Dual Secured Reversible Medical Image Watermarking for Internet of Medical Things

Publications

Dual Secured Reversible Medical Image Watermarking for Internet of Medical Things

Dual Secured Reversible Medical Image Watermarking for Internet of Medical Things

Author : Dr Priyanka

Year : 2022

Publisher : Springer Verlag

Source Title : Studies in Computational Intelligence

Document Type :

Abstract

The Internet of Medical Things (IoMT) plays a big role in today’s healthcare industry. Smart healthcare has been a great use in sharing all kinds of medical data from Electronic Health Records (EHR) to hospital management. This advancement in healthcare made the diagnosis easy for the doctors and patients by saving their time. But in recent years there are a lot of threats in IoT and IoMT frameworks which motivated many researchers to find a way to overcome these challenges. In this paper, reversible data hiding technique using a linear and quadratic difference expansion to embed the EHR on the image is proposed. The medical image is divided into Border Region (BR) and Non Border Region (NBR). The hospital logo is watermarking in the BR of the image. Using LSB (Least Significant Bit) method hospital logo is embedded to ensure autauthentication. LSB approach is an easy and fast way to perform. To ensure confidentiality NBR is used for EPR embedding. Selecting a pair of pixels in NBR for embedding 2 bits of EPR pixels at each time with the linear and quadratic difference expansion. For ensuring dual security, EPR is encrypted using a Pseudo random key. Then encrypted EPR is partitioned into Odd and Even position pixels parts. Further, Odd and Even position pixels are watermarking in NBR using linear and quadratic difference expansion. Pseudo random key is generated adaptively from the mean of Medical image and Divide and Conquer algorithm to provide higher security. This proposed method is proved to take less computational time as there are no complex functions used in the algorithm. The test performed on this technique is proved to have high imperceptibility, robustness, security, and less computational time. All this confirms that proposed approach is a potential candidate for the security of data in the IoMT frameworks.