Abstract
The rapid development of the information age of big data has promoted the development of traditional medicine and online diagnosis, as well as aroused concerns about the privacy of patient information. Aiming at the hidden dangers of copying, cutting, tampering, etc. in the dissemination of medical images, combined with the characteristics of medical images, this paper proposed a novel zero-watermarking algorithm based on Tetrolet-DCT, focusing on how to improve its security. Logistic map chaotic encryption is performed on the watermark, the Tetrolet-DCT transform is used to extract the visual feature of medical image, and the watermark information is embedded and extracted by combining the zero-watermarking technology. Experimental data show that the algorithm proposed in this paper can effectively extract the watermark without any changing of the medical image, and has a higher NC value under conventional attacks and geometric attacks. it has better invisibility and robustness.
Access provided by Autonomous University of Puebla. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
With the rapid development of the Internet and information technology, images, texts, videos, etc. containing important information are constantly updated and widely spread in various fields. In this process, they may be subject the problems of copying, cutting, and malicious tampering. Once tampered, it is easy to cause serious consequences, especially in the special medical field [1, 2]. Digital watermarking technology can solve this problem well.
Digital watermarking mainly realize copyright protection by embedding important information in digital media such as images, text, and audio [3]. Generally, a complete digital watermarking system includes three parts: watermark embedding, watermark extraction and watermark detection [4]. According to the hidden position of the watermark, digital watermarks are divided into spatial watermarks and frequency domain watermarks. LSB algorithms and patchwork algorithms are classical spatial watermarking algorithms, and transform domain watermarking algorithms are mainly based on DCT, DWT, DFT transform [5]. However, the wavelet transform can only reflect the zero-dimensional singularity of the signal. To represent and process image data more effectively, multiscale geometric analysis has gradually become a research hotspot. In the last years, researchers have proposed a series of multi-scale geometric analysis tools, such as ridgelet, curvelet, contourlet, brushlet, wedgelet, bandlet, shearlet, tetrolet, and so on. The multi-scale geometric analysis shows strong advantages and potential in the fields of image compression, denoising, enhancement, and feature extraction [6].
Medical image is a special form of image. In modern medicine, it is regarded as an important basis for diagnosis, and it is generally not allowed to be modified artificially to avoid misdiagnosis [7]. The existing watermarking algorithms for general digital images are generally less robust when applied to medical images, and basically cannot resist geometric attacks [8, 11]. Therefore, this paper proposed a novel algorithm based on Tetrolet-DCT, which combined the concept of zero watermark [14] and can quickly achieve watermark embedding and extraction on the premise of ensuring the invisibility and robustness of watermark information. Compared with wavelet transform, curving transform, contour transform and ridgelines, this method is more effective for medical images [12, 13].
2 Basic Theory
2.1 Tetrolet Transform
In 2009, Jens Krommweh proposed Tetrolet transform for sparse image representation, which is a new Haar wavelet transform, and its basic idea is simple, fast and effective. The construction of this transform is similar to wedglet transform, and Haar function is applied in the edge part, which can be expressed sparsely. Compared with wavelet, curvelet and contourlet, the transformed image coefficients are more concentrated, which can get better image quality.
Tetrolet transform was first applied to the four-frame jigsaw puzzle. The image was divided into 4 × 4 blocks, disregarding rotations and reflections there are five different shapes. In each 4 × 4 blocks, the imposition combination is performed according to the geometric information. And 22 kinds of square combinations and 117 different combinations of rotation and reflection are considered. The decomposition steps are as follows:
Suppose an image size is \(\mathrm{a}={a(a[i,j])}_{i,j=0}^{N-1}\), where N = 2J, J ∈ N which can be decomposed at the rth level r = 1, 2, 3 ..., J.
Step 1: Decompose the image into 4 × 4 blocks.
Step 2: Decompose each block by tetrolet to obtain 2 × 2 low-pass subbands and 12 × 1 high-pass subbands, then find the most sparse tetrolet representation in each block.
The low-pass subband coefficient is
The high-pass subband coefficient is
Where r is the decomposition series, c is 117 combinations, C = 1, 2, ..., 117, \(\mathrm{\varepsilon }\left[l,m\right]\).
Step 3: Decompose the next layer and rearrange the low-pass coefficients and high-pass coefficients of each block to a 2 × 2 block.
Step 4: Save the Tetrolet decomposition coefficient (high pass part).
Step 5: Repeat steps 1–4 for the low-pass part until the decomposition is complete.
Figure 1 shows the decomposition process:
As a result, Tetrolet can adapt to the geometric characteristics of the image, so the Tetrolet transform can maintain the edge and texture of the image very well, and it is very effective in image compression, denoising and nonlinear approximation.
2.2 DCT Transform
Discrete Cosine Transform (DCT) is a classic frequency domain algorithm, which is widely used in digital watermarking and image processing.
It has the advantages of fast calculation speed and high resistance to compression attacks and is compatible with international data compression standards JPEG and MPEG. According to the visual characteristics of human eyes, the characteristics of the image are mainly in the middle and low frequency of the image, so the watermark information can be embedded in the middle and low-frequency region of the image in DCT domain. A two-dimensional DCT transform is as follows:
Among them, u = 0, 1, ..., M − 1, v = 0, 1, ..., N − 1;
2.3 Logistic Map
Logistic map, also known as the wormhole model, is a very simple and classic chaotic system, which is widely used in the encryption field. The mathematical expression is:
Where \(\mu \) is the branch parameter.And when \(3.5699456<\mu \le 4\), the logistic map is chaotic.
According to the formula, the chaotic sequence is very sensitive to the initial value. When \(\mu =4\), the probability distribution function of the Logistic chaotic sequence \(\rho (x)\) is:
It shows that the Logistic sequence is ergodic. In this paper, we set \(\mu =4\).
3 Proposed Watermarking Algorithm
3.1 Feature Extraction
We first decompose the original medical image (512 pixel × 512 pixel) by tetrolet and get the low-frequency subband and high-frequency subband. The low-frequency subband is decomposed to the next level, and the high-frequency subband is saved. We know that the image features are mainly in the low-frequency part, while the high-pass part mainly shows the texture and geometric details in all directions.
Then DCT is applied to the low-frequency part of tetrolet decomposition to obtain the feature of thr medical image. The 8-bit low and medium frequency coefficients of DCT are taken as the feature vector.
Through experiments, we found that although the coefficients of the medical image changed after various attacks, the positive and negative signs of the coefficients did not change (see Table 1).
To verify the feasibility of this method, we selected 7 different medical images for comparison experiments and found that the NC value of different images is much less than 0.5, indicating that the correlation is very small, and the NC values between the same pictures are all 1.00 (see Table 2). In consequence, this method is feasible for feature extraction.
3.2 Encryption and Embedding of the Watermark
Figure 3 shows the encryption process of the watermark. First, the watermark image (32 pixel × 32 pixel) is binarized to obtain \(\mathrm{W}\left(i,j\right)\). Secondly, a chaotic sequence is generated through the logical initial value \(\mathrm{X}\left(j\right)\), then carry out the ascending dimension and symbol operation on the sequence to obtain the binary encryption matrix \(\mathrm{C}\left(i,j\right)\). Then perform XOR operation on \(\mathrm{W}=\left(i,j\right)\) and \(\mathrm{C}\left(i,j\right)\) to get the encrypted watermark \(\mathrm{B}\mathrm{W}\left(i,j\right)\).
Figure 4 is the watermark embedding process. First, perform the Tetrolet-DCT transform on the medical image (512 pixel × 512 pixel) to obtain a 32 bit dimensional feature vector \(\mathrm{V}\left(j\right)\), then perform XOR operation on \(\mathrm{V}\left(j\right)\) and \(\mathrm{B}\mathrm{W}\left(i,j\right)\) to get the key of the original medical image \(\mathrm{K}\left(i,j\right)\).
3.3 Watermark Extraction and Restoration
Figure 5 is a flow chart of watermark extraction and restoration. First, perform feature extraction on the attacked image to obtain32 bit dimensional feature vector \({\mathrm{V}}^{\prime}\left(j\right)\), and then perform an XOR operation with \(\mathrm{K}\left(i,j\right)\) of the original medical image to extract the watermark \({\mathrm{B}\mathrm{W}}^{\prime}\left(i,j\right)\) contained in the attacked image.
Then the watermark matrix \({\mathrm{B}\mathrm{W}}^{\prime}\left(i,j\right)\) and the binary matrix \(\mathrm{C}\left(i,j\right)\) are XOR to obtain the restored watermark matrix \({\mathrm{W}}^{\prime}\left(i,j\right)\).
3.4 Watermark Evaluation
The performance evaluation of watermarking mainly has two indicators: imperceptibility and robustness.
Imperceptibility means that after the watermark is embedded in the original image, it does not affect the quality of the carrier image, and compared with the original image. It is difficult for the human visual system to find the difference. The peak signal-to-noise ratio(PSNR) is as follows:
Watermark robustness is used to judge the anti-attack ability of the watermark, which is judged by comparing the correlation between the extracted watermark and the original watermark. The formula for calculating the normalized correlation coefficient (NC) is as follows:
4 Experiments and Results
4.1 Experimental Data
In this paper, the Matlab R2016a platform is used for simulation, and 512 pixel × 512 pixel brain medical image and a meaningful 32 pixel × 32 pixel watermark are selected for experiments.
The experimental data are as follows:
Generally, when the NC value is more than 0.5, it indicates that the extracted watermark is valid. The higher the NC value, the better the quality of the extracted watermark. It can be seen that the algorithm in this paper has good robustness. The data in Table 3 shows that the algorithm used in this paper has strong anti-attack performance in traditional attacks, especially in geometrical attacks such as median filtering, JPEG compression, scaling, rotation and shearing. It has the better anti-attack performance.
4.2 Performance Comparison with Other Algorithms
Table 4 shows the comparison between the algorithms in this paper and reference 15.
We can find that when compared with reference [15], the proposed algorithm in this paper has advantages in traditional attacks such as JPEG compression, median filtering, and Gaussian noise. Anti-attack is more stable than DWT-DCT.
5 Conclusion
In the medical image field, this paper proposed a robust zero-watermarking algorithm based on Tetrolet-DCT, which used Tetrolet-DCT and logistic mapping to embed and extract watermark. Compared with DWT, Tetrolet has advantages in image compression, denoising, and nonlinear approximation. And robust watermarking algorithm is most commonly used for digital copyright protection and is widely used in the fields of medical images, bill anti-counterfeiting, and digital signatures, etc., which improves the security of information. Experiments show that the watermark information can be extracted effectively without any changing of the original image. The proposed algorithm is robust and can resist geometric attacks well.
References
Parah, S.A., Sheikh, J.A., Ahad, F., Loan, N.A., Bhat, G.M.: Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools Appl. 76(8), 10599–10633 (2015). https://doi.org/10.1007/s11042-015-3127-y
Nyeem, H., Boles, W., Boyd, C.: A Review of Medical Image Watermarking Requirements for Teleradiology. J. Digit. Imaging 26, 326–343 (2013)
Ya-Kun, W.U., Chun-Hong, D.I.: A survey of digital watermarking techniques. J. Liaoning Univ. (Natural ences Edition) 37, 202–206 (2010)
Balasamy, K., Ramakrishnan, S.: An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO. Clust. Comput. 22(2), 4431–4442 (2018). https://doi.org/10.1007/s10586-018-1991-8
Guihua, X.: Research on the Key Technologies of Digital Watermarking., Vol. Doctor. 132. Nanjing University of Aeronautics and Astronautics (2009)
Analysis, I.-S.: Cai-Lian L, J.S.Y.K. Natural Science J. Hainan University 29, 275–283 (2011)
Krommweh, J.: Tetrolet transform: A new adaptive Haar wavelet algorithm for sparse image representation. J VIS COMMUN IMAGE R 21, 364–374 (2010)
Hung-Jui, K., Cheng-Ta, H., Gwoboa, H., Shiuh-Jeng, W.: Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. INFORM Sci. 517 (2020)
Xu, Z., Xuan, Y.: Image watermarking algorithm based on DCT and Arnold transform. Int. J. Reasoning-Based Intell. Syst. 9 (2017)
Xu, Z.J., Wang, Z.Z., Lu, Q.: Research on image watermarking algorithm based on DCT. Procedia Environ. Sci. 10, 1129–1135 (2011)
Mastan Vali, S.K., Naga Kishore, K.L., Prathibha, G.: Notice of retraction robust image watermarking using tetrolet transform, pp. 1–5. IEEE (2015)
Zhang, D.X., Xun, L.N., Liu, K.F., et al.: Research on Stationary Tetrolet Transform Algorithm. Zidonghua Xuebao/Acta Automatica Sinica 44, 2041–2055 (2018)
Muhammad, F.K., Syed, M.G.M., Imran, N.: A novel zero-watermarking based scheme for copyright protection of grayscale images. Mehran Univ. Res. J. Eng. Technol. 38 (2019)
Zhang, S., Zhang, H.: Research on zero watermarking algorithm for hyper-chaos-based image. Appl. Res. Compu. 36 (2019)
Domain, J., Li, J., Duan, Y., Guo, Z.: A robust zero-watermarking algorithm for encrypted medical images in the DWT-DCT encrypted domain. Int. J. Simul. Syst. Sci. Tech. (2016)
Acknowledgement
This work was supported in part by the Hainan Provincial Natural Science Foundation of China under Grant 2019RC018 and by the Natural Science Foundation of China under Grant 62063004 and 61762033, in part by the Hainan Provincial. Higher Education Research Project under Grant Hnky2019-73, and in part by the Key Research Project of Haikou College of Economics under Grant HJKZ18-01.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Cui, W. et al. (2021). A Robust Zero Watermarking Algorithm for Medical Images Based on Tetrolet-DCT. In: Cheng, J., Tang, X., Liu, X. (eds) Cyberspace Safety and Security. CSS 2020. Lecture Notes in Computer Science(), vol 12653. Springer, Cham. https://doi.org/10.1007/978-3-030-73671-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-73671-2_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-73670-5
Online ISBN: 978-3-030-73671-2
eBook Packages: Computer ScienceComputer Science (R0)