An Efficient Method of Medical Image Watermarking Technique For E-Healthcare Using Public Key Encryption

Authors

  • Sreeji S Department of Computer Science and Engineering, Sathyabama Institute of Science & Technology, Chennai, Tamil Nadu, India. Author
  • Sreenarayanan N M Department of Computer Science and Engineering, GITAM University, Bengaluru, Karnataka, India. Author
  • Arul Prakash A Department of Computer Science and Engineering, Sathyabama Institute of Science & Technology, Chennai, Tamil Nadu, India. Author

Keywords:

Minimum Watermarking image, watermarking image medical, verification of medical integrity, watermarking LSB, data hiding, DWT Transform

Abstract

Digital watermarking has been adopted to improve the security, privacy, and integrity of medical imaging. When it comes to the fundamental requirements of the picture, medical image watermarking is a distinct subset of image watermarking. A useful method for improving medical information security and authentication is the use of a medical watermarked image, which is useful for future diagnosis and possible references. A watermarking verification for health information management is presented in this research. Throughout the region, the recommended method uses public key encryption, which the DWT translates into integrity verification. In addition, the embedded watermark image is encrypted using public key cryptography. After the watermark is added, we alter the upper bit plane, which includes the LSB regions of each block.

Downloads

Download data is not yet available.

References

Aparna, P., & Kishore, P. V. V. (2019). Biometric-based efficient medical image watermarking in E-healthcare application. IET Image Processing. https://doi.org/10.1049/iet-ipr.2018.5288

Assini, I., Badri, A., Sahel, K. S. A., & Baghdad, A. (2018). A robust hybrid watermarking technique for securing medical image. International Journal of Intelligent Engineering and Systems. https://doi.org/10.22266/IJIES2018.0630.18

Begum, M., & Uddin, M. S. (2020). Analysis of Digital Image Watermarking Techniques through Hybrid Methods. Advances in Multimedia, 2020, 7912690. https://doi.org/10.1155/2020/7912690

Feng, L. P., Zheng, L. Bin, & Cao, P. (2010). A DWT-DCT based blind watermarking algorithm for copyright protection. Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010. https://doi.org/10.1109/ICCSIT.2010.5565101

Gaur, S., & Srivastava, V. K. (2017). A hybrid RDWT-DCT and SVD based digital image watermarking scheme using Arnold transform. 2017 4th International Conference on Signal Processing and Integrated Networks, SPIN 2017. https://doi.org/10.1109/SPIN.2017.8049982

Gull, S., Loan, N. A., Parah, S. A., Sheikh, J. A., & Bhat, G. M. (2020). An efficient watermarking technique for tamper detection and localization of medical images. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-018-1158-8

Hemdan, E. E. D., El-Fishawy, N., Attiya, G., & El-Samie, F. A. (2013). C11. Hybrid digital image watermarking technique for data hiding. National Radio Science Conference, NRSC, Proceedings. https://doi.org/10.1109/NRSC.2013.6587920

Hu, H. T., & Hsu, L. Y. (2017). Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-016-3332-3

Jain, P., & Ghanekar, U. (2018). Robust watermarking technique for textured images. Procedia Computer Science. https://doi.org/10.1016/j.procs.2017.12.025

Kazemi, M. F., Pourmina, M. A., & Mazinan, A. H. (2020). Analysis of watermarking framework for color image through a neural network-based approach. Complex & Intelligent Systems. https://doi.org/10.1007/s40747-020-00129-4

Natu, S., Natu, P., & Sarode, T. (2018). Improved robust digital image watermarking with SVD and hybrid transform. ICCT 2017 - International Conference on Intelligent Communication and Computational Techniques. https://doi.org/10.1109/INTELCCT.2017.8324041

Okikiola, F. M., Mustapha, A. M., Akinsola, A. F., & Sokunbi, M. A. (2020). A New Framework for Detecting Insider Attacks in Cloud-Based E-Health Care System. 2020 International Conference in Mathematics, Computer Engineering and Computer Science, ICMCECS 2020. https://doi.org/10.1109/ICMCECS47690.2020.240889

Parah, S. A., Sheikh, J. A., Ahad, F., Loan, N. A., & Bhat, G. M. (2017). Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-015-3127-y

Patra, J. C., Phua, J. E., & Bornand, C. (2010). A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Processing: A Review Journal. https://doi.org/10.1016/j.dsp.2010.03.010

Savakar, D. G., & Ghuli, A. (2019). Robust Invisible Digital Image Watermarking Using Hybrid Scheme. Arabian Journal for Science and Engineering. https://doi.org/10.1007/s13369-019-03751-8

Thakur, S., Singh, A. K., Ghrera, S. P., & Elhoseny, M. (2019). Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-018-6263-3

Tun, A., & Thein, Y. (2013). Digital Image Watermarking Scheme Based on LWT and DCT. International Journal of Engineering and Technology. https://doi.org/10.7763/ijet.2013.v5.557

Yadav, A. K., & Mehta, R. (2019). Local Coupled Extreme Learning Machine Based Image Watermarking using DCT in YCbCr Space. Proceedings - 2019 Amity International Conference on Artificial Intelligence, AICAI 2019. https://doi.org/10.1109/AICAI.2019.8701406

Zhang, Y., Li, Y., & Sun, Y. (2019). Digital Watermarking Based on Joint DWT–DCT and OMP Reconstruction. Circuits, Systems, and Signal Processing. https://doi.org/10.1007/s00034-019-01112-2

Published

2024-04-29

Issue

Section

Research Articles

How to Cite

Sreeji S, Sreenarayanan N M, and Arul Prakash A. 2024. “An Efficient Method of Medical Image Watermarking Technique For E-Healthcare Using Public Key Encryption”. International Journal of Scientific and Research in Engineering(IJSRE) 1 (2): 29-38. http://ijsre.org/index.php/home/article/view/7.

Similar Articles

You may also start an advanced similarity search for this article.