Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Journal of Intelligent Systems

Editor-in-Chief: Fleyeh, Hasan


CiteScore 2018: 1.03

SCImago Journal Rank (SJR) 2018: 0.188
Source Normalized Impact per Paper (SNIP) 2018: 0.533

Online
ISSN
2191-026X
See all formats and pricing
More options …
Volume 27, Issue 1

Issues

An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm

Puvvadi Aparna / Polurie Venkata Vijay Kishore
  • Department of Electronics and Communication Engineering, K L University, Vijayawada, Andhra Pradesh, India
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
Published Online: 2017-09-26 | DOI: https://doi.org/10.1515/jisys-2017-0266

Abstract

The main objective of this paper is to propose a medical image watermarking technique in E-healthcare application based on the hybridization of compression and cryptography algorithm. Basically, the proposed system consists of two stages: (i) watermark embedding process and (ii) watermark extraction process. In the embedding process, at first, we segment the tumor part separately using a region growing algorithm. Then, we encrypt the region of interest part using Secure Hash Algorithm-256 and encrypt the electronic health record (EHR) using the elliptical curve cryptography algorithm. Thereafter, we concatenate and compress the information using an arithmetic coding algorithm. Finally, we embed the compressed bit into the original image. The same process is repeated for the extraction process. The experimental results are shown for different medical images with EHR and the effectiveness of the proposed algorithm is analyzed with the help of the peak signal-to-noise ratio and normalized correlation.

Keywords: Electronic health record; elliptical curve cryptography; ROI; watermarking; compression; cryptography

Bibliography

  • [1]

    H.-M. Chao, C.-M. Hsu and S.-G. Miaou, A data-hiding technique with authentication, integration, and confidentiality for electronic patient records, IEEE Trans. Inform. Technol. Biomed. 6 (2002), 46–53.CrossrefGoogle Scholar

  • [2]

    G. Coatrieux, H. Maitre and B. Sankur, Strict integrity control of biomedical images, in: Proceedings of SPIE Security Watermarking Multimedia Contents III, pp. 229–240, San Jose, CA, 2001.Google Scholar

  • [3]

    G. Coatrieux, M. Lamard, W. Daccache, W. Puentes and C. Roux, A low distortion and reversible watermark: application to angiographic images of the retina, in: 27th Annual International Conference of the Engineering in Medicine and Biology Society, pp. 2224–2227, 2006.Google Scholar

  • [4]

    M. Hasnaoui and M. Mitrea, Multi-symbol QIM video watermarking, Signal Process. Image Commun. 29 (2014), 107–127.CrossrefWeb of ScienceGoogle Scholar

  • [5]

    HEMA, DICOM: Digital Imaging and Communication in Medicine, [Online], Available: http://medical.nema.org/.

  • [6]

    L.-Y. Hsu and H.-T. Hu, Blind image watermarking via exploitation of inter-block prediction and visibility threshold in DCT domain, Int. J. Sci. Direct 32 (2015), 130–143.Google Scholar

  • [7]

    S. Kaihara, Realisation of the computerised patient record; relevance and unsolved problems, Int. J. Med. Inform. 49 (1998), 1–8.CrossrefGoogle Scholar

  • [8]

    H. K. Lee, H. J. Kim, K. R. Kwon and J. K. Lee, Digital watermarking of medical image using ROI information, in: Proceedings of 7th International Workshop on Enterprise networking and Computing in Healthcare Industry, pp. 404–407, 2005.Google Scholar

  • [9]

    B. Lei, T. E.-L. Tan, S. Chen, D. Ni, T. Wang and H. Lei, Reversible watermarking scheme for medical image based on differential evolution, Exp. Syst. Appl. 41 (2014), 3178–3188.CrossrefGoogle Scholar

  • [10]

    M. Li, S. Narayanan and R. Poovendran, Tracing medical images using multi-band watermarks, Conf. Proc. IEEE Eng. Med. Biol. Soc. 5 (2004), 3233–3236.Google Scholar

  • [11]

    E. Maiorana, P. Campisi and A. Neri, Biometric signature authentication using randon transform-based watermarking techniques, in: IEEE Biometric Symposium, pp. 1–6, 2007.Google Scholar

  • [12]

    V. Mehan, R. Dhir and Y. S. Brar, Watermarking for health management system, Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3 (2013), 224–228.Google Scholar

  • [13]

    R. Pandey, A. K. Singh, B. Kumar and A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology, J. Multimed. Tools Appl. 75 (2016), 14381–14397.CrossrefWeb of ScienceGoogle Scholar

  • [14]

    S. A. Parah, J. A. Sheikh and G. M. Bhat, Fragility evaluation of intermediate significant bit embedding (ISBE) based digital image watermarking scheme for content authentication, in: International Conference on Advances in Electronics, Computers and Communications (ICAECC), pp. 1–6, 2014.Google Scholar

  • [15]

    S. A. Parah, J. A. Sheikh, F. Ahad, N. A. Loan and G. M. Bhat, Information hiding in medical images: a robust medical image watermarking system for E-healthcare, J. Multimed. Tools Appl. 76 (2017), 10599–10633.Web of ScienceCrossrefGoogle Scholar

  • [16]

    F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, Information hiding – a survey, in: Proceedings of IEEE Special Issue on Protection of Multimedia Content, vol. 87, pp. 1062–1078, 1999.Google Scholar

  • [17]

    C. Qin, H. Wang, X. Zhang and X. Sun, Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode, Int. J. Sci. 373 (2016), 233–250.Google Scholar

  • [18]

    P. Rasti, S. Samiei and M. Agoyi, Robust non-blind color video watermarking using QR decomposition and entropy analysis, Int. J. Sci. Direct 38 (2016), 838–847.Google Scholar

  • [19]

    R. Rodriguez-Colin, F.-U. Claudia and G. d. J. Trinidad-Blas, Data hiding scheme for medical image, in: IEEE 17th International Conference on Electronics Communications and Computers (CONIELECOMP’07), 2007.Google Scholar

  • [20]

    A. Sharma, A. K. Singh and S. P. Ghrera, Robust and secure multiple watermarking technique for medical images, Wireless Pers. Commun. 92 (2017), 1611–1624.CrossrefGoogle Scholar

  • [21]

    A. K. Singh, Improved hybrid technique for robust and imperceptible multiple watermarking using medical images, J. Multimed. Tools Appl. 75 (2016), 8381–8401.CrossrefGoogle Scholar

  • [22]

    A. K. Singh, M. Dave and A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain, Wireless Pers. Commun. 83 (2015), 2133–2150.CrossrefWeb of ScienceGoogle Scholar

  • [23]

    A. K. Singh, M. Dave and A. Mohan, Multiple watermarking on medical images using selective DWT coefficients, J. Med. Imaging Health Inform. 5 (2015), 607–614.CrossrefGoogle Scholar

  • [24]

    A. K. Singh, M. Dave and A. Mohan, Robust and secure multiple watermarking in wavelet domain, J. Med. Imaging Health Inform. 5 (2015), 406–414.Web of ScienceCrossrefGoogle Scholar

  • [25]

    A. K. Singh, B. Kumar, S. K. Singh, S. P. Ghrera and A. Mohand, Multiple watermarking technique for securing online social network contents using back propagation neural network, J. Future Gen. Comput. Syst. 25 (2016).Google Scholar

  • [26]

    United States Department of Health and Human Services, HIPAA: Medical Privacy – National Standards to Protect the Privacy of Personal Health Information, Available at http://www.hhs.gov/ocr/hipaa/.

  • [27]

    A. Zear, A. K. Singh and P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine, Multimed. Tools Appl. (2016), 1–20.Web of ScienceGoogle Scholar

About the article

Received: 2017-04-08

Published Online: 2017-09-26

Published in Print: 2018-01-26


Citation Information: Journal of Intelligent Systems, Volume 27, Issue 1, Pages 115–133, ISSN (Online) 2191-026X, ISSN (Print) 0334-1860, DOI: https://doi.org/10.1515/jisys-2017-0266.

Export Citation

©2018 Walter de Gruyter GmbH, Berlin/Boston.Get Permission

Comments (0)

Please log in or register to comment.
Log in