Share This Article:

Secure Spread-Spectrum Watermarking for Telemedicine Applications

Abstract Full-Text HTML Download Download as PDF (Size:8221KB) PP. 91-98
DOI: 10.4236/jis.2011.22009    5,583 Downloads   11,729 Views   Citations

ABSTRACT

This paper presents a secure spread-spectrum watermarking algorithm for digital images in discrete wavelet transform (DWT) domain. The algorithm is applied for embedding watermarks like patient identification /source identification or doctors signature in binary image format into host digital radiological image for potential telemedicine applications. Performance of the algorithm is analysed by varying the gain factor, subband decomposition levels, size of watermark, wavelet filters and medical image modalities. Simulation results show that the proposed method achieves higher security and robustness against various attacks.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

B. Kumar, H. Singh, S. Singh and A. Mohan, "Secure Spread-Spectrum Watermarking for Telemedicine Applications," Journal of Information Security, Vol. 2 No. 2, 2011, pp. 91-98. doi: 10.4236/jis.2011.22009.

References

[1] H. M. Chao, C. M. Hsu and S. G. Miaou, “A Data-Hiding Technique with Authentication, Integration, and Confiden- tiallity for Electronic Patient Records,” IEEE Transactions on Information Technology in Biomedicine, Vol. 6, No. 1, March 2002, pp. 46-53. doi:10.1109/4233.992161
[2] U. R. Acharya, D. Anand P. S. Bhat and U. C. Niranjan, “Compact Storage of Medical Images with Patient Information,” IEEE Transactions on Information Technology in Biomedicine, Vol. 5, No. 4, December 2001, pp. 320-323. doi:10.1109/4233.966107
[3] X. Kong and R. Feng, “Watermarking Medical Signals for Telemedicine,” IEEE Transaction on Information Technology in Medicine, Vol. 5, No. 3, 2001, pp. 195-201. doi:10.1109/4233.945290
[4] G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland and R. Collorec, “Relevance of Watermarking in Medical Imaging,” Proceedings of the 3rd Conference on Information Technology Applications in Biomedicine, Arlington, 2000, pp. 250-255.
[5] K. A. Navas, S. A. Thampy and M. Sasikumar, “ERP Hiding In Medical Images for Telemedicine,” Proceedings of World Academy of Science and Technology, Vol. 28, 2008.
[6] B. Planitz and A. Maeder, “Medical Image Watermarking: A Study on Image Degradation,” Proceedings of the Australian Pattern Recognition Society (APRS) Workshop on Digital Image Computing, Brisbane, February, 2005, CD- ROM pp. 3-8.
[7] G. Coatrieux, L. Lecornu, C. Roux and B. Sankur, “A Review of Image Watermarking Applications in Health- care,” Engineering in Medicine and Biology Society, Vol. 1, 2006.
[8] R. C Raul, F. U. Claudia and T. B. Gershom, “Data Hiding Scheme for Medical Images,” 17th International Con-ference on Electronics, Communications and Computers, Cho-lula, 26-28 February 2007, pp. 32-32.
[9] G. C. Langelaar, I. Setyawan and R. L. Lagendijk, “Watermarking Digital Image and Video Data. A State-of- the-Art Overview,” IEEE Signal Processing Magazine, Vol. 17, No. 5, September 2000, pp. 20-46. doi:10.1109/79.879337
[10] N. Nikolaidis and I. Pitas, “Digital Image Watermarking: An Overview,” IEEE International Conference on Multimedia Computing and Systems, Florence, Vol. 1, June 7-11, 1999, pp. 1-6.
[11] I. J. Cox and M. L. Mil-ler, “The First 50 Years of Electronic Watermarking,” EURASIP Journal on Applied Signal Processing, Vol. 2002, No. 2, 2002, pp. 126-132. doi:10.1155/S1110865702000525
[12] P. Meerwald and A. Uhl, “A Survey of Wavelet-Domain Watermarking Algorithms,” Proceedings of the SPIE Security and Watermarking of Multimedia Contents, San Jose, Vol. 4314. 2001, pp. 505-516.
[13] S. Hajjara, M. Abdallah and A. Hudaib, “Digital Image Watermarking Using Localized Biorthogonal Wavelets,” European Journal of Scientific Research, Vol. 26, No. 4, 2009, pp. 594-608.
[14] A. H. Paquet and R. K. Ward, “Wave-let-Based Digital Watermarking for Authentication,” Proceed-ings of the IEEE Canadian Conference on Electrical and Computer Engineering, Winnipeg, Vol. 2, 2002, pp. 879-884.
[15] A. Giakoumaki, S. Pavlopoulos and D. Kout-souris, “Secure and Efficient Health Data Management through Multiple Watermarking on Medical Images,” Medical Biological Engineering & Computing, Vol. 44, 2006, pp. 619-631. doi:10.1007/s11517-006-0081-x
[16] A. Giakoumaki, S. Pav-lopoulos and D. Koutsouris, “Multiple Image Watermarking Applied to Health Information Management,” IEEE Transac-tions on Information Technology in Biomedicine, 2006, pp. 722-732.
[17] A. Giakoumaki, S. Pavlopoulos and D. Kout-souris, “A Medical Image Watermarking Scheme Based on Wavelet Transform,” Proceedings 25th Annual International Con- ference of IEEE-EMBS, Cancun, 2003, pp. 856-859.
[18] S. Dandapat, J. Xu, O. Chutatape and S. M. Krishnan, “Wavelet Transform Domain Data Embedding in a Medical Image,” Proceedings 26th Annual International Confe- rence of IEEE-EMBS, San Francisco, September 2004, pp. 1541-1544.
[19] J. B. Feng, I. C. Lin, C. S. Tsai and Y. P. Chu, “ Re- versible Watermarking: Current and Key Issues,” Interna- tional Journal of Network Security, Vol. 2, No. 3, May 2006, pp. 161-170.
[20] S. Lee, C. D. Chang and T. Kalker, “Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform,” IEEE Transaction on Information Forensics and Security, Vol. 2, No. 3, September 2007, pp. 321-330. doi:10.1109/TIFS.2007.905146
[21] M. Terry, “Medical Iden-tity Theft and Telemedicine Security,” Telemedicine and e-Health, Vol. 15, No. 10, December 2009, pp. 1-5.
[22] F. Cayre, C. Fontaine and T. Furon, “Watermarking Se- curity: Theory and Practice,” IEEE Transactions on Signal Processing, Vol. 53, No. 10, October 2005, pp. 3976- 3987. doi:10.1109/TSP.2005.855418
[23] L. P. Freire, P. Comesana, J. R. T. Pastoriza and F. P. Gonzalez, “Watermarking Security: A Survey,” LNCS Transactions on Data Hiding and Multime-dia Security, 2006, pp. 41-72.
[24] I. J. Cox, J. Kilian, F. Thomson Leighton and Talal Shamoon, “Secure Spread Spec-trum Watermarking for Multimedia,” IEEE Transactions on Image Processing, Vol. 6, No. 12, 1997, pp. 1673-1687.
[25] H. S. Malvar and D. A. F. Florencio, “Im-proved Spread Spectrum: A New Modilation Technique for Robust Wa- termarking,” IEEE Transactions on Signal Processing, Vol. 51, No. 4, 2003.
[26] L. Perez-Freire and F. Perez-Gonzalez, “Spread-Spec- trum Watermarking Security,” IEEE Transactions on In- formation Forensics and Security, Vol. 4, No. 1, 2009.
[27] G. Xuan, C. Yang, Y. Zheng, Y. Q. Shi and Z. Ni, “Re- versible Data Hiding Based on Wavelet Spread Spectrum,” IEEE International Workshop on Multimedia Signal Processing, Siena, 2004. doi:10.1109/MMSP.2004.1436530
[28] D. Kahn, “Cryptology and the Origins of Spread Spec- trum,” IEEE Spectrum, Vol. 21, September 1984, pp. 70-80.
[29] M. Unser and A. Aldroubi, “A Review of Wavelets in Biomedical Applications,” Pro-ceedings of the IEEE, Vol. 84, No. 4, 1996, pp. 626-638. doi:10.1109/5.488704
[30] F. Ergun, J. Kilian and R. Kumar, “A Note on the Limits of Collusion-Resistant Watermarks,” EUROCRYPT'99 Proceedings of the 17th International Confe-rence on Theory and Application of Cryptographic Techniques, Vol. 1592, 1999, pp. 140-149.
[31] C. W. Therrien, “Decision Estimation and Classification: An Introduction to Pattern Rec-ognition and Related To- pics,” Wiley, New York, 1989.
[32] MedPixTM Medical Image Database available at http:// rad.usuhs.mil/medpix/medpix.html

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.