Contourlet-DCT based multiple robust watermarkings for medical images
- 25 Downloads
In the current medical system, the privacy and security of the medical information with respect to its transmission and storage is a key challenge. In pursuit of this, we proposed a contourlet transform and Discrete Cosine Transform (DCT) based multiple robust watermarking algorithms for medical imaging. The proposed scheme uses contourlet transform to extract multidirectional and multiscale texture information, and then the DCT was used to acquire the feature vector in the low frequency directional subbands. Then we used Logistic Map to encrypt the watermark to ensure the security of the original watermarking information under a chaotic system. In watermark embedding and extraction phases, we adopted zero-watermarking technique to ensure the integrity of the medical images. Our experimental results show that the proposed algorithm can embed much more data with less complexity and dose not change the pixel value of the original image. Moreover, the proposed algorithm can extract the watermark effectively with good invisibility and robustness to common and geometric attacks.
KeywordsMedical image Contourlet-DCT Zero watermarking Robust
This work is supported by the Key Research Project of Hainan Province [ZDYF2018129], and by the National Natural Science Foundation of China  and the Natural Science Foundation of Hainan [617048, 2018CXTD333].
- 5.Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless information hiding based on the molecular structure images of material. Comput Mater Con 54(2):197–207Google Scholar
- 6.Deng ZJ, Xiao D, Tu FH (2004) Design and implementation of chaotic encryption algorithm based on logistic map. JCU 27(4):61–63Google Scholar
- 9.Feng HY, Gu YS, Li YC (2012) Research on digital watermarking based on wavelet theory. J Converg Inf Technol 7(13):292–299Google Scholar
- 10.Hu DH, Wang L, Jiang WJ, Zheng SL, Li B (2018) A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access (9):1–1Google Scholar
- 11.Jin C (2008) Digital watermarking technology and theory. Bei Jing, ChinaGoogle Scholar
- 12.Kevin RE, Eduardo FN, Clara CR, Rogelio RR, Mariko NM (2017) Adaptive removable visible watermarking technique using dual watermarking for digital color images. Multimed Tool Appl:1–28Google Scholar
- 13.Liu Y, Wang JX, Hu HH, Zhu YH (2016) Robust blind digital watermarking scheme based on contourlet transform and QR decomposition. J Optoelectronics Laser 27(3):317–324Google Scholar
- 18.Zhan YF, Feng X, Fu C, Bai GT, Ma HF (2012) An efficient medical image cryplosystem based on chaotic maps. J Digit Content Technol Appl 6(13):265–274Google Scholar
- 20.Zheng SL, Wang L, Ling BH, Hu DH (2017). Coverless information hiding based on robust image hashing. 13th International Conference Intelligent Computing (ICIC 2017), Liverpool, UK, August 7-10, p 536-547Google Scholar
- 21.Zhou YS, Jin W (2011) A novel image zero-watermarking scheme based on DWT-SVD. IEEE International Conference on Multimedia Technology (ICMT 2011):2873–2876Google Scholar
- 23.Zhu TT, Hu DH, Wang LN (2009) Perceptual hash functions based on contourlet transform and singular value decomposition, 2009 International Conference on Multimedia Information Networking and Security, p 87-90Google Scholar