Kavitha K. J, Shan P. B. Joint Digital Water Marking for Medical Images for Improving Security. Biomed Pharmacol J 2018;11(2).
Manuscript received on :04 May 2018
Manuscript accepted on :16 May 2018
Published online on: 04-06-2018
Plagiarism Check: Yes
How to Cite    |   Publication History
Views Views: (Visited 1,385 times, 2 visits today)   Downloads PDF Downloads: 697

Kavitha K. Jand Priestly B. Shan1,2

1CSE Department, Research Scholar, Sathyabama University, Chennai, India.

2Eranad Knowledge City-Technical Campus, Manjeri, India.

Corresponding Author E-mail: kavithakj192@gmail.com

DOI : https://dx.doi.org/10.13005/bpj/1443

Abstract

Digital watermarking is one of the most efficient techniques to provide the highest secureness to the transmission of data like images or videos over the internet. Quite over the medical data which incorporates the EHR (Electronic Health Record) and medical images and conjointly the military data are crucial whose protection and privacy is extremely a lot of essential issues. To secure this data, the Digital watermarking plays a major role so that it will guarantee authentication, integrity, confidentiality and reliability. In the case of medical images, even a small change or modifications are strictly prohibited as it might lead to the incorrect diagnosis of the disease. Therefore, securing medical image is extremely essential. So as to provide high security for each patient’s data and also the various medical scanning images, we can employ the Digital Water Marking (DWM) technique. The DWM technique may be implemented in two ways: Spatial domain technique and Frequency domain technique. Although the spatial implementation is extremely straightforward and a very simple method, most of the implementations are done using frequency or transform/remodel domain strategies since it provides additional details and high effectiveness. The DWM may be implemented using numerous transform/remodel techniques like Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), also with the combination of these remodel techniques. Nowadays the work is also extended using a combination of transforming/remodel and spatial domain techniques. In this article the Digital Water Marking is being implemented by employing a combination of a transform technique DWT and a spatial domain technique SVD to provide security to the medical images and also the system efficiency is checked for numerous attacks.

Keywords

DCT; DWT; Encryption; IWT; SVD

Download this article as: 
Copy the following to cite this article:

Kavitha K. J, Shan P. B. Joint Digital Water Marking for Medical Images for Improving Security. Biomed Pharmacol J 2018;11(2).

Copy the following to cite this URL:

Kavitha K. J, Shan P. B. Joint Digital Water Marking for Medical Images for Improving Security. Biomed Pharmacol J 2018;11(2). Available from: http://biomedpharmajournal.org/?p=20564

Introduction

Telemedicine is playing a vital role as it made easy for everybody to transfer the EHR (Electronic Health record) which may include the medical scanned images from any remote places. This technology made easy for the doctors to ask for higher diagnosis details and for the patients to save time and money. During the transmission of the information over the network, the data may undergo malicious attacks and modifications. The malicious attacks may include geometrical variations, various noises such as Gaussian, salt & pepper, etc. and the modifications may be regionally or globally. In some of the cases this information may be used for making money. And more over a small change in the medical report of a patient may lead to the disastrous decisions even by the expertise doctors. Therefore, there is a need for providing security to the medical information and much research work is being done by many of the researchers to provide high security to the medical information.

Information Security Methods

There are several methodologies available for protecting the information and some of them are: Steganography, Cryptography and Digital Water Marking.

The function of these hiding techniques and their diagrams are given below:

Steganography is one of the data embedding techniques in which case we may hide the information content into another cover image and this embedded information is not seen by the human eye.

Cryptography is another hiding technique in which case the information is embedded in the non-readable format.

Digital Water Marking technique is another hiding technique where we may embed information into another cover image without much distortion. The embedded information may in any form like text, image, barcode, QR code etc.

As this technique mostly employed on the digital data, it is named as Digital Water Marking. This technique provides not only the security for the information, but also provides authenticity, copyright protection and integrity.

 Figure 1: Block Diagram of Steganography Figure 1: Block Diagram of Steganography

 

Click here to View figure

 

 Figure 2: Block Diagram of cryptography Figure 2: Block Diagram of cryptography

 

Click here to View figure

 

 Figure 3: Block Diagram of Watermarking Figure 3: Block Diagram of Watermarking

 

Click here to View figure

 

Among the three embedding techniques mentioned above, the most appropriate methodology for securing the medical image is Digital Water Marking.6 Digital Water Marking (DWM) for medical scanned images is implemented in numerous ways, but no complete algorithm is available to satisfy all the necessities for securing the medical image or information. Therefore till today there exist a space for digital watermarking for medical images and also the medical videos for improving security, reliability, credibility and privacy. Therefore a novel approach is anticipated here to improve the quality, reliability, authenticity and confidentiality.1-4 to the medical image.

DWM Implementation Methods

The Digital Water Marking is primarily implemented in two ways:

Pixel level domain

Frequency domain

The pixel level technique often referred as the spatial domain technique is a technique in which the watermark is directly embedded in the pixels, whereas in the latter case, often referred as the transform domain, the pixels are transformed into frequency values and then in these newly formed signals the information is embedded.

Some of the spatial domain methods are as follows7:

Least Significant Bit method (LSB)

Correlation based technique

Text mapping coding technique

Patch work technique

Additive watermarking

Some of the transform domain methods are as follows:

Discrete Fourier Transform

Fast Fourier Transform

Discrete Cosine Transform (DCT)

Discrete Wavelet Transform (DWT)

The digital watermarking may be implemented by any of the mentioned techniques and also the watermarking for medical images may be implemented by combining the spatial methods with transforming methods.3-10 To increase the security effectiveness, these methods are jointly used with encryption technologies. Most commonly used techniques among the above is DWT. There are other variations of DWT are also available such as Lifting Wavelet Transform (LWT) and Integer Wavelet Transform (IWT). The IWT technique is substituting DWT technique2 as it has many advantages over DWT. The first and foremost advantage of IWT over DWT is:

In IWT function, the losses are not ensured and coding tasks may be performed very easily, whereas DWT provides the fractional value of filter and loss could also be inevitable. Both spatial and transform domain methods have advantages and disadvantages. The positives of both the methods may be combined to enhance the potential of the system. Also the malicious attacks may be avoided by implementing strong and efficient algorithms.14

To enhance the security, multiple watermarks may be embedded in the medical images13 and to reduce the distortion the size of the watermark may also be reduced. In other words, we can say that the data payload should be less to avoid the damage to the information which may achieved by converting the watermark information into barcode or Quick Response (QR) code.

Since this article is mainly on medical images [MI], the DWM for MI may classified as:

DWM in Region of Interest (ROI)

DWM in Region of Non Interest (RONI)

DWM in ROI & RONI

Implementation

In this article the DWM technique is implemented by combining the spatial method: Singular Value Decomposition (SVD), the frequency domain method: DWT and cryptography technique: symmetrical key generation.11,12 This technology is popularly known as Joint watermarking (JDWM). The proposed flow diagram for the implementation of Digital water marking for medical pictures is shown in Figure 4, Figure 5, Figure 6 and Figure 7.

Initial steps

In the flow chart shown below, primarily the cover medical image and the watermark image are read from the database of a hospital. The watermark information may include the details or thumb impression of a patient. If the cover medical image is color image, then it is transformed in to grey medical image and resized to the specified size, for ex. 512×512 and additionally the watermark image is also changed in to binary image and resized to the size of the cover medical image, for ex.  512×512.

Figure 4: Initial steps for selecting the cover image and watermark Figure 4: Initial steps for selecting the cover image and watermark

 

Click here to View figure

 

After reading the information from the database, the watermark embedding and watermark extraction process are carried out. In Figure 4 and Figure 5 the image selection and the watermark embedding process are shown.

Watermark Embedding process

Figure 5: Flow chart for showing Water mark embedding process Figure 5: Flow chart for showing Water mark embedding process

 

Click here to View figure

 

In the flow diagram shown above, we can see that the embedding method is carried out by combining the spatial and frequency domain watermarking technique which incorporates DWT, SVD and cryptography5-9 techniques.

The embedding method at the transmitter aspect is described below:

Decompose the cover medical image in to four sub-bands by applying 4-level DWT.

Apply SVD to the 4th level HH band of the cover image and also to the watermark image.

In the above steps three components are generated U, S and V for both original and watermark image. The singular value of both the images is exchanged to generate the modified 4th level HH band.

The U and v components of the watermark image may be used with a pseudorandom number to generate the signature.

This generated signature may be used as a secret key and hidden in the original image before transmission.

Now the modified 4th level HH band and LL band are combined along with the remaining two bands and inverse DWT is applied to get the watermarked image.

In this work, twenty secret keys are used for evaluating the performance of the algorithm. To check the efficiency of the algorithm, various quality metrics like Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), false positive, false negative, and mean of decoding are evaluated.

During the embedding process, a secret key was hidden in the medical image [8] to provide security while transmitting the data over the network. At the receiver, we will receive watermarked image and in order to retrieve this image, no original image is required; instead it requires the secret key to extract the information. If the input secret key on the receiver is wrong, then it is not possible for us to proceed with the further steps. This ensures increased security for the information.

Watermark construction and extraction process

The flow chart for watermark construction and extraction are as shown below.

 Figure 6: Flow chart showing the watermark construction process Figure 6: Flow chart showing the watermark construction process

 

Click here to View figure

 

At the receiver the watermarked medical image is received and using this data, the watermark is extracted and compared with the original watermark and the system robustness is evaluated. In order to construct the watermark, the following steps are performed:

Read the watermarked image.

Apply 3-level DWT to the watermarked image.

Apply SVD to the HH band of 3rd level decomposition.

Extract the singular values from the HH band.

Use these singular values along with the U and V components of the original watermark.

The detailed diagram of watermark extraction is shown in the below figure. The extracted signature is compared with the original signature. If match is found, then the watermark is extracted otherwise an error message will be displayed.

 Figure 7: The flow chart for showing the watermark extraction process Figure 7: The flow chart for showing the watermark extraction process

 

Click here to View figure

 

Results

In this experiment the watermark embedding and watermark retrieval algorithm is executed using MATLAB 2015a. The various quality metrics of the system are calculated so as to assess the performance of the technique being utilized. The Peak to signal noise quantitative relation (PSNR) which can be used for examination of the initial and watermarked medical image, mean sq. error (MSE) to examine the error distinction between the 2 pictures, mean of correct and wrong secret writing, variance, false acceptance and false rejection of the system are evaluated to investigate the enforced system. The below figure shows the results obtained:

 Figure 8: Cover Image, Watermark image (Patient information, thumb impression), Watermarked image and the Extracted image for the correct key. Figure 8: Cover Image, Watermark image (Patient information, thumb impression), Watermarked image and the Extracted image for the correct key.

 

Click here to View figure

 

 Figure 9: Error image for the wrong key Figure 9: Error image for the wrong key

 

Click here to View figure

 

The below tables shows the results obtained for twenty different keys.

 Table 1: SSIM, PSNR and MSE values for 20 secret keys Table 1: SSIM, PSNR and MSE values for 20 secret keys

 

Click here to View table

 

Table 2: False positive and false negative value for 20 keys

Keys Pfa Pfr Keys Pfa Pfr
1 0.5 0.320 11 0.396 0.412
2 0.489 0.329 12 0.385 0.422
3 0.478 0.338 13 0.375 0.431
4 0.468 0.347 14 0.365 0.441
5 0.458 0.356 15 0.356 0.451
6 0.447 0.365 16 0.346 0.460
7 0.437 0.374 17 0.336 0.470
8 0.426 0.384 18 0.327 0.480
9 0.416 0.393 19 0.317 0.490
10 0.406 0.403 20 0.308 0.500

 

 Figure 10: Graphs showing Standard vs Mean and false positive vs False negative In this procedure the maximum value obtained are listed as below: Figure 10: Graphs showing Standard vs Mean and false positive vs False negative In this procedure the maximum value obtained are listed as below:

 

Click here to View figure

 

Mean for decoding Correct: 0.01743, Mean for decoding wrong:   — 0.002116, SSIM (Max)=0.8997, PSNR(Max)=45.0199,  Standard deviation for Correct decoding :0.041898, Standard deviation for Wrong decoding :0.039029, false positive=/0.17, false rejection=0.5 and the maximum time taken for performing embedding and extraction process is  minimum of 138.25 and a maximum of 217.46 seconds.

Discussion

In this paper, Joint digital watermark for medical images is proposed. The PSNR, SSIM, MSE, is achieved to the optimum value. The authentication of the system is verified by cryptography technique. Still the more efficiency may be obtained by using the advanced versions of the watermarking embedding and extraction algorithms and also we may look for the techniques in order to reduce data payload so that we may avoid the much damage to the medical image.

Reference

  1. lakshmi priya  sadasivam v.   A survey on watermarking techniques, requirements, applications for medical images.Journal of Theoretical and Applied Information Technology July. 2014;65(1):1992-8645.
  2. Chih-Chin Lai, et.al.  A Robust Feature-based Image Watermarking Scheme. 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, IEEE.  2013;581-586.
  3.  Pandey V.  Secure Medical Image Transmission using Combined Approach of Data-hiding , Encryption and Steganography. International Journal of Advanced Research in Computer Science and Software Engineering.   2012;2(12): 54–57.
  4. Chen T, Hwang M and Jan J.   A Secure Image Authentication Scheme for Tamper Detection and Recovery.  2011.
  5. Abd-eldayem M. M.  ORIGINAL ARTICLE A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine. Egyptian Informatics Journal. 2013;14(1):1–13.
    CrossRef
  6. Chitla and C. M. M.   Authenticating Medical Images with Lossless Digital Watermarking.  2014;291–296.
  7. Faoziyah P. N, Permana F. P. T, Wirayuda A. B and Wisesty U. N.  Tamper Detection and Recovery of Medical Image Watermarking using Modified LSB and Huffman Compression. 2013;129–132.
  8. Novel Algorithms for Secure Medical Image Communication Using Digital Signature with Various Attacks.  2013.
  9. S. Bhatnagar S, Kumar and Gupta A.   An Approach of Efficient and Resistive Digital Watermarking using SVD.  2014;2470–2475.
  10. Pal K. N, Dey S,  Samanta  A,  Das and Chaudhuri S. S.   A Hybrid Reversible Watermarking Technique for Color Biomedical Images.  2013.
  11. Wen-ge F.   SVD and DWT Zero-bit Watermarking Algorithm. 2010;4–7.
  12. Nyeem H.   Utilizing Least Significant Bit-Planes of RONI Pixels for Medical Image Watermarking.  2013.
  13. Mohananthini N and Yamuna G.  A Study of DWT-SVD Based Multiple Watermarking Scheme for Medical Images. 2015;5:558–568.
  14.  Han B and Li J.  Watermarking algorithm for medical volume data anti-geometric attacks. 2016;2:345–349.
Share Button
(Visited 1,385 times, 2 visits today)

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.