ArticlePublisher preview available

A digital watermarking method for medical images resistant to print-scan based on QR code

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract and Figures

Medical images are important records to improve people’s health care, and their security has become an important issue when they are transmitted through various media especially print and scan equipments. This paper proposes a digital watermarking method for medical images based on live QR code, DWT-SVD, Hough transform and bilinear interpolation. A live QR code including private information was embedded into the SVD blocks of LL3sub-band wavelet of medical image. Adjusting the embedding strength, a trade-off between invisibility and robustness was achieved. We printed and scanned the watermarked medical image with common printers and scanners and get the watermarked images after print-scanning. In extraction method, the Hough transform was used to detect the edge of the watermarked medical image and calculate the rotation angle and scaling ratio, and bilinear interpolation was used to correct geometric distortion of watermarked image. Then we extracted live QR code from corrected image successfully. Experimental results indicated that the proposed method provides sufficient security for medical images against print and scan attacks.
This content is subject to copyright. Terms and conditions apply.
Vol.:(0123456789)
Multimedia Tools and Applications (2024) 83:52197–52218
https://doi.org/10.1007/s11042-023-17155-2
1 3
A digital watermarking method formedical images resistant
toprint‑scan based onQR code
WeixiaChen1· QinLi2,3· XiaoyanTang1· QiyongPan1
Received: 6 March 2023 / Revised: 16 July 2023 / Accepted: 15 September 2023 /
Published online: 10 November 2023
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023
Abstract
Medical images are important records to improve people’s health care, and their security
has become an important issue when they are transmitted through various media especially
print and scan equipments. This paper proposes a digital watermarking method for medical
images based on live QR code, DWT-SVD, Hough transform and bilinear interpolation. A
live QR code including private information was embedded into the SVD blocks of LL3sub-
band wavelet of medical image. Adjusting the embedding strength, a trade-off between
invisibility and robustness was achieved. We printed and scanned the watermarked medical
image with common printers and scanners and get the watermarked images after print-
scanning. In extraction method, the Hough transform was used to detect the edge of the
watermarked medical image and calculate the rotation angle and scaling ratio, and bilin-
ear interpolation was used to correct geometric distortion of watermarked image. Then we
extracted live QR code from corrected image successfully. Experimental results indicated
that the proposed method provides sufficient security for medical images against print and
scan attacks.
Keywords Digital watermarking· Medical images· QR code· DWT-SVD· Hough
transform· Print and scan attacks
1 Introduction
Nowadays, protection of medical images is a challenging task with the rapid growth of
computer and internet technology applied in the medical field. Medical images such as
Computerized Tomography (CT), Magnetic Resonance Imaging (MRI), X-ray are trans-
mitted easily by computers, printers, scanners and other transmission equipment. The
* Qiyong Pan
panqy@cslg.edu.cn
1 School ofElectronic andInformation Engineering, Changshu Institute ofTechnology,
Changshu215500, China
2 School ofPhysical Science andTechnology, Soochow University, Soochow215000, China
3 Medical Image Center, Changshu No.2 People’s Hospital, Changshu215500, China
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Digital imaging and communications in medicine are being applied widely to improve health care for people, and their security attracted our attention when they are transmitted through the Internet. The paper proposes a digital watermarking method for medical images based on digital holography and three-level discrete wavelength transform (DWT) singular value decomposition (SVD), where a live code including privacy information is transformed into digital holography by an improved computer-generated hologram method. The holography then is embedded into the singular values of the LL3 subband wavelet of the medical image. Experimental results show that the proposed method provides sufficient security results against various attacks, especially geometrical attacks.
Article
Full-text available
In this paper, a robust blind image watermarking method is proposed for copyright protection of digital images. This hybrid method relies on combining two well-known transforms that are the discrete Fourier transform (DFT) and the discrete cosine transform (DCT). The motivation behind this combination is to enhance the imperceptibility and the robustness. The imperceptibility requirement is achieved by using magnitudes of DFT coefficients while the robustness improvement is ensured by applying DCT to the DFT coefficients magnitude. The watermark is embedded by modifying the coefficients of the middle band of the DCT using a secret key. The security of the proposed method is enhanced by applying Arnold transform (AT) to the watermark before embedding. Experiments were conducted on natural and textured images. Results show that, compared with state-of-the-art methods, the proposed method is robust to a wide range of attacks while preserving high imperceptibility. © 2018 Springer Science+Business Media, LLC, part of Springer Nature
Article
Full-text available
Nowadays medical data in terms of image files are often exchanged between different hospitals for use in telemedicine and diagnosis. Visible watermarking being extensively used for Intellectual Property identification of such medical images, leads to serious issues if failed to identify proper regions for watermark insertion. In this paper, the Region of Non-Interest (RONI) based visible watermarking for medical image authentication is proposed. In this technique, to RONI of the cover medical image is first identified using Human Visual System (HVS) model. Later, watermark logo is visibly inserted into RONI of the cover medical image to get watermarked medical image. Finally, the watermarked medical image is compared with the original medical image for measurement of imperceptibility and authenticity of proposed scheme. The experimental results showed that this proposed scheme reduces the computational complexity and improves the PSNR when compared to many existing schemes.
Article
Full-text available
In this paper, an algorithm for multiple watermarking based on discrete wavelet transforms (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) has been proposed for healthcare applications. For identity authentication purpose, the proposed method uses three watermarks in the form of medical Lump image watermark, the doctor signature/identification code and diagnostic information of the patient as the text watermarks. In order to improve the robustness performance of the image watermark, Back Propagation Neural Network (BPNN) is applied to the extracted image watermark to reduce the noise effects on the watermarked image. The security of the image watermark is also enhanced by using Arnold transform before embedding into the cover. Further, the symptom and signature text watermarks are also encoded by lossless arithmetic compression technique and Hamming error correction code respectively. The compressed and encoded text watermark is then embedded into the cover image. Experimental results are obtained by varying the gain factor, different sizes of text watermarks and the different cover image modalities. The results are provided to illustrate that the proposed method is able to withstand a different of signal processing attacks and has been found to be giving excellent performance for robustness, imperceptibility, capacity and security simultaneously. The robustness performance of the method is also compared with other reported techniques. Finally, the visual quality of the watermarked image is evaluated by the subjective method also. This shows that the visual quality of the watermarked images is acceptable for diagnosis at different gain factors. Therefore the proposed method may find potential application in prevention of patient identity theft in healthcare applications.
Article
In this work, we propose a blind watermarking approach for medical image protection. In this approach, the watermark will be constituted of the Electronic Patient Record and the image acquisition data. In order to enhance the security and guarantee the data integrity, the Electronic Patient Record hash will be added to the watermark. The integration process is based on a DWT-SVD combination, a DWT is applied to the retinal image, then, an SVD is applied to the LL sub-band. The watermark will be then integrated into the least significant bits of the S component obtained by combining the parity of the successive coefficients. Experimental results for imperceptibility and robustness show that the proposed scheme maintains a high quality watermarked image and remains highly robust against several conventional attacks.
Article
Background Privacy protection has been a critical issue in the delivery of medical images for telemedicine, e-health care and other remote medical systems. Objective The aim of this proposed work is to implement a secure, reversible, digital watermarking technique for transmission of medical data remotely in health care systems. Method In this research work, we have employed a novel optimized digital watermarking scheme using discrete wavelet transform and singular value decomposition using cuckoo search algorithm based on Lévy flight for embedding watermark into the grayscale medical images of the patient. The performance of our proposed algorithm is evaluated on four different 256 256 grayscale host medical images and a 32 32 binary logo image. Results The performance of the proposed scheme in terms of peak signal to noise ratio was remarkably high, with an average of 55.022dB compared to other methods. Conclusion Experimental results reveal that the proposed method is capable of achieving superior performance compared to some of the state-of-art schemes in terms of robustness, security and high embedding capacity which is required in the field of telemedicine and e-health care system.
Article
Background In the presence of Cloud Environment and the migration of Electronic Health Systems and records to the Cloud, patient privacy has become an emergent problem for healthcare institutions. Government bylaws, electronic health documentation, and innovative internet health services generate numerous security issues for healthcare conformity and information security groups. To deal with these issues, healthcare institutes must protect essential IT infrastructure from unauthorized use by insiders and hackers. The Cloud Computing archetype allows for EHealth methods that improve the features and functionality of systems on the cloud. On the other hand, sending patients’ medical information and records to the Cloud entails a number of risks in the protection and privacy of the health records during the communication process. Aim In this paper, a solution is proposed for the security of Electronic Health Records (EHRs) in cloud environment during the process of sending the data to the cloud. In addition, the proposed method uses biometric images that allow for unified patient identification across cloud-based EHRs and across medical institutions. Methods To protect the privacy of patients’ information and streamline the migration process, a watermarking-based method is proposed for health care providers to ensure that patients’ data are only accessible to authorized personnel. Patients’ information, such as name, id, symptoms, diseases, and previous history, is secured in biometric images of patients as an encrypted watermark. Results Quality and impeccability analysis and robustness were performed to test the proposed method. The PSNR values show that the proposed method produced excellent results. Conclusion The robustness and impressibility of the proposed method were tested by subjecting the watermarked images to different simulated attacks. The watermarks were largely impermeable to varied and repeated attacks.
Article
Digital Imaging and Communications in Medicine (DICOM) is one among the significant formats used worldwide for the representation of medical images. Undoubtedly, medical-image security plays a crucial role in telemedicine applications. Merging encryption and watermarking in medical-image protection paves the way for enhancing the authentication and safer transmission over open channels. In this context, the present work on DICOM image encryption has employed a fuzzy chaotic map for encryption and the Discrete Wavelet Transform (DWT) for watermarking. The proposed approach overcomes the limitation of the Arnold transform—one of the most utilised confusion mechanisms in image ciphering. Various metrics have substantiated the effectiveness of the proposed medical-image encryption algorithm.
Article
In watermarking schemes, the discrete wavelet transform (DWT) is broadly used because its frequency component separation is very useful. Moreover, LU decomposition has little influence on the visual quality of the watermark. Hence, in this paper, a novel blind watermark algorithm is presented based on LU transform and DWT for the copyright protection of digital images. In this algorithm, the color host image is first performed with DWT. Then, the horizontal and vertical diagonal high frequency components are extracted from the wavelet domain, and the sub-images are divided into 4×4 non-overlapping image blocks. Next, each sub-block is performed with LU decomposition. Finally, the color image watermark is transformed by Arnold permutation, and then it is inserted into the upper triangular matrix. The experimental results imply that this algorithm has good features of invisibility and it is robust against different attacks to a certain degree, such as contrast adjustment, JPEG compression, salt and pepper noise, cropping, and Gaussian noise.