You are on page 1of 8

Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).

IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4


2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV) | 978-1-6654-1960-4/20/$31.00 ©2021 IEEE | DOI: 10.1109/ICICV50876.2021.9388616

A HYBRID OF WATERMARK SCHEME WITH


ENCRYPTION TO IMPROVE SECURITY OF
MEDICAL IMAGES
Shankar A1
Kannammal A2
Department of Electronics and Communication
Department of Electronics and Communication
Engineering,
Engineering,
Sri Ramakrishna Institute of Technology,
P.S.G College of Technology, Coimbatore
Coimbatore
kannammal_a@yahoo.com
shankar1611@gmail.com

Providing high security. Further decryption process is


Abstract: With the recent research and development
done to retrieve the original image.
in the areas of communication, traditional diagnosis is
being replaced by e-diagnosis in healthcare industry KEYWORDS: Watermarking, AES, Encryption,
like teleconsulting, telesurgery and telediagnosis. The Decryption, Payload
requirement of these applications is to exchange the
1 INTRODUCTION
medical images in 1s and 0s to another location in a
secured manner. In this work, both robust and With the vite progress in media and technology in
reversible watermarking is done and a three level various sectors, Major challenge is there to protect
security is provided. The medical image is divides into the copyright of products from the unauthorized
two major parts with giving importance to diagnose person. In general watermarking plays a major role to
identification namely region of interest (ROI) and overcome [1, 2, 3] this issue though it may suffer
region of non-interest (RONI).Firstly in ROI
with various distortions like compression noise etc., it
Reversible data embedding, which embeds payload data
should to manipulated in such a way that the
in reversible manner in to binary image, since it is
algorithm wants to be more accurate and robust. In
considered to be important by physician for making
recent decade the research has been focus on this area
diagnosis. Therefore no changes are made in ROI image
during watermarking. Secondly in RONI, Robust to improvise [1, 6, 8] this issue and it can be in either
watermarking is done, so that it can withstand various Spatial or Transform domain. here also has a new
intentional and unintentional attacks. In ROI region a work [4] based on blind multiple which uses LWT(
two level decomposition is done by Haar wavelet and a lifting wavelet transform) and Arnold chaotic which
watermark (patient’s information seen on header) is is very effective in the recent research. Further bulk
embedded into LH1 and HL1 sub bands. Later, both
data in the form of digital acquired digital medical
watermarked images are combined and a single
images used in hospitals are usually stored in
watermarked image is obtained. Thirdly, the resultant
database with required information (Text).
image is further processed by using AES algorithm
which makes output image in an unreadable form, thus

978-1-6654-1960-4/21/$31.00 ©2021 IEEE 226

Authorized licensed use limited to: University of Houston Clear Lake. Downloaded on March 06,2022 at 22:46:07 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).
IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4

2 LITERATURE SURVEY In the proposed work, a three level security is


The nonblind watermarking scheme [10] gives the provided for medical images. Initially reversible
results of in which the original image is needed in the watermarking is done in ROI Image; robust
watermark extraction phase. It has been found that watermarking is done in RONI Image. Later, both
the medical images provide more robustness to images are combined to obtain a single watermarked
attacks when wavelet based watermarking is done in image. This watermarked image is then encrypted by
it.Further capability of revealing singularities [7] in using AES encryption. This method provides a higher
images for wavelet and performance of the security than the existing method.
corresponding wavelet-based watermarking is 3 PROPOSED WATERMARKING
ALGORITHM
analyzed and Tensor product can reveal the
The Proposed work is divided into three modules.
singularities in the three directions .The reversible
Firstly The Given medical image is separated as ROI
watermarking done in ROI region of the medical
and RONI and then Embedding technique in
image [9,10]. It has been reinforced through
reversible method is utilized. Secondly the RONI
extensive research that the most crucial regions of
with haar wavelet (tensor wavelet) is used later both
medical images must not be degraded and
watermarked images are combined and a single
compressed by a lossless or near lossless algorithm.
watermarked image is obtained which is then
The method to find significant difference of an
encrypted using AES algorithm to provide high
image. Every seven non-overlap wavelet coefficients
security.
of the host image are grouped into a block. The
3.1ROI WATERMARKING
largest two coefficients in a block are called
Reversible watermarking is performed in
significant coefficients and their difference is called
ROI region, which is considered to be important by
significant difference[6,8,10]. Based upon the newly
physician for making diagnosis. Usage of classical
constructed nontensor product wavelet banks, a
watermarking techniques may create distortion and
watermarking scheme based upon significant
consequently the diagnosis value of image may be
differences in DNWT is proposed (SD-DNWT).
lost. Hence, in this paper, Tian’s difference
[5] gave a new method in which both robust and
expansion method is used. Here, a data (payload)
reversible watermarking is done. Since ROI region is
which is invisible is embedded in a reversible way to
important for diagnosis purpose, reversible
the ROI region. In hiding the information, reversible
watermarking is used in it, so that the watermark
data embedding method which hides the information
embedded can be exactly extracted. Similarly in
in medical image is one of the best method by
RONI region, robust watermarking is used and hence
which owner can decode the hidden information and
it can withstand various attacks. Therefore this
can restore it easy. Further the performance can be
method provides an improved security than others.
measured in Visual quality and Complexity.
Payload

ROI Reversible
Extracted Image
Image Watermarking
Original
Medical Image
Watermarked Encryption Decryption
Image (AES)

RONI Robust
Image Watermarking

Patients
Information
227
Fig. 1 Block diagram of the proposed method

Authorized licensed use limited to: University of Houston Clear Lake. Downloaded on March 06,2022 at 22:46:07 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).
IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4

Here, Difference expansion (DE) technique is computational complexity is reduced


employed to embed method for medical image. The
3.2RONI WATERMARKING
Robust watermarking is done in RONI g) The LH1 and HL1 sub-images are
region, which should be able to withstand various chosen to extract the embedded
attacks. The watermark used here is patient’s watermark.
information. Similarly hospital logo, index, EPR can h) Perform inverse LSB watermarking
also be used. The Proposed embedding technique and algorithm to extract the watermark.
recovering procedure is as follows, The robust watermarking method proposed is
Watermark Embedding designed to survive intentional and unintentional
a) Apply two level forward 2D Haar attacks. This method is based on wavelet coefficient
wavelet transform on RONI image to properties of the ROI, where features are extracted
get the (LL1, HL1, LH1, HH1) Sub- based on absolute differences between corresponding
images by wavelet decomposition coefficients in the LH1 and HL1 subbands on 8x8
method. blocks.
b) The LH1 and HL1 sub-images are
chosen for embedding the watermark. 3.3AES ENCRYPTION/DECRYPTION
c) Convert the watermark into binary After combining ROI watermarked image and RONI
format and each bit of the data is watermarked image, a watermarked image is
implanted in each pixel of the LH1 and obtained. AES algorithm comprising of ten rounds
HL1 sub-images by using LSB and each round has four steps is used in this method
watermarking. [8]. AES encryption technique is much faster than
d) The watermarked LH1 and HL1 sub- public key encryption (RSA), often by 100 to 1,000
images are replaced in its original times because public key encryption places a much
position. heavier computational load on computer processors
e) Then inverse 2D Haar wavelet than symmetric key encryption. It is possible to speed
transform is applied to attain the up execution of this cipher by combining Sub Bytes
watermarked image. and Shift Rows with Mix columns, and transforming
Watermark Extraction them into a sequence of table lookups. Symmetric
f) Apply two level forward 2D Haar key technology is generally used to provide secrecy
wavelet transform on watermarked for the bulk encryption and decryption of
image to get the (LL1, HL1, LH1, and information.
HH1) sub-images.

978-1-6654-1960-4/21/$31.00 ©2021 IEEE 228

Authorized licensed use limited to: University of Houston Clear Lake. Downloaded on March 06,2022 at 22:46:07 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).
IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4

5 Simulation results
Using the same watermarking and encryption method as above, the following simulation results are obtained from
which the performance measures are made.
5.1 Selection of ROI and RONI Images

Fig. 2 a) Original Image b) Selection of ROI and RONI Images c) ROI Image d) RONI Image

978-1-6654-1960-4/21/$31.00 ©2021 IEEE 229

Authorized licensed use limited to: University of Houston Clear Lake. Downloaded on March 06,2022 at 22:46:07 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).
IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4

5.2 ROI Watermarking and RONI Watermarking

Payload

a b c d e f
Fig 3 a) ROI Image b) watermarked ROI Image c) RONI Image d) One-level decomposed image using Haar wavelet
e) Watermark f) Watermarked RONI Image

230
978-1-6654-1960-4/21/$31.00 ©2021 IEEE

Authorized licensed use limited to: University of Houston Clear Lake. Downloaded on March 06,2022 at 22:46:07 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).
IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4

5.3 AES ENCRYPTION & DECRYPTION

(a) (b) (c) (d)

Fig 4 . a) Final Watermarked Image b) Encrypted Image c) Decrypted Image d) Extracted watermark

978-1-6654-1960-4/21/$31.00 ©2021 IEEE 231

Authorized licensed use limited to: University of Houston Clear Lake. Downloaded on March 06,2022 at 22:46:07 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).
IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4

6 PERFORMANCE EVALUATION
The Performance of the proposed watermarking watermark embedded and extracted are the same.
algorithm is evaluated by the various Quality PSNR value is also considerably good in all cases by
measures Table 2 gives the quality measures of the using tensor wavelet (Haar wavelet transform) than
proposed method. Encryption can be done either by nontensor wavelet.
using stream cipher or block cipher. Here encryption 7 CONCLUSIONS
is done by using AES algorithm which is a block
The proposed Watermarking and Encryption
cipher, and it offers high security. PSNR value is
algorithm provides a three level security for medical
above 40dB which shows that the algorithm is
images .Initially watermarking is done to ROI Image,
lossless. Similarly NC value is evaluated between the
and then to RONI Image, later these two images are
embedded and extracted watermark. SSIM is
combined to obtain a single watermarked image.
calculated for original and decrypted image and it
Since ROI Image is important for diagnosis purpose,
gives the similarity value between these two images.
reversible watermarking is done in it. Similarly,
Table 2 Quality measures for the proposed algorithm RONI Image should be more robust to attacks and
hence robust watermarking is done by using wavelet
Medical Tensor wavelet (haar wavelet) Non- transforms. Finally, the watermarked image is again
tensor encrypted to increase the security of the medical
Images
wavelet
PSN NC SSIM Encry Decry PSNR image. Now the image which is in unreadable form is
R ption ption (dB) transmitted to the required person. The robustness of
(dB) Time Time the watermarks was not affected by common attacks
(S) (S) in future work.

Img1 68.17 1 0.831 223.65 274.31 46.32 BIBLIOGRAPHY

[1] Priyank Khare , Vinay Kumar Srivastava,” A


Img2 54.35 1 0.783 214.83 271.05 41.89
Secured and Robust Medical Image

Img3 67.61 1 0.895 238.19 283.40 45.62 Watermarking Approach for Protecting Integrity
of Medical Images”, Transaction on Emerging
Img4 64.38 1 0.792 217.63 269.28 39.50 Telecommunication,
https://doi.org/10.1002/ett.3918 March 2020.
Img5 62.13 1 0.847 208.56 259.62 48.61
[2] Aashiq Banu S, Rengarajan Amirtharajan,”A
Img6 59.52 1 0.713 215.27 264.59 47.06
robust medical image encryption in dual domain:
chaos-DNA-IWT combined approach”, Medical
Img7 56.31 1 0.874 232.35 285.07 39.19
& Biological Engineering & Computing,
Img8 61.85 1 0.882 218.52 271.52 45.63 doi:10.1007/s11517-020-02178-w , April 2020

It can be seen that, normalized coefficient (NC) value [3] Swaraja K, Meenakshi K, Padmavathi Kora,”An
is nearly 1 in all images which shows that the optimized blind dual medical image

978-1-6654-1960-4/21/$31.00 ©2021 IEEE 232

Authorized licensed use limited to: University of Houston Clear Lake. Downloaded on March 06,2022 at 22:46:07 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021).
IEEE Xplore Part Number: CFP21ONG-ART; 978-0-7381-1183-4

watermarking framework for tamper localization


[10] J. C. Dagadu and J. Li, ‘‘Context-based
and content authentication in secured
watermarking cum chaotic encryption for
telemedicine”, Biomedical Signal Processing and
medical images in telemedicine applications,’’
Control,https://doi.org/10.1016/j.bspc.2019.1016
Multimedia Tools Appl., vol. 77, no. 18, pp.
65,Janurary 2020.
24289–24312, Sep. 2018, doi: 10.1007/s11042-
[4] A Soualmi et al,” Multiple Blind Watermarking 018-5725-y
Framework for Security and Integrity of Medical
[11] S. M. Mousavi, A. Naghsh, A. A. Manaf, and S.
Images in E-Health Applications, International
A. R. Abu-Bakar, ‘‘A robust medical image
Journal of Computer Vision and Image Processing
watermarking against salt and pepper noise for
(IJCVIP)11(1) DOI: 10.4018/IJCVIP.2021010101
brain MRI images,’’ Multimedia Tools Appl.,
2021.
vol. 76, no. 7, pp. 10313–10342, Apr. 2017, doi:
[5] Ashima Anand & Amit Kumar Singh,” 10.1007/s11042-016-3622-9.
Watermarking techniques for medical data
[12] M. Ishtiaq, W. Ali, W. Shahzad, M. A. Jaffar,
authentication: a survey”, Multimedia Tools and
and Y. Nam, ‘‘Hybrid predictor based four-phase
Applications, https://doi.org/10.1007/s11042-020-
adaptive reversible watermarking,’’ IEEE
08801-0, February 2020
Access, vol. 6, pp. 13213–13230, 2018, doi:
[6] Amita Singha, Muhammad Ahsan Ullah, “An
10.1109/ACCESS.2018.2803301
image watermarking technique using hybrid
[13] K. Swaraja, K. Meenakshi, and P. Kora, ‘‘An
signals as watermarks,” Multimedia Systems,
optimized blind dual medical image watermarking
https://doi.org/10.1007/s00530-020-00708-y,
framework for tamper localization and content
October 2020.
authentication in secured telemedicine,’’ Biomed.
[7] Siddharth Bhalerao , Irshad Ahmad Ansari &
Signal Process. Control, vol. 55, Jan. 2020, Art.
Anil Kumar, A secure image watermarking for
no. 101665, doi: 10.1016/j.bspc.2019.101665.
tamper detection and localization”, Journal of
Ambient Intelligence and Humanized Computing,
[14] N. Jayashree and R. S. Bhuvaneswaran, ‘‘A
https://doi.org/10.1007/s12652-020-02135-3
robust image watermarking scheme using Z-
May 2020
transform, discrete wavelet transform and
[8] A. Bakshi and A. K. Patel, ‘‘Secure telemedicine
bidiagonal singular value decomposition,’’
using RONI halftoned visual cryptography
Comput., Mater. Continua, vol. 58, no. 1, pp.
without pixel expansion,’’ J. Inf. Secur. Appl.,
263–285, 2019, doi: 10.32604/cmc.2019.03924.
vol. 46, pp. 281–295, doi:
10.1016/j.jisa.2019.03.004, June. 2019.
[15] B. Lei, E.-L. Tan, S. Chen, D. Ni, T. Wang, and
[9]A Shankar & G Ayappan, “Finger Vein biometric
H. Lei, ‘‘Reversible watermarking scheme for
Authentication System,” International Journal of
medical image based on differential evolution,’’
Trend in Research and Development, Volume 4
Expert Syst. Appl., vol. 41, no. 7, pp. 3178–3188,
pp. 51-56, August 2017.
doi: 10.1016/ j.eswa.2013.11.019, June. 2014,

978-1-6654-1960-4/21/$31.00 ©2021 IEEE 233

Authorized licensed use limited to: University of Houston Clear Lake. Downloaded on March 06,2022 at 22:46:07 UTC from IEEE Xplore. Restrictions apply.

You might also like