Skip to main content
Log in

A New Reversible and high capacity data hiding technique for E-healthcare applications

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A high capacity and reversible data hiding technique capable of tamper detection and localisation of medical images has been proposed in this paper. Image interpolation has been used to scale up the original image to obtain the cover image. The cover image is divided into n×n non-overlapping blocks. In every block pixels are classified into two types: Seed pixels and non-seed pixels. The Electronic Patient Record (EPR) is embedded only in non-seed pixels while as no embedding is carried out in seed pixels to facilitate reversibility. A fragile watermark coupled with Block Checksum has been embedded in addition to EPR for detecting any tamper to the patient data during its transit from transmitter to receiver. Embedding has been carried out using Intermediate Significant Bit Substitution (ISBS) to prevent the scheme from LSB removal/replacement attack. The scheme has been evaluated for perceptual imperceptibility and content authentication by subjecting it to various image processing and geometric attacks. Experimental results reveal that the proposed system is capable of providing high quality watermarked images for fairly high payload while maintaining reversibility. Further it has been observed that the proposed technique is able to detect tamper for all the image processing and geometric attacks carried out on it. A comparison of the observed results with that of some state-of-art schemes show that our scheme performs better and as such is an ideal candidate for content authentication of EPR in a typical e-healthcare system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25

Similar content being viewed by others

References

  1. Abhilasha S, Malay KD (2014) A blind and fragile watermarking scheme for tamper detection of medical images preserving ROI. IEEE International Conference on Medical Imaging, m- Health and Emerging Communication systems (MedCom)

  2. Arijit KP, Nilanjan D, Sourav S, Achintya D, Sheli SC (2013) A Hybrid Reversible Watermarking Technique for Color Biomedical Images. IEEE International Conference on Computational Intelligence and Computing Research. IEEE 978-1-4799-1597-2/13

  3. Arsalan M, Sana AM, Asifullah K (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. The Journal of Systems and Software, Elsevier. 85:883–894

    Article  Google Scholar 

  4. Baiying L, Ee-Leng T, Siping C, Dong N, Tianfu W, Haijun L (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Systems with Applications. Elsevier 41:3178–3188

    Article  Google Scholar 

  5. Bhat GM, Sheikh JA, Parah SA (2014) A secure and robust information hiding technique for covert communication. International Journal of Electronics, Taylor and Francis, (U.K) 102:1253–1266. doi:10.1080/00207217.2014.954635.2014

    Google Scholar 

  6. Bhat GM, Loan NA, Sheikh JA, Parah SA (2016) Robust and blind Watermarking technique in DCT domain using Inter-Block Coefficient Differencing. Digital Signal Processing, Elsevier 53:11–24

    Article  Google Scholar 

  7. Chin-Feng L, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Systems with Applications. Elsevier 39:6712–6719

    Article  Google Scholar 

  8. Chun KT, Jason CN, Xiaotian X, Chueh LP, Yong LG, Kenneth S (2011) Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. Journal of Digital Imaging. 24:528–540

    Article  Google Scholar 

  9. Hirak KM, Santi PM (2012) Joint Robust and Reversible Watermarking for Medical Images. 2nd International Conference on Communication, Computing & Security [ICCCS-2012], Elsevier. Procedia Technology. 6:275–282

    Article  Google Scholar 

  10. Jie H, Tianrui L (2015) Reversible steganography using extended image interpolation technique. Comput. Electr Eng. Elsevier. doi:10.1016/j.compeleceng.2015.04.014

    Google Scholar 

  11. Jung K, Yoo K (2009) Data hiding method using image interpolation. Comput. Stand. Interfaces. 31:465–470

    Article  Google Scholar 

  12. Kamran AK, Sana AM (2014) A high capacity reversible watermarking approach for authenticating images: Exploiting down-sampling, histogram processing, and block selection. Information Sciences. Elsevier. 256:162–183

    Article  Google Scholar 

  13. Lu J, Wang M, Dai J, Huang Q, Lia L, Chang C-C (2015) Multiple Watermark Scheme based on DWT-DCT Quantization for Medical Images. Journal of Information Hiding and Multimedia Signal Processing. 6:409–415

    Google Scholar 

  14. Malay KK, Sudeb D (2010) Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding. IEEE International Conference on Pattern Recognition. 1457–1460

  15. Mingwei T, Jie H, Wen S (2014) A high capacity image steganography using multi-layer embedding. Optik. Elsevier 125:3972–3976

    Google Scholar 

  16. Mohamed MA (2013) A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine. Egyptian Informatics Journal. Elsevier 14:1–13

    Article  Google Scholar 

  17. Moniruzzaman M, Kayum HMA, Foisal HM (2014) Wavelet based watermarking approach of hiding patient information in medical iamge for medical image authentication. 17th IEEE Int'l Conf. on Computer and Information Technology. Daffodil International University, Dhaka, Bangladesh

    Google Scholar 

  18. Pandey R, Singh AK, Kumar B, Mohan A (2016) Iris based secure NROI multiple eye image for Tele-opthomology. Multimedia Tools and Applications 1:17

    Google Scholar 

  19. Parah SA, Sheikh JA, Bhat GM (2015a) Hiding in encrypted images: A three tier security data hiding system. Multidimensional systems and Signal Processing, Springer. doi:10.1007/s11045-015-0358-z

    Google Scholar 

  20. Parah SA, Sheikh JA, Bhat GM (2015b) Data hiding in scrambled images: A new double layer security data hiding technique. Computers and Electrical Engineering, Elsevier 40:70–82

    Article  Google Scholar 

  21. Parah SA, Sheikh JA, Ahad F, Bhat GM (2015c) Information Hiding in Medical Images: A Robust Medical Image Watermarking System for E-Healthcare. Multimedia Tools and Applications, springer. doi:10.1007/s11042-015-3127-y

    Google Scholar 

  22. Rahimi F, Rabbani H (2011) A dual adaptive watermarking scheme in contourlet domain for DICOM images. Biomedical Engineering Online. doi:10.1186/1475-925X-10-53

    Google Scholar 

  23. Singh AK (2016) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images, Multimedia Tools and Applications, in press pp 1–18

  24. Singh AK, Kumar B, Dave M, Mohan A (2015a) Wavelet base image watermarking: Futuristic concepts in information security, Proceedings of National Academy of Science. India section A: Physical sciences. 84(3):345–359

    Google Scholar 

  25. Singh AK, Kumar B, Dave M, Mohan A (2015b) Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD Domain. National Academy Science Letters 37(4):351–358

    Article  Google Scholar 

  26. Singh AK, Kumar B, Dave M, Mohan A (2015c) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools and Applications, In Press

  27. Singh AK, Dave M, Mohan A (2015d) Robust and secure multiple watermarking in wavelet domain, Advanced Signal Processing Technologies and Systems for Healthcare Applications. Journal of medical imaging and health informatics. 5(2):406–414

    Article  Google Scholar 

  28. Singh AK, Dave M, Mohan A (2015e) Multiple watermarking on medical images using selective DWT coefficients. Journal of Medical Imaging and Health Informatics 5(3):607–614

    Article  Google Scholar 

  29. Singh AK, Dave M, Mohan A (2015f) Robust and imperceptible dual watermark for telemedicine applications. Wireless Personal Communications 80(4):1414–1433

    Google Scholar 

  30. Solanki N, Malik SK (2014) ROI based medical image watermarking with zero distortion and enhanced security. International Journal of Education and Computer Science. 10:40–48

    Google Scholar 

  31. Sumalatha L, Rosline KG, Vijaya KV (2012) A simple block based content watermarking scheme for image authentication and tamper detection. International Journal of Soft Computing and Engineering (IJSCE) 2(4):2231–2240

    Google Scholar 

  32. Talat N, Imran U, Tariq MK, Amir HD, Muhammad FS (2014) Intelligent reversible watermarking technique in medical images using GA and PSO. Optik, Elsevier. doi:10.1016/j.ijleo.2013.10.2014

    Google Scholar 

  33. Wang XT, Chang CC, Nguyen TS, Li MC (2013) Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digital Signal Processing 23(2):569–577

    Article  MathSciNet  Google Scholar 

  34. Xiaotao G, Zhuang T (2009) Lossless watermarking for verifying the Integrity of medical images with tamper localization. Journal of Digital Imaging. 22:620–628

    Article  Google Scholar 

Download references

Acknowledgements

The authors duly acknowledge University Grants Commission (UGC) and Department of Science and Technology (DST), Government of India for the supporting this research under Special Assistance Package (SAP) Programme and Inspire Fellowship respectively.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shabir A. Parah.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Parah, S.A., Ahad, F., Sheikh, J.A. et al. A New Reversible and high capacity data hiding technique for E-healthcare applications. Multimed Tools Appl 76, 3943–3975 (2017). https://doi.org/10.1007/s11042-016-4196-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4196-2

Keywords

Navigation