JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
Badshah, Gran; Liew, Siau-Chuin; Zain, Jasni Mohamad; Ali, Mushtaq;
  PDF(new window)
 Abstract
Region of interest (ROI) is the most informative part of a medical image and mostly has been used as a major part of watermark. Various shapes ROIs selection have been reported in region-based watermarking techniques. In region-based watermarking schemes an image region of non-interest (RONI) is the second important part of the image and is used mostly for watermark encapsulation. In online healthcare systems the ROI wrong selection by missing some important portions of the image to be part of ROI can create problem at the destination. This paper discusses the complete medical image availability in original at destination using the whole image as a watermark for authentication, tamper localization and lossless recovery (WITALLOR). The WITALLOR watermarking scheme ensures the complete image security without of ROI selection at the source point as compared to the other region-based watermarking techniques. The complete image is compressed using the Lempel-Ziv-Welch (LZW) lossless compression technique to get the watermark in reduced number of bits. Bits reduction occurs to a number that can be completely encapsulated into image. The watermark is randomly encapsulated at the least significant bits (LSBs) of the image without caring of the ROI and RONI to keep the image perceptual degradation negligible. After communication, the watermark is retrieved, decompressed and used for authentication of the whole image, tamper detection, localization and lossless recovery. WITALLOR scheme is capable of any number of tampers detection and recovery at any part of the image. The complete authentic image gives the opportunity to conduct an image based analysis of medical problem without restriction to a fixed ROI.
 Keywords
Lossless Recovery;Tamper Localization;Telemedicine;Watermarking;Whole Image;WITALLOR;
 Language
English
 Cited by
 References
1.
J. X. Chen, Z. L. Zhu, and H. Yu, "A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme," Optik - International Journal for Light and Electron Optics, vol. 125, no. 11, pp. 2472-2478, 2014. crossref(new window)

2.
A. Cheddad, J. Condell, K. Curran, and P. McKevitt, "Digital image steganography: survey and analysis of current methods," Signal Processing, vol. 90, no. 3, pp. 727-752, 2010. crossref(new window)

3.
J. Pan, J. Zheng, and G. Zhao, "Blind watermarking of NURBS curves and surfaces," Computer-Aided Design, vol. 45, no. 2, pp. 144-153, 2013. crossref(new window)

4.
F. Y. Shih and Y. T. Wu, "Robust watermarking and compression for medical images based on genetic algorithms," Information Sciences, vol. 175, no. 3, pp. 200-216, 2005. crossref(new window)

5.
N. Wang and C. Men, "Reversible fragile watermarking for 2-D vector map authentication with localization," Computer-Aided Design, vol. 44, no. 4, pp. 320-330, 2012. crossref(new window)

6.
J. C. Garcia-Alvarez, H. Fuhr, and G. Castellanos-Dominguez, "Evaluation of region-of-interest coders using perceptual image quality assessments," Journal of Visual Communication and Image Representation, vol. 24, no. 8, pp. 1316-1327, 2013. crossref(new window)

7.
M. M. Abd-Eldayem, "A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine," Egyptian Informatics Journal, vol. 14, no. 1, pp. 1-13, 2013. crossref(new window)

8.
B. Davie, V. Florance, A. Friede, J. Sheehan, and J. E. Sisk, "Bringing health-care applications to the internet," IEEE Internet Computing, vol. 5, no. 3, pp. 42-48, 2001. crossref(new window)

9.
F. J. McEvoy and E. Svalastoga, "Security of patient and study data associated with DICOM images when transferred using compact disc media," Journal of Digital Imaging, vol. 22, no. 1, pp. 65-70, 2009. crossref(new window)

10.
R. Norcen, M. Podesser, A. Pommer, H. P. Schmidt, and A. Uhl, "Confidential storage and transmission of medical image data," Computers in Biology and Medicine, vol. 33, no. 3, pp. 277-292, 2003. crossref(new window)

11.
L. O. M. Kobayashi, S. S. Furuie, and P. S. Barreto, "Providing integrity and authenticity in DICOM images: a novel approach," IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 4, pp. 582-589, 2009. crossref(new window)

12.
O. M. Al-Qershi and B. E. Khoo, "ROI-based tamper detection and recovery for medical images using reversible watermarking technique," in Proceedings of IEEE International Conference on Information Theory and Information Security (ICITIS), Beijing, China, 2010, pp. 151-155.

13.
S. Das and M. K. Kundu, "Effective management of medical information through ROI-lossless fragile image watermarking technique," Computer Methods and Programs in Biomedicine, vol. 111, no. 3, pp. 662-675, 2013. crossref(new window)

14.
G. Badshah, S. C. Liew, J. M. Zain, S. I. Hisham, and A. Zehra, "Importance of watermark lossless compression in digital medical image watermarking," Research Journal of Recent Sciences, vol. 4, no. 3, pp. 75-79, 2015.

15.
G. Badshah, S. C. Liew, J. M. Zain, and M. Ali, "Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique," Journal of Digital Imaging, 01 October 2015. http://dx.doi.org/10.1007/s10278-015-9822-4. crossref(new window)

16.
D. Coppersmith, F. C. Mintzer, C. P. Tresser, C. W. Wu, and M. N. Yeung, "Fragile imperceptible digital watermark with privacy control," in Proceedings of SPIE 3657: Security and Watermaking of Multimedia Contents. Bellingham, WA: Interntional Society for Optics and Photonics, 1999.

17.
S. C. Liew, S. W. Liew, and J. M. Zain, "Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication," Journal of Digital Imaging, vol. 26, no. 2, pp. 316-325, 2013. crossref(new window)

18.
A. Al-Haj and A. Amer, "Secured telemedicine using region-based watermarking with tamper localization," Journal of Digital Imaging, vol. 27, no. 6, pp. 737-750, 2014. crossref(new window)

19.
G. Badshah, S. C. Liew, M. Z. Jasni, and T. Herawan, "Tamper localization and recovery medical image watermarking," in Proceedings of International Conference on Computational Science and Information Management (ICoCSIM-2012), Medan, Indonesia, 2012, pp. 266-270.