Generic placeholder image

Current Medical Imaging

Editor-in-Chief

ISSN (Print): 1573-4056
ISSN (Online): 1875-6603

General Research Article

Privacy Protection of Patient Medical Images using Digital Watermarking Technique for E-healthcare System

Author(s): Asokan Sivaprakash*, Samuel Nadar Edward Rajan and Sundaramoorthy Selvaperumal

Volume 15, Issue 8, 2019

Page: [802 - 809] Pages: 8

DOI: 10.2174/1573405615666190408115158

Price: $65

Abstract

Background: Privacy protection has been a critical issue in the delivery of medical images for telemedicine, e-health care and other remote medical systems.

Objectives: The aim of this proposed work is to implement a secure, reversible, digital watermarking technique for the transmission of medical data remotely in health care systems.

Methods: In this research work, we employed a novel optimized digital watermarking scheme using discrete wavelet transform and singular value decomposition using cuckoo search algorithm based on Lévy flight for embedding watermark into the grayscale medical images of the patient. The performance of our proposed algorithm is evaluated on four different 256 × 256 grayscale host medical images and a 32 × 32 binary logo image.

Results: The performance of the proposed scheme in terms of peak signal to noise ratio was remarkably high, with an average of 55.022dB compared to other methods.

Conclusion: Experimental results reveal that the proposed method is capable of achieving superior performance compared to some of the state-of-art schemes in terms of robustness, security and high embedding capacity which is required in the field of telemedicine and e-health care system.

Keywords: Cuckoo search algorithm (CSA), discrete wavelet transform (DWT), singular value decomposition (SVD), patient medical images, digital watermarking technique, telemedicine, e-health care system.

Graphical Abstract

[1]
Parah SA, Ahad F, Sheikh JA, Bhat GM. Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. J Biomed Inform 2017; 66: 214-30.
[http://dx.doi.org/10.1016/j.jbi.2017.01.006] [PMID: 28089912]
[2]
Arsalan M, Qureshi AS, Khan A, Rajarajan M. Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique. Appl Soft Comput 2017; 51: 168-79.
[http://dx.doi.org/10.1016/j.asoc.2016.11.044]
[3]
Bouslimi D, Coatrieux G. A crypto-watermarking system for ensuring reliability control and traceability of medical images. Signal Processing: Image comm 2016; 47: 160-9.
[http://dx.doi.org/10.1016/j.image.2016.05.021]
[4]
Daniel E, Anitha J. Privacy preservation and information security protection for patient’s portable electronic health records. Comput Biol Med 2016; 71: 149-55.
[5]
Khan A, Siddiqa A, Munib S, Malik SA. A recent survey of reversible watermarking techniques. Inf Sci 2014; 279: 251-72.
[http://dx.doi.org/10.1016/j.ins.2014.03.118]
[6]
Mohamed M, Eldayem A. A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine. Egyptian Infor J 2013; 14: 1-13.
[http://dx.doi.org/10.1016/j.eij.2012.11.002]
[7]
Fernández-Alemán JL, Señor IC, Lozoya PA, Toval A. Security and privacy in electronic health records: a systematic literature review. J Biomed Inform 2013; 46(3): 541-62.
[http://dx.doi.org/10.1016/j.jbi.2012.12.003] [PMID: 23305810]
[8]
Giakoumaki A, Pavlopoulos S, Koutsouris D. Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 2006; 10(4): 722-32.
[http://dx.doi.org/10.1109/TITB.2006.875655] [PMID: 17044406]
[9]
Fazli S, Moeini M. A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik (Stuttg) 2016; 127: 964-72.
[http://dx.doi.org/10.1016/j.ijleo.2015.09.205]
[10]
Sverdlov A, Dexter S, Eskicioglu AM. Robust DCT-SVD domain image watermarking for copyright protection: embedding data in all frequencies. Proceedings of the multimedia and security workshop. 166-74.
[11]
Nikolaidis N, Pitas I. Robust image watermarking in spatial domain. Signal Processing 1998; 66: 385-403.
[http://dx.doi.org/10.1016/S0165-1684(98)00017-6]
[12]
Lang J, Zhang ZG. Blind digital watermarking method in the fractional Fourier transform domain. Opt Lasers Eng 2014; 53: 112-21.
[http://dx.doi.org/10.1016/j.optlaseng.2013.08.021]
[13]
Run RS, Horng S-J, Lai J-L, Kao T-W, Chen R-J. An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 2012; 39: 673-89.
[http://dx.doi.org/10.1016/j.eswa.2011.07.059]
[14]
Ahmad AM, Ali A, Sameer S. An improved SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Signal Process 2008; 88(9): 2158-80.
[15]
Nguyen TS, Chang CC, Yang XQ. A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. Aeu-Int J Electron C 2016; 70(8): 1055-61.
[http://dx.doi.org/10.1016/j.aeue.2016.05.003]
[16]
Faragallah OS. Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. Aeu-Int J Electron C 2013; 67: 189-96.
[http://dx.doi.org/10.1016/j.aeue.2012.07.010]
[17]
Lai CC, Tsai CC. Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 2010; 59: 3060-3.
[http://dx.doi.org/10.1109/TIM.2010.2066770]
[18]
Ganic E, Eskicioglu AM. Robust DWT–SVD domain image watermarking: Embedding data in all frequencies ACM multimedia and security workshop Magdeburg, Germany 2004; 166-74.
[19]
Agarwal C, Mishra A, Sharma A. A novel gray-scale image watermarking using hybrid Fuzzy-BPN architecture. Egyptian Info J 2015; 16: 83-102.
[http://dx.doi.org/10.1016/j.eij.2015.01.002]
[20]
Yahya ALN, Jalab HA, Wahid A, Noor RM. Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. J King Saud Univ - Comput. Inform Sci 2015; 27: 393-401.
[21]
Agarwal C, Mishra A, Sharma A. Gray-scale image watermarking using GA-BPN hybrid network. J Vis Commun Image Represent 2013; 24: 1135-46.
[http://dx.doi.org/10.1016/j.jvcir.2013.07.007]
[22]
Mohananthini N, Yamuna G. Comparison of multiple watermarking techniques using genetic algorithms. J of Electrical Systems and Information Technology 2016; 3: 68-80.
[23]
Hung HT, Yu Jie J, Yen SL. An SVD-based image watermarking in wavelet domain using SVR and PSO. Appl Soft Comput 2012; 12: 2442-53.
[http://dx.doi.org/10.1016/j.asoc.2012.02.021]
[24]
Frank S, Yi TW. Robust watermarking and compression for medical images based on genetic algorithms. Inf Sci 2005; 175: 200-16.
[http://dx.doi.org/10.1016/j.ins.2005.01.013]
[25]
Kumsawat P, Attakitmongcol K, Srikaew A. A new approach for optimization in image watermarking by using genetic algorithms. IEEE Trans Signal Process 2005; 53(12): 4707-19.
[http://dx.doi.org/10.1109/TSP.2005.859323]
[26]
Yuh-Rau Wang. Wei-Hung Lin, Ling Yang. An intelligent watermarking method based on particle swarm optimization. Expert Syst Appl 2011; 38: 8024-9.
[http://dx.doi.org/10.1016/j.eswa.2010.12.129]
[27]
Lei B, Tan EL, Chen S, Ni D, Wang T, Lei H. Reversible watermarking scheme for medical image based on differential Evolution. Expert Syst Appl 2014; 41: 3178-88.
[http://dx.doi.org/10.1016/j.eswa.2013.11.019]
[28]
Ali M, Ahn CW, Siarry P. Differential evolution algorithm for the selection of optimal scaling factors in image watermarking. Eng Appl Artif Intell 2014; 31: 15-26.
[http://dx.doi.org/10.1016/j.engappai.2013.07.009]
[29]
Aslantas V. An optimal robust digital image watermarking based on SVD using differential evolution algorithm. Opt Commun 2009; 282: 769-77.
[http://dx.doi.org/10.1016/j.optcom.2008.11.024]
[30]
Ali M, Ahn CW, Pant M, Siarry P. An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony. Inf Sci 2015; 301: 44-60.
[http://dx.doi.org/10.1016/j.ins.2014.12.042]
[31]
Yu S, Ma SZY, Mao D. A variable step size fire fly algorithm for numerical optimization. Appl Math Comput 2015; 263: 214-20.
[http://dx.doi.org/10.1016/j.amc.2015.04.065]
[32]
Senthilnath J, Omkar SN, Mani V. Clustering using firefly algorithm: performance study. Swarm Evol Comput 2011; 1: 164-71.
[http://dx.doi.org/10.1016/j.swevo.2011.06.003]
[33]
Rajabioun R. Cuckoo optimization algorithm. Appl Soft Comput 2011; 11(8): 5508-18.
[http://dx.doi.org/10.1016/j.asoc.2011.05.008]
[34]
Yang XS. Nature-inspired metaheuristic algorithms. 2nd ed. Luniver Press 2010.
[35]
Daniel E, Anitha J. Optimum wavelet based masking for the contrast enhancement of medical images using enhanced cuckoo search algorithm. Comput Biol Med 2016; 71: 149-55.
[http://dx.doi.org/10.1016/j.compbiomed.2016.02.011] [PMID: 26945462]
[36]
Biswas B, Roy P, Choudhuri R, Sen BK. Microscopic image contrast and brightness enhancement using multi-scale retinex and cuckoo search algorithm. Procedia Comput Sci 2015; 70: 348-54.
[http://dx.doi.org/10.1016/j.procs.2015.10.031]
[37]
Civicioglu P, Besdok E. A conceptual comparison of the cuckoo-search, particle swarm optimization, differential evolution and artificial bee colony algorithms. Artif Intell Rev 2013; 39: 315-46.
[http://dx.doi.org/10.1007/s10462-011-9276-0]
[38]
Barthelemy P, Bertolotti J, Wiersma DS. A Lévy flight for light. Nature 2008; 453(7194): 495-8.
[http://dx.doi.org/10.1038/nature06948] [PMID: 18497819]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy