1 Introduction

Currently, the transmission of medical information through public networks is developing considerably, whether in telemedicine, telediagnosis, telesurgery, distance learning, or various applications related to the consultation of databases [10]. Telemedicine continues impressively to accurately represent a substantial role in the various medical applications [4], but the major problem remains the data exchange on the Internet [20], while preserving their intact integrity and patient confidentiality against the significant emergence of pirates [26]. In this specific context, several possible IT solutions traditionally based on access control techniques are available but they remain insufficient [36]. Therefore, the potential emergence of digital watermarking to typically contribute to medical image security shared on the expanded network [28]. Watermarking traditionally consists of carefully inserting a distinctive signature into the used image. The inserted watermark must be completely invisible to the human visual system HVS The insertion operation must not damage the used image [37]. Moreover the watermarking must be robust to possible attacks the mark must be recovered even if the image typically undergoes possible attacks of filtering compression [12] Etc. Following the development of medical information systems several watermarking approaches are proposed to ensure the medical image secures transmission [9]. These techniques can be grouped into two particular classes developed techniques traditionally working in the spatial domain and modern techniques typically working in the frequency domain. In spatial techniques [13] the watermark is inserted by directly modifying the pixel values of the host image. These methods are classic and inexpensive in terms of computing time. Frequency domain algorithms typically include the watermark not directly in the image but in a used transform of the explicit image [22]. This more robust type also allows choosing the pixels that will be more resistant to certain types of attacks [44]. Generally the approaches used in natural image watermarking are applicable for medical images, however, since a watermarking scheme must find a compromise between robustness, capacity and imperceptibility. In the case of medical images, the most important thing is to maintain good imperceptibility since these images will be used to treat a patient. These images will be analyzed by a doctor but can also be processed by diagnostic software, in which case even though the distortions caused by the watermarking process are invisible to humans, they can nevertheless generate calculation errors and thus distort the diagnosis. In this paper a blind watermarking approach is proposed to preserve medical images. In this innovative approach a DWT is appropriately applied to the medical image. The specific information made obtainable by the used DWT decomposition (specific frequency, precise location, possible orientation) allows an extremely delicate adjustment during insertion [15], and thus an extremely wide range of possibilities, hence the profusion of wavelet-based watermarking techniques. An SVD is then applied to the three subbands LL, LH and HL. The singular values accurately represent the image energy; the SVD typically puts the maximum image energy into a necessary minimum of singular values [38]. The singular values of a used image carefully preserve a remarkably superior stability, when a minor distortion (e.g. a mark) is properly included to an image; the singular values do not change significantly. In notable addition, the unique factorization in SVD is unique [32]. In our proposed approach, a possible combination of the three matrices of singular values properly acquired will be efficiently performed for the effective integration of the watermark bits. The proposed approach will be efficiently implemented to three various types of medical images (X-Ray, computerized tomography scan and ultrasound images). This will typically precisely allow defining for which distinct type of used images the proposed approach realistically is the most suitable and instantly offering the best compromise in capacity, imperceptibility and robustness. This document is structured as follows: Section 2 presents the recent associated work for DWT-based medical image watermarking, Section 3 will present the proposed approach, Section 4 will be dedicated to the experiment and numerical evaluation of the proposed scheme, the conclusion of this work and the perspectives are presented in Section 5.

2 Related works

As for the DCT transform which are used in coding, Wavelet transforms have undoubtedly gained significant popularity in the image watermarking community [14]. The psychovisually analyses satisfactorily performed optimize the encoders’ quantization tables and the multi-scale aspect of such transforms is suitable for a more robust distribution of the watermark [19]. Many published work has been done on watermarking using DWT and applied to various specific types of medical images.

2.1 Ultrasound medical images watermarking

In the innovative approach proposed by Badshah & al [6], the image is first divided into two essential parts, the used region of interest (ROI) and region of noninterest (RONI). The watermark represents a specific combination of the defined ROI and its hash value, this watermark is optimally compressed and embedded into the RONI part of the images in the least significant bits. In this work different compression techniques were evaluated and Lempel-Ziv-Welch (LZW) offers betters results for tamper detection and remarkable recovery watermarking of medical images. Khor & al [29] propose an ultrasound medical image watermarking technique; a parallel watermarking processing is done to speed up multiframes watermarking processing time. In this published work, a multicores technology is properly introduced for a parallel watermarking processing. Kishore & al [30] combine the RSA algorithm and discrete wavelets transform to protect ultrasound images. The patient image is first encrypted using RSA algorithm. For the integration process, different types of wavelet of different levels are tested to determine which level is the most suitable for the watermarking. Alshanbari & al [2] combine two different watermarking insertion practices. In this creative work, multiple watermarks are properly integrated into the medical image. A private key is first generated based on efficient SHA-256 algorithm exploiting the explicit image ROI. The ROI is optimally compressed with Lempel-Ziv-Welch (LZW) algorithm and then, combined with signature information (Fig. 1). The generated watermark is then inserted into the RONI region of host image.

Fig. 1
figure 1

Alshanbari & al watermarking scheme

2.2 Computerized tomography scans watermarking

Gajula & al propose a watermarking scheme [16] combining discrete wavelet transform and uniform distribution function. A one level DWT is carefully applied for both cover and initial image. Then singular value decomposition is properly applied to the LL sub bands of cover image. Then, a scaling factor is used as uniform distribution function for watermark integration by modifying the singular value S. Verma & al present a hybrid technique [43] combining DWT and SVD for the watermarking of medical images (to properly integrate the distinct advantages of both effective techniques). A DWT is carefully applied to the image to instantly get the different frequency sub-bands. Singular value decomposition is then applied to the LL sub-band. The watermark is properly integrated into the S-value using a scaling factor. The specific combination of the modified part S and the original parts U and V adequately provides a modified LL sub-band. An IDWT with the modified LL sub-band is finally applied to acquire the watermarked image. Anand & al proposes a multi-watermark embedding method for medical image [3]. The embedding watermark is typically composed of a text and an image. A four sub-band decomposition of the host image is first performed by applying a DWT. An SVD is carefully applied to the chosen HH sub-band, and the text is embedded in the singular value S. The image watermark is carefully divided into two sub images, these two parts are then integrated (after properly applying an SVD to both sub bands) into the singular S values of the HL and LH sub bands of the cover image. To positively enhance adequate security, the watermarked image is then encrypted using Hyperchaotic encryption algorithm. Memon & Gilani [33] propose a fragile watermarking technique to ensure the integrity of the medical image. In this approach (Fig. 2), the watermark is composed of patient information, hospital logo and message authentication code computed using a hash function. To avoid distortions in the region of interest (ROI) and retain the diagnosis information, the watermark is embedded in the region of non-interest (RONI) by replacing the least significant bits in the medical image. To enhance the watermark security, the watermark is encrypted before the integration.

Fig. 2
figure 2

Memon & Gilani watermarking scheme

2.3 X-ray medical images watermarking

Assini & al [5] proposes a robust watermarking scheme combining discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD). A DWT is correctly applied to the medical image to properly obtain different frequency sub-bands. Then a DCT is applied to the chosen HH sub-band. An SVD is then applied to the obtained DCT coefficients. Finally, the watermark is integrated into the singular values obtained from the HH high-frequency sub-band of the medical image. Falgun & al propose a blind watermarking scheme combining discrete wavelet transform and singular value decomposition []. A DWT is carefully applied to the specific regions of interest in the medical image to properly obtain different frequency sub-bands. At that time, to obtain the different singular matrices, a specific block SVD is correctly applied. The watermark bits are then integrated into the similar left singular value matrix values using appropriate thresholding to carefully maintain imperceptibility and robustness. In the innovative approach presented by Gangadhar & al [17], a sub-band decomposition of the medical image is first performed by carefully applying a DWT. Next, an SVD is applied precisely to the LL subbands. To correctly determine the most suitable regions for the integration process, the particle swarm optimization algorithm is then applied to the LL subbands. Thanki & al [42] proposes a blind medical image watermarking scheme based on Fast Discrete Curvelet Transform (FDCuT) and Discrete Cosine Transform (DCT). As we can see in Fig. 3, FDCuT is applied on the medical image to get different frequency coefficients of its curvelet decomposition. Block wise DCT is then applied to get different frequency coefficients from the high frequency curvelet coefficients. Finnaly, to get watermarked medical image, White Gaussian Noise (WGN) is used to modifie the midband frequency coefficients of the medical image.

Fig. 3
figure 3

Thanki & al watermarking scheme

3 Proposed watermarking scheme

In a fragile watermarking system, the watermark is extremely sensitive to the watermarked image modifications. This innovative approach ensures the authenticity and integrity of a watermarked file. Robust watermarking is typically used to carefully preserve hidden data from possible attacks [32]. The key goal of our used approach is to guarantee the authenticity and integrity of a watermarked medical image while adequately incorporating a watermark that is sufficiently resistant to possible attacks to remain identifiable. Like any watermarking technique, our used approach consists precisely of three distinct stages, the watermark generation, the insertion process and the successful extraction of the watermark.

3.1 Watermark generation

The watermark used in our innovative approach is composed of patient information and the established hospital’s unique signature (Fig 4). The successful extraction of this distinguishing mark will thus clearly authenticate and correctly identify the potential patient as well as the private establishment that generated the medical image. To guarantee the integrity of this information, a hash of this information is added to the watermark. Thus, the slightest modification of the information can be detected.

Fig. 4
figure 4

Watermark generation process

3.2 Integration process

Academic research on the human visual system (HVS) typically indicates that for an classic image, most energy is concentrated in the low frequencies and the human eye is sensitive to possible changes in the low frequency band [31]. To make the watermarks undetectable to the human visual system (HVS) the insertion must be done in the high-frequency coefficients of the image. However, the effective integration of the watermark in the high frequencies typically makes it extremely sensitive to attacks (efficient compression, filtering, etc.) operations that consist precisely in removing high-frequency data. In the specific case of robust watermarking, the watermark is carefully inserted in the low frequencies (the most significant components) to inevitably make the image robust to possible attacks while minimizing the perceptual distortions generated by the integration process [23]. In our work, for the watermark insertion, a DWT is properly applied to the medical image; the host image is decomposed into four frequency sub-bands: LL (approximate detail) which accurately represents the low frequency details and HL (horizontal detail) and specific LH details which represents the medium frequencies and HH (diagonal detail) which represents the high frequencies [11]. Because of the robustness of the integration in the high-frequency coefficients and the imperceptibility of the integration in the low-frequency coefficients, an SVD is carefully applied to the three subbands LL, LH and HL (Fig 5). The three resulting singular value matrices are then combined to properly integrate the watermark bits.

Fig. 5
figure 5

Integration process

3.2.1 Discrete wavelet transform (DWT)

The wavelet transform is typically based on the similar principle as the Fourier transform [25], except that the complex sinusoid is weighted by a centered, windowed function with a null integral. This function can be of different types, but always has the characteristic, following compression or expansion, to adapt to the frequency of the signal [7]. Indeed, a temporal compression of the wavelet leads to a considerable increase of the specific frequency, while a temporal expansion typically decreases it. In standard practice, for used images, the wavelet decomposition is typically carried out using a multi-resolution decomposition carried out with adaptive filters [39]. It is carried out through a succession of directional low-pass and high-pass filtering, followed by sub-sampling. These filtering and sub-sampling are performed n times, n typically corresponding to the appropriate level of the functional decomposition. To get the complex coefficients of each local sub-band, we can accurately calculate with the Haar filter as follows:

$$ LL\left(x,y\right)=\frac{\mathrm{p}\left(\mathrm{x},\mathrm{y}\right)+\mathrm{p}\left(\mathrm{x},\mathrm{y}+1\right)+\mathrm{p}\left(\mathrm{x}+1,\mathrm{y}\right)+\mathrm{p}\left(\mathrm{x}+1,\mathrm{y}+1\right)}{2} $$
(1)
$$ LH\left(x,y\right)=\frac{\mathrm{p}\left(\mathrm{x},\mathrm{y}\right)+\mathrm{p}\left(\mathrm{x},\mathrm{y}+1\right)-\mathrm{p}\left(\mathrm{x}+1,\mathrm{y}\right)-\mathrm{p}\left(\mathrm{x}+1,\mathrm{y}+1\right)}{2} $$
(2)
$$ HL\left(x,y\right)=\frac{\mathrm{p}\left(\mathrm{x},\mathrm{y}\right)-\mathrm{p}\left(\mathrm{x},\mathrm{y}+1\right)+\mathrm{p}\left(\mathrm{x}+1,\mathrm{y}\right)-\mathrm{p}\left(\mathrm{x}+1,\mathrm{y}+1\right)}{2} $$
(3)
$$ HH\left(x,y\right)=\frac{\mathrm{p}\left(\mathrm{x},\mathrm{y}\right)-\mathrm{p}\left(\mathrm{x},\mathrm{y}+1\right)-\mathrm{p}\left(\mathrm{x}+1,\mathrm{y}\right)+\mathrm{p}\left(\mathrm{x}+1,\mathrm{y}+1\right)}{2} $$
(4)

For each level we typically obtain four images:

  • The low-pass or approximation image that will be filtered out at the following level,

  • Horizontal high-pass image,

  • The vertical high-pass image,

  • The resulting difference image (diagonal high pass).

3.2.2 Singular value decomposition (SVD)

Currently, singular value decomposition is used in various image processing applications like compression, information hiding and noise reduction [27]. Any complex matrix A of considerable size m*n of rank r (the established rank of the complex matrix A represent the specific number of non-zero singular values). Next there is an orthogonal matrix U of explicit order m*m, an orthogonal matrix V of order n*n and a “pseudo-diagonal” matrix S of dimension r [41] such that A:

$$ A=U\ast S\ast {V}^t={\sum}_{i=1}^n\left({\sigma}_i\ast {u}_i\ast {v}_i^t\right) $$
(5)

Where S is a matrix where the r first diagonal terms are positive, all the others being null. The r non-zero terms σi are called singular values of A.

$$ S=\left\{\begin{array}{ccc}{\boldsymbol{\sigma}}_{\boldsymbol{i}}& \dots & \mathbf{0}\\ {}\vdots & \ddots & \vdots \\ {}\mathbf{0}& \dots & {\boldsymbol{\sigma}}_{\boldsymbol{n}}\end{array}\right\} $$
(6)

3.2.3 Substitution process

In our flexible approach, a substitutive watermarking is used for the proper integration of the watermark bits. The substitutive watermarking modifies the possible bits of the host image to carefully match the watermark. This specific type of watermarking is correctly identified as constraint watermarking, because it typically forces the host image to adequately meet certain unique properties that positively influence the watermark. As we can see in Fig. 3, the singular values LL-S, LH-S and HL-S of the three sub-bands LL, LH and LH respectively are combined to properly integrate two watermark bits X and Y. Using the Eq. 7, the parity of these three complex coefficients is calculated, and then only one of these used coefficients is modified to sufficiently satisfy the equality of the complex equations:

$$ \left\{\begin{array}{c} LHS++, If\left(\left(X\ne \left( LLS\hbox{--} LHS\right)\%2\right)\ and\ \left(Y=\left( LLS\hbox{--} HLS\right)\%2\right)\right)\\ {} HLS++, If\left(\left(X=\left( LLS\hbox{--} LHS\right)\%2\right)\ and\ \left(Y\ne \left( LLS\kern0.5em \hbox{--} HLS\right)\%2\right)\right)\\ {} LLS++, If\left(\left(X\ne \left( LLS\hbox{--} LHS\ \right)\%2\right)\ and\ \left(Y\ne \left( LLS\kern0.5em \hbox{--} HLS\ \right)\%2\right)\right)\end{array}\right. $$
(7)

These used rules allow modifying only the parity of a single coefficient, so for the successful integration of two bits of the watermark a particular bit will be modified, the inequality must be modified to match the equations to the watermark bits, this will allow the successful extraction of the watermark in blind mode (without manipulating the initial image). The intended receiver will only just have to properly apply developed equations to instantly get the watermark bits without manipulating the initial image.

3.3 Extraction process

The detection step consists precisely of carefully extracting the private patient’s necessary data as well as the unique signature of the private hospital or the allowed doctor. Depending on the extraction process, the watermark is qualified as non-blind if the initial image is employed to generate the mark. In a semi-blind mode the receiver must retain only the distinctive mark in addition to the insertion key. If the accurate detection of the hidden information is done directly from the watermarked image without knowledge of either the initial image or the used mark, the watermark is considered as blind [8]. As the proposed watermarking is blind, the original image will be unnecessary for the extraction process. The detection algorithm will subsequently follow the inverse operations at insertion (Fig 6). A DWT is applied then, Singular value decomposition will be applied to the three subbands (LL, HL and LH). The Eq. 8 will be applied to extract the watermark bits using the three coefficients LLS, HLS and LHS.

$$ \left(X=\left( LLS\hbox{--} \boldsymbol{LHS}\right)\%2\right)\ and\ \left(Y=\left( LLS\hbox{--} HLS\right)\%2\right) $$
(8)
Fig. 6
figure 6

Extraction process

An essential part of the extracted bits will be handled to accurately build up the patient details, and the other segment will be used to reconstruct the hash of this specific information. It will then be possible to check the integrity of the extracted data by properly comparing the extracted hash with the hash computed from the patient information.

4 Experimental results and discussions

To experiment the proposed approach, the practical tests will be performed on three types of medical images. The first experiments will be performed on CT images [1]; this dataset was designed to allow for different methods to be tested for examining the trends in CT image data associated with using contrast and patient age (Fig 7). The data are a tiny subset of images from the cancer imaging archive. They consist of the middle slice of all CT images taken where valid age, modality, and contrast tags could be found. This results in 475 series from 69 different patients.

Fig. 7
figure 7

CT images used for the analysis of the proposed scheme

The second experiments will be performed on X-Ray images. For that, we used the COVID-19 radiographic database [35]. This current release contains 219 COVID-19 positive images, 1341 normal images and 1345 viral pneumonia images. All the images are in Portable Network Graphics (PNG) file format and resolution is 1024-by-1024 pixels (Fig 8), which can be easily converted to 224-by-224 or 227-by-227 pixels typically required by the popular Convolutional Neural Networks (CNNs).

Fig. 8
figure 8

X-Ray images used for the analysis of the proposed scheme

The third experiments will be performed on ultrasound images for this purpose we used an ultrasound images database from the Brno University of Technology [45]. This database contains images of ten volunteers with different weight. Images were acquired with Sonix OP ultrasound scanner with different set-up of depth, gain, time gain compensation (TGC) curve and different linear array transducers (Fig 9). The image database contains 84 B-mode ultrasound images in longitudinal section. The resolution of images is approximately 390x330px.

Fig. 9
figure 9

X-Ray images used for the analysis of the proposed scheme

In order to conduct experiments on natural images, we have also used the FER-2013 dataset [18]. In this database, the data consists of 48 × 48 pixel grayscale images of faces (Fig 10). The faces are automatically registered so that the face is more or less centred and occupies about the same amount of space in each image.

Fig. 10
figure 10

Natural images used for the analysis of the proposed scheme

The precise measurements of image quality will typically allow us to perform a comparative study of the adaptability of this developed method to these three specific types of images. As we can see in the Fig. 11, the initial and watermarked images are visually similar and the distortions caused by the integration process are visually undetectable. Because of the multiple applications traditionally considered and the various criteria involved, it is delicate to carefully evaluate a watermarking algorithm; however it is possible to correctly identify some essential elements for the objective evaluation of watermarking like the necessary quality of the watermarked image and the robustness of the developed technique against various attacks.

Fig. 11
figure 11

Watermarked medical images after embedding the watermark contents

The experimental results are typically based on two distinct stages to properly evaluate our effective approach: the first is dedicated to invisibility, and the second is devoted to robustness against possible attacks.

4.1 Imperceptibility and capacity test

To assess the image quality, either objective or subjective measurement is used. Subjective measurements are always expensive, especially if we work with a large sample of medical images. Objective measurements are typically based on a pixel-by-pixel comparison between the initial image and the watermarked image. Objective measurements are based on a pixel-by-pixel comparison between the initial image and the watermarked image:

  • One of the most popular distortion measures in image processing is the Peak Signal to Noise Ratio (PSNR). The PSNR obtained values between host images (initial images) and watermarked images, in decibels (dB), is typically used to test the considerable distortion introduced by the watermark between these two images [21]. This used ratio is ordinarily used as a necessary measure of the visual quality of the original image relative to the watermarked image. The higher the PSNR, the better the visual quality of the watermarked image. It is traditionally defined by the following formula:

$$ PSN{R}_{dB}=10\ {\mathit{\log}}_{10}\left[\ \mathrm{M}\ast \mathrm{N}\frac{\max {I}^2\left(i,j\right)}{\sum i,j\ {\left[\ I\left(i,j\right)-J\ \left(i,j\right)\right]}^2}\right] $$
(9)

Where I (i, j) is the value of the luminance of the reference pixel (i, j) and J (i, j) that of the image to be tested, the two images being of size [M x N].

  • The MSE provides information on the degradation or perceptual distortion introduced at the pixel level [24]. The lower the MSE value, the better the watermarked image is sufficiently appreciated. It is typically defined by the following formula:

$$ \mathrm{MSE}=\frac{1}{M\ast N}{\sum}_i{\sum}_j{\left(\ I\left(i,j\right)-J\left(i,j\right)\right)}^2 $$
(10)

Where I (i, j) is the value of the luminance of the reference pixel (i, j) and J (i, j) that of the image to be tested, the two images being of size [M x N].

  • SSIM (Structural SIMilarity) is a measure of essential similarity between two images. It has been developed to measure the visual quality of a compressed image compared to the initial image [34]. The idea of SSIM correctly is to accurately measure the similarity of used structure between the two used images, rather than a pixel-to-pixel difference as is traditionally done for example by PSNR. The SSIM metric is calculated over multiple windows of an image. The precise measurement between two x and y windows of size N x N is:

$$ \mathrm{SSIM}\ \left(\mathrm{x},\mathrm{y}\right)=\frac{\left(2{\upmu}_{\mathrm{x}}{\upmu}_{\mathrm{y}}+{\mathrm{C}}_1\right)\left(2{\updelta}_{\mathrm{x}\mathrm{y}}+{\mathrm{C}}_2\right)}{\left({\upmu}_{\mathrm{x}}^2+{\upmu}_{\mathrm{y}}^2+{\mathrm{C}}_1\right)\left({\updelta}_{\mathrm{x}}^2+{\updelta}_{\mathrm{y}}^2+{\mathrm{C}}_2\right)} $$
(11)
Where: μx:

Average of x

μ y :

average of y

\( {\delta}_x^2 \) :

variance of x

\( {\delta}_y^2 \) :

variance of y

δ xy :

covariance of x y

C=k1 L2:

Constant to avoid instability when \( {\mu}_x^2+{\mu}_y^2 \) is close to zero; k1 = 0.01, =255.

C2=k2 L2:

Constant to avoid instability when \( {\delta}_x^2+{\delta}_y^2 \) is close to zero; k2 = 0.03, =255.

  • Number of pixels changed ratio: The NPCR typically indicates the number of pixels modified by the integration process, it is accurately calculated by comparing the pixels of the initial images (CI1) and watermarked image (CI2).The two used images being of size [M * N]. The NPCR is precisely defined by the following formula:

$$ \mathrm{NPCR}={\sum}_{\mathrm{i}=1}^{\mathrm{M}}{\sum}_{\mathrm{j}=1}^{\mathrm{N}}\frac{\mathrm{D}\left(\mathrm{i},\mathrm{j}\right)}{\mathrm{T}}\ast 100\% $$
(12)
$$ \mathrm{D}\ \left(\mathrm{i},\mathrm{j}\right)=\left\{\begin{array}{c}0,\kern0.5em \mathrm{if}\ {\mathrm{CI}}_1\left(\mathrm{i},\mathrm{j}\right)={\mathrm{CI}}_2\left(\mathrm{i},\mathrm{j}\right)\\ {}1,\kern1em \mathrm{if}\ {\mathrm{CI}}_1\left(\mathrm{i},\mathrm{j}\right)\ne {\mathrm{CI}}_2\left(\mathrm{i},\mathrm{j}\right)\end{array}\right. $$
(13)
  • Bits Per Pixel allow to measure payload capacity, it accurately represents the possible number of bits integrated objectively compared to the image’s pixel count.

$$ \mathrm{BPP}=\frac{\mathrm{Number}\ \mathrm{of}\ \mathrm{secret}\ \mathrm{bits}\ \mathrm{embedded}}{\mathrm{Total}\ \mathrm{pixels}\ \mathrm{in}\ \mathrm{the}\ \mathrm{cover}\ \mathrm{image}} $$
(14)

The obtained results in Table 1 show very clearly that our proposed approach offer reasonable imperceptibility while adequately incorporating a large amount of necessary information. The successful integration of two bits is achieved by the (eventual) necessary modification of only one out of three coefficients. This reduces the number of necessary modifications performed as sufficiently demonstrated by the NPCR rate, which remains low despite the effective integration. This adequately explains the obtained high PSNR rates and the similarity index rate which proves the proposed approach is highly imperceptible. To properly evaluate the imperceptibility of our elaborate scheme, the obtained PSNR rates have been carefully compared to those of the comparable work presented in Section 2.

Table 1 Imperceptibility results

In order to evaluate the performance of our approach on natural images, we conducted experiments on natural images and compared the rates of PSNR obtained. As we can see in Table 1, the results obtained are almost similar to the results obtained with X-Ray and CT images. As we can see in Table 2, the obtained PSNR rates for the proposed scheme are satisfactory in established relation to recent comparable work. The combination of the parity of the coefficients hides a large amount of data while modifying a reasonable amount of information. This efficiently generates less perceptual distortion and adequately maintains good image quality. In notable addition, since the singular values of the image are stable, adding a slight amount of specific information to the image does not significantly change the singular values. This graciously adequately allows maintaining a good imperceptibility level.

Table 2 Imperceptibility results comparison with related work

4.2 Robustness test

The possible attack is typically defined as any treatment that may subtly alter the mark or cause confusion during its extraction. Several distinct types of attacks can be sufficiently distinguished, which may be intentional or unintentional. Among these classic attacks we consider the addition of noise; Filtering; Lossy compression, mainly JPEG; Geometric transformations (shift, rotation, zoom, slicing...); Analog-to-digital conversion, etc. In the context of medical image watermarking, these images can suffer, particularly, from attacks that can lead to an incorrect diagnosis or an authentication error. To confirm the robustness of our innovative approach against conventional watermarking attacks, we properly applied JPEG compression, Salt & Pepper noise, rotation attack on the watermarked image and some commonly used attacks.

Tables 3, 4 and 5 illustrates obtained performance results in specific terms of NCC. This necessary measure was appropriately applied between the original inserted mark and the extracted mark from the attacked watermarked image. Since the specific Low frequency typically carries most of the valuable information while High frequency includes least valuable information. In our work, for embedding watermark information the low frequency subbands were preferred. It allows us to have a more robust image to attacks like compression where high frequencies in the image are deleted. In addition, a Low Pass Filter does not affect the low frequency components in the image data but should attenuate the high-frequency components. The effective integration of the watermark in the high frequencies will typically imply its possible removal in specific case of image compression or filtering. The results show that even with a significant attack that eliminates a part of the image content, the mark may still properly recovered or carefully extracted with a very satisfactory quality. It is clear that the mark is very well preserved even with the presence of attacks such as compression, noise and cropping.

Table 3 Robustness comparison with related work for CT images watermarking
Table 4 Robustness comparison with related work for X-Ray images watermarking
Table 5 Robustness comparison with related work for ultrasound images watermarking

4.3 Discussion

In this work a watermarking approach combining DWT and SVD has been proposed. The considerable advantages of schemes that popularly use the frequency domain as the insertion domain are robust to compression operations since they typically operate the similar domain. On the other hand, the complex calculation of the transform of an image has become less expensive because of the fast transform algorithms. SVD is a crucially important factorization tool in the specific field of image processing, because of its algebraic properties it is more used in digital watermarking. The used SVD transform typically allows concentrating all the maximum energy of the used image into the minimum singular values. The used SVD transform represents a mathematical tool absolutely necessary in image processing and more used in digital image watermarking which typically produces good results in specific terms of invisibility and robustness. Experimental results have shown this technique provides a satisfactory visual quality of the image and a perfect robustness against some attacks like cropping, JPEG compression and also rotation. Scientifically based on the satisfactory results we can reasonably conclude the proposed approach is more suitable for X-Ray images. This innovative approach typically offers better results in practical terms of imperceptibility and robustness compared to recent comparable work.

However, this approach suffers from the DWT poor directional information and the SVD complexity. Effectively, DWT is a typical multi-scale transform (MST) method that does not have the translation-invariance property. In addition, DWT decompose the image into one low-frequency sub-band and three high-frequency sub-bands (horizontal, vertical, and diagonal). Only three decomposition directions are not enough to represent textures of different scales. To fix this problem it would be interesting in our future work, to use non-subsampled MST methods, such as non-subsampled contourlet transform (NSCT) or non-subsampled shearlet transform (NSST). In addition, Schur decomposition could be an alternative to the singular values decomposition. Singular value decomposition requires about 11N3 flops as compared to a Schur decomposition which requires only 8N3/3. In order to reduce computation time and complexity, it would be advantageous to use schur decomposition instead of singular value decomposition.

However, in the proposed approach the watermark is not encrypted. To increase the watermark’s security, an encryption can be added before the integration process. For this, two options will be possible. The first one will be to use a public key infrastructure, in this approach; each doctor will have a public and a private key. The doctor will then sign the image with his private key; this will guarantee the integrity of the watermark and can be verified by all those who have access to the infrastructure using the doctor’s public key. The second approach will consist in generating a symmetric key before each transfer, the watermark will then be encrypted with this key by the sender and the receiver (holder of the same key) will be able to decrypt the watermark. As this key is similar for both responsible parties, symmetrical encryption could be properly used to take advantage of its reasonable speed (about eight times faster than asymmetrical encryption).

5 Conclusion

To enhance the security of data exchanged in telemedicine, we had proposed in this work a watermarking approach combining DWT and SVD. The proposed approach protects the images exchanged in telemedicine but also avoids any confusion between patient records (even at the local level). As we can see nowadays, medical samples are transmitted to specialized centers. The data collected from patients must be handled with care, in fact, it is necessary to avoid confusing two different radiographies of two different patients; confusion in such a pandemic could have serious consequences for the patient. For this reason the watermark provides a satisfactory solution, since as soon as the patient’s information is acquired, it is integrated into the image. Even after the image has been transferred or stored, the doctor will be able to state with certainty that the image really belongs to the patient being treated. The proposed approach has been experimented at a local level; the implementation of such an approach in a medical network for a telemedicine infrastructure will therefore be easy and inexpensive. It will just consist in integrating a module to the image acquisition and storage system, in order to watermark the image just after its acquisition. The goal is thus to protect it even at the local level.