Cost-Effective Watermarking Scheme for Authentication of Digital Fundus Images in Healthcare Data Management

This paper presents a cost-effective watermarking scheme for the authentication of healthcare data management. The digital fundus images are one particular class of medical images and it is widely used for screening mass population, identifying early symptoms of various diseases in healthcare. The mass volume of such data and its management requires an effective authentication scheme, while it is exchanged on an open network. The proposed scheme uses a watermarking technique to authenticate the digital fundus images. The watermark is generated concerning the portions of the original image using Singular value decomposition (SVD) and the remaining portions are used for embedding. The embedding process uses interleaving concepts across the red and blue planes of the original images to make the number of embedding as constant. The constant number of embedding is fixed for the original size of the given image to make the scheme as computationally cost-effective. The experiment showed the maximum capacity of the proposed scheme is 329960 bits for an image of size 565x584x3. It modifies 43% of the total number of embedded pixels against jittering attacks at an average. Comparative analysis showed that the proposed scheme uses only 1/3 of the original image size for embedding by retaining good imperceptibility of 54 dB. The net performance of the proposed scheme is found to be constant and it makes a scheme as cost-effective.

[1]  Ioan-Catalin Dragoi,et al.  Improved rhombus interpolation for reversible watermarking by difference expansion , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[2]  Amit Kumar Singh,et al.  Hybrid technique for robust and imperceptible multiple watermarking using medical images , 2015, Multimedia Tools and Applications.

[3]  Shijun Xiang Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking , 2012, Information Hiding.

[4]  Imran Usman,et al.  Lossless Data Hiding Using Optimized Interpolation Error Expansion , 2011, 2011 Frontiers of Information Technology.

[5]  Giulia Boato,et al.  Difference expansion and prediction for high bit-rate reversible data hiding , 2012, J. Electronic Imaging.

[6]  Athanassios N. Skodras,et al.  High capacity reversible data hiding using overlapping difference expansion , 2009, 2009 10th Workshop on Image Analysis for Multimedia Interactive Services.

[7]  Jae-Won Suh,et al.  Reversible watermarking without underflow and overflow problems , 2012, 2012 IEEE 55th International Midwest Symposium on Circuits and Systems (MWSCAS).

[8]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[9]  Dinu Coltuc,et al.  Improved Embedding for Prediction-Based Reversible Watermarking , 2011, IEEE Transactions on Information Forensics and Security.

[10]  Malay Kishore Dutta,et al.  A robust zero-watermarking scheme for tele-ophthalmological applications , 2017, J. King Saud Univ. Comput. Inf. Sci..

[11]  Sunita S. Lokhande,et al.  Imperceptible and Robust Digital Image Watermarking Techniques in Frequency Domain , 2013 .

[12]  Ye Zhang,et al.  Reversible image watermarking by rhombus prediction and histogram modification , 2012, 2012 International Conference on Audio, Language and Image Processing.

[13]  Du-Shiau Tsai,et al.  Reversible data hiding scheme based on neighboring pixel differences , 2013, Digit. Signal Process..

[14]  B. Paramasivan,et al.  Load Balanced Clustering Technique in MANET using Genetic Algorithms , 2016 .

[15]  Amit Kumar Singh,et al.  Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images , 2017, Multimedia Tools and Applications.

[16]  Ioan-Catalin Dragoi,et al.  Adaptive Pairing Reversible Watermarking , 2016, IEEE Transactions on Image Processing.

[17]  Amit Kumar Singh,et al.  Hybrid Technique for Robust and Imperceptible Image Watermarking in DWT–DCT–SVD Domain , 2014, National Academy Science Letters.

[18]  Dinu Coltuc,et al.  Multibit versus multilevel embedding in high capacity difference expansion reversible watermarking , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[19]  Chin-Chen Chang,et al.  Reversible data hiding for high quality images exploiting interpolation and direction order mechanism , 2013, Digit. Signal Process..

[20]  Zhi-Hui Wang,et al.  Histogram-shifting-imitated reversible data hiding , 2013, J. Syst. Softw..

[21]  Dinu Coltuc,et al.  Capacity control of reversible watermarking by two-thresholds embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[22]  Yixin Yan,et al.  High capacity reversible image authentication based on difference image watermarking , 2009, 2009 IEEE International Workshop on Imaging Systems and Techniques.

[23]  Lusia Rakhmawati,et al.  A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability , 2019, EURASIP J. Image Video Process..

[24]  Naveen Chilamkurti,et al.  DRFS: Detecting Risk Factor of Stroke Disease from Social Media Using Machine Learning Techniques , 2020, Neural Processing Letters.

[25]  R. S. Rajesh,et al.  Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication , 2012, Multimedia Tools and Applications.

[26]  Adnan M. Alattar,et al.  Reversible watermark using difference expansion of quads , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[27]  Hyoung Joong Kim,et al.  Reversible Watermarking Algorithm with Distortion Compensation , 2010, EURASIP J. Adv. Signal Process..

[28]  Ioan-Catalin Dragoi,et al.  Local-Prediction-Based Difference Expansion Reversible Watermarking , 2014, IEEE Transactions on Image Processing.

[29]  Nora Cuppens-Boulahia,et al.  Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting , 2013, IEEE Transactions on Information Forensics and Security.

[30]  Dinu Coltuc,et al.  Capacity control of reversible watermarking by two-thresholds embedding: Further results , 2013, International Symposium on Signals, Circuits and Systems ISSCS2013.

[31]  Poonkuntran Shanmugam,et al.  Integer Transform-Based Watermarking Scheme for Authentication of Digital Fundus Images in Medical Science: An Application to Medical Image Authentication , 2020 .

[32]  Gheith A. Abandah,et al.  Crypto-based algorithms for secured medical image transmission , 2015, IET Inf. Secur..

[33]  Asifullah Khan,et al.  A high capacity reversible watermarking approach for authenticating images: Exploiting down-sampling, histogram processing, and block selection , 2014, Inf. Sci..

[34]  Amit Kumar Singh,et al.  Survey of robust and imperceptible watermarking , 2018, Multimedia Tools and Applications.

[35]  Min-Shiang Hwang,et al.  A reversible data hiding method by histogram shifting in high quality medical images , 2013, J. Syst. Softw..

[36]  Masaaki Fujiyoshi A Histogram shifting-based blind reversible data hiding method with a histogram peak estimator , 2012, 2012 International Symposium on Communications and Information Technologies (ISCIT).