Robust Digital Watermarking using Pixel Color Correlation and Chaotic Encryption for Medical Image Protection

Authors

  • Namita D. Pulgam Ramrao Adik Institute of Technology, D Y Patil deemed to be University, Mumbai, India
  • Subhash K. Shinde Lokmanya Tilak College of Engineering, Mumbai, India

Keywords:

Digital Image Watermarking, Encryption Technique, Medical Images, Patient Data Security, Telemedicine

Abstract

Due to the ease with which image manipulation is accomplished, digital image authentication plays a major challenge in the digital revolution. With the rapid advancement of healthcare technology, electronic medical records can now be easily stored in the telemedicine field, which raises the concern for the security of the patient's medical data. Watermarking plays a major role in the healthcare domain as patient records are shared securely over the network if records are encoded with an encryption technique and inserted as a watermark. This must preserve the image's quality and correctly extract patient data from the encoded image even if any geometrical attack is performed to steal the information. Several watermarking approaches have been developed still need to develop a robust and secure watermarking scheme. This paper reviews watermarking scheme along with chaos-based encryption techniques and the benefits of using them over traditional encryption techniques. A watermarking approach based on pixel color correlation (WPCC) is proposed and chaos-based encryption and the Arnold transformation is used, to establish two levels of protection for patient medical records. To ensure secure transmission of information, the proposed approach encrypts the patient record before embedding it as a watermark in a medical image. The performance of the proposed method is evaluated and the system’s robustness is checked against different attacks with Bit Error Rate (BER) and Normalized Correlation parameter (NCC). Proposed method generates images with high Peak Signal Noise Ratio (PSNR) ranging from 24.74dB to 36.07dB and Structural Similarity Index (SSIM) ranging from values 0.84 to 0.97. Assessment of evaluation parameters shows that the designed system is able to hide and extract a patient’s medical record securely and the system is resilient to different attacks. 

Downloads

Download data is not yet available.

References

Wang FH., Pan JS., Jain L.C. (2009), “Digital Watermarking Techniques. In: Innovations in Digital Watermarking Techniques. Studies in Computational Intelligence”, vol 232. Springer, Berlin, Heidelberg, doi: 10.1007/978-3-642-03187-8_2.

S. Kumar and B. K. Singh, (2018), "A Review of Digital Watermarking in HealthCare Domain," 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), pp. 156-159, doi: 10.1109/CSITSS.2018.8768733.

Allaf A.H., Kbir M.A. (2019) “A Review of Digital Watermarking Applications for Medical Image Exchange Security” Innovations in Smart Cities Applications Edition 2. SCA 2018. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham, doi: 10.1007/978-3-030-11196-0_40.

Aparna, Puvvadi and Kishore, Polurie Venkata Vijay, (2020) "A Blind Medical Image Watermarking for Secure E-Healthcare Application Using Crypto-Watermarking System", Journal of Intelligent Systems, vol. 29, no. 1, pp. 1558-1575. doi: 10.1515/jisys-2018-0370.

Begum, Mahbuba, and Mohammad S. Uddin, (2020), "Digital Image Watermarking Techniques: A Review", Information Journal, vol. 11, doi: 10.3390/info11020110.

Anand, Ashima. (2021), “Watermarking techniques for medical data authentication: a survey:, Multimedia Tools and Applications, Springer, Vol 80. doi:10.1007/s11042-020-08801-0.

Roček, Aleš , Javornik, Michal , Slavicek, Karel and Dostal, Otto. (2021), “Zero Watermarking: Critical Analysis of Its Role in Current Medical Imaging”, Journal of Digital Imaging, Springer, Vol. 34. doi: 10.1007/s10278-020-00396-0.

V. Raj, A. B. S, S. Janakiraman, S. Rajagopalan and R. Amirtharajan, (2020), "Scattering Watermark on DICOM Images," International Conference on Computer Communication and Informatics (ICCCI), IEEE, Coimbatore, India , pp. 1-4, doi:10.1109/ICCCI48352.2020.9104174.

E. Elbasi and V. Kaya, (2018), "Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms", International Conference on Computing Sciences and Engineering (ICCSE), IEEE Kuwait, pp. 1-5, doi: 10.1109/ICCSE1.2018.8374221.

Chanu, O.B., Neelima, A., (2019), “A survey paper on secret image sharing schemes”, International Journal of Multimedia Information Retrieval, Springer, Vol. 8, pp. 195–215, doi:10.1007/s13735-018-0161-3.

R. A. Movahed, M. R. Rezaeian and S. Ghasemi, (2019), "An Image Watermarking Algorithm for Medical Computerized Tomography Images," 5th Iranian Conference on Signal Processing and Intelligent Systems (ICSPIS), IEEE, Shahrood, Iran, pp. 1-5, doi: 10.1109/ICSPIS48872.2019.9066018.

Liu, Jing Ma, Jixin , Li, Jingbing , Huang, Mengxing , Sadiq, Naveed and Ai, Yang, (2020), “Robust Watermarking Algorithm for Medical Volume Data in Internet of Medical Things”, IEEE Access. pp. 1-1, doi:10.1109/ACCESS.2020.2995015.

M. Panda, (2016), "Performance analysis of encryption algorithms for security", International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), IEEE, Paralakhemundi, India, pp. 278-284, doi: 10.1109/SCOPES.2016.7955835.

S. Bansal and G. Mehta, (2017), "Comparative analysis of joint encryption and watermarking algorithms for security of biomedical images", 7th International Conference on Cloud Computing, Data Science and Engineering, IEEE, Noida India, doi: 10.1109/CONFLUENCE.2017.7943224.

S. Singh and R. Devgon, (2019), "Analysis of Encryption and Lossless Compression Techniques for Secure Data Transmission," 4th International Conference on Computer and Communication Systems (ICCCS), Singapore, pp. 1-5, doi: 10.1109/CCOMS.2019.8821637.

Pk, Kavitha and Saraswathi, Vidhya, (2019), “A Survey on Medical Image Encryption”, 1st International Conference on Applied Soft Computing Techniques, Kalasalingam University, Krishnankoil, vol. 3, doi:10.32628/ICASCT2501.

Philip, A. M., and D. S. . Hemalatha. “Identifying Arrhythmias Based on ECG Classification Using Enhanced-PCA and Enhanced-SVM Methods”. International Journal on Recent and Innovation Trends in Computing and Communication, vol. 10, no. 5, May 2022, pp. 01-12, doi:10.17762/ijritcc.v10i5.5542.

S. S. Ghosh, H. Parmar, P. Shah and K. Samdani, (2018), "A Comprehensive Analysis Between Popular Symmetric Encryption Algorithms”, IEEE, Punecon, doi:10.1109/PUNECON.2018.8745324

S. Srilaya and S. Velampalli, (2018), "Performance Evaluation for DES and AES Algorithms-An Comprehensive Overview," 3rd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology (RTEICT), Bangalore, India, pp. 1264-1270, doi: 10.1109/RTEICT42901.2018.9012536.

Kabisha, M. S., Rahim, K. A., Khaliluzzaman, M., & Khan, S. I. (2022). Face and Hand Gesture Recognition Based Person Identification System using Convolutional Neural Network. International Journal of Intelligent Systems and Applications in Engineering, 10(1), 105–115. https://doi.org/10.18201/ijisae.2022.273

M. Brindha, (2018), “Confidentiality, Integrity and authentication of DICOM medical images”, 2nd International Conference on Inventive Systems and Control, IEEE, Coimbatore, India, doi: 10.1109 / ICISC.2018.8398924

Vishakha Kelkar, Dr. Kushal Tuckley, (2018), “Reversible watermarking for medical images with added security using chaos theory”, 3rd International Conference on Communication and Electronics Systems (ICCES), IEEE, Coimbatore, India, doi: 10.1109 / CESYS.2018.8724039.

N. A. Loan, N. N. Hurrah, S. A. Parah, J. W. Lee, J. A. Sheikh and G. M. Bhat, (2018), "Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption," in IEEE Access, vol. 6, pp. 19876-19897, doi: 10.1109/ACCESS.2018.2808172.

Arab, A., Rostami, M.J. and Ghavami, B., (2019), “An image encryption method based on chaos system and AES algorithm”, Journal of Supercomputing, vol. 75, pp. 6663–6682, doi: 10.1007/s11227-019-02878-7.

Garg, D. K. . (2022). Understanding the Purpose of Object Detection, Models to Detect Objects, Application Use and Benefits. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 01–04. https://doi.org/10.17762/ijfrcsce.v8i2.2066

Yasser, I.; Mohamed, M.A.; Samra, A.S.; Khalifa, F., (2020), “A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications”, Information Entropy Algorithms for Image, Video, and Signal Processing, Entropy 2020, vol. 22, pp. 1253. doi: 10.3390/e22111253.

Bhatti, Uzair , Yuan, Linwang , Yu, Zhaoyuan , Li, Jingbing , Nawaz, Saqib Ali , Mehmood, Anum and Zhang, Kun., (2020), “Hybrid Watermarking Algorithm Using Clifford Algebra With Arnold Scrambling and Chaotic Encryption”, IEEE Access, pp. 1-1, doi:10.1109/ACCESS.2020.2988298.

Sareh Mortajez, Marziyeh Tahmasbi, Javad Zarei, Amir Jamshidnezhad, (2020), “A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images”, Informatics in Medicine Unlocked, vol. 20, doi:10.1016/j.imu.2020.100396.

P. R. Sankpal and P. A. Vijaya, (2014), "Image Encryption Using Chaotic Maps: A Survey," Fifth International Conference on Signal and Image Processing, IEEE, Bangalore, India, pp. 102-107, doi: 10.1109/ICSIP.2014.80.

L. Kocarev, (2001), "Chaos-based cryptography: a brief overview," IEEE Circuits and Systems Magazine, IEEE, vol. 1, no. 3, pp. 6-21, doi: 10.1109/7384.963463.

Amir Daneshgar, Behrooz Khadem, (2015), “A self-synchronized chaotic image encryption scheme”, Signal Processing: Image Communication, Elsevier, Vol. 36, pp. 106-114, doi:10.1016/j.image.2015.06.005.

V. I. Arnold and A. Avez,(1968), “ Ergodic Problems of Classical Mechanics. (Advanced Book Classics). New York, NY, USA: Benjamin.

N. A. Libre. (2021). A Discussion Platform for Enhancing Students Interaction in the Online Education. Journal of Online Engineering Education, 12(2), 07–12. Retrieved from http://onlineengineeringeducation.com/index.php/joee/article/view/49

Min, Li, Ting, Liang and Yu-jie, He. (2013). “Arnold Transform Based Image Scrambling Method”, Proceedings of 3rd International Conference on Multimedia Technology, Atlantis Press, doi: 10.2991/icmt-13.2013.160.

Thanki, R., Kothari, A. Multi-level security of medical images based on encryption and watermarking for telemedicine applications. Multimed Tools Appl 80, 4307–4325 (2021). https://doi.org/10.1007/s11042-020-09941-z.

Suckling, J., Parker, J., Dance, D., Astley, S., Hutt, I., Boggis, C., Ricketts, I., et al. (2015). Mammographic Image Analysis Society (MIAS) database v1.21 [Dataset]. https://www.repository.cam.ac.uk/handle/1810/250394

Medical Image Database. Available: https://medpix.nlm.nih.gov/.

Architecture of a Chaos-Based Image Cryptosystem [26]

Downloads

Published

16.12.2022

How to Cite

Pulgam, N. D. ., & Shinde, S. K. . (2022). Robust Digital Watermarking using Pixel Color Correlation and Chaotic Encryption for Medical Image Protection. International Journal of Intelligent Systems and Applications in Engineering, 10(4), 29–38. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2193

Issue

Section

Research Article