Abstract
This paper presents a new robust and secure digital watermarking scheme for its potential application in Telemedicine. The algorithm embeds medical text watermarks such as patient’s identity, image identity code and doctor’s identity into selected sub-band discrete wavelet transform (DWT) coefficients of the cover medical image using spread-spectrum technique. In the embedding process, the cover image is decomposed up to third level DWT coefficients. Three different text watermarks are embedded into the selected horizontal and vertical sub band DWT coefficients of the first, second and third level respectively. Selection of these coefficients for embedding purpose is based on threshold criteria defined in this paper. Robustness of the proposed watermarking scheme is further enhanced by applying error correcting code to the ASCII representation of the text watermark and the encoded text watermark is finally embedded into the cover medical image. It is found that the proposed scheme correctly extracts the embedded watermarks without error and provides high degree robustness against numerous known attacks while maintaining the imperceptibility of watermarked image.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
Advancements in high-bandwidth digital communication technologies has opened up newer opportunities of transmitting medical data across geographical boundaries through Internet, mobile networks, and other wireless/wired communication channels and thus covering rural/remote areas, accident sites, ambulance, and hospitals. Transmission of medical data over an open communication channel poses different possibilities of threat that can severely affect its authenticity, integrity, and confidentiality. This calls for implementing some kind of medical watermarking scheme to avoid prompting attention and preventing access by an unintended recipient. Digital watermarking of medical image provides the best solution to these issues [1]. Despite the broad literature on various application fields, little work has been done towards the exploitation of health-oriented perspectives of watermarking [2–7]. Medical image watermarking requires extreme care when embedding additional data within the medical images because the additional information must not affect the image quality. Confidentiality, authentication, integrity and availability are important security requirements with electronic patient record (EPR) data exchange through open channels [8, 9]. Image watermarking techniques are distinguished on the basis of two domain methods [10]: Spatial domain method and transform domain method. In spatial domain methods [11, 12] (LSB substitution, spread spectrum and patchwork), the data is embedded directly by manipulating the pixel values, bit stream or code values of the host signal. Spatial domain methods are less complex but are not robust against attacks whereas transform domain watermarking techniques are more robust. In this method, the data is embedded by modulating the coefficients in transform domain like discrete Fourier transform (DFT), discrete Cosine transform (DCT) and discrete wavelet transform (DWT) etc. Advantages of watermarking in wavelet transform domain includes- space frequency localization, multi-resolution representation, multi-scale analysis and linear complexity [13–15]. Watermarking technique can also be further classified as reversible and irreversible [16, 17]. The reversible watermarking develops the techniques to extract exactly the original image by avoiding the irreversible distortions in the host image. This technique is mainly used in the field of medical image watermarking to avoid the distortion that may result into faulty diagnosis. Due to increase in medical identity theft there is a great demand of secure watermarking schemes [18–20]. This calls for the development of secure medical data/image watermarking schemes. The problem of watermark security can be solved using spread-spectrum scheme [8, 21–26]. Many wavelet based watermarking schemes were proposed for medical images [27–30]. Authors of this paper have presented a new wavelet based watermarking scheme for image watermarks using spread-spectrum [31]. This paper investigates the performance of watermarking algorithm proposed in Ref. [31] for text file watermark where each character is represented in binary format using ASCII codes. A pair of pseudo noise (PN) sequences is generated corresponding to each bit of text watermark. These PN sequences are embedded into selected wavelet coefficients in column wise operation. Performance of the proposed algorithm has been extensively evaluated against numerous known attacks and results are compared with some latest reported algorithms [26] and it is found that the algorithm gives superior robustness performance without much degradation in the image quality.
2 Spread-Spectrum Watermarking in DWT Domain
The proposed DWT based spread-spectrum watermarking scheme embeds encoded text medical watermarks into cover MR medical image with the aim to achieve higher degree of robustness while maintaining imperceptibility. A brief description of the related concepts is as follows:
2.1 Watermarking in DWT Domain
Due to its ability to provide excellent multi-resolution analysis, space-frequency localization and superior HVS modeling, wavelet-based watermarking has recently gained great attention [32]. DWT separates an image into a lower resolution approximation image (LL1) as well as horizontal (HL1), vertical (LH1) and diagonal (HH1) detail components. Dyadic sub-band decomposition of DWT coefficients at higher levels offers added benefits like increased robustness, tolerance to various compression algorithms and filtering as it allows us to use higher energy regions for embedding where high degree of robustness is achieved as the cost of imperceptibility.
2.2 Spread-Spectrum Watermarking Principle
In spread-spectrum watermarking technique [8], the watermark is spread over many frequency bins so that the energy in any one bin is very small and thus undetectable. Spreading the watermark throughout the spectrum of an image ensures a large measure of security against unintentional or intentional attack as location of the watermark is not obvious and frequency region is selected in a fashion that ensures sufficiently small energy in any single coefficient. A watermark that is well placed in the frequency domain of an image will be practically impossible to detect.
2.3 Error Correction Codes
Error correcting codes are used for reducing probability of error during data transmission over noisy channels. It case of watermarking, ECC can be applied with the objective of enhancing bit error rate (BER) performance of the extracted watermark. In error correcting process, the sender adds redundant bits to the original message which is used for error detection or error correction on the receiver side. BCH code is a class of cyclic codes that includes both binary and non-binary alphabets. Binary BCH codes can be constructed with the parameters (n, k, t): where, n = length of the code word (BCH coded binary sequence), k = length of signature (original binary sequence), t = no. of bit errors this BCH can correct.
In this paper, BCH code has been used along with the proposed watermarking scheme and performance of the extracted watermark is analyzed with or without BCH coder.
3 Performance Measures
The performance of the watermarking algorithm can be evaluated on the basis of its robustness and imperceptibility. Larger peak signals-to-noise ratio (PSNR) indicates that the watermarked image more closely resembles the original image and hence more imperceptibility. Generally, watermarked image with PSNR value greater than 27 dB is acceptable [22]. PSNR is defined as
where the mean square error (MSE) is defined as
where I ij is a pixel of the original image of size X × Y and W ij is a pixel of the watermarked image of size X × Y. Robustness of the algorithm is determined in term of bit error rate (BER). BER is defined as ratio between number of incorrectly decoded bits and total number of bits. It is suitable for random binary sequence watermark. Ideally it should be zero.
4 Proposed Algorithm
This paper proposes a new DWT based spread-spectrum watermarking algorithm for embedding text watermarks using medical images as cover. Dyadic sub-band decomposition is performed on the cover image using Haar wavelet transform. The text watermark used in the algorithm is converted into binary format using ASCII codes. In the embedding process, the cover image is decomposed up to third level DWT. The text watermark is embedded into horizontal and vertical sub-band coefficients of the first, second and third level. Different watermark bits are hidden in the same transform coefficients of the cover image using uncorrelated codes, i.e. low cross correlation value (orthogonal/near orthogonal) among codes. For each message (text) bit, two different PN sequence vectors of size identical to the size of DWT column vector are generated. Based on the value of the bit of the message vector, the respective two PN sequence pairs are then added/subtracted to/from selective columns of wavelet coefficient. This selection is done by thresholding the coefficient values present in that column. Proposed algorithm procedure is described in Fig. 1. The column wise DWT coefficients of second level horizontal and vertical sub-bands are taken. In each column, the coefficients fulfilling the threshold criteria are used for embedding and rest of coefficients remain unchanged as shown in Fig. 1. Values of coefficients S2 and S3 are changed after watermarking as these value lie inside the threshold range while values of coefficients S1 and S4 lying outside the threshold criteria, are remain unchanged. The wavelet coefficients of cover image are divided into b w number of bins having equal width for desired level. Bin having maximum number of coefficients is selected and represented as max_bin. In medical images, the DWT coefficients are mostly concentrated toward the origin. Thus, max_bin has coefficients concentrated toward origin. Width of each bin is obtained by using formula:
b 1 and b 2 are the minimum and maximum values within max_bin. In each column, the coefficients under the threshold criteria are used for embedding the data bit as follows:
where V is embeddable wavelet coefficient column vector of the cover image, W is the wavelet coefficient vector after watermark embedding, k is the gain factor, X is the PN sequence vector and b is the message bit that has to be embedded. Generation of a pair of PN sequences for embedding each bit enhances the security of the watermarking algorithm. Following steps are applied in data embedding process:
4.1 Text Embedding Process
-
(i)
Read the cover image I(M,N) of size M × N.
-
(ii)
Read the text watermark to be hidden and convert it into binary sequences Dd (d = 1 to n).
-
(iii)
Perform BCH encoding of Dd to obtain the BCH encoded binary sequences.
-
(i)
Transform the host image using “Haar” wavelet transform and get first, second and third level sub-band coefficients.
-
(ii)
Generate n different PN sequence pairs (PN_h and PN_v) each of \( \frac{M}{{2^{\ell } }} \times 1 \) using a secret key to reset the random number generator for each level \( \ell \) = 1–3.
-
(iii)
For d = 1 to n, and \( \ell \) = 13
$$ {\text{p}} = \left\{ {\begin{array}{*{20}l} {{\text{modulo}}\left( {{\text{d}},\frac{\text{N}}{{2^{\ell } }}} \right)} \hfill & {{\text{if}}\;{\text{modulo}}({\text{d}},\frac{\text{N}}{{2^{\ell } }}) \ne 0} \hfill \\ {\frac{\text{N}}{{2^{\ell } }},} \hfill & { {\text{else}}} \hfill \\ \end{array} } \right. $$where p is the column in which sequence has to be added, \( \frac{\text{N}}{{2^{\ell } }} \) is the number of columns in coefficient matrix and \( \ell \) represents one of three sub-bands.
Case 1 When message vector bit = 0
Hence 1 ≤ p ≤ (N/2ℓ), For i = 1 to (M/2ℓ)
Case 2 When message vector bit = 1
Hence 1 ≤ p ≤ (N/2ℓ), For i = 1 to (M/2ℓ)
where k is the gain factor used to specify the strength of the embedded data
-
(iv)
Apply inverse “Haar” Wavelet transform to get the final watermarked image I w (M, N).
4.2 Text Watermark Extraction Process
To detect the embedded watermark, the same PN sequence vectors are generated which were used during insertion of watermark by using same state key and their correlation with the corresponding selected detail sub-bands DWT coefficient columns is determined. Average of n correlation coefficients corresponding to each PN sequence vector is obtained for both LH and HL sub-bands. Mean of the average correlation values are taken as threshold T for message extraction. During detection, if the average correlation exceeds T for a particular sequence, a “0” is recovered; otherwise a “1” is recovered. The recovery process then iterates through the entire PN sequence until all bits of the watermark are recovered. For extracting the watermark, following steps are applied to the watermarked image:
-
(i)
Read the watermarked image I w (M, N)
-
(ii)
Transform the stego image using “Haar” Wavelet transform and get first, second and third level sub-band coefficients.
-
(iii)
Generate one’s sequences (msg) equal to message vector (from 1 to n).
-
(iv)
Generate n different PN sequence pairs (\( PN^{\ell } h1 \) and \( PN^{\ell } v1 \)) each of size \( \frac{M}{{2^{\ell } }} \times 1 \) using same secret key to reset the random number generator for each level ℓ = 1–3.
For d = 1 to n, generate \( PN^{\ell } h2\left( d \right) \) and \( PN^{\ell } v2\left( d \right) \) as
For i = 1 to (M/2ℓ)
Calculate the correlations between the values cH1ℓ and PN ℓ h2 and store in corr_H (d) and cV1ℓ and PN ℓ v2 and store in corr_V (d).
corr_H (d) = correlation between PN ℓ h2 (d) and cH1ℓ (pth column)
corr_V (d) = correlation between PN ℓ v2 (d) and PN ℓ v2 (pth column)
Hence 1 ≤ p ≤ \( \frac{N}{4} \)
-
(v)
Calculate average correlation avg_corr (d) = (corr_H (d) + corr_V(d))/2 at each level.
-
(vi)
Calculate the corr (mean) = mean of all the values stored in avg_corr (d) at each level.
-
(vii)
Extract the watermark bit stream, using the relationship given below
for d = 1 to n
if avg_corr (d) > corr (mean)
Msg (d) = 0.
-
(viii)
Apply BCH decoding on the extracted watermark to obtain Msg.
-
(ix)
This Msg to get the binary matrix representation of the text watermark.
-
(x)
Convert the matrix back to string to get the recovered watermark.
5 Experimental Results and Discussion
Experiments were carried out using 8-bit gray-scale MR images of size 512 × 512 as cover image [33]. The medical information such as doctor’s identification code of eight characters, image/diagnostic code of eight characters and patient name of eight characters are embedded into third level HL3 and LH3 sub-bands, second level HL2 and LH2 sub-bands and the first level HL1 and LH1 sub-bands respectively. Also, BCH (Bose, Ray-Chaudhuri, Hocquenghem) error correcting code is applied to the ASCII representation of the text and the encoded text watermark is then embedded into the cover medical images. Effect of BCH coding is observed by embedding text watermarks in two different ways: without ECC and with BCH (127, 64) code.
The encoded text watermark length for BCH is 381 bits. Strength of watermark is varied by varying the gain factor in the watermarking algorithm. The proposed medical watermarking scheme has been implemented in MATLAB environment. Imperceptibility performance of the scheme is evaluated by calculating the PSNR between cover image and watermarked image whereas robustness performance is measured by calculating BER between original and extracted watermark (Table 1).
In Table 2, robustness performance of the proposed algorithm with/without BCH coder has been tested at gain = 10 against different attacks. With BCH coder, BER value = 0 is obtained against JPEG compression (quality factor = 90) whereas without BCH code it comes out to be 0.0052. It is also observed from the table that the implementation of BCH coder improves the BER performance for sharpening mask noise attack with threshold = 1. Table 3 shows PSNR and BER performance of the proposed algorithm for different imaging modalities at varying gain factor. It is observed that ultrasound image gives maximum PSNR = 41.30 dB at a gain factor of five whereas minimum BER value = 0 is obtained with MRI image at gain factor of 11. Table 4 provides the performance comparison with the existing methods. In this table, the maximum BER value with proposed method has been obtained as 0.0 against 1.5306 obtained by Kumar et al. in Ref. [26]. The maximum PSNR value has been obtained with this method is 45.51 dB. However, the maximum PSNR value achieved by the proposed method is 49.12 dB. The existing method can embed only 196 bits only whereas 381 bits can be embedded by the proposed method. Therefore, it can be concluded that the watermarking method proposed in this paper performs very well in terms of image quality of the watermarked image, robustness of the extracted watermark and embedding capacity also. Figure 2 shows original MR image and watermarked image and Fig. 3 shows the extracted watermark image at gain factor = 15. PSNR and BER performance of the proposed watermarking scheme with and without BCH coder are illustrated in Table 1. In this table, highest PSNR obtained without and with BCH coder are 43.96 and 40.48 dB respectively (at gain = 5) whereas BER obtained without and with BCH coder are 0.0236 and 0.0183 respectively. It is also observed that the watermarking scheme with BCH coder achieves desired zero BER at gain factor of 15 but its PSNR performance is slightly compromised i.e. 29.46 dB as compared to 34.95 dB achieved without coder.
6 Conclusion
This paper proposed a new robust and secure watermarking scheme based on dynamic selection of DWT coefficients for embedding text watermarks like patient’s identity, image code, and doctor’s identity. Spread-spectrum technique along with BCH error correcting code was used to enhance robustness performance of the proposed algorithm. Proposed watermarking algorithm was analyzed and compared with some latest reported watermarking algorithms and our method gave superior performance. Use of BCH error correcting code significantly improved the BER performance of the extracted watermark. For further improvement in error correction capability, length of the error correction code may be suitably increased. The proposed watermarking algorithm can be potentially used in secure and bandwidth efficient telemedicine application.
References
Mostafa SAK, El-sheimy N, Tolba AS, Abdelkader FM, Elhindy HM (2010) Wavelet packets-based blind watermarking for medical image management. Open Biomed Eng J 4:93–98
Chao HM, Hsu CM, Miaou SG (2002) A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6(1):46–53
Acharya UR, Anand D, Bhat PS, Niranjan UC (2001) Compact storage of medical images with patient information. IEEE Trans Inf Technol Biomed 5(4):320–323
Coatrieux G, Lecornu L, Roux Ch, Sankur B (2006) A review of image watermarking applications in healthcare. IEEE Eng Med Biol Soc 1:4691–4694
Giakoumaki A, Pavlopoulos S, Koutsouris D (2004) A medical image watermarking scheme based on wavelet transform, Proceedings 25th Annual International Conference of IEEE-EMBS, San Francisco, p 1541–1544
Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Secure and efficient health data management through multiple watermarking on medical images. Med Biol Eng & Comput 44:619–631
Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10:722–732
Kumar B, Singh HV, Singh SP, Mohan A (2011) Secure spread-spectrum watermarking for telemedicine applications. J Inf Secur 2:91–98
Mohanty SP (1999) Watermarking of digital images, M. S. Thesis, Indian Institute of Science, India
Wolak MC (2000) Digital watermarking. Preliminary proposal. Nova Southeastern University, United States
Nikolaidis N, Pitas I (1999) Digital image watermarking: an overview. IEEE Int Conf Multimed Comput Syst 1:1–6
Cox IJ, Miller ML (2002) The first 50 years of electronic watermarking (EURASIP). J Appl Signal Process 2002:126–132
Meerwald P, Uhl A (2001) Survey of wavelet-domain watermarking algorithms. In: Proceedings of the SPIE security and watermarking of multimedia contents, San Jose, p 505–516
Hajjara S, Abdallah M, Hudaib A (2009) Digital image watermarking using localized biorthogonal wavelets. Eur J Sci Res 26(4):594–608
AH Paquet, RK Ward (2002) Wavelet-based digital watermarking for authentication. In: Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, Winnipeg 2, 879–884
Feng JB, Lin IC, Tsai CS, Chu YP (2006) Reversible watermarking: current and key issues. Int J Netw Secur 2(3):161–170
Lee S, Chang CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. In: IEEE Transaction on Information Forensics and Security 2(3):330–321
Terry M (2009) Medical identity theft and telemedicine security. Telemed e-Health 15(10)
Dan B (2012) http://www.fiercehealthit.com/story/researchers-use-digital-watermarks-protect-medical-images
Ollove M (2014) www.usatoday.com/story/.../stateline-identity-thefts-medical.../5279351
Kumar B, Anand A, Singh SP, Mohan A (2011) High capacity spread-spectrum watermarking for telemedicine applications, World Acad Sci Eng Technol 79
Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Malvar HS, Florencio DAF (2003) Improved spread spectrum: a new modilation technique for robust watermarking. IEEE Trans Signal Process 51(4):898–905
Perez-Freire L, Perez-Gonzalez F (2009) Spread-spectrum watermarking security. IEEE Trans Inf Forensics Secur 4(1):2–24
Xuan G, Yang C, Zheng Y, Shi YQ, Ni Z (2004) Reversible data hiding based on wavelet spread spectrum, IEEE International workshop on multimedia signal processing (MMSP2004), Siena, Italy, 211–214
Kumar B, Kumar SB, Chauhan DS (2014) Wavelet based imperceptible medical image watermarking using spread-spectrum, 37th International Conference on telecommunications and signal processing, Berlin Germany, 660–664
Umaamaheshvari A, Thanushkodi K (2014) Image security through watermarking. J Med Imaging Health Inf 4:277–284
Dharwadkar NV, Amberker BB (2012) Secured and distortion less gray-scale medical image watermarking scheme. J Med Imaging Health Inf 2:250–256
Venkatram N, Reddy LSS, Kishore PVV (2014) Multiresolution medical image watermarking for telemedicine applications. CiiT Int J Digit Image Process 6:6
Hajjaji MA, Bourennane El-B, Ben Abdelali A, Mtibaa A (2014) Combining Haar wavelet and Karhunen Loeve transforms for medical images watermarking. BioMed Res Int 2014:1–15
Singh AK, Kumar B, Dave M, Mohan A Multiple watermarking on medical images using selective dwt coefficients, J Med Imaging Health Inf, American Scientific Publisher, USA, 2014 (Accepted)
Singh AK, Dave M, Mohan A (2013) A hybrid algorithm for image watermarking against signal processing attack. S Ramanna et al. (Eds.) Proceedings of 7th Multi-disciplinary international workshop in artificial intelligence, Krabi-Thailand, Lecture Notes in Computer Science (LNCS) 8271:235–246
MedPix™Medical Image Database available at http://rad.usuhs.mil/medpix/medpix.html
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Singh, A.K., Kumar, B., Dave, M. et al. Robust and Imperceptible Spread-Spectrum Watermarking for Telemedicine Applications. Proc. Natl. Acad. Sci., India, Sect. A Phys. Sci. 85, 295–301 (2015). https://doi.org/10.1007/s40010-014-0197-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40010-014-0197-6