scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Compression-Then-Encryption-Based Secure Watermarking Technique for Smart Healthcare System

01 Oct 2020-IEEE MultiMedia (IEEE)-Vol. 27, Iss: 4, pp 133-143
TL;DR: A compression-then-encryption-based dual watermarking to protect the EPR data for the healthcare system, which produces several significant features and offers better performance in terms of robustness and security.
Abstract: The smart healthcare system is an electronic patient records (EPR) sharing system, which significantly helps sharing of EPR data and provides appropriate medical assistance for the patients and a more suitable platform for the potential researchers. However, the security of EPR data is still a major issue in such systems. In this paper, we develop a compression-then-encryption-based dual watermarking to protect the EPR data for the healthcare system, which produces several significant features. Experiments conducted on a large set of medical data indicate the capability of our proposed method for smart healthcare. Finally, when compared with the existing technique, the proposed work offers better performance in terms of robustness and security.
Citations
More filters
Journal ArticleDOI
TL;DR: In this article , a 3D medical watermarking algorithm based on wavelet transform is proposed, which employs the principal component analysis (PCA) transform to reduce the data dimension, which can minimize the error between extracted components and the original data in the mean square sense.
Abstract: In a telemedicine diagnosis system, the emergence of 3D imaging enables doctors to make clearer judgments, and its accuracy also directly affects doctors’ diagnosis of the disease. In order to ensure the safe transmission and storage of medical data, a 3D medical watermarking algorithm based on wavelet transform is proposed in this paper. The proposed algorithm employs the principal component analysis (PCA) transform to reduce the data dimension, which can minimize the error between the extracted components and the original data in the mean square sense. Especially, this algorithm helps to create a bacterial foraging model based on particle swarm optimization (BF-PSO), by which the optimal wavelet coefficient is found for embedding and is used as the absolute feature of watermark embedding, thereby achieving the optimal balance between embedding capacity and imperceptibility. A series of experimental results from MATLAB software based on the standard MRI brain volume dataset demonstrate that the proposed algorithm has strong robustness and make the 3D model have small deformation after embedding the watermark.

167 citations

Journal ArticleDOI
TL;DR: In this paper, the authors have discussed the advantages of smart healthcare using advanced technologies to transform the traditional traditional healthcare system and the remarkable development of internet technologies, the popularity of smart health has regularly come to the fore.
Abstract: With the remarkable development of internet technologies, the popularity of smart healthcare has regularly come to the fore. Smart healthcare uses advanced technologies to transform the traditional...

49 citations

Journal ArticleDOI
TL;DR: In this article, a blind watermarking approach for medical image protection is proposed, which consists of the Electronic Patient Record and the image acquisition data, and the watermark is then integrated into the least significant bits of the S component obtained by combining the parity of the successive coefficients.

45 citations

Journal ArticleDOI
TL;DR: Soft computing based watermarking approaches providing robustness, imperceptibility and good embedding capacity are compared systematically and major issues and potential solutions for soft computing-basedWatermarking are discussed to encourage further research in this area.
Abstract: Image watermarking techniques are used to provide copyright protection and verify ownership of media/entities. This technique refers to the concept of embedding of secret data/information of an owner in a given media/entity for determining any ownership conflicts that can arise. Many watermarking approaches have been offered by various authors in the last few years. However, there are not enough studies and comparisons of watermarking techniques in soft computing environments. Nowadays, soft computing techniques are used to improve the performance of watermarking algorithms. This paper surveys soft computing-based image watermarking for several applications. We first elaborate on novel applications, watermark characteristics and different kinds of watermarking systems. Then, soft computing based watermarking approaches providing robustness, imperceptibility and good embedding capacity are compared systematically. Furthermore, major issues and potential solutions for soft computing-based watermarking are also discussed to encourage further research in this area. Thus, this survey paper will be helpful for researchers to implement an optimized watermarking scheme for several applications.

40 citations

References
More filters
Journal ArticleDOI
TL;DR: It is proved that in all permutationonly image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a chosenplaintext attack, which significantly outperforms the state-of-theart cryptanalytic methods.
Abstract: Permutation is a commonly used primitive in multimedia (image/video) encryption schemes, and many permutation-only algorithms have been proposed in recent years for the protection of multimedia data. In permutation-only image ciphers, the entries of the image matrix are scrambled using a permutation mapping matrix which is built by a pseudo-random number generator. The literature on the cryptanalysis of image ciphers indicates that the permutation-only image ciphers are insecure against ciphertext-only attacks and/or known/chosen-plaintext attacks. However, the previous studies have not been able to ensure the correct retrieval of the complete plaintext elements. In this paper, we revisited the previous works on cryptanalysis of permutation-only image encryption schemes and made the cryptanalysis work on chosen-plaintext attacks complete and more efficient. We proved that in all permutation-only image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a chosen-plaintext attack. To the best of our knowledge, for the first time, this paper gives a chosen-plaintext attack that completely determines the correct plaintext elements using a deterministic method. When the plain-images are of size ${M}\times {N}$ and with ${L}$ different color intensities, the number ${n}$ of required chosen plain-images to break the permutation-only image encryption algorithm is ${n}=\lceil \log _{L}$ ( MN ) $\rceil $ . The complexity of the proposed attack is $O$ ( $n\,\cdot \, {M N}$ ) which indicates its feasibility in a polynomial amount of computation time. To validate the performance of the proposed chosen-plaintext attack, numerous experiments were performed on two recently proposed permutation-only image/video ciphers. Both theoretical and experimental results showed that the proposed attack outperforms the state-of-the-art cryptanalytic methods.

169 citations

Journal ArticleDOI
TL;DR: Experimental results demonstrate that the suggested watermarking technique archives high robustness against attacks in comparison to the other scheme for medical images, and verification its robustness for various attacks while maintaining imperceptibility, security and compression ratio.

160 citations


"Compression-Then-Encryption-Based S..." refers background or methods in this paper

  • ...PSNR and SSIM are the measures of imperceptibility offered by any hiding technique.(6) However, BER and NC determine the robustness provided by the data Table 1....

    [...]

  • ...From the survey, it is established that a combination of watermarking with a suitable encryption scheme is more popular and having great potential.(2,3,6) Encryption converts EPR data into an unreadable code for an unauthorized person to provide significant authentication of the digital form of medical data....

    [...]

  • ...Through making use of watermarking approaches with an appropriate compressionthen-encryption (CTE) scheme helps to provide secure and confidential transmission of sensitive data over bandwidth-constrained networks/IoT environments.(3,6,8) In this article, we develop a CTE based dual watermarking to protect the EPR data for the healthcare system....

    [...]

  • ...hiding technique.(6) NPCR and UACI estimate the strength of the encryption scheme....

    [...]

Journal ArticleDOI
TL;DR: The proposed robust and secure DWT, DCT and SVD based multiple watermarking techniques for protecting digital contents over unsecure social networks may find potential solutions in prevention of personal identity theft and unauthorized multimedia content sharing on online social networks/open channel.

122 citations

Journal ArticleDOI
TL;DR: General concepts of watermarking, major characteristics, recent applications, concepts of embedding and recovery process of watermarks, and the summary of various techniques are highlighted in brief.
Abstract: With the widespread growth of medical images and improved communication and computer technologies in recent years, authenticity of the images has been a serious issue for E-health applications. In order to this, various notable watermarking techniques are developed by potential researchers. However, those techniques are unable to solve many issues that are necessary to be measured in future investigations. This paper surveys various watermarking techniques in medical domain. Along with the survey, general concepts of watermarking, major characteristics, recent applications, concepts of embedding and recovery process of watermark, and the summary of various techniques (in tabular form) are highlighted in brief. Further, major issues associated with medical image watermarking are also discussed to find out research directions for fledgling researchers and developers.

78 citations

Journal ArticleDOI
TL;DR: Experimental evaluation shows that using combination of NSCT, RDWT, SVD and chaotic encryption makes the approach robust, imperceptible, secure and suitable for medical applications.
Abstract: In this paper, a chaotic based secure medical image watermarking approach is proposed. The method is using non sub-sampled contourlet transform (NSCT), redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD) to provide significant improvement in imperceptibility and robustness. Further, security of the approach is ensured by applying 2-D logistic map based chaotic encryption on watermarked medical image. In our approach, the cover image is initially divided into sub-images and NSCT is applied on the sub-image having maximum entropy. Subsequently, RDWT is applied to NSCT image and the singular vector of the RDWT coefficient is calculated. Similar procedure is followed for both watermark images. The singular value of both watermarks is embedded into the singular matrix of the cover. Experimental evaluation shows when the approach is subjected to attacks, using combination of NSCT, RDWT, SVD and chaotic encryption it makes the approach robust, imperceptible, secure and suitable for medical applications.

76 citations