Abstract
Security and privacy are essential requirements, and their fulfillment is considered one of the most challenging tasks for healthcare organizations to manage patient data using electronic health records. Electronic health records (clinical notes, images, and documents) become more vulnerable to breaching patients’ privacy when shared with an external organization in the current arena of the internet of medical things (IoMT). Various watermarking techniques were introduced in the medical field to secure patients’ data. Most of the existing techniques focus on an image or document’s imperceptibility without considering the watermark(logo). In this research, a novel technique of watermarking is introduced, which supersedes the shortcomings of existing approaches. It guarantees the imperceptibility of the image/document and takes care of watermark(biometric), which is further passed through a process of recognition for claiming ownership. It extracts suitable frequencies from the transform domain using specialized filters to increase the robustness level. The extracted frequencies are modified by adding the biomedical information while considering the strength factor according to the human visual system. The watermarked frequencies are further decomposed through a singular value decomposition technique to increase payload capacity up to (256 × 256). Experimental results over a variety of medical and official images demonstrate the average peak signal-to-noise ratio (PSNR 54.43), and the normal correlation (N.C.) value is 1. PSNR and N.C. of the watermark were calculated after attacks. The proposed technique is working in real-time for embedding, extraction, and recognition of biometrics over the internet, and its uses can be realized in various platforms of IoMT technologies.
Highlights
The exponential growth of communication over the internet expands the benefits of multimedia in various aspects
There has been a multifold endeavor for the preferment of digital image watermarking techniques
Before digging into the explanation, the readers are encouraged to look into the Abbreviation section for a list of symbols used throughout this section in different formalism and algorithms; Algorithm 1 Embedding Algorithm
Summary
The exponential growth of communication over the internet expands the benefits of multimedia (e.g., image, audio, video) in various aspects. The flow of digital content in emerging medical sharing platforms using the internet of medical things (IoMT) technologies requires communication links that are safe and secure from unauthorized and illegal tampering [2]. Digital content sent over insecure and treacherous links can be replicated, tempered, and destroyed due to advancements in multimedia technologies, causing unbearable consequences. In this context, preliminary efforts have been made to enable access controls for IoT systems, facilitating user-controlled access to privileged digital resources [3]. There has been a multifold endeavor for the preferment of digital image watermarking techniques. The primary considerations of watermarking are the imperceptibility and recovering of the watermark
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.