ebook img

Medical image watermarking : techniques and applications PDF

263 Pages·2017·7.17 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Medical image watermarking : techniques and applications

Multimedia Systems and Applications Amit Kumar Singh Basant Kumar Ghanshyam Singh Anand Mohan Editors Medical Image Watermarking Techniques and Applications Multimedia Systems and Applications Series editor Borko Furht More information about this series at: http://www.springer.com/series/6298 Amit Kumar Singh • Basant Kumar Ghanshyam Singh • Anand Mohan Editors Medical Image Watermarking Techniques and Applications Editors Amit Kumar Singh Basant Kumar Department of Computer Science Department of Electronics and and Engineering Communication Engineering Jaypee University of Information Motilal Nehru National Institute Technology of Technology Waknaghat, Solan, Himachal Pradesh, India Allahabad, Uttar Pradesh, India Ghanshyam Singh Anand Mohan Department of Electronics and Department of Electronics Engineering Communication Engineering Indian Institute of Technology (BHU) Jaypee University of Information Varanasi, Uttar Pradesh, India Technology Waknaghat, Solan, Himachal Pradesh, India Multimedia Systems and Applications ISBN 978-3-319-57698-5 ISBN 978-3-319-57699-2 (eBook) DOI 10.1007/978-3-319-57699-2 Library of Congress Control Number: 2017947800 © Springer International Publishing AG 2017 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer International Publishing AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland Preface Information and communication technology (ICT) has been potentially useful for cost-effective and speedy transmission of electronic patient record (EPR) over open channels for telemedicine applications. However, attempts of malicious attacks or hacking for unauthorized access, alteration, modification, deleting, or even preventing the transfer of EPR possess challenging tasks in the implementation of dependable telemedicine systems. Therefore, the authenticity of EPR and related medical images is of prime concern as they form the basis of inference for diagnostic purposes. In such applications, tamperproofing and guaranteed originality of EPR/medical images is achieved by embedding some kind of watermark(s) which must be secure and robust against malicious attacks. Although numerous robust watermarking algorithms have been proposed, there has been a rat race situation between the robustness of watermark and malicious attacks, making robust watermarking an interesting challenging area for researchers. In view of addressing the above challenges of telemedicine systems concerned with the authenticity and security aspects of transmitted EPR/medical image(s) over open channels for telemedicine, this book presents the state-of-the-art medical image watermarking techniques and algorithms for telemedicine and other emerging applications. The book begins with a conceptual introduction of digital watermarking, important characteristics, novel applications, different watermarking attacks, and benchmark tools followed by a detailed literature review on spatial and transform domain medical image watermarking techniques, their merits, and limitations. Subsequently, an in-depth analysis of available techniques of medical image water- marking is highlighted with their limitations. Further, the book presents improved/ novel methods of watermarking for e-health applications which offer higher robust- ness, better perceptual quality, increased embedding capacity, and a secure watermark. For telemedicine, tele-ophthalmology, telediagnosis, and tele-c onsultancy services, medical images play a prominent role for instant diagnosis and understanding of crucial diseases as well as to avoid the misdiagnosis. In order to overcome this problem, the book includes some improved/novel medical image watermarking methods. The book also explores the important spatial and transform domain tech- niques followed by the major performance matrices. Finally, the book includes v vi Preface emerging trends and research challenges in robust watermarking and watermark security with special reference to telemedicine applications. The authors believe that the book would provide a sound platform for understand- ing the medical image watermarking paradigm and prove as a catalyst for research- ers in the field and shall be equally beneficial for professionals. In addition, the book is also helpful for senior undergraduate and graduate students, researchers, and industry professionals working in the area as well as other emerging applications demanding robust watermarking. The book contains ten chapters. Chapter 1 presents a brief introduction of digital watermarking techniques, their classification, important characteristics, and emerging applications of digital watermarks followed by the essential requirements of medical image watermarking. Chapter 2 contains a detailed review of the literature on medical image water- marking techniques and algorithms using medical image(s) as covers because they offer higher data embedding capacity. It includes both, the computationally simple but fragile watermarking in “spatial domain” and computationally expensive “trans- form domain” techniques that offer robust watermarking. The spatial domain water- marking using least significant bit (LSB) substitutions and the correlation-based and spread-spectrum techniques are discussed wherein the watermark data is embedded directly by manipulating the pixel values, bit stream, or code values of the host sig- nal (cover media). The transform domain watermarking modulates the coefficients of a transform, e.g., discrete Fourier transform (DFT), discrete cosine transform (DCT), discrete wavelet transform (DWT), and singular value decomposition (SVD). Computationally complex transform domain watermarking techniques offer superior robustness of watermarked data as compared to spatial domain techniques. The chapter specially focuses on wavelet-based watermarking because it offers major benefits of space-frequency localization, multi-resolution representation, multi-scale analysis, reducing blocking artifact, adaptability, and linear complexity besides being compatible with JPEG 2000 image coding. Chapter 3 describes detailed techniques of watermarking in spatial and transform domains along with major performance evaluation parameters: peak signal-to-noise ratio (PSNR), weighted peak signal-to-noise ratio (WPSNR), mean square error (MSE), universal image quality index, structural similarity index measure (SSIM), normalized correlation (NC), noise visibility function (NVF), and bit error rate (BER) of the watermarking algorithms. In addition, this chapter also discusses important watermark attacks and the use of a standard benchmark tool to measure the robustness of watermarking algorithms. Chapter 4 presents a new robust hybrid watermarking technique using fusion of DWT, DCT, and SVD instead of applying these techniques individually or in combi- nation thereof. It is based on initially decomposing the host image into first- level DWT followed by transformation of low-frequency band (LL) and watermark image using DCT and SVD. Then, the singular vector of the watermark image is embedded in the singular component of the host image, and the watermarked image is generated by inverse SVD on modified singular vector and original orthonormal matrices, fol- lowed by inverse DCT and inverse DWT. The proposed method has been extensively Preface vii tested and analyzed against known attacks such as JPEG, Gaussian, Salt-and-Pepper, Speckle, and Poisson. The experimental results have revealed that the proposed tech- nique achieves superior performance in respect of imperceptibility, robustness, and capacity as compared to the techniques reported in literature. Watermark robustness has been checked using the benchmarking software “Checkmark,” and it is found that the suggested algorithm is robust against the “Checkmark” attacks. Further, the performance of the proposed watermarking method by applying encryption on patient text data before embedding the watermark has been investigated. Chapter 5 addresses the issue of faulty watermark due to channel noise distor- tions which may result into inappropriate disease diagnosis in telemedicine envi- ronment. The effect of channel noise distortions in creating faulty watermark has been minimized by encoding the watermark using error correction codes (ECCs) before embedding. The effects of Hamming, BCH, Reed–Solomon, and hybrid ECC consisting of BCH and repetition code on the robustness of text watermark and the cover image quality have been investigated. It is found that the hybrid ECC code has better performance as compared to that of the other three codes, and the suggested method is robust against known attacks without significant degradation of the cover image quality. Further, the performance of the proposed watermarking method by applying Reed–Solomon ECC on encrypted patient data before embed- ding the watermark has been presented. The robustness of this method has been checked using “Checkmark” and is found that the proposed method is robust against the “Checkmark” attacks. Chapter 6 discusses the solution to the growing concern of medical identity theft. This is based on the development of new secure watermarking techniques of medi- cal data/image using multiple watermarking where patient identity reference and telemedicine center logo are used as text watermark and image watermark, respec- tively, for identity authentication. The embedding of watermark is based on DWT and spread-spectrum where pseudorandom noise (PN) sequences are generated cor- responding to each watermark bit of the image watermark. The spread-s pectrum has been used to secure the image watermark, and enhancement in robustness of the text watermark has been achieved using BCH-based ECC before embedding. The per- formance of this watermarking method has been tested against known attacks. Subsequently, simultaneous embedding of three watermarks, i.e., doctor code, image reference code, and patient record using multilevel watermarking of cover medical image, has been proposed to address the issues of data security, data com- paction, unauthorized access, and tamperproofing. The suggested method uses wavelet-based spread-spectrum watermarking where the encrypted text watermarks are embedded at multiple levels of the DWT sub-bands of the cover image. The performance of the developed scheme is evaluated and analyzed against known attacks by varying watermark sizes and the gain factor. It is reported that the suggested multilevel watermarking enhances the security of the patient data and thus it can be potentially useful in the prevention of patient identity theft. In chapter 7, the authors proposed new secure multiple watermarking techniques using eye image as cover for secure and compact medical data transmission in tele- ophthalmology applications. The method is based on initially embedding of four viii Preface different watermarks using fusion of DWT and SVD. A secure hash algorithm (SHA-512) is used for enhancing the security feature of the proposed watermarking technique. The performance in terms of “NC” and “BER” of the developed scheme is evaluated and analyzed against known signal processing attacks and “Checkmark” attacks. The method is found to be robust against all the considered attacks. Chapter 8 contains an algorithm for multiple watermarking based on DWT, DCT, and SVD which can be extremely useful in the prevention of patient identity theft in medical applications. The proposed method uses three different watermarks in the form of medical lump image watermark, doctor signature, identification code, and diagnostic information of the patient as the text watermark for identity authentica- tion purpose. In order to improve the robustness performance of the image water- mark, back propagation neural network (BPNN) is applied to the extracted image watermark to reduce the noise effects on the watermarked image. The security of image watermark is also enhanced by using Arnold transform before embedding into the cover. Further, the symptom and signature text watermarks are also encoded by lossless arithmetic compression technique and Hamming error correction code, respectively. The compressed and encoded text watermark is then embedded into the cover image. The experimental results are examined by varying the gain factor, different sizes of text watermarks, and different cover image modalities. The results are provided to illustrate that the proposed method is able to withstand different signal processing attacks and has been found to give an excellent performance for robustness, imperceptibility, capacity, and security simultaneously. The robustness performance of the method is also compared with other reported techniques. Finally, the visual quality of the watermarked image is also evaluated by the subjective method. This shows that the visual quality of the watermarked images is acceptable for diagnosis at different gain factors. In chapter 9, the authors presented a robust and secure multiple watermarking method using a combination of DWT, DCT, SVD, selective encryption, error cor- recting codes, and neural network. The proposed technique initially decomposes the host image into third-level DWT where the vertical frequency band at the second- level and low frequency sub-band at the third-level DWT are selected for embed- ding image and text watermark, respectively. Further, the proposed method addresses the issue of ownership identity authentication; multiple watermarks are embedded instead of a single watermark into the same multimedia objects simultaneously, which offer the extra level of security and reduced storage and bandwidth requirements in important applications areas. Moreover, the robustness image watermark is also enhanced by using “BPNN,” which is applied on extracted watermark to minimize the distortion effects on the watermarked image. In addition, the method addresses the issue of channel noise distortions in identity information. This has been achieved using ECCs for encoding the text watermark before embed- ding into the host image. The effects of Hamming and BCH codes on the robustness of personal identity information in the form of text watermark and the cover image quality have been investigated. Recently, selective encryption is computationally fast for large size multimedia documents offering secure document dissemination for various multimedia applications. In order to reduce the computation time and Preface ix enhance the security of the documents, selective encryption is applied on water- marked image, where only the important multimedia data is encrypted. The pro- posed method has been extensively tested and analyzed against known attacks. Based on experimental results, it is established that the proposed technique achieves superior performance in respect of robustness, security, and capacity with accept- able visual quality of the watermarked image as compared to reported techniques. Finally, we have evaluated the image quality of the watermarked image by subjective method. Finally, chapter 10 discusses the recent trends and potential research challenges of the state-of-the-art watermarking techniques in brief. It includes medical image watermarking, 3D model watermarking, watermarking in cloud computing and multi-core environment, biometric watermarking, watermarking using mobile device, and securing online social network contents. The chapter also reviews several aspects about digital watermarking in different domains. Meanwhile, it discusses the requirements and potential challenges that the watermarking process faces. This book is an extension of the Ph.D. thesis of Dr. Amit Kumar Singh submitted to the Department of Computer Engineering, National Institute of Technology (Institution of National Importance), Kurukshetra, Haryana, 2015, under the super- vision of Dr. Mayank Dave and Prof. Anand Mohan. First and foremost, the author is heartily thankful to Prof. Borko Furht, series editor, Multimedia Systems and Applications, for his guidance, promotion, encour- agement, and support in every stage of my research work. His knowledge, kindness, patience, sincerity, and vision have provided me with lifetime benefits. I am grateful to Prof. S. P. Ghrera, head of the Department of Computer Science & Engineering, Jaypee University of Information Technology, Waknaghat, Solan, Himachal Pradesh, for his consistent support, encouragement, and invaluable suggestions throughout the manuscript preparation. It is his enlightened guidance and vision and generous support that made it possible for me to finish this work within the stipulated time. The authors are indebted to numerous colleagues for valuable suggestions during the entire period of the manuscript preparation. We would also like to thank the publishers at Springer, in particular Susan Lagerstrom-Fife, senior publishing editor/CS Springer, for their helpful guidance and encouragement during the creation of this book. We are sincerely thankful to all authors, editors, and publishers whose works have been cited directly/indirectly in this manuscript. The authors would not justify their work without showing gratitude to their family members who have always been the source of strength to tirelessly work to accomplish the assignment. I owe my deepest gratitude toward my wife, Sweta Singh, for her continuous support and understanding of my goals and aspirations. Her infallible love and support has always been my strength. Her patience and sacrifice will remain my inspiration throughout my life. I am thankful to my daugh- ters, Anandi and Anaya, for loving me and not complaining for their share of time I devoted for carrying out my work. I owe a lot to my parents, who encouraged and

Description:
This book presents medical image watermarking techniques and algorithms for telemedicine and other emerging applications. This book emphasizes on medical image watermarking to ensure the authenticity of transmitted medical information. It begins with an introduction of digital watermarking, importan
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.