Keywords

1 Introduction

With the rapid development of the Internet and information technology, images, texts, videos, etc. containing important information are constantly updated and widely spread in various fields. In this process, they may be subject the problems of copying, cutting, and malicious tampering. Once tampered, it is easy to cause serious consequences, especially in the special medical field [1, 2]. Digital watermarking technology can solve this problem well.

Digital watermarking mainly realize copyright protection by embedding important information in digital media such as images, text, and audio [3]. Generally, a complete digital watermarking system includes three parts: watermark embedding, watermark extraction and watermark detection [4]. According to the hidden position of the watermark, digital watermarks are divided into spatial watermarks and frequency domain watermarks. LSB algorithms and patchwork algorithms are classical spatial watermarking algorithms, and transform domain watermarking algorithms are mainly based on DCT, DWT, DFT transform [5]. However, the wavelet transform can only reflect the zero-dimensional singularity of the signal. To represent and process image data more effectively, multiscale geometric analysis has gradually become a research hotspot. In the last years, researchers have proposed a series of multi-scale geometric analysis tools, such as ridgelet, curvelet, contourlet, brushlet, wedgelet, bandlet, shearlet, tetrolet, and so on. The multi-scale geometric analysis shows strong advantages and potential in the fields of image compression, denoising, enhancement, and feature extraction [6].

Medical image is a special form of image. In modern medicine, it is regarded as an important basis for diagnosis, and it is generally not allowed to be modified artificially to avoid misdiagnosis [7]. The existing watermarking algorithms for general digital images are generally less robust when applied to medical images, and basically cannot resist geometric attacks [8, 11]. Therefore, this paper proposed a novel algorithm based on Tetrolet-DCT, which combined the concept of zero watermark [14] and can quickly achieve watermark embedding and extraction on the premise of ensuring the invisibility and robustness of watermark information. Compared with wavelet transform, curving transform, contour transform and ridgelines, this method is more effective for medical images [12, 13].

2 Basic Theory

2.1 Tetrolet Transform

In 2009, Jens Krommweh proposed Tetrolet transform for sparse image representation, which is a new Haar wavelet transform, and its basic idea is simple, fast and effective. The construction of this transform is similar to wedglet transform, and Haar function is applied in the edge part, which can be expressed sparsely. Compared with wavelet, curvelet and contourlet, the transformed image coefficients are more concentrated, which can get better image quality.

Tetrolet transform was first applied to the four-frame jigsaw puzzle. The image was divided into 4 × 4 blocks, disregarding rotations and reflections there are five different shapes. In each 4 × 4 blocks, the imposition combination is performed according to the geometric information. And 22 kinds of square combinations and 117 different combinations of rotation and reflection are considered. The decomposition steps are as follows:

Suppose an image size is \(\mathrm{a}={a(a[i,j])}_{i,j=0}^{N-1}\), where N = 2J, J ∈ N which can be decomposed at the rth level r = 1, 2, 3 ..., J.

Step 1: Decompose the image into 4 × 4 blocks.

Step 2: Decompose each block by tetrolet to obtain 2 × 2 low-pass subbands and 12 × 1 high-pass subbands, then find the most sparse tetrolet representation in each block.

The low-pass subband coefficient is

$${a}^{r,\left(c\right)}\left[s\right]=\sum\nolimits_{\left(m,n\right)\in {I}_{s}^{\left(c\right)}}[0,L(m,n)]{a}^{r-1}[m,n]$$
(1)

The high-pass subband coefficient is

$${w}_{l}^{r,\left(c\right)}={\left(\sum\nolimits_{\left(m,n\right)\in {I}_{s}^{\left(c\right)}}\varepsilon \left[0,L\left(m,n\right)\right]{a}^{r-1}\left[m,n\right]\right)}_{s=0}^{3}$$
(2)

Where r is the decomposition series, c is 117 combinations, C = 1, 2, ..., 117, \(\mathrm{\varepsilon }\left[l,m\right]\).

Step 3: Decompose the next layer and rearrange the low-pass coefficients and high-pass coefficients of each block to a 2 × 2 block.

Step 4: Save the Tetrolet decomposition coefficient (high pass part).

Step 5: Repeat steps 1–4 for the low-pass part until the decomposition is complete.

Figure 1 shows the decomposition process:

Fig. 1.
figure 1

Tetrolet decomposition process

As a result, Tetrolet can adapt to the geometric characteristics of the image, so the Tetrolet transform can maintain the edge and texture of the image very well, and it is very effective in image compression, denoising and nonlinear approximation.

2.2 DCT Transform

Discrete Cosine Transform (DCT) is a classic frequency domain algorithm, which is widely used in digital watermarking and image processing.

It has the advantages of fast calculation speed and high resistance to compression attacks and is compatible with international data compression standards JPEG and MPEG. According to the visual characteristics of human eyes, the characteristics of the image are mainly in the middle and low frequency of the image, so the watermark information can be embedded in the middle and low-frequency region of the image in DCT domain. A two-dimensional DCT transform is as follows:

$$F\left(u,v\right)=c\left(u\right)c\left(v\right)\sum\nolimits_{x=0}^{M-1}\sum\nolimits_{y=0}^{N-1}f\left(x,y\right)\mathrm{cos}\frac{\pi \left(2x+1\right)u}{2M}\mathrm{cos}\frac{\pi \left(2y+1\right)v}{2N}$$
(3)

Among them, u = 0, 1, ..., M − 1, v = 0, 1, ..., N − 1;

$$c\left( u \right) = \left\{ {\begin{array}{*{20}l} {\sqrt {\frac{1}{M}} } \hfill & {u = 0} \hfill \\ {\sqrt {\frac{2}{N}} } \hfill & {u = 1,2, \ldots ,M - 1} \hfill \\ \end{array} } \right.,\,c(v) = \left\{ {\begin{array}{*{20}l} {\sqrt {\frac{1}{N}} } \hfill & {v = 0} \hfill \\ {\sqrt {\frac{2}{M}} } \hfill & {v = 1,2, \ldots ,N - 1} \hfill \\ \end{array} } \right.$$
(4)

2.3 Logistic Map

Logistic map, also known as the wormhole model, is a very simple and classic chaotic system, which is widely used in the encryption field. The mathematical expression is:

$${x}_{n+1}=\mu {x}_{n}(1-{x}_{n})$$
(5)

Where \(\mu \) is the branch parameter.And when \(3.5699456<\mu \le 4\), the logistic map is chaotic.

According to the formula, the chaotic sequence is very sensitive to the initial value. When \(\mu =4\), the probability distribution function of the Logistic chaotic sequence \(\rho (x)\) is:

$$\rho = \frac{1}{{\pi \sqrt {x\left( {1 - x} \right)} }}~,0 < x < 1$$
(6)

It shows that the Logistic sequence is ergodic. In this paper, we set \(\mu =4\).

3 Proposed Watermarking Algorithm

3.1 Feature Extraction

We first decompose the original medical image (512 pixel × 512 pixel) by tetrolet and get the low-frequency subband and high-frequency subband. The low-frequency subband is decomposed to the next level, and the high-frequency subband is saved. We know that the image features are mainly in the low-frequency part, while the high-pass part mainly shows the texture and geometric details in all directions.

Then DCT is applied to the low-frequency part of tetrolet decomposition to obtain the feature of thr medical image. The 8-bit low and medium frequency coefficients of DCT are taken as the feature vector.

Table 1. Coefficients of medical image under different attacks (correlation coefficient: 1.0e + 04)

Through experiments, we found that although the coefficients of the medical image changed after various attacks, the positive and negative signs of the coefficients did not change (see Table 1).

Fig. 2.
figure 2

Different original medical images for watermarking

To verify the feasibility of this method, we selected 7 different medical images for comparison experiments and found that the NC value of different images is much less than 0.5, indicating that the correlation is very small, and the NC values between the same pictures are all 1.00 (see Table 2). In consequence, this method is feasible for feature extraction.

Table 2. Correlation test of seven different medical images

3.2 Encryption and Embedding of the Watermark

Figure 3 shows the encryption process of the watermark. First, the watermark image (32 pixel × 32 pixel) is binarized to obtain \(\mathrm{W}\left(i,j\right)\). Secondly, a chaotic sequence is generated through the logical initial value \(\mathrm{X}\left(j\right)\), then carry out the ascending dimension and symbol operation on the sequence to obtain the binary encryption matrix \(\mathrm{C}\left(i,j\right)\). Then perform XOR operation on \(\mathrm{W}=\left(i,j\right)\) and \(\mathrm{C}\left(i,j\right)\) to get the encrypted watermark \(\mathrm{B}\mathrm{W}\left(i,j\right)\).

Fig. 3.
figure 3

Watermark encryption process

Figure 4 is the watermark embedding process. First, perform the Tetrolet-DCT transform on the medical image (512 pixel × 512 pixel) to obtain a 32 bit dimensional feature vector \(\mathrm{V}\left(j\right)\), then perform XOR operation on \(\mathrm{V}\left(j\right)\) and \(\mathrm{B}\mathrm{W}\left(i,j\right)\) to get the key of the original medical image \(\mathrm{K}\left(i,j\right)\).

Fig. 4.
figure 4

Watermark embedding process

3.3 Watermark Extraction and Restoration

Figure 5 is a flow chart of watermark extraction and restoration. First, perform feature extraction on the attacked image to obtain32 bit dimensional feature vector \({\mathrm{V}}^{\prime}\left(j\right)\), and then perform an XOR operation with \(\mathrm{K}\left(i,j\right)\) of the original medical image to extract the watermark \({\mathrm{B}\mathrm{W}}^{\prime}\left(i,j\right)\) contained in the attacked image.

Then the watermark matrix \({\mathrm{B}\mathrm{W}}^{\prime}\left(i,j\right)\) and the binary matrix \(\mathrm{C}\left(i,j\right)\) are XOR to obtain the restored watermark matrix \({\mathrm{W}}^{\prime}\left(i,j\right)\).

Fig. 5.
figure 5

Watermark extraction and restoration process

3.4 Watermark Evaluation

The performance evaluation of watermarking mainly has two indicators: imperceptibility and robustness.

Imperceptibility means that after the watermark is embedded in the original image, it does not affect the quality of the carrier image, and compared with the original image. It is difficult for the human visual system to find the difference. The peak signal-to-noise ratio(PSNR) is as follows:

$$PSNR=10 {\mathrm{log}}_{10}\left[\frac{MN{\underset{i,j}{\mathrm{max}}(I(i,j))}^{2}}{\sum _{i}\sum _{j}{(I\left(i,j\right)-{I}^{\prime}(i,j))}^{2}}\right]$$
(7)

Watermark robustness is used to judge the anti-attack ability of the watermark, which is judged by comparing the correlation between the extracted watermark and the original watermark. The formula for calculating the normalized correlation coefficient (NC) is as follows:

$$NC=\frac{\sum _{i}\sum _{j}W(i,j){W}^{\prime}(i,j)}{\sum _{i}\sum _{j}{W}^{2}(i,j)}$$
(8)

4 Experiments and Results

4.1 Experimental Data

In this paper, the Matlab R2016a platform is used for simulation, and 512 pixel × 512 pixel brain medical image and a meaningful 32 pixel × 32 pixel watermark are selected for experiments.

The experimental data are as follows:

Table 3. Experimental data of various attacks on test images

Generally, when the NC value is more than 0.5, it indicates that the extracted watermark is valid. The higher the NC value, the better the quality of the extracted watermark. It can be seen that the algorithm in this paper has good robustness. The data in Table 3 shows that the algorithm used in this paper has strong anti-attack performance in traditional attacks, especially in geometrical attacks such as median filtering, JPEG compression, scaling, rotation and shearing. It has the better anti-attack performance.

4.2 Performance Comparison with Other Algorithms

Table 4 shows the comparison between the algorithms in this paper and reference 15.

Table 4. Comparison results between different algorithms

We can find that when compared with reference [15], the proposed algorithm in this paper has advantages in traditional attacks such as JPEG compression, median filtering, and Gaussian noise. Anti-attack is more stable than DWT-DCT.

5 Conclusion

In the medical image field, this paper proposed a robust zero-watermarking algorithm based on Tetrolet-DCT, which used Tetrolet-DCT and logistic mapping to embed and extract watermark. Compared with DWT, Tetrolet has advantages in image compression, denoising, and nonlinear approximation. And robust watermarking algorithm is most commonly used for digital copyright protection and is widely used in the fields of medical images, bill anti-counterfeiting, and digital signatures, etc., which improves the security of information. Experiments show that the watermark information can be extracted effectively without any changing of the original image. The proposed algorithm is robust and can resist geometric attacks well.