Abstract
Digital image watermarking, the process of marking a host image with a watermark, is generally used to authenticate the data. In the medical field, it is of utmost importance to verify the authenticity of the data using Medical Image Watermarking (MIW), especially in e-healthcare applications. Recently, MIW with image fusion, the merging of multimodal images to improve image quality, is being widely utilized to make diagnosis more accessible and precise with the verified data. This paper offers a durable and secure fusion-based hybrid MIW approach. The method initially used Fast Filtering (FF) to merge two medical images from different modalities to form the cover image. A first-level Redundant Discrete Wavelet Transform (RDWT) is employed on this host image to locate the component with the highest entropy. Then a single-level Discrete Wavelet Transform (DWT) is applied to it. It performed a Multi-resolution Singular Value Decomposition (MSVD) on the wavelet decomposed component and the embedding watermark. Finally, a Hyperchaotic System-Fibonacci Q Matrix (HFQM) encryption system was utilized, which increases the watermarked image’s security. Here, using various medical images, the performance of the proposed technique is evaluated. Without any attacks, the approach achieved a maximum Peak Signal to Noise Ratio (PSNR) of 90.31 dB and a Structural Similarity Index Matrix (SSIM) of value 1. Various watermarking assaults were employed to test the proposed method’s resilience. The suggested technique achieved a perfect value of 1 for the Normalised Correlation (NC) for almost all attacks with acceptable imperceptibility, which substantially improves over current procedures. The suggested technique’s average embedding and extraction times are 0.3958 and 0.4721 seconds, respectively, which are pretty short compared to existing approaches.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
In this pandemic, telemedicine has been widely used worldwide, enabling a patient to consult global experts from the comfort of his home. The medical records are processed using cloud computing or transmitted over an open network. In this situation, the main issue is to preserve the security, privacy, and integrity of e-records. The data during transmission may be altered or hacked by unauthorized users leading to misdiagnosis, delay in treatment, or even the patient’s death. Encryption can be used for the protection of medical data [11]. But the hacker can modify the data if it is decrypted. The scenario, as mentioned above, can be effectively handled using the MIW [28]. Here a watermark is inserted into the carrier data by a sender, and later it is retrieved by the receiver, which authenticates the data integrity. There is always a trade-off between three crucial characteristics of a MIW system- robustness, imperceptibility, and capacity. The ability to survive watermark attacks is referred to as robustness, while imperceptibility refers to whether the implanted watermark is visible or invisible to the rest of the world. The amount of information that can be inserted into the original data is the system’s capacity [26]. Another essential characteristic of the MIW system is the reversibility (lossless), where the original data and the watermark will be restored on the receiving side [35].
MIW can be either spatial or transform in nature. In the spatial domain, the pixel value of the original data is changed to embed the secret information [24, 32]. The critical disadvantage of this design is that it is less resistant to attacks. In the case of a transform domain type, modification is done in the transformed coefficients of the host image [2, 10]. It has the potential to compensate for the drawbacks of spatial domain approaches. Most researchers nowadays focus on hybrid domain techniques, which combine transform domain with spatial domain techniques, which have both advantages. Recently, fusion-based MIW is gaining popularity, improving diagnostic accuracy [12].
1.1 Contributions
This paper presented a fusion-based medical image watermarking scheme using the RDWT-DWT-MSVD method. Here the host image is generated by the fusion of computed tomography (CT) and magnetic resonance imaging (MRI) scans, or T1-weighted and T2-weighted MRI scan, using the FF algorithm [36]. This fusion process improves the diagnostic accuracy of the host medical image. RDWT is employed in the fused cover image, decomposing it into low-frequency and high-frequency elements (LL, HL, LH, and HH). Then select the component with the highest entropy, less sensitive to Human Visual System (HVS). DWT is applied to this high entropy component to form the approximation and detailed components (CA, CH, CV, and CD). Then select the element with the highest entropy, and single level MSVD is employed to form the low and high-frequency components (XLL, XLH, XHL, and XHH). MSVD is also applied to the watermark to create various low and high-frequency components (WLL, WLH, WHL, and WHH). The embedding is done in the experimentally selected high-frequency HL subband since it is less sensitive to the human visual system, using an embedding rule. The hybrid domain enhances the invisibility and robustness of the scheme [30]. Finally, the watermarked image is encrypted using the HFQM algorithm, which uses a six-dimensional hyper-chaotic system with a Fibonacci Q matrix, further improving security [15]. The results indicate that the system has an excellent performance in imperceptibility, robustness, and security than the existing techniques with less computational time and can be used for e-healthcare applications. The contributions of the suggested scheme can be summarized as follows.
-
1.
The suggested method utilizes fusion-based watermarking, which uses the FF algorithm to generate carrier images, increasing diagnostic accuracy.
-
2.
RDWT, DWT, and MSVD are the general techniques used in watermarking. Since DWT has different advantages like multi-scalability, multi-resolution, and sparse frequency localization, it can improve the watermarking system’s imperceptibility. It also has good robustness against noise and compression attacks. But it has shift sensitivity and poor directionality, which RDWT can eliminate. RDWT has the advantages like shift invariance and high embedding capacity. It is also robust to additive noise attacks. MSVD has the benefits like less computational complexity and provides robustness against geometrical attacks. Here we used the RDWT-DWT-MSVD hybrid method for watermarking, which offers excellent invisibility and robustness with less computational time.
-
3.
The hybrid scheme retrieves the original image and watermark with less loss.
-
4.
The watermarked image is encrypted using the HFQM algorithm. It uses 6D hyperchaotic system, which enhances the encryption performance and raises the security level due to its complex high-dynamic behaviors and two positive Lyapunov exponents. It also uses a Fibonacci Q matrix, which makes the encryption system faster.
-
5.
The suggested method provides better imperceptibility and robustness with lower computational time than the current state-of-the-art technologies.
The following is how the rest of the paper is structured. Complementary works are in Section 2, and background preliminaries are discussed in Section 3. Section 4 delves into the proposed plan. Discussion on the experimental results in Section 5, along with a comparison study, and the article concluded in Section 6.
2 Complementary works
Many academics presented various MIW methods based on image fusion. Anand and Singh [4] used the Non-subsampled shearlet transform (NSST) to merge CT and MRI scans. Watermarking uses the Dual tree complex wavelet transform (DTCWT) - Singular value decomposition (SVD) technique. Finally, the data is encrypted using the chaotic map-random permutation-SVD technique. They tested the method’s effectiveness using several watermark attacks. The authors created a MIW system in [7] that uses a non-subsampled contourlet transform (NSCT) to get the fused carrier image. The method used NSCT, QR decomposition, and Schur decomposition along with the Electronic Patient Record (EPR) Data for the watermarking. They used Deoxyribonucleic acid (DNA), chaotic maps, and a hash function in the encryption technique. The authors implemented various situations to assess the system’s imperceptibility and resilience. The MIW strategy was presented by Hemdan [14] using Wavelet fusion, DWT, and SVD approaches. The technique used chaotic, and Arnold transforms to the watermarked image to improve the method’s security. The author experimented with the scheme’s performance by using various watermarking attacks. Tokhy [12] created a MIW algorithm in which the fused radiography image serves as the host image. The author employed the Ridgelet transform (RT) and the backtracking search optimization method for the watermarking approach to achieve the best balance of robustness and image imperceptibility. The technique used different watermarking attacks for the performance evaluation. Anand et al. [8] introduced a fusion-based MIW system. The technique used NSCT for the fusion of medical images. They incorporated NSCT, fast Walsh- Hadamard Transform, and Schur decomposition for the watermarking. The watermarked image is finally encrypted with a hyperchaotic and DNA scheme to improve security. Singh et al. [31] designed a MIW strategy for telemedicine applications. The cover image is encrypted using a key-based encryption scheme. The technique utilized RDWT and RSVD for the watermarking. El-Shafai and Hemdan [13] developed a fusion-based watermarking system for color images. Here the color watermark image is separated into RGB components. Three gray images are fused to each of the separated RGB components to form a fused watermark image using a wavelet-based fusion scheme. Finally, DWT and SVD are utilized to embed the watermark into the RGB parts of the color host medical image. Mahto et al. [21] proposed a fusion-based watermarking scheme. The technique used NSCT for the fused watermark image. The contourlet transform and RSVD hybrid approach are used to embed encrypted watermark images into the blue channel of the cover image.
MIW has been used in a variety of ways recently, according to various authors. Anand and Singh [9] used RDWT, Hessenberg Decomposition (HD), and Randomized SVD (RSVD) to create an algorithm for the security of covid-19 patient records. They used distinct watermarks to boost the level of protection and used lightweight encryption for the final scrambled watermarked image. The scheme employed different matrices to evaluate the performance. Khare and Srivastava [19] introduced a MIW scheme based on homomorphic transform-RDWT-SVD. They tried 2-D Chaotic Arnold transform as an encryption technology to provide confidentiality to the system. The authors performed different evaluation matrices to check the performance of the implemented system. Based on NSCT-MSVD, Anand and Singh [5] developed a technique for the preservation of medical images. Shamir’s technique protects data to be safely kept and communicated. In the technique [6], the authors generated the dual watermark using DWT and Turbo encoding. The embedding procedure employs RDWT, RSVD, and optimization approaches. They encrypted the watermarked image with an algorithm for added protection. For the evaluation, the approach deployed a variety of measuring parameters. Soualmi et al. [34] proposed a blind MIW technique for inserting encrypted watermarks based on Schur Decomposition, with the chaotic sequence as the scrambling mechanism. The technique used various evaluation matrices to verify the scheme’s performance. The authors of [3] developed a multi-MIW technique based on the DWT-SVD approach, using the hamming code method for text encryption and various compression methods for data transmission. They used various evaluation methodologies to verify the system’s performance. Kahlessenane et al. [17] devised a method for safeguarding medical images. Their study combined DWT, NSST, NSCT, and DCT with Schur decomposition. The watermarks are implanted in the medium frequency band to improve robustness and imperceptibility. They practiced several matrix parameters to test the scheme’s performance.
The security of transmitted medical data is also essential during the transmission through open networks. Various authors proposed different works to resolve this. In [18], the authors utilized 5D-dimensional hyper chaotic with compressive sensing to transmit medical data over the Internet of Things Networks. The authors used a blockchain system for secure medical data transmission by incorporating neural networks in [23]. Nisha Rajeja et al. [25] developed a security system for transmitting Electro Cardio Grams using triple data encryption standard and is optimized with water cycle optimization. In [27], the authors proposed a medical data security system using blockchain technology. For authentication, the system uses an access control mechanism.
3 Background preliminaries
3.1 DWT
The DWT offers multi resolutions of an image representation, which aids in analyzing image data. It decomposes an image into low frequency (approximate) and high frequency (detailed) sub-bands. It has the advantages like high imperceptibility and good robustness against noise and compression attacks [20]. Since it consists of a downsampling block, it has the property of shift variance. The DWT decomposition can be implemented using the Fig. 1. Here f[n] is the input data, and \(f^{\prime }[n]\) is the reconstructed data using DWT.
3.2 RDWT
RDWT has shift-invariance property due to the lack of down-sampling and up-sampling blocks. Here, the image is also decomposed into approximate and detailed components but the same size as the host image. Hence the embedding capacity is improved [33]. It is also robust against additive noise. The implementation of RDWT is shown in the Fig. 2, where f[n] is the input data, and \(f^{\prime }[n]\) is the reconstructed data using RDWT.
3.3 MSVD
SVD will take the place of FIR filters thanks to MSVD. MSVD disintegrates an image like wavelets. While wavelet and advanced wavelet transforms supply local and directional information, MSVD does not. Since it requires less computing than SVD, it is more suited for real-time applications. Compared to wavelets, MSVD’s decomposition is data-set-dependent rather than relying on any basis functions. Like wavelets, signals are individually filtered using low and high pass finite impulse responses. The output is eventually decimated by two to reach the first level of decomposition. The abovementioned process can be repeated to get the subsequent levels. MSVD offers excellent robustness against geometrical attacks [29]. It is comparable to wavelet decomposition in that MSVD can be applied at multiple levels to watermark images, which makes it appropriate for image watermarking.
3.4 Entropy
According to [1], high entropy parts of an image have a higher information density, which leads to higher complexity and uncertainty. Because of the reduced visual sensitivity brought on by the increased complexity, the Just Noticeable Threshold (JND) thresholds also increase. The JND thresholds dictate where and how strongly a watermark signal can be used without lowering the image quality. Hence more prominent energy watermarks can be implanted into the image in high entropy regions less sensitive to Human Visual System, thus improving the imperceptibility of the system.
4 Proposed scheme
This section explains the proposed RDWT-DWT-MSVD-based robust and secure MIW scheme. The three divisions of the completed work are (1) The generation of a carrier image by fusing multimodal images, (2) Incorporating and extracting a medical watermark image into the fused cover image, and (3) Watermark image encryption
4.1 The generation of a carrier image by fusing multimodal images
The proposed scheme used the FF technique to merge multimodal images, resulting in a fused host image with increased information richness, which is particularly valuable for medical diagnostics [36]. Algorithm 1 shows the procedures for creating a host image using the FF technique. Initially, image gradient magnitude is employed to determine image sharpness and contrast. Then, a fast morphological closing operation is applied to the image gradient magnitude to bridge gaps and fill holes. The multimodal image gradient is used to create the weight map and is filtered using a fast structure-preserving filter. A weighed-sum rule is then employed to build the fused image. Figure 3 represents the fused result. Table 1 explains all the notations used in the algorithms.
4.2 Incorporating and extracting a medical watermark image into the fused cover image
The suggested strategy applied the RDWT-DWT-MSVD approach for the watermarking. Here we used a thorax-CT image as a watermark, as shown in Fig. 4. Figure 5 depicts the complete embedding steps. The procedure used a one-level RDWT to create high and low-frequency components on C_FUSED. From this, select the element with the highest entropy. DWT is applied to this component, yielding approximation and detailed features. The scheme employed MSVD to the highest entropy DWT component. MSVD is also used for the medical watermark W. The HL sub-band is selected experimentally for watermarking since high-frequency components are less sensitive to the human visual system, which increases the system’s invisibility. The watermark W is put into the C_FUSED using an embedding rule given in step 3 of Algorithm 2. Apply inverse MSVD, DWT, and RDWT to make the watermarked image W_M.
For recovering W, apply RDWT to the decrypted watermarked image W_M_DECRYPTED. Find the frequency component with the highest Entropy, and DWT is applied. MSVD is applied to the maximum entropy DWT component to obtain four frequency components. The watermark can be retrieved using the extraction rule given in step 4 of Algorithm 3, and IMSVD is employed to obtain the watermark. The original host image can be retrieved by applying IMSVD, Inverse DWT, and Inverse RDWT. The extraction steps are shown in Fig. 6. Algorithms 2 and 3 explain the complete procedure.
4.3 Watermark image encryption
To strengthen the security of the watermark images, we used the HFQM [15] encryption technique, which employs a six-dimensional hyper-chaotic system with a Fibonacci Q matrix. Due to its complex, highly dynamic behaviors, and two positive Lyapunov exponents, the 6D hyperchaotic architecture improves encryption performance and elevates security levels. The scrambled image can be generated easily, quickly, and effectively using the Fibonacci Q-matrix. There are two stages to encryption: confusion and diffusion. In each of these procedures, the arrangements and values of the pixels are altered. The 6D hyperchaotic system is the basis of the confusion step. The system’s initial condition is first calculated based on the plain image. The hyperchaotic procedure is then iterated to produce a new vector, after which we choose three sequences (x1, x3, and x5). This vector has been sorted. The arrangement of the numbers in the sorted order is used to confuse the plain image. The diffusion process is carried out to obtain the encrypted image after confusing the plain image. Algorithm 4 explains the encryption technique.
5 Experimental analysis and performance evaluation
We implemented the described technique using an Intel Core i3, 8GB RAM processor, in MATLAB 2022a and carried out the trials with 256x256 MRI, CT scans [16] , and a 128x128 thorax-CT watermark medical image [22]. Finding performance parameter matrices such as PSNR and SSIM [3] were used to assess the method’s imperceptibility, given by (1) and (4) respectively. PSNR measures the visual similarity between the original and marked images and should have a high value, preferably greater than 30 dB. The structural similarity between the cover image (i) and the marked image (w) is quantified using SSIM, and the optimum value is 1. The NC [3] was used to analyze the scheme’s susceptibility to attacks, and its optimal value is 1, given by (3).
where MSE is the Mean Square Error and is given by
here fw(i,j),f(i,j),Iw(i,j),I(i,j) are the watermarked image, original cover image, extracted mark, and original mark respectively.
μi,μw,σi,σw are the mean and variance values of the cover image and the watermarked image respectively. σiw represents the cross covariance between host image and watermarked image, c1,c2 are the constants with small values.
The encryption scheme’s performance was tested by determining characteristics such as the Number of Changing Pixel Rate (NPCR), Unified Averaged Changed Intensity (UACI) [3], and Entropy (randomness) [31] given by (5), (7), and (8) respectively.
where P(Ik) is the probability of pixel Ik
5.1 Imperceptibility and robustness analysis
Figure 7 shows the difference in the histogram distribution of the original host image and the watermarked image using the devised scheme. The graphs overlapped, indicating that the cover and watermarked images were visually similar. Thus the suggested plan has excellent imperceptibility.
Table 2 shows the performance of the described system at various gain factors. The maximum PSNR, SSIM, and NC are 90.31 dB, 1, and 1, respectively. The optimum value of the gain factor is 0.3, at which the suggested technique has high importance in terms of all the above parameters. Figure 8 illustrates the variation of PSNR with the gain factor; its values fall as the gain factor rises. As the gain factor grows, the value of NC increases, eventually reaching an optimal value of 1, as shown in Fig. 9.
Table 3 illustrates the performance of the developed approach with various sets of images at a gain factor of 0.1. We obtained average PSNR, SSIM, and NC values of 52.71 dB, 0.9912, 0and 0.9966 for different clinical scans. The method also obtained the maximum SSIM value of 0.9987 between the original carrier image and the extracted cover image, indicating less loss during the process, which is essential for MIW. The values show that the suggested scheme performs exceptionally well in imperceptibility, robustness, and confidentiality.
Tables 4 and 5 show the technique’s robustness against several image processing assaults. Using the developed hybrid scheme, it can withstand the common watermarking attacks like noise addition, compression, geometrical watermarks, etc. The method’s NC value is 1 for practically all attacks and close to 1 for the others, which indicates that the developed hybrid technique is exceptionally resistant to various watermarking attacks.
5.2 Encryption analysis
The difference in histogram distribution between the encrypted and decrypted watermarked images is depicted in Fig. 10; they are uncorrelated, which indicates that the proposed technique has a high level of security. Further, the performance of the encryption algorithm is evaluated using the parameters NPCR, UACI, Entropy, Diagonal, Vertical, and Horizontal correlation coefficients [15] as shown in Table 6. The average NPCR and UACI values are 0.985 and 0.3549, respectively, close to ideal (0.996034 and 0.3346, respectively), indicating the excellent robustness of the encryption algorithm. The average Entropy between the plain and encrypted images is 7.7007 (the perfect value is 8), showing the encryption scheme’s unpredictability. The average values of the Diagonal, Vertical and Horizontal correlation coefficients are 0.0033, 0.0034, and 0.0825, close to the ideal value (zero), reducing the correlation in the ciphered image. Thus the suggested encryption scheme enhances the security of the system.
5.3 Comparison analysis
Table 7 shows the comparison result of the proposed scheme’s performance to that of [5, 7, 19]. Figures 11, 12, and 13 depict the results. Compared to state-of-the-art approaches, the proposed scheme outperforms them in every way. Table 8 evaluates the embedding and extraction times of the developed technique to the existing methods. The image fusion takes an average of 0.8251 seconds, including 0.3958 seconds for embedding, 0.4366 seconds for encryption, 0.3181 seconds for decryption, and 0.4721 seconds for extraction, which are very low compared to existing procedures. Thus the established technology can be successfully used in e-health care applications utilizing cloud computing techniques.
6 Conclusion
This hybrid MIW approach is based on image fusion. It leverages the FF algorithm for multimodal image fusion and results in a fused image with increased medical information, which serves as the host image. The proposed technique utilized RDWT-DWT-MSVD methodology for the watermark insertion and retrieval procedure, producing excellent results in imperceptibility and robustness for the system. The HFQM encryption algorithm added much more protection. The comparison results with other strategies indicate that the suggested technique is superior to the state of art techniques. As a result, the presented process can successfully implement MIW for e-healthcare applications employing cloud computing techniques. This method’s reach can include multiple color MIW approaches with increased information capacity.
Data Availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Akhbari B, Ghaemmaghami S (2005) Watermarking of still images using multiresolution singular value decomposition. In: 2005 international symposium on intelligent signal processing and communication systems. IEEE, pp 325–328
Ali M, Ahn CW, Pant M (2018) An efficient lossless robust watermarking scheme by integrating redistributed invariant wavelet and fractional fourier transforms. Multimed Tools Appl 77(10):11751–11773
Anand A, Singh AK (2020) An improved dwt-svd domain watermarking for medical information security. Comput Commun 152:72–80
Anand A, Singh AK (2021) Health record security through multiple watermarking on fused medical images. IEEE Trans Comput Soc Syst 9(6):1594–1603
Anand A, Singh AK (2021) Secret sharing based watermarking for copy-protection and ownership control of medical image. In: 2021 12th international conference on computing communication and networking technologies (ICCCNT). IEEE, pp 1–07
Anand A, Singh AK (2021) Hybrid nature-inspired optimization and encryption-based watermarking for e-healthcare. IEEE Trans Comput Soc Systpp: 1–8, https://doi.org/10.1109/TCSS.2022.3140862
Anand A, Singh A (2021) Sdh: secure data hiding in fused medical image for smart healthcare. IEEE Trans Comput Soc Syst 9(4):1265–1273
Anand A, Singh AK (2022) A method for authenticating digital records for healthcare systems. Sustain Comput Inf Syst 33:100621
Anand A, Singh AK (2022) Dual watermarking for security of covid-19 patient record. IEEE Trans Depend Secur Comput 20(1):859–866
Ansari IA, Pant M (2017) Multipurpose image watermarking in the domain of dwt based on svd and abc. Pattern Recogn Lett 94:228–236
Chuying Y, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608
El Tokhy MS (2021) Development of optimum watermarking algorithm for radiography images. Comput Electric Eng 89:106932
El-Shafai W, Hemdan EE-D (2021) Robust and efficient multi-level security framework for color medical images in telehealthcare services. J Amb Intell Human Comput:1–16
Hemdan EE-D (2021) An efficient and robust watermarking approach based on single value decompression, multi-level dwt, and wavelet fusion with scrambled medical images. Multimed Tools Appl 80(2):1749–1777
Hosny KM, Kamal ST, Darwish MM, Papakostas GA (2021) New image encryption algorithm using hyperchaotic system and fibonacci q-matrix. Electronics 10(9):1066
Johnson KA, Becker JA (2023) The whole brain atlas. https://www.med.harvard.edu/aanlib/home.html. Accessed: May 13, 2022
Kahlessenane F, Khaldi A, Kafi R, Euschi S (2021) A robust blind medical image watermarking approach for telemedicine applications. Cluster Comput 24(3):2069–2082
Kaur M, Singh D, Kumar V, Gupta BB, El-Latif AAA (2021) Secure and energy efficient-based e-health care framework for green internet of things. IEEE Trans Green Commun Netw 5(3):1223– 1231
Khare P, Srivastava VK (2021) A secured and robust medical image watermarking approach for protecting integrity of medical images. Trans Emerg Telecommun Technol 32(2):e3918
Li Z, Zhang H, Liu X, Wang C, Wang X (2021) Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on rhfm and dwt-dct. Digit Sign Process 115:103062
Mahto DK, Om PS, Singh AK (2022) Fusiw: fusion-based secure rgb image watermarking using hashing. Multimed Tools Appl:1–17
MedPix Database of medical images (2023) https://medpix.nlm.nih.gov/home. Accessed: May 13, 2022
Nguyen GN, Viet NHL, Elhoseny M, Shankar K, Gupta BB, El-Latif AAA (2021) Secure blockchain enabled cyber–physical systems in healthcare using deep belief network with resnet model. J Parallel Distrib Comput 153:150–160
Qingtang S, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91–106
Raheja N, Manocha AK (2022) Iot based ecg monitoring system with encryption and authentication in secure data transmission for clinical health care approach. Biomed Sign Process Control 74:103481
Sajeer M, Mishra A, Sathidevi PS (2022) Recent advances in transform and hybrid domain digital watermarking techniques—a survey. Soft Comput Secur Appl:841–857
Sharma P, Borah MD, Namasudra S (2021) Improving security of medical big data by using blockchain technology. Comput Electr Eng 96:107529
Singh AK, Kumar B, Dave M, Ghrera SP, Mohan A (2016) Digital image watermarking: techniques and emerging applications. In: Handbook of research on modern cryptographic solutions for computer and cyber security, pp 246–272
Singh KU, Kumar A, Singh T, Ram M (2022) Image-based decision making for reliable and proper diagnosing in nifti format using watermarking. Multimed Tools Appl:1–27
Singh R, Nigam S, Singh AK, Elhoseny M (2020) Integration of wavelet transforms for single and multiple image watermarking. In: Intelligent wavelet based techniques for advanced multimedia applications, pp 51–63
Singh KN, Om PS, Singh AK, Agrawal AK (2022) Watmif: multimodal medical image fusion-based watermarking for telehealth applications. Cognit Comput:1–17
Singh D, Shivani S, Agarwal S (2013) Self-embedding pixel wise fragile watermarking scheme for image authentication. In: International conference on intelligent interactive technologies and multimedia. Springer, pp 111–122
Singh AK et al (2022) Fastmie: faster medical image encryption without compromising security. Measurement 196:111175
Soualmi A, Alti A, Laouamer L (2022) A novel blind medical image watermarking scheme based on schur triangulation and chaotic sequence. Concurr Comput Pract Exp 34(1):e6480
Turuk MP, Dhande AP (2016) A novel reversible multiple medical image watermarking for health information system. J Med Syst 40(12):1–13
Zhan K, Xie Y, Wang H, Min Y (2017) Fast filtering image fusion. J Electron Imaging 26(6):063004
Funding
The authors have no relevant financial or non-financial interests to disclose. The authors have no competing interests to declare that are relevant to the content of this article. All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. The authors have no financial or proprietary interests in any material discussed in this article.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sajeer, M., Mishra, A. A robust and secured fusion based hybrid medical image watermarking approach using RDWT-DWT-MSVD with Hyperchaotic system-Fibonacci Q Matrix encryption. Multimed Tools Appl 82, 37479–37501 (2023). https://doi.org/10.1007/s11042-023-15001-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15001-z