American Journal of Biomedical Engineering
p-ISSN: 2163-1050 e-ISSN: 2163-1077
2012; 2(2): 29-37
doi: 10.5923/j.ajbe.20120202.06
Koushik Pal 1, G.Ghosh 1, M. Bhattacharya 2
1Institute of Radio Physics and Electronics, University of Calcutta, Kolkata, 700014, India
2Indian Institute of Information Technology and Management, Gwalior, India
Correspondence to: G.Ghosh , Institute of Radio Physics and Electronics, University of Calcutta, Kolkata, 700014, India.
Email: | ![]() |
Copyright © 2012 Scientific & Academic Publishing. All Rights Reserved.
The current paper presents a novel and unique scheme for biomedical image watermarking in wavelet domain by hiding multiple copies of the same data in the cover image using bit replacement in the horizontal (HL) and vertical (LH) resolution approximation image components. The proposed scheme uses an approach for recovering the hidden information from the damaged copies due to unauthorized alteration of the data by applying an algorithm to find the closest twin of the embedded information by bit majority algorithm. Experimental results of the proposed watermarking technique show much enhancement in the visual and statistical invisibility of hidden information after data recovery that supports the improvement in performance.
Keywords: Discrete Wavelet Transform, Watermarking; Noise Attack, Salt and Pepper Noise, Compression, Bit Majority
|
|
|
[1] | F. A. Allaert and L. Dusserre, “Security of Health Sys-tem in France. What we do will no longer be different From what we tell," International Journal of Biomedical Computing, vol.35, no.Suppl.1, pp. 201-204,1994. |
[2] | P.W. Wong, “A public key watermark for image verification and authentication”, in Proceedings of the IEEE International Conference on Image Processing, Chicago, IL, October 1998, pp. 455-459. |
[3] | D. Anand and U.C. Niranjan, “Watermarking Med¬ical Images with Patient Information," in proc. IEEE/EMBS Conference, Hong Kong, China, Oct. 1998,pp.703-706. |
[4] | A. Maeder and M. Eckert. Medical image compression: Quality and performance issues. SPIE: New Approaches in Medical Image Analysis, 3747:93–101, 1999. |
[5] | M.L.Miller, I.J.Cox, J.M.G.Linnartz and T.Kalker, "A Review of Watermarking Principles and Practices," in Digital Signal Processing for Multimedia Syatems, K.K. parhi and T. Nishitani Eds.New York,1999,pp. 461-485. |
[6] | F. Hartung and M. Kutter, “Multimedia watermarking techniques, “Proceedings of the IEEE, vol. 87, no. 7,pp. 1079–1107, July 1999. |
[7] | M. Kutter and F. A. P. Petitcolas. A fair benchmark for image watermarking systems. In Proc. SPIE Security and Watermarking of Multimedia Contents, vol 3657, pp 226–239, San Jose, USA, Jan.1999. |
[8] | B. Macq, F. Dewey, "Trusted Headers for Medical Images," in DFG VIII-DII Watermarking Workshop, Erlangen, Germany, 1999. |
[9] | E.T.Lin, E.J.Delp, “A Review of Fragile Image Watermarks," in Proceedings of the Multimedia and Security Workshop ACM, Ed., Orlando, Florida, USA, Oct. 1999, pp.35-39. |
[10] | P.Wong,"A watermark for image integrity and ownership verification, " Final Program and Proceedings of the IS&T PICS 99, pp. 374-379. |
[11] | S.G. Miaou, C.H. Hsu, Y.S. Tsai, and H.M. Chao, “A Secure Data Hiding Technique with Heteroge¬neous Data-Combining Capability for Electronic Pa¬tient Records," in Proceedings of the World Congress on Medical Physics and Biomedical Engineering, Session Electronic Health care Records, IEEE-EMB, Ed., Chicago, USA, July2000. |
[12] | G. Coatrieux, H. Maître, B. Sankur, Y. Rolland, R. Collorec, "Relevance of Watermarking in Medical Imaging," in Proc. IEEE Int. Conf. ITAB, USA,2000, pp. 250–255. |
[13] | Kong, X. and Feng, R., 2001, “Watermarking Medical Signals for Telemedicine,” IEEE Trans on.Information Technology in Biomedicine, vol. 5, no. 3, pp. 195-201. |
[14] | X. Q. Zhou, H. K. Huang, S. L. Lou, "Authenticity and integrity of digital mammography images," IEEE Trans. on Medical Imaging, vol. 20, no.8, pp.784–791, 2001. |
[15] | G. Coatrieux, B. Sankur, H. Maître, "Strict Integrity Control of Biomedical Images," in Proc. Electronic Imaging, Security and Watermarking of Multimedia Contents, SPIE, USA, 2001, pp.229- 240. |
[16] | Johnson.N.F., Duric.Z., Jajodia.S., 2001, Information Hiding: Steganography & Watermarking-Attacks & Countermeasures’ Kluwer Academic Press. |
[17] | G. Coatrieux, B. Sankur, H. Maître, "Strict Integrity Control of Biomedical Images," in Proc. Electronic Imaging, Security and Watermarking of Multimedia Contents, SPIE, USA, 2001, pp.229- 240. |
[18] | Rafael C Gonzalez and Richard E. Woods, Digital Image Processing, Prentice Hall, 2002, ISBN-81-7808-629-8. |
[19] | J. Fridrich,M. Goljan and R.Du, Lossless Data Embedding for All Image Formats, Proc. SPIE Photonics West, Electronic Imaging,Security and Watermarking of Multimedia Contents, vol.4675, San Jose, Ca., USA, pp. 572–583,Jan. 2002. |
[20] | Ling Na Hu,Ling Ge Jiang ‘Blind Detection of LSB Watermarking, at Low Embedding Rate in Grayscale Images’. M. Celik, G. Sharma, E.Saber and A.Tekalp. Hierarchical watermarking for secure image authentication with localization.IEEE Trans.Image Process,pp.585–595, June2002. |
[21] | Cox I. J., Miller M., Bloom J., 2002, “Digital Watermarking,” Morgan Kaufmann Publishers. |
[22] | Chao,H.M., Hsu, C.M. & Miaou,S.G, 2002, "A data-hiding technique with authentication, integration, and confidentiality for electronic patients records,"IEEE Transactions InformationTechnology in Biomedicine, vol.6, no.1, pp. 46-53. |
[23] | A. Giakoumaki, S. Pavlopoulos, D. Koutsouris, "A medical image watermarking scheme based on wavelet transform," in Proc. of the 25th Annual Int. Conf. of the IEEE EMBS, vol. 1, 2003, pp. 856–859. |
[24] | R. Acharya, U.C. Niranjan, S.S. Iyengar, N. Kannathal, L.C. Min, "Simultaneous storage of patient information with medical images in the frequency domain," Computer Methods and Programs in Biomedicine, vol. 76, pp.13-19, 2004. |
[25] | G.T. Oh, Y-.B. Lee, S.J. Yeom, "Security mechanism for medical image information on PACS using invisible watermark," in Proc. Of Int. Conf. High Performance Computing for Computational Science, VECPAR, 2005, pp.315-324. |
[26] | D. Osborne, D. Abbott, M. Sorell, and D. Rogers. Multiple embedding using robust watermarks for wireless medical images. In IEEE Symposium on Electronics and Telecommunications, page section 13(34), Timisoara, Romania, Oct. 2004. |
[27] | Shi Y. Q., “Reversible Data Hiding,” IWDW 2004, Korea, Lecture Notes in Computer Science (LNCS) 3304, pp. 1-12. |
[28] | F. Bao, R. H. Deng, B.C. Ooi, Y. Yang, "Tailored reversible watermarking schemes for authentication of electronic clinical atlas," IEEE Trans. on Information Technology in Biomedicine, vol. 9, no.4, pp.554–563, 2005. |
[29] | C.G. Boncelet, "The NTMAC for authentication of noisy messages," IEEE Trans. on Information Forensics and Security, vol.1, no.1, pp.320–323, 2006. |
[30] | Zain, J.M.; Fauzi, A.R.M., “Medical Image Watermarking with Tamper Detection and Recovery”, 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2006. EMBS, pp. 3270 -3273. |
[31] | Giakoumaki, A.; Pavlopoulos, S.; Koutsouris, D., “Multiple Image Watermarking Applied to Health Information Management”, IEEE Transactions on Information Technology in Biomedicine, Volume: 10 , no.4, Publication Year: 2006 , pp. 722 – 732. |
[32] | Zain, J.M.; Fauzi, A.R.M., “Evaluation of Medical Image Watermarking with Tamper Detection and Recovery (AW-TDR)”, 29th Annual International Conference of the IEEE on Engineering in Medicine and Biology Society, 2007. EMBS 2007. pp. 5661 – 5664. |
[33] | Kobayashi, L.O.M.; Furuie, S.S.; Barreto, P.S.L.M., “Providing Integrity and Authenticity in DICOM Images: A Novel Approach, IEEE Transactions on Information Technology in Biomedicine”, vol.13 , no. 4, Digital, Publication Year: 2009 , pp. 582 – 589. |
[34] | Fallahpour, M.; Megias, D.; Ghanbari, M., “High capacity, reversible data hiding in medical images”, 16th IEEE International Conference on Image Processing (ICIP), 2009, pp. 4241 – 4244. |
[35] | Siau-Chuin Liew; Zain, J.M., “Reversible medical image watermarking for tamper detection and recovery”, 3rd IEEE International Conference on Computer Science and Information Technology,2010, vol. 5, pp. 417 – 420. |
[36] | Velumani, R.; Seenivasagam, V., “A reversible blind medical image watermarking scheme for patient identification, improved telediagnosis and tamper detection with a facial image watermark”, IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2010, pp.1 – 8. |
[37] | Huang, H.; Coatrieux, G.; Shu, H.Z.; Luo, L.M.; Roux, C.; “Medical image integrity control and forensics based on watermarking — Approximating local modifications and identifying global image alterations”, Annual International Conference of the IEEE , Engineering in Medicine and Biology Society,2011, pp. 8062 – 8065. |