Introduction

Digital information systems have been increasingly deployed in modern healthcare environments in the last decades. In fact, many hospital and healthcare centers around the world rely in their operation on hospital information systems (HIS), radiology information systems (RIS), and picture archiving and communication systems (PACS), among many other information and communications technology systems [13]. The availability of such systems facilitated sharing medical images and electronic patient records among clinicians and radiologists for telemedicine applications such as teleconsulting, telediagnosis, and telesurgery. Despite such innovative advancements, it is fairly easy for malicious adversary to intercept and tamper transmitted images when public networks are used. It is thus of a paramount importance to implement secured medical transfer schemes in order to achieve the wide range of benefits offered by telemedicine applications [4].

To secure the exchange of medical images between healthcare entities, telemedicine implementations must provide three security services: confidentiality, authenticity, and integrity [5, 6]. Confidentiality ensures that only authorized users have access to the transmitted image, whereas integrity verifies that the received image has not been manipulated by unauthorized users. Authenticity, on the other hand, proves that the received image comes from the correct source and belongs to the correct patient. These three services must be offered simultaneously to achieve reliable and secured telemedicine applications. Currently, cryptography and digital watermarking technologies are used to provide these security services [7, 8].

Cryptography is the approach adopted in the digital imaging and communications in medicine (DICOM) standard which uses symmetric encryption, hashing functions, and digital signatures to provide integrity and authenticity [911]. However, a major limitation of pure cryptography is that the loss or deletion of the attached digital signature makes the image untrustworthy and thus it becomes hard to verify its integrity and authenticity. This suggests that cryptography can only be used as a priori protection mechanism. On the other hand, pure watermarking methods achieve security in telemedicine by using robust and fragile watermarks [1214]. Robust watermarks are characterized by their resistance to common signal processing and malicious attacks; thus, they are appropriate for ownership verification and identity authentication. On the other hand, fragile watermarks do not survive signal processing attacks, making them appropriate for data integrity control and tamper detection.

To utilize the combined benefits of the two approaches, crypto-watermarking algorithms have been proposed in literature to address the security requirements of telemedicine applications [1518]. In the hybrid approach, watermarking is used as the implementation platform, and integrity and authenticity are implemented using cryptographic watermarks such as hash codes, cyclic redundancy codes (CRCs), and digital signatures. These cryptographic watermarks are embedded as robust or fragile watermarks depending on the required security service. That is, hash codes are commonly used to provide strict integrity of the medical image, whereas CRCs are more appropriately used to detect tampered areas in the image.

Different types of crypto-watermarking methods have been proposed in literature to provide security for exchanged medical images. These methods can be classified into three categories: irreversible methods, reversible methods, and region-based methods. The three types often involve a tradeoff between imperceptibility, robustness, and capacity. The irreversible watermarking methods are lossy in nature as they introduce permanent alterations to the original images even after the extraction of the embedded watermarks [1719]. Reversible methods, on the other hand, are lossless since they retain the original image after extracting the embedded watermarks [2025]. The third category is the region-based methods which involve segmenting the original medical image into two areas: region of interest (ROI) and region of non-interest (RONI). Embedding in either region can be done using non-reversible or reversible watermarking techniques [20, 26, 27].

In this paper, we propose a crypto-watermarking algorithm that uses multiple watermarks to provide authenticity, integrity, and confidentiality for medical images exchanged over public networks. The algorithm uses two robust watermarks representing the patient’s personal data and the hospital’s logo to implement authenticity. The two watermarks are embedded in the RONI of the image using singular value decomposition (SVD) in the discrete wavelets transform (DWT) domain. A cryptographic watermark representing the hash of the ROI of the image is also embedded in the RONI to provide strict integrity. Additionally, the algorithm provides content-based integrity of the ROI by incorporating a tamper localization scheme. The ROI of the image is encrypted before transmission to achieve confidentiality, and to achieve content-based integrity by localizing tampered blocks at the receiver’s side. Therefore, the uniqueness of the proposed algorithm is of twofolds. The first is in providing two levels of integrity verification: strict and content-based integrity of the image ROI, and the second by using symmetric encryption to provide confidentiality and tamper localization of the same region.

The paper is organized as follows. “Literature Survey” section describes recent research work in the area of secured telemedicine. “Image Preprocessing” section describes the process of segmenting the image into ROI/RONI zones and assigning the relevant watermarks to each region. The DWT-SVD watermarking algorithm, which incorporates the localized tamper detection functionality, is described in “Watermarking Procedures” section. Performance of the algorithm is evaluated in “Performance Results Analysis” section. Concluding remarks are given in “Conclusions” section.

Literature Survey

A few region-based medical image watermarking algorithms with tamper localization functionality have been proposed in literature. Liew et al. [28, 29] proposed a ROI/RONI algorithm in which the ROI is segmented into blocks of 40 × 40 pixels and the RONI into blocks of 2 × 2 pixels. The RONI is further divided into one area for authentication information embedding and one area for recovery information embedding. Tamper localization is implemented by computing the cyclic redundancy check (CRC) and hash functions of the ROI blocks, and embedding the resultant digest values in the form of watermarks in RONI. For recovery, the ROI is compressed using JPEG 2000 and embedded in RONI as a robust watermark using a 3-level DWT.

Al-Qershi and Khoo [30] proposed a scheme that divides the images into a ROI and a RONI. Patient’s data are embedded into the ROI using a reversible technique based on difference expansion, while tamper detection and recovery data are embedded into the RONI using a robust technique based on discrete wavelet transform. Tampering is detected locally at the block level by comparing the average value of each block in the ROI with the retrieved average value from the watermark. Tampered blocks are recovered and replaced with a lossy compressed ROI embedded as a watermark.

Guo and Zhuang [31] proposed a watermarking scheme with tamper localization capability based on difference expansion. The scheme introduces the concept of region of authentication (ROA) which can be flexibly partitioned into small regions as an image block or polygonal region in a multilevel hierarchical manner. A hashing function is used to produce digital signatures for each image block, which are then added to the watermark payload. To verify authenticity of the image, the signatures for the ROA are compared to detect any tampering. Tamper localization is implemented using the concept of ROI shading.

Tan et al. [32] proposed dual-layer watermarking scheme in which the tamper localization function was implemented by dividing the original image into 16 × 16 pixel blocks and computing the CRC for each block. Each CRC is embedded into its own block. In the event that the CRC cannot be embedded into its own block, the remaining bits are carried over to the next block. Tampering is localized by extracting the watermark and comparing the CRC of each block. If both CRCs do not match, the block will be identified as being tampered, hence achieving tamper localization.

A major drawback of the proposed algorithms is their extensive usage of cryptographic CRC watermarks to implement the tamper localization functionality. Other than being computation-intensive, the algorithms provide no evidence these cryptographic watermarks were extracted intact at the receiver side. Since a 1-bit change in a CRC or hash code will lead to a false localized tamper detection, extensive use of these cryptographic primitives is considered a major limitation of the proposed algorithms. Another drawback is the lack of evidence about robustness of the watermarks embedded in the RONI. In other words, the robustness of the algorithms was not evaluated properly using standard metrics such as normalized correlation and bit error rates to prove that the cryptographic watermarks could survive attacks such as additive noise and lossy compression.

Image Preprocessing

A major process in the proposed region-based watermarking algorithm is to separate the image into ROI/RONI regions, transform the segmented image into the frequency domain, and assign the watermarks to the different multi-resolution sub-bands. This process is described in the following sub-sections.

ROI/RONI Segmentation

The proposed watermarking algorithm is based on a region-selecting property to allow for localizing tampered regions in manipulated exchanged images. The region-selecting function, performed by a radiologist or a computer aided tool [33], separates the given medical image into two non-overlapping zones: region of interest (ROI) and region of non-interest (RONI). The ROI zone contains the significant information that the physicians utilize for diagnosis. Therefore, this region may not be used for watermark embedding in order to preserve its integrity and to prevent any compromise on the diagnostic value of the image. Since the RONI zone does not contribute to diagnosis, its integrity does not need to be preserved and thus it can be used for the insertion of robust watermarks. The size and shape of the two regions vary according to the modality and nature of the medical image. Figure 1a shows a generic medical image diagram partitioned into non-overlapping blocks, with the ROI and RONI zones separated by a polygon.

Fig. 1
figure 1

a ROI/RONI segmentation and block-based partitioning of a generic medical image diagram. b 1-level DWT decomposition of the segmented image

DWT Sub-band Decomposition

For effective watermarking, the segmented image is transformed into the frequency domain using a 1-level discrete wavelet transform (DWT). Four non-overlapping sub-bands are generated: LL, LH, HL, and HH. The ROI and RONI segmentation in each sub-band is defined by applying the ROI mapping procedure described in [34]. According to this mapping procedure, the ROI coordinates in each sub-band are derived from the spatial domain ROI coordinates based on the spatial self-similarity between the sub-bands. The four sub-bands with their ROI/RONI segmentations are shown in Fig. 1b.

Watermarks Generation and Assignment

Multiple watermarks are generated to address the different security requirements of medical image transmission. Two watermarks are used to authenticate the ownership and source of origin of the image, and a cryptographic hash watermark is used to verify the strict integrity of the ROI of the image. The three watermarks and their pre-assigned embedding locations are described below.

  1. 1.

    The patient information watermark is a 204 × 96 binary image generated from several attributes of a sample patient’s record, as shown in Fig. 2a. The 19,584-bit robust watermark serves for image ownership authentication and is embedded in the LH sub-band.

    Fig. 2
    figure 2

    a The patient’s information watermark. b The hospital logo watermark. c The ROI hash watermark

  2. 2.

    The hospital logo watermark is an 81 × 50 binary image shown in Fig. 2b. The 4050-bit robust watermark is sued to authenticate the source of origin of the image, and it is embedded in the HL sub-band.

  3. 3.

    The ROI hash watermark is a SHA-256 digest of the ROI of an MRI brain image. The 256-bit ROI hash watermark is formulated as the 2D image given in Fig. 2c. The watermark is used to verify the strict integrity of the ROI of the image, and is embedded in the HH sub-band.

Watermarking Procedures

The proposed watermarking algorithm consists of three procedures: watermark embedding, watermark extraction, and integrity verification procedures. The first procedure embeds the authenticity and integrity watermarks into the RONI, while the second extracts the watermarks from the same region at the receiving end. The third procedure verifies the integrity of the received image, and detects tampered blocks in the ROI of the image.

Watermark Embedding Procedure

The embedding procedure inserts the bit-patterns of the three watermarks in the RONI of each sub-band according to the following assignment: the patient information watermark in the LH sub-band, the hospital logo watermark in the HL sub-band HL, and the hash watermark in the HH sub-band. The operational steps of the procedure are depicted in Fig. 3 and described below in detail.

Fig. 3
figure 3

The RONI watermark embedding procedure

  1. Step 1

    (Block Watermarking) For each block B i in the RONI of the relevant sub-band (LH, HL, or HH), perform Step 1.1Step 1.3 until all watermark bits are embedded.

  2. Step 1.1

    (SVD Transformation). Apply the SVD operator on block B i . This results in decomposing the block’s matrix into three independent matrices.

    $$ {B}_i={U}_{Bi}{S}_{Bi}{V^T}_{Bi} $$
    (1)
  3. Step 1.2

    (LSB Embedding) Embed a single watermark bit into the upper element of the diagonal matrix S Bi by substituting the watermark bit W i with its least significant bit (LSB).

    $$ \mathrm{L}\mathrm{S}\mathrm{B}\left({S}_{Bi}\left(0,\ 0\right)\right)={W}_i $$
    (2)

    The LSB substitution is done by taking the integer value of S Bi (0,0) , preserving the fraction, placing the watermark bit at the LSB position of the integer, and adding the preserved fraction to the modified integer.

  4. Step 1.3

    (Inverse SVD) Apply the inverse SVD operator using the modified S Bi matrix to get the watermarked block Bi .

    $$ {B_i}^{\prime }={U}_{Bi}{S_{Bi}}^{\prime }{V^T}_{Bi} $$
    (3)
  5. Step 2

    (Inverse DWT) After embedding the three watermarks in sub-bands HL, LH, and HH, apply the inverse DWT operation on the whole image to produce the final watermarked image I .

Watermark Extraction Procedure

The proposed algorithm is blind in the sense that it does not require the original medical image in the extraction process. Therefore, the three watermarks are extracted blindly from the LSBs of the watermarked RONI blocks of each sub-band. The procedure is shown in Fig. 4 and described in detail in the steps that follow.

Fig. 4
figure 4

RONI watermark extraction procedure

  1. Step 1

    (DWT Decomposition) Compute the 1-level DWT for the watermarked image I ’. Four non-overlapping sub-bands are produced: wLL 1 , wLH, wHL, and wHH.

  2. Step 2

    (ROI/RONI Segmentation) Define the ROI and RONI zones in each sub-band by applying the ROI mapping procedure described in [34].

  3. Step 3

    (Sub-band Partitioning) Partition each sub-band into non-overlapping blocks, as shown in Fig. 1b.

  4. Step 4

    (Watermarks Extraction) For each block B i in the RONI of the relevant sub-band, perform Step 4.1.Step 4.3 until all watermark bits are extracted.

  5. Step 4.1

    (SVD Transformation) Apply the SVD operator on watermarked block B i . This results in decomposing the block’s matrix into three independent matrices.

    $$ {B_i}^{\prime }={U}_{Bi}{S_{Bi}}^{\prime }{V^T}_{Bi} $$
    (4)
  6. Step 4.2

    (LSB Extraction) Extract the embedded watermark bits from the upper diagonal element of S Bi as follows.

    $$ {W_i}^{\prime }=LSB\left({S_{Bi}}^{\prime}\left(0,\ 0\right)\right) $$
    (5)

    The LSB extraction is done by taking the integer value of the S Bi element and retrieving the watermark bit at the LSB position of the integer.

  7. Step 5

    (Watermarks Reconstruction) Reconstruct the three watermark patterns by merging all extracted watermark bits from the RONI blocks of each sub-band.

  8. Step 6

    (Image Authentication) The physicians at the receiving side authenticate the image in terms of ownership and source of origin. The image ownership is authenticated by verifying the extracted patient’s information watermark. Similarly, the image source of origin is authenticated by verifying the extracted hospital logo watermark. Authentication is verified if a match exists between the received and expected or reference watermarks.

Integrity Verification Procedure

The physicians at the receiving side have the option of verifying the integrity of the ROI as a whole (strict integrity), or by verifying the integrity of the ROI on block-by-block basis (localized tamper detection). The integrity verification steps are described below.

  1. Step 1

    (Strict Integrity Verification) Compute the hash value of the ROI of the received watermarked image I’ and compare it with the ROI hash watermark extracted from the RONI. If the correlation between the two hash values is higher than a preset threshold, the integrity of the ROI is verified; otherwise, the ROI is tampered. The process is illustrated in Fig. 5 for an MRI test image.

    Fig. 5
    figure 5

    Strict integrity verification of ROI of the image

  2. Step 2

    (Encryption-based localized tamper detection procedure) The proposed algorithm achieves localized tamper detection using a unique encryption-based detection scheme shown in Fig. 6 and described in Step 2.1.Step 2.4.

    Fig. 6
    figure 6

    Localized tamper detection procedure

  3. Step 2.1

    (ROI Encryption) At the sender’s side, encrypt ROI using the standard encryption standard AES-CBS. The encryption process is done as follows.

    1. a.

      Formulate the whole ROI into a one-dimensional vector

    2. b.

      Divide the vector into blocks of 16 bytes (128 bits) each

    3. c.

      Apply AES-CBS on each segment using a zero initialization vector (IV)

  4. Step 2.2

    (ROI Replacement) Replace the plain ROI in the watermarked image with the encrypted ROI. The step provides confidentiality for the ROI of the image.

  5. Step 2.3

    (ROI Decryption) At the receiver’s side, decrypt the ROI using the AES-CBS encryption standard. The decryption is applied on the encrypted 128-bit blocks of the ROI.

  6. Step 2.4

    (Detection of Tampered Blocks) A block is considered tampered if the decryption process fails to restore it to its original state. This is by virtue of the avalanche effect of the AES-CBS standard which states that any slight change in the encrypted block will lead to unsuccessful decryption to the original state of the block. The un-decrypted block can be located visually and by performing the following steps:

    1. a.

      Compute the difference between the maximum and minimum pixel values within each decrypted ROI block.

    2. b.

      Compare the difference value computed for each block against some threshold, empirically found to be 150, which corresponds to half the maximum possible pixel value. If the difference between the maximum and minimum pixel values within the block exceeds the preset threshold, then the block is considered tampered.

Performance Results Analysis

A large set of 8-bit gray-scale medical images have been used to evaluate the performance of the proposed algorithm. The test images used for experimentation represent three common modalities (MRI, ultrasound, X-ray) and have different sizes ranging from the standard 512 × 512 pixels to the larger 2048 × 2048 pixels. The simulation results presented in this section have been obtained for the larger 2048 × 2048 images since they provide higher embedding capacities.

Image segmentation of selected test images into ROI and RONI zones is shown in Fig. 7, where polygons encapsulate the ROI of each image. Description of the watermarks embedded in the RONI of each image has been given in “Image Preprocessing” section. Simulation experiments were conducted using MATLAB R2012a running on an AMD Phenom II X4 965 Processor @ 3.40 GHz. Performance results with respect to imperceptibly, robustness, localized tamper detection, and data payload are presented in the following sub-sections.

Fig. 7
figure 7

Benchmark medical images with ROIs shown in polygons. a MRI image, b ultrasound image, and c X-ray image

Imperceptibility Results

A visual subjective comparison between the original images, shown in Fig. 7, and watermarked images, shown in Fig. 8, indicates that high imperceptibility has been achieved by the proposed algorithm. For better assessment, we used the peak signal-to-noise ratio (PSNR) as an imperceptibility objective metric and obtained the following PSNR values: 35.1797, 36.6125, and 35.2988 for the MRI, ultrasound, and X-ray images, respectively.

Fig. 8
figure 8

Watermarked benchmarked medical images. a. MRI image, b. ultrasound image, and c. X-ray image

It is instructive to note here that the achieved PSNR values are a little lower than the recommended 40 dB. However, since the PSNR metric is not an ideal objective evaluation metric, we believe that the subjective evaluation we have done to evaluate the quality of the watermarked images, alongside with the reasonably high PSNR values we obtained, demonstrate the imperceptibility exhibited by the proposed algorithm.

Robustness Results

The transmitted medical images may undergo modifications by different types of signal processing operations. This may affect their perceived quality and corrupt the watermarks embedded within their RONIs. Therefore, we evaluated the robustness provided by the proposed algorithm against several signal processing operations: additive Gaussian noise, additive salt and pepper noise, and JPEG compression. The robustness is evaluated using the normalized correlation factor which measures the similarity between the original and extracted watermarks. It is obvious from the robustness results given in Tables 1, 2, and 3 that robustness has been achieved to that extent that authentication and verification can be done with confidence using the extracted watermarks. The patient information and hospital logo watermarks can be faithfully used to authenticate the ownership and source of origin of the image, and the hash watermark to verify the strict integrity of the ROI of the image. Similar results have been achieved for the X-ray and ultrasound images.

Table 1 Robustness of the watermarked MRI image against additive Gaussian noise
Table 2 Robustness of the watermarked MRI image against additive salt & pepper noise
Table 3 Robustness of the watermarked MRI image against JPEG compression

Tamper Localization Test

The proposed algorithm achieves content-based integrity of the transmitted image using a tamper detection and localization scheme. The scheme, as described in the previous section, encrypts the ROI of the image using the AES-CBS block cipher, and replaces the plain ROI with the encrypted ROI. At the receiver side, ROI is decrypted block-by-block, where the block size is 128 bits. A block is considered tampered if the decryption process fails to restore the block to its original state. This is by virtue of the avalanche effect inherent in AES-CBS which implies that any slight change in the encrypted block will lead to unsuccessful decryption to the original state of the block. As shown in Table 4, tampering the encrypted ROI using additive white noise, additive salt and pepper noise, and lossy JPEG compression caused the decryption process to produce random output instead of the original ROI.

Table 4 Effect of severe tampering on the decryption process

To show the effectiveness of the tamper localization scheme, we slightly tampered the encrypted ROI by modifying one single bit. As shown in Table 5, the decryption process restored the encrypted ROI to its original state except for the block on which tampering was performed (as indicated by the white circles). To further explore the functionality of the scheme, two distant bits were flipped. As shown in the table, the blocks to which the bits belong were not decrypted correctly. As mentioned earlier, this encryption-based scheme provided tamper localization as well as ROI confidentiality, thus achieving two main requirements of secured telemedicine.

Table 5 Illustration of the tamper localization scheme of the algorithm

Data Paylaod

The embedding capacity provided by the algorithm depends on size of the image, the relative size of ROI and RONI segments, block size, and number of DWT decomposition levels. According to the embedding capacity equation given below, larger images, smaller block size, and higher DWT levels will provide higher embedding capacity. It is instructive to note here that the capacity equation has been derived in such a way that capacity calculation is confined to three sub-bands (LH, HL, HH), since sub-band (LL) has been excluded from watermark embedding.

$$ C=3\times \mathrm{Number}\ \mathrm{of}\ \mathrm{Blocks}\times {4}^{\mathrm{DWT}\ \mathrm{Level} - 1} $$
(6)

where,

$$ \mathrm{Number}\;\mathrm{of}\;\mathrm{Blocks}=\frac{\mathrm{Total}\;\mathrm{Image}\;\mathrm{Size}}{\mathrm{Block}\;\mathrm{Size}} $$
(7)

Number of RONI blocks in each of the three medical images and the corresponding embedding capacities are shown in Table 6. The capacities are calculated based on the assumption that the image size is 2048 × 2048, block size 8 × 8, and DWT decomposition is performed for one level only. ROI capacities are not included in the table since the ROI of the image is not watermarked in the proposed algorithm.

Table 6 Available watermark embedding capacity in the RONI

As shown in Table 7, the available embedding capacity of our region-based watermarking algorithm far exceeds payload capacity needed to embed the watermarks used in the algorithm.

Table 7 Comparison between the available and required payload capacities

The capacity of a given medical image can be further increased to accommodate larger watermarks by partitioning the original image into blocks with smaller size. As an example, Table 8 shows the capacity gained by partitioning the 2048 × 2048 MRI image into 8 × 8, 4 × 4, and 2 × 2 blocks. The capacity gain is due to the fact that one single bit only is embedded in each block regardless of its size as we have described in the previous section.

Table 8 The available payload capacity as a function of block size

Comparison with Other Algorithms

In this sub-section, a performance comparison is carried out between the proposed algorithm and other region-based algorithms reported in the literature. The comparisons are made with crypto-watermarking, pure watermarking, and pure cryptographic-based algorithms.

A few region-based crypto-watermarking algorithms with tamper localization functionality have been proposed the in literature [20, 2730]. One major drawback of the proposed algorithms is the extensive use of cryptographic watermarks, such as CRC-16 and hash codes, to implement the tamper localization functionality. Other than being computationally intensive, the algorithms provide no evidence that these cryptographic watermarks were extracted intact at the receiver side. Since a 1-bit change in a CRC or hash code will lead to a false localized tamper detection, extensive use of such cryptographic watermarks is considered a major limitation of the proposed algorithms. Moreover, the robustness of the proposed algorithms was not evaluated properly using standard metrics such as normalized correlation and bit error rates to prove that the cryptographic watermarks could survive attacks such additive Gaussian noise and JPEG compression. On the other hand, our encryption-based tamper localization scheme offers confidentiality for the ROI of the image in addition to the accurate localized tamper detection rates. Another limitation in the proposed algorithms is their inefficient ROI recovery schemes. Compressing ROI using the lossy JPEG compression standard, and embedding the compressed file as a recovery watermark in the RONI of the image, is of a limited practical usability. This is by virtue of the fact that the recovered ROI is far from being identical to the original ROI, and thus it may not be appropriate for diagnostic purposes [35]. Similarly, lossless compression, which has been used by some algorithms, may allow for exact recovery of the ROI of the image; however, the time spent in compressing and decompressing the ROI watermark will introduce a computational overhead that will limit its usability. Furthermore, the size of the ROI varies from one modality to another, and thus it is not always guaranteed that the RONI will be large enough to accommodate the compressed ROI watermark. For these obvious limitations, the recovery feature has not been incorporated in our proposed algorithm.

The proposed algorithm can be compared with pure watermarking methods such as the scheme described in [14]. This scheme provides authenticity to the transmitted medical image using a method similar to the method described in the paper; however, integrity and confidentiality are provided differently. Integrity is provided by embedding local fragile watermarks in the region of interest (ROI) of the image using a reversible scheme in the spatial domain, whereas confidentially is achieved as a byproduct of hiding the patient’s personal data as an authentication robust watermark. As described throughout the paper, the proposed algorithm achieves integrity and confidentially using more effective methods. The algorithm provides two levels of integrity verification: strict and content-based integrity of the image ROI, and the second by using symmetric encryption to provide confidentiality and tamper localization of the same region.

Finally, when compared with the crypto-based DICOM standard, it is important to emphasize that the proposed algorithm achieves confidentiality, authenticity, and integrity of the transmitted image. Authenticity and integrity are achieved as described in “Image Preprocessing” section, and confidentiality is achieved by virtue of encrypting the ROI before transmission. On the other hand, the Digital Signature Profiles of DICOM’s part 3.15 addresses authenticity and integrity of the medical image; however, confidentially is not addressed in the Basic Application Level Confidentiality Profile of the standard [36]. Moreover, the digital signature stored in the header of the DICOM image provides authenticity and integrity of the image; however, the signature is susceptible to loss or degradation during compression or transmission, thus it may not be always available for verification. As for the header data of the DICOM image, confidentiality is addressed by the DICOM standard; however, authenticity and integrity are not addressed. This is a major limitation of the DICOM standard since the security of the header data of the image is as important as the security of its pixel data of the image. The comparison between the proposed algorithm and the DICOM standard is summarized in Table 9.

Table 9 Comparison between the proposed algorithm and the DICOM standard

Conclusions

In this paper, we proposed a crypto-watermarking algorithm capable of providing secured exchange of medical images between healthcare entities. The algorithm is based on segmenting the image into a ROI and a RONI zones to preserve the ROI from any distortion that will limit its diagnostic value. Two robust watermarks, representing the patient’s personal data and the hospital’s logo, are used to implement authenticity in the RONI of the image using singular value decomposition in the discrete wavelets transform domain. A cryptographic hash watermark is also embedded in the RONI to provide strict integrity of the ROI. Additionally, the ROI is encrypted before transmission to achieve confidentiality, and to localize tampered regions at the receiver’s side. The uniqueness of the proposed algorithm is of twofolds: providing strict and content-based integrity of the ROI of the image, and using symmetric encryption to provide confidentiality and tamper localization for the ROI. Performance of the algorithm was evaluated using gray-scale medical images of different modalities with respect to imperceptibility, robustness, capacity, and tamper localization. The results showed the effectiveness of the algorithm in providing the desired security requirements of telemedicine applications. Our future research will focus developing new watermarking algorithm to handle multi-slice and multi-frame medical images.