A Reversible Data Hiding Scheme for Efficient Management of Tele-Ophthalmological Data

A Reversible Data Hiding Scheme for Efficient Management of Tele-Ophthalmological Data

Abhilasha Singh, Malay Kishore Dutta
Copyright: © 2017 |Pages: 17
DOI: 10.4018/IJEHMC.2017070103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Advancements in medical sciences and induction of advanced technologies have led to increased role of medical images in tele-diagnosis. This paper proposes a technique for easy, efficient and accurate management of distributed medical databases and alleviates the risk of any distortion in images during transmission. It also provides remedy of issues like tampering, accidentally or intentionally, authentication and reliability without affecting the perceptual properties of the image. The technique is blind and completely reversible. Values of PSNR and BER imply that the changes made to original images are imperceptible to the Human Visual System. Performance of the technique has been evaluated for fundus images and the results are extremely encouraging. The technique is lossless and conforms to the firm necessities of medical data management by maintaining perceptual quality and diagnostic significance of the images, therefore is very practical to be used in health care centers.
Article Preview
Top

Introduction

Advancements in medical domain have led to the growth of a range of electronic medical appliances for the purpose of diagnosis and cure of diseases. Improvements in communication techniques through internet allow for remote access of this medical diagnostic information for manifold purposes like tele-diagnosis and tele-consultation.

In majority of hospitals and health care centers, the patient related information and associated medical images are stored independently in large databases as different files. Storage and distribution of these images require a key, patient's name or unique ID, for identification of images. The images, if detached from records, can lose their identity (Goldbaum et al., 1990, Singh et al., 2016). Therefore, patient details and medical images should be properly structured, so as to avoid mistreatment and loss of data. Also, this data is not protected from any illegal access and may be manipulated easily. So, there is an urgent necessity to protect and handle this data unfailingly. For authentication purposes, it is essential that some watermark with identity of patient must be embedded in the original image itself (Meher et al., 2006). This can be achieved by watermarking or data hiding. However, the embedding procedure will deform the images. These changes due to the insertion process are not acceptable to medical practitioners because deformation may make the modified medical images unfit for advance diagnosis. Therefore, it is important to strike the best possible balance between embedding capacity and the image quality as the requirements in medical images are different from those of general functions of data hiding.

The reversible data hiding schemes may be the solution for this difficulty. Reversible data hiding gives the capability to recover the exact cover image after the extraction of watermark. The lossless insertion may increase the size of the original image but after extraction of data, original image is recovered in its original size (Rocek et al., 2016; Celik et al., 2006). Lossy insertion process cannot be applied in medical applications. Reversibility can be assured if adequate free space can be found or formed to hide the data within the host image while maintaining the features of the cover uncontaminated. In medical applications, the deformations after removing the watermark should be zero (Fridrich et al., 2002).

Studies on medical image watermarking have identified three possible classes of algorithms (Coatrieux et al., 2006). The first-class techniques are those which embed the data in Region of Non-Interest (RONI) while leaving the Region of Interest (ROI) to medical practitioner (Anisha Joseph et al., 2015; Coatrieux et al., 2013; Eswaraiah et al., 2015). The second-class methods are based on reversible watermarking (Irany et al., 2011; Gouenou Coatrieux et al., 2013, Singh et al., 2016). As soon as hidden information is extracted, original image can be retrieved. Third category is based on non-reversible traditional watermarking techniques which bring in minimal alteration up to acceptable limits (Dutta et al, 2014, Dutta et al., 2015).

Watermarking process can be carried out in two major domains namely, spatial and frequency. The spatial domain based techniques started with LSB (Least Significant Bit) substitution (Shanmugam et al., 2008; Eswaraiah et al., 2012; Velumanil et al., 2010, Sharma et al., 2015). In frequency domain, watermark is hidden in transform domain coefficients. For the reason that the watermark is spread across the image, this practice is not vulnerable to numerous attacks (Chen et al., 2012; Karasad et al., 2016; Dey et al., 2012; Kumar et. al., 2013, Poonkuntran et. al. 2014). Literature review reveals that the techniques mentioned have several disadvantages like some of them are irreversible, some have tedious task of deciding and separating ROI from RONI and many are not perfectly reversible. Therefore, a need was felt to develop a technique which would have zero distortion effect on the image after extraction of hidden data.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 1 Issue (2023)
Volume 13: 5 Issues (2022): 4 Released, 1 Forthcoming
Volume 12: 6 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing