109
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Zero-bit fragile watermarking for medical image tamper detection and recovery using RS code and lifting wavelet transform

ORCID Icon, &
Pages 334-349 | Received 18 Mar 2021, Accepted 16 Dec 2022, Published online: 06 Jan 2023

References

  • Van Schyndel RG, Tirkel AZ, Osborne CF. A digital watermark. In image processing, 1994. Proceedings. ICIP-94. IEEE international conference, volume 2, p. 86–90. IEEE; 1994.
  • Soualmi A, Alti A, Laouamer L. A novel blind watermarking approach for medical image authentication using mineigen value features. Multimed Tools Appl. 2021;80(2):2279–2293.
  • Soni GK, Rawat A, Jain S, et al. A pixel-based digital medical images protection using genetic algorithm with LSB watermark technique. Smart systems and IoT: innovations in computing. Springer. Springer; Singapore;2020. p. 483–492.
  • Sanivarapu PV, Rajesh KN, Rajasekhar Reddy NV, et al. Patient data hiding into ECG signal using watermarking in transform domain. Phys Eng Sci Med. 2020;43(1):213–226.
  • Dawei Z, Guanrong C, Wenbo L. A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons Fractals. 2004;22(1):47–54.
  • Chopra A, Gupta S, Dhall S. Analysis of frequency domain watermarking techniques in presence of geometric and simple attacks. Multimed Tools Appl. 2020;79(1-2):501–554.
  • Priya RP, Sadasivam V. A survey on watermarking techniques,: requirements, applications for medical images. J Theoret Appl Inf Technol. 2014;65(1):103–120.
  • Navas KA, Sasikumar M. Survey of medical image watermarking algorithms. Proceedings of international conference sciences of electronics, technologies of information and telecommunications, 25–29; 2007.
  • Swaraja K, Meenakshi K, Kora P. An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control. 2020;55:101665.
  • Alshanbari HS. Medical image watermarking for ownership & tamper detection. Multimed Tools Appl. 2020;80(11):1–16.
  • Soualmi A, Alti A, Laouamer L. Multiple blind watermarking framework for security and integrity of medical images in e-health applications. Int J Comput Vision Image Process. 2021;11(1):1–16.
  • Soualmi A, Alti A, Laouamer L. An imperceptible watermarking scheme for medical image tamper detection. Int J Inf Sec Privacy. 2022;16(1):1–18.
  • Mathivanan P, Jero SE, Ramu P, et al. QR code based patient data protection in ECG steganography. Australas Phys Eng Sci Med. 2018;41(4):1057–1068.
  • Navas KA, Sasikumar M, Sreevidya S. A benchmark for medical image watermarking. Systems, signals and image processing, 2007 and 6th EURASIP conference focused on speech and image processing, multimedia communications and services. 14th International workshop on, 237–240. IEEE; 2007.
  • Mousavi SM, Naghsh A, Abu-Bakar SAR. Watermarking techniques used in medical images: a survey. J Digit Imaging. 2014;27(6):714–729.
  • Soualmi A, Alti A, Laouamer L. A novel blind medical image watermarking scheme based on Schur triangulation and chaotic sequence. Concurr Comput. 2022;34(1):e6480.
  • Ming Li DX, Zhu Y, Zhang Y, et al. Commutative fragile zero-watermarking and encryption for image integrity protection. Multimed Tools Appl. 2019;78(16):22727–22742.
  • Chen Y, Yu W, Chen G, et al. A novel SVD-based zero-watermarking scheme for copyright protection. 2019 International conference on intelligent computing, automation and systems (ICICAS), 726–731. IEEE; 2019.
  • Memon NA, Chaudhry A, Ahmad M, et al. Hybrid watermarking of medical images for ROI authentication and recovery. Int J Comput Math. 2011;88(10):2057–2071.
  • Al-Qershi OM, Khoo BE. Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging. 2011;24(1):114–125.
  • Liew S-C, Liew S-W, Zain JM. Reversible medical image watermarking for tamper detection and recovery with run length encoding compression. World Acad Sci Eng Technol. 2010;72:799–803.
  • Agung BWR, Adiwijaya FP. Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression. Communication, networks and satellite (ComNetSat), 2012 IEEE international conference on, 167–171. IEEE; 2012.
  • Eswaraiah R, Sreenivasa Reddy E. Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl. 2014;13:2014.
  • Terzija N, Geisselhardt W. Digital image watermarking using complex wavelet transform. Proceedings of the 2004 workshop on multimedia and security, 193–198, New York, NY: ACM; 2004.
  • Qi X, Qi J. A robust content-based digital image watermarking scheme. Signal Processing. 2007;87(6):1264–1280.
  • Thakur S, Singh AK, Kumar B, et al. Improved DWT-SVD-based medical image watermarking through hamming code and chaotic encryption. In: Advances in VLSI, communication, and signal processing , Singapore, 897–905. Springer, 2020.
  • Mostafa SAK, El-Sheimy N, Tolba AS, et al. Wavelet packets based blind watermarking for medical image management. Open Biomed Eng J. 2010;4:93–98.
  • Kumar B, Kumar SB, Chauhan DS. Wavelet based imperceptible medical image watermarking using spread-spectrum. Telecommunications and signal processing (TSP), 2015 38th international conference on, 1–5, July 2015.
  • Jose Antonio Mendoza N, Brian MK, Mariko Nakano M, et al. Image authentication and recovery using BCH error-correcting codes. Int J Comput. 2011;5(1):26–33.
  • Chang CC, Hwang KF, Hwang MS. A block based digital watermarks for copy protection of images. Fifth Asia-Pacific conference on communications. Fourth optoelectronics and communications conference, Beijing, China, 17; 1999.
  • Roček A, Slavíček K, Dostál O, et al. A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters. Biomed Signal Process Control. 2016;29:44–52.
  • Sinha S, Singh A, Gupta R, et al. Authentication and tamper detection in tele-medicine using zero watermarking. Procedia Comput Sci. 2018;132:557–562.
  • Kamstra L, Heijmans HJ. Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process. 2005;14(12):2082–2090.
  • Sweldens W. The lifting scheme: a custom-design construction of biorthogonal wavelets. Appl Comput Harmon Anal. 1996;3(2):186–200.
  • Meenakshi Devi P, Venkatesan M, Duraiswamy K. Reversible image authentication with tamper localization based on integer wavelet transform. arXiv preprint arXiv:0912.0607; 2009.
  • Wicker SB, Bhargava VK. An introduction to Reed-Solomon codes. Reed-Solomon Codes and Their Applications, 1–16; 1999.
  • Clarke CKP. R&D white paper. Reed-Solomon error correction. WHP, 31; 2002.
  • Wicker SB. Error control systems For digital communication and storage, volume 1. Englewood Cliffs, NY: Prentice Hall; 1995.
  • MedPix. Department of radiology and radiological sciences, uniformed services university of health sciences (USUHS).
  • Singh AK. Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed Tools Appl. 2019;78(21):30523–30533.
  • Borra S, Thanki R. Crypto-watermarking scheme for tamper detection of medical images. Comput Methods Biomech Biomed Eng. 2020;8(4):345–355.
  • Singh AK, Thakur S, Jolfaei A, et al. Joint encryption and compression-based watermarking technique for security of digital documents. ACM Trans Internet Technol. 2021;21(1):1–20.
  • Utami NS, Novamizanti L, Saidah S, et al. SVD on a robust medical image watermarking based on SURF and DCT. 2021 IEEE international conference on industry 4.0, artificial intelligence, and communications technology (IAICT), 32–38. IEEE; 2021.
  • Musrrat A, Chang Wook P, Millie A, et al. An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony. Inf Sci. 2015;301:44–60.
  • Makur A, Sethu Selvi S. Variable dimension vector quantization based image watermarking. Signal Processing. 2001;81(4):889–893.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.