Abstract
In this paper, an algorithm for multiple watermarking based on discrete wavelet transforms (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) has been proposed for healthcare applications. For identity authentication purpose, the proposed method uses three watermarks in the form of medical Lump image watermark, the doctor signature/identification code and diagnostic information of the patient as the text watermarks. In order to improve the robustness performance of the image watermark, Back Propagation Neural Network (BPNN) is applied to the extracted image watermark to reduce the noise effects on the watermarked image. The security of the image watermark is also enhanced by using Arnold transform before embedding into the cover. Further, the symptom and signature text watermarks are also encoded by lossless arithmetic compression technique and Hamming error correction code respectively. The compressed and encoded text watermark is then embedded into the cover image. Experimental results are obtained by varying the gain factor, different sizes of text watermarks and the different cover image modalities. The results are provided to illustrate that the proposed method is able to withstand a different of signal processing attacks and has been found to be giving excellent performance for robustness, imperceptibility, capacity and security simultaneously. The robustness performance of the method is also compared with other reported techniques. Finally, the visual quality of the watermarked image is evaluated by the subjective method also. This shows that the visual quality of the watermarked images is acceptable for diagnosis at different gain factors. Therefore the proposed method may find potential application in prevention of patient identity theft in healthcare applications.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
The continuous developments in Information and Communication technologies (ICTs) and multimedia technology offers widespread use of multimedia contents such as images, audio and video [30]. All these technological advancements introduced a progressive change in various health care facilities such as information management, Hospital Information System (HIS), medical imaging and health social networks [15, 30]. Telemedicine is defined as use of ICTs in order to provide healthcare services when practicing doctors, patients and researchers are present in different geographical locations [44]. Although such transmission and distribution of Electronic Patient Record (EPR) raises various security related issues such as reliability, integrity, security, authenticity and confidentiality [18, 34, 40]. Digital watermarking is the recent, popular and efficient technique for multimedia data protection. In this scheme, a document called watermark is embedded into the digital data to protect it from unauthorized use. Digital watermarking has various applications such as copyright protection, copy protection, tamper detection, broadcast monitoring, content archiving, fingerprinting, healthcare, cyber watermarking, digital cinema and content authentication [1, 10, 13, 18, 34, 35, 38, 39, 41–43]. In addition, digital watermarks are also used to protect state driver licenses by providing covert and machine readable layer of security to fight against various issues such as digital counterfeiting, fraud, identity theft etc. (http://www.digitalwatermarkingalliance.org/faqs.asp). Similarly medical image watermarking (MIW) has various advantages such as save storage space and bandwidth requirements, confidentiality of patient data [11, 31, 40, 44]. In addition, medical image watermarking also helps in reducing medical identity thefts which are the serious security concern/issues reported in various survey [11, 31, 40, 44, 45]. The main concern of digital image watermarking schemes is that the watermark should not affect the visual quality of the cover image and it should be robust for different signal processing attacks.
According to domain, watermarking techniques can be classified as spatial domain [27, 33, 37] and transform domain [3, 4, 32] watermarking techniques. Robustness, imperceptibility, capacity, computational cost and security are important characteristics for general watermarking system [10, 38]. However, there exists some tradeoff between robustness, imperceptibility and capacity characteristics of the watermark. Therefore, some optimization techniques are required to balance these characteristics. Recently, Artificial Intelligence (AI) techniques such as Genetic Algorithm (GA), Differential Evolution (DE), Neural Networks (NN), Clonal Selection Algorithm (CSA) and Particle Swarm Optimizer (PSO) [2, 6–8, 49, 51] are used as an optimization technique to search optimal sub-bands and coefficients in transform domain to embed watermark with different scaling factors. In addition, these techniques can be used as optimization techniques to remove some round off errors when coefficients in transform domain are transformed to spatial domain.
1.1 Related Work
A brief review of recent and related watermarking methods using DWT is presented below:
Ganic and Eskicioglu [17] presents a hybrid method based on DWT and Singular Value Decomposition (SVD). In the embedding process, the singular values of all DWT cover sub-band information are modified with singular values of watermark information. The method is robust for different known attacks Terzija et al. [46] proposed a method for improving the efficiency and robustness of the image watermarks using three different error correction codes (ECCs). Out of the three ECCs, Reed-Solomon code performs better than the BCH and Hamming code. The experimental results show that the method is robust for different attacks. However, the method unable to correct the error rates greater than 20 %. A DWT-SVD based image watermarking method is presented by Lai et al.[22], where the watermark information is directly embedded into the singular vector of the cover image’s DWT sub-bands. The experimental results show that the method is robust for different known attacks at acceptable visual quality of the watermarked image.
Vafaei et al. [47] proposed a blind watermarking method using DWT and Feed forward Neural Networks (FNN). In the embedding process, third level DWT applied on cover image and divides the selected sub-bands into different blocks. To enhance the robustness of the proposed method, the binary watermark information is embedded repetitively into the selected DWT coefficients. Experimental results demonstrate that the proposed method offer good visual quality of the watermarked image and robust against different kinds of signal processing attacks. Ali et al. [5] proposed a watermarking scheme based on Differential Evolution using DWT and SVD. In the embedding process, the singular vector of selected DWT sub-band of the cover is modified with binary watermark image. The proposed method claimed that it offer the solution for false positive problem as suffer by SVD. In [40], the authors presents a multiple watermarking method using combination of DWT and SVD. Further, the method enhanced the security and robustness of the watermark information, encryption and Reed-Solomon ECC is applied to the watermark before embedding into the cover medical image. The method is robust for different attacks including the Checkmark attacks. Yen et al. [51] presents a digital watermarking using DCT and BPNN. In the embedding process, DCT has been applied on the cover image of size \( 256\times 256 \) and the watermark of size \( 32\times 32 \) is embedded into the mid frequency region of the cover. The simulation results indicated that the method is found to be robust for different attacks. Mehto et al. [24] proposed a medical image watermarking using DWT and DCT. The watermark image contains patient information is embedded in to the medical cover image. The performance of the method is evaluated for different gain without using any attacks. Nguyen et al. [28] proposed reversible watermarking method using DWT. In this method, an authentication code is randomly generated and embedded into DWT sub-bands of each image block. The method is extensively evaluated for different kinds of attacks including tampered regions of different sizes, content tampered attack and collage attack. In addition, some important image watermarking techniques using neural networks have been proposed [25, 26, 50]. For a detailed description on these approaches, interested readers may directly refer to them.
1.2 Important contribution of the work
This paper presents a hybrid approach (DWT, DCT and SVD) for multilevel watermarking of medical images using BPNN. The proposed method is based on popular transform domain techniques so their fusion makes a very attractive watermarking technique. Due to its excellent spatio-frequency localization properties, the DWT is very suitable to identify areas in the cover image where a watermark can be imperceptibly embedded [9, 42]. However, DWT is shift sensitive, poor directionality information and lacks the phase information. DCT has good energy compaction property [3, 4, 32, 33, 37]. However, one of the main problems and the criticism of the DCT is the blocking effect [52]. One of attractive mathematical properties of SVD is that slight variations of singular values do not affect the visual quality of the cover medical image [12, 14, 16, 17, 23, 29], which motivates the watermark embedding procedure to achieve better performance in terms of imperceptibility, robustness and capacity as compared to DWT, DCT and SVD applied individually. However, one of the main drawbacks of the SVD-based image watermarking is its false positive problem [38]. The false positive problem present in SVD can be removed by using shuffled SVD (SSVD) as presented in [19]. Shuffled SVD enhance the reconstructed image quality by breaking an image into set of ensemble images. The shuffled SVD can be used in place of SVD to remove false positive problem in the proposed method. The important contribution of the work is summarized below:
-
Enhanced the capacity and security of watermarks: In this method, multiple watermarks (text and image) are embedded simultaneously, which provides extra level of security with acceptable PSNR, BER and NC performance. For identity authentication purposes, multiple watermarks have been embedded instead of single watermark into the same cover medical image / multimedia objects simultaneously, which offer superior performance (extra level of security) in healthcare applications. However, the embedding of multiple watermarks in the same multimedia object, these will decreases the PSNR performance and increase the computational time. Security of the Lump image watermark is enhanced by using Arnold transform before embedding into the cover. In addition, lossless compression technique (arithmetic coding) is applied to symptoms watermark to compress the size of the watermark. This compression techniques can correctly recovered all bits of the symptom watermark in lossless manner. The signature watermark containing doctor’s identification code for the purpose of origin authentication is embedding into the higher level DWT sub-band. In order to increase the robustness of the signature watermark and reduce the channel distortion, Hamming error correcting code is applied to the watermark before embedding into the cover.
-
Improved the robustness of image and text watermark: Tables 2, 3, 4, 5 and 6 shows the effect of Back Propagation Neural Network (BPNN) [20, 21, 36, 48] which offer higher robustness performance compared to without using the BPNN. In addition, the robustness (reduce BER values) of the text watermark is also enhanced by using the Hamming ECC.
-
Save the storage and bandwidth requirements: Embedding patient’s information in form of the multiple watermarks (image and text both) in cover images conserves transmission bandwidth and storage space requirements.
The rest of the paper is structured as followes: Section 2 presents the proposed multiple watermarking embedding and extraction method using back prpogation neural networks. Experimetal results and performance analysis are given in Section 3. The conclusion and future scope of the work are presented in Section 4.
2 Proposed Algorithm
The proposed multilevel watermarking of medical images embeds multiple watermarks in the form of text and image into medical cover image. Table 1 shows the allocation of image and text watermarks according to robustness and capacity retirements at different DWT sub-bands. It is evident that watermarks containing important information and requiring more robustness are embedded in higher level DWT sub-bands [41, 42].
In this research, multiple image and text watermarks are embedded in the medical cover image. In the embedding process, the cover medical image is decomposed into third-level DWT. Low-high frequency band (LH1) of the first level DWT is transformed by DCT and then SVD is applied to DCT coefficients. The image watermark is also transformed by DCT and SVD. The singular values of the watermark image information are embedded in the singular value of the cover medical image. The image, symptom and signature watermark is embedded in to the first (LH1), second (LH2) and third level (LL3) DWT sub-band of the cover image respectively. Further, Lump watermark is scrambled by using Arnold transform before embedding into the cover which provides the extra level of security.
In addition, the symptom and signature text watermarks are also compressed/encoded by lossless arithmetic compression technique (for embedding more information and can recovered all watermark bits in lossless manner) and Hamming error correction code (for improving the robustness and reducing the channel distortion) respectively. The compressed and encoded text watermarks are then embedded into the cover image. Results are obtained by varying the gain factor, text watermark size and the different cover image modalities. Experimental results are provided to illustrate that the proposed method is able to withstand a known attacks. The proposed algorithm has two different parts, the embedding and extraction process. Figure 1a and b shows the proposed method for embedding and extraction process respectively. The image watermark embedding and extraction process are given in section 2.1 and section 2.2 respectively. However, the text watermarks embedding and extraction process [46] are given in section 2.3 and section 2.4 respectively.
2.1 Embedding algorithm for image watermark
-
1.
Apply third-level DWT transform on cover image to decompose it into corresponding sub bands and select LH1 sub-band.
-
2.
Apply DCT to the selected sub-band and then apply SVD to transformed DCT coefficients to obtain corresponding three matrices U, S and V.
$$ {\mathrm{A}}_{\mathrm{c}} = {\mathrm{U}}_{\mathrm{c}}{\mathrm{S}}_{\mathrm{c}}{{\mathrm{V}}_{\mathrm{c}}}^{\mathrm{T}} $$(1) -
3.
Encrypt the Lump watermark image using Arnold Transform
-
4.
Apply DCT on encrypted Lump watermark image and then apply SVD to DCT coefficients to obtain corresponding matrices similar to step 2.
$$ {\mathrm{A}}_{\mathrm{w}} = {\mathrm{U}}_{\mathrm{w}}{\mathrm{S}}_{\mathrm{w}}{{\mathrm{V}}_{\mathrm{w}}}^{\mathrm{T}} $$(2) -
5.
Modify the singular values of LH1 sub band of cover image with the singular values of Lump.
$$ {\mathrm{S}}_{\mathrm{w}\mathrm{at}} = {\mathrm{S}}_{\mathrm{c}} + \mathrm{k}*{\mathrm{S}}_{\mathrm{w}} $$(3)Here k is defined as the scaling factor with which watermark images are embedded into host image.
-
6.
Obtain modified DCT coefficients by applying Inverse Singular Value Decomposition (ISVD) using following equations.
$$ {\mathrm{A}}_{\mathrm{wat}} = {\mathrm{U}}_{\mathrm{c}}*\ {\mathrm{S}}_{\mathrm{wat}}{{*\ \mathrm{V}}_{\mathrm{c}}}^{\mathrm{T}} $$(4) -
7.
Obtain modified LH1* sub band by applying Inverse Discrete Cosine Transform (IDCT) to modified DCT coefficients
-
8.
Change LH1 sub band of cover image with the modified LH1* sub band and apply Inverse Discrete Wavelet Transform (IDWT) to get watermarked image.
-
9.
Apply attacks and noise to the watermarked image to check the robustness of the proposed algorithm.
2.2 Extraction algorithm for image watermark
-
1.
Apply third-level DWT transform on cover image to decompose it into corresponding sub bands and select LH1 sub band.
-
2.
Apply DCT to the selected sub-band and then apply SVD to transformed DCT coefficients to obtain their corresponding three matrices U, S and V.
$$ {\mathrm{A}}_{\mathrm{c}} = {\mathrm{U}}_{\mathrm{c}}{\mathrm{S}}_{\mathrm{c}}{{\mathrm{V}}_{\mathrm{c}}}^{\mathrm{T}} $$(5) -
3.
Apply DCT on watermark image (Lump) and then apply SVD to DCT coefficients to obtain their corresponding matrices similar to step 2.
$$ {\mathrm{A}}_{\mathrm{w}} = {\mathrm{U}}_{\mathrm{w}}{\mathrm{S}}_{\mathrm{w}}{{\mathrm{V}}_{\mathrm{w}}}^{\mathrm{T}} $$(6) -
4.
Apply step 1, step 2 to watermarked image to obtain its corresponding SVD Matrices for LH1 sub band.
$$ {\mathrm{A}}_{\mathrm{wat}} = {\mathrm{U}}_{\mathrm{wat}}{\mathrm{S}}_{\mathrm{wat}}{{\mathrm{V}}_{\mathrm{wat}}}^{\mathrm{T}} $$(7) -
5.
Obtain singular values of Lump from the singular values of LH1 sub band of watermarked image and cover image respectively by using following equation:
$$ {{\mathrm{S}}_{\mathrm{w}}}^{*} = \left({\mathrm{S}}_{\mathrm{w}\mathrm{at}}\hbox{--}\ {\mathrm{S}}_{\mathrm{c}}\right)/\mathrm{k} $$(8) -
6.
Obtain extracted watermark by applying inverse Singular Value Decomposition (ISVD) using equation (19) and then inverse Discrete Cosine Transform (IDCT).
$$ {\mathrm{A}}_{\mathrm{ew}} = {\mathrm{U}}_{\mathrm{w}}{{*\ \mathrm{S}}_{\mathrm{w}}}^{*\ }{{*\ \mathrm{V}}_{\mathrm{w}}}^{\mathrm{T}} $$(9) -
7.
Decrypt the extracted watermark by applying inverse Arnold Transform to obtain final extracted Lump image watermark
-
8.
BPNN is then applied to extracted watermarks to remove noise and interferences in order to improve their robustness. Figure 2 shows the BPNN training process.
2.3 Embedding algorithm for text watermark
Text watermarks (Signature and Symptoms) are embedded into cover image [46] using following steps:
-
1.
Apply third-level DWT transform on cover image to decompose it into corresponding sub bands and select LH2 and LL3 sub bands.
-
2.
Convert the Signature text watermark into binary bits.
-
3.
Apply Hamming encoder algorithm to binary bits of Signature text watermark and replace (0,1) by (-1,1) in the watermarking bits.
-
4.
Apply Arithmetic Encoding to Symptoms text watermark and replace (0,1) by (-1,1) in the watermarking bits similar to step3.
-
5.
Embed the text watermarking bits obtained from Symptoms watermark to LH2 sub band of cover image and watermarking bits obtained from Signature watermark to LL3 sub band of cover image using equation.
$$ \begin{array}{cc}\hfill {\mathrm{A}}_{\mathrm{i}}^{\prime}\left(\mathrm{x},\mathrm{y}\right)={\mathrm{A}}_{\mathrm{i}}\left(\mathrm{x},\mathrm{y}\right)\left(1+\mathrm{k}*{\mathrm{Wbt}}_{\mathrm{i}}\right)\hfill & \hfill \mathrm{i} = \mathrm{Signature}\ \mathrm{and}\ \mathrm{Symptoms}\ \mathrm{text}\ \mathrm{watermarks}\hfill \end{array} $$(10)\( {\mathrm{A}}_{\mathrm{i}}^{\prime}\left(\mathrm{x},\mathrm{y}\right) \) and A(x,y) are DWT coefficients before and after embedding process, \( {\mathrm{Wbt}}_{\mathrm{i}} \) is text watermarking bits and k is the gain factor.
-
6.
Change LH2 and LL3 sub bands of cover image with the modified LH2* and LL3*sub band and apply Inverse Discrete Wavelet Transform (IDWT) to get watermarked image.
2.4 Extraction algorithm for text watermark
Text watermarks (Signature and Symptoms) are extracted [46] from watermarked image using following steps: -
-
1.
Apply third-level DWT transform on cover image to decompose it into corresponding sub bands and select LH2 and LL3 sub bands.
-
2.
Apply third-level DWT transform on watermarked image to decompose it into corresponding sub bands and select LH2* and LL3* sub bands.
-
3.
Extract watermark bits of Signature text watermark form LL3 sub band of cover image and LL3* sub band of watermarked image and Symptoms text watermark form LH2 sub band of cover image and LH2* sub band of watermarked image using equation
$$ {\mathrm{Wbt}}_{\mathrm{i}}^{\prime } = \frac{{\mathrm{A}}_{\mathrm{i}}^{\prime}\left(\mathrm{x},\mathrm{y}\right)-{\mathrm{A}}_{\mathrm{i}}\left(\mathrm{x},\mathrm{y}\right)}{\mathrm{k}*{\mathrm{A}}_{\mathrm{i}}\left(\mathrm{x},\mathrm{y}\right)}\mathrm{i} = \mathrm{extracted}\ \mathrm{Symptoms}\ \mathrm{and}\ \mathrm{Signature}\ \mathrm{Text}\ \mathrm{Watermark} $$(11)\( {{\mathrm{A}}_{\mathrm{i}}}^{\prime}\left(\mathrm{x},\mathrm{y}\right) \) and Ai(x,y) are DWT coefficients of cover and watermarked image respectively, \( {\mathrm{Wbt}}_{\mathrm{i}}^{\prime } \) is extracted text watermarking bits and k is the gain factor.
-
4.
Apply Arithmetic decoding process to obtained watermark bits of Symptoms watermark and convert watermark bits into text to obtain Symptoms text watermark.
-
5.
Apply Hamming decoder algorithm to obtained watermark bits of Signature watermark and convert watermark bits into text to obtain Signature text watermark.
3 Experimental Results and Analysis
The performance of the combined DWT-DCT-SVD watermarking algorithm has been evaluated in terms of quality of the watermarked image (PSNR), Bit Error Rate (BER) of text watermarks and robustness of the watermarked image (NC) using BPNN. The gray-scale medical CT-scan image of size \( 512\times 512 \) as cover image, the Lump image of size \( 256\times 256 \) is considered as image watermark. For the healthcare applications security of the watermark has become an important factor. The security of the image watermark is enhanced by using Arnold transform is applied before embedding in to the cover. Signature and symptoms watermarks are considered as text watermark of size 190 characters. Signature watermark contains the doctor’s signature/identification code and the symptoms watermark contains the patient diagnostic information. Robustness performance of the image watermark is improved by applying the Back Propagation Neural Network (BPNN). In order to reduce the BER performance of the proposed method, error correcting Hamming code (ECC) is applied to the ASCII representation of the signature watermark before embedding into the cover. In addition, lossless encoding method (Arithmetic coding) is applied on the symptom watermark which can be correctly retrieving the diagnostic information of the patient. Strength of watermarks is varied by varying the gain factor in the proposed algorithm. For testing the robustness of the extracted watermarks (both image and text) and visual quality of watermarked cover medical image MATLAB is used. Figure 3a–c shows the cover CT-scan image, Lump watermark image and watermarked images respectively. Figure 4 shows the Signature and Symptoms text watermarks.
Figure 5a and b shows the extracted watermarks with and without using the BPNN training respectively. The PSNR, BER and NC performance of the proposed method is shown in Tables 2, 3, 4, 5 and 6. In Table 2, the PSNR and NC performance of the proposed method has been evaluated without any noise attack. Without using the BPNN, the maximum PSNR value is 43.88 dB and NC value is 0.9344 at gain factor = 0.01. However, the NC value is obtained as 0.9547 with BPNN at the same gain. With BPNN, the maximum NC value is obtained as 0.9888 at gain factor = 0.08. However, the NC value has been obtained as 0.9861 without using the BPNN at same gain factor.
The BER value for signature watermark is ‘0’ at all considered gain factors. However, BER value of the Symptoms watermark is 0.2174 and 0.1087 for gain factors 0.01 and 0.02 respectively. Referring Table 2, we found that larger the gain factor, stronger the robustness and smaller the gain factor, better the visual quality of the watermarked image. The graphical representation of Table 2 is shown in Fig. 6. The gain factor ‘0.08’ is considered for the experimental purpose in Tables 3, 4, 5 and 6. Table 3 shows the PSNR, BER and NC (with and without using BPNN) performance of the proposed method for different size of text watermarks. The maximum PSNR value is obtained at gain factor 0.01, which is 43.95 dB. However, the NC value obtained is 0.9363 (without using BPNN) for 50 characters of Symptoms watermark at the same gain factor. Refereeing this table, the maximum NC value is 0.9889 (with BPNN) at gain factor 0.05 for 50 characters of Symptoms watermark. The BER value of the signature watermark is ‘0’ at all chosen gain factors. However, the BER value is 0.4202 for the Symptoms watermark at gain = 0.01. The maximum BER value is 0.4202, which can be recovered all the bits at higher gain value.
Table 4 shows the PSNR, BER and NC (with and without using BPNN) performance of the proposed method for six different cover images. With BPNN, the highest NC values (0.9888) have been obtained with MRI image at gain = 0.08 for Lump image. However the minimum NC value is 0.9638 for Mammography image at the same gain. Referencing this Table, the highest BER value has been obtained for Ultrasound image, which is 0.4348. However, the minimum BER value is ‘0’ for all other cover images except the Mammography and Ultrasound images. Figure 7 shows the graphical representation of Table 4. Table 5 shows the PSNR, BER and NC performance of proposed algorithm for different size of the symptoms watermark. In this table, the size of the Signature watermark is fixed and the size of Symptoms watermark is varied. Referring this table, the BER value is found to be ‘0’ for all different size of the symptoms watermark. Figure 8 show the graphical representation of Table 5. Table 6 shows the BER and NC performance of the proposed method for different attacks [39]. Without BPNN, the highest NC value has been obtained as 0.9852 for Gaussian low pass filtering. However, the lowest NC is 0.0025 for JPEG (QF=10) attack. With BPNN, the highest NC value has been obtained as 0.9889 for Gaussian low pass filtering. However, the lowest NC is 0.0123 for Median filtering attack. Refereeing this table, the highest BER of Symptoms and Signature watermark is 47.619 % and 0.4474 % for Crop attack respectively. However, the minimum BER value is ‘0’. Figure 9 show the graphical representation of Table 6.
Table 7 show the NC performance of the proposed method is compared with other reported techniques [17, 42]. The maximum NC value obtained by the Singh et al. [42] and Ganic et al. [17] is 0.9365 and 0.716 respectively. However, the maximum NC value obtained by the proposed method is 0.9883. Referring Table 7 it is established that the proposed method obtained NC value range from 0.6576 to 0.9883. However, NC value range as obtained by the Singh et al. from 0.569 to 0.9365 and Ganic et al. from -0.211 to 0.716. The proposed method offer higher robustness than the other two reported techniques. Finally, the quality of the watermarked image is evaluated by the subjective technique also [2] in Table 8. Six different persons are involved who have to vote for the quality of a medium in a controlled test environment. This can be done by simply providing a distorted medium of which the quality has to be evaluated by the subject. Referring Table 8 it is established that the quality of the watermarked images is acceptable for diagnosis at all the chosen gain factors except the gain factor = 0.2 and 0.5, which shows the poor/very poor visual quality of the watermarked image. Based on the above discussion, the proposed method highly depends on the gain factors, size if the image and text watermark and different noise variations.
4 Conclusion
In this work, a novel method for multiple watermarking based on DWT, DCT and SVD has been presented using Back Propagation Neural Network. The suggested method considered gray scale images for the experimental purpose. However, the watermark embedding into color image provides greater space against the watermark embedding into gray scale image. The performance of the watermarking system will greatly depends on the choice of color space and selection of embedding color channel. The main properties of the proposed work can be identified as follows: 1. The fusion of DWT, DCT and SVD offer better performance in terms of imperceptibility, robustness and capacity as compared to DWT, DCT and SVD applied individually 2. Embedding more than one watermark within the cover image reduces the storage capacity and the bandwidth requirements. The storage and bandwidth requirements are very important in medical applications. 3. To improve the robustness of the image watermark, Back Propagation Neural Network (BPNN) is applied to the extracted watermark which gives the higher Normalized Correlation (NC) values compared to without using the BPNN. 4. Security and confidentiality are provided by scrambling the Lump watermark using Arnold transforms before embedding into the cover. 5. Lossless arithmetic compression is applieded to Symptoms watermark before embedding in to the cover for the bit compactness. The lossless compression techniques is also preffered in medical applications in which every bit information is preserved before and after the compression process. 6. To increase the robustness of the signature watermark and reduce the channel distortion, Hamming error correcting code is applied to the watermark before embedding into the cover. 7. Finally, the visual quality of the watermarked image is evaluated by the subjective method also.
Therefore, proposed method provides a valuable solution for the prevention of patient identity theft in healthcare applications such as teleophthalmology, telemedicine, tele-diagnosis and tele-consultancy etc.
The inclusions of many techniques were combined to improve the robustness of the watermarks, visual quality of the watermarked image, capacity and security of the watermarks which is the prime objective of the research. However, it may have increased the computational complexity to some extent which needs to be investigated separately. In addition, the suggested method of wavelet based image watermarking can be extended for their application to video watermarking.
We would like to further improve the performance, which will be reported in future communication.
References
Agbaje MO, Awodele O, Ogbonna AC (2015) Applications of digital watermarking to cyber security (Cyber Watermarking), Proceedings of Informing Science & IT Education Conference (InSITE), pp 1–11
Ahmad R, Nilchi N, Taheri A (2008) A new robust digital image watermarking technique based on the discrete cosine transformation and neural network. International Symposium on Biometrics and Security Technologies, Islamabad, pp 1–7
Ahmed KA, Ahmad HA, Gaydecki P (2009) A blind block based DCT watermarking technique for gray level images using one dimensional Walsh coding. International conference on Current Trends in Information Technology, Dubai, pp 1–6
Ahmidi N, Safabakhsh R (2004) A novel DCT-based approach for secure color image watermarking. Proc Int Conf Inf Technol: Coding Comput (ITCC) 2:709–713
Ali M, WookAhn C, Siarry P (2014) Differential evolution algorithm for the selection of optimal scaling factors in image watermarking, Special issue on Advances in Evolutionary Optimization Based Image Processing. Eng Appl Artif Intell 31:15–26
Aslantas V (2009) An optimal robust digital image watermarking based on SVD using differential evolution algorithm. Opt Commun 282(5):769–777
Aslantas V, Dogan AL, Ozturk S (2008) DWT-SVD based image watermarking using particle swarm optimizer. IEEE International Conference on Multimedia and Expo, Hannover, pp 241–244
Aslantas V, Ozer S, Ozturk S (2009) Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Opt Commun 282(14):2806–2817
Barni M, Bartolini F (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791
Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3&4):313–336
Bowman D (2012) http://www.fiercehealthit.com/story/researchers-use-digital-watermarks-protect-medical-images
Chang CC, Tsai P, Lin CC (2005) SVD-based digital image watermarking scheme. Pattern Recogn Lett 26(10):1577–1586
Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography : survey and analyses of current methods. Signal Process 90(3):727–752
Chung KL, Yang WN, Huang YH, Wu ST, Hsu YC (2007) On SVD-based watermarking algorithm. Appl Math Comput 188(1):54–57
Elmisery AM, Rho S, Botvich D (2015) A distributed collaborative platform for personal health profiles in patient-driven health social network. International Journal of Distributed Sensor Networks (IJDSN), Hindawi Publishing Corporation, Vol. 2015, pp 1–12
Fan MQ, Wang HX, Li SK (2008) Restudy on SVD based watermarking scheme. Appl Math Comput 203(2):926–930
Ganic E, Eskicioglu AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies. Proceedings of the 2004 Workshop on Multimedia and Security, ACM, pp 166–174
Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Secure and efficient health data management through multiple watermarking on medical images. Med Biol Eng Comput 44:619–631
Guo J-M, Prasetyo H (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent 25(5):1149–1163
Hagan MT, Menhaj MB (1994) Training feed forward networks with the Marquardt algorithm. IEEE Trans Neural Netw 5(6):989–993
Jacobs RA (1988) Increased rates of convergence through learning rate adaptation. Neural Netw 1(4):295–308
Lai C-C, Tsai C-C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063
Makbol NM, Khoo BE, Rassem TH (2016) Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process 10(1):34–52
Mehto A, Mehra N (2016) Adaptive lossless medical image watermarking algorithm based on DCT & DWT. Proced Comput Sci 78:88–94
Mei S-c, Li R-h, Dang H-m, Wang Y-k (2002) Decision of image watermarking strength based on artificial neural-networks. Proceedings of the 9th International Conference on Neural Information Processing, pp 2430–2434
Mohananthini N, Yamuna G (2012) Watermarking for images using wavelet domain in Back- Propagation neural network. Adv Eng Sci Manag 100–105
Muhammad K, Sajjad M, Irfan M, Rho S, Baik SW (2015) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimed Tools Appl: Int J. doi:10.1007/s11042-015-2671-9
Nguyen TS, Chang CC, Yang XQ (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU-Int J Electron Commun 70(8):1055–1061
Niu Y, Cui X, Li Q, Ding J (2016) A SVD-based color image watermark algorithm in DWT domain. Adv Graph Commun Packaging Technol Mater, pp 303–309
Nyeem H, Boles W, Boyd C (2013) A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326–343
Ollove M (2014) www.usatoday.com/story/…/stateline-identity-thefts-medical…/5279351
Parashar P, Singh RK (2014) A survey: digital image watermarking techniques. Int J Signal Process Image Process Pattern Recognit 7(6):111–124
Potdar VM, Han S, Chang E (2005) A survey of digital image watermarking techniques. 3rd IEEE International Conference on Industrial Informatics, pp 709–716
Priya RL, Sadasivam V (2014) A survey on watermarking techniques, requirements, applications for medical images. J Theor Appl Inf Technol 65(1):103–120
Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1(3):32–44
Rumelhart DE, Hinton GE, Williams RJ (1986) Learning internal representations by error propagation, Parallel distributed processing: explorations in the microstructure of cognition. Vol. 1, Chapter 8, the M.I.T. Press, Cambridge, pp 318–362
Singh R (2015) Digital image watermarking: an overview. Int J Res (IJR) 2(05):1087–1094
Singh AK (2016) Improved hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools and Applications: An International Journal, Springer, 10.1007/s11042-016-3514-z
Singh P, Chadha RS (2013) A survey of digital watermarking techniques, applications and attacks. Int J Eng Innov Technol 2(9):165–175
Singh AK, Dave M, Mohan A (2015) Robust and secure multiple watermarking in wavelet domain, A Special Issue on Advanced Signal Processing Technologies and Systems for Healthcare Applications(ASPTSHA). J Med Imaging Health Inform 5(2):406–414
Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wirel Pers Commun: Int J 83(3):2133–2150
Singh AK, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl: Int J. doi:10.1007/s11042-015-2754-7. Springer
Singh AK, B Kumar, M Dave, Ghrera SP, Mohan A (2016) Digital image watermarking: techniques and emerging applications. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, IGI Global, USA, pp 246–272, 2016. DOI: 10.4018/978-1-5225-0105-3.ch011
Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective DWT Coefficients. J Med Imaging Health Inform 5(3):607–614
Terry M (2009) Medical identity theft and telemedicine security. Telemed e-Health 15(10):928–932
Terzjia N, Repges M, Luck K, Geisselhardt W (2002) Digital image watermarking using discrete wavelet transform: performance comparison of error correction codes. International Association of Science and Technology for Development
Vafaei M, Mahdavi-Nasab H, Pourghassem H (2013) A new robust blind watermarking method based on neural networks in wavelet transform domain. World Appl Sci J 22(11):1572–1580
Vogl TP, Mangis JK, Zigler AK, Zink WT, Alkon DL (1998) Accelerating the convergence of the backpropagation method. Biol Cybern 59(4):256–264
Wei Z, Li H, Dai J, Wang S (2006) Image watermarking based on Genetic algorithm. IEEE International Conference on Multimedia and Expo, Toronto, Ont., pp 1117–1120
Yang Q-t, Gao T-g, Fan L (2010) A novel robust watermarking scheme based on neural network. International Conference on Intelligent Computing and Integrated Systems (ICISS), IEEE, pp 71–75
Yen CT, Huang YJ (2015) Frequency domain digital watermark recognition using image code sequences with a back-propagation neural network. Multimed Tools Appl: Int J. doi:10.1007/s11042-015-2718-y
Zeng B (1999) Reduction of blocking effect in DCT-coded images using zero-masking techniques. Signal Process 79(2):205–211
Acknowledgments
The Author’s are sincerely thankful to the potential/ anonymous reviewer’s for their critical comments and suggestions to improve the quality of the paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zear, A., Singh, A.K. & Kumar, P. A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77, 4863–4882 (2018). https://doi.org/10.1007/s11042-016-3862-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3862-8