Iris based secure NROI multiple eye image watermarking for teleophthalmology

This paper presents a new secure multiple text and image watermarking scheme on cover eye image using fusion of discrete wavelet transforms (DWT) and singular value decomposition (SVD) for Teleophthalmology. Secure Hash Algorithm (SHA-512) is used for generating hash corresponding to iris part of the cover digital eye image and this unique hash parameter is used for enhancing the security feature of the proposed watermarking technique. Simultaneous embedding of four different watermarks (i.e. Signature, index, caption and reference watermark) in form of image and text using fusion of discrete wavelet transforms (DWT) and singular value decomposition (SVD) is achieved in this paper. The suggested technique initially divides the digital eye image into Region of interest (ROI) containing iris and Non-Region of interest (NROI) part where the text and image watermarks are embedded into the Non-Region of interest (NROI) part of the DWT cover image. The selection of DWT decomposition level for embedding the text and image watermarks depends on size, different characteristics and robustness requirements of medical watermark. The performance in terms of Normalized Correlation (NC) and bit error rate (BER) of the developed scheme is evaluated and analyzed against known signal processing attacks and ‘Checkmark’ attacks. The method is found to be robust against all the considered attacks. The proposed multilevel watermarking method correctly extracts the embedded watermarks without error and is robust against the all considered attacks without significant degradation of the medical image quality of the watermarked image. Therefore the proposed method may find potential application in secure and compact medical data transmission for teleophthalmology applications.

[1]  Shailaja A. Patil IMAGE WATERMARKING SCHEME USING SVD , 2013 .

[2]  Jasni Mohamad Zain,et al.  Reversible Region of Non-Interest (RONI) Watermarking for Authentication of DICOM Images , 2011, ArXiv.

[3]  Amit Kumar Singh,et al.  Hybrid technique for robust and imperceptible multiple watermarking using medical images , 2015, Multimedia Tools and Applications.

[4]  Li Zhang,et al.  Localized affine transform resistant watermarking in region-of-interest , 2010, Telecommun. Syst..

[5]  Li Li,et al.  Multiple Watermark Scheme based on DWT-DCT Quantization for Medical Images , 2015, J. Inf. Hiding Multim. Signal Process..

[6]  Ching-Yu Yang,et al.  Reversible Data Hiding in the Spatial and Frequency Domains , 2010 .

[7]  C.-C. Jay Kuo,et al.  Digital Image Watermarking in Regions of Interest , 1999, PICS.

[8]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[9]  A. Kannammal,et al.  Two level security for medical images using watermarking/encryption algorithms , 2014, Int. J. Imaging Syst. Technol..

[10]  Malay Kumar Kundu,et al.  Effective management of medical information through ROI-lossless fragile image watermarking technique , 2013, Comput. Methods Programs Biomed..

[11]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[12]  Jasni Mohamad Zain,et al.  Watermark Compression in Medical Image Watermarking Using Lempel-Ziv-Welch (LZW) Lossless Compression Technique , 2016, Journal of Digital Imaging.

[13]  Amit Kumar Singh,et al.  Wavelet Based Image Watermarking: Futuristic Concepts in Information Security , 2014, Proceedings of the National Academy of Sciences, India Section A: Physical Sciences.

[14]  Malay Kumar Kundu,et al.  Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding , 2010, 2010 20th International Conference on Pattern Recognition.

[15]  Mohammed Yakoob Siyal,et al.  A secure and robust hash-based scheme for image authentication , 2010, Signal Process..

[16]  Amit Kumar Singh,et al.  Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain , 2015, Wireless Personal Communications.

[17]  Seyed Mojtaba Mousavi,et al.  Watermarking Techniques used in Medical Images: a Survey , 2014, Journal of Digital Imaging.

[18]  Amit Kumar Singh,et al.  Multiple Watermarking on Medical Images Using Selective Discrete Wavelet Transform Coefficients , 2015, Journal of Medical Imaging and Health Informatics.

[19]  S.A.M. Gilani,et al.  NROI watermarking of medical images for content authentication , 2008, 2008 IEEE International Multitopic Conference.

[20]  Christian Roux,et al.  A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.

[21]  Sotiris Pavlopoulos,et al.  Secure and efficient health data management through multiple watermarking on medical images , 2006, Medical and Biological Engineering and Computing.

[22]  Amit Kumar Singh,et al.  Robust and Imperceptible Dual Watermarking for Telemedicine Applications , 2014, Wireless Personal Communications.

[23]  R. Dhanalakshmi,et al.  Dual Watermarking Scheme with Encryption , 2010, ArXiv.

[24]  Amit Kumar Singh,et al.  Some New Techniques of Improved Wavelet Domain Watermarking ofr Medical Images , 2015 .

[25]  Ali Al-Haj,et al.  Secured Telemedicine Using Region-Based Watermarking with Tamper Localization , 2014, Journal of Digital Imaging.

[26]  Chih-Chin Lai,et al.  Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition , 2010, IEEE Transactions on Instrumentation and Measurement.

[27]  Mohamed Ali Hajjaji,et al.  Combining Haar Wavelet and Karhunen Loeve Transforms for Medical Images Watermarking , 2014, BioMed research international.

[28]  Jasni Mohamad Zain,et al.  Security In Telemedicine: Issues In Watermarking Medical Images , 2005 .

[29]  Mahua Bhattacharya,et al.  Biomedical Image Watermarking in Wavelet Domain for Data Integrity Using Bit Majority Algorithm and Multiple Copies of Hidden Information , 2012 .

[30]  Thierry Pun,et al.  Second Generation Benchmarking and Application Oriented Evaluation , 2001, Information Hiding.

[31]  R. Eswaraiah,et al.  Medical Image Watermarking Technique for Accurate Tamper Detection in ROI and Exact Recovery of ROI , 2014, International journal of telemedicine and applications.

[32]  Yi Pan,et al.  A blind watermarking method using maximum wavelet coefficient quantization , 2009, Expert Syst. Appl..

[33]  V. H. Mankar,et al.  Contour Detection and Recovery through Bio-Medical Watermarking for Telediagnosis , 2010 .

[34]  Suresh N. Mali,et al.  ROI Based Embedded Watermarking of Medical Images for Secured Communication in Telemedicine , 2012 .

[35]  Pingzhi Fan,et al.  An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization , 2008, IEEE Transactions on Multimedia.

[36]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[37]  Jing-Ming Guo,et al.  False-positive-free SVD-based image watermarking , 2014, J. Vis. Commun. Image Represent..

[38]  Amit Kumar Singh,et al.  Robust and Secure Multiple Watermarking in Wavelet Domain , 2015 .

[39]  Shi-Jinn Horng,et al.  A wavelet-tree-based watermarking method using distance vector of binary cluster , 2009, Expert Syst. Appl..