scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Quantization based multiple medical information watermarking for secure e-health

TL;DR: The experimental results validate the effectiveness of the proposed framework in terms of BER and embedding capacity compared to other state-of-the-art methods and find potential application in prevention of patient identity theft in e-health applications.
Abstract: In this paper, an improved wavelet based medical image watermarking algorithm is proposed. Initially, the proposed technique decomposes the cover medical image into ROI and NROI regions and embedding three different watermarks into the non-region of interest (NROI) part of the transformed DWT cover image for compact and secure medical data transmission in E-health environment. In addition, the method addressing the problem of channel noise distortion may lead to faulty watermark by applying error correcting codes (ECCs) before embedding them into the cover image. Further, the bit error rates (BER) performance of the proposed method is determined for different kind of attacks including ‘Checkmark’ attacks. Experimental results indicate that the Turbo code performs better than BCH (Bose-Chaudhuri-Hochquenghem) error correction code. Furthermore, the experimental results validate the effectiveness of the proposed framework in terms of BER and embedding capacity compared to other state-of-the-art methods. Therefore, the proposed method finds potential application in prevention of patient identity theft in e-health applications.
Citations
More filters
Journal ArticleDOI
TL;DR: Experimental results clearly indicated that the proposed technique is highly robust and sufficient secure for various forms of attacks without any significant distortions between watermarked and cover image.
Abstract: In this paper, we present a robust and secure watermarking approach using transform domain techniques for tele-health applications. The patient report/identity is embedding into the host medical image for the purpose of authentication, annotation and identification. For better confidentiality, we apply the chaos based encryption algorithm on watermarked image in a less complex manner. Experimental results clearly indicated that the proposed technique is highly robust and sufficient secure for various forms of attacks without any significant distortions between watermarked and cover image. Further, the performance evaluation of our method is found better to existing state-of-the-art watermarking techniques under consideration. Furthermore, quality analysis of the watermarked image is estimated by subjective measure which is beneficial in quality driven healthcare industry.

179 citations

Journal ArticleDOI
TL;DR: Experimental results demonstrate that the suggested watermarking technique archives high robustness against attacks in comparison to the other scheme for medical images, and verification its robustness for various attacks while maintaining imperceptibility, security and compression ratio.

160 citations

Journal ArticleDOI
TL;DR: Simulation outcomes conducted on different types of medical images disclose that the proposed scheme demonstrates superior transparency and robustness against signal and compression attacks compared with the related hybrid optimized algorithms.

94 citations

Journal ArticleDOI
TL;DR: The proposed method is superior over all existing quaternion moment-based watermarking in terms of visual imperceptibility capability and robustness to different attacks.
Abstract: In this paper, a geometrically invariant color image watermarking method using Quaternion Legendre-Fourier moments (QLFMs) is presented. A highly accurate, fast and numerically stable method is proposed to compute the QLFMs in polar coordinates. The proposed watermarking method consists of three main steps. First, the Arnold scrambling algorithm is applied to a binary watermark image. Second, the QLFMs of the original host color image are computed. Third, the binary digital watermark is embedding by performing the quantization of selected QLFMs. Two different groups of attacks are considered. The first group includes geometric attacks such as rotation, scaling and translation while the second group includes the common signal processing attacks such as image compression and noise. Experiments are performed where the performance of proposed method is compared with the existing moment-based watermarking methods. The proposed method is superior over all existing quaternion moment-based watermarking in terms of visual imperceptibility capability and robustness to different attacks.

60 citations


Cites background from "Quantization based multiple medical..."

  • ...Digital image watermarking provides an efficient protection of digital information for various applications including telemedicine [27], e-health [4], medical images [25, 28, 48], online social networks [29], e-governance [15]....

    [...]

Journal ArticleDOI
TL;DR: The experimental results reveal that the proposed scheme besides being semi-reversible and computationally efficient is capable of handling high payload and as such can be used effectively for electronic healthcare applications.

55 citations

References
More filters
Book
31 Dec 1999
TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Abstract: From the Publisher: Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, a description of possible applications, and a survey of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis," methods which can be used to break steganographic communication. This comprehensive resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities and differences to steganography. You gain a working knowledge of watermarking's pros and cons, and you learn the legal implications of watermarking and copyright issues on the Internet.

1,732 citations

Journal ArticleDOI
01 Jul 1999
TL;DR: In this article, the authors proposed a fragile watermarking approach which embeds a watermark in the discrete wavelet domain of the image by quantizing the corresponding coefficients, which allows the user to make application-dependent decisions concerning whether an image which is JPEG compressed for instance, still has credibility.
Abstract: In this paper, we consider the problem of digital watermarking to ensure the credibility of multimedia. We specifically address the problem of fragile digital watermarking for the tamper proofing of still images. Applications of our problem include authentication for courtroom evidence, insurance claims, and journalistic photography. We present a novel fragile watermarking approach which embeds a watermark in the discrete wavelet domain of the image by quantizing the corresponding coefficients. Tamper detection is possible in localized spatial and frequency regions. Unlike previously proposed techniques, this novel approach provides information on specific frequencies of the image that have been modified. This allows the user to make application-dependent decisions concerning whether an image, which is JPEG compressed for instance, still has credibility. Analysis is provided to evaluate the performance of the technique to varying system parameters. In addition, we compare the performance of the proposed method to existing fragile watermarking techniques to demonstrate the success and potential of the method for practical multimedia tamper proofing and authentication.

554 citations

Journal ArticleDOI
TL;DR: The relationship between the tensile properties and chitosan concentration indicated that the ultimate tensile strength for the sponge increased with a higher concentration, and the in vitro bFGF release study showed that the higher the concentration of chitOSan solution became, the longer the releasing time of the bF GF from the ch itosan sponge was.
Abstract: Cells, growth factors, and scaffolds are the three main factors required to create a tissue-engineered construct. After the appearance of bovine spongiform encephalopathy (BSE), considerable attention has therefore been focused on nonbovine materials. In this study, we examined the properties of a chitosan porous scaffold. A porous chitosan sponge was prepared by the controlled freezing and lyophilization of different concentrations of chitosan solutions. The materials were examined by scanning electron microscopy, and the porosity, tensile strength, and basic fibroblast growth factor (bFGF) release profiles from chitosan sponge were examined in vitro. The morphology of the chitosan scaffolds presented a typical microporous structure, with the pore size ranging from 50 to 200 μm. The porosity of chitosan scaffolds with different concentrations was approximately 75–85%. A decreasing tendency for porosity was observed as the concentration of the chitosan increased. The relationship between the tensile properties and chitosan concentration indicated that the ultimate tensile strength for the sponge increased with a higher concentration. The in vitro bFGF release study showed that the higher the concentration of chitosan solution became, the longer the releasing time of the bFGF from the chitosan sponge was.

475 citations

Journal ArticleDOI
TL;DR: SIB and marginal osteophyte formation in vertebral bodies could coexist in a skeletal population of men by analyzing the degenerative changes in their whole vertebral column and comparing them with the controls.
Abstract: The aim of this study was to characterize the individuals with sacroiliac joint bridging (SIB) by analyzing the degenerative changes in their whole vertebral column and comparing them with the controls. A total of 291 modern Japanese male skeletons, with an average age at death of 60.8 years, were examined macroscopically. They were divided into two groups: individuals with SIB and those without bridging (Non-SIB). The degenerative changes in their whole vertebral column were evaluated, and marginal osteophyte scores (MOS) of the vertebral bodies and degenerative joint scores in zygapophyseal joints were calculated. SIB was recognized in 30 individuals from a total of 291 males (10.3%). The average of age at death in SIB group was significantly higher than that in Non-SIB group. The values of MOS in the thoracic spines, particularly in the anterior part of the vertebral bodies, were consecutively higher in SIB group than in Non-SIB group. Incidence of fused vertebral bodies intervertebral levels was obviously higher in SIB group than in Non-SIB group. SIB and marginal osteophyte formation in vertebral bodies could coexist in a skeletal population of men. Some systemic factors might act on these degenerative changes simultaneously both in sacroiliac joint and in vertebral column.

446 citations

Journal ArticleDOI
TL;DR: This paper presents a secure multiple watermarking method based on discrete wavelet transform (DWT), discrete cosine transforms (DCT) and singular value decomposition (SVD) and the technique is found to be robust against the Checkmark attacks.
Abstract: This paper presents a secure multiple watermarking method based on discrete wavelet transform (DWT), discrete cosine transforms (DCT) and singular value decomposition (SVD). For identity authentication purpose, the proposed method uses medical image as the image watermark, and the personal and medical record of the patient as the text watermark. In the embedding process, the cover medical image is decomposed up to second level of DWT coefficients. Low frequency band (LL) of the host medical image is transformed by DCT and SVD. The watermark medical image is also transformed by DCT and SVD. The singular value of watermark image is embedded in the singular value of the host image. Furthermore, the text watermark is embedding at the second level of the high frequency band (HH) of the host image. In order to enhance the security of the text watermark, encryption is applied to the ASCII representation of the text watermark before embedding. Results are obtained by varying the gain factor, size of the text watermark, and medical image modalities. Experimental results are provided to illustrate that the proposed method is able to withstand a variety of signal processing attacks such as JPEG, Gaussian, Salt-and-Pepper, Histogram equalization etc. The performance of the proposed technique is also evaluated by using the benchmark software Checkmark and the technique is found to be robust against the Checkmark attacks such as Collage, Trimmed Mean, Hard and Soft Thresholding, Wavelet Compression, Mid Point, Projective, and Wrap etc.

155 citations


"Quantization based multiple medical..." refers background or methods or result in this paper

  • ...Table 4 shows the BER performance comparison of the proposed method with other reported techniques [23, 25]....

    [...]

  • ...The BER is defined as the ratio of the number of incorrectly decoded bits and total number of bits [23]....

    [...]

  • ...The development and implementation of newer e-health models demands secure medical data transmission, access and storage [9, 12, 14, 20, 23]....

    [...]

  • ...Referring this table it is observed that the highest BER value has been obtained by the reported techniques [23, 25] is 0....

    [...]

  • ...The methods reported in [23, 25] can embeds only ‘50’ and ‘104’ characters respectively....

    [...]