Introduction

Due to its importance in clinical diagnosis, treatment, research and other commercial and non-commercial applications, both for private and government organizations, medical information is highly valuable and critical in nature. The rapid and significant advancements of information and communication technologies during the last few years have caused a sea change, both in concepts as well as in applications in MDM paradigm. The modern integrated health-care delivery systems (such as Hospital Management Systems (HISs), Picture Archiving and Communication Systems (PACS) etc.) provide easier access, effective manipulation and efficient distribution of medical information [1]. There are number of reasons for this medical information exchange, for example telemedicine applications (ranging from teleconsulting, telediagnosis and telesurgery etc.) to distant learning of medical personnel. Electronic Health Record (EHR)/ Personal Health Record (PHR) technology has replaced the inefficient paper records paradigm, and is available in various forms such as diagnostic reports, images and vital sign signals etc. It can also contain the health history information of a patient, such as demographic data, physical examination information, laboratory test results, treatment procedures, and prescriptions etc., which are highly confidential in nature [2].

On the other hand, these advances have introduced new risks for inappropriate use of medical information, given the ease with which digital form of data could be manipulated. Moreover, medical images have special characteristics and requirements. As well as, it is also concerned with legal and ethical issues, regarding the allowable operations and disclosures that can be undertaken on them, since any degradation of the quality of the images could result in misdiagnosis [3, 4]. Therefore, it is of paramount importance to prevent unauthorized access and manipulation of medical data, as well as to protect its confidentiality. As a result, there is a need to design a system for effective storage, controlled restriction of manipulation and access of medical information, keeping the authenticity, integrity and confidentiality requirements of medical data intact, for effective management purpose [3, 5].

Digital watermarking (DWM), which imperceptibly embeds information (watermark) within a host signal (cover), such as image, audio or video, is an emerging research technique for multimedia data management [6]. Original motivation of this technique was to protect copyright, but it has also been applied to a wide range of other multimedia applications [7, 28]. When it is applied to medical images, necessary steps are taken so that after watermark embedding, medical images can still conform to the DICOM format [8]. DWM has the potentiality of being a value-added tool for a wide range of issues related to medical data management [9, 10].

As a subset of DWM, many MIW techniques have been proposed by various researchers. A spatial domain technique was proposed by Zain et al. [11] to improve the security of medical images by involving the ability to detect tamper and subsequently recover the images. A Region of Interest (ROI) lossless MIW technique with enhanced security and high payload embedding in the spatial domain was proposed by Kundu et al. in [12]. Chao et al. [13] proposed a DCT based data hiding scheme, capable of hiding EPR in the quantized DCT coefficients of an image. Wu et al. [14] proposed two schemes based on Modulo 256 and DCT, for tamper detection and recovery purpose. Recently few transform domain MIW methods have been proposed by various researchers based on Discrete Wavelet Transform (DWT) and Contourlet Transform (CNT) etc [9, 1517]. Most of the existing MIW techniques are fragile and non-blind in nature. Moreover these existing methods lack the effective security measures required in the medical data management paradigm.

The very large number of medical images and related EHR/PHR data has created several problems regarding the effective management of medical information. The memory requirement to store these images and related data is ever increasing, so as the cost associated with it. Moreover, bandwidth is a valuable asset in network applications. The cost of transmission of this huge number of images and related EHR/PHR data is very high. Keeping these aforementioned issues in mind, in this paper we propose a novel blind MIW technique robust to high compression (both JPEG and JPEG2000). The proposed scheme can be used as an all-in-one solution tool to address various concerns like integrity, authenticity and confidentiality of the medical data management domain. It also conforms to the strict specifications and requirements regarding medical data handling by preserving their visual/information quality and diagnostic value. In the proposed method we hide EHR/PHR, Doctor’s Identification Code (DIC), Indexing Keyword (INDX) and optionally ROI’s information in the medical image. The confidentiality of the EHR/PHR is improved by embedding the data in the image. DIC works as a source authenticator and INDX serves as a querying keyword for use in medical image databases for effective image retrieval. If ROI’s information is embedded in the image, then it works as a caption or annotation watermark which can be used for future reference, physician’s guidance and/or teaching of medical personnel. In addition to that, both the storage and transmission bandwidth requirements as well as the possibility of EHR/PHR detachment are reduced.

The rest of the paper is organized as follows. In Section “Digital watermarking of medical images”, we briefly describe the relevance of DWM techniques in medical data management domain. The contourlet transform is explained in Section “Contourlet transform (CNT)”. We outline in Section “Proposed scheme” the proposed watermark insertion and extraction algorithms. Experimental results and comparisons are presented in Section “Experimental results and comparisons”, and we draw conclusion in Section “Conclusion and discussion”.

Digital watermarking of medical images

DWM techniques have the potentiality of becoming an all-in-one solution tool, providing alternative and/or complementary solutions for a wide range of issues, related to medical information management and distribution. MIW is a subset of DWM, where medical information is embedded in medical images and/or videos.

Requirements

Due to the special characteristics, derived from strict ethics, legislative and diagnostic implications—integrity protection, confidentiality and prevention of unauthorized manipulation of medical information is very important. The risks are increased, when dealing with an open environment like the internet. This imposes three mandatory characteristics [3]:

  • Confidentiality imposes that only the entitled users, in the normally scheduled conditions, have access to the information.

  • Reliability has two different aspects :

    • Integrity: the information has not been modified by non-authorized persons, and

    • Authentication: a proof that the information belongs indeed to the correct patient and is issued from the correct sources.

  • Availability is the ability of an information system to be used by the entitled users in the normal scheduled conditions of access and exercise.

Another key requirement is that the medical image should not undergo any degradation, which will affect the diagnosis from the image. Generally, medical images are required to remain intact to achieve this with no visible alteration to their original form.

Applications

A brief outline of MIW applications in medical data management is as follows [3, 9, 18]:

Avoid detachment

As the medical images and related EHR/PHR data are stored separately, the chance of corruption of these records or their detachment from the images is very high. Misplacing a data from its corresponding medical image may lead to a fiasco. Applying watermarking, this separate data can be embedded into the corresponding medical image, thus reducing the risk of detachment.

Saving bandwidth

Transmission bandwidth is a valuable asset in network application. Since the EHR/PHR and the medical image is integrated into one by MIW, bandwidth for the transmission can be reduced in telemedicine applications.

Confidentiality and security

Confidentiality and security of patient record, is of utmost importance in medical data management and distribution paradigm. Imperceptibility and key dependency of MIW with advanced encryption techniques, can provide solutions to these problems.

Controlling integrity

Fragile watermark is used for integrity verification and tamper localization. As the integrity of medical data (images, records) is of paramount importance, fragile watermarking technique can be used in this scenario. Fragile MIW techniques, allow us to evaluate the extent of tampering, localization of the modified regions, and help us to determine whether the data are trustworthy for use or not [11].

Authentication

Combined with cryptographic techniques, MIW provides a means of identity authentication, by embedding the encrypted version of the physician’s or clinician’s digital signature (DS) or identification code, in the medical image. To obtain the original data, knowledge of both encryption technique and watermark keys are required, which provides more complete protection [13].

Indexing

Watermark can also play the role of keywords or indices (e.g., USG-LA), based on which effective archiving and retrieval from querying mechanism could take place. PACS nowadays retrieve images through indexing. Patient demographics, image acquisition characteristics, diagnostic codes etc. can be used as the indices or keywords. This can also eliminate the extra storage and transmission bandwidth requirements [19].

Controlling access

In MIW, EHR/PHR/DICOM metadata are embedded in the image in such a way, which gives permanency and more protection than in the case of simple metadata. This is because, access to them is only possible through the use of proper key. In this way, MIW has the potential of becoming an alternative access control mechanism, since different keys might reveal different information [3].

Captioning

Caption or annotation watermarks can also be used for providing additional valuable information about the patient’s report. ROIs in an medical image can also be highlighted through descriptive watermarks for future reference, physicians’ guidance or teaching of medical personnel.

The above discussion shows the potentialities of MIW as an all-in-one solution tool, and also describes the strict requirements of the medical image management paradigm. A MIW technique addressing the aforementioned issues is described in this paper.

Contourlet transform (CNT)

The major drawback of Discrete Wavelet Transform (DWT) in two dimensions is their limited ability in capturing directional information. In light of this, Do and Vetterli [20] developed the CNT, based on an efficient two-dimensional multiscale and directional filter bank (DBF). CNT not only possess the main features of DWT, but also offer a high degree of directionality and anisotropy. It allows for different and flexible number of directions at each scale, while achieving nearly critical sampling. In addition, CNT uses iterated filter banks, which makes it computationally efficient (O(N) operations for an N-pixels image).

CNT gives a multiresolution, local and directional expansion of image using Pyramidal Directional Filter Bank (PDFB). The PDFB combines Laplacian Pyramid (LP) which captures the point discontinuities, with a DFB which links these discontinuities into linear structures. Figure 1, shows the flowchart of CNT for a 512 ×512 image. As shown in Fig. 1, first stage of CNT is LP decomposition and DFB is the second stage.

Fig. 1
figure 1

Flowchart of contourlet transform for a 512 × 512 image

LP scheme is shown in Fig. 2. Here, the input image x is first lowpass filtered by analysis filter H and then downsampled to produce a coarse approximation a. It is then interpolated and passed through the synthesis filter G. The resulting image is subtracted from the original image x to obtain the bandpass image b. This process can be iterated repeatedly on the coarser version of the image a. LP is a multiscale decomposition of L 2(R 2) into series of increasing resolution subspaces which are orthogonal complements of each other as follows [21]:

$$ L^{2}(R^{2}) = V_{j_{0}}\oplus\left(\bigoplus\limits^{-\infty}_{j=J_{0}}W_{j}\right) $$
(1)

where \(V_{j_{0}}\) is the approximation subspace at the scale \(2^{j_{0}}\), W j is the detail in the finer scale 2j − 1. In the LP, each subspace W j is spanned by a frame μ j,n (t)\(_{n \epsilon Z^{2}}\) that utilizes a uniform grid on R 2 of intervals 2j − 1 ×2j − 1.

Fig. 2
figure 2

Laplacian pyramid scheme: a analysis and b synthesis

In 1992, Bamberger and Smith constructed a 2D DFB that can be maximally decimated while achieving perfect reconstruction [22]. It is used in the second stage of CNT to link the edge points into linear structures, which involves modulating the input image and using quincunx filter banks (QFB) with diamond-shaped filters. A l-level tree-structured DFB is equivalent to a 2l parallel channel filter bank with equivalent filters and overall sampling matrices as shown in Fig. 3. As shown in Fig. 3, corresponding to the subbands indexed, the equivalent analysis and synthesis filters are denoted using H k and G k , 0 ≤ k < 2m.

Fig. 3
figure 3

Construction of DBF

A l-level DFB generates a perfect directional basis for discrete signal in l 2(Z 2) that is composed of the impulse responses of 2l directional synthesis filters and their shift. They can be represented as follows:

$$ g^{(l)}_{k}\big[n - S^{(l)}_{k}n\big]_{0 \leq k < 2^{l}, n \epsilon Z^{2}} $$
(2)
$$ g[n] = \frac{2\Pi}{n_{1}}\left[\psi \left(\frac{n_{1}(l+1)}{N}+n_{2}\right) - \psi\left(\frac{n_{1}l}{N} + n_{2}\right)\right] $$
(3)

where N = 2n − 2 and ψ(x) is similar to the common sin function.

$$ \psi(x) = \frac{1-cos(\pi x)}{\pi x} $$
(4)

In CNT, applying a l j -level DBF to the detail subspace W j results in a decomposition with \(2^{l_{j}}\) directional subspaces as follows:

$$ W_{j} = \bigoplus\limits^{2^{l_{j}-1}}_{k=0}W^{l_{j}}_{j,k} $$
(5)

A DFB is designed to capture the high frequency content like smooth contours and directional edges. Figure 4, shows the frequency partition of CNT, and Fig. 5a and 5b presents an image along with its subbands after decomposition by CNT.

Fig. 4
figure 4

Frequency partition of contourlet transform

Fig. 5
figure 5

Contourlet transform: a original image and b subbands after decomposition

Proposed scheme

The watermark insertion and extraction algorithms are described in this section. Block diagrams of both the insertion and extraction methods are also given to clarify these schemes.

Watermark insertion

As mentioned earlier, that we can embed EHR/PHR (refereed in this paper as EPR), DIC, INDX and optionally ROI’s information in the medical image. If the user wants to embed ROI’s information, then the user first manually draw a polygonal ROI in the medical image. We use a polygonal ROI because in most of the cases the ROI is irregular in shapes. A polygon can be fully described by its number of vertices (V n ) and their coordinates {v i (x,y): v i is the i-th vertex at coordinate (x,y) and i = 1,2,...,V n }. So ROI’s information contains these V n and {v i (x,y): v i is the i-th vertex at coordinate (x,y) and i = 1,2,...,V n }. The salient steps of the insertion process are as follows:

Inputs::

Original Medical Image (OI) of size M × N, EPR, DIC, INDX, Secret Key (K S ) and optionally ROI’s Information (ROI INFO ).

Outputs::

Watermarked image (WI), Modified secret key (K S ).

Steps: :
  1. 1.

    Apply CNT on the original image OI to get low pass subband (OI LPS ) and high pass subbands (OI HPSs ). Let the size of OI LPS be S ×T.

  2. 2.

    Encrypt the EPR by Advanced Encryption Standard (AES) method using a secret key K S to get EPR ENCRY (the EPR is encrypted to increase the security of the proposed scheme).

  3. 3.

    If V n  > 2, then concatenate ROI INFO , DIC, INDX, EPR ENCRY to WM CON and represent WM CON to its binary form as WM BIN and set ROI = 1. If no ROI’s information is present or V n  ≤ 2, then construct WM BIN from DIC, INDX and EPR ENCRY and set ROI = 0.

  4. 4.

    If ROI = 1, then modify the secret key K S to K S by concatenating 1 to K S . Otherwise, if ROI = 0 (i.e., no ROI), then concatenate 0 with K S to get K S . (As an example, if K S  = ‘xxxxxxxx’ and ROI = 1 then K S  = ‘xxxxxxxx1’, otherwise K S  = ‘xxxxxxxx0’.)

  5. 5.

    Apply Bose, Chaudhuri and Hocquenghem (BCH) error correcting code to WM BIN to get WM BCH .

  6. 6.

    Reshape WM BCH as a 1D-binary string (WM BS1) and scatter the bits of WM BS1 using the function given below to get (WM BS ):

    $$ f(x) = px~mod~n +1 $$
    (6)

    where,

    n = size of the subband OI LPS ( = S ×T);

    p = secret prime number ε [1, n];

    x = bit position in WM BS1 and

    x ϵ [1,length(WM BS1)];

    (This scattering of bits improves the security of the proposed scheme, since to correctly extract the watermark bits, one should have the knowledge about the used scattering function (Eq. 6), as well as the value of p.)

  7. 7.

    Reshape the resultant string in a matrix of equal size as OI LPS (i.e., S ×T) to get the final watermark payload WM FIN .

  8. 8.

    Modify the coefficients of OI LPS using the algorithm given below:

    where,

    OI LPS = modified low pass subband,

    (i,j) = co-ordinates of the coefficients,

    round( ∙ ) = rounding operation, and

    α = watermarking strength factor. The robustness as well as the imperceptibility of the proposed MIW scheme depends on α. If it is high, the robustness is high, however, the image quality is worse and the vice versa.

  9. 9.

    Finally to get the watermarked image WI, apply Inverse CNT on the OI LPS , along with other non-modified directional subbands (OI HPSs ).

The block diagram of the proposed watermark insertion method is given in Fig. 6. The dashed lines in the Fig. 6, indicates that these activities are optional.

Fig. 6
figure 6

Watermark insertion

Watermark extraction

Blind watermarking is very useful for real-life application, as often access to the original un-watermarked image is restricted to maintain the privacy, security and integrity etc. Keeping this in mind, we have tried to make our proposed MIW technique blind, which means we do not need the original image during the extraction process. The steps of the extraction process are as follows:

Inputs :

Watermarked (and possibly attacked) medical Image (WI′) of size M ×N and Secret Key (K S ).

Outputs :

Extraction Report, EPR, DIC, INDX, and ROI highlighted medical image (optional).

Steps: :
  1. 1.

    Separate K S to two parts, K S and ROI.

  2. 2.

    Apply CNT on WI′ with the same decomposition configuration of the embedding process, to get the low pass subband (WI LPS ) of size S ×T and high pass subbands (WI HPSs ).

  3. 3.

    Extract the watermark WM FIN using the following rules:

  4. 4.

    Reshape WM FIN as a binary string WM BS and rearrange the bits to their original positions using the Eq. 6, to get WM BS1.

  5. 5.

    Reshape WM BS1 to WM BCH and apply BCH error correcting procedure on WM BCH , to get WM BIN . Now if WI′ is the original watermarked image (i.e., WI′ = WI) or, WI′ is a modified watermarked image where modification level is such that, the BCH error correcting procedure can correctly rectify the errors due to this modification, then the output of BCH error correcting process will be WM BIN  = WM BIN . Otherwise, BCH will not be able to rectify the errors correctly and will provide output as WM BIN  = 0.

  6. 6.

    If WM BIN  = 0, then stop the process and report the result: “Extraction Fail: Un-watermarked image or modification level exceed maximum acceptable level”. Otherwise, transform WM BIN to its original format WM CON and go to next step.

  7. 7.

    Now check if ROI = 1, then separate WM CON to ROI INFO , DIC, INDX, and EPR ENCRY , otherwise, if ROI = 0, then separate WM CON to DIC, INDX, and EPR ENCRY .

  8. 8.

    Decrypt EPR ENCRY using the same secret key K S to get the original EPR.

  9. 9.

    If ROI = 0, then report “No ROI to display”. Otherwise if, ROI = 1, then the algorithm automatically draws the polygonal ROI using the ROI INFO .

Figure 7, shows the block diagram of the proposed MIW extraction procedure.

Fig. 7
figure 7

Watermark extraction

Experimental results and comparisons

To evaluate the performance effectiveness of the proposed MIW method, extensive experiments were carried out on various modalities (CT, MRI, USG, X-Ray etc.) of grayscale (8 bpp) medical images of size 512 ×512. The DIC and INDX consisted of 20 (20 ×7 = 140 bits) and 15 (15 ×7 = 105 bits) characters respectively. EHRs/PHRs of different sizes (128 and 144 characters) were used in the experiments, along with two different configurations for BCH error correcting process. EHR/PHR of size 128 characters with BCH(255,115,21) was used in case when ROI’s information was specified, and in case of no ROI, EHR/PHR of size 144 characters with BCH(255,139,15) was used. After three level CNT (2,4,8) decomposition of the image with ‘9–7’ pyramid filter and ‘pkva’ directional filter, the size of the low pass subband was 64 ×64. We used p = 23 in the Eq. 6. The value of α was set to 55 after lots of experiments. We implemented the proposed technique in MATLAB, and experiments were carried out on a PC with 2.66 GHz CPU and 4 GB RAM.

To show the effectiveness of the proposed MIW technique both subjective as well as quantitative analysis were carried out. We used Peak Signal–to–Noise Ration (PSNR) and Weighted PSNR (WPSNR) to measure the distortion produced after watermark embedding. The higher the value of PSNR and WPSNR, the lower the distortion. Mean Structural SIMilarity index (MSSIM) was used to measure the similarity between the original image and the watermarked image [23]. MSSIM value 1 indicates that the images are similar. Visual degradation was quantitatively measured using the Total Perceptual Error (TPE) measurement calculated from the Watson Metric [24]. Lower the value of TPE, better the result. The conventional measures used for authentication of the extracted watermark like Normalized Correlation (NC), Bit Error Rate (BER) etc., are not applicable to our proposed method. The proposed scheme, can successfully extract the embedded watermark without any error, from the original watermarked image or a modified watermarked image, where the modification level is below a maximum acceptable modification amount. Otherwise, if an un-watermarked image or a modified watermarked image, where the modification level exceed the maximum acceptable modification amount, is used during the extraction process, then the proposed scheme will give output: “Extraction Fail: Un-watermarked image or modification level exceed maximum acceptable level”. Therefore, NC and/or BER are not suitable to evaluate the performance of the proposed technique.

An expert clinician was asked to subjectively evaluate the effectiveness of the proposed MIW method. After careful manual inspection, the clinician conformed to the effectiveness of the proposed scheme. He found no significant visual difference between the original and the watermarked medical images, which suggests that there is no noticeable visual and/or informational degradation in the watermarked images.

Figure 8, shows the visual effect of watermark insertion in some of the test medical images used in the experiments. The results show that there is no significant visual difference between the original and the watermarked images.

Fig. 8
figure 8

Original images (above a1e1) and their corresponding watermarked images (below (a2e2)

Table 1 shows the PSNR, WPSNR, MSSIM and TPE values, when no ROI was specified. The PSNR and WPSNR values of the different test medical images show that, the visual differences between the original and the watermarked images are very low. Acquired values for MSSIM indicate that the original and the watermarked images are very much similar. The low values for TPE suggests that, the visual degradation caused by the proposed method is also very low.

Table 1 Performance when no ROI is specified

Performance of the proposed scheme in case when ROI was specified is shown in Table 2, for the same set of test images, which were used to produce the results of Table 1. During this performance evaluation, a polygonal ROI having 10 vertices were used for all the test images. From Tables 1 and 2, we can see that the values of PSNR, WPSNR, MSSIM and TPE differs very slightly, which indicates that the proposed method perform equally well in both the cases when ROI is specified or not.

Table 2 Performance when ROI is specified

In the proposed MIW scheme the watermark is embedded in the low pass subband (LPS) of the medical images, after 3 level of contourlet decomposition. The size of the original image and LPS is 512 ×512 and 64 ×64 respectively. So the maximum payload capacity of the proposed method is (64 ×64)/(512 ×512) = 0.0156 bpp. But if we embed this maximum amount of watermark payload in the image by our proposed medical image watermarking technique, the watermarked image would be unacceptably distorted. The watermark to be embedded consists of DIC, INDX, EHR/PHR and optionally ROI Information. If ROI is specified then the size of the embedded watermark is 1369 bits and incase when ROI is not specified, then the size of the embedded watermark is 1253 bits. So the hiding capacity of the proposed scheme considering acceptable distortion is 0.0052 bpp (with ROI) or 0.0047 bpp (without ROI).

As mentioned previously that the value of α determines the robustness and imperceptibility of the proposed MIW scheme. The higher the value of α, the more robust the method is, and the imperceptibility becomes low. The reverse is also true. The graph of the Fig. 9, shows the variation of image quality (in terms of PSNR in dB) with respect to watermarking strength factor α of the proposed technique for a particular test medical image (abdomenCT Fig. 8a1). Similar results have been found for other test images used in the experiments.

Fig. 9
figure 9

Watermarking strength factor α vs PSNR (dB)

To evaluate the effectiveness of the proposed MIW method against JPEG compression, different watermarking strength factors α were used and the watermarked images were JPEG compressed with different quality factors (high quality factor indicates low compression and better image quality and low quality factor means high compression and worse image quality). The graph of the Fig. 10 indicates the effectiveness of the proposed MIW scheme for a particular test medical image (abdomenCT Fig. 8a1). In the graph of the Fig. 10, the JPEG quality factor at a certain α denotes the highest JPEG compression, that can be achieved with that α, without any error in the extracted watermark. For the other test images used in the experiments, similar results have been obtained.

Fig. 10
figure 10

Watermarking strength factor α vs JPEG quality factor

We used Checkmark benchmark software [25], to evaluate the performance of the proposed MIW method in case of JPEG2000 compression. The watermarked images were compressed with varying bitrates using JPEG2000 wavelet compression (the JASPER compression program) as mentioned in the Checkmark benchmark. We compressed the watermarked images using bit rates [8,3.5,1.5,0.8,0.6,0.5,0.4,0.3,0.2]. It has been found that the proposed method can successfully extract the embedded watermark in all the cases.

Even though, the main motivation of the proposed MIW scheme is to resists high compression attacks (both JPEG and JPEG2000), we also tested the robustness of the proposed method against other watermark attacks (mostly using Checkmark benchmark software and some others). The performance of the proposed scheme is given in Table 3, which shows only the attacks (with parameters) where the proposed method successfully extracted the inserted watermark.

Table 3 Attacks where the proposed method successfully extracted the watermark

Comparison with [16] reveals that, the method is more imperceptible (in terms of PSNR), but less robust than our scheme. In [16] only the ROI of the image can be embedded, but no EHR/PHR or DIC or INDX. If the method of [16] is used to insert EHR/PHR, DIC and INDX, it will not be able to extract the watermark without error, even with a small JPEG compression. Comparison with [15] shows that, our method is more imperceptible (in terms of PSNR) and also more robust. The MIW methods described in [15, 16] are non-blind, that means the original un-watermarked medical image is needed for correct extraction of the watermark. Whereas, our proposed scheme is blind, which makes it suitable for real-life applications. The watermarking technique described in [26] is less secured and needs a reference image of size 128 × 128 for blind extraction of the embedded watermark. Whereas, in our proposed scheme we only need the secret key during watermark extraction. The hiding capacity of our proposed method (0.0052 bpp (with ROI) or 0.0047 bpp (without ROI)) is higher than the hiding capacity (0.0036 bpp) of the scheme described in [26]. Moreover, the MIW technique of [26], is less robust against JPEG compression attack (up to quality factor 80–75%) and no result is given against JPEG2000 compression. Comparison with the method of [27] shows that both the hiding capacity (0.0077 bpp) and imperceptibility in terms of PSNR (60 dB) is higher than our proposed method. But, the scheme of [27] is less robust against various watermarking attacks than our proposed scheme. Also, the scheme of [27] is not robust against JPEG and JPEG2000 compression. Our proposed MIW technique is also much more secure than the methods described above. The use of EHR/PHR encryption by AES with a secret key makes the EHR/PHR secured, which is very much required, as EHR/PHR is highly confidential, critical as well as sensitive in nature. Also the scattering of watermark bits in the embedding region makes the proposed scheme safe and protected.

Conclusion and discussion

To address various issues regarding effective management of digital medical images and related EHR/PHR data, MIW methods have recently emerged as an effective tool. In this paper, we have presented a blind, robust watermarking scheme applied to medical images with good imperceptibility and enhanced security, which can be used as an all-in-one solution tool. The proposed method is not only robust against both high JPEG and JPEG2000 compression, but also can resists a large number of other attacks. Our scheme can be used for different medical image modalities. The experimental results indicate that the proposed scheme is feasible and given its relative simplicity, it can be applied to the medical images at the time of acquisition to serve in many medical applications concerned with authenticity, integrity and confidentiality etc. Some of the future scopes of the proposed scheme are listed below:

  1. 1.

    As mentioned earlier, that the value of α plays a vital role in performance of the proposed method. The value of α was experimentally set in the proposed scheme. It would be better if the value of α can be set adaptively and automatically.

  2. 2.

    Other transforms like curvelet, bandlet, ripplet etc. can be tested to improve the result.

  3. 3.

    Different insertion and extraction rules can be used to improve the imperceptibility as well as robustness of the proposed technique.

We are trying to incorporate all these above mentioned aspects to our proposed scheme to improve the performance.