A Hybrid Robust Watermarking and Encryption for Medical Images using GA Optimized DWT and SVD

Venugopal Reddy*, P. Siddaiah**
* Research Scholar and Professor, Acharya Nagarjuna University, Guntur, Andhra Pradesh, India
** Principal, University College of Engineering and Technology, Acharya Nagarjuna University Guntur, Andhra Pradesh, India
Periodicity:January - March'2015
DOI : https://doi.org/10.26634/jip.2.1.3264

Abstract

Watermarking secures the integrity of the medical images and has been used. One specific limitation for the methods that can be used in water marking medical images is that water marking procedure should not result in degradation of the image. In this work, a dual security approach comprising water marking and encryption is implemented to provide authenticity and protect the integrity of the medical image. A multi objective optimization function that can preserve the structural integrity of the medical image while maintaining robustness and imperceptibility is formulated. Genetic Algorithm (GA) optimization approach is used to optimize the multi objective function. The water mark is implemented using hybrid approach comprising Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD). The encryption is affected using RSA & AES encryption algorithms. A graphical user interface (GUI) is designed to present the proposed approach in the form of usable tool to help the user in the embedding and extracting process. The water mark is subjected to different types of noise attacks and its robustness and integrity are tested.

Keywords

Medical Image, Discrete Wavelet Transform, Singular Value Decomposition, Genetic Algorithm, Multi Objective Optimization, Encryption.

How to Cite this Article?

Reddy, V., and Siddaiah, P. (2015). A Hybrid Robust Watermarking and Encryption for Medical Images using GA Optimized DWT and SVD. i-manager’s Journal on Image Processing, 2(1), 19-27. https://doi.org/10.26634/jip.2.1.3264

References

[1]. S. Boucherkha and M. Benmohamed, (2005). “A lossless watermarking based authentication system for medical images”, International conference on computational intelligence, pp. 240-243.
[2]. P. Meerwald and A. Uhl (2001). “A survey of waveletdomain watermarking algorithms”, Proc of the SPIE security and watermarking of multimedia contents, Vol. 4314, pp. 505–516.
[3]. A. G. Tescher, B. A. Giakoumaki, S. Pavlopoulos, D. Koutsouris (2003). “A medical image watermarking scheme based on wavelet transform”, IEEE EMBS Annual International Conference, Cancun, Mexico, pp. 17–21.
[4]. J. Nayak, P.S. Bhat, R. Acharya, and Niranjan UC, (2004). “Simultaneous storage of medical images in the spatial and frequency domain: a comparative study”, BioMed , Vol. 3, pp. 17.
[5]. Mei Jiansheng , Li Sukang, Tan Xiaomei, (2009). “A Digital Watermarking Algorithm Based On DCT and DWT” Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA'09), pp.104-107.
[6]. C. Piao, D. Woo, D. Park, and S. Han, (2008). “ Medical image authentication using hash function and integer wavelet transform”, Congress on Image and Signal Processing, Vol. 1, pp. 7-10.
[7]. A. Kannammal, Dr. S. Subha Rani, (2011). “Authentication of DICOM Medical Images using Multiple fragile watermarking Techniques in Wavelet Transform Domain,” IJCSI International Journal of Computer Science Issues, Vol. 8, No. 6, pp.1694-0814.
[8]. C. S. Woo, J. Du, and B. Pham, (2005). “Multiple watermark method for privacy control and tamper detection in medical images”, WDIC 2005 pages, Australia, pp. 59–64.
[9]. M. Nambakhsh, A. Ahmadian, and H. Zaidi, (2001). “A contextual based double watermarking of PET images by Patient ID and ECG Signal”, Comput Meth. Prog, Vol.104, pp. 341–353.
[10]. A.Kannammal, Dr.S.Subha Rani, (2013). “DICOM medical image watermarking of ECG signals using EZW algorithm Volume”, International Journal of Medical Engineering and Informatics, Vol. 5, pp.126-136.
[11]. A. Kannammal and S. Subha Rani, (2012). “Authentication of Medical Images using Integer Wavelet transforms”, Int J Emerg Technol Adv Eng, Vol. 2, No. 9, pp. 104-108.
[12]. W. Lin, S. Horng, T. Kao, P. Fan, C. Lee, and Y. Pan, (2008). “An efficient watermarking method based on significant difference of wavelet coefficient quantization”, IEEE Trans On Multimedia, Vol. 10, No. 5, pp. 746-757.
[13]. Xinge You, Liang Du, Yiu-ming Cheung, Qiuhui Chen, (2010). “A blind watermarking scheme using new nontensor product wavelet filter banks”, IEEE Transactions on Image Processing, Vol.19, No.12, pp. 3271-84.
[14]. D. Bouslimi, G. Coatrieux, M. Cozic, (2012). ”A joint encryption/watermarking systems for verifying the reliability of medical images”, IEEE Trans Information Technol Biomed, Vol. 16, No. 5, pp. 891-196.
[15]. F. Cao, H. K. Huang, X. Q. Zhou, (2003). “Medical image security in HIPAA mandated PACS environment”, Comput Med Imaging Graphics, Vol. 27, No. 2, pp. 185- 196.
[16]. L. O. M. Kobayashi, S. S. Furuie, and P. S. L. M. Barreto, (2009). “Providing Integrity and Authenticity in DICOM Images: A Novel Approach”, IEEE Trans Inform Technol Biomed, Vol. 13, No. 4, pp. 582-589.
[17]. N. Singhal, J. P. S. Raina, (2011). “Comparative analysis of AES and RC4 algorithms for better utilization”, Int J Comput Trends Technol, pp. 177–181.
[18]. E. Thambiraja, G. Ramesh, and R. Umarani, (2012). “A survey on various most common encryption techniques”, Int J Adv Res Comput Sci Software Eng, Vol. 2, pp. 226–233.
[19]. W. Puech, J.M. Rodrigues, (2004). “A new crypto watermarking method for medical images safe transfer”, Proc. of the 12th European signal processing conference, Vienna, Austria, pp.1481–1484.
[20]. Xin Zhou, Xiaofei Tang, (2011). “Research and Implementation of RSA Algorithm for Encryption and Decryption”, 6th International Forum on Strategic Technology, IEEE, pp.1118 – 1121.
[21]. P. Campisi, A. Neri, M. Visconti, (2001). “A wavelet based method for high frequency subbands watermark embedding,” In Multimedia systems and applications III I, Andrew G. Tescher, Bhaskaran Vasudev, V. Michael Bove, Jr., 344 Editors, Proceedings of SPIE, Vol. 4209.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.