Medical Image Watermarking for Telemedicine Application Security

Author(s):  
Khaldi Amine ◽  
Kahlessenane Fares ◽  
Kafi Med Redouane ◽  
Euschi Salah

In this work, we proposed a robust and blind watermarking approach to adequately secure medical images exchanged in telemedicine. This approach ensures the traceability and integrity of the medical and essential image for data security in the field of telemedicine. In this paper, a blind watermarking method is proposed to adequately secure the electronic patient records. The integration of the watermark will be carefully performed by combining the parity of the successive values. This innovative approach will be typically implemented in the three insertion domains: spatial, frequency and multi-resolution. For the spatial domain, the watermark will be integrated into the colorimetric values of the image. In the frequency domain, the watermark bits will be substituted to the DCT coefficient’s least significant bit. For the multi-resolution domain insertion, after calculating a DWT, the obtained LL sub-band coefficients will be used for the integration process. After comparing our approaches to the various recent works in the three domains, the obtained results demonstrate that our proposed approach offers a good imperceptibility for the frequency and spatial domains insertion.

Author(s):  
Youssef Zaz ◽  
Lhoussain El Fadil ◽  
Mohamed El Kayyali

This paper demonstrates new methodology to improve security and avoid data overlapping between patients records which are defined as Electronic Patient Records (EPR), a combination of digital watermarking techniques and cryptography are used to ensure the non-separation of EPR and medical images during communications within open networks. The EPR data is encrypted, by a symmetric key algorithm based on an Elliptic Curve Cryptosystem (ECC), and inserted in liberated zone of the Least Significant Bit plan (LSB) of the medical image by compressing the original one using the Huffman coding. The proposed method improves security issues and reduces the computation cost related to data encryption and decryption.


Author(s):  
Sheshang Degadwala ◽  
Sanjay Chaudhary ◽  
Sanjay Gaur

The fast improvement of the advanced media innovation and the web permit individuals will copy, transmit, appropriate Furthermore store data more undoubtedly. Restorative pictures traded in open networks oblige a technique with give acceptable secrecy for the image, genuineness of the picture proprietorship Also hotspot from claiming origin, Also picture integument confirmation. This Look into keeps tabs for blind watermarking from claiming Medical images, both ash scale and in addition color, preserving its ROI. It also successfully manages tolerant wellbeing record Eventually Tom's perusing safely embedding it inside those picture in front of transmission. The paper is introduce new Embedding Process with Discrete Wavelet Transform and Singular Value Decomposition then relate with others methods performance with different Rotational attacks to demonstrate with parameters. Also Attack detection and recovery of ROI using pseudo Zernike moment and affine transform made this very functional method in the approaching color picture watermarking areas.


2021 ◽  
Vol 38 (6) ◽  
pp. 1637-1646
Author(s):  
KVSV Trinadh Reddy ◽  
S. Narayana Reddy

In distributed m-health communication, it is a major challenge to develop an efficient blind watermarking method to protect the confidential medical data of patients. This paper proposes an efficient blind watermarking for medical images, which boasts a very high embedding capacity, a good robustness, and a strong imperceptibility. Three techniques, namely, discrete cosine transform (DCT), Weber’s descriptors (WDs), and Arnold chaotic map, were integrated to our method. Specifically, the Arnold chaotic map was used to scramble the watermark image. Then, the medical image was partitioned into non-over lapping blocks, and each block was subjected to DCT. After that, the scrambled watermark image data were embedded in the middle-band DCT coefficients of each block, such that two bits were embedded in each block. Simulation results show that the proposed watermarking method provides better imperceptibility, robustness, and computational complexity results with higher embedding capacity than the contrastive method.


2020 ◽  
Vol 17 (1) ◽  
pp. 0178
Author(s):  
Hanaa Mohsin Ahmed

A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s unique mark is used later as a watermark to be embedded into host PMI using blind watermarking-based singular value decomposition (SVD) algorithm. This is a new solution that we also proposed to applying SVD into a blind watermarking image. Our algorithm preserves PMI content authentication during the transmission and PMR ownership to the patient for subsequently transmitting associated diagnosis to the correct patient via a mobile telemedicine application. The performance of experimental results is high compare to previous results, uses recovered watermarks demonstrating promising results in the tamper detection metrics and self-recovery capability, with 30db PSNR, NC value is 0.99.


Securing the data of patient and keeping the information confidential has become a challenging task at present days. More number of chances are available for information alteration or security breach. When the information is transferred from source to destination digital image watermarking technique is most commonly used to secure the patient’s information watermarking provides the copy right protection, authentication proof and detection of tampering. This paper presents a watermarking technique to embed patient’s information in a medical image so that information can be transferred securely and information alteration would be prevented. An Arnold Chaotic Map is applied to the sensitive watermark image to scramble the pixels in the sensitive watermark image. The cover medical image is partitioned into non overlapping blocks and DCT is applied to each block. Each and every bit of the watermark image is embedded into block by using Weber Descriptor. By using this Weber Descriptor robustness of an image will be increased. An experimental result shows that the proposed algorithm improves the robustness against various attacks like compression, filtering and noising.


2021 ◽  
pp. 1-16
Author(s):  
Narima Zermi ◽  
Amine Khaldi ◽  
Mohamed Redouane Kafi ◽  
Fares Kahlessenane ◽  
Salah Euschi

Cryptography ◽  
2020 ◽  
pp. 480-497
Author(s):  
Lin Gao ◽  
Tiegang Gao ◽  
Jie Zhao

This paper proposed a reversible medical image watermarking scheme using Redundant Discrete Wavelet Transform (RDWT) and sub-sample. To meet the highly demand of the perceptional quality, the proposed scheme embedding the watermark by modifying the RDWT coefficients. The sub-sample scheme is introduced to the proposed scheme for the enhancement of the embedding capacity. Moreover, to meet the need of security, a PWLCM based image encryption algorithm is introduced for encrypting the image after the watermark embedding. The experimental results suggests that the proposed scheme not only meet the highly demand of the perceptional quality, but also have better embedding capacity than former DWT based scheme. Also the encryption scheme could protect the image contents efficiently.


Author(s):  
Musa. M. Yahaya ◽  
Aminat Ajibola

Recently, the rate of data transfer over the internet globally has increased and this called for more data security as security of data is of great concern for individuals as well as business owners. Cryptography and steganography are two major key players for data security technique. Cryptography is use to perform encryption on the secrete message while steganography hides the secrete message in digital media, image in this regards. This paper employed these two techniques using Advanced Encryption Standard (AES) for the cryptography and Least Significant Bit (LSB) for the steganography. Combining the two algorithms ensured data integrity, data security, and flexibility. The changes in the secrete message carrier (Stego) is insignificant and is often not noticeable by the nicked eyes, thus this make the interception of the message often difficult by intruder.


Sign in / Sign up

Export Citation Format

Share Document