Advertisement

Contourlet-DCT based multiple robust watermarkings for medical images

  • Xiaoqi Wu
  • Jingbing Li
  • Rong Tu
  • Jieren Cheng
  • Uzair Aslam Bhatti
  • Jixin Ma
Article
  • 25 Downloads

Abstract

In the current medical system, the privacy and security of the medical information with respect to its transmission and storage is a key challenge. In pursuit of this, we proposed a contourlet transform and Discrete Cosine Transform (DCT) based multiple robust watermarking algorithms for medical imaging. The proposed scheme uses contourlet transform to extract multidirectional and multiscale texture information, and then the DCT was used to acquire the feature vector in the low frequency directional subbands. Then we used Logistic Map to encrypt the watermark to ensure the security of the original watermarking information under a chaotic system. In watermark embedding and extraction phases, we adopted zero-watermarking technique to ensure the integrity of the medical images. Our experimental results show that the proposed algorithm can embed much more data with less complexity and dose not change the pixel value of the original image. Moreover, the proposed algorithm can extract the watermark effectively with good invisibility and robustness to common and geometric attacks.

Keywords

Medical image Contourlet-DCT Zero watermarking Robust 

Notes

Acknowledgements

This work is supported by the Key Research Project of Hainan Province [ZDYF2018129], and by the National Natural Science Foundation of China [61762033] and the Natural Science Foundation of Hainan [617048, 2018CXTD333].

References

  1. 1.
    Akhaee MA, Bartolini SME, Sankur B, Marvastic F (2009) Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor. IEEE Trans Multimedia 11(5):822–833CrossRefGoogle Scholar
  2. 2.
    Akhaee MA, Sahraeian ME, Marvasti F (2010) Contourlet-based image watermarking using optimum detector in a noisy environment. IEEE Trans Image Process 19(4):967–980MathSciNetCrossRefGoogle Scholar
  3. 3.
    Asmare MH, Asirvadam VS, Hani AFM (2015) Image enhancement based on contourlet transform. SIViP 9(7):1679–1690CrossRefGoogle Scholar
  4. 4.
    Burt PJ, Adelson EH (1983) The Laplacian pyramid as a compact image code. IEEE Trans Commun 31(4):532–540CrossRefGoogle Scholar
  5. 5.
    Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless information hiding based on the molecular structure images of material. Comput Mater Con 54(2):197–207Google Scholar
  6. 6.
    Deng ZJ, Xiao D, Tu FH (2004) Design and implementation of chaotic encryption algorithm based on logistic map. JCU 27(4):61–63Google Scholar
  7. 7.
    Do MN, Vetterli M (2005) The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14(12):2091–2106CrossRefGoogle Scholar
  8. 8.
    Dzwonkowski M, Papaj M, Rykaczewski R (2015) A new quaternion-based encryption method for DICOM images. IEEE Trans Image Process 24(11):4614–4622MathSciNetCrossRefGoogle Scholar
  9. 9.
    Feng HY, Gu YS, Li YC (2012) Research on digital watermarking based on wavelet theory. J Converg Inf Technol 7(13):292–299Google Scholar
  10. 10.
    Hu DH, Wang L, Jiang WJ, Zheng SL, Li B (2018) A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access (9):1–1Google Scholar
  11. 11.
    Jin C (2008) Digital watermarking technology and theory. Bei Jing, ChinaGoogle Scholar
  12. 12.
    Kevin RE, Eduardo FN, Clara CR, Rogelio RR, Mariko NM (2017) Adaptive removable visible watermarking technique using dual watermarking for digital color images. Multimed Tool Appl:1–28Google Scholar
  13. 13.
    Liu Y, Wang JX, Hu HH, Zhu YH (2016) Robust blind digital watermarking scheme based on contourlet transform and QR decomposition. J Optoelectronics Laser 27(3):317–324Google Scholar
  14. 14.
    Roberto HB, Smith MJT (1992) A filter bank for the directional decomposition of image: theory and design. IEEE Trans Signal Process 40(4):882–893CrossRefGoogle Scholar
  15. 15.
    Sun X, Yi KY, Sun YX (2002) Image encryption algorithm based on chaotic system. J Comput Aided Des Comput Graph 14(2):1–4MathSciNetGoogle Scholar
  16. 16.
    Verma VS, Jha RK, Ojha A (2015) Significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Syst Appl 42:8184–8197CrossRefGoogle Scholar
  17. 17.
    Wang JW, Li T, Shi YQ, Lian SG, Ye JY (2017) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimed Tools Appl 76(22):23721–23737CrossRefGoogle Scholar
  18. 18.
    Zhan YF, Feng X, Fu C, Bai GT, Ma HF (2012) An efficient medical image cryplosystem based on chaotic maps. J Digit Content Technol Appl 6(13):265–274Google Scholar
  19. 19.
    Zhang Y, Qin C, Zhang WM, Liu FL, Luo XY (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99–111CrossRefGoogle Scholar
  20. 20.
    Zheng SL, Wang L, Ling BH, Hu DH (2017). Coverless information hiding based on robust image hashing. 13th International Conference Intelligent Computing (ICIC 2017), Liverpool, UK, August 7-10, p 536-547Google Scholar
  21. 21.
    Zhou YS, Jin W (2011) A novel image zero-watermarking scheme based on DWT-SVD. IEEE International Conference on Multimedia Technology (ICMT 2011):2873–2876Google Scholar
  22. 22.
    Zhou QL, Qiu YB, Li L, Lu JF, Yuan WQ, Feng XQ, Mao XY (2018) Steganography using reversible texture synthesis based on seeded region growing and LSB. Comput Mater Con 55(1):151–163CrossRefGoogle Scholar
  23. 23.
    Zhu TT, Hu DH, Wang LN (2009) Perceptual hash functions based on contourlet transform and singular value decomposition, 2009 International Conference on Multimedia Information Networking and Security, p 87-90Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.College of Information Science and TechnologyHainan UniversityHaikouChina
  2. 2.State Key Laboratory of Marine Resource Utilization in the South China SeaHainan UniversityHaikouChina
  3. 3.The First Affiliated Hospital of Hainan Medical UniversityHaikouChina
  4. 4.School of Computing & Mathematical SciencesUniversity of GreenwichLondonUK

Personalised recommendations