Comparative Evaluation of Image Watermarking Methodin Health Care

Ritu Agrawal*, Manisha Sharma**
* Research Scholar, Department of Electronics and Telecommunication Engineering, B.I.T, Durg(C.G)
** Professor, Department of Electronics and Telecommunication Engineering, B.I.T., Durg (C.G.)
Periodicity:January - March'2014
DOI : https://doi.org/10.26634/jip.1.1.2700

Abstract

Medical image watermarking has become an important research area in the field of data security and confidentiality as patient's medical records are linked to open environment for further diagnosis and long term storage. Confidentiality of patient's data can be achieved by hiding Electronic Patient's Record (EPR) data in corresponding medical images, thus saving storage space and bandwidth requirement at the time of transmission. However, medical images require extreme care when embedding additional data within them because the additional information must not affect the image quality and readability. This paper makes a review of twenty five different watermarking algorithms for medical images in terms of patient information hiding scheme as well as to protect medical images from any unauthorized access. The objective of this paper is to conduct a research on medical image applications and advantages and also, discuss the performance analysis of described medical image watermarking methods in terms of PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error).

Keywords

Medical Image Watermarking (MIW), Electronic Patient Record (EPR), Confidentiality, Integrity, Authentication.

How to Cite this Article?

Agrawal, R., and Sharma, M. (2014). Comparative Evaluation of Image Watermarking Method in Health Care. i-manager’s Journal on Image Processing, 1(1), 18-29. https://doi.org/10.26634/jip.1.1.2700

References

[1]. B.Sankur, C.Roux, G.Coatrieux and L.Lecornu, (2006). “ A Review of Image Watermarking Applications in Health Care”, IEEE EMBS Annual International Conference, pp:4691-4694.
[2]. B. Sankur, G.Coatrieux , H. Maitre , R. Collorec and Y.Rolland,(2000). “Relevance of Watermarking in Medical Imaging,” IEEE EMBS Conference on Information Technology Applications in Biomedicine, pp:250-255.
[3]. L.C.Min, R. Acharya. S. Kumar and, U,P.S. Bhat,(2003). “ Transmission and Storage of Medical Images with Patient Information”, International Journal of Computers in Biology and Medicine Vol. 33, pp:303-310.
[4]. K. A. Navas, M. Sasikumar and S. Sreevidya,(2007). “A Benchmark for Medical Image Watermarking” 6th EURASIP Conference Focused on Speech and Image Processing , Multimedia Communications and Services, PP: 237-240.
[5]. D.Bose and J.S.Manoharan,(2011). “Wavelet Transforms for Watermarking in Medical Image”, International Journal of Information Analysis and Processing, Vol. 4, pp:101-106.
[6]. C.M.Hsu, H.M.Chao and S.G.Miaou,(2002). “A Data Hiding Technique with Authentication, Integration and Confidentiality for Electronic Patient Record,” IEEE Transaction on Information Technology in Medicine, Vol. 6, pp:46-53 .
[7]. C.Roux, G.Coatrieux, J.Puentes, M.Lamard and W.Daccache,(2005). “A Low Distortion and Reversible Watermark: Application to Angiographic Images of the Retina”, 27th IEEE International Annual Conference in Medicine and Biology .
[8]. A.Giakoumaki, D.Koutsouris and S.Pavlopoulos, (2004). “A Multiple Watermarking Scheme Applied to Medical Image Management”, IEEE EMBS Annual International Conference , .pp:3241-3244.
[9]. K.A.Navas and M.Sasikumar, (2007). “Survey of Medical Image Watermarking Algorithms” SETIT International Conference Sciences of Electronics pp:1-6.
[10]. I.F.Kallel. M.Kallel, and M.S.Bouhlel,(2006). “A Secure Fragile Watermarking Algorithm for Medical Image Authentication in the DCT Domain” IEEE Conference on Information and Communication Technology, ICTTA'06, pp:2024-2029.
[11]. D. Verma, K.Mishra and R.L.Verma,(2013). “A Hybrid Wa t e rma r k i n g S c h eme f o r Me d i c a l Ima g e s ” , International Journal of Engineering and Computer Science , Vol. 2, pp:1250-1255.
[12]. B.Jeon and Y.Q.Shi, “Digital Watermarking, 5th International Workshop IWDW, Book, Springer 2006, ISBN- 10.
[13]. K.A.Navas, M.Sasikumar and S.A.Thampy,(2007). “ EPR Hiding in Medical Images for Telemedicine”, International Journal of Biological and Life Sciences Vol.3 pp:44-47.
[14]. D. Anand and U.C.Niranjan, (1998).“Watermarking Medical Images with Patient Information”, 20th Annual International Conference of IEEE Engineering in Medicine and Biology Society, 703-706.
[15]. P. Wong,(1999). “A Watermark for Image Integrity and Ownership Verification “, International Conference IS&T PICS 99, pp:374-379.
[16]. A.Wakatani,(2002). “Digital watermarking for ROI Medical Images by using compressed signature Image”, IEEE Conference on System Sciences pp:1-6.
[17]. J.Tan, Q.Cheng and X.Luo,(2003). “A Lossless Data Embedding Scheme for Medical Images in Application of E-Diagnosis”, 25th Annual International Conference of IEEE EMBS, pp:852-855.
[18]. L.C.Min,N.Kannathal R. Acharya,S.S.iyengar and U.C.Niranjan,(2004). “Simultaneous Storage of Patient information with Medical Images in the Frequency Domain”, International Journal of Computer Methods and Programs in Biomedicine, Vol.76, pp:13-19.
[19]. H.J.Kim ,H.K.Lee, J.K.Lee and K.R.Kwon,(2005). “Digital Watermarking of Medical Image using ROI Information” pp: 404-40.
[20]. M.Li, R.Poovendran and S.Narayanan,(2005). “Protecting Patient Privacy Against Unauthorized Release of Medical Images in a Group Communication Environment,” International Journal of Computerized Medical Imaging and Graphics, Vol.29, pp:367-383.
[21]. F. Ahmad and I.S.Moskowitz,(2006). “A Semi Reversible Watermark for Medical Image Authentication” IEEE Conference on 1st Distributed Diagnosis and Home Healthcare (D2H2), pp:59-62.
[22]. F.U.Claudia, R.C.Raul and T.B.Gershom,(2007). “Data Hiding Scheme for Medical Images”, 17th International Conference on Electronics , Communications and Computers, pp: 32-37.
[23]. C.Roux, G.Coatrieux, H.Huang and J.Montagner, (2007). “Mixed Reversible and RONI Watermarking for Medical Image Reliability Protection, 29th Annual International Conference of IEEE EMBS, pp:5653-5656 .
[24]. C.Ri Piao, D.M.Woo, D.C.Park and S.S.Han,(2008). “Medical Image Authentication using Hash Function and Integer Wavelet Transform”, IEEE Conference on Image and Signal Processing, pp:7-10.
[25]. N.Ansari, Q.Sun, W.Su, X.Lin, Y.Q.Shi and Z.Ni,(2008). “Robust lossless Image Data Hiding Designed for Semi- Fragile Image Authentication”, IEEE International Journal of Digital Imaging, Vol.21, pp:59-76.
[26]. C.L.Wang, C.J.Chen, D.R.Chen, H.K.Wu, R.F.Chang, , T.H.Kuo and W.K.Moon,(2008). “Tamper Detection and Recovery for Medical Images Using Near-Lossless Information Hiding Technique”, Transaction on Circuits and Systems for Video Technology, Vol. 18, pp:49750.
[27].C.Roux, C.L.Guillou, G.Coatrieux and J.M.Cauvin, (2009). “Reversible Watermarking for Knowledge Digest Embedding and Reliability Control in Medical Images”, IEEE Transaction on Information Technology in Biomedicine , Vol.13. pp:158-165.
[28]. T.G.Zhuang and X.Guo, (2009). “A Region Based Lossless Watermarking Scheme for Enhancing Security of Medical Data”, International Journal of Digital Imaging, Vol.22, pp: 53-64.
[29]. M. Kundu and S.Das,(2010). “Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding”, IEEE Conference on Pattern Recognition, pp:1457-1460.
[30]. B.E.Khoo and O.M.Al-Qershi,(2010). “ROI Based Tamper Detection and Recovery for Medical Images Using Reversible Watermarking Technique”, IEEE International Conference on Information Theory and Information Security pp:151-155 2010.
[31]. A.Mohan, B.Kumar,H.V.Singh and S.P.Singh,(2011). “ Secure Spread –Spectrum Watermarking for Telemedicine Applications”, International Journal of Information Security, Vol. 2, pp:91-98.
[32]. J.Xu and Z.Chang,(2011). “Reversible Run Length Embedding for Medical Images”, IEEE Conference pp:260-263.
[33]. S.N.Mali and S.V.Dhavale,(2011). “High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Checking”, International Journal On Signal and Image Processing, Vol.2, pp:13-16.
[34] .C .Roux , D. Bouslimi , G . Coatrieux and M.Cozic,(2012). “A Joint Encryption/ Watermarking System for Verifying the Reliability of Medical Images” IEEE Transaction on Information Technology in Biomedicine , Vol.16, pp:891-899.
[35]. P. Singh and R .S. Chadha,(2013). “A Survey of Digital Watermarking Techniques, Applications and Attacks” International Journal of Engineering and Innovative Technology Vol.2, pp:, 165-175.
[36]. CHAPTER 2: Literature Review, Source: Internet
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.