Skip to main content
Log in

An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

This paper presents a novel medical image authentication system through wavelet decomposition and particle swarm optimization (PSO). First medical image is treated with wavelet transformation and another image is treated with tent map and a hash function to further protect the secret watermark. Tent map ensures the sensitivity towards changes in the initial value which, can better protect and encrypt the original watermark. The operations performed on the binary coded image are based on the encryption sequences generated from chaotic map. Particle swarm optimization (PSO) results in producing optimal balance between embedding capacity and imperceptibility by exploiting the image pixel correlation of neighboring pixels. The novelty of the proposed technique lies in its ability to create a model that can find optimal wavelet coefficients for embedding using PSO and also acts as an absolute feature for embedding the watermark. The proposed method is thus able to embed watermark with low distortion, take out the secret information and also recovers the original image. The proposed technique is valuable with respect to robustness, capacity and imperceptibility.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Hu, Y.C., Chen, W.L., Lo, C.C., Wu, C.M.: A novel tamper detection scheme for BTC compressed images. Opto-Electron. Rev. 21(1), 137–146 (2013)

    Google Scholar 

  2. Hu, Y.C., Lo, C.C., Chen, W.L., Wen, C.H.: Joint image coding and image authentication based on absolute moment block truncation coding. J. Electron. Image 22(1), 1–12 (2013)

    Google Scholar 

  3. Qin, C., Chang, C.C., Chen, K.N.: Adaptive self-recovery for tampered images based on VQ indexing and in painting. Signal Process 93, 933–946 (2013)

    Google Scholar 

  4. Zhang, X., Qian, Z., Ren, Y., Feng, G.: Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4), 1223–1232 (2011)

    Google Scholar 

  5. Lo, C.C., Hu, Y.C.: A novel reversible image authentication scheme for digital images. Signal Process 98, 174–185 (2014)

    Google Scholar 

  6. Lee, S., Yoo, C.D., Kalker, T.O.N.: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. Forensics Secur. 2, 321–330 (2007)

    Google Scholar 

  7. Chang, C.C., Nguyen, T.S., Lin, C.C.: A reversible compression code hiding using SOC and SMVQ indices. Inf. Sci. 300, 85–99 (2015)

    Google Scholar 

  8. Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)

    Google Scholar 

  9. Parah, S.A., Ahad, F., Sheikh, J.A., Bhat, G.M.: Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J. Biomed. Inform., 214–230 (2017)

  10. Nguyen, T.-S., Chang, C.-C., Yang, X.-Q.: A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. Int. J. Electron. Commun., 1055–1061 (2016)

  11. Sethuramalingam, T.K., Nagaraj, B.: A comparative approach on PID controller tuning using soft computing techniques. Int. J. Innov. Sci. Eng. Res. 1(12), 460–465 (2014)

    Google Scholar 

  12. Lin, P.Y., Lee, J.S., Chang, C.C.: Dual digital watermarking for internet media based on hybrid strategies. IEEE Trans. Circuits Syst. Video Technol. 19(8), 1169–1171 (2009)

    Google Scholar 

  13. Swaminathan, A., Mao, Y.N., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur. 1(2), 215–230 (2006)

    Google Scholar 

  14. Xuan, G., Shi, Y.Q., Yang, C., Zheng, Y., Zou, D., Chai, P.: Lossless data hiding using integer wavelet transform and threshold embedding technique. In: IEEE inter-national conference on multimedia and expo, pp. 1520–1523 (2005)

  15. Chan, C.S.: An image authentication method by applying Hamming code on rearranged bits. Pattern Recognit. Lett. 32(14), 1679–1690 (2011)

    Google Scholar 

  16. Zhu, X., Ho, A.T.S., Marziliano, P.: A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process. Image Commun. 22(5), 515–528 (2007)

    Google Scholar 

  17. Preda, R.O.: Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1), 367–373 (2013)

    Google Scholar 

  18. Usman, I., Khan, A., Ali, A., Choi, T.S.: Reversible watermarking based on intelligent coefficient selection and integer wavelet transform. Int. J. Innov. Comput. Inf. Control 5, 1-ISII08-237 (2005)

    Google Scholar 

  19. Chuang, J.C., Hu, Y.C.: An adaptive image authentication scheme for vector quantization compressed image. J. Vis. Commun. Image Represent. 22(5), 440–449 (2011)

    Google Scholar 

  20. Sachnev, V., Nam, T., Kim, H.J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm, using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19, 989–998 (2009)

    Google Scholar 

  21. Chen, M., Chen, Z., Zeng, X., Xiong, Z.: Text fusion watermarking in medical image with semi-reversible for secure transfer and authentication. In: IEEE journal of selected topics in signal and process, vol. 4, pp. 592–604 (2010)

  22. Al-Otum, H.M.: Semi-fragile watermarking for gray scale image authentication and tamper detection based on an adjusted expanded-bit multi-scale quantization-based technique. J. Vis. Commun. Image Represent. 25(5), 1064–1081 (2014)

    Google Scholar 

  23. Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001)

    Google Scholar 

  24. Qi, X., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image Represent. 22(2), 187–200 (2011)

    Google Scholar 

  25. Zhang, W., Frank, Y.S.: Semi-fragile spatial watermarking based on local binary pattern operators. Opt. Commun. 284(16–17), 3904–3912 (2011)

    Google Scholar 

  26. Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5(1), 187–193 (2011)

    Google Scholar 

  27. Minamoti, T., Ohura, R.: A blind digital image watermarking method based on the dyadic wavelet transform and interval arithmetic. Appl. Math. Comput. 236, 306–319 (2014)

    Google Scholar 

  28. Yeo, D.G., Lee, H.Y., Kim, B.M.: High capacity reversible watermarking using differential histogram shifting and predicted error compensation. J. Electron. Imaging 20(1), 013001 (2011)

    Google Scholar 

  29. Kennedy, J., Eberhart, R.: Particle Swarm Optimization. In: Proceedings of the IEEE international conference on neural networks, vol. 4, pp. 1942–1948 (1995)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Balasamy.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Balasamy, K., Ramakrishnan, S. An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO. Cluster Comput 22 (Suppl 2), 4431–4442 (2019). https://doi.org/10.1007/s10586-018-1991-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-1991-8

Keywords

Navigation