Protection and Authentication of DICOM Images with Iris Recognition
DOI:
https://doi.org/10.21015/vtse.v13i4.2277Abstract
Protection of medical images over the internet is a challenging task regarding its communication and usefulness. This work proposes a novel mechanism for the protection of DICOM images. The technique provides the facility to embed the iris (image) as a watermark to protect its integrity. After retrieval of the watermark, the mechanism is so robust that it recognizes the iris efficiently and correctly. Similarly, the system protects the Region of Interest (ROI) before the extraction of watermark as it is quite difficult to find volume, visualize or analyze the ROI. The technique not only protects the watermark but also gives the protection to ROI, which may be different in various medical images. Experimental results provide a deep view about the robustness of the technique in real time against both the intentional and unintentional attacks. The empirical results also show that after extraction of the watermark, the system has the capability to accurately find the volume, visualize and analyze the ROI.
References
A. Benyoucef et al., “High-capacity DWT-SVD watermarking for MRI images embedding MITR medical information,” Results in Engineering, p. 105795, 2025.
A. F. Qasim et al., “Assessment of perceptual distortion boundary through applying reversible watermarking to brain MR images,” Signal Processing: Image Communication, vol. 70, pp. 246–258, 2019.
A. M. A. Awwad, “A novel zero-watermarking scheme based on two-dimensional cellular automata,” Multimedia Tools and Applications, vol. 83, no. 23, pp. 62829–62851, 2024.
A. F. Qasim, F. Meziane, and R. Aspin, “Digital watermarking: Applicability for developing trust in medical imaging workflows—A state-of-the-art review,” Computer Science Review, vol. 27, pp. 45–60, 2018. DOI: https://doi.org/10.1016/j.cosrev.2017.11.003
M. S. Moad, M. R. Kafi, and A. Khaldi, “A wavelet-based medical image watermarking scheme for secure transmission in telemedicine applications,” Microprocessors and Microsystems, vol. 90, p. 104490, 2022.
A. Singh and M. K. Dutta, “A robust zero-watermarking scheme for tele-ophthalmological applications,” Journal of King Saud University – Computer and Information Sciences, vol. 32, no. 8, pp. 895–908, 2020. DOI: https://doi.org/10.1016/j.jksuci.2017.12.008
W. Etoom and A. Al-Haj, “A robust and imperceptible watermarking method for 3D DIBR images,” Multimedia Tools and Applications, vol. 81, no. 20, pp. 28165–28182, 2022.
C.-P. Wang, X.-Y. Wang, and Z.-Q. Xu, “Geometrically invariant image watermarking based on fast radial harmonic Fourier moments,” Signal Processing: Image Communication, vol. 45, pp. 10–23, 2016. DOI: https://doi.org/10.1016/j.image.2016.03.007
B. P. Devi, K. M. Singh, and S. Roy, “New copyright protection scheme for digital images based on visual cryptography,” IETE Journal of Research, vol. 63, no. 6, pp. 870–880, 2017. DOI: https://doi.org/10.1080/03772063.2017.1324328
A. Y. Altay and G. Ulutaş, “Self-adaptive step firefly algorithm-based robust watermarking method in DWT-SVD domain,” Multimedia Tools and Applications, vol. 80, no. 15, pp. 23457–23484, 2021.
G. Bhatnagar and Q. M. J. Wu, “A new logo watermarking based on redundant fractional wavelet transform,” Mathematical and Computer Modelling, vol. 58, no. 1–2, pp. 204–218, 2013. DOI: https://doi.org/10.1016/j.mcm.2012.06.002
A. Taheri and S. M. Boroujeni, “A new high robust digital image watermarking algorithm using discrete wavelet transform and recurrent neural network,” in Proc. 9th Iranian Conf. on Intelligent Systems (ICIS), IEEE, 2024.
Z. Zainol et al., “Hybrid SVD-based image watermarking schemes: A review,” IEEE Access, vol. 9, pp. 32931–32968, 2022.
Y. Zhang, H. Wang, and J. Zhao, “Eliminating orthonormal constraints of SVD to guarantee full retrievability of blind watermarking,” Multimedia Tools and Applications, vol. 83, no. 9, pp. 25365–25391, 2024.
T.-Y. Fan, H.-C. Chao, and B.-C. Chieu, “Lossless medical image watermarking method based on significant difference of cellular automata transform coefficient,” Signal Processing: Image Communication, vol. 70, pp. 174–183, 2019.
P. K. Mannepalli et al., “A robust blockchain-based watermarking using edge detection and wavelet transform,” Multimedia Tools and Applications, vol. 84, no. 14, pp. 12739–12763, 2025.
J. M. Zain, L. P. Baldwin, and M. Clarke, “Reversible watermarking for authentication of DICOM images,” in Proc. 26th Annu. Int. Conf. IEEE Engineering in Medicine and Biology Society (EMBS), IEEE, 2004.
C. K. Tan et al., “Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability,” Journal of Digital Imaging, vol. 24, no. 3, pp. 528–540, 2011. DOI: https://doi.org/10.1007/s10278-010-9295-4
O. M. Al-Qershi and B. E. Khoo, “Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images,” Journal of Digital Imaging, vol. 24, no. 1, pp. 114–125, 2011. DOI: https://doi.org/10.1007/s10278-009-9253-1
S. Das and M. K. Kundu, “Effective management of medical information through ROI-lossless fragile image watermarking technique,” Computer Methods and Programs in Biomedicine, vol. 111, no. 3, pp. 662–675, 2013. DOI: https://doi.org/10.1016/j.cmpb.2013.05.027
R. Thanki et al., “An efficient medical image watermarking scheme based on FDCuT–DCT,” Engineering Science and Technology, an International Journal, vol. 20, no. 4, pp. 1366–1379, 2017. DOI: https://doi.org/10.1016/j.jestch.2017.06.001
M. Yu et al., “A new stereo image watermarking method for 3D media,” Procedia Engineering, vol. 29, pp. 2399–2404, 2012. DOI: https://doi.org/10.1016/j.proeng.2012.01.322
X. W. Li and S. T. Kim, “Optical 3D watermark-based digital image watermarking for telemedicine,” Optics and Lasers in Engineering, vol. 51, no. 12, pp. 1310–1320, 2013. DOI: https://doi.org/10.1016/j.optlaseng.2013.06.001
X. W. Li and S. T. Kim, “An improved cellular automata-based digital image watermarking scheme combining pixel-wise masking and 3D integral imaging,” Optics Communications, vol. 319, pp. 45–55, 2014. DOI: https://doi.org/10.1016/j.optcom.2013.12.089
M. Papaioannou et al., “A survey on security threats and countermeasures in internet of medical things (IoMT),” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 6, 2022.
L. Novamizanti, A. B. Suksmono, D. Danudirdjo, and G. Budiman, “Robust and imperceptible watermarking on medical images using coefficient pair modification,” IIUM Engineering Journal, vol. 24, no. 1, pp. 88–105, 2023.
B. H. Sai, D. Sheela, R. Mahaveerakannan, and K. Sudhakar, “Improvement of PSNR for digital image watermarking using discrete wavelet transform in comparison with discrete cosine transform algorithm,” in Proc. Int. Conf. on Computing and Communication Networks, Singapore: Springer Nature, pp. 423–435, 2024.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY