The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Spread Spectrum based Invertible Watermarking for Medical Images using RNS and Chaos

,
#
  In the current paper, we have presented a novel wat ermarking scheme with making watermark as robust wh ile keeping the image fragile using Residue Number Syst em (RNS) and Chaos. Residues of the image are made to keep it secure since, their sensitive to change is high. Only Regi on Of Interest (ROI) part of the image is residued. In making residues of ROI, some residues exceed bit size eight so, these resid ues are converted to eight bits by applying some tr ick. Two watermarks are embedded in two stages; one to achieve robustness u sing Spread Spectrum (SS) technique and other to achieve fragility of image by calculating the digest of image. In the fi rst stage, spreaded watermark is embedded in Region Of Non0Interest (RONI) pixels using the chaotic key and in the seco nd stage, hash calculated from the first stage is again embedded in RONI pixels based on the chaotic key . Moreover, the original image is not needed at recei ver end, which makes the proposed scheme blind.


[1] Acharya D., Rajendra U., Subbanna P., and Niranjan C., Compact Storage of Medical Images with Patient Information, IEEE Transactions on Information Technology in Biomedicine , vol. 5, no. 4, pp. 3204323, 2001.

[2] Celik U., Sharma G., Tekalp M., and Saber E., Reversible Data Hiding, available at: http://www.ece.rochester.edu/~gsharma/papers/re versiblehidingICIP02.pdf, last visited 2002.

[3] Chao M., Hsu M., and Miaou G., A Data4Hiding Technique with Authentication, Integration and Confidentiality for EPR Records, IEEE Transaction on Information Technology in Biomedicine , vol. 6, no. 1, pp. 46453, 2002.

[4] Coatrieux G., Maitre H., Sankur B., Rolland Y., and Collorec R., Relevance of Watermarking in Medical Imaging, in Proceedings of IEEE EMBS Conference on Information Technology Applications in Biomedicine , Arlington, Viginia, pp. 2504255, 2000.

[5] Fridrich J., Goljan M., and Du R., Invertible Authentication, in Proceedings of International Conference on Information Technology: Coding and Computing , Las Vegas, pp. 1974208, 2001.

[6] Fridrich J., Goljan M., and Du R., Lossless Data Embedding4new Paradigm in Digital 230 The International Arab Journal of Information Tech nology, Vol. 13, No. 2, March 2016 Watermarking, the Journal on Advances in Signal Processing , vol. 2002, no. 2, pp. 1854196, 2002.

[7] Giakoumaki A., Pavlopoulos S., and Koutsouris D., A Medical Image Watermarking Scheme Based on Wavelet Transform, in Proceedings of the 25 th Annual International Conference of the IEEE Engineering in Medical and Biology Society , Cancun, Mexico, pp. 8564859, 2003.

[8] Gunjal L. and Mali N., ROI based Embedded Watermarking of Medical Images for Secured Communication in Telemedicine, the International Journal of Computer and Communication Engineering , vol. 6, no. 48, pp. 2934298, 2012.

[9] Kasmani A. and Sharifi M., A Pre4Filtering Method to Improve Watermark Detection Rate in DCT based Watermarking, the International Arab Journal of Information Technology , vol. 11, no. 2, pp. 1784185, 2014.

[10] Kim M., Li D., and Hong S., A Robust and Digital Watermarking Technique for Image Contents based on DWT4DFRNT Multiple Transform Method, the International Journal of Multimedia and Ubiquitous Engineering , vol. 9, no. 1, pp. 3694378, 2014.

[11] Kumar B., Singh V., Singh P., and Mohan A., Secure Spread4Spectrum Watermarking for Telemedicine Applications, the Journal of Information Security , vol. 2, no. 2, pp. 91498, 2011.

[12] Li Y., Li T., and Wei H., Protection of Mammograms using Blind Steganography and Watermarking, in Proceedings of the 3 rd International Symposium on Information Assurance and Security , Manchester, UK, pp. 4964500, 2007.

[13] Masoumi M. and Amiri S., Content Protection in Video Data Based on Robust Digital Watermarking Resistant to Intentional and Unintentional Attacks, the International Arab Journal of Information Technology , vol. 11, no. 2, pp. 2044212, 2014.

[14] Munir R., Riyanto B., Sutikno S., and Agung P., Secure Spread Spectrum Watremarking Algorithm based on Chaotic Map for still images, in Proceedings of the International Conference on Electrical Engineering and Informatics , Indonesia, pp. 17419, 2007.

[15] Naseem T., Qureshi M., Cheema A., and Rahman A., Hash based Medical Image Authentication and Recovery using Chaos and Residue Number System, the Journal of Basic and Applied Scientific Research , vol. 3, no. 6, pp. 4884495, 2013.

[16] Naseem T., Qureshi M., Cheema A., and Zubair M., Invertible and Fragile Watermarking for Medical Images using Residue Number System and Chaos, the Journal of Basic and Applied Scientific Research , vol. 10, no. 2, pp. 106434 10651, 2012.

[17] Pradhan C., Saxena V., and Kumar Bisoi A., Imperceptible Watermarking Technique using Arnold's Transform and Cross Chaotic Map in DCT Domain, the International Journal of Computer Applications , vol. 55, no. 15, pp. 50, 2012.

[18] Ramaswamy R. and Arumugam V., Lossless Data Hiding based on Histogram Modification, the International Arab Journal of Information. Technology , vol. 9, no. 5, pp. 4454451, 2012.

[19] Rey C. and Dugelay L., A Survey of Watermarking Algorithm for Image Authentication, EURASIP Journal on Applied Signal Processing , vol. 6, no. 1, pp. 6134621, 2002.

[20] Saxena A., Sinha K., Chakrawarti S., and Charu S., Digital Watermarking using MATLAB, the International Journal of Advances in Science Engineering and Technology , vol. 1, no. 3, pp. 39442, 2014.

[21] Soliman M., Hassanien E., Ghali I., and Onsi M., An Adaptive Watermarking Approach for Medical Imaging using Swarm Intelligent, the International Journal of Smart Home , vol. 6, no. 1, pp. 37445, 2012.

[22] Song C., Sudirman S., and Merabti M., Recent Advances and Classification of Watermarking Techniques in Digital Images, available at: http://dcalab.unipv.it/wp4content/ uploads/ 2015/02/ watermarking_articolo.pdf, last visited 2015.

[23] Sun G., Zhang Y., Yao H., and Wu P., A Reversible Digital Watermarking Algorithm for Vector Maps, International Journal of Network Security , vol. 16, no. 1, pp. 40445, 2014.

[24] Tian J., High Capacity Reversible Data Embedding and Content Authentication, in Proceedings of IEEE International conference on Acoustics , Speech and Signal Processing , pp. 5174520, 2001.

[25] Trichili H., Boublel M., Derbel N., and Kamoun L., A New Medical Image Watermarking Scheme for A Better Telediagnosis, in Proceedings of IEEE International conference on Systems, Man and Cybernetics , Tunisia, pp. 5574 560, 2002.

[26] Woo I. and Lee D., Digital Watermarking for Image Tamper Detection using Block4Wise Technique, International Journal of Smart Home , vol. 7, no. 5, pp. 115 2013.

[27] Zhou Q., Huang K., and Lou L., Authenticity and Integrity of Digital Mammography Images, IEEE Transactions on Medical Imaging , vol. 20, no. 8, pp. 7844791, 2001. Spread Spectrum based Invertible Watermarking for Medical Images using RNS and Chaos 231 Muhammad Naseem received the BS degree in Computer Science from University of the Punjab, Pakistan and MS degree in Electronic Engineering from International Islamic University, Pakistan in 2005 and 2008, respectively. He completed his PhD in Electronic Engineering in 2015 from Isra University, Islamabad campus. Currently he is working as Assistant Profes sor in department of computer science and software engineering in International Islamic University, Islamabad Pakistan. His research interests include digital watermarking, digital signal processing, information security and biomedical imaging. Ijaz Qureshi has received his BE degree in Avionic Engineering from NED University Karachi, Pakistan. First MS degree in Electrical Engineering from Middle East Technical University (METU), Ankara, Turkey and second MS degree in High Energy Physics from Syracuse University, USA . He earned his PhD degree in High Energy Physics from University of Toronto, Toronto. He has more that twenty4seven year post PhD experience in teaching and research at different intuitions of good repute in Pakistan. More than fourteen PhD has been produced in his supervision. Currently he is Professor at Electrical Engineering departments, Air University Islamabad, Pakistan. Hi s research interests include digital/wireless communications, digital signal processing, informat ion and coding theory, soft and evolutionary computing. Muhammad Muzaffar received the Msc degree in Computer Science from Bahauddin Zakariya University, Multan and MS degree in Electronic Engineering from International Islamic University, Pakistan in 2005 and 2008, respectively. He is working as Assistant Professor at National university of Modern Languages (NUML), Pakistan. Currently, he is a PhD research student a t ISRA University Islamabad Campus, Pakistan. His research interests include audio steganography and information security. Atta ur Rahman has received his BS degree in Computer Science from University of the Punjab Lahore, Pakistan in 2004; MS degree in Electronic Engineering from International Islamic University, Pakistan in 2008 and PhD degree in Electronic Engineering from ISRA University, Islamabad Campus, Pakistan in 2012. Currently, he is working as Associate Professor as well as Deputy Director at Barani Institute of Informati on Technology (BIIT), PMAS4AA University Rawalpindi, Pakistan. His research interests include digital/wi reless communications, digital signal processing, informat ion and coding theory, soft4computing, artificial intelligence, evolutionary computing and fuzzy and hybrid intelligent systems.