CFP last date
22 April 2024
Reseach Article

Digital Watermarking for Telemedicine Applications: A Review

by Nisreen I.R. Yassin
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 17
Year of Publication: 2015
Authors: Nisreen I.R. Yassin
10.5120/ijca2015907183

Nisreen I.R. Yassin . Digital Watermarking for Telemedicine Applications: A Review. International Journal of Computer Applications. 129, 17 ( November 2015), 30-37. DOI=10.5120/ijca2015907183

@article{ 10.5120/ijca2015907183,
author = { Nisreen I.R. Yassin },
title = { Digital Watermarking for Telemedicine Applications: A Review },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 17 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 30-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number17/23168-2015907183/ },
doi = { 10.5120/ijca2015907183 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:42.725931+05:30
%A Nisreen I.R. Yassin
%T Digital Watermarking for Telemedicine Applications: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 17
%P 30-37
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Telemedicine is an emerging science that can help in solving the modern global health problems. Exchanging medical images and Electronic Patient Records (EPR) between clinicians, specialists, and radiologists provides a platform for discussing and consulting diagnostic and therapeutic problems. Using Information and Communication Technologies (ICT) in the transmission of medical information for improving healthcare access, diagnosis, and treatment requires various means for security and privacy issues, since, digital information can be easily attacked to be duplicated and manipulated. Digital watermarking is a data hiding technique which used for improving the security of various multimedia applications and extensively investigated to protect the privacy of patients through telemedicine systems. This paper aims to provide a useful preview on telemedicine and the using of digital watermarking in this field.

References
  1. American Hospital Association, “The Promise of Tele- health for Hospitals, Health Systems and their Communities”, Trend Watch, January 2015.
  2. G. Coatrieux, L. Lecornu, B. Sankur, and Ch. Roux, “A Review of Image Watermarking Applications in Healthcare”, Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS '06, pp. 4691- 4694, 2006.
  3. H. M. Chao, C. M. Hsu, and A.-G. Miaou, “A Data Hiding Technique with Authentication, Integration and Confidentiality for Electronic Patient Records”, IEEE Transactions on Information Technology in Biomedicine, vol. 6, issue 1, pp. 46-53, March 2002.
  4. Elek Dinya, Tamás Tóth, “Health Informatics: e-HEALTH and TELEMEDICINE”, Institute of Health Informatics, Semmelweis University, February 4, 2013.
  5. K. A. Navas, S. A. Thampy, and M. Sasikumar, “ ERP Hiding in Medical Images for Telemedicine,” in Proceedings of the World Academy of Science and Technology, vol. 28, 2008.
  6. S. C. Rathi and V. S. Inamdar, “Medical Images Authentication through Watermarking Preserving ROI”, Health Informatics International Journal (HIIJ), vol. 1, no. 1, August 2012.
  7. Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R, “Relevance of watermarking in medical imaging”, Information Technology Applications in Biomedicine, pp. 250–255, 2000.
  8. Navas KA, Sasikumar M, “Survey of medical image watermarking algorithms”, Presented at the 4th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications (SETIT), Tunisia, 2007.
  9. World Health Organization, “Telemedicine: opportunities and developments in Member States: report on the second global survey on e-Health”, 2009.
  10. Ming-gang Wang, Ying-jun Mao and Wei Li, ”The Application of Telemedicine Technology”, Lecture Notes in Electrical Engineering, Springer 2014.
  11. Paar C, Pelzl J, “Hash functions: understanding cryptography”, Springer Berlin Heidelberg, pp. 293–317, 2010.
  12. Hussain Nyeem, Wageeh Boles, Colin Boyd, “ A Review of Medical Image Watermarking Requirements for Tele-radiology”, Society for Imaging Informatics in Medicine, September 2012.
  13. I. J. Cox, M. L. Miller, and J. A. Bloom, Digital watermarking, Morgan Kaufmann Publishers, Sans Francisco, CA, USA, 2004.
  14. O. Findik, I. Babaoglu, and E. Ulker, “A Color Image Watermarking Scheme Based on Hybrid Classification Method: Particle Swarm Optimization and k-nearest Neighbor Algorithm,” In: Optics Communications, vol. 283(24), pp. 4916-4922, 2010.
  15. Digital watermarking services & applications. Available:http://www.digitalwatermarkingalliance.org/membership.asp
  16. M. Arnold, M. Schmucker, and S. D. Wolthusen, “Techniques and Applications of Digital Watermarking and Content Protection”, Artech House computer Security Series, 2003.
  17. M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia data-embedding and watermarking technologies,” Proceedings of the IEEE, vol. 86, issue 6, pp. 1064-1087, June 1998.
  18. M. Ishtiaq, M. A. Ja-ar, M. A. Khan, Z. Jan, and A. M. Mirza, “Robust and Imperceptible Watermarking of Video Streams for Low Power Devices,” Communication Computer Information Science, vol. 61, pp. 177-184, 2009.
  19. A. N. Netravali and B. G. Haskell, Digital Pictures: Representation, Compression, and Standards, Plenum, New York, 1995.
  20. M. K. Thakur, V. Saxena, and J. P. Gupta, “A Performance Analysis of Objective Video Quality Metrics for Digital Video Watermarking,” in Proceeding of the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp. 12_17, Chengdu, China, July 9-11, 2010.
  21. P. Singh and R. S. Chadha, “A Survey of Digital Watermarking Techniques, Applications and Attacks,” International Journal of Engineering and Innovative Technology (IJEIT), vol. 2, issue 9, March 2013.
  22. A. M. Al-Haj, Advanced Techniques in Multimedia Watermarking: Image, Video and Audio Applications, Hershey, New York, 2010.
  23. J. Fridrich and M. Goljan, “Comparing Robustness of Watermarking Techniques,” in Proceeding of Electronic Imaging '99, The International Society for Optical Engineering, Security and Watermarking of Multimedia Contents, vol. 3657, pp. 214-225, San Jose, CA, January 25-27, 1999.
  24. Kaur M, KAUR R, “Reversible watermarking of medical images authentication and recovery- a survey”, Journal of Information and Operations Management, vol. 3, Issue 1, pp. 241– 244, 2012.
  25. R. Chandramouli and N. Memon, “Analysis of LSB Based Image Steganography Techniques,” in Proceedings International Conference on Image Processing, vol. 3, pp. 1019-1022, Thessaloniki, Greece, 7-10 October, 2001.
  26. E. Chrysochos, V. Fotopoulos, A. Skodras, “Robust Watermarking of Digital Images Based on Chaotic Mapping and DCT,” in Proceedings of the16th European Signal Processing Conference (EUSIPCO 2008), Lausanne, Switzerland, 25-29 August, 2008.
  27. A. G. Bors and I. Pitas, “Image Watermarking using Block Site Selection and DCT Domain Constraints,” Optical Express, pp. 512-523, 1998.
  28. A. D. Roza, M. Barni, F. Bartolini, V. Capalini, and A. Piva., “Optimal Decoding of Non-additive Full Frame DFT Watermarks“, Proceedings of the 3rd Workshop on Data Hiding, 2006.
  29. V. Solachidis and I. Pitas, “Circularly symmetric watermark embedding in 2-D DFT domain,” IEEE Transactions on Image Processing, vol. 10, no. 11, pp. 1741-1753, 2001.
  30. P. Loo, “Digital Watermarking using Complex Wavelets,” in Signal Processing and Communication Laboratory, Department of Engineering, University of Cambridge, 2002.
  31. D. Kundur and D. Hitzinakos, “A Robust Digital Image Watermarking Method using Wavelet-based Fusion,” in Proceedings of International Conference on Image Processing, Washington DC, USA, 1997.
  32. Anusudha Krishnamurthi1, N. Venkateswaran2, and J. Valarmathi3,”Swarm Optimization Based Dual Transform Algorithm for Secure Transaction of Medical Images”, The Advances in Intelligent Systems and Computing series,  vol. 328, pp. 483-491, Springer 2015.
  33. Ali Al-Haj, Alaa’ Amer,” Secured Telemedicine Using Region-Based Watermarking with Tamper Localization Secured Telemedicine Using Region-Based Watermarking with Tamper Localization”, Journal of digital imaging, Vol. 27, pp. 737–750 ,May 2014.
  34. Manuel Cedillo-Hernandez, Francisco Garcia-Ugalde, Mariko Nakano-Miyatake, Hector Perez-Meana,” Robust watermarking method in DFT domain for effective management of medical imaging”, Signal, Image, and Video processing Journal, Volume 9, Issue 5, pp 1163-1178, July 2015.
  35. Amit Kumar Singh, Basant Kumar, Mayank Dave, Anand Mohan,” Robust and Imperceptible Spread-Spectrum Watermarking for Telemedicine Applications”, Proceeding of The National Academy of Sciences, Volume 85, Issue 2, pp 295-301, India 2015.
  36. Nilanjan Dey, Goutami Dey, Sayan Chakraborty and Sheli Sinha Chaudhuri, ”Feature Analysis of Blind Watermarked Electro-myogram Signal in Wireless Tele-monitoring”, Concepts and Trends in Healthcare Information Systems Volume 16 of the series Annals of Information Systems,  pp 205-229, September 2014.
  37. K. Anusudha , N. Venkateswaren, “Energy Based Wavelet Domain Medical Image Watermarking”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 3, Issue 2, February 2014.
  38. N. venkatram, l. s. s. reddy, p. v. v.kishore, ch.shavya, "RSA-DWT based medical image watermarking for telemedicine applications", journal of theoretical and applied information technology31st.,vol. 65, no.3, July 2014.
  39. A. Umaamaheshvari and K. Thanushkodi, “Digital Image Watermarking Based on Independent Component Analysis and Ridgelet Transform,” International Journal of Computer Science and Network Security, IJCSNS, vol. 11, no. 4, April 2011.
  40. S. M. Ramesh and A. Shanmugam, “An Efficient Robust Watermarking Algorithm in Filter Techniques for Embedding Digital Signature into Medical Images Using Discrete Wavelet Transform”, European Journal of Scientific Research, vol. 60, no.1,pp. 33-44, 2011.
  41. M. A. Hajjaji, A. Mtibaa, and E. B. Bourennane, “Watermarking of Medical Image: New Approach Based On Multi-Layer Method,” International Journal of Computer Science Issues, IJCSI, vol. 8, issue 4, no. 2, July 2011.
  42. B. Kumar, A. Anand, S. P. Singh, and A. Mohan, “High Capacity Spread-Spectrum Watermarking for Telemedicine Applications,” World Academy of Science, Engineering and Technology, vol. 79, 2011.
  43. M. A. Hajjaji, A. Mtibaa, and E. B. Bourennane, “A Watermarking of Medical Image: Method Based "LSB", Journal of Emerging Trends in Computing and Information Sciences, vol.2, no. 12, December 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Watermarking Telemedicine Data Hiding Techniques Electronic Patient Record Security Systems.