Abstract
Advancement in information and communication technology in health sector has been developed at a rapid pace, and has consequently improved its different services. Securing patients’s health documents becomes crucial and researchers have investigated more than one privacy measures involving the access control, the security and the integrity of these documents. In this paper, we propose a novel QR-code-based watermarking technique for medical images. The generated QR code pattern is the result of converting a watermarked image which is obtained by embedding the concatenation of diagnostic results and a specific collusion-secure code to the original image.
The proposed scheme is a two-stage scheme which has essentially a two fold purpose: at a first step, we propose to embed successively two types of watermarks to the image and then to convert it to a set of QR codes to ensure simultaneously and independently its protection. At a second step, we apply the tracing process whose target is the identification of eventual hackers by extracting the hidden identifier from the suspicious document and analyse it. Experimental assessments show that the proposed scheme provides good results in terms of security, robustness and tracing accuracy constraints.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Akashi, N., Kuribayashi, M., Morii, M.: Hierarchical construction of Tardos code. In: International Symposium on Information Theory and Its Applications, 2008, ISITA 2008, pp. 1–6 (December 2008). https://doi.org/10.1109/ISITA.2008.4895496
Anand, A., Singh, A.K.: Watermarking techniques for medical data authentication: a survey (2020). https://doi.org/10.1007/s11042-020-08801-0
Azeez, N.A., der Vyver, C.V.: Security and privacy issues in e-health cloud-based system: a comprehensive content analysis. Egyptian Inf. J. 20(2), 97–108 (2019). https://doi.org/10.1016/j.eij.2018.12.001, http://www.sciencedirect.com/science/article/pii/S1110866517302797
Barg, A., Kabatiansky, G.: Robust parent-identifying codes and combinatorial arrays. IEEE Trans. Inf. Theory 59(2), 994–1003 (2013)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inf. Theory 44(5), 1897–1905 (1998)
Brains, O. (ed.): OASIS Brains - Open Access Series of Imaging Studies (2019). https://www.oasis-brains.org/
Cha, B.H., Kuo, C.C.: Design and analysis of high-capacity anti-collusion hiding codes. Circuits, Syst. Signal Process. 27(2), 195–211 (2008)
Chaabane, F., Charfeddine, M., Amar, C.B.: A survey on digital tracing traitors schemes. In: 9th International Conference on Information Assurance and Security, IAS 2013, Gammarth, Tunisia, 4-6 December 2013, pp. 85–90 (2013)
Chaabane, F., Charfeddine, M., Puech, W., Amar, C.B.: A two-stage traitor tracing scheme for hierarchical fingerprints. Multimedia Tools Appl. 76(12), 14405–14435 (2017). https://doi.org/10.1007/s11042-016-3749-8
Divecha, N.H., Jani, N.N.: Reversible watermarking technique for medical images using fixed point pixel. In: 2015 Fifth International Conference on Communication Systems and Network Technologies, pp. 725–730 (2015)
Fontaine, C.: How to protect multimedia pieces of content, from their creation to their distribution. Ph.D. thesis, Université de Bretagne Occidentale, école doctorale SICMA (2011)
Guzman-Candelario, C.L., Garcia-Hernandez, J.J., Gonzalez-Hernandez, L.: A low-distortion QR code watermarking scheme for digital color images robust to gamma correction attack. In: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 27–32 (2016)
ISO (ed.): ISO/EN 13606 (2012). http://www.iso.org/iso/home.htm/
Laarhoven, T., de Weger, B.: Optimal symmetric tardos traitor tracing schemes. CoRR abs/1107.3441 (2011)
Lanxiang, C., Wutong, B., Zhiqiang, Y.: A secure and privacy-preserving watermark based medical image sharing method. Chinese J. Electron. 7(5), (2020). https://doi.org/10.1049/cje.2020.07.003, https://ieeexplore.ieee.org/abstract/document/9222675
Mohanty, S.P., Sengupta, A., Guturu, P., Kougianos, E.: Everything you want to know about watermarking: From paper marks to hardware protection: from paper marks to hardware protection. IEEE Consum. Electron. Mag. 6(3), 83–91 (2017)
Mousavi, S.M., Naghsh, A., Abu-Bakar, S.A.R.: Watermarking techniques used in medical images: a survey. J. Digit. Imaging 27(6), 714–729 (2014). https://doi.org/10.1007/s10278-014-9700-5, https://europepmc.org/articles/PMC4391065
Singh, A.K., Kumar, B., Singh, G., Mohan, A.: State-of-the-art techniques of image watermarking: new trends and future challenges. In: Singh, A., Kumar, B., Singh, G., Mohan, A. (eds.) Medical Image Watermarking. Multimedia Systems and Applications. Springer, Cham. pp. 227–244 (2017). https://doi.org/10.1007/978-3-319-57699-2-10
Skoric, B., Katzenbeisser, S., Celik, M.U.: Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. IACR Cryptology ePrint Arch. 2007, 41 (2007)
Tardos, G.: Optimal probabilistic fingerprint codes. In: STOC, pp. 116–125 (2003)
Zhou, X., Zhang, H., Wang, C.: A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry 10(3), (2018). https://doi.org/10.3390/sym10030077, https://www.mdpi.com/2073-8994/10/3/77
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Choura, H., Chaabane, F., Frikha, T., Baklouti, M. (2021). Robust and Secure Watermarking Technique for E-Health Applications. In: Abraham, A., et al. Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020). SoCPaR 2020. Advances in Intelligent Systems and Computing, vol 1383. Springer, Cham. https://doi.org/10.1007/978-3-030-73689-7_94
Download citation
DOI: https://doi.org/10.1007/978-3-030-73689-7_94
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-73688-0
Online ISBN: 978-3-030-73689-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)