Half Difference Expansion Based Reversible Data Hiding Scheme for Medical Image Forensics

Author(s): Vazhora Malayil Manikandan*, Nelapati Lava Prasad, Masilamani Vedhanayagam

Journal Name: Current Medical Imaging
Formerly: Current Medical Imaging Reviews

Volume 16 , Issue 4 , 2020

Become EABM
Become Reviewer

Graphical Abstract:


Abstract:

Background: Medical image authentication is an important area which attempts to establish ownership authentication and data authentication of medical images.

Aims: In this paper, we propose a new reversible watermarking scheme based on a novel half difference expansion technique for medical image forensics.

Methods: Conventional difference expansion based reversible watermarking scheme generates watermarked images with less visual quality, and the embedding rate was considerably less due to the high probability of overflow or underflow. In the proposed scheme, the quality of the watermarked image has been improved by modifying the traditional difference expansion based watermarking scheme, half of the difference between two pixels will be expanded during watermarking. The modification of pixels during watermarking is limited by expanding half of the pixel difference, which helps to obtain watermarked images with better visual quality and improved embedding rate due to less chance of overflow or underflow during watermarking. We also propose a tamper detection localization process to detect the tampered regions from the watermarked image.

Results: Experimental study of the proposed scheme on the standard medical images from Osrix medical image data set shows that the proposed watermarking scheme outperforms the existing schemes in terms of visual quality of the watermarked image and embedding rate.

Conclusion: The overhead related to location map and parity information need to be addressed in future works to improve the proposed scheme.

Keywords: Medical image forensics, half difference expansion, reversible watermarking, tamper detection, EPR, pixels.

[1]
Geetha GK, Chitra S, Madhusudhanan B. Securing patient data in wireless body area sensor network using biometrics based key generation. Curr Med Imaging 2017; 13(3): 231-6.
[http://dx.doi.org/10.2174/1573405613666161121121115]
[2]
Li M, Lou W, Ren K. Data security and privacy in wireless body area networks. IEEE Wirel Commun 2010; 17(1): 51-8.
[http://dx.doi.org/10.1109/MWC.2010.5416350]
[3]
Puech W. Image encryption and compression for medical image security. In: First Workshops on Image Processing Theory, Tools and Applications; 2008 Nov 23-26; Sousse, Tunisia. IEEE 2009; pp. 1-2.
[http://dx.doi.org/10.1109/IPTA.2008.4743800]
[4]
Lei B, Tan EL, Chen S, Ni D, Wang T, Lei H. Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 2014; 41(70): 3178-88.
[http://dx.doi.org/10.1016/j.eswa.2013.11.019]
[5]
Zain JM. M., L. P. Baldwin, and M. Clarke. Reversible watermarking for authentication of DICOM images. Conf Proc IEEE Eng Med Biol Soc 2004; 2004: 3237-40.
[6]
Rocek A, Slavicek K, Dostal O, Javornik M. A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters. Biomed Signal Process Control 2016; 2016(29): 44-52.
[http://dx.doi.org/10.1016/j.bspc.2016.05.005]
[7]
Parah SA, Ahad F, Sheikh JA, Loan NA, Bhat GM. A new reversible and high capacity data hiding technique for E-healthcare applications. Multimedia Tools Appl 2017; 76(3): 3943-75.
[http://dx.doi.org/10.1007/s11042-016-4196-2]
[8]
Arsalan M, Qureshi AS, Khan A, Rajarajan M. Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique. Appl Soft Comput 2017; 2017(51): 168-79.
[http://dx.doi.org/10.1016/j.asoc.2016.11.044]
[9]
Tian J. Reversible Data embedding using a difference expansion. IEEE Trans Circ Syst Video Tech 2003; 13(8): 890-6.
[http://dx.doi.org/10.1109/TCSVT.2003.815962]
[10]
Li X, Yang B, Zeng T. Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 2011; 20(12): 3524-33.
[http://dx.doi.org/10.1109/TIP.2011.2150233] [PMID: 21550888]
[11]
Caldelli R, Filippini F, Becarelli R. Reversible watermarking techniques: An overview and a classification. Eurasip Journal of Information Security 2010; 2010: 1-19.
[http://dx.doi.org/10.1155/2010/134546]
[12]
Khan A, Siddiqa A, Munib S, Malik SA. A recent survey of reversible watermarking techniques. Inf Sci 2014; 279: 251-72.
[http://dx.doi.org/10.1016/j.ins.2014.03.118]
[13]
Yang B, Schmucker M, Funk W, Busch C, Sun S. Integer DCT-based reversible watermarking for images using companding technique. Proc SPIE Int Soc Opt Eng 2004; 5306. 405-15.
[14]
Celik MU, Sharma G, Tekalp AM, Saber E. Lossless generalized-lSB data embedding. IEEE Trans Image Process 2005; 14(2): 253-66.
[http://dx.doi.org/10.1109/TIP.2004.840686] [PMID: 15700530]
[15]
Memon NA. A novel reversible watermarking method based on adaptive thresholding and companding technique. Int J Comput Math 2011; 88(8): 1573-94.
[http://dx.doi.org/10.1080/00207160.2010.509429]
[16]
Ni Z, Shi YQ, Ansari N, Su WS. Reversible data hiding. IEEE Trans Circ Syst Video Tech 2006; 16(3): 354-62.
[http://dx.doi.org/10.1109/TCSVT.2006.869964]
[17]
Thod DM, Rodrguez JJ. Prediction-error based reversible watermarking. In: International Conference on Image Processing. 2004 Oct 24-27; Singapore. IEEE 2005; pp. 1549-52.
[18]
Li X, Li J, Li B, Yang B. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Processing 2013; 93(1): 198-205.
[http://dx.doi.org/10.1016/j.sigpro.2012.07.025]
[19]
Dragoi IC, Coltuc D. On local prediction based reversible watermarking. IEEE Trans Image Process 2015; 24(4): 1244-6.
[http://dx.doi.org/10.1109/TIP.2015.2395724] [PMID: 25622316]
[20]
Hong W, Chen TS, Shiu CW. Reversible data hiding for high quality images using modification of prediction errors. J Syst Softw 2009; 82(11): 1833-42.
[http://dx.doi.org/10.1016/j.jss.2009.05.051]
[21]
Cai S. A new reversible data hiding scheme exploiting high-dimensional prediction-error histogram. In: International Conference on Image Processing (ICIP). 2016 Sept 25-28; Phoenix, AZ, USA. IEEE 2016; pp. 2732-6.
[http://dx.doi.org/10.1109/ICIP.2016.7532856]
[22]
Fu DS, Jing ZJ, Zhao SG, Fan J. Reversible data hiding based on prediction-error histogram shifting and EMD mechanism. AEU Int J Electron Commun 2014; 68(10): 933-43.
[23]
Ou B, Li X, Zhao Y, Ni R, Shi YQ. Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 2013; 22(12): 5010-21.
[http://dx.doi.org/10.1109/TIP.2013.2281422] [PMID: 24043388]
[24]
Nguyen TS, Chang CC. A reversible data hiding scheme based on the sudoku technique. Displays 2015; 39: 109-16.
[http://dx.doi.org/10.1016/j.displa.2015.10.003]
[25]
Parah SA, Ahad F, Sheikh JA, Bhat GM. Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. J Biomed Inform 2017; 66: 214-30.
[http://dx.doi.org/10.1016/j.jbi.2017.01.006] [PMID: 28089912]
[26]
Huang L, et al. Large-capacity reversible watermarking algorithm for medical image Based on block histogram of difference. Int J Pattern Recognit Artif Intell 2015; 29(4): 1554002-21.
[http://dx.doi.org/10.1142/S0218001415540026]
[27]
Zhang Z-W, et al. Double reversible watermarking algorithm for image tamper detection. JIHMSP 2016; 7(3): 530-42.
[28]
Nguyen T-S, Chang C-C, Yang X-Q. A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU Int J Electron Commun 2016; 70(8): 1055-61.
[http://dx.doi.org/10.1016/j.aeue.2016.05.003]
[29]
Gao G, et al. Reversible data hiding with contrast enhancement and tamper localization for medical images. Inf Sci 2017; 385: 250-65.
[http://dx.doi.org/10.1016/j.ins.2017.01.009]
[30]
The USC-SIPI image database, 2017. Available from: http: //sipi.usc.edu/database/
[31]
DICOM image sample sets. Available from:http://www.osirix-viewer.com/resources/ dicom-image-library/
[32]
Zhu W, Zeng N, Wang N. Sensitivity, specificity, accuracy, associated confidence interval and ROC analysis with practical SAS implementations. NESUG Health Care Life Sci 2010; 67: 1-9.


Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 16
ISSUE: 4
Year: 2020
Page: [383 - 396]
Pages: 14
DOI: 10.2174/1573405614666180903120018
Price: $65

Article Metrics

PDF: 15
HTML: 2