1 Introduction

Nowadays the usage of internet has crept in almost every sphere of day-to-day life. The areas like Electronic Commerce (e-commerce), Electronic Banking (e-banking), Electronic Shopping and Electronic Healthcare (e-healthcare) are achieving new heights with each passing day. Electronic healthcare refers to an internet based system wherein a patient can avail the services of an expert doctor available at other corner of globe. Though electronic healthcare is coming to rescue of millions of people globally, but there are a lot of challenges that need to be addressed, so as to make this technology more effective. With an aim to improve the e-healthcare services a lot of research is being carried out by research community round the globe. Some of the vital areas which are receiving more attention include Automatic Disease Inference (ADI), medical terminology assignment, biomedical image processing and authentication/security of biomedical data during transition [8, 1012, 21]. The chief aim of the undertaken research is to effectively bridge the gap between health care knowledge seekers and knowledge providers [13].

The current online health services are broadly classified into two categories: (a) Portals run by renowned organizations and professional health providers, (b) community based health services. In either case, for proper tele-diagnosis by a remote expert, critical patient information such as patient images/videos and other Electronic Health Record (EHR) need to be shared over networked infrastructure. This critical and sensitive patient information being shared on a network requires excessive care, as one cannot afford loss of this information for a proper diagnosis. Thus, integrity, security and confidentiality of this patient data is of major concern, when transferred electronically [1, 9]. Digital watermarking plays a significant role in such a scenario. Digital watermarking techniques are used to provide confidentiality and integrity in the medical images. Further copy control and tamper detection of digital data which are the main objectives of the Digital Rights Management (DRM) can be achieved by digital watermarking [22, 25]. When embedding the additional Electronic Patients Record (EPR) or the digital watermark within the medical image; the image quality must not be affected [19]. Luckily, information contained in the images is not uniformly distributed across images. Some parts of the images contain more information compared to other ones. Various schemes are used for separating different objects/regions in images [24, 32]. From diagnosis point of view a medical image is divided into two regions; Region of Interest (ROI) and Region of Non Interest (RONI) [4, 30]. The more informative part of the medical image is Region of Interest which is used for the diagnosis and has to be taken care of [7]. Therefore, it is appropriate to embed the watermark in the Region of Non-Interest [14].

The digital watermark can be embedded in the cover medium using spatial domain techniques or the Transform domain techniques [29]. In a spatial domain technique, the data is directly embedded in the pixels by replacing the bits of the pixel by the data bits [15]. The spatial domain embedding is not robust but can be used whenever high payload is required. However, these techniques are easy and simple to implement and are sufficient in an attack - free environment and lossless compression [18]. In a transform domain technique, the coefficients of the cover medium are modified. Transform domain embedding techniques offers high robustness and more security to attacks [16]. Rest of the paper is organized as follows: Section 2 presents related work. Section 3 presents proposed work. Experimental results & discussions are presented in section 4. The paper concludes in section 5.

2 Related work

The advancement in the network infrastructure coupled with exponential rise in the internet users has resulted in tremendous increase in usage of online healthcare services. One of the fundamental challenges in such services is integrity and security of data being shared via unsecure networks. Digital watermarking of medical data like images/videos and EHR, of late, is being used as a potent tool to address these issues. Some of the related work wherein watermarking has been used to solve above mentioned concerns is as follows:

N. Solanki and S. K. Malik [27], have proposed a watermarking technique for medical images. The watermark has been encrypted using RSA algorithm and has been embedded in ROI using DWT algorithm. However, the proposed method needs pre-processing before actual embedding takes place. D. Bouslimi et al., in [2] reported an encryption based watermarking technique for medical images. RC4 stream cipher has been used for encryption purpose. The Least Significant Bit (LSB) embedding technique has been used for embedding the watermark. The high payload is achieved by LSB embedding technique but at the cost of higher vulnerability towards the different image processing operations. S. Das and M. K. Kundu in [5], have proposed a contourlet transform-based digital watermarking technique. After three level contourlet transform the low pass sub-bands are chosen for embedding the data. Even though the payload is less, the perceptual quality reported by authors in terms of PSNR value does not exceed 35 dB for less than 1400 bits of data. A. K. Singh et al., in [26] have proposed a robust non-blind and imperceptible dual watermarking technique for telemedicine application. Using the spatio- frequency localization properties of DWT and visual perception quality of the SVD, the proposed work assures the improvement in the robustness and imperceptibility of the medical images. The payload, however, is very low. One of current research problems of computer vision and image processing community is remote analysis of human behavior from the data collected by wearable cameras [31]. In such a scenario Activity of Daily Living (ADL) is recorded by wearable cameras. The huge data generated in such a way (in terms of Images/Videos) needs to be authenticated and protected for proper behavior analysis and hence diagnosis of any behavioral disorders. One such technique for medical image data has been proposed in [17]. The authors have come up with a blind digital watermarking scheme for DICOM images. The watermarking has been done in wavelet and contourlet domains having payload 2010 bits for the whole image and 1840 bits for Region of Interest (ROI) part of the medical image. The proposed algorithm however, has not been tested for various hybrid image processing attacks.

As on date to best of our knowledge no medical image watermarking technique has been reported in transform domain which is robust to both the singular attacks as well as to hybrid attacks. This paper presents a robust medical image watermarking system which besides being robust to various singular image processing attacks, has been found robust to different hybrid (two or more simultaneous) attacks. In this context, the proposed work presents two medical image watermarking algorithms. In the first algorithm, the Electronic Patient Record (EPR) and the watermark is embedded in the whole image. In the second algorithm, the watermark is embedded in the RONI part of the medical image. The proposed techniques have been implemented in DCT domain. 8 × 8 block wise DCT is computed and DCT coefficients are modified for the embedding purpose.

3 Proposed work

The data embedding process in medical images is generally different from that of the embedding in other standard images. This is due to the fact that medical images contain critical information which is used for an e-diagnostic purpose. As already discussed medical images from diagnosis point of view are divided into two regions; Region of Interest and Region of Non-Interest. Based on the region in which data is embedded, two different watermarking approaches for medical image watermarking have been put forward. Discrete Cosine Transform (DCT) domain has been used for transforming the image into the frequency domain. The embedding has been carried out in the frequency domain. The transformation equations used to convert spatial domain information into frequency domain are using DCT as follows:

$$ F\left(p,q\right)={\alpha}_p{\alpha}_q{\displaystyle {\sum}_{x=0}^{N-1}{\displaystyle {\sum}_{y=0}^{N-1}{A}_{x,y} \cos \frac{\left(2x+1\right)p\pi }{2N} \cos \frac{\left(2y+1\right)q\pi }{2N}}} $$
(1)

Where F (p, q) denotes the image coefficient in transform domain and (Ax, y) denotes the image pixel in spatial domain. If p = q = 0, \( {\alpha}_p={\alpha}_q=\sqrt{\frac{1}{N}} \):

$$ \mathrm{Else}\;{\alpha}_p={\alpha}_q=\sqrt{\frac{2}{N}} $$

The inverse DCT can be represented as follows:

$$ {A}_{x,y}={\displaystyle {\sum}_{p=0}^{N-1}{\displaystyle {\sum}_{q=0}^{N-1}{\alpha}_p{\alpha}_qF\left(p,q\right) \cos \frac{\left(2x+1\right)p\pi }{2N} \cos \frac{\left(2y+1\right)q\pi }{2N}}} $$
(2)

DCT on an image is generally carried out in two ways; global DCT and block based DCT. Block based DCT has been used in the proposed algorithms. 8 × 8 DCT blocks have been chosen due to various advantages associated with this block size [3, 6]. A typical 8 × 8 DCT block is shown in Fig. 1. In both the proposed algorithms any two mid frequency coefficients (in a given 8 × 8 block) are selected and compared. The relative adjustment in the selected coefficient magnitudes is done using a watermarking embedding factor ‘K’.

Fig. 1
figure 1

8 × 8 DCT block showing 64 Co-efficient

For the said work the highlighted coefficients C4, 3 and C5, 4 have been used. The relative difference of the selected coefficients Ci, j [1 ≤ (i, j) ≤ 8] are adjusted depending upon the nature of watermark bit to be embedded. The adjustment is carried out as follows:

For embedding a watermark bit 0;

Coefficients are adjusted in such a way that the process culminates at | C4, 3 | > | C5, 4 |. This is ensured by following steps:

$$ \begin{array}{l} If\left({C}_{4,3}\right)\le \left({C}_{5,4}\right)\hfill \\ {}\begin{array}{cc}\hfill \hfill & \hfill Swap\left({C}_{4,3},{C}_{5,4}\right)\hfill \end{array}\hfill \\ {}\begin{array}{cc}\hfill \hfill & \hfill If\hfill \end{array}\left|{C}_{4,3}-{C}_{5,4}\right|>K\hfill \\ {}\begin{array}{cc}\hfill \hfill & \hfill No\; Change\hfill \end{array}\hfill \\ {}\begin{array}{ccc}\hfill \hfill & \hfill \hfill & \hfill Else\kern0.24em if\left|{C}_{4,3}-{C}_{5,4}\right|<K\hfill \end{array}\hfill \\ {}\begin{array}{cccc}\hfill \hfill & \hfill \hfill & \hfill \hfill & \hfill Then\left[\left({C}_{4,3}\right)=\left({C}_{4,3}\right)+K/2\right] and\left[\left({C}_{5,4}\right)=\left({C}_{5,4}\right)-K/2\right]\hfill \end{array}\hfill \end{array} $$

For embedding a watermark bit 1;

Coefficients are adjusted in such a way that the process culminates at | C4, 3 | < | C5, 4 |. This is ensured by following steps.

$$ \begin{array}{l} If\left({C}_{4,3}\right)>\left({C}_{5,4}\right)\hfill \\ {}\begin{array}{cc}\hfill \hfill & \hfill Swap\left({C}_{4,3},{C}_{5,4}\right)\hfill \end{array}\hfill \\ {}\begin{array}{cc}\hfill \hfill & \hfill If\hfill \end{array}\left|{C}_{4,3}-{C}_{5,4}\right|\ge K\hfill \\ {}\begin{array}{cc}\hfill \hfill & \hfill No\; Change\hfill \end{array}\hfill \\ {}\begin{array}{ccc}\hfill \hfill & \hfill \hfill & \hfill Else\kern0.24em if\left|{C}_{4,3}-{C}_{5,4}\right|<K\hfill \end{array}\hfill \\ {}\begin{array}{cccc}\hfill \hfill & \hfill \hfill & \hfill \hfill & \hfill Then\left[\left({C}_{4,3}\right)=\left({C}_{4,3}\right)-K/2\right] and\left[\left({C}_{5,4}\right)=\left({C}_{5,4}\right)+K/2\right]\hfill \end{array}\hfill \end{array} $$

The flowchart of the basic embedding algorithm used for data embedding in the proposed algorithms is shown in Fig. 2.

Fig. 2
figure 2

Flow chart of the embedding algorithm

The complete embedding procedure for two proposed algorithms is in tune with above embedding procedure and is described as under:

3.1 First algorithm

  1. 1)

    Read the cover (medical) image, Electronic Patients Record (EPR) and digital watermark.

  2. 2)

    Convert the EPR and digital watermark in a binary sequence.

  3. 3)

    Compute block wise DCT of 8 × 8 non-overlapping blocks of the cover image

  4. 4)

    Embed the watermark information using an embedding factor (K) by choosing two coefficients C1, C2 from an 8 × 8 DCT block.

  5. 5)

    For embedding bit 0, Coefficient (C1) is adjusted and made relatively greater than Coefficient (C2), i.e., \( \left(C1>C2\right) \).

  6. 6)

    For embedding bit 1, Coefficient (C1) is adjusted and made relatively smaller than Coefficient (C2), i.e., \( \left(C1<C2\right) \).

  7. 7)

    Compute inverse DCT of modified block.

  8. 8)

    Steps 3 to 7 are repeated to embed the whole information

It is pertinent to mention that, in this technique both Electronic Patients Record (EPR) and watermark is embedded in ROI and RONI of medical image. Ten different CT scans of the patient have been chosen as cover medium. 32 × 32 logo and 1024 bits of EPR is embedded using this technique. The embedding factor ‘K’ has been chosen as 10 and 20.

3.2 Second algorithm

  1. 1)

    Read the cover (medical) image.

  2. 2)

    Separate ROI and RONI of cover image.

  3. 3)

    Read the digital watermark.

  4. 4)

    Convert the digital watermark in a binary sequence.

  5. 5)

    Compute block wise DCT of 8 × 8 non-overlapping blocks of the cover image.

  6. 6)

    Embed the watermark information using an embedding factor (K) by choosing two coefficients C1, C2 from an 8 × 8 DCT block.

  7. 7)

    For embedding bit 0, Coefficient (C1) is adjusted and made relatively greater than Coefficient (C2), i.e., \( \left(C1>C2\right) \).

  8. 8)

    For embedding bit 1, Coefficient (C1) is adjusted and made relatively smaller than Coefficient (C2), i.e., \( \left(C1<C2\right) \).

  9. 9)

    Compute inverse DCT of modified block.

  10. 10)

    Repeat steps 5 to 9 to embed the whole information.

In this technique the medical image is divided into Region of Interest (ROI) and Region of Non Interest (RONI). The Region of Non Interest is separated from Region of Interest using Color Thresholder application of MATLAB2014a. The digital watermark of size 47 × 47 (i.e., 2209 bits) is embedded in RONI part of the medical image. The watermarked RONI part of host image is combined with ROI part after the watermark embedding. The robustness analysis is carried out using different values of embedding factor.

3.3 Watermark and EPR extraction

Extraction process is the reverse of the embedding process. The watermarked medical image is subjected to block based DCT at the receiver. The DCT Coefficients modified during embedding processes are compared for the extraction of watermark/EPR. If Coefficient C1 is greater than Coefficient C2 \( \left(C1>C2\right) \), bit ‘0’ is extracted else bit ‘1’ is extracted. The only difference between the two extraction processes is that for second technique the ROI and RONI are separated before the actual extraction process takes place.

4 Experimental results

The experimentation has been carried out using MATLAB R2014a platform for different 512 × 512 CT scan images of the patient. The digital watermarks used for copyright protection are of the size 32 × 32 and 47 × 47 for the two techniques. Further, EPR of 1024 bits is also embedded in the test medical images. The mask for ROI separation in medical images has been created by Color Thresholder application of MATLAB R2014a. The image quality is analyzed from objective analysis by calculating Peak Signal to Noise Ratio (PSNR), Normalized Absolute Error (NAE) and Structural Similarity Measure Index (SSIM) between original image and ‘watermarked & attacked’ image. The PSNR and NAE have been computed as in [20, 23]. The robustness of the proposed scheme is evaluated by calculating Bit Error Rate (BER %) and Normalized Cross-Correlation (NCC) between embedded ‘watermark and EPR’ and extracted ‘watermark and EPR’ for various attacks. Equation (8) is used for calculating BER (%) and Eq. (9) for NCC. The Structural Similarity Index (SSIM) is based on the calculations of three terms, namely the luminance, contrast and structure. The overall index is a given by:

$$ SSIM\left(x,y\right)={\left[l\left(x,y\right)\right]}^{\alpha}\cdot {\left[c\left(x,y\right)\right]}^{\beta}\cdot {\left[s\left(x,y\right)\right]}^{\gamma } $$
(3)

Where;

$$ l\left(x,y\right)=\frac{2{\upmu}_{\mathrm{x}}{\upmu}_{\mathrm{y}}+C1}{\upmu_{\mathrm{x}}^2+{\upmu}_{\mathrm{y}}^2+C1} $$
(4)
$$ c\left(x,y\right)=\frac{2{\sigma}_x{\sigma}_y+C2}{\sigma_x^2+{\sigma}_y^2+C2} $$
(5)
$$ s\left(x,y\right)=\frac{\sigma_{xy}+C3}{\sigma_x{\sigma}_y+C3} $$
(6)

where μx, μy, σx, σy, and σxy are the local means, standard deviations, and cross-covariance for images x, y. For default exponents and default selections of C3 the expression is given by:

$$ SSIM\left(x,y\right)=\frac{\left(2{\upmu}_x{\upmu}_y+C1\right)\left(2{\sigma}_{xy}+C2\right)}{\left({\upmu}_x^2+{\upmu}_y^2+C1\right)\left({\sigma}_x^2+{\sigma}_y^2+C2\right)} $$
(7)
$$ BER=\frac{1}{MN}\left[{\displaystyle {\sum}_{i=1}^M{\displaystyle {\sum}_{j=1}^N{w}_m\left(i,j\right)\oplus {w}_{me}\left(i,j\right)}}\right]\times 100 $$
(8)
$$ NCC=\frac{{\displaystyle {\sum}_{\mathrm{i}=1}^{\mathrm{M}}{\displaystyle {\sum}_{\mathrm{j}=1}^{\mathrm{N}}{w}_m\left(i,j\right)\times {\mathrm{w}}_{me}\left(i,j\right)}}}{{\displaystyle {\sum}_{\mathrm{i}=1}^{\mathrm{M}}{\displaystyle {\sum}_{\mathrm{j}=1}^{\mathrm{N}}{w}_m{\left(i,j\right)}^2}}} $$
(9)

In above equations; M, N are the dimensions of the original logo and extracted logo; wm (i, j) is the (i, j)th pixel of original watermark and wme (i, j) is the (i, j)th pixel of the extracted logo. The perceptual quality and robustness analysis for the two proposed algorithms are presented below.

  1. I)

    Analysis of first algorithm

4.1 Imperceptibility analysis

The objective quality indices viz. PSNR and SSIM obtained for various images are shown in Table 1. The perceptual transparency of the watermarked images obtained in our scheme has been shown in Fig. 3. The average PSNR values (greater than 40 dB) indicate that the proposed system is capable of producing good quality watermarked images. This is substantiated by very small NAE values of 0.0092 and 0.0130 for different values of embedding factor K, as well as the subjective quality of the watermarked images as shown in Fig. 3.

Table 1 Objective quality indices
Fig. 3
figure 3

Original CT scan images and respective watermarked images

A comparison of the image quality of our technique with that of Rahimi and Rabbani [17] on the basis of the SSIM has been shown in Table 2. It is evident from the Table that the average SSIM value of the watermarked images as obtained in our scheme is more than that of [17]. The average SSIM in our scheme is 0.9857 at K = 10 and 0.9627 at K = 20 while as it is 0.94064 in [17].

Table 2 Perceptual transparency comparison

4.2 Robustness analysis

The robustness of the proposed scheme has been evaluated by subjecting watermarked images obtained from the system to various singular and hybrid attacks like, salt and pepper noise, Gaussian noise, JPEG compression, rotation, different filtering processes (Median filtering, Average filtering etc.). The results obtained are presented and discussed below:

4.2.1 Robustness analysis against salt & pepper attack

The watermarked medical images have been attacked by salt & pepper noise of varying noise densities (0.001 to 0.01). The result obtained for various images have been shown in Fig. 4a and b. A comparison of the results with [17] proves that the proposed technique is more robust.

Fig. 4
figure 4

a BER comparison at noise density (\( \boldsymbol{\sigma} \) = 0.003). b BER comparison at noise density (\( \boldsymbol{\sigma} \) = 0.005)

Figure 5 shows the robustness of Image 1 to ‘salt & pepper’ noise at noise densities ranging from 0.001 to 0.01. It is clear from the figure that for all the noise densities our scheme performs better. A visual demonstration of this fact is presented in Fig. 6a and b. The mentioned figures show extracted watermarks for embedding factor values of K = 10 and K = 20 for various noise density values.

Fig. 5
figure 5

BER comparison of Image 1 with [17]

Fig. 6
figure 6

a Extracted watermarks at K = 10 for varying noise densities. b Extracted watermarks at K = 20 for varying noise densities

It is clear from the above figures that the system is more robust to salt and pepper noise for embedding factor value of K = 20.

4.2.2 Robustness analysis against different filtering attacks

Various filtering attacks have been carried out on the watermarked images. The filter kernel used for Median filtering, Average filtering and Wiener filtering is 3 × 3. The description of filtering attacks is as under:

Median filtering

The watermarked images as obtained in the first technique have been subjected to Median filtering [3 × 3]. The NCC and BER of the extracted watermark is 0.9430 and 5.96 % for K = 10 and 0.9857 and 4.98 % for K = 20 respectively. The BER values of the EPR obtained in our algorithm for K = 10 and 20 are 14.68 and 12.52 % respectively. It is pertinent to mention here that for same number of bits, [17] reports BER 20.18 %. Figure 7a shows the extracted watermark.

Fig. 7
figure 7

a Extracted watermark after Median filtering for Image 1. b Extracted watermark after Average filtering for Image 1. c Extracted watermark after Wiener filtering for Image 1

Average filtering

Figure 7b shows the extracted watermark after average filtering attack. The NCC and BER of extracted watermark equals to 0.9354 and 6.54 % for K = 10 and 0.9485 and 5.47 % for K = 20 respectively which is 0.7960 and 27.35 % in case of [17]. The BER of the EPR obtained is 12.43 % when K = 10 and 10.47 % when K = 20 while as that reported in [17] is 34.72 %.

Wiener filtering

Figure 7c shows the extracted watermark after Wiener filtering attack. The NCC and BER of extracted watermark equals to 0.9539 and 4.88 % for K = 10 and 0.9704 and 3.32 % for K = 20 respectively. The BER of the EPR obtained is 10.67 % when K = 10 and 7.44 % when K = 20. For same amount of data [17] reports BER of 32.85 %.

The above discussions reveal that irrespective of the type of filtering attacks (Median Filtering, Average Filtering, and Wiener filtering) carried out on the watermarked images yielded by our method; our scheme outperforms the one reported in [17].

4.2.3 Robustness analysis against JPEG attack

JPEG is usually used for the compression purpose which reduces the storage requirements and lowers the bandwidth required for transmission. Figure 8a and b shows various results of BER and NCC for different values of Quality Factor and embedding factor ‘K’. Table 3 shows various image quality matrices when watermarked image is subjected to JPEG compression of different quality factors. The authors of [17] have not tested their algorithm for JPEG compression; however a comparison of the proposed technique for this attack with [28] has been carried out. A comparison of proposed technique with [28] for average NCC values is shown in Fig. 8c.

Fig. 8
figure 8

a The plot between the BER and Quality Factor. b The plot between the NCC and Quality Factor. c Average NCC verses Quality Factor

Table 3 Robustness parameters against JPEG compression at K = 10 and K = 20

It is clear from Fig. 8a that BER reduces with the increase in Quality Factor. Further the system robustness improves with increasing value of embedding factor K. Figure 8b shows that the value of the NCC decreases with the decrease in Quality Factor.

It is worth to mention that for a given Quality Factor BER decreases as the ‘K’ is increased. Further, the value of NCC improves for higher value of ‘K’, for a given Quality Factor. The comparison of NCC for different quality factors show that our technique performs better for JPEG compression attack.

From the above Table, it is clear that the percentage BER values vary from 0.2 to 12.7 as quality factor is reduced from 90 to 40 for various medical images for extracted watermarks. Generally speaking, BER improves with increase in quality factor and embedding factor ‘K’. Further, NCC values are very close to unity for quality factor of 70 and above, showing that our scheme is capable of withstanding JPEG compression.

4.2.4 Robustness analysis against cropping attack

The watermarked images have been tested for cropping attack. The results obtained after cropping 25 % of the watermarked image from top left corner and center in terms of BER (%) and NCC are shown in Tables 4 and 5 for embedding factor ‘K’ = 10 and ‘K’ = 20 respectively. The cropped watermarked images with extracted watermarks are also shown in Figs. 9 and 10. It is evident from the mentioned tables that average BER decreases as K is increased. Further we are able to extract the watermark from the cropped images successfully indicating that proposed algorithm is robust to cropping.

Table 4 Robustness parameters against cropping K = 10
Table 5 Robustness parameters against cropping K = 20
Fig. 9
figure 9

a Top left corner cropped (b) Extracted watermark (c) 25 % cropping at center of Image 1 (d) Extracted watermark

Fig. 10
figure 10

a Top left corner cropped Image 1 (b) Extracted watermark (c) 25 % cropping at center of Image 1 (d) Extracted watermark

4.2.5 Robustness analysis against rotation attack

The watermarked images obtained, using proposed algorithm have been subjected to rotation attack of various degrees. The results obtained after rotating the watermarked image by various angles for ‘K’ = 10 and ‘K’ = 20 are shown in Tables 6 and 7 respectively. The small BER values obtained show that the system is robust to cropping. This is substantiated by visual quality of extracted watermarks as shown in Figs. 11 and 12. It is pertinent to mention that average BER (K = 10) for 1° rotation is 3.22; for 5° rotation is 3.57 and for 10° rotation is 4.03. The same indices for K = 20 come down to 2.59, 2.83 and 3.30 for 1°, 5° and 10° rotation respectively. This shows that robustness to cropping improves with increasing value of K.

Table 6 Robustness parameters against cropping K = 10
Table 7 Robustness parameters against cropping K = 20
Fig. 11
figure 11

Extracted watermarks from Image 1 at: (a) 1° (b) 5° (c) 10°

Fig. 12
figure 12

Extracted watermarks from Image 1 at: (a) 1° (b) 5° (c) 10°

4.2.6 Robustness analysis against sharpening attack

The results obtained from various watermarked images for sharpening attack have been presented in Table 8.

Table 8 BER (%) and NCC of extracted watermarks for sharpening attack

The results show that for K = 10, BER of extracted watermark is 1.21 and for K = 20, it reduces to 0.82. This shows that the proposed method is highly resilient to sharpening attack. Extracted watermarks, as shown in Fig. 13 substantiate this fact.

Fig. 13
figure 13

a Extracted watermark at ‘K’ = 10 (b) Extracted watermark at ‘K’ = 20

4.2.7 Robustness analysis against histogram equalization

The results obtained in terms of BER and NCC at K = 10 and K = 20 after Histogram Equalization are shown in Table 9. Further the extracted watermarks are shown in Fig. 14.

Table 9 BER (%) and NCC for Histogram Equalization
Fig. 14
figure 14

a Extracted watermark at ‘K’ = 10 (b) Extracted watermark at ‘K’ = 20

The results show that the proposed algorithm performs outstandingly well for the histogram equalization as BER is less than 1 %. Further, the robustness improves with increasing K.

4.2.8 Robustness analysis against gaussian noise

The watermarked images have been subjected to Gaussian noise of variance 0.0001. BER (%) and NCC at K = 10 and K = 20 of the watermarked image after Gaussian Noise attack is shown in Table 10. The extracted watermarks are shown in Fig. 15.

Table 10 BER (%) and NCC for Gaussian Noise (v = 0.0001)
Fig. 15
figure 15

a Extracted watermark at ‘K’ = 10 (b) Extracted watermark at ‘K’ = 20

The above results show that the proposed scheme is robust to Gaussian noise and improving K enhances the robustness. Besides this, the extracted watermark visibility improves for higher values of K as expected. The average BER at K = 10 is 8.00 % and at K = 20 is 0.46 %.

4.2.9 Robustness analysis for hybrid attacks

The watermarked images are subjected to various hybrid attacks, recognizable watermarks are obtained from each case. The detailed analysis for hybrid attacks is presented below:

Salt and pepper noise plus sharpening attack

The watermarked images are distorted with salt and pepper noise with noise density 0.01 and then the attacked images are sharpened. The results of extracted watermarks, in terms of BER and NCC are shown in Table 11. Figure 16a and b depicts the extracted watermarks after testing the watermarked image to the above said hybrid attack for K = 10 and K = 20 respectively. It is evident from the results that robustness of our scheme to the hybrid attack under discussion increases with K.

Table 11 Robustness parameters for K = 10 and K = 20
Fig. 16
figure 16

a Extracted watermarks from five attacked images (K = 10). b Extracted watermarks from five attacked images (K = 20)

Histogram equalization plus sharpening attack

The watermarked images are tested for histogram equalization and then the attacked images are sharpened. Table 12 shows the detailed robustness parameters. Figure 17a and b shows the extracted watermarks after histogram equalization plus sharpening attack for K = 10 and K = 20 respectively. Clearly, our scheme performs well for this hybrid attack. As observed BER values lie between 1.05 and 0.58 % for watermark extraction.

Table 12 Robustness parameters for K = 10 and K = 20
Fig. 17
figure 17

a Extracted watermarks from five attacked images (K = 10). b Extracted watermarks from five attacked images (K = 20)

Salt & Pepper noise plus Median filtering plus Histogram equalization attack

The watermarked images are simultaneously attacked by salt & pepper noise with noise density 0.01, histogram equalization and Median filtering. Various observed parameters for robustness check are shown in Table 13. The extracted watermarks have been shown in Fig. 18a for K = 10 and Fig. 18b for K = 20 respectively. Low values of BER (2 to 4.5 %) have been observed for this three tier attack. Further, the visual quality of the extracted watermarks shows that the scheme robustness improves with increasing K.

Table 13 Robustness parameters for K = 10 and K = 20
Fig. 18
figure 18

a Extracted watermarks from five attacked images (K = 10). b Extracted watermarks from five attacked images (K = 20)

Rotation plus Median filtering plus Sharpening attack

The watermarked images are rotated by 10° and then it is attacked by Median filtering and finally the same attacked image is sharpened. Table 14 shows the different observed parameters for K = 10 and K = 20. The results observed in terms of BER and NCC show that our scheme is capable of withstanding this hybrid attack. The robustness of proposed scheme increases with increasing embedding factor.

Table 14 Robustness parameters for K = 10 and K = 20

The overall results obtained in our proposed scheme are better than that of [17]. The technique shows better robustness when the value of embedding factor is increased. However, the perceptual quality in some cases gets degraded. Throughout the analysis the watermarked images were subjected to different imperceptibility and robustness tests for different values of embedding factor ‘K’. It can be clearly seen from the above detailed results and discussions that as the value of ‘K’ increase the robustness of the system increases. This is due to the fact that with an increase in the ‘K’ values, DCT coefficients are modified by relatively larger values, which in turn increases the difference between the coefficients. The increased difference between the two coefficients provides a wide guard band between them. With a relatively large difference between coefficients it is less likely for a singular or hybrid attack to change the difference to an erroneous zone. This results in the fulfillment of the condition for extraction of the correct bits even when the watermarked image is subjected to different image processing attacks.

  1. II)

    Analysis for Second Algorithm

The second technique involves the embedding in the RONI region only, thus ensuring better quality of ROI for diagnostic purpose.

4.3 Imperceptibility analysis

For testing the imperceptibility of the RONI/ ROI based embedding scheme. A watermark of size 47 × 47 has been used. Image indices, PSNR, SSIM and NAE have been used to evaluate perceptual transparency. The results obtained have been presented in Table 15, where in five CT scan images have been used.

Table 15 Imperceptibility parameters

It is evident from the Table that proposed scheme is capable of providing high quality watermarked images as average PSNR obtained is above 54 dB and average SSIM is 0.9875 without having the ROI tampered. The relatively better results of PSNR, observed in this algorithms is due to the fact that critical information region, is not used for embedding.

4.4 Robustness analysis

The robustness analysis of the proposed scheme has been carried out by subjecting watermarked images obtained from the system to various attacks like, salt and pepper noise, Gaussian noise, JPEG compression, rotation, different filtering processes (Median filtering, Wiener filtering and Average filtering) and other image processing techniques.

4.4.1 Robustness analysis against salt & pepper attack

The watermarked medical images are tested for salt & pepper noise with varying noise densities from 0.001 to 0.01. The results of the proposed technique are shown in Fig. 19 and the extracted watermarks for various noise densities are shown in Fig. 20. It has been observed that average BER values increase from 1.5 to 12 % as noise density is increased from ).001 to 0.01. The visual quality of the extracted watermark shows that robustness reduces with increased noise density.

Fig. 19
figure 19

BER (%) for salt and pepper noise at different noise densities

Fig. 20
figure 20

Extracted watermarks after salt and pepper noise attacks (0.001 to 0.01) for Image 1

4.4.2 Robustness analysis against different filtering attacks

Various filtering attacks have been applied to watermarked images. The filter kernel used for Average filtering, Median filtering and Wiener filtering is 3 × 3. Figure 21 shows the extracted watermark of Image 1 after the application of the different filtering attacks. The observations made in this regard are discussed below:

Fig. 21
figure 21

Extracted watermarks (a) Median filtering (b) Wiener filtering (c) Average filtering

Median filtering

The test images are subjected to Median filtering of filter size 3 × 3. The average NCC and BER of the extracted watermarks is 0.9990 and 0.16 % for K = 10. These figures indicate that proposed algorithm is highly robust to Median filtering. The numerical results observed are substantiated by Fig. 21a.

Wiener filtering

The extracted watermark after Wiener filtering attack is shown in Fig. 21b. The average NCC and BER of extracted watermarks is 0.9960 and 0.44 % for K = 10. The observed BER values (less than 0.55 %) show that the scheme is highly robust to Wiener filtering.

Average filtering

Figure 21c shows the extracted watermark after Average filtering attack. The average NCC and BER equals to 0.9909 and 0.89 % for K = 10. The results show that our technique is robust to average filtering.

4.4.3 Robustness analysis against JPEG attack

The watermarked images, as obtained, using the second algorithm have been tested for JPEG comparison for various quality factors. Figure 22a shows the plot between the BER and the Quality factor. The figure indicates that as Quality Factor increases the BER decreases. Figure 22b shows the plot between the NCC and the Quality factor. It is further obvious from the results that for a given Quality factor, BER and NCC improve as the value of K is increased.

Fig. 22
figure 22

a Plot between the BER (%) and Quality Factor for Image 1. b Plot between the NCC and Quality Factor for Image 1

The proposed algorithm has been tested for five different test images and the results are shown in Table 16. It could be seen that the scheme performs well for JPEG compression. The results are found to improve with increase in K.

Table 16 BER (%) and NCC against different Quality Factors for the test images

4.4.4 Robustness analysis against cropping

The proposed work has been tested for cropping attack. After cropping 25 % (at top left corner) of the watermarked image at K = 10 the average BER (%) obtained for watermark is 3.63 and average NCC is 1.0000. After cropping 25 % (at center) of the watermarked image at K = 10 the average BER (%) obtained for watermark is 0.252 and average NCC is 1.0000. Figure 23 shows the watermarked images and extracted watermarks and it is clear that the proposed technique is robust to cropping attack.

Fig. 23
figure 23

a 25%Left corner cropped image, Extracted watermark (b) 25%centre cropped image, Extracted watermark

4.4.5 Robustness analysis against rotation attack

The watermarked images have been tested for rotation attack. The average BER and NCC results obtained for 5° are 0.68 % and 0.9950 (K = 10), while as for same value of ‘K’ and a rotation of 10° the average BER and NCC values are respectively 0.88 % and 0.9955. Results reveal that the proposed technique is robust to rotation attack. This is confirmed by Fig. 24 also.

Fig. 24
figure 24

a Extracted watermark after 5° rotation (b) extracted watermark after 10° rotation

4.4.6 Robustness analysis against sharpening attack

The watermarked images have been tested for sharpening attack. Table 17 shows the results of different images at K = 10. The NCC values close to unity and BER as less as 0.26 % indicate that the proposed algorithm is robust to this attack. Figure 25 authenticates our argument.

Table 17 BER (%) and NCC of different images for sharpening attack
Fig. 25
figure 25

Extracted watermark after sharpening attack

4.4.7 Robustness analysis against histogram equalization

Watermarked images obtained using the proposed technique were subjected to Histogram Equalization. The BER and NCC values for K = 10, after Histogram Equalization is shown in Table 18. The average BER(%) obtained is 0 and average NCC is 1.0000. From Fig. 26 and Table 18 it is clear that the proposed algorithm is completely robust to histogram equalization.

Table 18 BER (%) and NCC for Histogram Equalization of watermarked images
Fig. 26
figure 26

Extracted watermark after histogram equalization

4.4.8 Robustness analysis against gaussian noise

The watermarked images are subjected to Gaussian Noise attack (variance = 0.0001). The BER and NCC at K = 10 of the watermarked images is shown in Table 19. Figure 27 shows the extracted watermark. Though the results obtained are not as convincing as in case of histogram equalization, however the watermark is still recognizable.

Table 19 BER (%) and NCC for Gaussian Noise (v = 0.0001) of watermarked images
Fig. 27
figure 27

Extracted watermark after Gaussian Noise

4.4.9 Robustness analysis for hybrid attacks

The watermarked images are subjected to various hybrid attacks. It has been observed that recognizable watermarks are obtained from each case. The detailed analysis for hybrid attacks is presented below:

Salt and pepper noise plus Median Filtering

The watermarked images are distorted with salt and pepper noise with noise density 0.01 and then the attacked images are filtered using Median filtering. Watermarks extracted from the attacked images with BER and NCC is shown in Table 20. It is pertinent to mention here that embedding factor of K = 10 has been used here. Figure 28 shows the extracted watermarks from five used images. The low values of BER obtained coupled with the extracted perceptual quality of watermarked images show that the proposed technique is robust to this hybrid attack.

Table 20 BER and NCC values for hybrid attack (Salt and pepper + Median Filtering)
Fig. 28
figure 28

Extracted watermarks from five different images

Histogram equalization plus sharpening attack

The watermarked images are tested for histogram equalization and then the attacked images are sharpened. Table 21 shows the detailed robustness parameters while as Fig. 29 shows the extracted watermarks from various attacked images. It is observed from quality indices that our scheme is highly robust to this hybrid attack

Table 21 Robustness parameters for hybrid attack (Histogram Equalization + Sharpening)
Fig. 29
figure 29

Extracted watermarks if five different images

Salt & Pepper noise plus Median filtering plus Histogram equalization attack

The watermarked images are simultaneously attacked by salt & pepper noise with noise density 0.01, histogram equalization and Median filtering with K = 10. The different observed parameters are shown in Table 22. The robustness of the proposed scheme to this three tier attack is substantiated by very low BER(less than 0.05 %). The results are substantiated by Fig. 30.

Table 22 BER and NCC values for hybrid attack (Salt and Pepper noise + Median Filtering + Histogram Equalization)
Fig. 30
figure 30

Extracted watermarks for five different images

Rotation plus Median filtering plus Sharpening attack

The watermarked images are rotated 10° and then it is attacked by Median filtering and finally sharpened. Table 23 shows the different observed parameters for K = 10 and the extracted watermarks are shown in Fig. 31. It can be observed from the Table that average BER value for such an attack is (0.70 %). Further near unity NCC values and quality of extracted watermarks show that the proposed algorithm is robust to this attack.

Table 23 Robustness parameters for hybrid attack ( Rotation + Median Filtering + Sharpening)
Fig. 31
figure 31

Extracted watermarks of five different images

The results obtained in the second algorithm show better perceptual quality and robustness as compared to the first algorithm because of the fact that only RONI region is used for embedding purpose. Since, in RONI the pixels have high correlation as compared to that of the ROI region. Therefore, the relative difference between the selected DCT coefficients is small which in turn brings a small change in original image when watermark is embedded.

5 Conclusion

E-Healthcare is a buzz word nowadays. The concept of E-health care has made the distance in healthcare irrelevant. However, the practical implementation of an E-Healthcare system poses its own set of challenges. One of the major challenges is to maintain integrity of the vital medical data during transit. Watermarking is being currently used as a potent solution for ensuring integrity, authentication and copyright protection of medical data. This paper presents two different blind approaches for watermarking of medical images. In both the approaches relative magnitude of preselected DCT coefficients is used for embedding the watermark/EPR. In the first approach the watermark is embedded in Region of Interest and Region of Non Interest of the medical image. However, in second approach the embedding takes place in the Region of Non Interest only. The embedding is carried out in the transform domain, where in block based (8 × 8) DCT has been used. The watermarked images have been tested for various singular and hybrid image processing operations. The results reveal that the proposed techniques are highly imperceptible besides being robust to various image processing attacks like sharpening, Salt and Pepper noise, JPEG, Gaussian noise and rotation, Cropping, Filtering etc. Given the performance of both the techniques to various attacks the proposed algorithms can prove to be handy in an E-health system.