1 Introduction

In recent times, medical data transmission over the Internet poses various intimidations that cruelly affect its security and protection issues which demands a security mechanism such as Cryptography and a medical watermarking system to avoid illegal access by an unintended recipient. Cryptography is a security mechanism that protects data from access by an unauthorized person. But once data is decrypted, it can be distributed and duplicated illegally. Therefore, there is an essential need for another protection system after the data encryption process. Digital watermarking is the embedding process of any type of data in cover signal such as image, audio, and video to achieve several objectives such as copyright protection, medical safety, fingerprinting, broadcasting monitoring, integrity protection, and military. The combination between cryptography and watermarking produces a multi-level security system which gives us the features of both of them.

Recently, modern data telecommunication system has been theoretically valuable for their remarkable efficacy and quick communication of medical data over the Internet for Medical IoT systems. To design a secure medical watermarking algorithm in telemedicine systems, four essential requirements are mandatory which are robustness, security, capacity, and imperceptibility. These requirements can be satisfied by the following:

  • A robust watermarking technique for watermark embedding and extraction such as Singular Value Decomposition (SVD) which resists many types of attacks due to Singular Values (SVs) has decent stability when the small perturbation is added to the audio signal, This makes the SVD a strong candidate for the design of efficient audio watermarking technique.

  • The security can be achieved by using the Arnold algorithm which satisfies security and robustness.

  • The capacity can be improved by embedding more information without affecting the quality of the audio signal by using the wavelet fusion algorithm.

  • A trade-off among the audio watermarking algorithm requirements can be achieved.

In recent times, medical images significantly affect the efficient diagnosis process and investigation of serious diseases besides mitigating the misdiagnosis problems. Surplus, the stealing problem of medical identity and data has been a severe privacy concern in the telemedicine domain. In this paper, we presented an effective audio watermarking system for medical images in Telemedicine applications in a secure manner. The proposed scheme is constructed by a primary combination of two watermarks which are medical images and produces a particular fused watermark using the wavelet-based image fusion procedure, then Arnold transform is used and finally, the Arnold fused image is implanted in the cover audio signal.

The main paper’s contribution is to provide a multi-level security system for medical image transmission over the MIoT system securely along with increasing the robustness and capacity without affecting the quality of the audio signal for authenticity, security, and protection of medical images over unsecured channels on the Internet. In summary, the proposed scheme has the following characteristics:

  • The medical images are scrambled using Arnold transform beforehand embedding which upsurges the protection level for the implanted medical information before sending over insecure open network systems.

  • The medical watermark images shouldn’t worsen the original audio signal quality.

  • The projected procedures for embedding and extraction of watermarks are vigorous. Also, these watermarks are capable of resisting several kinds of multimedia threats.

  • Extra medical data can be embedded in the cover audio signal. This happened by the proposed watermarking that allows a satisfactory increase of watermarks in the watermarked audio signal.

The remaining of this work is prepared as the following: Section 2 delivers an outline of the elementary theories of watermarking systems, fusion method, and encryption techniques and also provides the relevant work. A comprehensive description of the proposed scheme is offered in Section 3. Section 4 offers the suggested multi-level security system and provides a high-level framework of the proposed multi-level security system for healthcare data transmission in telemedicine IoT applications. Section 5 gives the performance evaluation metrics that be able to be utilized in assessing the audio quality and extracted watermark images with also provides the investigational results examination of the planned scheme. Finally, the paper’s summary and future scope are offered in Section 6.

2 Preliminaries and related work

2.1 Preliminaries

A review regarding wavelet-based fusion, Singular Value Decomposition, and Arnold algorithm is presented in this section.

2.1.1 Wavelet fusion

To combine two images into a particular image termed a fused watermark, it can be achieved by using the image fusion method as displayed in Fig. 1. This technique can save the better quality of the particular image by clarifying the information of an image where the resultant fused watermark can conserve the ultimate key features of the novel image.

Fig. 1
figure 1

The Process of Wavelet Fusion Approach

2.1.2 Singular value decomposition (SVD)

The SVD is considered a mathematical analysis way to analyze the square and rectangular metrics which can be used for different image applications like image watermarking. For image watermarking applications, the SVD can be applied for extracting vital features of the SVD matrix of an image, then using these features, the watermark can be inserted in this matrix without affecting the quality of watermarked image [23, 27]. From an image processing viewpoint, the SVD extracts important features as the following: (1). The SVs epitomize the intrinsic algebra properties of the image, and (2). The Singular Values (SVs) of the image are decent stability at the insignificant perturbation is added to an image, its SVs don’t modify drastically that is vigorous in contradiction of severe attacks.

2.1.3 Arnold transform

Lately, numerous encryption approaches can be used for the encryption of digital images like common permutation and diffusion approaches. For applications of image processing, Arnold Transform the position of pixel not just be scrambled by coding the reiterative number of the progression but additionally diminishes the vital storage and communication spaces [5].

2.2 Related work

In telemedicine, medical images have been transmitted between two healthcare organizations for disease diagnoses. Still, medical image transmission over the Internet desires innovative security mechanisms such as digital watermarking. Image watermarking is a branch of multimedia watermarking techniques that can be employed for securing sensitive medical image communications transmission against severe attacks.

In [24], they suggested a watermarking system employing DWT, DCT, and SVD. The proposed system is verified against numerous attacks. In [12], they suggested a watermarking system using DWT, DCT, and SVD. In this system, the embedding step utilized the alteration of the singular values of the DCT coefficients of the host image with the watermark’s singular values.

In [2], the authors introduced a watermarking technique based on DWT and SVD. In this work, the singular vector of the particular DWT sub-band of the cover image is altered with a binary watermark handling a false-positive problem. Authors in [21] provided a dual watermarking approach using DWT and SVD. In the implanting of the watermark phase, the watermark2 is implanted into the watermark1, and then the united watermark is embedded into the host image.

In [11], they provided a watermarking technique for medical images based on wavelet and BCH error-correcting code. Their technique is embedded watermarks of index, caption, signature, and reference at different sub-bands of DWT in the host image. In [15], they proposed a technique where it embeds the watermark into a particular sub-band of the natural image besides encrypting the watermarked image utilizing three cryptography methods. In [13], they projected a hybrid image watermarking technique by combining two grayscale images with the use of the wavelet fusion method. In [14], they anticipated a crossbreed image watermarking scheme that is based on fusing two grayscale images employing wavelet-based image fusion, and applying three-level DWT. Likewise, authors in [1, 7, 8, 10] presented more work regarding watermarking systems. In [1], they used reinforcement learning and blockchain to enable the IoMT system for healthcare workflows. In [19], they used Blockchain for Privacy Preservation and Fraud using Federated-Learning in IoMT System for Healthcare application. An efficient reversible watermarking system for achieving the key requirements of the watermarking system such as balancing capacity, imperceptibility, and robustness for medical color images [20].

It is determined that research work offered various works on image watermarking [6, 9]. Generally, there are rare contributions to multiple image watermarking techniques. Most of them have grave complications with watermark authentication and extraction. The conventional watermarking procedures have not attained acceptable watermarks and the extracted watermarks, particularly in the existence of multimedia attacks. Similarly, few audio watermarking techniques focus on employing implanted more watermarks with safeguarding the watermark with Arnold transform. Consequently, the existing research has robustness, and imperceptibility with low capacity.

With regard to the challenges of associated work in medical image watermarking on cover audio signals, the crucial role of this research is to offer an efficient audio watermarking scheme for secure medical image transfer. This scheme is based on Arnold transform, wavelet fusion, and SVD watermarking systems to secure two medical watermarks that can be implanted to reserve the key objectives of this work which are capacity, robustness, and imperceptibility efficiency.

3 Proposed audio watermarking scheme

The projected audio watermarking scheme is offered in this part, this scheme allows embedding multiple medical images into the cover audio signals and the extraction of them in an efficient manner. The procedures of medical watermarks embedding along with extraction are clarified as the following:

3.1 Medical watermark embedding

The watermark implanting procedure is revealed in Fig. 2. The algorithm works as the next:

Fig. 2
figure 2

Process of medical watermark images embedding

  1. 1.

    a 2-D matrix (A matrix) is gendered from transforming the 1-D cover audio signal.

    The SVD is made on the A matrix.

    $$ \mathrm{A}=\mathrm{U}\ \mathrm{S}\ {\mathrm{V}}^{\mathrm{T}} $$
    (1)
  2. 2.

    The medical watermark1 and watermark2 are combined by employing wavelet-based image fusion to produce a fused watermark (W matrix).

  3. 3.

    The Arnold transform is performed on the W matrix

  4. 4.

    The W matrix is mixed with the SVs of the A matrix.

    $$ \mathrm{D}=\mathrm{S}+\upalpha\ \mathrm{W} $$
    (2)
  5. 5.

    To retain the audio unembroidered, a trivial estimate of α is selected (0.01).

  6. 6.

    The SVD is made on the new modified matrix (D matrix)

    $$ \mathrm{D}={\mathrm{U}}_{\mathrm{w}}\ {\mathrm{S}}_{\mathrm{w}}\ {{\mathrm{V}}^{\mathrm{T}}}_{\mathrm{w}} $$
    (3)
  7. 7.

    The Aw matrix in 2-D format (crypto-watermarked audio signal) is attained using matrix Sw

    $$ {\mathrm{A}}_{\mathrm{w}}=\mathrm{U}\ {\mathrm{S}}_{\mathrm{w}}\ {\mathrm{V}}^{\mathrm{T}} $$
    (4)
  8. 8.

    The crypto-watermarked audio signal (Aw matrix) is converted again into a 1-D format

3.2 Medical watermark extraction

The extracting procedure is revealed in Fig. 3. This works as the next:

Fig. 3
figure 3

Process of medical watermark images extraction

  1. 1.

    a 2-D A*w matrix is transforming from the 1-D watermarked signal.

  2. 2.

    The SVD is made on the A*w matrix.

    $$ {{\mathrm{A}}^{\ast}}_{\mathrm{w}}={\mathrm{U}}^{\ast }\ {{\mathrm{S}}^{\ast}}_{\mathrm{w}}\ {\mathrm{V}}^{\ast \mathrm{T}} $$
    (5)
  3. 3.

    The matrix contains the fused watermark calculated

    $$ {\mathrm{D}}^{\ast }={\mathrm{U}}_{\mathrm{w}}\ {{\mathrm{S}}^{\ast}}_{\mathrm{w}}\ {{\mathrm{V}}^{\mathrm{T}}}_{\mathrm{w}} $$
    (6)
  4. 4.

    The conceivably fused watermark is gained

    $$ {\mathrm{W}}^{\ast }=\left({\mathrm{D}}^{\ast }-\mathrm{S}\right)/\upalpha $$
    (7)
  5. 5.

    The extracted watermark (W* matrix) is converted using the reverse Arnold transform.

  6. 6.

    Anti-fusion of the revere Arnold fused watermark to obtain medical watermark1 and watermark2 respectively.

4 High-level multi-level imagery transmission security framework in telemedicine systems

In last years, data security and guard for IoT-based medical systems is a perilous task in the medical sector for protecting patients’ information from unauthorized access over unsecured channels on the Internet. Figure 4 offerings the overall projected Multi-Level imagery transmission security system for securing medical information in hospitals in the context of smart telemedicine services using hybrid cryptography and watermarking approaches. The proposed system is announced to provide a secure scenario for proficiently delivering medical images between remote entities in medical IoT systems.

Fig. 4
figure 4

A high-level illustration of the proposed multi-level security framework for remotely medical image Transmission and Exchange in MIoT Systems

The patients and healthcare staff from the medical entity1 (sender) secure important medical images utilizing the proposed audio watermarking scheme and transmit them to the storage cloud provider. The medical staff in the medical entity2 (receiver) retrieves the medical digital images from the storage cloud, thus restoring the secret images by using the proposed extraction scheme. The planned watermarking scheme safeguards high embedded information capacity, high confidentiality, robustness, and multi-level security for healthcare organizations in telemedicine services.

5 Experimental study

5.1 Assessment metrics

To evaluate the audio watermarked signal from the perceptual quality perspective, the next evaluation metrics are offered. Numerous methods for subjective and objective measurements are espoused to evaluate the quality of the audio signal [3, 4, 16,17,18, 22, 25, 26]. The objective measurements are used in this work for assessment purposes. Likewise, the correlation coefficient is applied to calculate the intimacy of the reversed Arnold watermark to the initial watermark as well as medical watermark1 and watermark2.

5.1.1 Audio signal quality metrics

In this section, we will discuss the objective measures which are commonly separated into intrusive as well as non-intrusive procedures. Intrusive procedures are categorized into three major sets which are time domain, Linear Predictive Coefficients (LPC), and Spectral-domain metrics [3, 4, 16,17,18, 22, 25, 26].

  • Time Domain

These metrics comprise both of Signal-to-Noise Ratio plus Segmental Signal-to-Noise Ratio that can be defined as the following:

  1. a.

    Signal-to-Noise Ratio (SNR)

The SNR is demarcated as follows:

$$ SNR=10{\log}_{10}\frac{\sum \limits_{i=1}^N{x}^2(i)}{\sum \limits_{i=1}^N{\left(x(i)-y(i)\right)}^2} $$
(8)

x(i) is the host audio, y(i) is the watermarked audio, (i) is the sample index, then N is the overall samples in both host and watermarked audio.

  1. b.

    Segmental Signal-to-Noise Ratio (SNRseg)

The SNRseg is demarcated as follows:

$$ SNRseg=\frac{10}{M}\sum \limits_{m=0}^{M-1}{\log}_{10}\sum \limits_{i= Nm}^{Nm+N-1}{\left(\frac{x^2(i)}{\left(x(i)-y(i)\right)}\right)}^2 $$
(9)

M is the segments in the watermarked signal and N is the segment length.

  • Log-Likelihood Ratio (LLR)

The LLR is defined as:

$$ LLR=\mid \log \left(\frac{{\overrightarrow{a}}_x{\overline{R}}_y{\overrightarrow{a}}_x^T}{{\overrightarrow{a}}_y{\overline{R}}_y{\overrightarrow{a}}_y^T}\right)\mid $$
(10)

where \( {\overrightarrow{a}}_x \) is the LPC coefficient vector (1, ax(1), ax(2),. ..,ax(p)) for the cover audio x[n], \( {\overrightarrow{a}}_y \) is the LPC coefficient vector (1, ay(1), ay(2),. .., ay(p)) for the watermarked audio y[n], and \( {\overline{R}}_y \) is the autocorrelation matrix for the watermarked audio. The closer the LLR to zero, the higher is the watermarked audio quality.

  • Spectral Domain(SD)

The Spectral distortion (SD) depends on the assessment of the power spectrum of the host signal and the handled signal. The spectral distortion (SD) can be computed as follows:

$$ SD=\frac{1}{M}\sum \limits_{m=0}^{M-1}\sum \limits_{i= Nm}^{Nm+N-1}\mid {V}_x(i)-{V}_y(i)\mid $$
(11)

Vx(i) is the spectrum of the host audio for a particular segment in the time domain, Vy(i) is the spectrum of the watermarked audio for the matching segment; N is the segment length and M is the segments number in the audio signal. The smaller the SD, the better the watermarked audio quality.

5.1.2 Image quality metrics

  • Correlation Coefficient (Cr)

The Cr is to calculate the closeness of the host image to the modified one. In the perfect circumstance, the Cr ought to be 1. Nevertheless, this is not conceivable for the extracted fused image, consequently, a close value to 1 is desirable.

$$ \mathrm{Cr}=\frac{\sum_m{\sum}_n\left( Xi-{X}^{\prime}\right)\left( Yi-{Y}^{\prime}\right)}{\sqrt{\left({\sum}_m{\sum}_n{\left( Xi-{X}^{\prime}\right)}^2\right)\left({\sum}_m{\sum}_n{\left( Yi-{Y}^{\prime}\right)}^2\right)}} $$
(12)

X’ and Y′ represent respectively the average values of the host and watermarked images.

5.2 Results exploration and analysis

Several experiments are executed to evaluate the planned scheme which is implemented using MATLAB with medical watermark1 and medical report watermark 2 images combined by using wavelet fusion to construct the fused watermark image as displayed in Fig. 5. The SVD watermarking method is used for inserting the fused watermark in the Handel audio signal which is used as the cover signal in the proposed system. Figure 6 shows the fused and Arnold fused images that were used in the experiments in this paper.

Fig. 5
figure 5

Original watermark images

Fig. 6
figure 6

Fused and Arnold Fused watermark images

To test the accomplishment of the projected audio watermarking scheme, the simulation results are carried out in this part. In all tests in this work, the aforementioned audio quality metrics are used for the assessment of the watermarked signal quality, and the correlation coefficients are used to calculate the closeness of the retrieved to the original image.

In the proposed scheme, Arnold transform is used to transform the fused watermark to enhance the security level of implanted images. Then, the algorithms of embedding, as well as extraction, are achieved in the absence of the attack. Figure 7 shows the original and watermarked audio signals. The correlation coefficient among the extracted and the original one reveals that the watermark is seamlessly restored in the absenteeism of attacks as shown in Figs. 8 and 9.

Fig. 7
figure 7

Host and Watermarked audio

Fig. 8
figure 8

Extracted fused watermark without attack

Fig. 9
figure 9

Extracted watermark without attack

To study the robustness of the proposed system, three different experiments are performed as follows: In the First experiment, the robustness of the proposed scheme is analyzed in the occurrence of the attack of additive white Gaussian noise (AWGN) on the watermarked audio.

The results of watermark embedding and extraction of this attack are shown in Figs. 10 and 11. In the second experiment, the robustness of the proposed scheme is considered in the existence of a cropping attack on the watermarked audio signal. The results of watermark embedding and extraction of this attack are shown in Figs. 12 and 13. In the third experiment, the robustness of the proposed scheme is deliberated in the existence of attack namely wavelet compression on the watermarked audio signal. The results of watermark embedding and extraction of this attack are displayed in Fig. 14 and Fig. 15.

Fig. 10
figure 10

Extracted watermark with noise attack

Fig. 11
figure 11

Noisy watermarked audio

Fig. 12
figure 12

Extracted watermark with cropping attack

Fig. 13
figure 13

Cropping attack-based watermarked audio

Fig. 14
figure 14

Extracted watermark with compression attack

Fig. 15
figure 15

Compression attack-based watermarked signal

Table 1 shows the proposed system with various audio quality evaluation metrics in the absence and presence of severe attacks such as noise attack, cropping attack, and wavelet compression attack, respectively. Furthermore, the correlation is used to assess the closeness of the reversed Arnold watermark to the initial watermark as well as medical watermark 1 and watermark 2.

Table 1 Numerical evaluation metrics for the proposed audio watermarking scheme

Tables 2 and 3 show different quality metrics for the proposed audio watermarking scheme in the existence of both noise and wavelet compression attacks, respectively. Similarly, Fig. 16 to Fig. 17 show the correlation coefficient of extracted watermarks from the proposed audio watermarking scheme in the presence of the noise attack, and the wavelet compression attack. Values them, it is clear that an SNR value close to −25, decreases the recognition probability of the watermark while when the value becomes close to +25, increases the recognition probability of the watermark. For the compression attack, it is obvious that as the threshold value is closed to zero, increases the detection probability of the watermark.

Table 2 Evaluation results of the proposed scheme with different SNR values
Table 3 Assessment results of the proposed system with various T values
Fig. 16
figure 16

Correlation among the extricated watermark and the initial watermark vs. the SNR for the proposed scheme in the existence of a noise attack

Fig. 17
figure 17

Correlation among the extricated watermark and the initial watermark vs. the compression threshold for the proposed scheme in the existence of a compression attack

The proposed audio watermarking scheme is tested and evaluated with single and two watermark images as tabulated in Table 4. Finally, a comparative evaluation stuck between the proposed scheme and the traditional SVD scheme is demonstrated in Table 5 where the results of the suggested scheme are better than the conventional SVD scheme. The overall experimental results validate that the proposed audio watermarking scheme can mutually transmit the medical images by embedding them using wavelet fusion as well as increase security levels by using Arnold transform as second-level security. Furthermore, increasing embedding capacity into two medical images can happen with less effect on the perceptibility of audio signals. The proposed system was evaluated by taking into consideration the tuning of embedding strength in the absence or presence of severe multimedia attacks. The limitations of this work are that we applied only grayscale images.

Table 4 Results of the proposed scheme with single and two watermark images
Table 5 A comparison between the proposed audio watermarking Scheme and traditional SVD audio watermarking

From Table 6, the significance of the projected scheme is quite obvious. This scheme is an effort to use a multipurpose regulating watermarking that can deliver entirely kinds of watermarking aim with bit conciliation in requirements like capacity.

Table 6 A comparative analysis with the earlier approaches

6 Conclusion and future scope

This paper proposed an efficient and robust audio watermarking scheme using Wavelet Fusion, Arnold transforms, and Singular Valued Decomposition (SVD) for medical images in MIoT applications. In this scheme, two medical watermarks are merged into a particular watermark named fused watermark employing the wavelet-based image fusion procedure to improve the capacity of the embedded medical information. Then, Arnold transformed used to encrypt the fused watermark. Finally, the Arnold fused watermark is implanted in the audio signal to improve the security of the embedded information. The simulation results prove that watermark embedding does not depreciate the audio signal. It is clear through the results that wavelet fusion is an efficient algorithm to combine two images, in addition, to improving the quality of the scrambled image. The proposed audio watermarking scheme can satisfy the audio watermarking requirements without affecting the quality of the audio signal with the ability to detect and extract the watermark in the occurrence of severe multimedia attacks. In the future, we plan to use other watermarking approaches like DCT, and DWT and use the color image within the embedding process by employing other encryption algorithms. Likewise, we utilize the proposed scheme can be extended work for the secure transmission of COVID-19 Patient’s data such as X-ray images over unsecured channels on open networks such as the Internet to guarantee their privacy and safety.