Medical Test Image Authentication With Multi-Ownership Certification and Sensitive Test Data Validation
Medical Test Image Authentication With Multi-Ownership Certification and Sensitive Test Data Validation |
||
|
||
© 2024 by IJETT Journal | ||
Volume-72 Issue-4 |
||
Year of Publication : 2024 | ||
Author : Saikat Bose, Tripti Arjariya, Anirban Goswami |
||
DOI : 10.14445/22315381/IJETT-V72I4P129 |
How to Cite?
Saikat Bose, Tripti Arjariya, Anirban Goswami, "Medical Test Image Authentication With Multi-Ownership Certification and Sensitive Test Data Validation," International Journal of Engineering Trends and Technology, vol. 72, no. 4, pp. 279-296, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I4P129
Abstract
The technique of steganography has been widely used for sensitive data protection. The proposed technique is based on the authentication and validation of patient’s health records in a digital environment. This helps in correct diagnosis, subsequent treatment and claim medical insurance. Multi-scale validation for digital medical images is combined with trusted ownership claims. The ownership is complied with the patient’s fingerprint, private share of the laboratory logo and pathologist’s signature. Each of these components is integrated into each of the four segments of the four regions of a medical image. The security of data is ensured through CIA (Confidentiality, Integrity and Authentication) property and non-repudiations. The embedding pattern is confidential through a hash value-based data set. The first hash value specifies the sub-image block interval, and the second hash value determines the circular orientation of embedded image fragments, both on sub-image block elements. Even though the data and one share can be public, but client side will stage-wise validate the medical image utilizing identical hash operations. The test results like PSNR (Peak signal-to-noise ratio) (41.08 dB) on real-time images emphasise superiority over similar existing algorithms. To conclude, the technique proposes superiorly enhanced features like data hiding imperceptibility and robustness with intrinsic encoding strategies as compared to existing approaches from different perspectives.
Keywords
Digital Signature Validation, Multi-Ownership Certification, Medical Image Authentication, Region Wise Multi-Copy Signature Casting, Variable Encoding.
References
[1] Tsz Kin Tsui, Xiao-Ping Zhang, and Dimitrios Androutsos, “Color Image Watermarking Using Multidimensional Fourier Transformation,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 16-28, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Ibrahim Nasir et al., “Multiple Spatial Watermarking Technique in Color Images,” Signal Image & Video Processing (SiViP), vol. 4, no. 2, pp. 145–154, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[3] S. Behnia, M. Teshnehlab, and P. Ayubi, “Multiple Watermarking Scheme Based on Improved Chaotic Maps,” Communication in Nonlinear Science and Numerical Simulation, vol. 15, no. 9, pp. 2469-2478, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Jing Liu et al., “A Robust Multi-Watermarking Algorithm for Medical Images Based on DTCWT-DCT and Henon Map,” Applied Sciences, vol. 9, no. 4, pp. 1-23, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[5] K. Ganesan, and Tarun Kumar Guptha, “Multiple Binary Images Watermarking in Spatial and Frequency Domains,” Signal & Image Processing: An International Journal, vol. 1, no. 2, pp. 148-159, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Li Zhang et al., “A Dynamic Multiple Watermarking Algorithm based on DWT and HVS,” International Journal of Communications, Network & System Sciences, vol. 5, no. 8, pp. 490-495, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[7] N. Mohananthini, Yamuna Govindarajan, and R. Vivek, “Comparison of Successive and Segmented Watermarking Techniques for Color Images,” Proceedings of National Conference on Emerging Trends in Information & Communication Technology, International Journal of Computer Applications, pp. 13-16, 2013.
[Google Scholar] [Publisher Link]
[8] Rohit M. Thanki, and Komal R. Borisagar, “Compressive Sensing Based Multiple Watermarking Technique for Biometric Template Protection,” International Journal of Image Graphics and Signal Processing, vol. 7, no. 1, pp. 53-60, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[9] K. Karthik, and M.A. Dorai Rangaswamy, “A Novel Three-Tier Protection for Digital Images Using Blind Watermarking Scheme,” International Journal of Advance Trends in Computer Science and Engineering, vol. 4, no. 1, pp. 15–19, 2015.
[Google Scholar] [Publisher Link]
[10] N. Mohananthini, and G. Yamuna, “Image Fusion Process for Multiple Watermarking Schemes against Attacks,” Journal of Network Communications and Emerging Technologies, vol. 1, no. 2, pp. 1-8, 2015.
[Google Scholar] [Publisher Link]
[11] N. Mohananthini, and G. Yamuna, “Comparison of Multiple Watermarking Techniques Using Genetic Algorithms,” Journal of Electrical Systems & Information Technology, vol. 3, no. 1, pp. 68-80, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Nabin Ghoshal, and J.K. Mandal, “Discrete Fourier Transform Based Multimedia Color Image Authentication for Wireless Communication,” 2 nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), Chennai, India, pp. 1-5, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Soumit Chowdhury, Ritesh Mukherjee, and Nabin Ghoshal, “Dynamic Authentication Protocol Using Multiple Signatures,” Wireless Personal Communications, vol. 93, no. 3, pp. 3607-3638, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[14] N. Mohananthini, and G. Yamuna, “Multiple Successive Watermarking Scheme Based on Wavelet Transform,” International Journal of Emerging Trends & Technology in Computer Science, vol. 2, no. 2, pp. 416-420, 2017.
[Google Scholar]
[15] Gaurav Bhatnagar, and Q.M. Jonathan Wu, “A New Robust and Efficient Multiple Watermarking Scheme,” Multimedia Tools and Applications, vol. 74, no. 19, pp. 8421-8444, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Vandana S. Inamdar, and Priti P. Rege, “Dual Watermarking Technique with Multiple Biometric Watermarks,” Sadhana, Indian Academy of Science, vol. 39, no. 1, pp. 3-26, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Natarajan Mohananthini, and Govindarajan Yamuna, “A Study of DWT-SVD Based Multiple Watermarking Scheme for Medical Images,” International Journal of Network Security, vol. 17, no. 5, pp. 558-568, 2014.
[Google Scholar] [Publisher Link]
[18] T.E. Ives, “The New 'E-Clinician' Guide to Compliance,” Audiology Today, vol. 26, no. 1, pp. 52–53, 2014.
[Google Scholar]
[19] Emmanuel Kusi Achampong, “Electronic Health Record (EHR) and Cloud Security: The Current Issues,” International Journal of Cloud Computing and Services Science, vol. 2, no. 6, pp. 417-420, 2013.
[Google Scholar] [Publisher Link]
[20] S. Radharani, and M.L. Valarmathi, “Multiple Watermarking Scheme for Image Authentication and Copyright Protection using Wavelet Based Texture Properties and Visual Cryptography,” International Journal of Computer Application, vol. 23, no. 3, pp. 29-36, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[21] A.K. Singh et al., “Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents,” ACM Transactions on Internet Technology, vol. 2, no. 1, pp. 1-20, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Rohit M. Thanki, and Komal R. Borisagar, “Combined DCT–CS Theory Based Digital Watermarking Technique for Color Images,” Proceedings of National Conference on Emerging Trends in Information & Communication Technology, International Journal of Computer Applications, pp. 17-23, 2013.
[Google Scholar] [Publisher Link]
[23] Mohananthini Natarajan, and Yamuna Govindarajan, “Performance Comparison of Single and Multiple Watermarking Techniques,” International Journal of Computer Network and Information Security, vol. 7, pp. 28-34, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Mahdi Babaei et al., “Robust Multi Watermarking Scheme for Multiple Digital Input Images in DWT Domain,” International Journal of Computer and Information Technology, vol. 3, no. 4, pp. 834-840, 2014.
[Google Scholar] [Publisher Link]
[25] Ali Al-Haj, and Mahmoud Farfoura, “Providing Security for E-Government Document Images Using Digital Watermarking in the Frequency Domain,” Proceedings of 5th International Conference on Information Management (ICIM), IEEE, Cambridge, UK, pp. 77– 81, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[26] C. Jeba Nega Cheltha et al., “A Review on Data hiding Using Steganography and Cryptography,” 9 th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, pp. 1-4, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Noruhida Alias, and Ferda Ernawan, “Multiple Watermarking Technique using Optimal Threshold,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 18, no. 1, pp. 368-376, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Chandan Kumar et al., “SPIHT-Based Multiple Image Watermarking in NSCT Domain,” Concurrency and Computation Practice and Experience, vol. 32, no. 1, pp. 1-9, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Roopam Sadh, Nishchol Mishra, and Sanjeev Sharma, “Dual Plane Multiple Spatial Watermarking with Self-Encryption,” Sadhana, Indian Academy of Sciences, vol. 41, no. 1, pp. 1-14, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Soumit Chowdhury, Sontu Mistry, and Nabin Ghoshal, “Multi-Phase Digital Authentication of e-Certificate with Secure Concealment of Multiple Secret Copyright Signatures,” International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 10, pp. 3365–3380, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Huwaida T. Elshoush et al., “A Novel Approach to Information Hiding Technique using ASCII Mapping Based Image Steganography,” Journal of Information Hiding and Multimedia Signal Processing, vol. 12, no. 2, pp. 65-82, 2021.
[Google Scholar] [Publisher Link]
[32] Katandawa Alex Kingsley, and Ari Moesriami Barmawi, “Improving Data Hiding Capacity in Code Based Steganography Using Multiple Embedding,” Journal of Information Hiding and Multimedia Signal Processing, vol. 11, no. 1, pp. 14-43, 2020.
[Google Scholar] [Publisher Link]
[33] Qi Li et al., “An Encrypted Coverless Information Hiding Method Based on Generative Model,” Information Sciences, vol. 553, pp. 19- 30, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Ashraf Abdel Raouf, “A New Data Hiding Approach for Image Steganography Based on Visual Color Sensitivity,” Multimedia Tools and Applications, pp. 23393–23417, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Roseline Oluwaseun Ogundokun, and Oluwakemi Christiana Abikoye, “A Safe and Secured Medical Textual Information Using an Improved LSB Image Steganography,” International Journal of Digital Multimedia Broadcasting, vol. 2021, pp. 1-8, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Mostafa M. Abdel-Aziz, Khalid M. Hosny, and Nabil A. Lashin, “Improved Data Hiding Method for Securing Color Images,” Multimedia Tools and Applications, vol. 80, pp. 12641–12670, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[37] P.V. Sabeen Govind, and M.V. Judy, “A Secure Framework for Remote Diagnosis in Health Care: A High Capacity Reversible Data Hiding Technique for Medical Images,” Computer and Electrical Engineering, vol. 89, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Hussah N. AlEisa, “Data Confidentiality in Healthcare Monitoring Systems Based on Image Steganography to Improve the Exchange of Patient Information Using the Internet of Things,” Journal of Healthcare Engineering, vol. 2022, pp. 1-11, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Image Comparison in Matlab [Matrix Laboratory] Using Histograms, Coding Lab - TechOnTechnology, 2016. [Online]. Available:
http://codinlab.blogspot.in/2013/10/image-comparison-in-matlab-matrix.html
[40] Image Processing Toolbox, MathWorks, 2016. [Online]. Available: http://in.mathworks.com/help/images/index.htm