An exhaustive review of authentication, tamper detection with localization and recovery techniques for medical images | Multimedia Tools and Applications Skip to main content

Advertisement

Log in

An exhaustive review of authentication, tamper detection with localization and recovery techniques for medical images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In order to aim for diagnosis of disease and decision making, the medical imaging plays an important role in health science. Clinical pictures are portrayals of profoundly vulnerable computerized images, those can be tampered without leaving any visual clues. Hence it is challenging to keep up its credibility. However, as there are numerous ways to manipulate an image, correspondingly various strategies have also been proposed to safeguard the genuineness of medical images. This survey paper presents different techniques used for medical image authentication viz. watermarking, signature and hybrid techniques. The state-of-the-art techniques have attained promising results for authentication and tampering detection, but an efficient tampering localization and recovery have remained still as a challenge. This review article can be considered as a benchmark survey paper as it gives a complete comprehensive overview commencing from the evolution of medical image formats, types of medical imaging modalities and also provides an elaborative comparison over 40 research works in terms of prominent factors like type of medical image used, embedded region, embedded data, about the coverage of tampering localization and recovery along with the discussion on limitations and future works of each one.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study'.

References

  1. Acharya R, Bhat PS, Kumar S, Min LC (2003) Transmission and storage of medical images with patient information. Comput Biol Med 33(4):303–310

    Google Scholar 

  2. Nayak J, Bhat PS, Kumar MS, Acharya UR (2004) Reliable transmission and storage of medical images with patient information using error control codes. In: Proceedings of the IEEE INDICON 2004 First India Annual Conference. IEEE, Kharagpur, pp 147–150. https://doi.org/10.1109/INDICO.2004.1497726

  3. Zain JM, Fauzi AR (2006) Medical image watermarking with tamper detection and recovery. In: 2006 International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE, New York, pp 3270–3273. https://doi.org/10.1109/IEMBS.2006.260767

  4. Fotopoulos V, Stavrinou ML, Skodras AN (2008) Medical image authentication and self-correction through an adaptive reversible watermarking technique. In: 2008 8th IEEE International Conference on BioInformatics and BioEngineering, (Athens, Greece). IEEE, pp 1–5. https://doi.org/10.1109/BIBE.2008.4696803

  5. Wu JH, Chang RF, Chen CJ, Wang CL, Kuo TH, Moon WK, Chen DR (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59–76

    Google Scholar 

  6. Memon NA, Gilani SAM (2011) Watermarking of chest CT scan medical images for content authentication. Int J Comput Math 88(2):265–280

    Google Scholar 

  7. Al-Qershi OM, Khoo BE (2010) ROI-based tamper detection and recovery for medical images using reversible watermarking technique. In: 2010 IEEE international conference on information theory and information security. IEEE, Beijing, pp 151–155. https://doi.org/10.1109/ICITIS.2010.5688743

  8. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13:890–896

    Google Scholar 

  9. Kundu MK, Das S (2010) Lossless ROI medical image watermarking technique with enhanced security and high payload embedding. In: 2010 20th International Conference on Pattern Recognition. IEEE, Istanbul, 1457–1460

  10. Tan CK, Ng JC, Xu X, Poh CL, Guan YL, Sheah K (2011) Security protection of DICOM medical images using dual- layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528–540

    Google Scholar 

  11. Hajjaji MA, Mtibaa A, Bourennane EB (2011) A watermarking of medical image: method based “LSB”. International Journal of Computer Science Issues. https://hal.science/hal-00822806v1/document

  12. Naheed T, Usman I, Khan TM, Dar AH, Shafique MF (2014) Intelligent reversible watermarking technique in medical images using GA and PSO. Optik 125(11):2515–2525

    Google Scholar 

  13. Badshah G, Liew SC, Zain JM, Ali M (2016) Watermark compression in medical image watermarking using Lempel-Ziv- Welch (LZW) lossless compression technique. J Digit Imaging 29(2):216–225

    Google Scholar 

  14. Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239

    Google Scholar 

  15. Khor HL, Liew SC, Zain JM (2017) Region of interest-based tamper detection and lossless recovery watermarking scheme (ROI-DR) on ultrasound medical images. J Digit Imaging 30(3):328–349

    Google Scholar 

  16. Liew SC, Liew SW, Zain JM (2013) Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 26(2):316–325

    Google Scholar 

  17. Liew SC (2011) Tamper Localization and recovery watermarking schemes for medical images in PACS Ph D Thesis, Universitiy Malayisa Pahang, Malayisa

  18. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278

    Google Scholar 

  19. Dhole VS, Patil NN (2015) Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks. In: 2015 International Conference on Computing Communication Control and Automation. IEEE, Pune, pp 752–757. https://doi.org/10.1109/ICCUBEA.2015.150

  20. Patra B, Patra JC (2012) CRT-based fragile self-recovery watermarking scheme for image authentication and recovery. In: 2012 International Symposium on Intelligent Signal Processing and Communications Systems. IEEE, Tamsui, pp 430–435. https://doi.org/10.1109/ISPACS.2012.6473528

  21. Preda RO (2014) Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain. In: 2014 10th International Conference on Communications (Bucharest, Romania). IEEE, pp 1–4. https://doi.org/10.1109/ICComm.2014.6866744

  22. Kelkar V, Mehta JH, Tuckley K (2018) A novel robust reversible watermarking technique based on prediction error expansion for medical images. In: Proceedings of 2nd International Conference on Computer Vision and Image Processing, vol 703. Springer, Singapore. https://doi.org/10.1007/978-981-10-7895-8_11

  23. Iskandar MW (2019) An implementation of text hiding in medical images based on graph coloring for android devices. In: Journal of Physics: Conference Series, The 2nd International Conference on Data and Information Science, 15–16 November 2018, Bandung, Indonesia, vol 1192. https://doi.org/10.1088/1742-6596/1192/1/012008. https://iopscience.iop.org/article/10.1088/1742-6596/1192/1/012008/pdf

  24. Parah SA, Bashir A, Manzoor M, Gulzar A, Firdous M, Loan NA, Sheikh JA (2019) Secure and reversible data hiding scheme for healthcare system using magic rectangle and a new interpolation technique. In: Healthcare data analytics and management. Academic Press, pp 267–309. https://doi.org/10.1016/B978-0-12-815368-0.00011-7

  25. Jung KH, Yoo KY (2009) Data hiding method using image interpolation. Comput Stand Interfaces 31(2):465–470

    Google Scholar 

  26. Ou B, Zhao Y, Ni R (2012) Reversible watermarking using optional prediction error histogram modification. Neurocomputing 93:67–76

    Google Scholar 

  27. Wang XT, Chang CC, Nguyen TS, Li MC (2013) Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digital Signal Process 23(2):569–577

    MathSciNet  Google Scholar 

  28. Lee HY (2019) Adaptive reversible watermarking for authentication and privacy protection of medical records. Multimedia Tools Appl 78(14):19663–19680

    Google Scholar 

  29. Gull S, Loan NA, Parah SA, Sheikh JA, Bhat GM (2020) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Humanized Comput 11(5):1799–1808

    Google Scholar 

  30. Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312–327

    Google Scholar 

  31. Singh D, Singh SK (2017) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools Appl 76(1):953–977

    Google Scholar 

  32. Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789

    Google Scholar 

  33. Wakatani A (2002) Digital watermarking for ROI medical images by using compressed signature image. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences. IEEE, Big Island, pp 2043–2048. https://doi.org/10.1109/HICSS.2002.994129

  34. Giakoumaki A, Pavlopoulos S, Koutouris D (2003) A medical image watermarking scheme based on wavelet transform. In: Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, vol 1. IEEE, Cancun, pp 856–859. https://doi.org/10.1109/IEMBS.2003.1279900

  35. Ustubioglu A, Ulutas G (2017) A new medical image watermarking technique with finer tamper localization. J Digit Imaging 30(6):665–680

    Google Scholar 

  36. Shih FY, Wu YT (2005) Robust watermarking and compression for medical images based on genetic algorithms. Inf Sci 175(3):200–216

    MathSciNet  Google Scholar 

  37. Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Secure and efficient health data management through multiple watermarking on medical images. Med Biol Eng Comput 44(8):619–631

    Google Scholar 

  38. Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10(4):722–732

    Google Scholar 

  39. Kumar B, Singh HV, Singh SP, Mohan A (2011) Secure spread-spectrum watermarking for telemedicine applications. J Inf Secur 2(02):91

    Google Scholar 

  40. Soliman MM, Hassanien AE, Ghali NI, Onsi HM (2012) An adaptive watermarking approach for medical imaging using swarm intelligent. Int J Smart Home 6(1):37–50

    Google Scholar 

  41. Seenivasagam V, Velumani R (2013) A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud. Comput Math Methods Med 2013:516465. https://doi.org/10.1155/2013/516465

  42. Umamageswari A, Suresh GR (2013) Security in medical image communication with Arnold and cat map method and reversible watermarking. In: 2013 International Conference on Circuits, Power and Computing Technologies. IEEE, Nagercoil, pp 1116–1121. https://doi.org/10.1109/ICCPCT.2013.6528904

  43. Umamageswari A, Suresh GR (2014) Novel algorithm for secure medical image communication using roi based digital lossless watermarking and ds. Int J Appl Eng Res 9(22):12163–12176

    Google Scholar 

  44. Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wireless Pers Commun 80(4):1415–1433

    Google Scholar 

  45. Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools Appl 75(14):8381–8401

    Google Scholar 

  46. Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. J Med Imaging Health Informatics 5(3):607–614

    Google Scholar 

  47. Kumar B, Anand A, Singh SP, Mohan A (2011) High capacity spread-spectrum watermarking for telemedicine applications World Academy of Science. Eng Technol 79:2011

    Google Scholar 

  48. Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wireless Pers Commun 83(3):2133–2150

    Google Scholar 

  49. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools Appl 77(4):4863–4882

    Google Scholar 

  50. Ganic E, Eskiciogl AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies. In: Proceedings of the 2004 Workshop on Multimedia and Security. USA, pp 166–174. https://doi.org/10.1145/1022431.1022461

  51. Shih FY, Zhong X (2016) High-capacity multiple regions of interest watermarking for medical images. Inf Sci 367:648–659

    Google Scholar 

  52. Zear A, Singh AK, Kumar P (2018) Multiple watermarking for healthcare applications. J Intell Syst 27(1):5–18

    Google Scholar 

  53. Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking for medical images. Wireless Pers Commun 92(4):1611–1624

    Google Scholar 

  54. Bamal R, Kasana SS (2018) Slantlet based hybrid watermarking technique for medical images. Multimedia Tools Appl 77(10):12493–12518

    Google Scholar 

  55. Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156

    MathSciNet  Google Scholar 

  56. Wang ZH, Lee CF, Chang CY (2013) Histogram-shifting-imitated reversible data hiding. J Syst Softw 86(2):315–323

    Google Scholar 

  57. Zain JM, Clarke M (2011) Reversible region of non-interest (roni) watermarking for authentication of dicom images. arXiv:1101.1603

  58. Zhao Z, Luo H, Lu ZM, Pan JS (2011) Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU-Int J Electron Commun 65(10):814–826

    Google Scholar 

  59. Al-qdah M (2018) Secure watermarking technique for medical images with visual evaluation. Signal & Image Processing: An International Journal (SIPIJ) 9(1). https://doi.org/10.2139/ssrn.3409803

  60. Singh AK (2019) Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimedia Tools Appl 78(21):30523–30533

    Google Scholar 

  61. Bamal R, Kasana SS (2019) Dual hybrid medical watermarking using walsh-slantlet transform. Multimedia Tools and Applications 78(13):17899–17927

    Google Scholar 

  62. Thodi DM, Rodríguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730

    MathSciNet  Google Scholar 

  63. Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools Appl 78(3):3457–3470

    Google Scholar 

  64. Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools Appl 76(6):8881–8900

    Google Scholar 

  65. Thakur S, Singh AK, Ghrera SP, Mohan A (2020) Chaotic based secure watermarking approach for medical images. Multimedia Tools Appl 79(7):4263–4276

    Google Scholar 

  66. Parah SA, Ahmad I, Loan NA, Muhammad K, Sheikh JA, Bhat GM (2019) Realization of an adaptive data hiding system for electronic patient record, embedding in medical images. In: Security in smart cities: models, applications, and challenges. Springer, Cham. https://doi.org/10.1007/978-3-030-01560-2

  67. Liu J, Li J, Ma J, Sadiq N, Bhatti UA, Ai Y (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Appl Sci 9(4):700

    Google Scholar 

  68. Al-Shayea TK, Mavromoustakis CX, Batalla JM, Mastorakis G (2019) A hybridized methodology of different wavelet transformations targeting medical images in IoT infrastructure. Measurement 148:106813

    Google Scholar 

  69. Al-Qershi OM, Khoo BE (2011) Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24(1):114–125

    Google Scholar 

  70. Das S, Kundu MK (2013) Effective management of medical information through ROI-lossless fragile image watermarking technique. Comput Methods Programs Biomed 111(3):662–675

    Google Scholar 

  71. Guo X, Zhuang TG (2009) A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53–64

    Google Scholar 

  72. Liu Y, Qu X, Xin G (2016) A ROI-based reversible data hiding scheme in encrypted medical images. J Vis Commun Image Represent 39:51–57

    Google Scholar 

  73. Zain JM, Baldwin LP, Clarke M (2004) Reversible watermarking for authentication of DICOM images. In: The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE, San Francisco, pp 3237–3240. https://doi.org/10.1109/IEMBS.2004.1403911

  74. Borra S, Thanki R (2020) Crypto-watermarking scheme for tamper detection of medical images. Comput Methods Biomech Biomed Eng: Imaging Visualization 8(4):345–355

    Google Scholar 

  75. Arumugham S, Rajagopalan S, Rayappan JBB, Amirtharajan R (2019) Tamper-resistant secure medical image carrier: an IWT–SVD–Chaos–FPGA combination. Arab J Sci Eng 44(11):9561–9580

    Google Scholar 

  76. Chen YC, Chen LK, Tsai MD, Chiu HC, Chiu JS, Chong CF (2008) Fingerprint verification on medical image reporting system. Comput Methods Programs Biomed 89(3):282–288

    Google Scholar 

  77. Coatrieux G, Huang H, Shu H, Luo L, Roux C (2013) A watermarking-based medical image integrity control system and an image moment signature for tampering characterization. IEEE J Biomed Health Inform 17(6):1057–1067

    Google Scholar 

  78. Umamageswari A, Suresh GR (2014) A new cryptographic digital signature for secure medical image communication in telemedicine. Int J Comput Appl 86(11)

  79. Babu S, Kapinaiah V (2019) Medical image authentication using quartic digital signature algorithm. Int J Intell Inf Syst 7(4):38–41

    Google Scholar 

  80. Ali TS, Ali R (2020) A novel medical image signcryption scheme using TLTS and Henon chaotic map. IEEE Access 8:71974–71992

    Google Scholar 

  81. Cao F, Huang HK, Zhou XQ (2003) Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27(2–3):185–196

    Google Scholar 

  82. Guo X, Zhuang TG (2003) Lossless watermarking scheme for enhancing security of medical data in PACS. In: Medical Imaging 2003: PACS and Integrated Medical Information Systems: Design and Evaluation 27(2–3):350–359. https://doi.org/10.1016/S0895-6111(02)00073-3

  83. Guo X, Zhuang TG (2009) Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22(6):620–628

    Google Scholar 

  84. Piao CR, Woo DM, Park DC, Han SS (2008) Medical image authentication using hash function and integer wavelet transform. In: 2008 Congress on Image and Signal Processing. IEEE, Sanya, 1, 7-10

  85. Wong P (1998) A public key watermark for image verification and authentication. Proceedings 1998 International Conference on Image Processing 1:455–459. https://doi.org/10.1109/ICIP.1998.723526

  86. Kuang LQ, Zhang Y, Han X (2009) A medical image authentication system based on reversible digital watermarking. In: 2009 First International Conference on Information Science and Engineering. IEEE, Nanjing, pp 1047–1050. https://doi.org/10.1109/ICISE.2009.60

  87. Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C (2009) Medical image integrity control combining digital signature and lossless watermarking. In: Data privacy management and autonomous spontaneous security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11207-2_12

  88. Umamageswari A, Suresh GR (2013) Performance analysis of secure medical image communication with digital signature and reversible watermarking. ICTACT Journal on Image and Video Processing 04(01)

  89. Eswaraiah R, Sreenivasa Reddy E (2014) Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl 2014:13

    Google Scholar 

  90. Umamageswari A, Suresh GR (2014) Secure medical image communication using ROI based lossless watermarking and novel digital signature. J Eng Res 2(3):1–22

    Google Scholar 

  91. Al-Haj A, Hussein N, Abandah G (2016) Combining cryptography and digital watermarking for secured transmission of medical images. In: 2016 2nd International Conference on Information Management. IEEE, London, pp 40–46. https://doi.org/10.1109/INFOMAN.2016.7477531

  92. Ranjani JJ, Babu M (2018) Medical image reliability verification using hash signatures and sequential square encoding. J Intell Syst 27(1):19–30

    Google Scholar 

  93. Jabbar AK, Hashim AT, Hassan QF (2021) Medical image authentication by combining hash signature and watermarking based on frequency domains. In: 2nd International Conference on Physics and Applied Sciences Ser:1963, Baghdad. https://doi.org/10.1088/1742-6596/1963/1/012039

  94. Balamurugan G, Jayabharathy J (2020) A Hybrid based robust watermarking technique using SVM. AIJR Abstracts 24, July 29, 2020

  95. Kaissis GA, Makowski MR, Rückert D, Braren RF (2020) Secure, privacy-preserving and federated machine learning in medical imaging. Nat Mach Intell 2(6):305–311

    Google Scholar 

  96. Balasamy K, Shamia D (2021) Feature extraction-based medical image watermarking using fuzzy-based median filter. IETE J Res:1–9

  97. Ouahi H, Mazoul A (2021) Adaptive image watermarking based on K-NN clustering. American Scientific Research Journal for Engineering Technology and Sciences 76(1):253–263

  98. Wong YL, Loh JC, Li CZ, Tan CW (2021) A comparative study on medical image watermarking using hybrid approach and rivagan. In: International Conference on Digital Transformation and Applications (ICDXA), vol 25, pp 26

  99. Madhu B, Holi G (2021) CNN approach for medical image authentication. Indian J Sci Technol 14(4):351–360

    Google Scholar 

  100. Han B, Du J, Jia Y, Zhu H (2021) Zero-watermarking algorithm for medical image based on VGG19 deep convolution neural network. J Healthc Eng. https://doi.org/10.1155/2021/5551520

  101. Chen YP, Fan TY, Chao HC (2021) Wmnet: a lossless watermarking technique using deep learning for medical image authentication. Electronics 10(8):932

    Google Scholar 

  102. Ali Z, Hussain M (2022) A novel fragile zero-watermarking algorithm for digital medical images. Electronics 11(5):710

    Google Scholar 

  103. Apostolidis KD, Papakostas GA (2022) Digital watermarking as an adversarial attack on medical image analysis with deep learning. J Imaging 8(6):155

    Google Scholar 

  104. Singh A, Raghuvanshi N, Dutta MK, Burget R, Masek J (2016) An SVD based zero watermarking scheme for authentication of medical images for tele-medicine applications. In: 39th International Conference on Telecommunications and Signal Processing (TSP), Vienna, pp 511–514. https://doi.org/10.1109/TSP.2016.7760932

  105. Rai A, Singh HV (2017) SVM based robust watermarking for enhanced medical image security. Multimedia Tools Appl 76(18):18605–18618

    Google Scholar 

  106. Liao X, Li K, Zhu X, Liu KR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process 14(5):955–968

    Google Scholar 

  107. Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secure Comput 19(2):897–911

    Google Scholar 

  108. Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol 30(3):685–696

    Google Scholar 

  109. KamilKhudhair S, Sahu M, R KR, Sahu AK (2023) Secure reversible data hiding using block-wise histogram shifting. Electronics 12(5):1222

    Google Scholar 

  110. Sahu AK, Umachandran K, Biradar VD, Comfort O, Sri VignaHema V, Odimegwu F, Saifullah MA (2023) A study on content tampering in multimedia watermarking. SN Comput Sci 4(3):222

    Google Scholar 

  111. Sayah MM, Redouane KM, Amine K (2023) Stationary, continuous, and discrete wavelet-based approach for secure medical image transmission. Res Biomed Eng 39(1):167–178

    Google Scholar 

  112. Moad MS, Zermi N, Khaldi A, Kafi MR (2023) Stationary wavelet-based image watermarking for e-healthcare applications. Cybernetics and Systems, pp 1–16. https://doi.org/10.1080/01969722.2023.2166253

  113. Ayubi P, JafariBarani M, Yousefi Valandar M, YosefnezhadIrani B, SedaghehMaskan Sadigh R (2021) A new chaotic complex map for robust video watermarking. Artif Intell Rev 54:1237–1280

    Google Scholar 

  114. Amine K, Redouane KM, Sayah MM (2023) A wavelet-based watermarking for secure medical image transmission in telemedicine application. Multimed Tools Appl 1–17

  115. Kumar V, Sharma S, Kumar C, Sahu AK (2023) Latest trends in deep learning techniques for image steganography. Int J Digit Crime Forensics (IJDCF) 15(1):1–14

    Google Scholar 

  116. Khaldi A, Kafi MR, Boukhamla AZE (2023) Deformable model segmentation for range image watermarking. Multimedia Tools Appl 82(8):12211–12227

    Google Scholar 

  117. Amine K, Redouane K, Bilel M (2023) A redundant wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Multimedia Tools Appl 82(5):7901–7915

    Google Scholar 

  118. Farri E, Ayubi P (2022) A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection. J Ambient Intell Humaniz Comput 1–25

  119. Khaldi A, Kafi MR, Meghni B (2022) Electrocardiogram signal security by digital watermarking. J Ambient Intell Humaniz Comput 14(10):13901–13913

    Google Scholar 

  120. Valandar MY, Ayubi P, Barani MJ, Irani BY (2022) A chaotic video steganography technique for carrying different types of secret messages. J Inf Security Appl 66:103160

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to H. R. Chennamma.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Madhushree, B., Basanth Kumar, H.B. & Chennamma, H.R. An exhaustive review of authentication, tamper detection with localization and recovery techniques for medical images. Multimed Tools Appl 83, 39779–39821 (2024). https://doi.org/10.1007/s11042-023-16706-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16706-x

Keywords

Navigation