Abstract
Due to the vast development of medical image technologies the orientation, dimension, and format of the medical images are changing drastically. The volume of these data is also changing drastically in the current scenario due to the unwanted pandemic circumstances. The copyright protection and privacy of these data is also the need of the present era. Image watermarking is one of the best methods to provide copyright protection to the medical images. The proposed watermarking method provides copyright protection to NIfTI (Neuroimaging informatics technology initiative) images by using Redundant discrete wavelet transform (RDWT), Randomized singular value decomposition (RSVD), Hessenberg decomposition (HD) along with discrete cosine transform (DCT). Watermark image (Aadhar card) is splits into two parts, further two hybrid watermarks are generated from these parts to enhance copyright protection. To get the optimum scaling factor two different optimization techniques i.e., Particle swarm optimization (PSO) and Bat optimization (BO) are used. Speeded up robust features (SURF) and Binary robust invariant scalable keypoints (BRISK) are used for critical region of interest (ROI) verification. Secured hash algorithm (SHA) is used to generate the hash values corresponding to the media access control (MAC) and patient number generated by hospital. The average percentage improvement in imperceptibility is 20.34% and in robustness is 11.54%.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
In tele-medical services, security and privacy of medical information are often highlighted as key concerns [1]. So, it was necessary to develop a method to ensure safety and confidentiality for tele-health services when exchanging patient records via networks. The tele-medical services handle, preserve, and transmit medical records using cutting-edge, cost-effective information technology (IT) systems for a variety of purposes [1]. These services are practical and may be helpful in the medical field, but they also pose a risk of identity theft, privacy invasion, and data tampering at the same time [2]. The modern medical era uses various formats of medical images as per the requirement. Neuroimaging informatics technology initiative (NIfTI) is a format for the storage and representation of medical images. The NIfTI format exists in two different variations: NIfTI-1 and NIfTI-2. The supported data types, accuracy, and voxel size of NIfTI-1 are all improved in NIfTI-2 [10]. Figure 1 shows the comparison between NIfTI and Digital imaging and communications in medicine (DICOM) formats. The copyright protection of these images is the major concern due to their use by the doctors in modern disease diagnosis. The total number of security incidents handled by the Indian computer emergency response team (CERT-In) in 2022 was 1391457 (https://www.cert-in.org.in/s2cMainServlet?pageid=PUBANULREPRT). In which phishing is 1714, probing is 324620, vulnerable services are 875892, malicious codes are 161757, website defacements are 19793, malware propagation is 2164, and others are 5517. These attacks are exponentially increasing yearly, which affects the whole digital ecosystem.
The following are the major novelties of the proposed work:
-
(1) Dual authentication with real-time verification:
The proposed watermarking is highly imperceptible and uses dual authentication. SURF [9] and BRISK [13] feature authentication is used for concerned ROI verification of medical NIfTI images. SURF features are computationally more efficient as well as invariant to blur, scale, rotation, noise, Illumination, and warping [9]. BRISK features are more efficient than SURF [13]. The identity of patient is also verified at the receiver’s end using real time cloud data transfer.
-
(2) High robustness with better quality extraction:
The combination of RDWT [3], RSVD [12], HD [4], and DCT [5] provides high robustness and the quality of the extracted watermark image is also better. RDWT provides a vital advantage over traditional transforms as it is shift invariant [8]. RSVD is used instead of conventional singular value decomposition (SVD), as RSVD has lesser computational complexity than SVD and also requires less memory storage [8]. DCT converts the image into various frequency ranges which further enhances the imperceptibility by selective embedding [5].
-
(3) Optimized scaling factor:
Scaling factor plays an important role to balance the crucial properties of a watermarking system. The proposed watermarking method uses two different optimization technique i.e., PSO [5] and BO [21]. The comparison of these two techniques based on performance parameters are also computed.
-
(4) Enhanced security:
SHA-384 [14] is used to generate the hash value corresponding to MAC address and SHA-512 [14] is used for identity number of patient generated by hospital. Further the Aadhar card of patient is splitted into two parts and previously generated hash values are used to get the hybrid watermark with the help of lifting wavelet transform (LWT) [18, 19] and RSVD.
The rest of the paper is organized as follows: Section 2 contains the literature survey and concerned problems. Preprocessing steps are discussed in Section 3 while Watermark embedding and extraction process is included in Section 4. The simulation results analysis and discussion are mentioned in Section 5. Comparison of results are done in Section 6 whereas conclusion and future works are included in Section 7. Figure 2 shows the organization of paper graphically.
2 Literature survey
In this section, state-of-the-art literature survey is discussed. A novel watermarking technique using Hamming code for channel noise distortion is proposed in [1]. The combination of encryption and compression is used for embedding. Three different compression techniques and their comparison are also mentioned. The work proposed [1] is highly robust and imperceptible but can further be improved for rotation and cropping type of attacks. Hybrid PSO and firefly optimization-based watermarking is proposed in [2]. RDWT and RSVD is used for embedding. Hybrid watermark is generated is generated by using computational inefficient discrete wavelet transform (DWT) and SVD. Encryption technique is used to enhance the security of the proposed work. The proposed work can further be improved against geometric type of attacks.
RDWT-RSVD based image watermarking techniques with enhanced security is proposed in [3]. Hash value and turbo code are used for generation of intermediate watermark. The proposed method tested for various scaling factor. The scaling factor can further be evaluated using optimization techniques and performance can be improved against histogram equalization.
Robust and imperceptible watermarking with HD along with PSO and JAYA optimization (JO) is proposed in [4]. The comparison of different wavelets and optimization techniques are also evaluated. The comparison of LWT and discrete wavelet transform (DWT) is mentioned in [5]. The comparison of PSO and JO are also calculated for different parameters. The proposed method can further be improved against geometric type of attacks.
The comparison of PSO and JO is mentioned in [6]. The block like structures is appeared when the watermark image is extracted against rotation and dither attacks. LWT-DCT-SVD along with Schur decomposition (SD) based DICOM image watermarking technique is proposed in [7]. Firefly optimization technique is used to get the optimum scaling factors and make a proper balance between the vital properties of watermarking. SURF features are used for feature verification. A novel BacterialWmark technique is proposed in [8]. Bacterial foraging optimization technique is used for optimum scaling factor. Homomorphic transform with DWT based robust watermarking technique is proposed in [11]. The robustness can further be improved against geometric type of attacks. NIfTI image watermarking method is proposed in [14] with the combination of LWT and Arnold map (AM). Robustness of this method can be improved further against various attacks. NIfTI image watermarking with LWT, QR decomposition and Multiresolution SVD is proposed in [15].
Singh et al. [16] proposes a NIfTI image watermarking by the utilization of LWT, QR, and multiresolution SVD. Multiple watermarks are used to enhance the copyright protection. The robustness of the proposed method can be further enhanced against some of the attacks. A multifunctional medical image watermarking technique is presented by Sinhal et al. [17] to provide ownership protection, tamper detection (for ROI and other region of non-interest (RONI) segments), and 100% reversible self-recovery of the ROI. Using the Lempel–Ziv-Welch technique, the recovery information of the host image's ROI is first compressed. After that, a transform domain based embedding approach is used to implant the strong watermark into the host image. Additionally, the SHA-256 technique is used to construct the 256-bit hash keys for the robust watermarked image's ROI and eight RONI regions. Using an LSB replacement based fragile watermarking approach, the compressed recovery data and hash keys are merged and then inserted into the segmented RONI area of the robust watermarked image.
An effective watermarking method is presented by Thakur et al. [20] to improve the effectiveness of the DWT-SVD-based strategy. The methodology reduces channel noise distortion and enhances technique security by utilizing well-known error-correcting code and chaotic encryption, respectively. The sub-bands are chosen for the watermark embedding after DWT transforms the cover image. The chosen sub-bands are then subjected to additional transformation via SVD.
Tan et al. [22] proposes a steganography approach-based on generative adversarial networks. The suggested concept consists of three subnetworks: an extractor takes the payload out of stego images, a generator embeds it in cover images, and a potent steganalysis serves as a discriminator to improve steganographic security. By taking use of channel interdependencies, this work constructs a particular channel attention module that dynamically tunes channel-wise characteristics in the deep representation of images. In order to divide the embedding capacity among RGB channels adaptively, Liao et al. [23] present a novel channel-dependent payload division technique based on amplifying channel modification probability. To enhance empirical steganographic security against the identification of channel co-occurrences, the modification probabilities of three corresponding pixels in RGB channels are simultaneously enhanced. This could lead to a clustering of embedding impacts.
Based on image texture attributes, an adaptive payload distribution in multiple images steganography technique is presented in [24]. It also offers a theoretical security analysis from the perspective of the steganalysis. In this work, two payload distribution algorithms are described, one based on image texture complexity and the other on distortion distribution. The suggested tactics can be utilized in conjunction with these cutting-edge single picture steganographic techniques. Liao et al. [25] describe an order forensics framework based on convolutional neural network (CNN) for visual operator chain detection. The purpose of the two-stream CNN architecture is to record evidence of both local noise residuals and tampering artefacts. The novel CNN-based technique, which may automatically learn manipulation detection features straight from image data, is specifically suggested for forensically detecting a chain consisting of two image operators.
An image encryption technique based on bit replacement, chaotic systems, and deoxyribonucleic acid (DNA) coding is presented by Yousif et al. [26]. Its goal is to safeguard the digital photos' privacy and confidentiality. Initially, using this method, every pixel in the image is translated into its matching binary sequence, which consists of bits that are zeros and ones. Subsequently, the one bit is substituted with (0 and 1) bits, and the zero bit is replaced with (1 and 0) bits. By repeatedly altering all of the image pixel bits, two distinct images are ultimately produced. Second, high dimensional chaotic systems based on permutation and diffusion are used to encrypt the resulting images. Finally, DNA encryption is also utilized. An innovative method of securing images is presented in [27] by combining chaotic systems, the El-Gamal public key cryptosystem, and scanning techniques. To put it briefly, a permuted image is initially constructed using spiral and zigzag scanning. Next, the permuted image is encrypted using the El-Gamal encryption technique. Finally, in the confusion and diffusion stages, the pixel locations are randomly generated using Lorenz and Rössler chaotic sequences. A block-based method is put out by Salim et al. [28] to safeguard the authenticity of images by identifying and pinpointing counterfeit. It uses a watermarking technique based on visual cryptography to give forgery detection and localization features. Features, key shares, and secret shares are generated in this watermarking system. DWT, Walsh transform, and local binary pattern are used to extract features from equal-sized blocks of the image and create the feature share. Subsequently, a random key share is generated from every image block, and the secret share is created by XORing the feature share, watermark, and key share.
-
(1)
The metaheuristic algorithms help us in computing the optimum scaling factor under certain conditions effectively. If we do not consider these approaches and go for the hit and trial method for finding the scaling factor. This process will not result in a proper trade-off among different characteristics. So, in order to maintain this trade-off, it is required to consider this optimization technique for efficient watermarking.
-
(2)
There are various optimization techniques available in the literature out of which we have to choose that provides us the better optimal results under certain conditions.
-
(3)
Further, the metaheuristic algorithm is selected in such a way that have less elapsed time with a fast convergence rate.
-
(4)
Thus, overview of the existing techniques discussed above leads to the research findings to fill the research gap that motivates us to propose an efficient optimized watermarking technique with optimum gain value using the desired optimization techniques.
3 Preprocessing
In this section hybrid watermark is generated using SHA-384 [14], SHA-512 [14], LWT [18, 19], and RSVD [12].
Following are the steps of hybrid watermark generation:
-
Step 1: Take the Aadhar card of the patient and split it into two parts as shown in Fig. 3.
-
Step 2: Apply one level LWT to both the parts of Aadhar card as shown in Eq. (1):
-
Step 3: Apply RSVD to previously generated \({LH}_{1}\), and \({HL}_{2}\) as shown in Eq. (2):
-
Step 4: Take MAC address and generate corresponding hash value (SHA-384) similarly take the patient number generated by hospital and generate corresponding hash value (SHA-512) and generate corresponding image of size 128 × 128 (Ihash1, Ihash2).
MAC address: 84A938D7266C.
Hash values: 206 187 14 18 48 187 45 158 2 117 39 4 161 216 208 15 216 135 106 232 64 59 39 235 178 82 238 202 231 132 214 242 197 170 60 212 87 212 119 100 15 67 156 132 235 129 108 157.
Hospital generated patient number: NAMEAGESEXDISEASECODE.
Hash values: 162 212 97 133 192 8 208 126 206 244 137 170 158 11 255 87 201 98 66 185 97 239 235 82 156 62 24 13 25 242 173 125 67 164 171 168 107 96 209 32 194 158 140 35 34 7 177 88.
-
Step 5: Apply one level LWT to both the previously generated images corresponding to hash values as shown in Eq. (3):
-
Step 6: Apply RSVD to previously generated \({LH}_{H1}\), and \({HL}_{H2}\) as shown in Eq. (4):
-
Step 7: Add the corresponding dominant components to generate modified dominant component as shown in Eq. (5):
$$\left\{\begin{array}{c}{D}_{mod1}={D}_{1}+\beta \times {D}_{H1}\\ {D}_{mod2}={D}_{2}+\beta \times {D}_{H2}\end{array}\right.$$(5)where \(\beta\) is the scaling factor.
4 PBNHWA process
The proposed NIfTI image hybrid watermarking technique uses RDWT [3], HD [4], DCT [5], and RSVD [12] for watermark embedding and extraction. The PSO [5], and BO [21] are utilized to get the optimum scaling factor. SURF [9] and BRISK [13] matching points are used for ROI verification. Following are the steps of the watermarking process:
-
Step 1: Take the NIfTI image as the input and select a slice as shown in Eq. (6):
where \(s\left(i\right)\) is the slice number and 1 \(\le i\le\) 21.
-
Step 2: Apply the RDWT to the previously selected slice of NIfTI image as shown in Eq. (7):
-
Step 3: Apply HD to \({LH}_{I1}\) and \({HL}_{I1}\) as shown in Eq. (8):
-
Step 4: Apply DCT to previously obtained Hessenberg matrices as shown in Eq. (9):
-
Step 5: Select the low and mid frequency components as shown in Eq. (10):
-
Step 6: Apply RSVD to previously obtained bands of frequency as shown in Eq. (11):
-
Step 7: Take the hybrid watermark images and apply RDWT as shown in Eq. (12):
-
Step 8: Apply RSVD to previously obtained \({HH}_{{HB}_{W1}}\) and \({HH}_{{HB}_{W2}}\) as shown in Eq. (13):
-
Step 9: Apply embedding procedure by taking optimized scaling factor (\(\alpha\)) using PSO and BO as shown in Eq. (14):
-
Step 10: Apply inverse RSVD and insert the modified low and mid frequency bands to rest of the bands and take the inverse DCT.
-
Step 11: Apply inverse HD and RDWT to get the watermarked image (Imarked).
-
Step 12: Take the watermarked image and apply RDWT to get the sub-bands as shown in Eq. (15):
-
Step 13: Apply HD to previously obtained \({LH}_{W}\) and \({HL}_{W}\) as shown in Eq. (16):
-
Step 14: Apply DCT to previously obtained Hessenberg matrices as shown in Eq. (17):
-
Step 15: Select the low and mid frequency components as shown in Eq. (18):
-
Step 16: Apply RSVD to previously obtained bands of frequency as shown in Eq. (19):
-
Step 17: Apply inverse embedding by taking optimum scaling factor as shown in Eq. (20):
5 Optimization process
PSO is inspired by swarm foraging and social behavior. Simple ideas and basic operators are used to construct PSO. PSO has a low cost of computation in terms of memory and performance. PSO begins by randomly initializing the population. To investigate the search space, solutions are assigned with randomized velocities. In PSO, a particle is a solution. There are three distinct features of PSO: (1) best fitness of each particle, (2) best fitness of swarm, (3) velocity and position update of each particle [29].
All bats utilize echolocation to gauge distance, and somehow, they also know the difference between background barriers and food/prey. In order to find prey, bats fly erratically at a set frequency, changing wavelength, and loudness. Depending on how close their target is, they can automatically modify the wavelength (or frequency) of their generated pulses and adjust the rate of pulse emission \(\gamma\) in the range [0, 1]. Figure 8 shows the process used in PSO and BO.
Following is the fitness equation used in optimization:
In Eq. (21), SSIM is the structural similarity index measure [5], PSNR is peak signal to noise ratio [5], NCC is normalized correlation coefficient [5], S is the number of slices of NIfTI image, \(\alpha\) is the balancing factor taken as 10, and \(N\) is the number of attacks (16). Flow charts of PSO and BO are shown in Figs. 9 and 10 respectively.
Parameters used in PSO:
Particle size: 5; Cognitive factor (C1): 2; Social Coefficient: 2; Inertia weight: 0.9; Velocity: [0.5,1].
Number of iterations: 21; Elapsed Time: 5.15 s.
Parameters used in BO:
Particle size: 5; loudness: [1, 2]; pulse rate: [0, 1]; \(\varepsilon\): 0.5 (reducing factor for loudness); \(\mu\): 0.9 (pulse rate increasing factor); Number of iterations: 17; Elapsed Time: 4.76 s.
6 Results and discussion
The proposed watermarking method uses NIfTI image [10] as the input host image of size 256 × 256. NIfTI images consists of different slices and behaves as the stack of papers as shown in Fig. 11 and in this work all the 21 slices are used as host image. It comes in two different file extensions:.nii and.nii.gz. while it does not contain any patient information. The hybrid watermark is generated initially then used for watermarking. The size of the hybrid watermark image is 128 × 256. Table 1 shows the performance parameters used in this proposed scheme.
6.1 Imperceptibility analysis
For imperceptibility analysis, the proposed method uses PSNR (dB), mean square error (MSE), SSIM, KLD and Jensen JSD. The acceptable value of PSNR is greater than 27 dB without attack [11]. The value of MSE should to tends to zero for higher imperceptibility. The value of SSIM should be close to 1.0000 or greater than 0.9 for better imperceptibility. Lesser the value of KLD [8] and JSD [8] higher is the imperceptibility. Table 2 shows the values of performance parameters for PSO and Table 3 is for BO. In this proposed work, the value of PSNR is greater than 50 dB for PSO and BO in all the slices. The value of MSE is also close to 0 in all the cases. The value of SSIM is greater than 0.9 in all the cases and the values of KLD and JSD are also acceptable for PSO and BO. The value of PSNR is higher in case of BO. The value of SSIM is almost same in PSO and BO except for S5 (higher in case of BO). The values of KLD and JSD are more efficient in case of BO. So, by observing the Tables 2 and 3 it is concluded that the proposed method is highly imperceptible and BO is superior than PSO. Figure 12 shows the Comparison of PSNR (dB) values for different slices and for PSO and BO.
6.2 Robustness analysis
For robustness analysis, the proposed method uses NCC and bit error rate. The value of NCC should be close to 1.0000 without attack. Tables 2 and 3 shows the values of NCC for all the slices and for PSO and BO. In all the cases the NCC value is 1.0000, it shows that the proposed method is highly robust. Figures 13 and 14 shows the extracted watermark images and corresponding NCC values against various attacks for PSO and BO respectively. The NCC values are greater than 0.9 in all the cases. The least NCC value is for sharpening attack (0.9963). The least NCC value is for sharpening attack (0.9963). The value of NCC is higher for BO in cases of Salt and pepper noise (0.01), Histogram equalization, and Motion blur (5, 5). The value of NCC is higher for PSO in cases of Average filter (7 × 7), and Median filter (7 × 7). Rest in all the cases the values of NCC are similar. Table 4 shows the NCC values against various attacks with PSO. Table 5 shows the NCC values against various attacks with BO. Tables 6 and 7 shows the NCC values against hybrid attacks with PSO and BO respectively.
6.3 Time complexity analysis
In Table 8, the time taken during the process of hybrid watermark generation, watermark embedding and extraction of watermarks are evaluated. The minimum time is taken by S1 (1.7436 s) and the maximum time is for S20 (1.7521 s). The overall timing analysis shows that the proposed method is computationally efficient and also suitable for real-time applications.
6.4 Capacity analysis
The capacity of the watermarking technique is evaluated by obtaining the ratio of the number of pixels in the watermark image and the number of pixels in the host image [27]. In the proposed method, RDWT is applied to input host image of size 256 × 256. After applying RDWT the size of the input image remains the same. During the embedding process, the RDWT is applied to the watermark image, so the maximum embeddable watermark size is 256 × 256. Therefore, the capacity of our proposed technique is (256 × 256)/(256 × 256) = 1.0.
6.5 Feature authentication
A distinctive feature point descriptor and local invariant rapid feature point detector are known as SURF. The initial stage of processing assigns an orientation within a sphere centered on the keypoint after determining its location [9]. The SURF detector uses integral images and the determinant of the Hessian matrix as a foundation to increase the speed of feature discovery.
Another binary descriptor is BRISK. A sample strategy is then used in the keypoint's neighborhood after keypoints have been chosen [13]. Short-distance pairs and long-distance pairs are two subgroups of the pairs of pixels surrounding the keypoint. The orientation of the feature point is established by computing local intensity gradients from long distance pairs. This orientation rotates short distance pairs. Short distance pair-wise brightness comparison test data are used to create a BRISK description.
SURF and BRISK features are used to detect that the copyright protection does not harm the ROI regions of brain image. If these regions are distorted or manipulated by the algorithm used then the scheme is inefficient. Table 9 shows the SURF and BRISK feature matching with and without attack. Figures 15 and 16 shows the number matched SURF and BRISK features for different slices (without attack) respectively. Figures 17 and 18 shows number of SURF and BRISK matched against rotation attack respectively. By evaluating the results of matched features, it is clear that the proposed technique does not distort the ROI of medical images (Fig. 19). Table 10 shows the extracted hybrid watermark images.
7 Comparison of results
The comparison of the proposed method with other existing techniques are shown in this section. Table 11 shows the comparison of PSNR (dB) values in which the PSNR values for different schemes are 34.0455 in [1], 45.5891 in [2], 44.9488 in [5], 45.8186 in [7], and 47.12 in [15]. The presented work is having PSNR of 51.6051 dB which is much higher in comparison with other techniques, it depicts that the proposed work is highly imperceptible. Figure 20 shows the graphical comparison of PSNR values. Table 12 shows the comparison of NCC values and it is clear that proposed work is highly robust in comparison with other mentioned techniques. Table 13 shows the time complexity comparison. Table 14 shows the comparison of matched features against Rotation attack. The proposed method authenticates the features of the watermarked image more effectively in comparison with other existing technique.
8 Conclusion
PBNHWA technique uses PSO and BO to obtained the optimized scaling factor which maintains the balance between various performance parameters. For embedding RDWT, RSVD, DCT, and HD are used for achieving efficient performance results. The security of the proposed method is enhanced by using hybrid watermarks whereas SURF and BRISK based ROI are verified to demonstrate the superiority of the presented algorithm. The proposed method is tested under various attacks and found to be highly robust. The significant features of medical images are also successfully authenticated with no distortion for telemedicine applications. The proposed watermarking technique can be used for the copyright protection, security enhancement, improved imperceptibility, robustness, features authentication, and identity verification. Although, the proposed technique delivers sufficient robustness and imperceptibility but still there is a scope of improvement. The presented work can also be tested and verified by the hybrid optimization technique under different set of attacks. This task can be considered as the extension of the proposed work for future studies. Deep learning models can also be combined with traditional watermarking approaches to enhance the performance of the proposed work.
Data availability
My manuscript has no associated data.
References
Anand A, Singh AK (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72–80. https://doi.org/10.1016/j.comcom.2020.01.038
Anand A, Singh AK (2022) Hybrid nature-inspired optimization and encryption-based watermarking for e-healthcare. IEEE Trans Comput Soc Syst. https://doi.org/10.1109/TCSS.2022.3140862
Anand A, Singh AK, Zhou H (2022) ViMDH: Visible-imperceptible medical data hiding for internet of medical things. IEEE Trans Industr Inf 19(1):849–856
Awasthi D, Srivastava VK (2023) Hessenberg decomposition-based medical image watermarking with its performance comparison by particle swarm and JAYA optimization algorithms for different wavelets and its authentication using AES. Circ Syst Signal Process 8:1–32
Awasthi D, Srivastava VK (2022) LWT-DCT-SVD and DWT-DCT-SVD based watermarking schemes with their performance enhancement using Jaya and Particle swarm optimization and comparison of results under various attacks. Multimedia Tools Appl 81(18):25075–25099
Awasthi D, Srivastava VK (2023) Performance enhancement of SVD based dual image watermarking in wavelet domain using PSO and JAYA optimization and their comparison under hybrid attacks. Multimedia Tools Appl 82(23):1–33
Awasthi D, Srivastava VK (2022) Robust, imperceptible and optimized watermarking of DICOM image using Schur decomposition, LWT-DCT-SVD and its authentication using SURF. Multimedia Tools Appl 82:1–35
Awasthi D, Khare P, Srivastava VK (2023) BacterialWmark: telemedicine watermarking technique using bacterial foraging for smart healthcare system. J Electron Imaging 32(4):042107
Bay H, Tuytelaars T, Van Gool L (2006) Surf: Speeded up robust features. Lect Notes Comput Sci 3951:404–417
Cox RW, Ashburner J, Breman H, Fissell K, Haselgrove C, Holmes CJ, Lancaster JL, Rex DE, Smith SM, Woodward JB, Strother SC (2004) A (sort of) new image data format standard: NiFTI-1. In: 10th Annual Meeting of Organisation of Human Brain Mapping, Budapest. http://nifti.nimh.nih.gov/nifti-1/documentation/hbm_nifti_2004.pdf
Khare P, Srivastava VK (2021) A novel dual image watermarking technique using momomorphic transform and DWT. J Intell Syst 30(1):297–311. https://doi.org/10.1515/jisys-2019-0046
Ji H, Yu W, Li Y (2016) A rank revealing randomized singular value decomposition (R3SVD) algorithm for low-rank matrix approximations. arXiv preprint arXiv:1605.08134. https://doi.org/10.48550/arXiv.1605.08134
Leutenegger S, Chli M, Siegwart RY (2011) BRISK: Binary robust invariant scalable keypoints. In: 2011 International conference on computer vision. Ieee, pp 2548–2555. https://doi.org/10.1109/ICCV.2011.6126542
McLoone M, McCanny JV (2002) Efficient single-chip implementation of SHA-384 and SHA-512. In: 2002 IEEE International Conference on Field-Programmable Technology, 2002. (FPT). Proceedings. IEEE, pp 311–314. https://doi.org/10.1109/FPT.2002.1188699
Singh KU, Aljrees T, Kumar A, Singh T (2023) Secure NIfTI image authentication scheme for modern healthcare system. Appl Sci 13(9):5308
Singh KU, Kumar A, Singh T, Ram M (2022) Image-based decision making for reliable and proper diagnosing in NIFTI format using watermarking. Multimedia Tools Appl 81(27):39577–39603
Sinhal R, Sharma S, Ansari IA, Bajaj V (2022) Multipurpose medical image watermarking for effective security solutions. Multimedia Tools Appl 81(10):14045–14063
Sweldens W (1996) The lifting scheme: a custom-design construction of biorthogonal wavelets. Appl Comput Harmon Anal 3(2):186–200
Sweldens W (1998) The lifting scheme: a construction of second-generation wavelets. SIAM J Math Anal 29(2):511–546
Thakur S, Singh AK, Kumar B, Ghrera SP (2020) Improved DWT-SVD-based medical image watermarking through hamming code and chaotic encryption. In: Dutta D, Kar H, Kumar C, Bhadauria V (eds) Advances in VLSI, communication, and signal processing. Lecture notes in electrical engineering, vol 587. Springer, Singapore. https://doi.org/10.1007/978-981-32-9775-3_80
Yang XS, Hossein Gandomi A (2012) Bat algorithm: a novel approach for global engineering optimization. Eng Comput 29(5):464–483
Tan J, Liao X, Liu J, Cao Y, Jiang H (2022) Channel attention image steganography with generative adversarial networks. IEEE Trans Netw Sci Eng 9(2):888–903. https://doi.org/10.1109/TNSE.2021.3139671
Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE Trans Circ Syst Video Technol 30(3):685–696. https://doi.org/10.1109/TCSVT.2019.2896270
Liao X, Yin J, Chen M, Qin Z (2022) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secure Comput 19(2):897–911. https://doi.org/10.1109/TDSC.2020.3004708
Liao X, Li K, Zhu X, Liu KJR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process 14(5):955–968. https://doi.org/10.1109/JSTSP.2020.3002391
Yousif SF, Abboud AJ, Alhumaima RS (2022) A new image encryption based on bit replacing, chaos and DNA coding techniques. Multimedia Tools Appl 81(19):27453–27493. https://doi.org/10.1007/s11042-022-12762-x
Yousif SF, Abboud AJ, Radhi HY (2020) Robust image encryption with scanning technology, the El-Gamal algorithm and chaos theory. IEEE Access 8:155184–155209. https://doi.org/10.1109/ACCESS.2020.3019216
Salim MZ, Abboud AJ, Yildirim R (2022) A visual cryptography-based watermarking approach for the detection and localization of image forgery. Electronics 11(1):136. https://doi.org/10.3390/electronics11010136
Zhang L, Wei D (2019) Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization. Multimedia Tools Appl 78:28003–28023. https://doi.org/10.1007/s11042-019-07902-9
Funding
This research received no specific grant from any funding agency.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethics approval and consent to participate
This article does not contain any studies with animals performed by any of the authors.
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Awasthi, D., Khare, P. & Srivastava, V.K. PBNHWA: NIfTI image watermarking with aid of PSO and BO in wavelet domain with its authentication for telemedicine applications. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-19889-z
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-024-19889-z