Skip to main content
Log in

A watermarking scheme for source authentication, ownership identification, tamper detection and restoration for color medical images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a blind watermarking scheme that has ability of confidentiality, source authentication, ownership identification, integrity, tampering detection and restoration of the medical images. It embeds the hospital logo, electronic patient record and perceptual hash value of region of interest in the mid-frequency coefficients of discrete cosine transform of the region of non-interest of medical image. The region of interest of the image is restored against attacks including the desynchronization attacks and impulse noise attack, and the severity of tampering due to any attack is measured by comparing the difference between the original perceptual hash value of the region of interest and the extracted perceptual hash value of region of interest of watermarked image. Restoration is done that tampers the region of interest of the images. Number of medical image watermarking schemes that show resilient to many different types of singular and hybrid attacks is very few. The proposed method has inbuilt restoration schemes against different attacks such as rotation, scaling, translation, shearing, horizontal reflection, vertical reflection and impulse noise attacks. Comparison with the latest and state-of-art medical image watermarking schemes shows that the performance of the proposed method is superior to other methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Al-Haj A, Amer A (2014) Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 27(6):737–750

    Article  Google Scholar 

  2. Al-Haj A, Mohammad A, Amer A (2017) Crypto-watermarking of transmitted medical images. J Digit Imaging 30:26–38

    Article  Google Scholar 

  3. Anusudha K, Venkateswaran N, Valarmathi J (2017) Secured medical image watermarking with DNA codec. Multimed Tools Appl 76:2911–2932

    Article  Google Scholar 

  4. Banerjee S, Mitra S, Shankar BU, Hayashi Y (2016) A novel GBM saliency detection model using Multi-Channel MRI. PLoS One 1(1):1–16

    Google Scholar 

  5. Belkasim SO, Ahmadi M, Shridhar M (1996) Efficient algorithm for fast computation of Zernike moments. 39thIEEE Mid West Symp Circ Syst 3:1401–1404

    MATH  Google Scholar 

  6. Cedillo-Hernandez M, Garcia-Ugalde F, Nakano-Miyatake M, Perez-Meana H (2017) Digital color image ownership authentication via efficient and robust watermarking in a hybrid domain. Radioengineering 26(2):536–551

    Article  Google Scholar 

  7. Das S, Kundu MK (2012) Effective management of medical information through a novel blind watermarking technique. J Med Syst 36:3339–3351

    Article  Google Scholar 

  8. Devi BP, Singh KM, Roy S (2017) New copyright protection scheme for digital images based on visual cryptography. IETE J Res 63(6):870–880

    Article  Google Scholar 

  9. Eswaraiah R, Reddy ES (2015) Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Process 9(8):615–625

    Article  Google Scholar 

  10. http://e-pao.net/epSubPageExtractor.asp?src=news_section.Top_Stories.Top_Stories_2017.NABH_ certifies_Shija_Hospitals_20170106 (Accessed on 17/02/2018)

  11. http://www.logobook.com/logo/park-city-hospital/(Accessed on 17/02/2018)

  12. http://www.graphis.com/logos/42d24f6c-4b41-11e2-ae70-f23c91dffdec/ (Accessed on 17/02/2018)

  13. https://brenmoor.com/catalogue/skin-id-labels-direct-to-skin-patient-identification/ (Accessed on 17/02/2018)

  14. https://www.linstar.com/products/product-details/patient-id-card-program (Accessed on 17/02/2018)

  15. Jampani V, Ujjwal, Sivaswamy J , Vidya V (2012) Assessment of computational visual attention models on medical images. Proc. ICVIP. 1–8

  16. Ji F, Deng C, An L, Huang D (2013) Desynchronization attacks resilient image watermarking scheme based on global restoration and local embedding. Neucomputing 106:42–50

    Article  Google Scholar 

  17. Lei B, Tan EL, Chen S, Ni D, Wang T, Lei H (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41(7):3178–3188

    Article  Google Scholar 

  18. Lowe DG (2004) Distinctive image features from scale invariant key-points. Int J Comput Vis 60:91–110

    Article  Google Scholar 

  19. Lui G, Yang X (2017) Automatic renal lesion segmentation in ultrasound images based on saliency features, improved LBP, and an edge indicator under level set framework. Am Assoc Phys Med 45(1):223–235

    Google Scholar 

  20. Mostafa SAK, El-sheimy N, Tolba AS, Abdelkader FM, Elhindy HM (2010) Wavelet packets-based blind watermarking for medical image management the open. Biol Eng J 4:93–98

    Google Scholar 

  21. Neelima A, Singh KM (2016) Perceptual hash function based on scale invariant feature transform and singular value decomposition. Comput J 59(9):1275–1281

    Article  MathSciNet  Google Scholar 

  22. Papakostas GA, Koulouriotis DE, Karakasis EG (2009) Effifient 2-D DCT computation from an image representation point of view, Image processing, Intec, eds.Chen, Y.-S., 21–34

  23. Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl 76:10599–10633

    Article  Google Scholar 

  24. Paulo DJ, Rodrigo DB, Alexander DM (2011) Analyzing and exploring feature detectors in images. Int Conf Ind Informa, Port:305–310

  25. PEIR Digital Library: http://peir.path.uab.edu/library/index.php?/category/244 (Accessed on 17/02/2018

  26. Rahimi F, Rabbani H (2011) A dual adaptive watermarking scheme in contourlet domain for DICOM images. BioMedEngOnLine 10:53

    Google Scholar 

  27. Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking for medical images. Wireless Pers Commun 92:1611–1624

    Article  Google Scholar 

  28. Shen L, Margolies LR, Rothstein JH, Fluder E, McBridge R , Shieh W (2019) Deep learning to improve breast cancer detection on screening mammography. Scientic Reports, 9, 1–12 (Online)

  29. Siddaraju PM, Jayadevappa D, Ezhilarasan K (2015) Application of fractional wave packet transform for robust watermarking of mammograms. Int J Telemed Appl 2015:123790

    Google Scholar 

  30. Singh KM, Bora PK (2004) Adaptive vector median filter for removal of impulse noise from color images. J Electr Electron Eng 4:1063–1072

    Google Scholar 

  31. Singh KM, Bora PK (2014) Switching vector median filters based on non-causal linear prediction for detection of impulse noise. Imaging Sci J 62(6):313–326

    Article  Google Scholar 

  32. Singh AK, Kumar B, Dave M, Mohon A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wireless Pers Commun 80:1415–1433

    Article  Google Scholar 

  33. Soualmi A, Alti A, Laouamer L (2018) A new blind medical image watermarking based on weber descriptors and Arnold chaotic map. Arab J Sci Eng 43:7893–7905

    Article  Google Scholar 

  34. Thabit R, Khoo BE (2017) Medical image authentication using SLT and IWT schemes. Multimed Tools Appl 76:309–332

    Article  Google Scholar 

  35. Thakkar FN, Srivastava VK (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76:3669–3697

    Article  Google Scholar 

  36. Thanki R, Borra S, Dwivedi V, Borisagar K (2017) An efficient medical image watermarking scheme based on FDCuT-DCT. Eng Sc and Tech 20(4):1366–1379

    Google Scholar 

  37. Wang C, Zhang Y, Zhou X (2018) Robust image watermarking algorithm based on ASIFT against geometric attacks. Appl Sci 8(410), 1–19

  38. Weng G, Rodriguez-Nino B, Pecen FY, Vining DJ, Garg N, Marhey MK (2017) Comparative study of computational visual attention models on two-dimensional medical images. J Med Imaging 4(2):025503–025515

    Article  Google Scholar 

  39. Wu JHK, Chang R, Chen C, Wang C-L, Kuo T-H, Moon W-K, Chen D-R (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21:59–76

    Article  Google Scholar 

  40. www.sgrh.com (Accessed on 17/02/2018)

  41. www.vardhmanhealth.com (Accessed on 17/02/2018)

  42. Xu L, Yuille AL (1995) Robust principal component analysis by self-organizing rules based on statistical physics approach. IEEE Trans Neural Netw 6(1):131–143

    Article  Google Scholar 

  43. Yu C, Fang Q, Jianbin H, Zhong C (2008) A geometric robust watermarking algorithm based on DWT-DCT and Zernike moments. J Nat Sci 13(6):753–758

    MathSciNet  Google Scholar 

  44. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77:4863–4882

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to thank Dr. K. Mani Singh, MD, Associate Professor, Department of Radiology, JNIMS, Imphal, Dr. O. Heramot Singh, Professor, Department of Radiology, JNIMS, Imphal, Dr. Sh. Somorendro Singh, MD, Radiologist, Manipur Health Services, Imphal, Dr. Jayadev Ph., MD, Radiologist, Manipur Health service, Imphal, and Dr. O. Jotinkumar Singh, MD, Advance Hospital, Imphal for correlating between the extracted watermarks and numerical data.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khumanthem Manglem Singh.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Laishram, D., Manglem Singh, K. A watermarking scheme for source authentication, ownership identification, tamper detection and restoration for color medical images. Multimed Tools Appl 80, 23815–23875 (2021). https://doi.org/10.1007/s11042-020-10389-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10389-4

Keywords

Navigation