1 Introduction

As a technique for privacy protection, reversible data hiding (RDH) can embed secret messages into an image while the image is almost unchanged. In addition, this technique can reversibly recover the original image after performing data extraction on the receiver side. RDH is becoming increasingly more significant in the field of privacy security, especially in the medical and military fields where high image quality is required. People hope to embed more information into an image while ensuring the quality of the marked image. Embedding capacity and peak signal-to-noise ratio (PSNR) of the marked image are important criteria to evaluate the performance of schemes. The higher the PSNR is, the smaller the difference between the marked image and the original image. In the past two decades, a large number of RDH schemes have emerged. Examples include lossless compression [1] difference expansion [2], and histogram shifting [3].

1.1 Reversible data hiding

In the earlier stage of the research, messages were usually embedded in the plaintext domain. Fridrich et al. [1] suggested a lossless compression method to vacate room for additional information. The scheme in [2] expanded the pixel differences to provide space for secret message. Ni et al. [3] embedded secret message by shifting peak point to zero point. The scheme in [4] introduced a difference expansion (DE) mechanism using a pixel predictor for reversible data embedding.

1.2 Joint reversible data hiding in encrypted images

As cloud computing has developed, the combination of encryption and RDH has received much attention. To protect privacy, an image owner can encrypt multimedia files before their transmission. For better management, an administrator can embed auxiliary data, such as tags and provenance information, into encrypted images. Reversible data hiding in encrypted images (RDH-EI) is effective in a scenario where high image quality is required. There are considerable works on RDH-EI. Zhang [5] split an encrypted image and then partitioned each of the blocks into two parts, S0 and S1. For each block, the scheme flipped three LSBs of all pixels belonging to S0 to embed slightly with a value of 0 and vice versa. Considering the correlations in natural images, the entropy of the block that was decrypted correctly was generally lower than that of a block that was decrypted incorrectly. In [6], Hong et al. improved Zhang’s scheme. A better estimation method of block smoothness was presented. Moreover, decryption was performed from the block with the largest difference in its smoothness. In addition, the boundary pixels of the recovered blocks were considered by the side match strategy. The scheme [7] reduced the number of pixels with flipped LSBs. Furthermore, Hong et al. introduced a flipping ratio in [8]. In the above schemes, image recovery is tied to data extraction, and so the solution is non-separable.

1.3 Separable reversible data hiding in encrypted images

In contrast, Zhang [9] introduced a separable scheme. In [10], Wu et al. introduced a joint scheme and a separable scheme via the prediction error. In [11], a separable scheme based on pixel value ordering and additive homomorphism was presented. Qin [12] investigated a separable scheme via an adaptive embedding strategy with block selection. A separable scheme with a higher embedding rate based on an adaptive encoding strategy was introduced [13]. In [14], a separable scheme with a better distortion rate and redundancy transfer was proposed. Due to the focus on achieving a higher embedding capacity in an encrypted image, high-capacity RDH-EI schemes have been proposed [15, 16]. RDH-EI schemes with high embedding capacity based on MSB prediction were introduced in [17, 18].

However, mostly conventional schemes are designed for bitmap or JPEG images. Medical DICOM (digital imaging and communications in medicine) images usually have large areas with the same pixel values, and the recovery accuracy is low if using above schemes directly. To utilize the characteristics of DICOM images and ensure the recovery accuracy, in this work, we propose a novel reversible data hiding scheme for encrypted DICOM images. The main contributions of our scheme can be described as follows: (1) The order of data extraction and image recovery is calculated on the sender side, and inspired by the side match mechanism, the order of extraction and recovery is further optimized during the recovery process on the receiver side, and the to-be-recovered block that has greater number of neighbouring, recovered blocks results in higher recovery priority; (2) A DICOM image is segmented into the ROI (region of interest) and the RONI (region of non-interest), and only the minimum bounding rectangle of ROI is embedded with additional data after encryption, which can guarantee the recovery accuracy effectively; (3) To ensure image integrity, the hash value of the minimum bounding rectangle of ROI and the feature bit matrix of the rest region are calculated, respectively; (4) The redundancy in pixel cells of DICOM image is exploited to hide auxiliary data without destroying the image format.

The remainder of this paper is arranged as follows. Section 2 introduces the proposed scheme in detail. Experimental results and analyses are given in Section 3. Conclusions are drawn in Section 4.

2 Proposed scheme

The proposed scheme consists of five stages: pre-processing, image encryption, data embedding, data extraction and image recovery, and tampering detection, respectively, see Fig. 1. In the first stage, the auxiliary data, including order of extraction and recovery, hash value, and feature bit matrix, are calculated to replace the redundancy of pixel cells in the DICOM image. At the stage of image encryption, an encrypted DICOM image is generated by the encryption key. In the third stage, with the data hiding key, the data hider embeds the encrypted personal information into the encrypted DICOM image. After decryption on the receiver side, the marked DICOM image can be obtained, and the embedded data are then extracted while the original image can be recovered. At last, the receiver recalculates the hash value and feature bit matrix. If the calculated results are consistent with the extracted results, it means that the image has not been tampered. Otherwise, the image is judged as tampered and the area where the feature values are different can be located. The main parameters used in the experiments are listed in Table 1.

Fig. 1
figure 1

Flowchart of the proposed scheme

Table 1 Parameters in the proposed scheme

2.1 Pre-processing

In this step, the original image is first segmented into the minimum bounding rectangle of ROI (i.e., R1) and the rest (i.e., R2). The minimum bounding rectangle is an expression of the maximum extents of a 2-dimensional object. As shown in Fig. 2, the minimum bounding rectangle of ROI is outlined in blue. Then the auxiliary data are calculated and embedded into the redundancy of pixel cells in the DICOM file. A DICOM file consists of a header and a data set [19]. As shown in Fig. 3, the basic unit of the data set is a data element. The personal information (patient name, admitting diagnosis description, additional patient history, etc.), pixel data, and the image parameters (bits stored, high bit, bits allocated, etc.) are stored in the data elements. The data element can be recognized by its tag. For example, (0010, 0010) is the tag of data element named patient name, and (7FE0, 0010) is the tag of data element named pixel data. In addition, pixel data are composed of pixel cells. It is worth mentioning that the space of a pixel cell is not always fully utilized. How the pixel value is stored in the pixel sample is illustrated in Fig. 4. For example, the number of allocated bits in CT images is generally 16 while only 12 bits in G1 are used for pixel sampling and the remaining 4 bits in G2 are redundant. To obtain the bits in G1, the bits allocated, the high bit, and the bits stored in data elements must be recognized first. Then, the pixel matrix that consists of G1 can be obtained.

Fig. 2
figure 2

The minimum bounding rectangle of ROI

Fig. 3
figure 3

The structure of the medical DICOM image file

Fig. 4
figure 4

The structure of a pixel cell

There are regions with the same pixel values in medical images, which may cause the recovery based on image correlation has a high error rate. Therefore, in our scheme, image segmentation is applied to images to avoid this weakness. In this process, Otsu’s method is adopted and an image is segmented into the ROI and RONI. Next, calculate the minimum bounding rectangle of ROI and record the top left and bottom right vertices. Replace the bits in G2 of the last 10 pixel cells with the bits of the vertices. Then, divide the minimum bounding rectangle of ROI (i.e., R1) into several non-overlapping blocks sized s × s. Denote the block located at (i, j) as Hi, j. The smoothness index σ of the block is calculated by Eqs. (1), (2):

$$\overline{X} = \frac{{\sum\limits_{u = 1}^{s} {\sum\limits_{v = 1}^{s} {p_{u,v} } } }}{s \times s},$$
(1)
$$\sigma = \frac{{\sum\limits_{u = 1}^{s} {\sum\limits_{v = 1}^{s} {\left( {p_{u,v} - \overline{X}} \right)^{2} } } }}{s \times s}.$$
(2)

where pu,v indicates the pixel at the coordinate (u, v) in the block. According to the observation, the recovery accuracy of a smooth block is higher than that of a complex block. The larger the index σ is, the more complex the block is. The blocks are sorted according to their smoothness indices σ in the ascending order. Denote the order sequence of sorted block order as L, where L is composed of coordinates of all blocks.

To detect whether and where the image has been tampered, the hash value of region R1 and the feature bit matrix of region R2 are calculated by different methods. For region R2, we divide the area into several non-overlapping blocks sized 4 × 4. Denote the blocks as \(T_{1}^{1,1} ,T_{1}^{1,2} , \ldots ,T_{1}^{{i^{\prime},j^{\prime}}} , \ldots ,\) where (i′, j′) represents the block location. A two-level lifting wavelet transform is applied on each block \(T_{1}^{{i^{\prime},j^{\prime}}}\) and a low-frequency approximation sub-band Ci′, j′ sized 4 × 4 can be obtained by Eq. (3). A new image that is one-sixteenth the size of the original rectangle is generated by combining the sub-bands. Furthermore, generate a feature bit matrix τ1 from the 5th bit plane of the new image using Eq. (4).

$$C_{{i^{\prime},j^{\prime}}} = {\text{lwt}}2\left( {T_{1}^{{i^{\prime},j^{\prime}}} } \right), \;\;\;T_{1}^{{i^{\prime},j^{\prime}}} \in R_{2} ,$$
(3)
$$\tau_{1}^{{i^{\prime},j^{\prime}}} = \left\lfloor {\frac{{C_{{i^{\prime},j^{\prime}}} }}{{2^{5} }}} \right\rfloor \bmod 2.$$
(4)

For region R1, to consider higher importance, we use the cryptographic Hash function, MD5, to calculate the hash value \(\tau_{2}^{{i^{\prime\prime},j^{\prime\prime}}}\) of each pixel \(T_{2}^{{i^{\prime},j^{\prime\prime}}}\) in region R1 to achieve better performance of tampering detection, where (i″, j″) indicates the pixel location. The hash value \(\tau_{2}^{{i^{\prime\prime},j^{\prime\prime}}}\) is calculated using Eq. (5).

$$\tau_{2}^{{i^{\prime\prime},j^{\prime\prime}}} = {\text{MD}}5(T_{2}^{{i^{\prime\prime},j^{\prime\prime}}} ), \;\;\;T_{2}^{{i^{\prime\prime},j^{\prime\prime}}} \in R_{1} .$$
(5)

Finally, replace the bits in G2 with the order sequence L, the feature bit matrix τ1, and the hash value τ2 to finish the pre-processing stage. A summary of the pre-processing stage is listed in Algorithm 1.

figure a

2.2 Image encryption

For a DICOM image, denote the bits in a pixel cell Pu, v containing G1 and G2 as bu,v,0, bu,v,1, …, bu,v,15. Calculate the exclusive-or (XOR) results of the bits in the pixel cells and pseudo-random bit ru,v,k.

$$B_{u,v,k} = b_{u,v,k} \oplus r_{u,v,k} .$$
(6)

Encrypt the value field of the personal information data elements in the same way. Actually, in addition to stream cipher methods, block cipher methods, such as DES and AES, can also be utilized.

2.3 Data embedding

To perform data embedding, the encrypted personal information, the encrypted pixel data, bits stored, high bit, and bits allocated data elements should be recognized first. Then, classify all pixel cells in the pixel data into G1 and G2. The encrypted personal information and the auxiliary information that can be embedded into the encrypted pixel matrix consist of G1. Next, read the vertices from the last 10 pixel cells, and R1 can be obtained. Then, segment region R1 into several non-overlapping blocks sized s × s. Each of these blocks is pseudo-randomly partitioned into S0 and S1 by the data-hiding key. Finally, flip the M LSBs of each encrypted pixel belonging to S0 or S1 to embed 0 or 1 correspondingly, see Eqs. (7), (8).

$$B^{\prime}_{u,v,k} = \overline{{B_{u,v,k} }} ,\;\;\;\;\left( {u,\;v} \right) \in S_{0} \,\,{\text{and}}\,k = 0,\;1,\; \ldots ,\;M,$$
(7)
$$B^{\prime}_{u,v,k} = \overline{{B_{u,v,k} }} ,\;\;\;\;\left( {u,\;v} \right) \in S_{1} \,\,{\text{and}}\,k = 0,\;1,\; \ldots ,\;M.$$
(8)

2.4 Data extraction and image recovery

To decrypt and recover a marked encrypted DICOM image, the receiver has to recognize the pixel data, bits stored, high bit, and bits allocated data elements first. Then, divide the pixel cells into G1 and G2 after decryption. The order sequence L, feature bit matrix τ1, and hash value τ2 are extracted from G2. Next, read the vertices from the last 10 pixel cells and the region R1 is obtained. Then, divide the decrypted region R1 that consists of G1 into several equal blocks sized s × s, i.e., H1,2, H1,2, …, Hi, j, where the block located at (i, j) is denoted as Hi, j. Using the data-hiding key, each block is split into S0 and S1. Next, flip the LSBs in set S0 and S1 to produce \(H_{0}^{i,j}\) and \(H_{1}^{i,j}\), respectively. Finally, evaluate the fluctuation of \(H_{0}^{i,j}\) and \(H_{1}^{i,j}\) with Eq. (9):

$$f = \sum\limits_{u = 1}^{s} {\sum\limits_{v = 1}^{s - 1} {\left| {p_{u,v} - p_{u,v + 1} } \right| + } } \sum\limits_{u = 1}^{s - 1} {\sum\limits_{v = 1}^{s} {\left| {p_{u,v} - p_{u + 1,v} } \right|} } .$$
(9)

Denote the evaluated fluctuation results for \(H_{0}^{i,j}\) and \(H_{1}^{i,j}\) as \(f_{0}^{i,j}\) and \(f_{1}^{i,j}\), respectively. Because the natural images have spatial correlation, original block usually has smaller fluctuations. Hence, if \(f_{0}^{i,j} < f_{1}^{i,j}\), let \(H_{0}^{i,j}\) be the original block and the extracted bit is 0; otherwise, let \(H_{1}^{i,j}\) be the original block and the extracted bit is 1. As mentioned in the pre-processing, the lower the image complexity is, the higher the accuracy of the recovery is. Therefore, the blocks are recovered in the order based on the extracted order sequence L. In addition, the order sequence L can be further optimized during the extraction and recovery process. For example, Hong et al. introduced a side match mechanism to further increase recovery accuracy [6]. For each recovered block, the boundary pixels are concatenated to the blocks not recovered around it. Because of the high correlation, the recovery accuracy of the concatenated blocks can be higher.

Inspired by the side match mechanism, our scheme further optimizes the order sequence L by dividing the unrecovered blocks into five categories: 0–4. These categories are determined by the number of recovered blocks around them. For a block to be recovered, the more recovered blocks there are, the more pixels concatenated to the unrecovered block are. Build a table D to record the number of recovered blocks around each block. At the beginning of recovery, all the numbers in D are 0. As the recovery proceeds with the order sequence L, the number in D is also updated. Segment the order sequence L into several small fragments sized O, and for each small fragment, the blocks in it have similar smoothness while the blocks in L are sorted by the smoothness. Reorder the fragment in descending order according to the numbers in D. Then, follow the steps above for the blocks in the next fragment until the blocks in all fragments are recovered.

2.5 Tampering detection

After the extraction of the feature bit matrix τ1, and hash value τ2 from the redundancy part G2 of pixel data, partition the image into two regions R1 and R2 using the vertices from the last 10 pixel cells. Next, recalculate the feature bit matrix of the recovered region R2 and the hash value of the recovered region R1. Then, compare the recalculated hash value and feature bit matrix with the extracted hash value and feature bit matrix. The image can be judged as intact if the values are exactly the same. Otherwise, the image area where the values are different can be detected as tampered. Note that, the tampering localization for R1 is more accurate than that for R2, since the scheme calculates the hash value for each pixel in R1 and the feature bit matrix for blocks sized 4 × 4 in R2.

3 Experimental results and analyses

To demonstrate the performance of the proposed scheme, we conducted experiments on a large number of medical DICOM images [20]. Four computed tomography (CT) DICOM images are shown in Fig. 5a–d and the pixel value range is between 0 and 4095, i.e., the bit depth is 12.

Fig. 5
figure 5

Four test DICOM images

3.1 Result of our scheme

The test was conducted using the parameters of s = 16, M = 5, and O = 128. Figure 6a is a binary image for Fig. 5a generated by Otsu’s method, which labels ROI and RONI. It can be seen from the figure that Otsu’s method is suitable for medical images. Figure 6b is the minimum bounding rectangle of the ROI in Fig. 5a. Figure 6c is the encrypted image for Fig. 5a. After the data are embedded into Fig. 5c, the marked, encrypted image, Fig. 6d, is generated. Figure 6e is the directly-decrypted image. After data extraction and image recovery, the recovered image can be generated reversibly, see Fig. 6f.

Fig. 6
figure 6

An example of our scheme. a Binary Image labelling ROI and RONI, b minimum bounding rectangle, c encrypted image, d marked, encrypted image, e decrypted image, f recovered image

3.2 Security analysis

To verify the security of the proposed scheme, we also conducted experiments on the original image in Fig. 5a and its encrypted version in Fig. 6c. Figure 7a shows the histogram of the original image, and the pixels are mostly on the left. Figure 7b shows the corresponding encrypted image, and the pixels are uniformly distributed. Therefore, the proposed scheme is secure regarding its statistical characteristics.

Fig. 7
figure 7

a Histogram of the original DICOM image in Fig. 5a. b Histogram of and the encrypted DICOM image in Fig. 6c

Furthermore, the pixel correlation is listed in Table 2. The correlation values of the original image are close to 1 while those of the encrypted image are close to 0. In addition, Table 2 shows the information entropy. The system with greater information entropy is more random. The Order-1 entropies µ are calculated with Eq. (10):

$$\mu = - \sum\limits_{i = 0}^{4095} {p_{i} } \log_{2} p_{i} ,$$
(10)
Table 2 Order-1 entropy and pixel correlation

where pi represents the proportion of pixels with the gray value i in the image.

For a more intuitive display of results, Fig. 8a–f illustrate the correlation distributions. Obviously, the pixel correlation in the original image is stronger while the encrypted image has a weaker pixel correlation.

Fig. 8
figure 8

Pixel correlations of original DICOM image in Fig. 5a and the corresponding encrypted image in Fig. 6c. a Horizontal direction of the original image, b vertical direction of the original image, c diagonal direction of the original image, d horizontal direction of the encrypted image, e vertical direction of the encrypted image, and f diagonal direction of the encrypted image

3.3 Recovery performance

To demonstrate the superiority of the proposed scheme on the recovery accuracy, we compare the recovery accuracy of the DICOM image recovered by the proposed scheme with that of the BMP image converted from DICOM format by Hong et al. scheme [6], under s = 8 in Fig. 9a, b and s = 16 in Fig. 9c, d, respectively. It is noteworthy that the recovery accuracy is low at the edge of the image recovered by Hong et al. scheme [6]. Because the pixel values of image four corners are exactly the same and \(f_{0}^{i,j}\) and \(f_{1}^{i,j}\) are consequently exactly the same, it is hard to recover these areas. In the proposed scheme, these areas are excluded and only the minimum bounding rectangle of ROI is embedded with data. As a result, the recovery accuracy of our scheme is improved significantly. Figure 10a–d show the experimental results on Fig. 5a–d with different block side lengths s, and the results imply that the proposed scheme performs better than [6] with respect to the recovery accuracy. It should be noted that, the recovery accuracy is calculated upon the size of the minimum bounding rectangle of ROI because the rest of the image is not embedded.

Fig. 9
figure 9

Comparisons of recovery performance. a Recovered BMP image by Hong et al. scheme [6] under s = 8, b recovered DICOM image by the proposed scheme under s = 8, c recovered BMP image by Hong et al. scheme [6] under s = 16, and d recovered DICOM image by the proposed scheme under s = 16

Fig. 10
figure 10

Comparisons of the extracted-bits error rate under M = 5. a Extracted-bits error rate for Fig. 5a. b Extracted-bits error rate for Fig. 5b. c Extracted-bits error rate for Fig. 5c. d Extracted-bits error rate for Fig. 5d

In addition, experiments were conducted for 500 DICOM images [20] under different parameters s and M for performance analysis. Table 3 shows the results of using different values of s and M and that the average extracted-bits error rate of the proposed scheme is lower than that of [6].

Table 3 Average extracted-bits error rate under different parameters

For a more intuitive representation, we show the recovery accuracy of each image in the image database [20] under the parameters of s = 8, M = 3; s = 8, M = 5; s = 20, M = 3; s = 20, M = 5, respectively. The results in Fig. 11 show that the extracted-bits error rate of our scheme is much lower than that of Hong et al. scheme [6]. Since the image database [20] consists of continuous CT images, the features of image content are also different. In the image database [20], the pixel values of R1 in images 1 ~ 280 are small, and flipping 3 LSBs can effectively affect the image correlation. On the contrary, the pixel values of R1 in images 281 ~ 500 are large and flipping 3 LSBs can hardly affect the image correlation. Hence, the recovery effect when M = 3 is better for the images 1 ~ 280 when M = 5 is better for the latter. As s increases, the extracted-bits error rate of both schemes decreases obviously. When s = 20 and M = 5, the extracted-bits error rate of the images with high pixel values can be zero.

Fig. 11
figure 11

Extracted-bits error rate with different M and s (O = 128). a M = 3 and s = 8, b M = 5 and s = 8, c M = 3 and s = 20, and d M = 5 and s = 20

The accuracy of data extraction and image recovery under different values of O are shown in Fig. 12 (s = 16, M = 5). When O is equal to 1, it means that the order sequence of data extraction and image recovery is not optimized. When the value of O is too small, the order sequence fragments are almost unchanged and the recovery accuracy is almost unchanged. When the value of O is too large, a complex block may be recovered earlier than a smooth block, and the recovery accuracy will not increase. Experiments on images of the image database [20] show that, when O is equal to 128, the accuracy of data extraction and image recovery is better.

Fig. 12
figure 12

Average of error extracted-bits for 500 images in [20]

The visual quality of directly-decrypted images was also compared. Since this performance of our scheme is similar to that of Hong et al. scheme [6], we compared the visual quality of directly-decrypted image between our scheme and the scheme [10] in Fig. 13a–d. The scheme [10] adopted BMP images, Lena, Baboon, Airplane, and Lake, as original images, while the proposed scheme adopted the corresponding DICOM versions converted from the BMP images as original images. The results show that the visual quality of directly-decrypted images using the proposed scheme is stable. The PSNR of the proposed scheme is maintained at 37 dB while the scheme [10] is unstable, and the PSNR is below 37 dB in many cases.

Fig. 13
figure 13

Comparisons for visual quality of directly-decrypted images between our scheme and [10]. a Lena, b baboon, c airplane, d lake

3.4 Tampering detection performance

In Fig. 14a, only region R2 was tampered by a text insertion attack. Conversely, region R1 was tampered by a text insertion attack in Fig. 14b. In Fig. 14c, the image was tampered by a content removal attack. Figure 14d shows the result of tampering localization using a two-level lifting wavelet transform for the region R2 in Fig. 14a. Figure 14e shows the result of tampering localization using MD5 Hash function for region R1 in Fig. 14b. Comparing Fig. 14d and e, the tampering localization for region R1 is obviously more accurate than that for region R2, because we calculate the feature bit matrix of each block sized 4 × 4 in region R2, while we calculate the hash value of each pixel in region R1. Figure 14f shows the result of tampering localization for Fig. 14c. The area where contents haven been tampered is correctly located.

Fig. 14
figure 14

Results for tampering detection. a The region R2 tampered by a text insertion attack, b the region R1 tampered by a text insertion attack, c the region R1 tampered by a content removal attack, d tampering localization for (a), e tampering localization for (b), and f tampering localization for (c)

At last, we calculated the execution time of each stage for the proposed scheme, as listed in Table 4. The result shows that, the time spent on the receiver side is similar to that on the content owner side, and the time spent on the data hider sider is much less. Besides, most time spent on the two sides of receiver and content owner is utilized for the calculation of feature values and tampering detection.

Table 4 Execution Time of each stage in the proposed scheme (seconds)

4 Conclusion

This work proposes a novel RDH-EI scheme for medical DICOM images. DICOM images generally have large areas with the same pixel values, leading to low recovery accuracy with conventional RDH-EI schemes. To avoid this defect, the proposed scheme in this paper segmented the DICOM image into the ROI and RONI. Additional data are only embedded in the minimum bounding rectangle of the ROI where the data hiding can also be reversible. To further improve the recovery accuracy on the receiver side, a new order sequence of data extraction and image recovery is calculated on the sender side. In addition, the order sequence can be optimized during the recovery process using the number of blocks around the to-be-recovered block. Based on the side match mechanism, the border pixels that belong to the recovered blocks are concatenated to the unrecovered blocks. Therefore, while the blocks have similar smoothness, the block with more recovered blocks around it has higher recovery accuracy. To ensure the integrity of the image, different tampering detection methods are used for the two types of regions in the image. Considering the importance of the ROI in medical images, the MD5 hash function is applied to the minimum bounding rectangle of ROI to locate the tampered area more accurately, and a two-level lifting wavelet transform is applied to the rest of the image. The redundancy of pixel cells in DICOM images is exploited so that the auxiliary data (the order sequence of extraction and recovery, hash value, and feature bit matrix) can be stored effectively. Experimental results demonstrate the effectiveness of the proposed scheme.