Robust and Secure Medical Image Watermarking for Edge-enabled e-Healthcare

Singh, Priyanka and Jyothsna Devi, K and Thakkar, Hiren Kumar and Bilal, Muhammad and Nayyar, Anand and Kwak, Daehan (2023) Robust and Secure Medical Image Watermarking for Edge-enabled e-Healthcare. IEEE Access, 11. pp. 135831-135845. ISSN 2169-3536

Full text not available from this repository.

Abstract

Advancements in networking technologies have enabled doctors to remotely diagnose and monitor patients using the Internet of Medical Things (IoMT), telemedicine, and edge-enabled healthcare. In e-healthcare, medical reports and patient records are typically outsourced to a server, which can make them vulnerable to unauthorized access and tampering. Therefore, it is crucial to ensure the authorization, security, confidentiality, and integrity of medical data. To address these challenges, this paper proposes a novel reversible watermarking approach with a high payload and low computational cost. First, the input medical image is divided into a Border region (BR) and a Non-Border region (NBR). The NBR region is upscaled using Neighbour Mean Interpolation (NMI) to ensure reversibility. The Electronic Patient Record (EPR) is encrypted using a pseudorandom key, which is generated adaptively from the host medical image and the Enigma machine. The encrypted EPR is then embedded in the medical image using NMI. Two levels of tamper detection (global and local) are performed at the receiver's end for higher accuracy. A Global Integrity Code is generated and embedded in BR using LSB embedding technique for global tamper detection. The experimental results show that the visual quality and robustness are both high (Avg. PSNR = 41.03 dB and Avg. SSIM = 0.99, NC = 0.99, and BER = 0.0019 calculated for 100 images). The subjective and objective experimental analysis indicates that the proposed scheme is highly secure and the computational cost is also low. The average embedding and extraction time (including embedding, encryption and decryption, extraction process respectively) is 0.88 s and 0.83 s. It is resistant to various image processing attacks. A comparison with some of the most recent popular schemes confirms the scheme's effectiveness.

Item Type:
Journal Article
Journal or Publication Title:
IEEE Access
Uncontrolled Keywords:
Research Output Funding/yes_externally_funded
Subjects:
?? general engineeringgeneral materials sciencegeneral computer scienceelectrical and electronic engineeringyes - externally fundednoengineering(all)computer science(all)materials science(all) ??
ID Code:
212724
Deposited By:
Deposited On:
12 Jan 2024 11:30
Refereed?:
Yes
Published?:
Published
Last Modified:
12 Jan 2024 11:30