from the image at the

Novel Technique to Create a Secure Medical Image Watermarking

International Journal of Computer Applications, 2017

The technique that hides the information within an original image without causing much affects on the originality of the image is known as digital image watermarking technique. This technique is mainly used for copyright protection or rightful ownership. The main objective of mostly all the techniques is to enhance the imperceptibility which is done by maintaining the robustness of the image. In this paper a new technique is proposed that is based on the frequency domain which is known as the SVD-DWT-DCT along with Kalman filtering. Comparisons are made in the earlier available as well as the new proposed technique. It is seen through the experimental results that the new proposed technique provides better results along the PSNR and MSE parameters.

A Methodological Evaluation of Crypto-Watermarking System for Medical Images

Cloud Computing Systems and Applications in Healthcare

Health care institution demands exchange of medical images of number of patients to sought opinions from different experts. In order to reduce storage and for secure transmission of the medical images, Crypto-Watermarking techniques are adopted. The system is considered to be combinations of encryption technique with watermarking or steganography means adopted for safe transfer of medical images along with embedding of optional medical information. The Digital Watermarking is the process of embedding data to multimedia content. This can be done in spatial as well as frequency domain of the cover image to be transmitted. The robustness against attacks is ensured while embedding the encrypted data into transform domain, the encrypted data can be any secret key for the content recovery or patient record or the image itself. This chapter presents basic aspects of crypto-watermarking technique, as an application. It gives a detailed assessment on different approaches of crypto-watermarki...

Advanced watermarking technique to improve medical images' security

TELKOMNIKA Telecommunication Computing Electronics and Control, 2019

Advances in imaging technology have made medical images become one of the important sources for information in supporting accurate diagnoses and treatment decisions by doctors for their patients. However, the vulnerability of medical images' security is high. The images can be easily 'attacked', which altered their information that can lead to incorrect diagnoses or treatment. In order to make the images less vulnerable from outside attacks, this study proposes to secure them by advancing the watermarking using dual-layer fragile technique. It is expected that this dual-layer fragile watermarking will guarantee the integrity, authenticity, and confidentiality of patient's and any other important information and also the pixel data of the medical images. The work in this study implements two LSBs of image where the role of the first LSB is as a tamper detector, and the second LSB is used to store patient's and any other important information. Medical images of four deadliest diseases in Indonesia were used to test the proposed watermarking technique. Results from the conducted tests show that the proposed technique able to generate a watermarked image that has no noticeable changes compared to its original image, with PSNR value more than 44 dB and SSIM value of almost 1, where the tamper detector can correctly detect and localize any tampering on the watermarked image. Furthermore, the proposed technique has shown to have a higher level of security on medical images, compared to DICOM standard and standard watermarking method.

Secure Watermarking Technique for Medical Images with Visual Evaluation

SSRN Electronic Journal, 2018

This paper presents a hybrid watermarking technique for medical images. The method uses a combination of three transforms: Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and singular value decomposition (SVD). Then, the paper discusses the results of applying the combined method on different medical images from eight patients. The images were watermarked with a small watermark image representing the patients' medical data. The visual quality of the watermarked images (before and after attacks) was analyzed using five quality metrics: PSNR, WSNR, PSNR-HVS-M, PSNR-HVS, and MSSIM. The first four metrics' average values of the watermarked medical images before attacks were approximately 32 db, 35 db, 42 db, and 40 db respectively; while the MSSM index indicated a similarity between the original and watermarked images of more than 97%. However, the metric values decreased significantly after attacking the images with various operations even though the watermark image could be retrieved after almost all attacks. In brief, the initial results indicate that watermarking medical images with patients' data does not significantly affect their visual quality and they can still be used by medical staff.

Robust Watermarking Method for Secure Transmission of Medical Images in EHR Systems

CERN European Organization for Nuclear Research - Zenodo, 2022

Confidentiality of Electronic Health Record (EHR) and privacy are two important security requirements for healthcare systems. Many devices on the EHR network utilize little or no encryption, which makes data in transit vulnerable to exploitative attacks, such as Man-in-the-Middle and other filtration methods. Recently, watermarking algorithms as an efficient response to these requirements is in the underline. In this paper, we present a robust watermarking method conceived as part of an Electronic Health Record platform. In this method a chaotic encryption and blind medical image watermarking technique was incorporated into the system as an authorization mechanism to ensure confidentiality and integrity of electronic health information. We present a hybrid watermarking method based on a combination of discrete wavelet transform (DWT), hessenberg Decomposition (HD), Singular value decomposition (SVD) and an original chaos crypto system based on the Arnold Transform (AT) of Singular Value Decomposition. In order to spread the robustness of our algorithm and provide additional security, an improved SVD-AT embedding and extraction procedure has been used to scramble the EHR data in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The low frequency wavelet coefficients are selected to carry this scrambled-watermark. In extraction process, the stored used plain image is obtained from the trusted authority server to complete the verification process. The receiver should compare the unsigned watermark with the extracted watermark again. The verification can be done before clinical procedures and diagnosis. The proposed watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is performed.

An Enhanced Digital Image Watermarking Scheme for Medical Images using Neural Network, DWT and RSA

International Journal of Modern Education and Computer Science, 2016

Image watermarking is the process of the hiding the one image into other image for the copyright protection. The process of watermarking must be done in this way that the pixels of the original image must remain in its original HD form. A lot of work has been done in this context in previous years but some techniques have their own applications, drawbacks as well as advantages. So, this paper will utilize three techniques i.e. Discreet Wavelet Transform (DWT), Neural Network (NN) and RSA encryption for image watermarking. In the end the performance of the proposed technique will be measured on the basis of PSNR, MSE, BCR, BER and NCC in MATLAB R2010a environment.

A Survey On Various Watermarking and Cryptography Techniques for Data Hiding in Medical Images

Water marking scheme is use for secure the data to protect digital content from unauthorized modification. The digital image watermarking technology is an important aspect about multimedia authentication and copyright protection, in order to enhance its reliability and security. Image watermarking scheme can effectively be used in medical image processing to authenticate or investigate the integrity on medical images. Join cryptography and watermarking is efficient method for security. Peak Signal to Noise Ratios and Normalized Correlation are computed to accesses the quality of the watermarked images and extracted the information of images.

A digital watermarking framework with application to medical image security

The research presented in this thesis revolves around the digital watermarking and its application to medical images. Digital watermarking is an evolving technology, which has great promise for addressing multimedia information security. Digital medical images, on the other hand, are the outcome of the advanced imaging technology that has enabled modern health care to seamlessly offer many distant medical services. Thereby, with the remote access and distribution, medical images are subject to many complex and new legal and ethical issues. Under this circumstance, while the security need of the medical images is critical, the conventional tools seem to fall short of providing necessary protection. Digital watermarking has thus been studied to address this problem for this research. Several research gaps have been identified. They are: (i) requirements for the watermarking of medical images are not well defined; (ii) there is no known construction of a complete or formal watermarking model that helps identify and evaluate the state-of-the-art watermarking scheme for an application; (iii) watermarking properties are not well defined and some of them (e.g., robustness, security) are naturally misinterpreted in practice; (iv) security levels of existing watermarking schemes are mostly unknown; and (iv) there is no watermark embedding scheme available which is equally suitable for various medical image modalities. This research has started with a comprehensive literature review on digital watermarking schemes and their applications to medical images. A general watermarking model for digital image applications has then been developed and a set of fundamental watermarking properties (e.g., perceptual similarity, robustness, etc.) has been defined. Models for a set of expected attacks in digital image application scenarios have been developed using the proposed watermarking model. The current state of watermarking security has been reviewed and the need for complete security analysis of watermarking schemes has been identified. To this, three new counterfeiting attack models have been developed and validated for some image authentication schemes. Thereby, the watermarking based self-authentication schemes have been shown to violate the systematic definition of security. For defending against the counterfeiting weaknesses and proposed attacks, a set of fundamental requirements has been determined and a tentative construction of a self-authentication scheme is proposed. Considering that construction, a novel medical image embedding scheme is developed that avoids the limitations of existing schemes. A watermarking capacity control framework is developed and validated using the asymptotic analysis. Experimental results demonstrate that the proposed scheme has higher capacity-distortion performance and more efficient capacity control ability than some prominent existing schemes. Being irreversible and general RONI (region of non-interest) based, the proposed scheme would help provide continuous security protection and minimize legal-ethical impacts, and thereby could be commercially viable in the future for different medical image applications. This research advances knowledge in the area of digital image watermarking and its applications. Developing a formal model and defining fundamental parameters and possible attacks presented in this thesis, are the first steps toward a unified and intuitive watermarking theory. The developed model would allow a unified treatment of all practically meaningful variants of digital image watermarking schemes. The developed new attack models and their uses in rigorously analysing security of watermarking schemes can be used as principles to determine the security levels of watermarking schemes. The proposed watermarking scheme for medical images and its validation create knowledge of an efficient embedding approach, which can be used for different applications such as content authentication, tampering detection and localization, and annotation. Further, the generalized notion of watermarking capacity control and the use of asymptotic analysis for studying computational aspects of watermarking schemes would create a new era in watermarking research. In summary, the findings, theoretical development and analyses, and experimental evidence of this research represent a comprehensive source of information, which can be assimilated and disseminated towards standardizing future research in the formal modelling, complete security analysis and computational aspects, of watermarking schemes.

A Secured and Robust Medical Image Watermarking Approach for Protecting Integrity of Medical Images

Transactions on Emerging Telecommunications Technologies, 2020

In this paper, a novel medical image watermarking (MIW) technique for tele-medicine applications is proposed. In this approach homomorphic transform (HT), redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD) transforms are successfully utilized for developing an effective watermarking technique. Reflectance component of medical host image is obtained using HT, on which RDWT decomposition and SVD are applied. Similarly medical watermark image is processed with RDWT and SVD. Singular values (Svs) were used for embedding the watermark image into host image. 2-D chaotic Arnold transform (AT) is used for providing extra security to the watermark image by encrypting the watermarked image. Moreover, proposed technique is also tested for several wavelet families. Robustness and imperceptibility of the proposed technique is enhanced as depicted in experimental results under various attacks. Furthermore, better robustness is attained from proposed technique on comparing it with other formerly reported schemes.