Skip to main content
Log in

A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays secure medical image watermarking had become a stringent task in telemedicine. This paper presents a novel medical image watermarking method by fuzzy based Region of Interest (ROI) selection and wavelet transformation approach to embed encrypted watermark. First, the source image will undergo fuzzification to determine the critical points through central and final intensity along the radial line for selecting region of interest (ROI). Second, watermark image is altered to time-frequency domain through wavelet decomposition where the sub-bands are swapped based on the magnitude value obtained through logistic mapping. In the each sub-band all the pixels get swapped, results in fully encrypted image which guarantees the watermark to a secure, reliable and an unbreakable form. In order to provide more robustness to watermark image, singular values are obtained for encrypted watermark image and key component is calculated for avoiding false positive error. Singular values of the source and watermark image are modified through key component. Experimental results reveal that the proposed algorithm attains high robustness and improved security to the watermarked image against various kinds of attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Ahmed MN, Yamany SM, Mohamed N, Farag AA, Moriarty T (2012) A modified fuzzy C-means algorithm for Bias field estimation and segmentation of MRI data. IEEE Trans Med Imaging 21:193–199

    Article  Google Scholar 

  2. A Al-Haj and A. Amer (2014) Secured telemedicine using region-based watermarking with tamper localization, J Digit Imaging, 27(6):pp.737–750

  3. Balasamy K, et al (2019). An intelligent reversible watermarking system for authenticating medical images using wavelet and PSO, Cluster Computing, Springer, pp. 4431–4442

  4. Bensaid AM, Hall LO, Bezdek JC, Clarke LP (2006) Partially supervised clustering for image segmentation. Pattern Recogn 29:859–871

    Article  Google Scholar 

  5. Bouslimi D, Coatrieux G, Roux C (2012) A joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic images. Comput Methods Prog Biomed 106(1):47–54

    Article  Google Scholar 

  6. Campisi P, Kundur D, Neri A (2004) Robust digital watermarking in the ridgelet domain, IEEE signal process. Lett. 11(10):826–830

    Google Scholar 

  7. Cao F, Huang HK, Zhou XQ (2003) Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27:185–196

    Article  Google Scholar 

  8. Cedillo-Hernandez M, Cedillo-Hernandez A, Nakano-Miyatake M, Perez-Meana H (2019) An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Futur Gener Comput Syst 101:1223–1246

    Article  Google Scholar 

  9. S Das, MK Kundu (2011). Hybrid contourlet-DCT based robust image watermarking technique applied to medical data management, in: Proceedings of 4th International Conference on Pattern Recognition and Machine Intelligence, pp. 286–292

  10. Eswaraiah R, Reddy ES (2014). Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl ,1–10

  11. Favorskaya M, Savchina E, Gusev K (2019) Feature-based synchronization correction for multilevel watermarking of medical images. Procedia Computer Science 159:1267–1276

    Article  Google Scholar 

  12. Gangadhar Y, Giridhar Akula VS, Chenna Reddy P (2018) An evolutionary programming approach for ecuring medical images using watermarking scheme in invariant discrete wavelet transformation. Biomedical Signal Processing and Control 43:31–40

    Article  Google Scholar 

  13. Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. J Electron Imaging 14(4):043004–043004

    Article  Google Scholar 

  14. Gao G, Wan X, Yao S, Cui Z, Zhou C, Sun X (2017) Reversible data hiding with contrast enhancement and tamper localization for medical images. Inf Sci 385:250–265

    Article  Google Scholar 

  15. Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10(4):722–732

    Article  Google Scholar 

  16. Gunjal BL, Mali SN (2012). ROI based embedded watermarking of medical images for secured communication in telemedicine. Int J Comput Commun Eng: 293–298

  17. Guo X, Zhuang T (2009) A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53–64

    Article  Google Scholar 

  18. Guo X, Zhuang T (2009) Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22(6):620–628

    Article  Google Scholar 

  19. Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encryptedimages using side match. IEEE Signal Process Lett 19(4):199–202. https://doi.org/10.1109/LSP.2012.2187334

    Article  Google Scholar 

  20. Ji Z, Xia Y, Sun Q, Cao G, Chen Q (2015) Active contours driven by local likelihood image fitting energy for image segmentation. Inf Sci 301:285–304

    Article  Google Scholar 

  21. Jung H, Sung K, Nayak KS, Kim EY, Ye JC (2009) K-t focuss: a general compressed sensing framework for high resolution dynamic MRI. Magn Reson Med 61:103–116

    Article  Google Scholar 

  22. Keshavarzian R, Aghagolzadeh A (2016) ROI based robust and secure image watermarking using DWT and Arnold map. Int.J.Electron.Commun.(AEU) 70:278–288

    Article  Google Scholar 

  23. Balasamy Krishnasamy, Balakrishnan M, Christopher A (2021). A Genetic Algorithm Based Medical Image Watermarking for Improving Robustness and Fidelity in Wavelet Domain. Intelligent Data Engineering and Analytics. Advances in Intelligent Systems and Computing, vol 1177. Springer, Singapore. https://doi.org/10.1007/978-981-15-5679-1_27

  24. MK Kundu, S Das (2010). Lossless ROI medical image watermarking technique with enhanced security and high payload embedding, in: Proc. of 2010 Int. Conf. on Pattern Recognition, IEEE Computer Society, pp. 1457–1460

  25. Lavanya A, Natarajan V (2012) Watermarking patient data in encrypted medical images. Sadhana-Acad Proc Eng Sci 37(6):723–729

    Google Scholar 

  26. Li C, Lo K-T (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 91:949–954

    Article  Google Scholar 

  27. Lin C-H, Yang C-Y, Chang C-W (2010) Authentication and protection for medical image. Berlin: Springer-Verlag 6422:278–287

    Google Scholar 

  28. X. Liu, J. Lou, H. Fang, H, Fang, L. Wang (2019) A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images, IEEE Access, vol. 7, pp. 76580–76598

  29. Liu YL, Qu XX, Xin GJ (2015) ROI-based reversible data hiding scheme for medical images with tamper detection. IEICE Trans Inf Syst E98-D(4):769–774

    Article  Google Scholar 

  30. Mothi R, Karthikeyan M (2019) Protection of bio medical iris image using watermarking and cryptography with WPT. Measurement 136:67–73

    Article  Google Scholar 

  31. Seyed Mojtaba Mousavi & Alireza Naghsh & SAR Abu-Bakar (2015). A Heuristic Automatic and Robust ROI Detection Method for Medical Image Warermarking, J Digit Imaging, https://doi.org/10.1007/s10278-015-9770-z

  32. Nambakhsh MS, Ahmadian A, Zaidi H (2011) A contextual based double watermarking of PET images by patient ID and ECG signal. Comput Methods Prog Biomed 104(3):418–425

    Article  Google Scholar 

  33. Pan W, Bouslimi D, Karasad M, Cozic M, Coatrieux G (2018) Imperceptible reversible watermarking of radiographic images based on quantum noise masking. Comput Methods Prog Biomed 160:119–128

    Article  Google Scholar 

  34. Qasim AF, Meziane F, Aspin R (2018) Digital watermarking: applicability for developing trust in medical imaging workflows state of the art review. Computer Science Review 27:45–60

    Article  MathSciNet  Google Scholar 

  35. Radwan AG, AbdElHaleem SH, Abd-El-Hafiz SK (2016) Symmetric encryption algorithms using chaotic and non-chaotic generators: a review. J Adv res (JAR) 7(2):193–208

    Article  Google Scholar 

  36. Ramakrishnan S, Gopalakrishnan T, Balasamy K (2011) SVD based robust digital watermarking for still images using wavelet transform, CCSEA 2011. CS IT 02:155–167

    Google Scholar 

  37. Rastegar S, Namazi F, Yaghmaie K, Aliabadian A (2011) Hybrid watermarking algorithm based on singular value decomposition and radon transform, AEU-Int. J Electron Commun 65(7):658–663

    Google Scholar 

  38. E Rayachoti, S Tirumalasetty, SC Prathipat (2020). SLT based watermarking system for secure telemedicine, Clust Comput, https://doi.org/10.1007/s10586-020-03078-2

  39. Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution-diffusion based image cipher. Commun Nonlinear Sci Numer Simul 15(7):1887–1892

    Article  MathSciNet  Google Scholar 

  40. Singh P, Raman B (2017) Reversible data hiding for rightful ownership assertion of images in encrypted domain over cloud. Int J Electron Commun (AEU) 76:18–35

    Article  Google Scholar 

  41. Tan CK, Ng JC, Xu XT et al (2011) Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528–540

    Article  Google Scholar 

  42. Tsougenis ED, Papakostas GA, Koulouriotis DE, Tourassis VD (2012) Performance evaluation of moment-based watermarking methods: a review. J Syst Softw 85(8):1864–1884

    Article  Google Scholar 

  43. Wershi OMA, Khoo BE (2011) Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24(1):114–125

    Article  Google Scholar 

  44. Wu JHK, Chang RF, Chen CJ, Wang CL, Kuo TH, Moon WK, Chen DR (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59–76

    Article  Google Scholar 

  45. Wu H, Huang J, Shi Y (2015) A reversible data hiding method with contrast enhancement for medical images. J Vis Commun Image Represent 31:146–153

    Article  Google Scholar 

  46. Yang Y, Zhang W, Liang D, Yu N (2018) A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images. Multimed Tools Appl 77:18043–18065

    Article  Google Scholar 

  47. JM Zain, LP Baldwin, M Clarke (2004). Reversible watermarking for authentication of DICOM images, in: Proceedings of the 26th Annual International Conference on IEEE EMBS, September, pp. 3237–3240

  48. JM Zain, AM Fauzi (2006). Medical image watermarking with tamper detection and recovery, in: Proceedings of the 28th IEEE EMBS Annual Intrn. Conference, pp. 3270–3273

  49. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258

    Article  Google Scholar 

  50. Zhang X, Wang Z, Yu J, Qian Z. (2015). Reversible visible watermark embedded in encrypted domain. p. 826–30. https://doi.org/10.1109/ChinaSIP.2015.7230520

  51. Zhou Y, Panetta K, Agaian S, Chen CLP (2013) (n, k, p)-gray code for image systems, IEEE trans. Cybern. 43:515–529

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Balasamy K.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

K, B., S, S. A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimed Tools Appl 80, 7167–7186 (2021). https://doi.org/10.1007/s11042-020-09981-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09981-5

Keywords

Navigation