Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30578
EPR Hiding in Medical Images for Telemedicine

Authors: K. A. Navas, S. Archana Thampy, M. Sasikumar


Medical image data hiding has strict constrains such as high imperceptibility, high capacity and high robustness. Achieving these three requirements simultaneously is highly cumbersome. Some works have been reported in the literature on data hiding, watermarking and stegnography which are suitable for telemedicine applications. None is reliable in all aspects. Electronic Patient Report (EPR) data hiding for telemedicine demand it blind and reversible. This paper proposes a novel approach to blind reversible data hiding based on integer wavelet transform. Experimental results shows that this scheme outperforms the prior arts in terms of zero BER (Bit Error Rate), higher PSNR (Peak Signal to Noise Ratio), and large EPR data embedding capacity with WPSNR (Weighted Peak Signal to Noise Ratio) around 53 dB, compared with the existing reversible data hiding schemes.

Keywords: Data Security, Biomedical Imaging, Datacommunication, Teleconferencing

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2299


[1] H. Munch, U. Engelmann, A. Schroter, H.P. Meinzer, "The Integration of Medical Images with the Electronic Patient Record and their Web- Based Distribution," in Academic Radiology, Vol.11, No.6, Pp.661-668, June 2004.
[2] Xuanwen Luo, Qiang Cheng, Joseph Tan, "A Lossless Data Embedding Scheme For Medical in Application of e- Diagnosis," Proceedings of the 25th Annual International Conference of the IEEE EMBS Cancun, Mexico. September 17-21, 2003.
[3] Rodriguez-Colin Raul, Feregrino-Urabe Claudia, Trinidiad Blas Gershom De J. "Data Hiding Scheme for Medical Images", 17th International Conference on Electronics, communications and computers (CONIELECOMP) 2007.
[4] Smitha B, Navas. K A, "Spatial Domain-High capacity data hiding in ROI images", Proc. Int. Conf on Signal processing, communication and networking IEEE-ICSCN-2007, Chennai, India, pp 528-533. 22-24 Feb 2007.
[5] Xiaoyun Wu, Junquan Hu, Zhixiong Gu, Jiwu Huang, "A Secure Semi- Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters" Australasian Information Security Workshop, Newcstle, Austalia, 2005.
[6] Nopporon Chotikakamthorn and Natapon Pantuwong, "Attacks on Feature-based Affine-invariant watermarking method," the fifth international conference on computer information technology (CIT-05) 2005.
[7] Sviatolsav Voloshynovskiy, Shelby Pereira, Thierry Pun, Joachim J. Eggers and Jonathan K. Su, "Attacks on Digital Watermarks: Classification, Estimation-Based Attacks, and Benchmarks" IEEE Communications Magazine August 2001.
[8] Navas K A, Nithya S, Rakhi R, Sasikumar M, "Lossless watermarking in JPEG2000 for EPR data hiding", Proc. IEEE-EIT 2007, Chicago, USA, 17-20 June 2007, pp 697-702.
[9] S.Yousefi, H.R.Rabiee, E.Yousefi, M.Ghanbari, "Reversible Data Hiding Using Histogram Sorting and Integer Wavelet Transform" Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST) 2007.
[10] M. Kutter and F. A. P. Petitcolas, "A fair benchmark for image watermarking systems," Electronic Imaging '99. Security and Watermarking of Multimedia Contents, vol. 3657, Sans Jose, CA, USA, The International Society for Optical Engineering, 25-27 January 1999.