Skip to main content

Robust and Secured Reversible Data Hiding Approach for Medical Image Transmission over Smart Healthcare Environment

  • Chapter
  • First Online:
Predictive Data Security using AI

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1065))

  • 479 Accesses

Abstract

With the rapid progress of cloud computing, there has been a marked improvement in the development of smart healthcare applications such as Internet of Medical Things (IoMT), Telemedicine, etc. Cloud-based healthcare systems can efficiently store and communicate patient electronic healthcare records (EHR) while allowing for quick growth and flexibility. Despite the potential benefits, identity violation, copyright infringement, illegal re-distribution, and unauthorized access have all been significant. To address all these breaches, in this paper, a reversible medical image watermarking scheme using interpolation is proposed. The medical image is partitioned into Border Region (BR), Region of Interest (ROI), and Region of Non-interest (RONI) regions. BR is used for embedding integrity checksum code generated from ROI for tamper detection. RONI is used for embedding watermark. To ensure complete recovery of ROI and high embedding capacity, ROI is compressed before embedding. To ensure high-security compressed ROI, hospital emblem and EHR merged and then encrypted using a random key generated from Polybius magic square to get higher security. The proposed scheme is proved to take less computational time as there are no complex functions used in the embedding. The experiments performed on the proposed scheme is proved to have high imperceptibility, robustness, embedding capacity, security, and less computational time. All these confirm that the proposed approach is a potential candidate for suitable in smart healthcare environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Elhoseny, M., et al.: Secure medical data transmission model for IoT-based healthcare systems. In: IEEE Access vol. 6, pp. 20596–20608 (2018)

    Google Scholar 

  2. Anand, A., Singh, A.K.: atermarking techniques for medical data authentication: a survey. Multimedia Tools Appl. 80(20), 30165–30197 (2021)

    Article  Google Scholar 

  3. Giri, K.J., et al.: Survey on reversible watermarking techniques for medical images. In: Multimedia Security. Springer, Singapore, pp. 177–198 (2021)

    Google Scholar 

  4. Alshanbari, H.S.: Medical image watermarking for ownership and tamper detection. Multimedia Tools Appl. 80(11), 16549–16564 (2021)

    Article  MathSciNet  Google Scholar 

  5. Nazari, M., Maneshi, A.: Chaotic reversible watermarking method based on iwt with tamper detection for transferring electronic health record. Sec. Commun, Netw (2021)

    Book  Google Scholar 

  6. Thakur, S., et al.: Chao tic based secure watermarking approach for medical images. Multimedia Tools Appl. 79(7), 4263–4276 (2020)

    Article  Google Scholar 

  7. Aparna, P., Kishore, P.V.V.: An efficient medical image watermarking technique in E-healthcare application using hybridization of compression and cryptography algorithm. J. Intell. Syst. 27(1), 115–133 (2018)

    Article  Google Scholar 

  8. Kaw, J.A., et al.: A reversible and secure patient information hiding system for IoT driven e-health. Int. J. Inf. Manag. 45, 262–275 (2019)

    Article  Google Scholar 

  9. Dugelay, J.-L., Roche, S.: Process for marking a multime dia document, such an image, by generating a mark, Pending patent EP 99480075.3, EURECOM 11/12 EP (1999)

    Google Scholar 

  10. Rey, C., Dugelay, J.-L.: Blind detection of malicious al terations on still images using robust watermarks. In: Secure Images and Image Authentication Colloquium. IEE Electronics and Communications, London (2000)

    Google Scholar 

  11. Sangeetha, M., Betty, P., Nanda Kumar, G.S.: A biometrie iris image compression using LZW and hybrid LZW coding algorithm. In: 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS). IEEE (2017)

    Google Scholar 

  12. Hassan, F.S., Gutub, A.: Efficient image reversible data hiding technique based on interpolation optimization. Arabian J. Sci. Eng. 46(9), 8441–8456 (2021)

    Article  Google Scholar 

  13. AL-Hashemy, R.H., Mehdi, S.A.: A new algorithm based on magic square and a novel chaotic system for image encryption. J. Intell. Syst. 29(1), 1202–1215 (2020)

    Google Scholar 

  14. Arroyo, J.C.T., Dumdumaya, C.E., Delima, A.J.P.: Polybius square in cryptography: a brief review of literature. Int. J. 9(3) (2020)

    Google Scholar 

  15. https://www.oasis-brains.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Jyothsna Devi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jyothsna Devi, K., Singh, P., Santamaría, J., Patel, S. (2023). Robust and Secured Reversible Data Hiding Approach for Medical Image Transmission over Smart Healthcare Environment. In: Thakkar, H.K., Swarnkar, M., Bhadoria, R.S. (eds) Predictive Data Security using AI. Studies in Computational Intelligence, vol 1065. Springer, Singapore. https://doi.org/10.1007/978-981-19-6290-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-6290-5_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-6289-9

  • Online ISBN: 978-981-19-6290-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics