Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Whirlpool Algorithm with Hash Function Based Watermarking Algorithm for the Secured Transmission of Digital Medical Images

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Watermarking methods are widely used to provide high-end security in Digital Medical Images (DMI). In general, a secret key is used with the watermarking methods to combine with the original data. In this paper, a novel Whirlpool algorithm with hash function based water marking method is proposed for providing the integrity for DMI. The proposed framework consists of two blocks such as watermark embedding and extracting process and Regular-Singular (R–S) Vector compression. During the embedding process, the watermark is used to enable the image integrity and authentication. To create the watermark, whirlpool hash function is used to create the hash value. This hash value is mixed with patient ID and R-S vector to create the watermark image. Group Extraction is the process of splitting up the image into groups and denoted as a singular value. In R-S vector representation 1 denotes the regular group R, while 0 represents the singular group. The unused groups U are represented as −1. The unused groups U are represented as −1. The performance of the proposed watermarking algorithm is evaluated with the help of Mean Square Error (MSE), PSNR (Peak Signal to Noise Ratio), Bit Error Rate (BER), Normalized Cross-Correlation (NCC) and Bit Correction Rate (BCR). The experimental results proved the good performance of the proposed watermarking algorithm with the comparison of existing watermarking methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Varatharajan R, Manogaran G, Priyan MK, Balaş VE, Barna C (2017) Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimed Tools Appl 1–21. https://doi.org/10.1007/s11042-017-4768-9

  2. Varatharajan R, Vasanth K, Gunasekaran M, Priyan M, Gao XZ (2017) An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images. Comput Electr Eng. https://doi.org/10.1016/j.compeleceng.2017.05.035

  3. Lopez D, Manogaran G (2016) Big data architecture for climate change and disease dynamics. In: Tomar GS et al (eds) The human element of big data: issues, analytics, and performance. CRC Press, Boca Raton, pp 143–154

    Google Scholar 

  4. Manogaran G, Lopez D (2017) Disease surveillance System for big climate data processing and dengue transmission. Int J Ambient Comput Intell 8(2):1–25

    Article  Google Scholar 

  5. Manogaran G, Lopez D (2017) Spatial cumulative sum algorithm with big data analytics for climate change detection. Comput Electr Eng 65(1):207–221. https://doi.org/10.1016/j.compeleceng.2017.04.006

    Article  Google Scholar 

  6. Manogaran G, Lopez D (2017) A Gaussian process based big data 515 processing framework in cluster computing environment. Clust Comput 21(3):1–16. https://doi.org/10.1007/s10586-017-0982-5

    Article  Google Scholar 

  7. Lopez D, Manogaran G, Jagan J (2017) Modelling the H1N1 influenza using mathematical and neural network approaches. Biomed Res 28(8):1–5

    Google Scholar 

  8. Lopez D, Gunasekaran M, Murugan BS, Kaur H, Abbas KM (2014) Spatial BigData analytics of influenza epidemic in Vellore, India. In: Proc. 2014 I.E. International Conference on Big Data. IEEE, pp 19–24

  9. Lopez D, Gunasekaran M (2015) Assessment of Vaccination Strategies Using Fuzzy MulticriteriaDecision Making. In: Proc. Proceedings of the Fifth International Conference on Fuzzy and NeuroComputing (FANCCO-2015). Springer International, pp 195–208

  10. Lopez D, Sekaran G (2016) Climate change and disease dynamics - A big data perspective. Int J Infect Dis 45:23–24

    Article  Google Scholar 

  11. Manogaran G, Vijayakumar V, Varatharajan R, Kumar PM, Sundarasekar R, Hsu CH Machine Learning Based Big Data Processing Framework for Cancer Diagnosis Using Hidden Markov Model and GM Clustering. Wirel Pers Commun 1–18

  12. Varatharajan R, Manogaran G, Priyan MK (2017) A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimed Tools Appl 1–21

  13. Thota C, Sundarasekar R, Manogaran G, Varatharajan R, Priyan MK (2018) Centralized fog computing security platform for IoT and cloud in healthcare system. In: Prasad AVK (eds) Exploring the convergence of big data and the internet of things. IGI Global, pp 141–154. https://doi.org/10.4018/978-1-5225-2497-7.ch011

  14. Manogaran G, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R, Thota C (2017) A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Futur Gener Comput Syst 82(1):375–387. https://doi.org/10.1016/j.future.2017.10.045

    Article  Google Scholar 

  15. Manogaran G, Lopez D (2018) Health data analytics using scalable logistic regression with stochastic gradient descent. Int J Adv Intell Paradigms 10(1-2):118-132

    Google Scholar 

  16. Manogaran G, Thota C, Lopez D, Vijayakumar V, Abbas KM, Sundarsekar R (2017) Big data knowledge system in healthcare. In: Bhatt C, Dey N, Ashour A (eds) Internet of things and big data technologies for next generation healthcare. Springer International Publishing, New York, pp 133–157

    Chapter  Google Scholar 

  17. Varatharajan R, Manogaran G, Priyan MK, Sundarasekar R (2017) Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust Comput 35:1–10

    Google Scholar 

  18. Manogaran G, Lopez D (2017) Disease surveillance system for big climate data processing and dengue transmission. Int J Ambient Comput Intell (IJACI) 8(2):88–105

    Article  Google Scholar 

  19. Manogaran G, Lopez D, Thota C, Abbas KM, Pyne S, Sundarasekar R (2017) Big data analytics in healthcare Internet of Things. In: Qudrat-Ullah H, Tsasis P (eds) Innovative healthcare systems for the 21st century. Springer International Publishing, pp 263–284. https://doi.org/10.1007/978-3-319-55774-8_10

  20. Christopher S, SJ, JM (2017) Novel watermarking scheme with watermark encryption for copyright protection. Biomed Res 28(1)

  21. Li J, Lin Q, Yu C, Ren, X, Li P (2016) A QDCT-and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. Soft Comput 1–19

  22. Khan M, Shah T, Batool SI (2016) A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimed Tools Appl 1–36

  23. Manogaran G, Lopez D (2017) A survey of big data architectures and machine learning algorithms in healthcare. Int J Biomed Eng Technol 25(2–4):182–211

    Article  Google Scholar 

  24. Manogaran G, Thota C, Lopez D (2018) Human-computer interaction with big data analytics. In: HCI Challenges and Privacy Preservation in Big Data Security. IGI Global, pp 1–22

  25. Kumar PM, Gandhi U, Varatharajan R, Manogaran G, Jidhesh R, Vadivel T (2017) Intelligent face recognition and navigation system using neural learning for smart security in Internet of Things. Clust Comput 1–12

  26. Lopez D, Manogaran G (2017) Parametric model to predict H1N1 influenza in Vellore District, Tamil Nadu, India. In: Pyne et al (eds) Handbook of statistics, 37(1). Elsevier, pp 301–316. https://doi.org/10.1016/bs.host.2017.09.005

  27. Manogaran G, Varatharajan R, Priyan MK (2018) Hybrid recommendation system for heart disease diagnosis based on multiple kernel learning with adaptive neuro-fuzzy inference system. Multimed Tools Appl 77(1):4379–4399. https://doi.org/10.1007/s11042-017-5515-y

    Article  Google Scholar 

  28. Sivasundari A, Ramakrishnan M (2018) Hybrid aggregated signcryption scheme using multiconstraints differential evolution algorithm for security. Clust Comput 1–11. https://doi.org/10.1007/s10586-018-2016-3

  29. Mary SJ, Christopher CS, Joe SSA (2016) Novel Scheme for Compressed Image Authentication Using LSB Watermarking and EMRC6 Encryption. Circ Syst 7(08):1722

    Article  Google Scholar 

  30. Ajili S, Hajjaji MA, Bouallegue B, Mtibaa A (2014) Joint Watermarking\Encryption image for safe transmission: Application on medical imaging. In: Computer & Information Technology (GSCIT), 2014 Global Summit on, pp 1–6. IEEE

  31. Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking for medical images. Wirel Pers Commun 92(4):1611–1624

    Article  Google Scholar 

  32. Chauhan DS, Singh AK, Kumar B, Saini JP (2017) Quantization based multiple medical information watermarking for secure e-health. Multimed Tools Appl 1–13. https://doi.org/10.1007/s11042-017-4886-4

  33. Abdel-Nabi H, Al-Haj A (2017) Efficient joint encryption and data hiding algorithm for medical images security. In Information and Communication Systems (ICICS), 2017 8th International Conference on, pp 147–152. IEEE

  34. Dey N, Ashour AS, Chakraborty S, Banerjee S, Gospodinova E, Gospodinov M, Hassanien AE (2017) Watermarking in Biomedical Signal Processing. In: Intelligent Techniques in Signal Processing for Multimedia Security, pp 345–369. Springer International Publishing

  35. Subramanyam AV, Emmanuel S, Kankanhalli MS (2010) Compressed-encrypted domain JPEG2000 image watermarking. In: Multimedia and Expo (ICME), 2010 I.E. International Conference on (pp 1315–1320). IEEE

  36. Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381–8401

    Article  Google Scholar 

  37. Gayathri IK (2013) Digital watermarking using rc5 encryption on JPEG2000 images. Int J Eng Res Tech 2(7):1439–1445

    Google Scholar 

  38. Dey N, Bose S, Das A, Chaudhuri SS, Saba L, Shafique S et al (2016) Effect of watermarking on diagnostic preservation of atherosclerotic ultrasound video in stroke telemedicine. J Med Syst 40(4):91

    Article  Google Scholar 

  39. Elashry IF, Allah OSF, Abbas AM, El-Rabaie S, El-Samie FEA (2009) Homomorphic image encryption. J Electron Imaging 18(3):033002–033002

    Article  Google Scholar 

  40. Kannammal A, Subha Rani S (2014) Two level security for medical images using watermarking/encryption algorithms. Int J Imaging Syst Technol 24(1):111–120

    Article  Google Scholar 

  41. Manogaran G, Thota C, Kumar MV (2016) MetaCloudDataStorage architecture for Big Data security in cloud computing. Proc Comput Sci 87:128–133

    Article  Google Scholar 

  42. Schmitz R, Li S, Grecos C, Zhang X (2014) Towards robust invariant commutative watermarking-encryption based on image histograms. Int J Multimed Data Eng Manag 5(4):36–52

    Article  Google Scholar 

  43. Suganya G, Amudha K (2014) Medical image integrity control using joint encryption and watermarking techniques. In: Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on, pp 1–5. IEEE

  44. Boho A, Van Wallendael G, Dooms A, De Cock J, Braeckman G, Schelkens P et al (2013) End-to-end security for video distribution: The combination of encryption, watermarking, and video adaptation. IEEE Signal Process Mag 30(2):97–107

    Article  Google Scholar 

  45. Thota C, Manogaran G, Lopez D, Vijayakumar V (2017) Big Data Security Framework for Distributed Cloud Data Centers. In: Cybersecurity Breaches and Issues Surrounding Online Threat Protection, pp 288–310. IGI Global

  46. Schmitz R, Li S, Grecos C, Zhang X (2012) A new approach to commutative watermarking-encryption. In: Communications and Multimedia Security, pp 117–130. Springer Berlin/Heidelberg

  47. Manogaran G, Thota C, Lopez D, Sundarasekar R (2017) Big data security intelligence for healthcare industry 4.0. In: Cybersecurity for Industry 4.0 (pp. 103–126). Springer International Publishing

  48. Xiao D, Chang Y, Xiang T, Bai S (2017) A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance. Multimed Tools Appl 76(7):9265–9296

    Article  Google Scholar 

  49. Abdel-Basset M, Gunasekaran M, Mohamed M, Smarandache F (2018) A novel method for solving the fully neutrosophic linear programming problems. Neural Comput & Applic 43(1):1–11. https://doi.org/10.1007/s00521-018-3404-6

    Article  Google Scholar 

  50. Abdel-Basset M, Manogaran G, Abdel-Fatah L, Mirjalili S (2018) An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems. Pers Ubiquit Comput 23(1):1–16. https://doi.org/10.1007/s00779-018-1132-7

    Article  Google Scholar 

  51. Mathan K, Kumar PM, Panchatcharam P, Manogaran G, Varadharajan R (2018) A novel Gini index decision tree data mining method with neural network classifiers for prediction of heart disease. Des Autom Embed Syst 1–18. https://doi.org/10.1007/s10617-018-9205-4

  52. Abdel-Basset M, Gunasekaran M, El-Shahat D, Mirjalili S (2018) A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem. Futur Gener Comput Syst 85:129–145. https://doi.org/10.1016/j.future.2018.03.020

    Article  Google Scholar 

  53. Varatharajan R, Preethi AP, Manogaran G, Kumar PM, Sundarasekar R (2018) Stealthy attack detection in multi-channel multi-radio wireless networks. Multimed Tools Appl 1–24. https://doi.org/10.1007/s11042-018-5866-z

  54. Manickam A, Devarasan E, Manogaran G, Priyan MK, Varatharajan R, Hsu CH, Krishnamoorthi R (2018) Score level based latent fingerprint enhancement and matching using SIFT feature. Multimed Tools Appl 1–21. https://doi.org/10.1007/s11042-018-5633-1

  55. Priya S, Varatharajan R, Manogaran G, Sundarasekar R, Kumar PM (2018) Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. Pers Ubiquit Comput 1–11. https://doi.org/10.1007/s00779-018-1131-8

  56. Subramaniyaswamy V, Manogaran G, Logesh R, Vijayakumar V, Chilamkurti N, Malathi D, Senthilselvan N (2018) An ontology-driven personalized food recommendation in IoT-based healthcare system. J Supercomput 1–33. https://doi.org/10.1007/s11227-018-2331-8

  57. Gandhi UD, Kumar PM, Varatharajan R, Manogaran G, Sundarasekar R, Kadu S (2018) HIoTPOT: surveillance on IoT devices against recent threats. Wirel Pers Commun 1–16. https://doi.org/10.1007/s11277-018-5307-3

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Varatharajan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Selvaraj, P., Varatharajan, R. Whirlpool Algorithm with Hash Function Based Watermarking Algorithm for the Secured Transmission of Digital Medical Images. Mobile Netw Appl 28, 1371–1384 (2023). https://doi.org/10.1007/s11036-018-1057-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-018-1057-4

Keywords