Skip to main content
Log in

Medical image security by crypto watermarking using enhanced chaos and fruit fly optimization algorithm with SWT and SVD

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Telemedicine is the field that uses medical images for diagnosing various diseases. The transmitting and storing of medical images via the cloud-based network must meet several stringent criteria, including confidentiality, validity, and security, and are viewed as very sensitive, irrespective of the image processing context. Medical image copyright protection has been essential since little alterations can even put the lives of patients in danger. Hence numerous significant watermarking methods need to be developed. Watermarking conceals sensitive data by embedding it in a harmless medium, such as a cover. The challenging issue of quick and extremely safe image encryption can be solved more effectively with chaos-based cryptography. Thus the image is encrypted by using enhanced chaos with the Fruit Fly Optimization Algorithm (FFOA). The work proposes an efficient medical image watermarking approach using the Two-level Stationary Wavelet Transform (SWT) and Singular Value Decomposition (SVD) technique on chaotic encrypted medical images. Finally, the proposed method is compared with existing methods to demonstrate higher performance. To check robustness and imperceptibility results, the work is examined under various attacks and produces good results in Peak Signal-to-Noise Ratio (PSNR) and Normalized Cross Correlation (NCC) measures. For different kinds of medical images, the PSNR of the suggested methodology is greater than 40 dB, and NCC values are close to 1 illustrating the technique's superior efficacy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

The datasets created and/or analyzed during the current work can be provided by the corresponding author upon request.

References

  1. Krishnagopal S, Pratap S, Prakash B (2015) Image encryption and steganography using chaotic maps with double key protection. Adv Intell Syst Comput 336:67–78. https://doi.org/10.1007/978-81-322-2220-0_6

    Article  Google Scholar 

  2. Charan GS, Nithin Kumar SSV, Karthikeyan B, Vaithiyanathan V, Divya Lakshmi K (2015) A novel LSB based image steganography with multi-level encryption. International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India pp 1–5.  https://doi.org/10.1109/ICIIECS.2015.7192867

  3. Hamid N, Yahya A, Ahmad RB, Al-Qershi OM (2012) Image steganography techniques: an overview. Int J Comput Sci Sec (IJCSS) 6(3):168–187

    Google Scholar 

  4. Dahiya M, Kumar R (2018) A literature survey on various image encryption & steganography techniques. International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, pp 310–314. https://doi.org/10.1109/ICSCCC.2018.8703368

  5. Singh KU, Abu-Hamatta HS, Kumar A, Singhal A, Rashid M, Bashir AK (2022) Secure watermarking scheme for color DICOM images in telemedicine applications. Comput Mater Continua 70(2):2525–2542

    Article  Google Scholar 

  6. Lei X, Du M, Xu J, Tan Y (2014) Chaotic fruit fly optimization algorithm. In: Tan Y, Shi Y, Coello CAC (eds) Advances in swarm intelligence. ICSI 2014. Lecture notes in computer science, vol 8794. Springer, Cham. https://doi.org/10.1007/978-3-319-11857-4_9

  7. Boussif M, Aloui N, Cherif A (2020) DICOM imaging watermarking for hiding medical reports. Med Biol Eng Comput 58:2905–2918. https://doi.org/10.1007/s11517-020-02269-8

    Article  Google Scholar 

  8. Awasthi D, Srivastava VK (2023) Robust, invisible, and optimized watermarking of DICOM image using Schur decomposition, LWT-DCT-SVD, and its authentication using SURF. Multimedia Tools and Applications 82(11):16555–16589. https://doi.org/10.1007/s11042-022-14002-8

    Article  Google Scholar 

  9. Pulgam ND, Shinde SK (2022) Robust digital watermarking using pixel color correlation and chaotic encryption for medical image protection. Int J Intell Syst App Eng 10(4):29-38.1

    Google Scholar 

  10. Alhussan AA, Abdallah HA, Alsodairi S, Ateya AA (2023) Hybrid watermarking and encryption techniques for securing medical images. Comput Syst Sci Eng 46(1):403–416. https://doi.org/10.3390/electronics12071554

    Article  Google Scholar 

  11. Singh KU, Aljrees T, Kumar A, Singh T (2023) Secure NIfTI image authentication scheme for modern healthcare system. Appl Sci 13(9):5308. https://doi.org/10.3390/app13095308

    Article  Google Scholar 

  12. Sasikaladevi N, Geetha K, Revathi A (2022) EMOTE–Multilayered encryption system for protecting medical images based on binary curves. J King Saud Univ-Comput Inf Sci 34(3):676–686. https://doi.org/10.1016/j.jksuci.2019.01.014

    Article  Google Scholar 

  13. Elhadad A, Ghareeb A, Abbas S (2021) A blind and high-capacity data hiding of DICOM medical images based on fuzzification concepts. Alex Eng J 60(2):2471–2482. https://doi.org/10.1016/j.aej.2020.12.050

    Article  Google Scholar 

  14. Fang Y, Liu J, Li J, Cheng J, Hu J, Yi D, Bhatti UA (2022) Robust zero-watermarking algorithm for medical images based on SIFT and Bandelet-DCT. Multimed Tools App 81(12):16863–16879. https://doi.org/10.1007/s11042-022-12592-x

    Article  Google Scholar 

  15. Sajeer M, Mishra A (2023) A robust and secured fusion based hybrid medical image watermarking approach using RDWT-DWT-MSVD with Hyperchaotic system-Fibonacci Q Matrix encryption. Multimed Tools Appl 82:37479–37501. https://doi.org/10.1007/s11042-023-15001-z

    Article  Google Scholar 

  16. Liu Z, Li J, Ai Y, Zheng Y, Liu J (2022) A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos. J Cloud Comput 11(1):1–20. https://doi.org/10.1186/s13677-022-00331-4

    Article  Google Scholar 

  17. Chen J, Liao X, Wang W, Qian Z, Qin Z, Wang Y (2023) SNIS: a signal noise separation-based network for post-processed image forgery detection. IEEE Trans Circuits Syst Video Technol 33(2):935–951. https://doi.org/10.1109/TCSVT.2022.3204753

    Article  Google Scholar 

  18. Liao X, Wang Y, Wang T, Juan Hu, Xiaoshuai Wu (2023) FAMM: facial muscle motions for detecting compressed deepfake videos over social networks. IEEE Trans Circuits Syst Video Technol 33(12):7236–7251. https://doi.org/10.1109/TCSVT.2023.3278310

    Article  Google Scholar 

  19. Tan J, Liao X, Liu J, Cao Y, Jiang H (2022) Channel attention image steganography with generative adversarial networks. IEEE Trans Netw Sci Eng 9(2):888–903. https://doi.org/10.1109/TNSE.2021.3139671

    Article  Google Scholar 

  20. Jiao G, Li L, Zou Y (2019) Improved security for android system based on multi-chaotic maps using a novel image encryption algorithm. Int J Performability Engineering 15(6):1692–1701. https://doi.org/10.23940/ijpe.19.06.p20.16921701

    Article  Google Scholar 

  21. Alzubi JA, Alzubi OA, Suseendran G, Akila D (2019) +A Novel chaotic map encryption methodology for image cryptography and secret communication with steganography. Int J Recent Technol Eng 8(1C2):1122–1128

    Google Scholar 

  22. Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898–1907. https://doi.org/10.1016/j.cnsns.2013.10.014

    Article  Google Scholar 

  23. Xing B, Gao WJ, Xing B, Gao WJ (2014) Fruit fly optimization algorithm. Innovative computational intelligence: a rough guide to 134 clever algorithms, pp 167–170. https://doi.org/10.1007/978-3-319-03404-1_11

  24. Saini J, Harsh V (2013) A hybrid approach for image security by combining encryption and steganography. IEEE 2nd International Conference on Image Information Processing. IEEE ICIIP 2013:607–611. https://doi.org/10.1109/ICIIP.2013.6707665

  25. Tripathi D, Sharma S (2016) A robust 3-SWT multiple image steganography and contrast enhancement technique. Proc Int Conf Inventive Comput Technol ICICT 2016:1. https://doi.org/10.1109/INVENTIVE.2016.7823256

    Article  Google Scholar 

Download references

Funding

No funding was obtained for this manuscript's preparation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abirami R.

Ethics declarations

Conflict of interests/Competing interests

The authors have absolutely no financial or proprietary interests in any of the content covered within. This ensures that the information received is unbiased and free from any potential conflicts of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

R, A., C, M. Medical image security by crypto watermarking using enhanced chaos and fruit fly optimization algorithm with SWT and SVD. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-19019-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-19019-9

Keywords

Navigation