Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hussain Nyeem is active.

Publication


Featured researches published by Hussain Nyeem.


Journal of Digital Imaging | 2013

A review of medical image watermarking requirements for teleradiology.

Hussain Nyeem; Wageeh W. Boles; Colin Boyd

Teleradiology allows medical images to be transmitted over electronic networks for clinical interpretation and for improved healthcare access, delivery, and standards. Although such remote transmission of the images is raising various new and complex legal and ethical issues, including image retention and fraud, privacy, malpractice liability, etc., considerations of the security measures used in teleradiology remain unchanged. Addressing this problem naturally warrants investigations on the security measures for their relative functional limitations and for the scope of considering them further. In this paper, starting with various security and privacy standards, the security requirements of medical images as well as expected threats in teleradiology are reviewed. This will make it possible to determine the limitations of the conventional measures used against the expected threats. Furthermore, we thoroughly study the utilization of digital watermarking for teleradiology. Following the key attributes and roles of various watermarking parameters, justification for watermarking over conventional security measures is made in terms of their various objectives, properties, and requirements. We also outline the main objectives of medical image watermarking for teleradiology and provide recommendations on suitable watermarking techniques and their characterization. Finally, concluding remarks and directions for future research are presented.


EURASIP Journal on Advances in Signal Processing | 2014

Digital image watermarking: its formal model, fundamental properties and possible attacks

Hussain Nyeem; Wageeh W. Boles; Colin Boyd

While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present, their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes.


digital image computing techniques and applications | 2013

Utilizing Least Significant Bit-Planes of RONI Pixels for Medical Image Watermarking

Hussain Nyeem; Wageeh W. Boles; Colin Boyd

We propose a computationally efficient image border pixel based watermark embedding scheme for medical images. We considered the border pixels of a medical image as RONI (region of non-interest), since those pixels have no or little interest to doctors and medical professionals irrespective of the image modalities. Although RONI is used for embedding, our proposed scheme still keeps distortion at a minimum level in the embedding region using the optimum number of least significant bit-planes for the border pixels. All these not only ensure that a watermarked image is safe for diagnosis, but also help minimize the legal and ethical concerns of altering all pixels of medical images in any manner (e.g, reversible or irreversible). The proposed scheme avoids the need for RONI segmentation, which incurs capacity and computational overheads. The performance of the proposed scheme has been compared with a relevant scheme in terms of embedding capacity, image perceptual quality (measured by SSIM and PSNR), and computational efficiency. Our experimental results show that the proposed scheme is computationally efficient, offers an image-content-independent embedding capacity, and maintains a good image quality of RONI while keeping all other pixels in the image untouched.


digital image computing: techniques and applications | 2011

Developing a Digital Image Watermarking Model

Hussain Nyeem; Wageeh W. Boles; Colin Boyd

This paper presents a key based generic model for digital image watermarking. The model aims at addressing an identified gap in the literature by providing a basis for assessing different watermarking requirements in various digital image applications. We start with a formulation of a basic watermarking system, and define system inputs and outputs. We then proceed to incorporate the use of keys in the design of various system components. Using the model, we also define a few fundamental design and evaluation parameters. To demonstrate the significance of the proposed model, we provide an example of how it can be applied to formally define common attacks.


Biomedical Engineering Online | 2015

Content-independent embedding scheme for multi-modal medical image watermarking.

Hussain Nyeem; Wageeh W. Boles; Colin Boyd

BackgroundAs the increasing adoption of information technology continues to offer better distant medical services, the distribution of, and remote access to digital medical images over public networks continues to grow significantly. Such use of medical images raises serious concerns for their continuous security protection, which digital watermarking has shown great potential to address.MethodsWe present a content-independent embedding scheme for medical image watermarking. We observe that the perceptual content of medical images varies widely with their modalities. Recent medical image watermarking schemes are image-content dependent and thus they may suffer from inconsistent embedding capacity and visual artefacts. To attain the image content-independent embedding property, we generalise RONI (region of non-interest, to the medical professionals) selection process and use it for embedding by utilising RONI’s least significant bit-planes. The proposed scheme thus avoids the need for RONI segmentation that incurs capacity and computational overheads.ResultsOur experimental results demonstrate that the proposed embedding scheme performs consistently over a dataset of 370 medical images including their 7 different modalities. Experimental results also verify how the state-of-the-art reversible schemes can have an inconsistent performance for different modalities of medical images. Our scheme has MSSIM (Mean Structural SIMilarity) larger than 0.999 with a deterministically adaptable embedding capacity.ConclusionsOur proposed image-content independent embedding scheme is modality-wise consistent, and maintains a good image quality of RONI while keeping all other pixels in the image untouched. Thus, with an appropriate watermarking framework (i.e., with the considerations of watermark generation, embedding and detection functions), our proposed scheme can be viable for the multi-modality medical image applications and distant medical services such as teleradiology and eHealth.


security of information and networks | 2013

Counterfeiting attacks on block-wise dependent fragile watermarking schemes

Hussain Nyeem; Wageeh W. Boles; Colin Boyd

In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermarking schemes. We consider vulnerabilities such as the exploitation of a weak correlation among block-wise dependent watermarks to modify valid watermarked images, where they could still be verified as authentic, though they are actually not. Experimental results successfully demonstrate the practicability and consequences of the proposed attacks for some relevant schemes. The development of the proposed attack models can be used as a means to systematically examine the security levels of similar watermarking schemes.


Science & Engineering Faculty | 2015

Watermarking Capacity Control for Dynamic Payload Embedding

Hussain Nyeem; Wageeh W. Boles; Colin Boyd

Despite significant improvements in capacity-distortion performance, a computationally efficient capacity control is still lacking in the recent watermarking schemes. In this paper, we propose an efficient capacity control framework to substantiate the notion of watermarking capacity control to be the process of maintaining “acceptable” distortion and running time, while attaining the required capacity. The necessary analysis and experimental results on the capacity control are reported to address practical aspects of the watermarking capacity problem, in dynamic (size) payload embedding.


Multimedia Tools and Applications | 2016

Modelling attacks on self-authentication watermarking

Hussain Nyeem; Wageeh W. Boles; Colin Boyd

Although the Self-Authentication Watermarking (SAW) schemes are promising to tackle the multimedia information assurance problem, their unknown security level seems to impair their potential. In this paper, we identify three new counterfeiting attacks on those schemes and present their countermeasure. We develop, analyse, and validate the models of the identified attacks followed by the development of a new SAW model to resist those attacks. The identified attack models generalize three main security levels that capture all the possible counterfeiting instances. We focus on the block-wise dependent fragile watermarking schemes, and their general weaknesses. Experimental results successfully demonstrate the practicality and consequences of the identified attacks in exploiting those weaknesses to maliciously and undetectably alter valid watermarked images. To resist the identified attacks, we further determine a set of general requirements for SAW schemes and illustrate their attainment in developing an extended SAW model. While the identified attack models can be used as a means to systematically examine the security levels of similar SAW schemes, the extended SAW model may lead to developing their more secure variants. Our study has also revealed some open challenges in the development and formal analysis of SAW schemes.


Multimedia Tools and Applications | 2018

Reversible data hiding with interpolation and adaptive embedding

Abdul Wahed; Hussain Nyeem

Interpolation based reversible data hiding (IRDH) schemes have recently been studied for better rate-distortion performance. However, most of them do not have any consideration of an ‘effective’ capacity management for increasing size of payload. In this paper, we develop and present an IRDH scheme with adaptive embedding, which determines how many bits of an interpolated pixel can be used for the best possible embedded image quality by using a parameter to control the embedding rate. While compared with the prominent IRDH schemes, our scheme demonstrated its efficiency for better embedding rate distortion performance. Being up-sampled, the embedded image would have higher spatial resolution. It also does not require any location map, and thus the total capacity can be effectively used for data embedding. Moreover, it keeps the original pixels untouched and thus, would be useful in military and medical image applications that restrict minimum possible changes in the cover images.


School of Chemistry, Physics & Mechanical Engineering; School of Electrical Engineering & Computer Science; Science & Engineering Faculty | 2014

A digital watermarking framework with application to medical image security

Hussain Nyeem

Collaboration


Dive into the Hussain Nyeem's collaboration.

Top Co-Authors

Avatar

Wageeh W. Boles

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Colin Boyd

Norwegian University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge