scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Compression-Then-Encryption-Based Secure Watermarking Technique for Smart Healthcare System

01 Oct 2020-IEEE MultiMedia (IEEE)-Vol. 27, Iss: 4, pp 133-143
TL;DR: A compression-then-encryption-based dual watermarking to protect the EPR data for the healthcare system, which produces several significant features and offers better performance in terms of robustness and security.
Abstract: The smart healthcare system is an electronic patient records (EPR) sharing system, which significantly helps sharing of EPR data and provides appropriate medical assistance for the patients and a more suitable platform for the potential researchers. However, the security of EPR data is still a major issue in such systems. In this paper, we develop a compression-then-encryption-based dual watermarking to protect the EPR data for the healthcare system, which produces several significant features. Experiments conducted on a large set of medical data indicate the capability of our proposed method for smart healthcare. Finally, when compared with the existing technique, the proposed work offers better performance in terms of robustness and security.
Citations
More filters
Journal ArticleDOI
01 Jul 2021
TL;DR: A robust information hiding algorithm based on lossless encryption, non-subsampled contourlet transform (NSCT), Hessen-berg decomposition (HD) and singular value decomposition was proposed in this paper.
Abstract: Aiming at the problem of the security of secret information in various potential applications, we introduce a robust information hiding algorithm based on lossless encryption, non-subsampled contourlet transform (NSCT), Hessen-berg decomposition (HD) and singular value decomposition (SVD). Firstly, the carrier and secret mark information is transformed by NSCT-HD-SVD. Secondly, the singular score of secret media information is concealed in the carrier image. Thirdly, the text document is further concealed in the carrier marked image via pseudo magic cubes to achieve the final carrier marked image. Finally, the lossless encryption scheme is utilized to encrypt the final marked image. The simulation results of the proposed algorithm indicate good invisibility and robustness effect compared to existing schemes with high security and hiding efficiency. It indicates a considerable improvement in robustness of up to 96.36% over other schemes. Overall, the proposed algorithm for various images, achieved peak signal-to-noise ratio (PSNR), normalized correlation (NC), structural similarity index (SSIM), number of changing pixel rate (NPCR) and unified averaged changed intensity (UACI) of up to 67.36 dB, 0.9996, 1.0000, 0.9964 and 0.4005, respectively, indicating its effectiveness for secure media applications.

8 citations

Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper developed medical image fusion-based watermarking scheme in dual tree complex wavelet transform (DTCWT)-singular value decomposition (SVD) domain, where computed tomography (CT) and magnetic resonance imaging (MRI) images are partitioned into a sequence of high frequencies and low frequency by non-sub sampled shearlet transform to obtain a fused image as a carrier.
Abstract: Nowadays, there is an increasing tendency to fuse multi-modal medical image due to the high diagnostic accuracy and assessment. However, the distribution of these images and more generally, health records may bring serious copy-violation issues in healthcare applications. Further, a massive amount of electronic health records is uploaded on the cloud due to the low cost and high usability. However, outsourcing these records to the cloud may greatly increase security and privacy issues. The present article develops medical image fusion-based watermarking scheme in dual tree complex wavelet transform (DTCWT)-singular value decomposition (SVD) domain. Here, computed tomography (CT) and magnetic resonance imaging (MRI) images are partitioned into a sequence of high frequencies and low frequency by non-subsampled shearlet transform (NSST) to obtain a fused image as a carrier. To enhance the authenticity, spatial and transform domain-based embedding is conducted to conceal multi-marks into carrier image. Finally, improved encryption scheme is employed to obtain a secure marked carrier image. Objective and subjective evaluations indicate a strong robustness effect (43.64%) of the proposed algorithm compared to other methods with remarkable invisibility, payload, and security. To the best of our knowledge, studies of image fusion-based dual watermarking and encryption have not yet been developed in combination with spatial and transform domain schemes for copy protection and ownership of health records, since it is also suitable for applications in the cloud.

8 citations

Journal ArticleDOI
TL;DR: A comprehensive survey on data hiding techniques for smart healthcare applications is presented in this article, where the authors introduce various aspects of data hiding along with major properties, generic embedding and extraction process, and recent applications.
Abstract: Due to smart healthcare systems highly connected information and communications technologies, sensitive medical information and records are easily transmitted over the networks. However, stealing of healthcare data is increasing crime every day to greatly impact on financial loss. In order to this, researchers are developing various cost-effective bio-signal based data hiding techniques for smart healthcare applications. In this paper, we first introduce various aspects of data hiding along with major properties, generic embedding and extraction process, and recent applications. This survey provides a comprehensive survey on data hiding techniques, and their new trends for solving new challenges in real-world applications. Then, we survey the various notable bio-signal based data hiding techniques. The summary of some notable techniques in terms of their objective, type of data hiding, methodology and database used, performance metrics, important features, and limitations are also presented in tabular form. At the end, we discuss the major issues and research directions to explore the promising areas for future research.

7 citations

Journal ArticleDOI
TL;DR: A review of deep learning-based covert communication scheme for protecting digital contents, devices and models and the contribution of surveyed scheme is summarized and compared in the context of estimation of design objectives, approaches, evaluation metric, and weaknesses.
Abstract: Deep learning-based methods have been popular in multimedia analysis tasks, including classification, detection, segmentation, and so on. In addition to conventional applications, this model can be widely used for cover communication, i.e., information hiding. This article presents a review of deep learning-based covert communication scheme for protecting digital contents, devices, and models. In particular, we discuss the background knowledge, current applications, and constraints of existing deep learning-based information hiding schemes, identify recent challenges, and highlight possible research directions. Further, major role of deep learning in the area of information hiding are highlighted. Then, the contribution of surveyed scheme is also summarized and compared in the context of estimation of design objectives, approaches, evaluation metric, and weaknesses. We believe that this survey can pave the way to new research in this crucial field of information hiding in deep-learning environment.

6 citations

References
More filters
Journal ArticleDOI
TL;DR: It is proved that in all permutationonly image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a chosenplaintext attack, which significantly outperforms the state-of-theart cryptanalytic methods.
Abstract: Permutation is a commonly used primitive in multimedia (image/video) encryption schemes, and many permutation-only algorithms have been proposed in recent years for the protection of multimedia data. In permutation-only image ciphers, the entries of the image matrix are scrambled using a permutation mapping matrix which is built by a pseudo-random number generator. The literature on the cryptanalysis of image ciphers indicates that the permutation-only image ciphers are insecure against ciphertext-only attacks and/or known/chosen-plaintext attacks. However, the previous studies have not been able to ensure the correct retrieval of the complete plaintext elements. In this paper, we revisited the previous works on cryptanalysis of permutation-only image encryption schemes and made the cryptanalysis work on chosen-plaintext attacks complete and more efficient. We proved that in all permutation-only image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a chosen-plaintext attack. To the best of our knowledge, for the first time, this paper gives a chosen-plaintext attack that completely determines the correct plaintext elements using a deterministic method. When the plain-images are of size ${M}\times {N}$ and with ${L}$ different color intensities, the number ${n}$ of required chosen plain-images to break the permutation-only image encryption algorithm is ${n}=\lceil \log _{L}$ ( MN ) $\rceil $ . The complexity of the proposed attack is $O$ ( $n\,\cdot \, {M N}$ ) which indicates its feasibility in a polynomial amount of computation time. To validate the performance of the proposed chosen-plaintext attack, numerous experiments were performed on two recently proposed permutation-only image/video ciphers. Both theoretical and experimental results showed that the proposed attack outperforms the state-of-the-art cryptanalytic methods.

169 citations

Journal ArticleDOI
TL;DR: Experimental results demonstrate that the suggested watermarking technique archives high robustness against attacks in comparison to the other scheme for medical images, and verification its robustness for various attacks while maintaining imperceptibility, security and compression ratio.

160 citations


"Compression-Then-Encryption-Based S..." refers background or methods in this paper

  • ...PSNR and SSIM are the measures of imperceptibility offered by any hiding technique.(6) However, BER and NC determine the robustness provided by the data Table 1....

    [...]

  • ...From the survey, it is established that a combination of watermarking with a suitable encryption scheme is more popular and having great potential.(2,3,6) Encryption converts EPR data into an unreadable code for an unauthorized person to provide significant authentication of the digital form of medical data....

    [...]

  • ...Through making use of watermarking approaches with an appropriate compressionthen-encryption (CTE) scheme helps to provide secure and confidential transmission of sensitive data over bandwidth-constrained networks/IoT environments.(3,6,8) In this article, we develop a CTE based dual watermarking to protect the EPR data for the healthcare system....

    [...]

  • ...hiding technique.(6) NPCR and UACI estimate the strength of the encryption scheme....

    [...]

Journal ArticleDOI
TL;DR: The proposed robust and secure DWT, DCT and SVD based multiple watermarking techniques for protecting digital contents over unsecure social networks may find potential solutions in prevention of personal identity theft and unauthorized multimedia content sharing on online social networks/open channel.

122 citations

Journal ArticleDOI
TL;DR: General concepts of watermarking, major characteristics, recent applications, concepts of embedding and recovery process of watermarks, and the summary of various techniques are highlighted in brief.
Abstract: With the widespread growth of medical images and improved communication and computer technologies in recent years, authenticity of the images has been a serious issue for E-health applications. In order to this, various notable watermarking techniques are developed by potential researchers. However, those techniques are unable to solve many issues that are necessary to be measured in future investigations. This paper surveys various watermarking techniques in medical domain. Along with the survey, general concepts of watermarking, major characteristics, recent applications, concepts of embedding and recovery process of watermark, and the summary of various techniques (in tabular form) are highlighted in brief. Further, major issues associated with medical image watermarking are also discussed to find out research directions for fledgling researchers and developers.

78 citations

Journal ArticleDOI
TL;DR: Experimental evaluation shows that using combination of NSCT, RDWT, SVD and chaotic encryption makes the approach robust, imperceptible, secure and suitable for medical applications.
Abstract: In this paper, a chaotic based secure medical image watermarking approach is proposed. The method is using non sub-sampled contourlet transform (NSCT), redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD) to provide significant improvement in imperceptibility and robustness. Further, security of the approach is ensured by applying 2-D logistic map based chaotic encryption on watermarked medical image. In our approach, the cover image is initially divided into sub-images and NSCT is applied on the sub-image having maximum entropy. Subsequently, RDWT is applied to NSCT image and the singular vector of the RDWT coefficient is calculated. Similar procedure is followed for both watermark images. The singular value of both watermarks is embedded into the singular matrix of the cover. Experimental evaluation shows when the approach is subjected to attacks, using combination of NSCT, RDWT, SVD and chaotic encryption it makes the approach robust, imperceptible, secure and suitable for medical applications.

76 citations