1 Introduction

In this pandemic, telemedicine has been widely used worldwide, enabling a patient to consult global experts from the comfort of his home. The medical records are processed using cloud computing or transmitted over an open network. In this situation, the main issue is to preserve the security, privacy, and integrity of e-records. The data during transmission may be altered or hacked by unauthorized users leading to misdiagnosis, delay in treatment, or even the patient’s death. Encryption can be used for the protection of medical data [11]. But the hacker can modify the data if it is decrypted. The scenario, as mentioned above, can be effectively handled using the MIW [28]. Here a watermark is inserted into the carrier data by a sender, and later it is retrieved by the receiver, which authenticates the data integrity. There is always a trade-off between three crucial characteristics of a MIW system- robustness, imperceptibility, and capacity. The ability to survive watermark attacks is referred to as robustness, while imperceptibility refers to whether the implanted watermark is visible or invisible to the rest of the world. The amount of information that can be inserted into the original data is the system’s capacity [26]. Another essential characteristic of the MIW system is the reversibility (lossless), where the original data and the watermark will be restored on the receiving side [35].

MIW can be either spatial or transform in nature. In the spatial domain, the pixel value of the original data is changed to embed the secret information [24, 32]. The critical disadvantage of this design is that it is less resistant to attacks. In the case of a transform domain type, modification is done in the transformed coefficients of the host image [2, 10]. It has the potential to compensate for the drawbacks of spatial domain approaches. Most researchers nowadays focus on hybrid domain techniques, which combine transform domain with spatial domain techniques, which have both advantages. Recently, fusion-based MIW is gaining popularity, improving diagnostic accuracy [12].

1.1 Contributions

This paper presented a fusion-based medical image watermarking scheme using the RDWT-DWT-MSVD method. Here the host image is generated by the fusion of computed tomography (CT) and magnetic resonance imaging (MRI) scans, or T1-weighted and T2-weighted MRI scan, using the FF algorithm [36]. This fusion process improves the diagnostic accuracy of the host medical image. RDWT is employed in the fused cover image, decomposing it into low-frequency and high-frequency elements (LL, HL, LH, and HH). Then select the component with the highest entropy, less sensitive to Human Visual System (HVS). DWT is applied to this high entropy component to form the approximation and detailed components (CA, CH, CV, and CD). Then select the element with the highest entropy, and single level MSVD is employed to form the low and high-frequency components (XLL, XLH, XHL, and XHH). MSVD is also applied to the watermark to create various low and high-frequency components (WLL, WLH, WHL, and WHH). The embedding is done in the experimentally selected high-frequency HL subband since it is less sensitive to the human visual system, using an embedding rule. The hybrid domain enhances the invisibility and robustness of the scheme [30]. Finally, the watermarked image is encrypted using the HFQM algorithm, which uses a six-dimensional hyper-chaotic system with a Fibonacci Q matrix, further improving security [15]. The results indicate that the system has an excellent performance in imperceptibility, robustness, and security than the existing techniques with less computational time and can be used for e-healthcare applications. The contributions of the suggested scheme can be summarized as follows.

  1. 1.

    The suggested method utilizes fusion-based watermarking, which uses the FF algorithm to generate carrier images, increasing diagnostic accuracy.

  2. 2.

    RDWT, DWT, and MSVD are the general techniques used in watermarking. Since DWT has different advantages like multi-scalability, multi-resolution, and sparse frequency localization, it can improve the watermarking system’s imperceptibility. It also has good robustness against noise and compression attacks. But it has shift sensitivity and poor directionality, which RDWT can eliminate. RDWT has the advantages like shift invariance and high embedding capacity. It is also robust to additive noise attacks. MSVD has the benefits like less computational complexity and provides robustness against geometrical attacks. Here we used the RDWT-DWT-MSVD hybrid method for watermarking, which offers excellent invisibility and robustness with less computational time.

  3. 3.

    The hybrid scheme retrieves the original image and watermark with less loss.

  4. 4.

    The watermarked image is encrypted using the HFQM algorithm. It uses 6D hyperchaotic system, which enhances the encryption performance and raises the security level due to its complex high-dynamic behaviors and two positive Lyapunov exponents. It also uses a Fibonacci Q matrix, which makes the encryption system faster.

  5. 5.

    The suggested method provides better imperceptibility and robustness with lower computational time than the current state-of-the-art technologies.

The following is how the rest of the paper is structured. Complementary works are in Section 2, and background preliminaries are discussed in Section 3. Section 4 delves into the proposed plan. Discussion on the experimental results in Section 5, along with a comparison study, and the article concluded in Section 6.

2 Complementary works

Many academics presented various MIW methods based on image fusion. Anand and Singh [4] used the Non-subsampled shearlet transform (NSST) to merge CT and MRI scans. Watermarking uses the Dual tree complex wavelet transform (DTCWT) - Singular value decomposition (SVD) technique. Finally, the data is encrypted using the chaotic map-random permutation-SVD technique. They tested the method’s effectiveness using several watermark attacks. The authors created a MIW system in [7] that uses a non-subsampled contourlet transform (NSCT) to get the fused carrier image. The method used NSCT, QR decomposition, and Schur decomposition along with the Electronic Patient Record (EPR) Data for the watermarking. They used Deoxyribonucleic acid (DNA), chaotic maps, and a hash function in the encryption technique. The authors implemented various situations to assess the system’s imperceptibility and resilience. The MIW strategy was presented by Hemdan [14] using Wavelet fusion, DWT, and SVD approaches. The technique used chaotic, and Arnold transforms to the watermarked image to improve the method’s security. The author experimented with the scheme’s performance by using various watermarking attacks. Tokhy [12] created a MIW algorithm in which the fused radiography image serves as the host image. The author employed the Ridgelet transform (RT) and the backtracking search optimization method for the watermarking approach to achieve the best balance of robustness and image imperceptibility. The technique used different watermarking attacks for the performance evaluation. Anand et al. [8] introduced a fusion-based MIW system. The technique used NSCT for the fusion of medical images. They incorporated NSCT, fast Walsh- Hadamard Transform, and Schur decomposition for the watermarking. The watermarked image is finally encrypted with a hyperchaotic and DNA scheme to improve security. Singh et al. [31] designed a MIW strategy for telemedicine applications. The cover image is encrypted using a key-based encryption scheme. The technique utilized RDWT and RSVD for the watermarking. El-Shafai and Hemdan [13] developed a fusion-based watermarking system for color images. Here the color watermark image is separated into RGB components. Three gray images are fused to each of the separated RGB components to form a fused watermark image using a wavelet-based fusion scheme. Finally, DWT and SVD are utilized to embed the watermark into the RGB parts of the color host medical image. Mahto et al. [21] proposed a fusion-based watermarking scheme. The technique used NSCT for the fused watermark image. The contourlet transform and RSVD hybrid approach are used to embed encrypted watermark images into the blue channel of the cover image.

MIW has been used in a variety of ways recently, according to various authors. Anand and Singh [9] used RDWT, Hessenberg Decomposition (HD), and Randomized SVD (RSVD) to create an algorithm for the security of covid-19 patient records. They used distinct watermarks to boost the level of protection and used lightweight encryption for the final scrambled watermarked image. The scheme employed different matrices to evaluate the performance. Khare and Srivastava [19] introduced a MIW scheme based on homomorphic transform-RDWT-SVD. They tried 2-D Chaotic Arnold transform as an encryption technology to provide confidentiality to the system. The authors performed different evaluation matrices to check the performance of the implemented system. Based on NSCT-MSVD, Anand and Singh [5] developed a technique for the preservation of medical images. Shamir’s technique protects data to be safely kept and communicated. In the technique [6], the authors generated the dual watermark using DWT and Turbo encoding. The embedding procedure employs RDWT, RSVD, and optimization approaches. They encrypted the watermarked image with an algorithm for added protection. For the evaluation, the approach deployed a variety of measuring parameters. Soualmi et al. [34] proposed a blind MIW technique for inserting encrypted watermarks based on Schur Decomposition, with the chaotic sequence as the scrambling mechanism. The technique used various evaluation matrices to verify the scheme’s performance. The authors of [3] developed a multi-MIW technique based on the DWT-SVD approach, using the hamming code method for text encryption and various compression methods for data transmission. They used various evaluation methodologies to verify the system’s performance. Kahlessenane et al. [17] devised a method for safeguarding medical images. Their study combined DWT, NSST, NSCT, and DCT with Schur decomposition. The watermarks are implanted in the medium frequency band to improve robustness and imperceptibility. They practiced several matrix parameters to test the scheme’s performance.

The security of transmitted medical data is also essential during the transmission through open networks. Various authors proposed different works to resolve this. In [18], the authors utilized 5D-dimensional hyper chaotic with compressive sensing to transmit medical data over the Internet of Things Networks. The authors used a blockchain system for secure medical data transmission by incorporating neural networks in [23]. Nisha Rajeja et al. [25] developed a security system for transmitting Electro Cardio Grams using triple data encryption standard and is optimized with water cycle optimization. In [27], the authors proposed a medical data security system using blockchain technology. For authentication, the system uses an access control mechanism.

3 Background preliminaries

3.1 DWT

The DWT offers multi resolutions of an image representation, which aids in analyzing image data. It decomposes an image into low frequency (approximate) and high frequency (detailed) sub-bands. It has the advantages like high imperceptibility and good robustness against noise and compression attacks [20]. Since it consists of a downsampling block, it has the property of shift variance. The DWT decomposition can be implemented using the Fig. 1. Here f[n] is the input data, and \(f^{\prime }[n]\) is the reconstructed data using DWT.

Fig. 1
figure 1

Decomposition of DWT

3.2 RDWT

RDWT has shift-invariance property due to the lack of down-sampling and up-sampling blocks. Here, the image is also decomposed into approximate and detailed components but the same size as the host image. Hence the embedding capacity is improved [33]. It is also robust against additive noise. The implementation of RDWT is shown in the Fig. 2, where f[n] is the input data, and \(f^{\prime }[n]\) is the reconstructed data using RDWT.

Fig. 2
figure 2

Decomposition of RDWT

3.3 MSVD

SVD will take the place of FIR filters thanks to MSVD. MSVD disintegrates an image like wavelets. While wavelet and advanced wavelet transforms supply local and directional information, MSVD does not. Since it requires less computing than SVD, it is more suited for real-time applications. Compared to wavelets, MSVD’s decomposition is data-set-dependent rather than relying on any basis functions. Like wavelets, signals are individually filtered using low and high pass finite impulse responses. The output is eventually decimated by two to reach the first level of decomposition. The abovementioned process can be repeated to get the subsequent levels. MSVD offers excellent robustness against geometrical attacks [29]. It is comparable to wavelet decomposition in that MSVD can be applied at multiple levels to watermark images, which makes it appropriate for image watermarking.

3.4 Entropy

According to [1], high entropy parts of an image have a higher information density, which leads to higher complexity and uncertainty. Because of the reduced visual sensitivity brought on by the increased complexity, the Just Noticeable Threshold (JND) thresholds also increase. The JND thresholds dictate where and how strongly a watermark signal can be used without lowering the image quality. Hence more prominent energy watermarks can be implanted into the image in high entropy regions less sensitive to Human Visual System, thus improving the imperceptibility of the system.

4 Proposed scheme

This section explains the proposed RDWT-DWT-MSVD-based robust and secure MIW scheme. The three divisions of the completed work are (1) The generation of a carrier image by fusing multimodal images, (2) Incorporating and extracting a medical watermark image into the fused cover image, and (3) Watermark image encryption

4.1 The generation of a carrier image by fusing multimodal images

The proposed scheme used the FF technique to merge multimodal images, resulting in a fused host image with increased information richness, which is particularly valuable for medical diagnostics [36]. Algorithm 1 shows the procedures for creating a host image using the FF technique. Initially, image gradient magnitude is employed to determine image sharpness and contrast. Then, a fast morphological closing operation is applied to the image gradient magnitude to bridge gaps and fill holes. The multimodal image gradient is used to create the weight map and is filtered using a fast structure-preserving filter. A weighed-sum rule is then employed to build the fused image. Figure 3 represents the fused result. Table 1 explains all the notations used in the algorithms.

Algorithm 1
figure a

FF based image fusion.

Fig. 3
figure 3

(a) T1-weighted MR image (b) T2-weighted MR image (c) Fused image

Table 1 The notations with their explanations used in the algorithms

4.2 Incorporating and extracting a medical watermark image into the fused cover image

The suggested strategy applied the RDWT-DWT-MSVD approach for the watermarking. Here we used a thorax-CT image as a watermark, as shown in Fig. 4. Figure 5 depicts the complete embedding steps. The procedure used a one-level RDWT to create high and low-frequency components on C_FUSED. From this, select the element with the highest entropy. DWT is applied to this component, yielding approximation and detailed features. The scheme employed MSVD to the highest entropy DWT component. MSVD is also used for the medical watermark W. The HL sub-band is selected experimentally for watermarking since high-frequency components are less sensitive to the human visual system, which increases the system’s invisibility. The watermark W is put into the C_FUSED using an embedding rule given in step 3 of Algorithm 2. Apply inverse MSVD, DWT, and RDWT to make the watermarked image W_M.

Fig. 4
figure 4

Thorax-CT watermark image

Fig. 5
figure 5

Watermark embedding process with encryption

Algorithm 2
figure b

Watermark embedding with encryption.

For recovering W, apply RDWT to the decrypted watermarked image W_M_DECRYPTED. Find the frequency component with the highest Entropy, and DWT is applied. MSVD is applied to the maximum entropy DWT component to obtain four frequency components. The watermark can be retrieved using the extraction rule given in step 4 of Algorithm 3, and IMSVD is employed to obtain the watermark. The original host image can be retrieved by applying IMSVD, Inverse DWT, and Inverse RDWT. The extraction steps are shown in Fig. 6. Algorithms 2 and 3 explain the complete procedure.

Algorithm 3
figure c

Decryption with watermark retrieval.

Fig. 6
figure 6

Watermark retrieval process with decryption

4.3 Watermark image encryption

To strengthen the security of the watermark images, we used the HFQM [15] encryption technique, which employs a six-dimensional hyper-chaotic system with a Fibonacci Q matrix. Due to its complex, highly dynamic behaviors, and two positive Lyapunov exponents, the 6D hyperchaotic architecture improves encryption performance and elevates security levels. The scrambled image can be generated easily, quickly, and effectively using the Fibonacci Q-matrix. There are two stages to encryption: confusion and diffusion. In each of these procedures, the arrangements and values of the pixels are altered. The 6D hyperchaotic system is the basis of the confusion step. The system’s initial condition is first calculated based on the plain image. The hyperchaotic procedure is then iterated to produce a new vector, after which we choose three sequences (x1, x3, and x5). This vector has been sorted. The arrangement of the numbers in the sorted order is used to confuse the plain image. The diffusion process is carried out to obtain the encrypted image after confusing the plain image. Algorithm 4 explains the encryption technique.

Algorithm 4
figure d

Encryption of watermarked image.

5 Experimental analysis and performance evaluation

We implemented the described technique using an Intel Core i3, 8GB RAM processor, in MATLAB 2022a and carried out the trials with 256x256 MRI, CT scans [16] , and a 128x128 thorax-CT watermark medical image [22]. Finding performance parameter matrices such as PSNR and SSIM [3] were used to assess the method’s imperceptibility, given by (1) and (4) respectively. PSNR measures the visual similarity between the original and marked images and should have a high value, preferably greater than 30 dB. The structural similarity between the cover image (i) and the marked image (w) is quantified using SSIM, and the optimum value is 1. The NC [3] was used to analyze the scheme’s susceptibility to attacks, and its optimal value is 1, given by (3).

$$ PSNR =10 \log\frac{255^{2}}{MSE} \\ $$
(1)

where MSE is the Mean Square Error and is given by

$$ MSE=\frac{1}{M\times N}\sum\limits_{i=1}^{M}\sum\limits_{j=1}^{N}(f_{w}(i,j)-f(i,j))^{2} $$
(2)
$$ NC=\frac{{\sum}_{i=1}^{M1}{\sum}_{j=1}^{N1}I_{w}(i,j)I(i,j)}{\sqrt { {\sum}_{i=1}^{M1}{\sum}_{j=1}^{N1}\mid(I(i,j)\mid^{2}\mid(I_{w}(i,j)\mid^{2}}} $$
(3)

here fw(i,j),f(i,j),Iw(i,j),I(i,j) are the watermarked image, original cover image, extracted mark, and original mark respectively.

$$ SSIM(i,w)=\frac{(2\mu_{i}\mu_{w}+c_{1})(2\sigma_{iw}+c_{2})}{({\mu_{i}^{2}}+{\mu_{w}^{2}}+c_{1})({\sigma_{i}^{2}}+{\sigma_{w}^{2}}+c_{2})} $$
(4)

μi,μw,σi,σw are the mean and variance values of the cover image and the watermarked image respectively. σiw represents the cross covariance between host image and watermarked image, c1,c2 are the constants with small values.

The encryption scheme’s performance was tested by determining characteristics such as the Number of Changing Pixel Rate (NPCR), Unified Averaged Changed Intensity (UACI) [3], and Entropy (randomness) [31] given by (5), (7), and (8) respectively.

$$ NPCR=\frac{1}{M\times N}\underset{i,j}{\sum}C(i,j) $$
(5)
$$ C(i,j)=\begin{cases} 0, & \text{if} C(i,j)=C^{\prime}(i,j)\\ 1, & \text{if} C(i,j)\neq C^{\prime}(i,j) \end{cases} $$
(6)
$$ UACI=\frac{1}{M\times N}\underset{i,j}{\sum}\frac{\mid C(i,j)-C^{\prime}(i,j)\mid}{255} $$
(7)
$$ E=-\sum\limits_{k=1}^{255}(P(I_{k}) \times log_{2}P(I_{k})) $$
(8)

where P(Ik) is the probability of pixel Ik

5.1 Imperceptibility and robustness analysis

Figure 7 shows the difference in the histogram distribution of the original host image and the watermarked image using the devised scheme. The graphs overlapped, indicating that the cover and watermarked images were visually similar. Thus the suggested plan has excellent imperceptibility.

Fig. 7
figure 7

Difference in histogram distribution of original host image and watermarked image

Table 2 shows the performance of the described system at various gain factors. The maximum PSNR, SSIM, and NC are 90.31 dB, 1, and 1, respectively. The optimum value of the gain factor is 0.3, at which the suggested technique has high importance in terms of all the above parameters. Figure 8 illustrates the variation of PSNR with the gain factor; its values fall as the gain factor rises. As the gain factor grows, the value of NC increases, eventually reaching an optimal value of 1, as shown in Fig. 9.

Table 2 Performance of the proposed scheme at various gain factors
Fig. 8
figure 8

Variation of PSNR (dB) with Gain factor

Fig. 9
figure 9

Variation of NC with Gain factor

Table 3 illustrates the performance of the developed approach with various sets of images at a gain factor of 0.1. We obtained average PSNR, SSIM, and NC values of 52.71 dB, 0.9912, 0and 0.9966 for different clinical scans. The method also obtained the maximum SSIM value of 0.9987 between the original carrier image and the extracted cover image, indicating less loss during the process, which is essential for MIW. The values show that the suggested scheme performs exceptionally well in imperceptibility, robustness, and confidentiality.

Table 3 Performance evaluation of the proposed technique

Tables 4 and 5 show the technique’s robustness against several image processing assaults. Using the developed hybrid scheme, it can withstand the common watermarking attacks like noise addition, compression, geometrical watermarks, etc. The method’s NC value is 1 for practically all attacks and close to 1 for the others, which indicates that the developed hybrid technique is exceptionally resistant to various watermarking attacks.

Table 4 Robustness evaluation of the proposed scheme
Table 5 Performance of the proposed scheme against various image processing attacks

5.2 Encryption analysis

The difference in histogram distribution between the encrypted and decrypted watermarked images is depicted in Fig. 10; they are uncorrelated, which indicates that the proposed technique has a high level of security. Further, the performance of the encryption algorithm is evaluated using the parameters NPCR, UACI, Entropy, Diagonal, Vertical, and Horizontal correlation coefficients [15] as shown in Table 6. The average NPCR and UACI values are 0.985 and 0.3549, respectively, close to ideal (0.996034 and 0.3346, respectively), indicating the excellent robustness of the encryption algorithm. The average Entropy between the plain and encrypted images is 7.7007 (the perfect value is 8), showing the encryption scheme’s unpredictability. The average values of the Diagonal, Vertical and Horizontal correlation coefficients are 0.0033, 0.0034, and 0.0825, close to the ideal value (zero), reducing the correlation in the ciphered image. Thus the suggested encryption scheme enhances the security of the system.

Fig. 10
figure 10

Difference in histogram distribution of encrypted and decrypted watermarked image

Table 6 Performance of the encryption scheme

5.3 Comparison analysis

Table 7 shows the comparison result of the proposed scheme’s performance to that of [5, 7, 19]. Figures 1112, and 13 depict the results. Compared to state-of-the-art approaches, the proposed scheme outperforms them in every way. Table 8 evaluates the embedding and extraction times of the developed technique to the existing methods. The image fusion takes an average of 0.8251 seconds, including 0.3958 seconds for embedding, 0.4366 seconds for encryption, 0.3181 seconds for decryption, and 0.4721 seconds for extraction, which are very low compared to existing procedures. Thus the established technology can be successfully used in e-health care applications utilizing cloud computing techniques.

Table 7 Comparison of the proposed scheme with existing techniques
Fig. 11
figure 11

Robustness comparison of proposed scheme with Ref [7]:(a)salt & pepper(0.0001) (b)salt & pepper(0.0005) (c)salt & pepper(0.001) (d)salt & pepper(0.01) (e)Gaussian noise(0.0005) (f)Gaussian noise(0.005) (g)Gaussian noise(0.05) (h)Rotation(1) (i)Jpeg compression(Q = 10) (j)Jpeg compression(Q = 50) (k)Jpeg compression(Q = 90) (l)Gaussian lowpass filter(0.4) (m)Gaussian lowpass filter(0.6) (n)cropping[20 20 400 480] (o)Median filter[1 1] (p)Median filter[2 2] (q)sharpening mask(0.01) (r)sharpening mask(0.1) (s)Histogram equalization (t)Image scaling(2) (u)speckle noise(0.001) (v)speckle noise(0.005)

Fig. 12
figure 12

Robustness comparison of proposed scheme with Ref [19]:(a)salt & pepper(0.0001) (b)salt & pepper(0.0002) (c)salt & pepper(0.001) (d)Gaussian noise(0.0002) (e)Gaussian noise(0.001) (f)Rotation(2) (g)Jpeg compression(Q = 10) (h)Jpeg compression(Q = 50) (i)Jpeg compression(Q = 70) (j)Jpeg compression(Q = 80) (k)Jpeg compression(Q = 90) (l)speckle noise(0.0001) (m)Median filter[2 2] (n)Median filter[3 3] (o)sharpening mask (p)Histogram equalization (q)Image scaling

Fig. 13
figure 13

Robustness comparison of proposed scheme with Ref [5]:(a)salt & pepper(0.0001) (b)salt & pepper(0.1) (c)salt & pepper(0.001) (d)salt & pepper(0.01) (e)Gaussian noise(0.0001) (f)Gaussian noise(0.001) (g)Gaussian noise(0.01) (h)Gaussian noise(0.1) (i)Rotation(1) (j)Rotation(45) (k)Rotation(90) (l)Jpeg compression(Q = 10) (m)Jpeg compression(Q = 90) (n)Gaussian lowpass filter(0.4) (o)Gaussian lowpass filter(0.6) (p)cropping[20 20 400 480] (q)Median filter[3 3] (r)Median filter[2 2] (s)sharpening mask(0.01) (t)sharpening mask(0.1) (u)Histogram equalization (v)Image scaling(2) (w)Image scaling(0.5) (x)speckle noise(0.001) (y)speckle noise(0.05) (z)speckle noise(0.5)

Table 8 Comparison of the proposed technique with existing techniques in terms of average embedding time and extraction time (in seconds)

6 Conclusion

This hybrid MIW approach is based on image fusion. It leverages the FF algorithm for multimodal image fusion and results in a fused image with increased medical information, which serves as the host image. The proposed technique utilized RDWT-DWT-MSVD methodology for the watermark insertion and retrieval procedure, producing excellent results in imperceptibility and robustness for the system. The HFQM encryption algorithm added much more protection. The comparison results with other strategies indicate that the suggested technique is superior to the state of art techniques. As a result, the presented process can successfully implement MIW for e-healthcare applications employing cloud computing techniques. This method’s reach can include multiple color MIW approaches with increased information capacity.