Abstract
With the rapid development of technology in digital multimedia, manipulation and misconduct of digital data are soaring. The watermarking procedure is seen as helpful to protect the security of digital images which are highly confidential such as medical images. In this study, an efficient watermarking method for greyscale images is proposed. The scheme is designed to achieve good numbering pattern, exact detection and image recovery. The proposed scheme uses a unique spiral pattern numbering before implementing the block-based mechanism for embedding. The experiment tests the difference between using normal pattern and unique spiral pattern in numbering, and the results show that the proposed method produces a great quality value of embedded image with great tamper localization and recovery ability. This function can help in proving authenticity and integrity of medical images in the system.
Similar content being viewed by others
References
Coatrieux G, Lecornu L, Sankur B, Roux C (2006) A review of image watermarking applications in healthcare. In: Annual international conference of the IEEE engineering in medicine and biology—proceedings, pp 4691–4694. doi:10.1109/IEMBS.2006.259305
Walia E, Suneja A (2013) Fragile and blind watermarking technique based on Weber’s law for medical image authentication. IET Comput Vis 7(1):9–19. doi:10.1049/iet-cvi.2012.0109
Bouslimi D, Coatrieux G, Cozic M, Roux CH (2012) A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images. IEEE Trans Inf Technol Biomed 16(5):891–899
Chen M, Chen Z, Zeng X, Xiong Z (2010) Model order selection in reversible image watermarking. IEEE J Select Top Sig Process 4(3):592–604. doi:10.1109/JSTSP.2010.2049222
Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux Ch (2013) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forensics Secur 8(1):111–120
Coatrieux G, Huang H, Shu H, Luo L, Roux Ch (2013) A watermarking based medical image integrity control and an image moment signature for tampering characterization. IEEE J Biomed Health Inf 17(6):111–120
Huang H, Coatrieux G, Shu H, Luo L, Roux Ch (2012) Blind integrity verification of medical images. IEEE Trans Inf Technol Biomed 16(6):1122–1126
Rao NV, Kumari VM (2011) Watermarking in medical imaging for security and authentication. Inf Secur J A Glob Perspect 20:148–155. doi:10.1080/19393555.2011.561154
Liew SC, Zain JM (2011) Tamper localization and lossless recovery watermarking scheme. Commun Comput Inf Sci 179(1):555–566
Liew SC, Zain JM (2011) The usage of block average intensity in tamper localization for image watermarking. In: 4th International congress on image and signal processing, pp 1044–1048. doi:10.1109/CISP.2011.6100301
Naskar R, Chakraborty RS (2012) Performance of reversible digital image watermarking under error-prone data communication: a simulation-based study. IET Image Process 6(6):728–737. doi:10.1049/iet-ipr.2011.0160
He S, Kirovski D, Wu M (2009) High-fidelity data embedding for image annotation. IEEE Trans Image Process 18(2):429–435. doi:10.1109/TIP.2008.2008733
Macq B, Deweyand F (1999) Trusted headers for medical images. In: DFG VIII-DII watermarking workshop, Erlangen, Germany
Viswanathan P, Krishna PV (2014) A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology. IEEE J Biomed Health Inf 18(3):753–764. doi:10.1109/JBHI.2013.2281322
Coatrieux G, Le Guillou C, Cauvin J-M, Roux Ch (2009) Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Inf Technol Biomed 13(2):158–165. doi:10.1109/TITB.2008.2007199
Liew SC, Zain JM (2012) Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 26(2):316–325. doi:10.1007/s10278-012-9484-4
Cox IJ, Miller ML, Linnartz JMG, Kalker T (1999) A review of watermarking principles and practices. In: Parhi KK, Nishitani T (eds) Digital signal processing for multimedia systems. Marcel Dekker, New York, pp 461–482
Kang X, Huang J, Shi YQ, Lin Y (2003) A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans Circuits Syst Video Technol 13:776–786
Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601
Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. Sig Process 89(4):675–679
Zhang X, Wang S, Qian Z, Feng G (2010) Reversible fragile watermarking for locating tampered blocks in JPEG images. Sig Process 90(12):3026–3036
Franco-Contreras J, Coatrieux G, Cuppens F, Cuppens-Boulahia N, Roux C (2014) Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans Inf Forensics Secur 9(3):397–410. doi:10.1109/TIFS.2013.2294240
Zain JM (2014) Strict authentication watermarking with JPEG compression (SAW-JPEG) for medical images. Eur J Sci Res 42(2): 232–241. http://arxiv.org/ftp/arxiv/papers/1101/1101.5188.pdf. Accessed Oct 23 2014
Qiang S, Hongbin Z (2010) Image tamper detection and recovery using dual watermark. In: 2010 6th International conference on wireless communications, networking and mobile computing, WiCOM. doi:10.1109/WICOM.2010.5600689
Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Sig Process 91(4):728–739. doi:10.1016/j.sigpro.2010.07.019
Lin H, Yang S, Xu L (2011) Watermark algorithm for color image authentication and restoration. In: 2011 International conference on electronic and mechanical engineering and information technology watermark, pp 2773–2776. doi:10.1109/EMEIT.2011.6023677
Li C, Wang Y, Ma B, Zhang Z (2012) Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput Stand Interfaces 34(4):367–379. doi:10.1016/j.csi.2012.01.003
Tjokorda ABW, Adiwijaya FP, Permana FP (2012) Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression. In: COMNETSAT 2012, pp 167–171. doi:10.1109/ComNetSat.2012.6380799
Naseem MT, Qureshi IM, Muzaffar MZ (2013) Chaos based invertible authentication of medical images. In: 2013 IEEE 9th international conference on emerging technologies (ICET), pp 1–5. doi:10.1109/ICET.2013.6743549
Bourbakis NG (1997) Image data compression-encryption using G-scan patterns. In: IEEE international conference on systems, man, and cybernetics. Computational Cybernetics and Simulation 2: 1117–1120. doi:10.1109/ICSMC.1997.638099
Hung PA, Sooraksa P, Klomkarn K (2013) Extended baker map using scan patterns for image encryption. In: 2013 International conference on information technology and electrical engineering, vol 1. pp. 119–123. doi:10.1109/ICITEED.2013.6676223
Maniccam SS, Bourbakis NG (2001) Lossless image compression and encryption using SCAN. Pattern Recogn 34(6):1229–1245
Mahmood IA, Moheimani SOR (2010) Spiral scanning: an alternative to conventional raster scanning in high-speed scanning probe microscopes. American control conference (ACC), 2010, pp 5757–5762. doi:10.1109/ACC.2010.5530444
Rana MS, Pota HR, Petersen IR (2014) Spiral scanning with improved control for faster imaging of AFM. IEEE Trans Nanotechnol 13(3):541–550. doi:10.1109/TNANO.2014.2309653
Zain JM, Fauzi ARM (2006) Medical image watermarking with tamper detection and recovery. The 28th annual international conference of the IEEE Engineering in Medicine and Biology Society, New York, USA. doi:10.1109/IEMBS.2006.260767
Fridrich J, Goljan M, Baldoza AC (2000) New fragile authentication watermark for images. International conference on image processing (ICIP 2000). IEEE Computer Society, Vancouver, BC, pp 446–449. doi:10.1109/ICIP.2000.900991
Lin C, Chang S (2001) A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol 11(2):153–168. doi:10.1109/76.905982
Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11(6):585–595. doi:10.1109/TIP.2002.1014990
Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron 46(1):31–39. doi:10.1109/30.826378
Zain JM, Clarke M, Baldwin P (2004) The effect of reversible LSB manipulation to the quality of image. In: PREP2004, University of Hertfordshire
Hisham SI, Muhammad AN, Zain JM, Badshah G, Arshad NW (2013) Digital watermarking for recovering attack areas of medical images using spiral numbering. In: The 10th international conference on electronics, computer and computation, ICECCO, Ankara, Turkey, pp 285–288 (doi: 10.1109/ICECCO.2013.6718284)
Hisham SI, Muhammad AN, Zain JM, Badshah G (2013) Localization watermarking for authentication of text images in quran with spiral manner numbering. In: Proceedings in the Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences (NOORIC 2013), Madinah, 22–25 Dec 2013
Wong PW (1998) A public key watermark for image verification and authentication. In: Proceedings of IEEE International conference on image processing (ICIP), NY, USA, Oct 4–7, pp 425–429. doi:10.1109/ICIP.1998.723526
Vellaisamy S, Ramesh V (2014) Inversion attack resilient zero-watermarking scheme for medical image authentication. IET Image Process 8(12):718–727. doi:10.1049/iet-ipr.2013.0558
Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. Electron Lett 44(13):800–801. doi:10.1049/el:20080522
Syifak IH, Zain JM, Liew SC (2013) A quick glance at digital watermarking in medical images. Biomed Eng Res J 2(2):79–87
Al-Qershi OM, Ee B (2013) Khoo. Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold. Sig Process 93:154–162. doi:10.1016/j.sigpro.2012.07.012
Velumani R, Seenivasagam V (2010) A reversible blind medical image watermarking scheme for patient identification, improved telediagnosis and tamper detection with a facial image watermark. IEEE international conference computational intelligence and computing research (ICCIC), 28–29 Dec 2010, pp 1–8. doi:10.1109/ICCIC.2010.5705832)
Kobayashi LOM, Furuie SS, Barreto PSLM (2009) Providing integrity and authenticity in DICOM images: a novel approach. IEEE Trans Inf Technol Biomed 13(4):582–589. doi:10.1109/TITB.2009.2014751
Naskar R, Chakraborty RS (2012) Reversible watermarking utilising weighted median-based prediction. IET Image Process 6(5):507–520. doi:10.1049/iet-ipr.2011.0244
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hisham, S.I., Muhammad, A.N., Badshah, G. et al. Numbering with spiral pattern to prove authenticity and integrity in medical images. Pattern Anal Applic 20, 1129–1144 (2017). https://doi.org/10.1007/s10044-016-0552-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10044-016-0552-0