A Fast and Effective Watermarking Method for Medical Data security

A Fast and Effective Watermarking Method for Medical Data security

Abdallah Soualmi, Adel Alti, Lamri Laouamer
DOI: 10.4018/IJSITA.2019100101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Personal health information is considered a target for illegal users that attempt to read, delete, and/or steal data. Therefore, watermarking techniques offer new ways to protect sensitive data transferred over the Internet. This article presents a novel watermarking approach for securing sensitive data in e-health applications based on DWT and Schur decomposition coefficients. The proposed approach aims to offer a valuable balance between robustness and imperceptibility. Several experiments were conducted using a standard dataset of medical images. The experiments achieved promising results for high-level data protection and good imperceptibility values compared to existing works.
Article Preview
Top

In this section, we discuss several recent medical image watermarking methods (Mansoori et al., 2016, Mousavi et al., 2017, Ustubioglu et al., 2017; Ali et al., 2017; Ernawan et al., 2019; Kumar et al., 2019), and classifying them according to watermark extraction type into three major classes: non-blind, semi-blind and blind methods.

Non-Blind Watermarking Methods

A non-blind watermarking method requires access to the original image to extract the embedded watermark. While most non-blind watermarking methods are not practicable in e-health applications, they however, offer low execution times for embedding/extracting processes. Researchers (Ustubioglu et al., 2017), proposed a non-blind watermarking technique for medical images using Modified Difference Expansion (MDE) and Least Significant Bits (LSB) techniques. The proposed method decomposes the original image into two areas: center area and border area. The watermark bits are embedded in the first area using MDE and LSB method, and then the location map and its hash value are embedded in the second area. This method offers good imperceptibility. However, the watermark is embedded in Region of Non-Interest (RONI) at the sender side where an attacker could add his own RONI and the wrong watermark is extracted at the receiver side. Thus, it is necessary to do more efficient research work to handle this kind of threat.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing