Advertisement

Cluster Computing

, Volume 22, Supplement 2, pp 4431–4442 | Cite as

An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO

  • K. BalasamyEmail author
  • S. Ramakrishnan
Article

Abstract

This paper presents a novel medical image authentication system through wavelet decomposition and particle swarm optimization (PSO). First medical image is treated with wavelet transformation and another image is treated with tent map and a hash function to further protect the secret watermark. Tent map ensures the sensitivity towards changes in the initial value which, can better protect and encrypt the original watermark. The operations performed on the binary coded image are based on the encryption sequences generated from chaotic map. Particle swarm optimization (PSO) results in producing optimal balance between embedding capacity and imperceptibility by exploiting the image pixel correlation of neighboring pixels. The novelty of the proposed technique lies in its ability to create a model that can find optimal wavelet coefficients for embedding using PSO and also acts as an absolute feature for embedding the watermark. The proposed method is thus able to embed watermark with low distortion, take out the secret information and also recovers the original image. The proposed technique is valuable with respect to robustness, capacity and imperceptibility.

Keywords

Watermarking Discrete Wavelet Transform Particle swarm optimization Chaotic tent map Hash function 

References

  1. 1.
    Hu, Y.C., Chen, W.L., Lo, C.C., Wu, C.M.: A novel tamper detection scheme for BTC compressed images. Opto-Electron. Rev. 21(1), 137–146 (2013)Google Scholar
  2. 2.
    Hu, Y.C., Lo, C.C., Chen, W.L., Wen, C.H.: Joint image coding and image authentication based on absolute moment block truncation coding. J. Electron. Image 22(1), 1–12 (2013)Google Scholar
  3. 3.
    Qin, C., Chang, C.C., Chen, K.N.: Adaptive self-recovery for tampered images based on VQ indexing and in painting. Signal Process 93, 933–946 (2013)Google Scholar
  4. 4.
    Zhang, X., Qian, Z., Ren, Y., Feng, G.: Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4), 1223–1232 (2011)Google Scholar
  5. 5.
    Lo, C.C., Hu, Y.C.: A novel reversible image authentication scheme for digital images. Signal Process 98, 174–185 (2014)Google Scholar
  6. 6.
    Lee, S., Yoo, C.D., Kalker, T.O.N.: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. Forensics Secur. 2, 321–330 (2007)Google Scholar
  7. 7.
    Chang, C.C., Nguyen, T.S., Lin, C.C.: A reversible compression code hiding using SOC and SMVQ indices. Inf. Sci. 300, 85–99 (2015)Google Scholar
  8. 8.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)Google Scholar
  9. 9.
    Parah, S.A., Ahad, F., Sheikh, J.A., Bhat, G.M.: Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J. Biomed. Inform., 214–230 (2017)Google Scholar
  10. 10.
    Nguyen, T.-S., Chang, C.-C., Yang, X.-Q.: A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. Int. J. Electron. Commun., 1055–1061 (2016)Google Scholar
  11. 11.
    Sethuramalingam, T.K., Nagaraj, B.: A comparative approach on PID controller tuning using soft computing techniques. Int. J. Innov. Sci. Eng. Res. 1(12), 460–465 (2014)Google Scholar
  12. 12.
    Lin, P.Y., Lee, J.S., Chang, C.C.: Dual digital watermarking for internet media based on hybrid strategies. IEEE Trans. Circuits Syst. Video Technol. 19(8), 1169–1171 (2009)Google Scholar
  13. 13.
    Swaminathan, A., Mao, Y.N., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur. 1(2), 215–230 (2006)Google Scholar
  14. 14.
    Xuan, G., Shi, Y.Q., Yang, C., Zheng, Y., Zou, D., Chai, P.: Lossless data hiding using integer wavelet transform and threshold embedding technique. In: IEEE inter-national conference on multimedia and expo, pp. 1520–1523 (2005)Google Scholar
  15. 15.
    Chan, C.S.: An image authentication method by applying Hamming code on rearranged bits. Pattern Recognit. Lett. 32(14), 1679–1690 (2011)Google Scholar
  16. 16.
    Zhu, X., Ho, A.T.S., Marziliano, P.: A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process. Image Commun. 22(5), 515–528 (2007)Google Scholar
  17. 17.
    Preda, R.O.: Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1), 367–373 (2013)Google Scholar
  18. 18.
    Usman, I., Khan, A., Ali, A., Choi, T.S.: Reversible watermarking based on intelligent coefficient selection and integer wavelet transform. Int. J. Innov. Comput. Inf. Control 5, 1-ISII08-237 (2005)Google Scholar
  19. 19.
    Chuang, J.C., Hu, Y.C.: An adaptive image authentication scheme for vector quantization compressed image. J. Vis. Commun. Image Represent. 22(5), 440–449 (2011)Google Scholar
  20. 20.
    Sachnev, V., Nam, T., Kim, H.J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm, using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19, 989–998 (2009)Google Scholar
  21. 21.
    Chen, M., Chen, Z., Zeng, X., Xiong, Z.: Text fusion watermarking in medical image with semi-reversible for secure transfer and authentication. In: IEEE journal of selected topics in signal and process, vol. 4, pp. 592–604 (2010)Google Scholar
  22. 22.
    Al-Otum, H.M.: Semi-fragile watermarking for gray scale image authentication and tamper detection based on an adjusted expanded-bit multi-scale quantization-based technique. J. Vis. Commun. Image Represent. 25(5), 1064–1081 (2014)Google Scholar
  23. 23.
    Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001)Google Scholar
  24. 24.
    Qi, X., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image Represent. 22(2), 187–200 (2011)Google Scholar
  25. 25.
    Zhang, W., Frank, Y.S.: Semi-fragile spatial watermarking based on local binary pattern operators. Opt. Commun. 284(16–17), 3904–3912 (2011)Google Scholar
  26. 26.
    Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5(1), 187–193 (2011)Google Scholar
  27. 27.
    Minamoti, T., Ohura, R.: A blind digital image watermarking method based on the dyadic wavelet transform and interval arithmetic. Appl. Math. Comput. 236, 306–319 (2014)Google Scholar
  28. 28.
    Yeo, D.G., Lee, H.Y., Kim, B.M.: High capacity reversible watermarking using differential histogram shifting and predicted error compensation. J. Electron. Imaging 20(1), 013001 (2011)Google Scholar
  29. 29.
    Kennedy, J., Eberhart, R.: Particle Swarm Optimization. In: Proceedings of the IEEE international conference on neural networks, vol. 4, pp. 1942–1948 (1995)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Information TechnologyDr. Mahalingam College of Engineering and TechnologyPollachiIndia

Personalised recommendations