1 Introduction

The continuous developments in Information and Communication technologies (ICTs) and multimedia technology offers widespread use of multimedia contents such as images, audio and video [30]. All these technological advancements introduced a progressive change in various health care facilities such as information management, Hospital Information System (HIS), medical imaging and health social networks [15, 30]. Telemedicine is defined as use of ICTs in order to provide healthcare services when practicing doctors, patients and researchers are present in different geographical locations [44]. Although such transmission and distribution of Electronic Patient Record (EPR) raises various security related issues such as reliability, integrity, security, authenticity and confidentiality [18, 34, 40]. Digital watermarking is the recent, popular and efficient technique for multimedia data protection. In this scheme, a document called watermark is embedded into the digital data to protect it from unauthorized use. Digital watermarking has various applications such as copyright protection, copy protection, tamper detection, broadcast monitoring, content archiving, fingerprinting, healthcare, cyber watermarking, digital cinema and content authentication [1, 10, 13, 18, 34, 35, 38, 39, 4143]. In addition, digital watermarks are also used to protect state driver licenses by providing covert and machine readable layer of security to fight against various issues such as digital counterfeiting, fraud, identity theft etc. (http://www.digitalwatermarkingalliance.org/faqs.asp). Similarly medical image watermarking (MIW) has various advantages such as save storage space and bandwidth requirements, confidentiality of patient data [11, 31, 40, 44]. In addition, medical image watermarking also helps in reducing medical identity thefts which are the serious security concern/issues reported in various survey [11, 31, 40, 44, 45]. The main concern of digital image watermarking schemes is that the watermark should not affect the visual quality of the cover image and it should be robust for different signal processing attacks.

According to domain, watermarking techniques can be classified as spatial domain [27, 33, 37] and transform domain [3, 4, 32] watermarking techniques. Robustness, imperceptibility, capacity, computational cost and security are important characteristics for general watermarking system [10, 38]. However, there exists some tradeoff between robustness, imperceptibility and capacity characteristics of the watermark. Therefore, some optimization techniques are required to balance these characteristics. Recently, Artificial Intelligence (AI) techniques such as Genetic Algorithm (GA), Differential Evolution (DE), Neural Networks (NN), Clonal Selection Algorithm (CSA) and Particle Swarm Optimizer (PSO) [2, 68, 49, 51] are used as an optimization technique to search optimal sub-bands and coefficients in transform domain to embed watermark with different scaling factors. In addition, these techniques can be used as optimization techniques to remove some round off errors when coefficients in transform domain are transformed to spatial domain.

1.1 Related Work

A brief review of recent and related watermarking methods using DWT is presented below:

Ganic and Eskicioglu [17] presents a hybrid method based on DWT and Singular Value Decomposition (SVD). In the embedding process, the singular values of all DWT cover sub-band information are modified with singular values of watermark information. The method is robust for different known attacks Terzija et al. [46] proposed a method for improving the efficiency and robustness of the image watermarks using three different error correction codes (ECCs). Out of the three ECCs, Reed-Solomon code performs better than the BCH and Hamming code. The experimental results show that the method is robust for different attacks. However, the method unable to correct the error rates greater than 20 %. A DWT-SVD based image watermarking method is presented by Lai et al.[22], where the watermark information is directly embedded into the singular vector of the cover image’s DWT sub-bands. The experimental results show that the method is robust for different known attacks at acceptable visual quality of the watermarked image.

Vafaei et al. [47] proposed a blind watermarking method using DWT and Feed forward Neural Networks (FNN). In the embedding process, third level DWT applied on cover image and divides the selected sub-bands into different blocks. To enhance the robustness of the proposed method, the binary watermark information is embedded repetitively into the selected DWT coefficients. Experimental results demonstrate that the proposed method offer good visual quality of the watermarked image and robust against different kinds of signal processing attacks. Ali et al. [5] proposed a watermarking scheme based on Differential Evolution using DWT and SVD. In the embedding process, the singular vector of selected DWT sub-band of the cover is modified with binary watermark image. The proposed method claimed that it offer the solution for false positive problem as suffer by SVD. In [40], the authors presents a multiple watermarking method using combination of DWT and SVD. Further, the method enhanced the security and robustness of the watermark information, encryption and Reed-Solomon ECC is applied to the watermark before embedding into the cover medical image. The method is robust for different attacks including the Checkmark attacks. Yen et al. [51] presents a digital watermarking using DCT and BPNN. In the embedding process, DCT has been applied on the cover image of size \( 256\times 256 \) and the watermark of size \( 32\times 32 \) is embedded into the mid frequency region of the cover. The simulation results indicated that the method is found to be robust for different attacks. Mehto et al. [24] proposed a medical image watermarking using DWT and DCT. The watermark image contains patient information is embedded in to the medical cover image. The performance of the method is evaluated for different gain without using any attacks. Nguyen et al. [28] proposed reversible watermarking method using DWT. In this method, an authentication code is randomly generated and embedded into DWT sub-bands of each image block. The method is extensively evaluated for different kinds of attacks including tampered regions of different sizes, content tampered attack and collage attack. In addition, some important image watermarking techniques using neural networks have been proposed [25, 26, 50]. For a detailed description on these approaches, interested readers may directly refer to them.

1.2 Important contribution of the work

This paper presents a hybrid approach (DWT, DCT and SVD) for multilevel watermarking of medical images using BPNN. The proposed method is based on popular transform domain techniques so their fusion makes a very attractive watermarking technique. Due to its excellent spatio-frequency localization properties, the DWT is very suitable to identify areas in the cover image where a watermark can be imperceptibly embedded [9, 42]. However, DWT is shift sensitive, poor directionality information and lacks the phase information. DCT has good energy compaction property [3, 4, 32, 33, 37]. However, one of the main problems and the criticism of the DCT is the blocking effect [52]. One of attractive mathematical properties of SVD is that slight variations of singular values do not affect the visual quality of the cover medical image [12, 14, 16, 17, 23, 29], which motivates the watermark embedding procedure to achieve better performance in terms of imperceptibility, robustness and capacity as compared to DWT, DCT and SVD applied individually. However, one of the main drawbacks of the SVD-based image watermarking is its false positive problem [38]. The false positive problem present in SVD can be removed by using shuffled SVD (SSVD) as presented in [19]. Shuffled SVD enhance the reconstructed image quality by breaking an image into set of ensemble images. The shuffled SVD can be used in place of SVD to remove false positive problem in the proposed method. The important contribution of the work is summarized below:

  • Enhanced the capacity and security of watermarks: In this method, multiple watermarks (text and image) are embedded simultaneously, which provides extra level of security with acceptable PSNR, BER and NC performance. For identity authentication purposes, multiple watermarks have been embedded instead of single watermark into the same cover medical image / multimedia objects simultaneously, which offer superior performance (extra level of security) in healthcare applications. However, the embedding of multiple watermarks in the same multimedia object, these will decreases the PSNR performance and increase the computational time. Security of the Lump image watermark is enhanced by using Arnold transform before embedding into the cover. In addition, lossless compression technique (arithmetic coding) is applied to symptoms watermark to compress the size of the watermark. This compression techniques can correctly recovered all bits of the symptom watermark in lossless manner. The signature watermark containing doctor’s identification code for the purpose of origin authentication is embedding into the higher level DWT sub-band. In order to increase the robustness of the signature watermark and reduce the channel distortion, Hamming error correcting code is applied to the watermark before embedding into the cover.

  • Improved the robustness of image and text watermark: Tables 2, 3, 4, 5 and 6 shows the effect of Back Propagation Neural Network (BPNN) [20, 21, 36, 48] which offer higher robustness performance compared to without using the BPNN. In addition, the robustness (reduce BER values) of the text watermark is also enhanced by using the Hamming ECC.

  • Save the storage and bandwidth requirements: Embedding patient’s information in form of the multiple watermarks (image and text both) in cover images conserves transmission bandwidth and storage space requirements.

The rest of the paper is structured as followes: Section 2 presents the proposed multiple watermarking embedding and extraction method using back prpogation neural networks. Experimetal results and performance analysis are given in Section 3. The conclusion and future scope of the work are presented in Section 4.

2 Proposed Algorithm

The proposed multilevel watermarking of medical images embeds multiple watermarks in the form of text and image into medical cover image. Table 1 shows the allocation of image and text watermarks according to robustness and capacity retirements at different DWT sub-bands. It is evident that watermarks containing important information and requiring more robustness are embedded in higher level DWT sub-bands [41, 42].

Table 1 Allocation of different watermarks according to robustness and capacity criteria at different sub-band

In this research, multiple image and text watermarks are embedded in the medical cover image. In the embedding process, the cover medical image is decomposed into third-level DWT. Low-high frequency band (LH1) of the first level DWT is transformed by DCT and then SVD is applied to DCT coefficients. The image watermark is also transformed by DCT and SVD. The singular values of the watermark image information are embedded in the singular value of the cover medical image. The image, symptom and signature watermark is embedded in to the first (LH1), second (LH2) and third level (LL3) DWT sub-band of the cover image respectively. Further, Lump watermark is scrambled by using Arnold transform before embedding into the cover which provides the extra level of security.

In addition, the symptom and signature text watermarks are also compressed/encoded by lossless arithmetic compression technique (for embedding more information and can recovered all watermark bits in lossless manner) and Hamming error correction code (for improving the robustness and reducing the channel distortion) respectively. The compressed and encoded text watermarks are then embedded into the cover image. Results are obtained by varying the gain factor, text watermark size and the different cover image modalities. Experimental results are provided to illustrate that the proposed method is able to withstand a known attacks. The proposed algorithm has two different parts, the embedding and extraction process. Figure 1a and b shows the proposed method for embedding and extraction process respectively. The image watermark embedding and extraction process are given in section 2.1 and section 2.2 respectively. However, the text watermarks embedding and extraction process [46] are given in section 2.3 and section 2.4 respectively.

Fig. 1
figure 1

a Watermark embedding and b Watermark extraction Process

2.1 Embedding algorithm for image watermark

  1. 1.

    Apply third-level DWT transform on cover image to decompose it into corresponding sub bands and select LH1 sub-band.

  2. 2.

    Apply DCT to the selected sub-band and then apply SVD to transformed DCT coefficients to obtain corresponding three matrices U, S and V.

    $$ {\mathrm{A}}_{\mathrm{c}} = {\mathrm{U}}_{\mathrm{c}}{\mathrm{S}}_{\mathrm{c}}{{\mathrm{V}}_{\mathrm{c}}}^{\mathrm{T}} $$
    (1)
  3. 3.

    Encrypt the Lump watermark image using Arnold Transform

  4. 4.

    Apply DCT on encrypted Lump watermark image and then apply SVD to DCT coefficients to obtain corresponding matrices similar to step 2.

    $$ {\mathrm{A}}_{\mathrm{w}} = {\mathrm{U}}_{\mathrm{w}}{\mathrm{S}}_{\mathrm{w}}{{\mathrm{V}}_{\mathrm{w}}}^{\mathrm{T}} $$
    (2)
  5. 5.

    Modify the singular values of LH1 sub band of cover image with the singular values of Lump.

    $$ {\mathrm{S}}_{\mathrm{w}\mathrm{at}} = {\mathrm{S}}_{\mathrm{c}} + \mathrm{k}*{\mathrm{S}}_{\mathrm{w}} $$
    (3)

    Here k is defined as the scaling factor with which watermark images are embedded into host image.

  6. 6.

    Obtain modified DCT coefficients by applying Inverse Singular Value Decomposition (ISVD) using following equations.

    $$ {\mathrm{A}}_{\mathrm{wat}} = {\mathrm{U}}_{\mathrm{c}}*\ {\mathrm{S}}_{\mathrm{wat}}{{*\ \mathrm{V}}_{\mathrm{c}}}^{\mathrm{T}} $$
    (4)
  7. 7.

    Obtain modified LH1* sub band by applying Inverse Discrete Cosine Transform (IDCT) to modified DCT coefficients

  8. 8.

    Change LH1 sub band of cover image with the modified LH1* sub band and apply Inverse Discrete Wavelet Transform (IDWT) to get watermarked image.

  9. 9.

    Apply attacks and noise to the watermarked image to check the robustness of the proposed algorithm.

2.2 Extraction algorithm for image watermark

  1. 1.

    Apply third-level DWT transform on cover image to decompose it into corresponding sub bands and select LH1 sub band.

  2. 2.

    Apply DCT to the selected sub-band and then apply SVD to transformed DCT coefficients to obtain their corresponding three matrices U, S and V.

    $$ {\mathrm{A}}_{\mathrm{c}} = {\mathrm{U}}_{\mathrm{c}}{\mathrm{S}}_{\mathrm{c}}{{\mathrm{V}}_{\mathrm{c}}}^{\mathrm{T}} $$
    (5)
  3. 3.

    Apply DCT on watermark image (Lump) and then apply SVD to DCT coefficients to obtain their corresponding matrices similar to step 2.

    $$ {\mathrm{A}}_{\mathrm{w}} = {\mathrm{U}}_{\mathrm{w}}{\mathrm{S}}_{\mathrm{w}}{{\mathrm{V}}_{\mathrm{w}}}^{\mathrm{T}} $$
    (6)
  4. 4.

    Apply step 1, step 2 to watermarked image to obtain its corresponding SVD Matrices for LH1 sub band.

    $$ {\mathrm{A}}_{\mathrm{wat}} = {\mathrm{U}}_{\mathrm{wat}}{\mathrm{S}}_{\mathrm{wat}}{{\mathrm{V}}_{\mathrm{wat}}}^{\mathrm{T}} $$
    (7)
  5. 5.

    Obtain singular values of Lump from the singular values of LH1 sub band of watermarked image and cover image respectively by using following equation:

    $$ {{\mathrm{S}}_{\mathrm{w}}}^{*} = \left({\mathrm{S}}_{\mathrm{w}\mathrm{at}}\hbox{--}\ {\mathrm{S}}_{\mathrm{c}}\right)/\mathrm{k} $$
    (8)
  6. 6.

    Obtain extracted watermark by applying inverse Singular Value Decomposition (ISVD) using equation (19) and then inverse Discrete Cosine Transform (IDCT).

    $$ {\mathrm{A}}_{\mathrm{ew}} = {\mathrm{U}}_{\mathrm{w}}{{*\ \mathrm{S}}_{\mathrm{w}}}^{*\ }{{*\ \mathrm{V}}_{\mathrm{w}}}^{\mathrm{T}} $$
    (9)
  7. 7.

    Decrypt the extracted watermark by applying inverse Arnold Transform to obtain final extracted Lump image watermark

  8. 8.

    BPNN is then applied to extracted watermarks to remove noise and interferences in order to improve their robustness. Figure 2 shows the BPNN training process.

    Fig. 2
    figure 2

    BPNN Training Process

2.3 Embedding algorithm for text watermark

Text watermarks (Signature and Symptoms) are embedded into cover image [46] using following steps:

  1. 1.

    Apply third-level DWT transform on cover image to decompose it into corresponding sub bands and select LH2 and LL3 sub bands.

  2. 2.

    Convert the Signature text watermark into binary bits.

  3. 3.

    Apply Hamming encoder algorithm to binary bits of Signature text watermark and replace (0,1) by (-1,1) in the watermarking bits.

  4. 4.

    Apply Arithmetic Encoding to Symptoms text watermark and replace (0,1) by (-1,1) in the watermarking bits similar to step3.

  5. 5.

    Embed the text watermarking bits obtained from Symptoms watermark to LH2 sub band of cover image and watermarking bits obtained from Signature watermark to LL3 sub band of cover image using equation.

    $$ \begin{array}{cc}\hfill {\mathrm{A}}_{\mathrm{i}}^{\prime}\left(\mathrm{x},\mathrm{y}\right)={\mathrm{A}}_{\mathrm{i}}\left(\mathrm{x},\mathrm{y}\right)\left(1+\mathrm{k}*{\mathrm{Wbt}}_{\mathrm{i}}\right)\hfill & \hfill \mathrm{i} = \mathrm{Signature}\ \mathrm{and}\ \mathrm{Symptoms}\ \mathrm{text}\ \mathrm{watermarks}\hfill \end{array} $$
    (10)

    \( {\mathrm{A}}_{\mathrm{i}}^{\prime}\left(\mathrm{x},\mathrm{y}\right) \) and A(x,y) are DWT coefficients before and after embedding process, \( {\mathrm{Wbt}}_{\mathrm{i}} \) is text watermarking bits and k is the gain factor.

  6. 6.

    Change LH2 and LL3 sub bands of cover image with the modified LH2* and LL3*sub band and apply Inverse Discrete Wavelet Transform (IDWT) to get watermarked image.

2.4 Extraction algorithm for text watermark

Text watermarks (Signature and Symptoms) are extracted [46] from watermarked image using following steps: -

  1. 1.

    Apply third-level DWT transform on cover image to decompose it into corresponding sub bands and select LH2 and LL3 sub bands.

  2. 2.

    Apply third-level DWT transform on watermarked image to decompose it into corresponding sub bands and select LH2* and LL3* sub bands.

  3. 3.

    Extract watermark bits of Signature text watermark form LL3 sub band of cover image and LL3* sub band of watermarked image and Symptoms text watermark form LH2 sub band of cover image and LH2* sub band of watermarked image using equation

    $$ {\mathrm{Wbt}}_{\mathrm{i}}^{\prime } = \frac{{\mathrm{A}}_{\mathrm{i}}^{\prime}\left(\mathrm{x},\mathrm{y}\right)-{\mathrm{A}}_{\mathrm{i}}\left(\mathrm{x},\mathrm{y}\right)}{\mathrm{k}*{\mathrm{A}}_{\mathrm{i}}\left(\mathrm{x},\mathrm{y}\right)}\mathrm{i} = \mathrm{extracted}\ \mathrm{Symptoms}\ \mathrm{and}\ \mathrm{Signature}\ \mathrm{Text}\ \mathrm{Watermark} $$
    (11)

    \( {{\mathrm{A}}_{\mathrm{i}}}^{\prime}\left(\mathrm{x},\mathrm{y}\right) \) and Ai(x,y) are DWT coefficients of cover and watermarked image respectively, \( {\mathrm{Wbt}}_{\mathrm{i}}^{\prime } \) is extracted text watermarking bits and k is the gain factor.

  4. 4.

    Apply Arithmetic decoding process to obtained watermark bits of Symptoms watermark and convert watermark bits into text to obtain Symptoms text watermark.

  5. 5.

    Apply Hamming decoder algorithm to obtained watermark bits of Signature watermark and convert watermark bits into text to obtain Signature text watermark.

3 Experimental Results and Analysis

The performance of the combined DWT-DCT-SVD watermarking algorithm has been evaluated in terms of quality of the watermarked image (PSNR), Bit Error Rate (BER) of text watermarks and robustness of the watermarked image (NC) using BPNN. The gray-scale medical CT-scan image of size \( 512\times 512 \) as cover image, the Lump image of size \( 256\times 256 \) is considered as image watermark. For the healthcare applications security of the watermark has become an important factor. The security of the image watermark is enhanced by using Arnold transform is applied before embedding in to the cover. Signature and symptoms watermarks are considered as text watermark of size 190 characters. Signature watermark contains the doctor’s signature/identification code and the symptoms watermark contains the patient diagnostic information. Robustness performance of the image watermark is improved by applying the Back Propagation Neural Network (BPNN). In order to reduce the BER performance of the proposed method, error correcting Hamming code (ECC) is applied to the ASCII representation of the signature watermark before embedding into the cover. In addition, lossless encoding method (Arithmetic coding) is applied on the symptom watermark which can be correctly retrieving the diagnostic information of the patient. Strength of watermarks is varied by varying the gain factor in the proposed algorithm. For testing the robustness of the extracted watermarks (both image and text) and visual quality of watermarked cover medical image MATLAB is used. Figure 3a–c shows the cover CT-scan image, Lump watermark image and watermarked images respectively. Figure 4 shows the Signature and Symptoms text watermarks.

Fig. 3
figure 3

a CTscan cover image b Lump image c Watermarked image

Fig. 4
figure 4

Signature and Symptoms text watermarks

Figure 5a and b shows the extracted watermarks with and without using the BPNN training respectively. The PSNR, BER and NC performance of the proposed method is shown in Tables 2, 3, 4, 5 and 6. In Table 2, the PSNR and NC performance of the proposed method has been evaluated without any noise attack. Without using the BPNN, the maximum PSNR value is 43.88 dB and NC value is 0.9344 at gain factor = 0.01. However, the NC value is obtained as 0.9547 with BPNN at the same gain. With BPNN, the maximum NC value is obtained as 0.9888 at gain factor = 0.08. However, the NC value has been obtained as 0.9861 without using the BPNN at same gain factor.

Fig. 5
figure 5

Extracted Lump watermark a without and b with BPNN training

Table 2 PSNR, NC and BER performance of the proposed method at different gain
Table 3 PSNR, NC and BER performance for different no of characters in Symptoms watermark at different gain
Table 4 PSNR, NC and BER performance for different cover images at gain = 0.08
Table 5 PSNR and NC and BER performance for different text watermark size at gain 0.08
Table 6 BER and NC performance of the proposed method for different attacks at gain = 0.08

The BER value for signature watermark is ‘0’ at all considered gain factors. However, BER value of the Symptoms watermark is 0.2174 and 0.1087 for gain factors 0.01 and 0.02 respectively. Referring Table 2, we found that larger the gain factor, stronger the robustness and smaller the gain factor, better the visual quality of the watermarked image. The graphical representation of Table 2 is shown in Fig. 6. The gain factor ‘0.08’ is considered for the experimental purpose in Tables 3, 4, 5 and 6. Table 3 shows the PSNR, BER and NC (with and without using BPNN) performance of the proposed method for different size of text watermarks. The maximum PSNR value is obtained at gain factor 0.01, which is 43.95 dB. However, the NC value obtained is 0.9363 (without using BPNN) for 50 characters of Symptoms watermark at the same gain factor. Refereeing this table, the maximum NC value is 0.9889 (with BPNN) at gain factor 0.05 for 50 characters of Symptoms watermark. The BER value of the signature watermark is ‘0’ at all chosen gain factors. However, the BER value is 0.4202 for the Symptoms watermark at gain = 0.01. The maximum BER value is 0.4202, which can be recovered all the bits at higher gain value.

Fig. 6
figure 6

PSNR, NC and BER performance of the proposed method at different Gain factor

Table 4 shows the PSNR, BER and NC (with and without using BPNN) performance of the proposed method for six different cover images. With BPNN, the highest NC values (0.9888) have been obtained with MRI image at gain = 0.08 for Lump image. However the minimum NC value is 0.9638 for Mammography image at the same gain. Referencing this Table, the highest BER value has been obtained for Ultrasound image, which is 0.4348. However, the minimum BER value is ‘0’ for all other cover images except the Mammography and Ultrasound images. Figure 7 shows the graphical representation of Table 4. Table 5 shows the PSNR, BER and NC performance of proposed algorithm for different size of the symptoms watermark. In this table, the size of the Signature watermark is fixed and the size of Symptoms watermark is varied. Referring this table, the BER value is found to be ‘0’ for all different size of the symptoms watermark. Figure 8 show the graphical representation of Table 5. Table 6 shows the BER and NC performance of the proposed method for different attacks [39]. Without BPNN, the highest NC value has been obtained as 0.9852 for Gaussian low pass filtering. However, the lowest NC is 0.0025 for JPEG (QF=10) attack. With BPNN, the highest NC value has been obtained as 0.9889 for Gaussian low pass filtering. However, the lowest NC is 0.0123 for Median filtering attack. Refereeing this table, the highest BER of Symptoms and Signature watermark is 47.619 % and 0.4474 % for Crop attack respectively. However, the minimum BER value is ‘0’. Figure 9 show the graphical representation of Table 6.

Fig. 7
figure 7

PSNR, NC and BER performance of the proposed method for different cover image

Fig. 8
figure 8

PSNR, NC and BER performance of the proposed method for different size of text watermark

Fig. 9
figure 9

NC and BER performance of the proposed method for known attacks

Table 7 show the NC performance of the proposed method is compared with other reported techniques [17, 42]. The maximum NC value obtained by the Singh et al. [42] and Ganic et al. [17] is 0.9365 and 0.716 respectively. However, the maximum NC value obtained by the proposed method is 0.9883. Referring Table 7 it is established that the proposed method obtained NC value range from 0.6576 to 0.9883. However, NC value range as obtained by the Singh et al. from 0.569 to 0.9365 and Ganic et al. from -0.211 to 0.716. The proposed method offer higher robustness than the other two reported techniques. Finally, the quality of the watermarked image is evaluated by the subjective technique also [2] in Table 8. Six different persons are involved who have to vote for the quality of a medium in a controlled test environment. This can be done by simply providing a distorted medium of which the quality has to be evaluated by the subject. Referring Table 8 it is established that the quality of the watermarked images is acceptable for diagnosis at all the chosen gain factors except the gain factor = 0.2 and 0.5, which shows the poor/very poor visual quality of the watermarked image. Based on the above discussion, the proposed method highly depends on the gain factors, size if the image and text watermark and different noise variations.

Table 7 Comparison results under NC value
Table 8 Subjective measure of the watermarked image quality at different gain factor

4 Conclusion

In this work, a novel method for multiple watermarking based on DWT, DCT and SVD has been presented using Back Propagation Neural Network. The suggested method considered gray scale images for the experimental purpose. However, the watermark embedding into color image provides greater space against the watermark embedding into gray scale image. The performance of the watermarking system will greatly depends on the choice of color space and selection of embedding color channel. The main properties of the proposed work can be identified as follows: 1. The fusion of DWT, DCT and SVD offer better performance in terms of imperceptibility, robustness and capacity as compared to DWT, DCT and SVD applied individually 2. Embedding more than one watermark within the cover image reduces the storage capacity and the bandwidth requirements. The storage and bandwidth requirements are very important in medical applications. 3. To improve the robustness of the image watermark, Back Propagation Neural Network (BPNN) is applied to the extracted watermark which gives the higher Normalized Correlation (NC) values compared to without using the BPNN. 4. Security and confidentiality are provided by scrambling the Lump watermark using Arnold transforms before embedding into the cover. 5. Lossless arithmetic compression is applieded to Symptoms watermark before embedding in to the cover for the bit compactness. The lossless compression techniques is also preffered in medical applications in which every bit information is preserved before and after the compression process. 6. To increase the robustness of the signature watermark and reduce the channel distortion, Hamming error correcting code is applied to the watermark before embedding into the cover. 7. Finally, the visual quality of the watermarked image is evaluated by the subjective method also.

Therefore, proposed method provides a valuable solution for the prevention of patient identity theft in healthcare applications such as teleophthalmology, telemedicine, tele-diagnosis and tele-consultancy etc.

The inclusions of many techniques were combined to improve the robustness of the watermarks, visual quality of the watermarked image, capacity and security of the watermarks which is the prime objective of the research. However, it may have increased the computational complexity to some extent which needs to be investigated separately. In addition, the suggested method of wavelet based image watermarking can be extended for their application to video watermarking.

We would like to further improve the performance, which will be reported in future communication.