{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:40:25Z","timestamp":1760190025040,"version":"build-2065373602"},"reference-count":39,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T00:00:00Z","timestamp":1566172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>In this work, a reversible watermarking technique is proposed for DICOM (Digital Imaging and Communications in Medicine) image that offers high embedding capacity (payload), security and fidelity of the watermarked image. The goal is achieved by embedding watermark based on companding in lifting based discrete wavelet transform (DWT) domain. In the embedding process, the companding technique is used to increase the data hiding capacity. On the other hand, a simple linear function is used in companding to make the scheme easy to implement, and content dependant watermark is used to make the scheme robust to collusion operation. Moreover, unlike previously proposed reversible watermarking techniques, this novel approach does not embed the location map in the host image that ultimately helps to achieve high fidelity of the watermarked image. The advantage of the proposed scheme is demonstrated by simulation results and also compared with selected other related schemes.<\/jats:p>","DOI":"10.3390\/cryptography3030021","type":"journal-article","created":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T11:22:38Z","timestamp":1566213758000},"page":"21","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Reversible Data Hiding for DICOM Image Using Lifting and Companding"],"prefix":"10.3390","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2430-5848","authenticated-orcid":false,"given":"Amit","family":"Phadikar","sequence":"first","affiliation":[{"name":"Department of Information Technology, MCKV Institute of Engineering, Liluah, Howrah 711204, India"}]},{"given":"Poulami","family":"Jana","sequence":"additional","affiliation":[{"name":"Department of Electronics &amp; Telecommunication Engineering, Bengal Institute of Polytechnic, Birbhum 731124, India"}]},{"given":"Himadri","family":"Mandal","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Calcutta Institute of Technology, Uluberia, Howrah 711316, India"}]}],"member":"1968","published-online":{"date-parts":[[2019,8,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.cosrev.2017.11.003","article-title":"Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review","volume":"27","author":"Qasim","year":"2018","journal-title":"Comput. Sci. Rev."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"8603","DOI":"10.1007\/s11042-018-7128-5","article-title":"Survey of robust and imperceptible watermarking","volume":"78","author":"Agarwal","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_3","unstructured":"Maity, S.P., Kundu, M.K., Nandi, P., and Das, T.S. (2004, January 20\u201322). Robust image watermarking using multiresolution analysis. Proceedings of the IEEE INDICON 2004 First India Annual Conference, Kharagpur, India."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-3-540-31805-7_10","article-title":"Reversible data hiding using integer wavelet transform and companding technique","volume":"3304","author":"Xuan","year":"2005","journal-title":"International Workshop Digital Watermarking"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.aci.2014.03.001","article-title":"On classification in the case of a medical data set with a complicated distribution","volume":"10","author":"Juhola","year":"2014","journal-title":"Appl. Comput. Inform."},{"key":"ref_6","first-page":"199","article-title":"Understanding and using DICOM, the data interchange standard for biomedical imaging","volume":"4","author":"Bidgood","year":"1997","journal-title":"JAMIA Open"},{"key":"ref_7","unstructured":"Honsinger, C.W., Jones, P., Rabbani, M., and Stoffel, J.C. (2001). Lossless Recovery of an Original Image Containing Embedded Data. (6,278,791), U.S. Patent."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"9691","DOI":"10.1007\/s11042-018-6567-3","article-title":"Reversible data hiding with differential compression in encrypted image","volume":"78","author":"Tang","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_10","unstructured":"Jinna, S.K., and Ganesan, L. (2010, January 7\u20139). Analysis of reversible image watermarking using bit plane coding and lifting wavelet transform with attacks. Proceedings of the IEEE International Conference on Communication Control and Computing Technologies, Ramanathapuram, India."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"3524","DOI":"10.1109\/TIP.2011.2150233","article-title":"Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection","volume":"20","author":"Xiaolong","year":"2011","journal-title":"IEEE Trans. Image Process."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","article-title":"Reversible image watermarking based on integer-to-integer wavelet transform","volume":"2","author":"Lee","year":"2007","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","article-title":"Reversible watermarking algorithm using sorting and prediction","volume":"19","author":"Sachnev","year":"2009","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_14","unstructured":"Weng, S., Zhao, Y., Pan, J., and Ni, R. (October, January 16). A novel reversible watermarking based on an integer transform. Proceedings of the IEEE International Conference on Image Processing, San Antonio, TX, USA."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Liu, L., Wang, L., Shi, Y.Q., and Chang, C.C. (2019). Separable data-hiding scheme for encrypted image to protect privacy of user in cloud. Symmetry, 11.","DOI":"10.3390\/sym11010082"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.aci.2014.02.001","article-title":"On the security of SSL\/TLS-enabled applications","volume":"10","author":"Das","year":"2014","journal-title":"Appl. Comput. Inform."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1504\/IJESDF.2013.054405","article-title":"A new elliptic curve cryptosystem for securing sensitive data applications","volume":"5","author":"Vigila","year":"2013","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","article-title":"Efficient reversible data hiding based on multiple histograms modification","volume":"10","author":"Li","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1016\/j.jvcir.2016.03.011","article-title":"Improved PVO-based reversible data hiding: A new implementation based on multiple histograms modification","volume":"38","author":"Ou","year":"2016","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.ins.2019.03.032","article-title":"Dynamic improved pixel value ordering reversible data hiding","volume":"489","author":"Weng","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Phadikar, A., Maity, S.P., and Mandal, M.K. (2010, January 2\u20135). QIM data hiding for tamper detection and correction in digital images using wavelet transform. Proceedings of the 22nd IEEE Canadian Conference on Electrical and Computer Engineering, Calgary, AB, Canada.","DOI":"10.1109\/CCECE.2010.5575130"},{"key":"ref_22","unstructured":"Jana, P., Phadikar, A., Maity, S.P., and Chakraborty, D.P. (2014, January 2\u20134). Reversible data hiding using wavelet transform and companding for DICOM image. Proceedings of the 1st International Conference on Industrial Engineering Science and Applications, Durgapur, India."},{"key":"ref_23","unstructured":"Lu, X., Zhang, M., Yang, L., Zhao, Y., and Liu, J. (2012, January 7\u20138). Research and implementation of medical images management system based on DICOM standard. Proceedings of the International Conference on Biological and Biomedical Sciences Advances in Biomedical Engineering, Bangkok, Thailand."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/s10278-018-0073-z","article-title":"DICOMweb\u2122: Background and application of the web standard for medical imaging","volume":"31","author":"Genereaux","year":"2018","journal-title":"J. Digit. Imaging"},{"key":"ref_25","unstructured":"Standard (2004). Digital Imaging and Communications in Medicine (DICOM), National Electrical Manufacturers Association. Part 5: Data Structures and Encoding."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.eij.2012.11.002","article-title":"A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine","volume":"14","year":"2013","journal-title":"Egypt. Inform. J."},{"key":"ref_27","unstructured":"Boliek, M., Christopoulos, C., and Majani, E. (2000, August 18). JPEG 2000 Part I Final Draft International Standard. (ISO\/IEC FDIS15444-1), ISO\/IEC JTC1\/SC29\/WG1 N1855. Available online: https:\/\/pdfs.semanticscholar.org\/1be5\/a1b60ce2f9fecfd816edf8263ae35b61d17c.pdf."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/83.846244","article-title":"Reversible integer-to-integer wavelet transforms for image compression: Performance evaluation and analysis","volume":"9","author":"Adams","year":"2000","journal-title":"IEEE Trans. Image Process."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s11235-010-9371-6","article-title":"Image error concealment and quality access control based on data hiding and cryptography","volume":"49","author":"Phadikar","year":"2012","journal-title":"Int. J. Telecommun. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1016\/j.image.2011.07.008","article-title":"Data hiding based quality access control of digital images using adaptive QIM and lifting","volume":"26","author":"Phadikar","year":"2011","journal-title":"J. Signal Process. Image Commun."},{"key":"ref_31","unstructured":"Uytterhoeven, G., Roose, D., and Bultheel, A. (1997). Wavelet Transforms Using Lifting Scheme, Department of Computer Science, Katholieke Universiteit Leuven. Technical Report ITA-Wavelets Report."},{"key":"ref_32","unstructured":"Sklar, B. (2017). Digital Communications: Fundamentals and Applications, PTR Prentice Hall."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: From error measurement to structural similarity","volume":"13","author":"Wang","year":"2004","journal-title":"IEEE Trans. Image Process."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Phadikar, A., and Maity, S.P. (2010, January 18\u201321). Multibit QIM watermarking using M-ary modulation and lifting. Proceedings of the 2010 International Conference on Signal Processing and Communications, Bangalore, India.","DOI":"10.1109\/SPCOM.2010.5560555"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Maity, S.P., and Mukherjee, M. (2009, January 9\u201310). Subcarrier PIC scheme for high capacity CI\/MC-CDMA system with variable data rates. Proceedings of the IEEE Mobile WiMAX\u201909, Napa Valley, CA, USA.","DOI":"10.1109\/MWS.2009.19"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1016\/j.ins.2010.09.029","article-title":"Perceptually adaptive spread transform image watermarking scheme using Hadamard transform","volume":"181","author":"Maity","year":"2011","journal-title":"Inf. Sci."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1109\/TIFS.2009.2025849","article-title":"Robust MC-CDMA-based fingerprinting against time-varying collusion attacks","volume":"4","author":"Cha","year":"2009","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_38","unstructured":"Su, K., Kundur, D., and Hatzinakos, D. (2002, January 29). A novel approach to collusion-resistant video watermarking. Proceedings of the SPIE Security and Watermarking of Multimedia Contents, San Jose, CA, USA."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Kanocz, T., Tokar, T., and Levicky, D. (2009, January 22\u201323). Robust frame by frame video watermarking resistant against collusion attacks. Proceedings of the IEEE International Conference on Radioelektronika, Bratislava, Slovakia.","DOI":"10.1109\/RADIOELEK.2009.5158760"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/3\/21\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:12:13Z","timestamp":1760188333000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/3\/21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,19]]},"references-count":39,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2019,9]]}},"alternative-id":["cryptography3030021"],"URL":"https:\/\/doi.org\/10.3390\/cryptography3030021","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2019,8,19]]}}}