204
Views
16
CrossRef citations to date
0
Altmetric
Original Articles

Crypto-watermarking scheme for tamper detection of medical images

& ORCID Icon
Pages 345-355 | Received 31 Aug 2018, Accepted 12 Mar 2019, Published online: 28 Mar 2019

References

  • Agrawal S, Vishwanath S. 2011 October. Secrecy using compressive sensing. Information Theory Workshop (ITW), 2011 IEEE; Paraty, Brazil: IEEE. p. 563–567.
  • Al-Haj A, Hussein N, Abandah G. 2016 May. Combining cryptography and digital watermarking for secured transmission of medical images. Information Management (ICIM), 2016 2nd International Conference on, London, UK; IEEE. p. 40–46.
  • Al-Haj A, Mohammad A. 2017. Crypto-watermarking of transmitted medical images. J Digit Imaging. 30(1):26–38.
  • Al-Qershi OM, Khoo BE. 2011. Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging. 24(1):114–125.
  • AlShaikh M, Laouamer L, Nana L, Pascu AC. 2017. Efficient and robust encryption and watermarking technique based on a new chaotic map approach. Multimed Tools Appl. 76(6):8937–8950.
  • Biometrics and Standards. 2009. ITU-T Technology Watch Report, December; Accessed 2016. http://www.itu.int/dms_pub/itu-t/oth/23/01/T230100000D0002MSWE.doc.
  • Borra S, Lakshmi H, Dey N, Ashour A, Shi F. 2017 August. Digital image watermarking tools: state-of-the-art. Information technology and intelligent transportation systems: proceedings of the 2nd international conference on information technology and intelligent transportation systems; Xi’an, China. vol. 296, p. 450.
  • Borra S, Thanki R, Dey N. 2018a. Digital image watermarking: theoretical and computational advances. Boca Raton, FL: CRC Press.
  • Borra S, Thanki R, Dey N, Borisagar K. 2018b. Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing. Smart Health.
  • Bouslimi D, Coatrieux G. 2016. A crypto-watermarking system for ensuring reliability control and traceability of medical images. Signal Process. 47:160–169.
  • Bouslimi D, Coatrieux G, Cozic M, Roux C. 2012. A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Trans Inf Technol Biomed. 16(5):891–899.
  • Cancellaro M, Battisti F, Carli M, Boato G, De Natale FG, Neri A. 2011. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain. Signal Process. 26(1):1–12.
  • Candès EJ, Wakin MB. 2008. An introduction to compressive sampling. IEEE Signal Process Mag. 25(2):21–30.
  • Chiang KH, Chang-Chien KC, Chang RF, Yen HY. 2008. Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J Digit Imaging. 21(1):77–90.
  • Dagadu JC, Li J. 2018. Context-based watermarking cum chaotic encryption for medical images in telemedicine applications. Multimed Tools Appl. 77 (18): 1–24.
  • Dey N, Das P, Chaudhuri SS, Das A. 2012, October. Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar’s method. Proceedings of the Fifth International Conference on Security of Information and Networks; Jaipur, India: ACM. p. 87–94.
  • Donoho DL. 2006. Compressed sensing. IEEE Trans on Inf Theory. 52(4):1289–1306.
  • Guo X, Zhuang TG. 2009. A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging. 22(1):53–64.
  • Hossein SA, Tabatabaei AE, Zivic N. 2012 November. Security analysis of the joint encryption and compressed sensing. Telecommunications Forum (TELFOR), 2012 20th; Belgrade, Serbia: IEEE. p. 799–802.
  • Jain AK. 1989. Fundamentals of digital image processing. Englewood Cliffs (NJ): Prentice Hall; p. 150–153.
  • Kunhu A, Al-Ahmad H, Taher F. 2017 December. Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions. Electronics, Circuits and Systems (ICECS), 2017 24th IEEE International Conference on, Batumi; Georgia: IEEE. p. 397–400.
  • Liew SC, Liew SW, Zain JM. 2013. Tamper localisation and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging. 26(2):316–325.
  • Luo T, Jiang G, Yu M, Shao F, Peng Z, Ho YS. 2014. Stereo matching based stereo image watermarking for tamper detection and recovery. Int J Comput Intell Syst. 7(5):874–881.
  • Luo T, Jiang G, Yu M, Xu H. 2016. Asymmetric self-recovery oriented stereo image watermarking method for three-dimensional video system. Multimedia Syst. 22(5):641–655.
  • Luo T, Jiang G, Yu M, Xu H, Gao W. 2017. Sparse recovery based reversible data hiding method using the human visual system. Multimed Tools Appl. 77(11):19027–19050.
  • MedPix® Medical Image Database. [ accessed 2018 december]. http://rad.usuhs.mil/medpix/medpix.html, https://medpix.nlm.nih.gov/home.
  • Mehto A, Mehra N. 2016. Adaptive lossless medical image watermarking algorithm based on DCT & DWT. Procedia Comput Sci. 78:88–94.
  • Metkar SP, Lichade MV. 2013 September. Digital image security improvement by integrating watermarking and encryption technique. Signal Processing, Computing and Control (ISPCC), 2013 IEEE International Conference on, Solan, India; IEEE. p. 1–6.
  • Mohanty SP, Sengupta A, Guturu P, Kougianos E. 2017. Everything you want to know about watermarking: from paper marks to hardware protection: from paper marks to hardware protection. IEEE Consum Electron Mag. 6(3):83–91.
  • Mothi R, Karthikeyan M. 2019. Protection of bio medical iris image using watermarking and cryptography with WPT. Measurement. 136:67–73.
  • Orsdemir A, Altun HO, Sharma G, Bocko MF. 2008 November. On the security and robustness of encryption via compressed sensing. Military Communications Conference, 2008. MILCOM 2008. IEEE; San Diego, CA, USA: IEEE p. 1–7.
  • Parah SA, Ahmad I, Loan NA, Muhammad K, Sheikh JA, Bhat GM. 2019. Realization of an adaptive data hiding system for electronic patient record, embedding in medical images. In: Security in smart cities: models, applications, and challenges. Cham: Springer; p. 47–70.
  • Parah SA, Sheikh JA, Akhoon JA, Loan NA. 2018. Electronic health record hiding in images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication. Future Gener Comput Syst. doi:10.1016/j.future.2018.02.023
  • Qin C, Ji P, Zhang X, Dong J, Wang J. 2017. Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Processing. 138:280–293.
  • Rachlin Y, Baron D. 2008 September. The secrecy of compressed sensing measurements. Communication, Control, and Computing, 2008 46th Annual Allerton Conference on, Urbana-Champaign, IL, USA; IEEE. p. 813–817.
  • Ruotsalainen P. 2010. Privacy and security in teleradiology. Eur J Radiol. 73(1):31–35.
  • Singh AK. 2019. Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimedia Tools and Applications; p. 1–11.
  • Singh AK, Kumar B, Dave M, Mohan A. 2015. Multiple watermarking on medical images using selective discrete wavelet transform coefficients. J Med Imaging Health Inf. 5(3):607–614.
  • Sundaravadivel P, Kougianos E, Mohanty SP, Ganapathiraju MK. 2018. Everything you wanted to know about smart health care: evaluating the different technologies and components of the internet of things for better health. IEEE Consum Electron Mag. 7(1):18–28.
  • Thakur S, Singh AK, Ghrera SP, Elhoseny M. 2018. Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl. 78 (3): 1–14.
  • Thanki R, Borra S, Dwivedi V, Borisagar K. 2017a. A RONI based visible watermarking approach for medical image authentication. J Med Syst. 41(9):143.
  • Thanki R, Borra S, Dwivedi V, Borisagar K. 2017b. A steganographic approach for secure communication of medical images based on the DCT-SVD and the compressed sensing (CS) theory. Imaging Sci J. 65(8):457–467.
  • Thanki RM, Borra S, Borisagar KR. 2018. A hybrid watermarking technique for copyright protection of medical signals in teleradiology. In: Chittaranjan Pradhan, Himansu Das, Bighnaraj Naik and Nilanjan Dey editors Handbook of research on information security in biomedical signal processing. IGI Global; p. 320–349.
  • Tropp JA, Gilbert AC. 2007. Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans on Inf Theory. 53(12):4655–4666.
  • Vidakovic B. 2009. Statistical modeling by wavelets. vol. 503. Hoboken, NJ: John Wiley & Sons.
  • Wang Z, Bovik AC. 2002. A universal image quality index. IEEE Signal Process Lett. 9(3):81–84.
  • Yassin NI. 2015. Digital watermarking for telemedicine applications: a review. Int J Comput Appl. 129:17.
  • Zhang H, Wang C, Zhou X. 2017. Fragile watermarking for image authentication using the characteristic of SVD. Algorithms. 10(1):1–12.
  • Zhang Y, Zhang LY, Zhou J, Liu L, Chen F, He X. 2016. A review of compressive sensing in information security field. IEEE Access. 4:2507–2519.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.