1 Introduction

Telemedicine based medical image diagnosis is done through various techniques like computed tomography, ultrasound scanning, X-ray, magnetic resonance imaging, positron emission tomography. The investigative images are widely kept and it will undergo transmission for texture collection [8], image de-noising [2], segmentation [38], information hiding [34], and compression [12]. Consequently, medical images are scattered via hospital intranet and in the internet, where patient’s privacy information are available. However, hospital intranet will lack in the security issues related to patient information results in data leak [11, 28, 30].

With reference to visibility, medical image watermarking is categorized into visible and invisible domain [3, 19]. Further invisible watermarking is categorized into transform and time domain approaches [19, 20]. In transform domain approach, the host image will undergo transformation before embedding the watermark. Alternatively, time domain mechanism uses changes in the pixel values with respect to watermark information. Transform domain are classified into ridgelet transform [45], IWT [3], DCT [7], DWT [20, 21, 26], SVD [14], moments transform [36], curvelet transform [49].

The rest of the article is organized as follows: In Section 2 state of art of medical image watermarking is briefly presented. In Section 3 we discuss the fundamental concepts of wavelet transform, logistic mapping and SVD. Section 4 describes about the proposed algorithm in detail. In Section 5, results obtained from the proposed algorithm and performance evaluation is described in detail. In Section 6, the conclusion is provided.

2 Related work

In medical imaging, various watermarking methods are proposed previously [1, 4,5,6, 9, 10, 13, 15,16,17,18, 22,23,24,25, 27, 29, 31,32,33, 35, 37, 39,40,41,42,43,44,45,46,47,48, 50, 51]. In [37] Chao et al. have proposed bipolar multiple base conversion for information hiding, where multiple data can be encrypted in a single image. Acharya et al. [15, 42] proposes embedding patient’s information in two different ways. In [42], authors use error correction (EC) scheme, which improves the Least Significant Bit (LSB) algorithm efficiency in medical image transmission and storage, where the medical image is embedded with patient data. Same author in [15] uses coefficients of discrete cosine transform (DCT) for embedding graphical signals and text data in the last bit of DCT. Zainet al [48] proposes medical image authentication through obtaining region of interest (ROI) in the spatial domain. In [44] author proposed a multiple watermark method results in good imperceptibility and detecting the tamper in medical images for privacy control. Block based schemes proposed by Wu et al. in [5, 32, 45], uses modulo operation with adaptive watermarking technique results in tamper detection and recovery. In [9, 24, 43] author uses region based medical image watermarking (MIW) along with adjacent pixel value differential expansion method for authentication and security enhancement.

Chaotic systems and Region of Interest (ROI) become more sensitive in the past few years for maintaining the robustness of the watermark. Medical images can be segmented into ROI (Region of Interest) and RONI (Region of Non-Interest). This is to increase the diagnostic purpose and authenticating medical images. ROI section includes the useful region for diagnostic, whereas RONI represents the black background of the image. ROI based method proposed in [41], divides the medical image into blocks and uses LSB based substitution method in RONI region for watermark embedding. In [29] Wu et al. presents a watermarking method in medical images for contrast enhancement. Similarly, in [1], an author uses hybrid technique for medical images, which combines encryption and watermarking. Additionally in [4, 35] authors proposed dual watermarking methods, both in ROI an RONI region, tamper detection and recovery information of medical images. In [17] parameter α determines the objective function along with neighbourhood effect, which maintains a balancing solution between robustness and preserving the homogenous region. Subsequently an expert knowledge is introduced into the FCM model to form Supervised FCM algorithm (S_FCM).

Das and Kundu [9] developed a blind, fragile and ROI reversible watermarking scheme. This system joins lossless compression and encryption to hide DICOM metadata, image hash and tamper localization information into digital medical image. Secure Hash Algorithm (SHA- 256) is adopted to calculate the ROI hash. Medical image integrity is confirmed by comparing the embedded and recalculated hash data. Eswaraiah and Reddy [10] presented a fragile watermarking method for validating the integrity of ROI, identifying the manipulated blocks inside ROI and recovering the original ROI region. In this technique, the medical image is divided into three parts; ROI, RONI and border region. The hash code of the ROI is computed using SHA-256 and hidden in the border region. Authentication and ROI recovery information are encoded into the RONI. Several limitations can be observed in these schemes [9, 10]; the ROI part needs to be defined manually, the ROI can only be retrieved after extracting the concealed data, and a substantive location map is required for extraction.

Gao, et al. [14] present a reversible watermarking approach to achieve contrast enhancement of ROI and tamper detection against attacks on the ROI. The watermark is embedded along with distortion-less contrast enhancement of the ROI by expanding of the peak-pairs of the ROI histogram. The feature-bit matrix created from the ROI is encoded into the LSBs of the background pixels to ensure the reversibility of the ROI. The major limitations of this approach are the need for embedding the feature-bit matrix and only the ROI part of the image can be retrieved at extraction. A novel medical image authentication approach was proposed by Balasamy et al. [3] using Discrete Wavelet Transform (DWT) and Particle Swarm Optimization (PSO). This approach finds optimal wavelet coefficients for concealing the watermark data using PSO to produce a watermarked image with low distortion. The extraction process does not require auxiliary information, but this approach has high image deformation in comparison to the low hiding capacity of the technique. Yang,et al. [39] propose a reversible and high capacity data hiding scheme for secure archiving of medical images. The contrast of the ROI part is enhanced by extending the gray-scale values and encoding the data into peak bins of the extended histogram without stretching the histogram bins. The remaining large data is embedded into the RONI part without considering visual image quality. Evaluation of the scheme shows low invisibility between the original image and watermarked versions in terms of Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index (SSIM) due to applying contrast enhancement to the watermarked images. Pan, et al. [45] presents a fragile reversible watermarking approach for digital radiographic images. This technique differentiates the background from anatomical details within the image. Histogram Shifting (HS) modulation is used to encode the watermark into the background section while HS is applied to wavelet detail coefficients of the anatomical object, encoding watermark data with the image quantum noise. This scheme delivers a reasonable visual image quality, but hiding capacity is very low. Another approach [47] uses input image to S_FCM clustering to create LAWS_S_FCM variant. To reduce the noisy pixels on segmentation, weighted-sum image (WI) is calculated through the original N × M image (I) and convolving LAW 5 × 5. However, this results in the high image deformation. The computational requirements other than ROI detection are not calculated in our work.

Our research proposes a blind, fragile and reversible watermarking technique for encoding the watermark into the cover image by extracting smooth ROI and to confirm authenticity and integrity of both image pixel data and image header. The scheme embeds the data into smooth blocks inside the ROI to achieve a watermarked image with low distortion. The proposed scheme uses closed watermark for embedding, which is more secure. Encryption is done for analysing the correlation coefficient between two data sequences in order to avoid the loss of information, due to low correlation among the pixels that are adjacent. At extraction, the whole original image is fully recovered without the need for location map. The proposed method has been evaluated based on defined medical image watermarking requirements and compared to recent reversible watermarking approaches to verify its efficiency.

Our proposed system deals with the three main contributions,

  1. i)

    Identifying the region of interest (ROI) through fuzzy based model by determining the critical points along the radial line and incorporating the spatial function with membership function, results in increase in the compactness of partitions.

  2. ii)

    The encryption algorithm which we proposed operates on the frequencies in the wavelet transformed images, and the sub-bands of the images are swapped based on the magnitude value obtained through logistic mapping in the each sub-band by which all the pixels get swapped, results in fully encrypted image.

  3. iii)

    To make proposed system from providing more security and avoiding false positive error, Key Component is calculated from the encrypted watermark image and embedded into the DWT transformed source image.

3 Fundamental concepts

3.1 Wavelet transform

The implementation of the DWT is achieved through decomposing the source signal into high and low passes filters. This technique is generally called as multi-resolution analysis (MRA), where the signal is discretized based on the varying frequency bands and resolution.

Standard DWT decomposition results in four sub-bands. At first level of decomposition LL, LH, HL, and HH sub-bands are obtained. L and H denote high and low frequency components respectively. The fine scale wavelet coefficients of detail images are represented by LH, HL, & HH and coarser level low frequency coefficients of approximation image are represented by LL. Coefficients thus obtained from DWT of approximate and detail sub-bands in the source image are fundamental features.

3.2 Logistic mapping

The logistic map is a chaotic behaviour [15, 44, 47, 48] of non-linear mathematical equation to represents the complex equations in polynomial form, which is represented in Eq. 1

$$ {X}_{n+1}=\mu .{x}_n\left(1-{x}_n\right) $$
(1)

Wherexn ∈ [0, 1] that represent the ratio of standing population to the maximum potential population. The values for the parameter μ are in the interval [0,4] and a property value of the logistic map lies between 3.57 to 4.

3.3 SVD

Today almost every watermarking method is proposed as hybrid schemes (combining two or more transforms). A hybrid scheme utilizes the features of the combined transforms to attain the proposed system goal. This attainment is possible only if exact selections of the transforms are done. Three matrices namely U, S and VTare obtained by decomposing a matrix through SVD, where all the matrices U, S and VT represents the exact size of the source matrix as given below in Eq. 2,

$$ M= US{V}^T $$
(2)

Where S represents the singular values, and U and VT are singular vectors, respectively.

3.4 Avoiding false positive error

In spite of the strength and robustness of SVD-based medical image watermarking that conceal the watermark by singular vector modification, but these systems fails in determining the rightful ownership issue because they are not resistant to false positive error. The representation of SVD based watermarking is shown in Eq. 3,

$$ {I}_w={I}_h+\alpha \ast {I}_{wm} $$
(3)

In his watermarking scheme, the watermark will undergo SVD and the embedding procedure is achieved by modifying the Ih (singular values) by incorporating Iwm(watermark) and finally scaling factor α is multiplied with it. However, when false matrices are supplied it will result in the false watermark. If this issue continuous, final generated matrix will totally associated with false watermark, results in the false positive error. To overcome this issue, key component (KC) of the watermark is calculated through singular value and embedded into the watermark. The key component can be calculated as represented below in Eq. 4,

$$ KC=U\times S $$
(4)

4 Proposed fuzzy based ROI segmentation and watermarking method

Our proposed method starts by finding region of interest (ROI) of source medical image through fuzzy method, and second level wavelet decomposition is carried out along with SVD to the source medical image. Watermark image will undergo 2-level DWT and permutation is applied on 2nd level sub-bands and substitution is applied on 1st level sub-bands. Singular value decomposition is applied on permuted watermark image and key component is calculated and then singular values of source medical image and watermark image are modified. Watermarked image is obtained by performing inverse wavelet transformation. The watermarking process is represented in Fig. 1.

Fig. 1
figure 1

Watermark embedding procedure

4.1 Fuzzy based ROI selection

Using ROI regions for embedding the watermark, the pixels in those regions will deform, which results in wrong diagnosis. On the other hand, RONI watermarking approaches embed watermarks in areas that unimportant in medical diagnosis, but they have several drawbacks such as they can be only implemented if RONI exists, the amount of information to be embedded depend on the RONI area size and ROI may not be protected against malicious attacks. The representation of ROI extraction is shown in Fig. 2.

Fig. 2
figure 2

a Image representation with ROI and RONI. b ROI contour. c ROI extraction

One of the unsupervised systems for clustering is Fuzzy C-Means (FCM) clustering [20], which has extensive reputation. These promising methods are widely used in the applications like medical imaging, image segmentation and remote sensing and uses spatial locality [51] for clustering. Our method integrate this method with SS_FCM method, to form a new hybrid system, which membership value function of the neighbourhood pixels. The general representation of the spatial function is shown in Eq. 5,

$$ {S}_{i_k}^u={\sum}_{j\in NB\left({p}_k\right)}{U}_{ij} $$
(5)

Uij represents initial membership function and NB(pk) represents a square 5 × 5 window centred at pixel(pk).

The spatial function is incorporated in the membership function and resultant function is represented as shown in Eq. 6

$$ {U}_{i_k}^u=\frac{U_{i_k}^u{S}_{i_k}^u}{\sum_{j=1}^c{U}_{j_k}^u{S}_{j_k}^u} $$
(6)

The membership function \( {U}_{i_k}^u \) is calculated and incorporated into the spatial function\( {S}_{i_k}^u \)by partitioning the host image pixel into c clusters. Defuzzification is done to cluster the data points that provide hard labels to the pixels. Resulting segmented image is obtained by maximum membership method.

ROI of the proposed system is obtained by identifying central point in the host medical image and forming the radial lines from that point. In general, radial line is used for pattern development of any objects that have a tapering form with lines converging to a common point. In proposed system, radial lines are used for determining the critical points from the converging common point. ROI of the medical image is obtained with high non-linearity, results in imposing two boundary conditions. First one is the determination of critical points, having three inputs i) intensity at the centre of ROI, ii) radial line in the final intensity and iii) intensity at the current point.

In our fuzzy system, only one output point is determined, which is either value 1 (inside ROI) or value 0 (outside ROI). While executing all the three input rules at same time, it is observed that all radial line (input 1 and input 2) are not varying as much, but the critical points are calculated either outside or inside ROI as represented in Fig. 3.

Fig. 3
figure 3

a Centre point. b Radial line. c Critical points. d ROI contour

The introduced intensity difference rules have been reduced to only 12 rules (as represented in Table 1). Two cases PS (positive small) or NS (negative small) only exists in the rules, which reduces the total proposed system reduction in rules to 62%. The major reason for rules reduction is the variation that exists between inside and outside ROI.

Table 1 Rules for intensity difference for selecting ROI in medical images

4.2 Proposed encryption method using logistic map

The proposed encryption algorithm starts with a sequence of bytes in the 1D transformed image. Logistic mapping is applied on the 1st and 2nd level sub-bands of the wavelet transformed watermark image to provide fully encrypted image. So we use independent logistic map to exchange pixel positions are represented in Eq. 7,

$$ {x}_{j+1}={\mu}_1{x}_j\left(1-{x}_j\right) $$
(7)

Where j ≥ 0, x initial seeds∈[0, 1] then we follow the steps to encryption:

figure a

4.3 Watermarking algorithm

Embedding process is given below,

  1. 1.

    Read the source medical image S

  2. 2.

    Segment ROI through fuzzy based segmentation method as explained in section 2

  3. 3.

    Apply 2-level DWT on Segmented ROI of S, S = [LL2, HL2, LH2, HH2]

  4. 4.

    Apply SVD to HH2 sub-band

    $$ {HH}_i={U}_i{S}_i{V}_i^T $$
  5. 5.

    Read the watermark image W

  6. 6.

    Apply 2-level DWT on W, W = [LL2, HL2, LH2, HH2]

  7. 7.

    Use logistic map for encryption as explained in section 4.1

  8. 8.

    Apply SVD to HH2 sub-band Encrypted image Ei,

    $$ {E}_i={U}_{Ei}{S}_{Ei}{V}_{Ei}^T $$
  9. 9.

    Calculate Key Component

    $$ {KC}_i={U}_{Ei}\ast {S}_{Ei} $$
  10. 10.

    Modify the singular values of source and watermark image using Key Components (KC)

    $$ {S}_i^{\prime }={S}_i+\propto {KC}_i $$
  11. 11.

    Apply Inverse DWT

  12. 12.

    Combine ROI and RONI region and finally watermarked image is obtained.

Extraction process follows,

  1. 1.

    Read the watermarked image Wi

  2. 2.

    Segment ROI through fuzzy based segmentation method as explained in section 2

  3. 3.

    Apply DWT on the segmented ROI

  4. 4.

    Apply SVD to HH2 sub-band Encrypted image Ei,

  5. 5.

    Calculate Key Component

    $$ {KC}_{wi}={U}_{Ei}\ast {S}_{Ei} $$
  6. 6.

    Modification of singular values using Key Components (KC)

    $$ {S}_i^{\prime }={S}_i-\propto {KC}_{wi} $$
  7. 7.

    Use same logistic map for decryption as used in encryption and shuffle the sub-bands to obtain original watermark image.

5 Experimental results

The proposed system performance is assessed over simulation experiments using MATLAB 2017b with a system configuration of 8 GB RAM and core i7 processor of 2.2 GHz. The proposed system is evaluated with sixteen medical images of size 512 ×512 including CT,MRI, ultrasound (US) and one watermark of size 64 ×64 is used, which are shown in Fig. 4 and Table.5. The metrics used for performance evaluation are capacity, complexity, robustness, reversibility and imperceptibility. The three ROI based watermarking schemes are simulated in MATLAB with unoptimized program code. In order to have a fair comparison, only the ROI extraction phase computational times are calculated without considering the time required for embedding and extraction computation.

Fig. 4
figure 4

Different kinds of medical images (CT images, MRI images, US images)

The simulation time is averaged for 10 images considering the cameraman image and copyright image as watermark images. It is observed from the bar plot of Fig. 14 that our proposed scheme has lower computation time in ROI extraction of both watermark embedding and extraction stages (Fig. 5).

Fig. 5
figure 5

Comparative analysis of computational efficiency for detecting ROI

5.1 Performance analysis for proposed fuzzy ROI selection algorithm

The Gaussian noise at various levels against segmentation accuracy is represented in Fig. 6. It shows that proposed method is stable with various noise levels at increasing rate while FCM and SS_FCM are decreased rapidly. However, while adding salt and pepper noise, the efficiency of S_FCM is decreased which is shown in Fig. 7.

Fig. 6
figure 6

Average segmentation accuracy vs noise variance(gaussian noise with variance 0.1)

Fig. 7
figure 7

Average segmentation accuracy vs noise density(10% salt and pepper noise)

Computational complexity for ROI detection with CPU time for manual detection and automatic detection are analysed. It shows that the computation-intensive multiplications are completely eliminated automatic detection cases. The proposed ROI detection method is compared with previous detection methods are shown in Table.2. The soft computing based ROI detection shows better region selection, when compared with previous methods as shown in Fig. 5.

Table 2 Comparative analysis of ROI detection methods

5.1.1 Fuzzy ROI evaluation

Coefficient and entropy index are used for evaluating the fuzzy algorithm performance, which are represented as pcIndex and peIndex. The measurement of the fuzziness degree is shown in Eqs. 8 and 9,

$$ pcIndex=\frac{\sum_{k=1}^n{\sum}_{i=1}^c{U}_{ij}^2}{n} $$
(8)
$$ peIndex=\frac{-{\sum}_{k=1}^n{\sum}_{i=1}^c\left[{U}_{ij}\mathit{\log}{U}_{ij}\right]}{n} $$
(9)

One of the direct measurements for evaluating segmentation algorithm is Segmentation accuracy (SA) is calculated as shown in Eq. 10,

$$ SA=\frac{\# correctly\ classified\ pixels}{total\# of\ pixels} $$
(10)

Datasets were described to test and evaluate the proposed method on various experiments shows that better performance is obtained when it has the maximum pcIndexvalue and segmentation accuracy, but peIndex value is minimum. Table 3 represents the results of different algorithms test on brain MRI images and Lung CT scans.

Table 3 Average results of proposed method tested on the brain image and lung CT scans dataset

5.2 Performance analysis for proposed encryption method

Various image sizes as represented in Fig. 4 (g) are considered for evaluating the proposed encryption method performance. Table 4 lists the results of various encryption algorithms with respect to NPCR and UACI. The resultant values shows that UACI is closer to 33% and NPCR value is closer to 99%, which means that proposed algorithm is secured to various kinds of attacks.

Table 4 Correlation coefficients of the original and cipher-images using various encryption schemes

5.2.1 Analysing correlation between images

The methods that are used to measure the randomness of an image are correlation analysis, which avoids the loss of information, due to low correlation among the pixels that are adjacent. Calculation of the two data sequences for analysing the correlation coefficient is represented in Eq. 11,

$$ CORR\left(P,Q\right)=\frac{E\left[\left(p-{\mu}_p\right)\left(q-{\mu}_{q\Big)}\right)\right]}{\sigma_p{\sigma}_q} $$
(11)

where p is a sequence of adjacent pixels and q is the neighbouring pixels that corresponds to any one of the diagonal, horizontal and vertical directions. μpand μqrepresents the p and q mean values respectively. The standard deviations of p and q are represented as σp and σq. Fig. 8 shows the correlation among original and cipher images where the coefficients are in the range of [0, 1] as shown in Table 4.

Fig. 8
figure 8

Correlation between original and cipher image

The methods that are used to measure the change in the pixel values are Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI). They are represented as shown in Eqs. 12 and 13,

$$ NPCR=\frac{\sum_{m=1}^M{\sum}_{n=1}^ND\left(m,n\right)}{MN}\times 100 $$
(12)
$$ UACI=\frac{1}{MN}\left[{\sum}_{m,n}^{M,N}\frac{\left|{C}_1\left(m,n\right)-{C}_2\left(m,n\right)\right|}{G-1}\right]\times 100 $$
(13)

where C1 and C2 are two encrypted images having minor changes with respect to original images. The image width and height are represented as m, n and function D(m, n)is the number of variations that exists between C1 and C2.The experimental result of proposed method is compared with various schemes are shown in Table 5.

Table 5 Comparing proposed scheme NPCR and UACI results with various encryption methods

5.2.2 Histogram analysis

To evaluate the proposed system for histogram analysis, we compared it with the methods of Rhouma, Radwan, and Decom-Crypt and the results are shown in Fig. 9.

Fig. 9
figure 9

Histogram analysis of different methods

Fig. 9 (b) represents the Rhouma’s method, which is having non-uniform distribution of histogram, which is similar to Decom-Crypt in Fig. 9 (d). However, our proposed method shown in Fig. 9 (e) shows equal distribution of histogram as similar to Radwan’s scheme in Fig. 9 (c). This result shows that proposed scheme is having better or equal performance than other methods.

5.3 Performance analysis for proposed watermarking

Peak Signal to Noise ratio (PSNR) and Normalized Cross Correlation (NCC) are the two basic parameters that are used to measure the watermarking strength in the watermarked image. The proposed method achieves better results than other existing watermarking algorithms, which is shown in Fig. 10. The algorithms proposed in [26] are having low watermarking strength when compared to the proposed scheme, which is represented in Table.6. PSNR comparison for different schemes is detailed in Table 7. Features taken into consideration for comparing various schemes are represented in Table 8.

Fig. 10
figure 10

Performance comparisons of various methods under varying embedding rates of various medical images

Table 6 Performance comparison of proposed scheme based on embedding rate
Table 7 PSNR comparison of various methods
Table 8 Comparing robustness in terms of average NC

To estimate the quality of the image, PSNR is calculated as shown in Eq. 14,

$$ PSNR=10{\mathit{\log}}_{10}\left(\frac{255^2}{\left(\frac{1}{m}\right){\sum}_{i=1}^m{H}_i-{H}_i^{\prime }}\right) $$
(14)

NCC is used to calculate the correlation coefficient between the original and extracted watermark. It is represented in Eq. 15

$$ NCC=\frac{\sum_{k=1}^{w_p\times {w}_q}{w}_k{w}_k^{\prime }}{\sqrt{\sum_{k=1}^{w_p\times {w}_q}{w}_k^2{\sum}_{k=1}^{w_p\times {w}_q}{w}_k^{\prime 2}}} $$
(15)

Where wk and \( {w}_k^{\prime } \)are the original and the extracted watermarks respectively. NC comparison for various methods is represented in Table 8.

5.3.1 Analyzing robustness of watermark

To analyze the proposed method on basis of robustness on geometric and non-geometric attacks, experiments are conducted on watermarked image, where noise affects a portion of the image or the whole image. Experiments are conducted by introducing these noises at different amounts and area. Experiments are also conducted by replacing part of watermarked image by one or more icons. Different amount of noise is introduced on each image. The effect on the embedded watermark is studied by extracting the watermark from the noise affected image. Here the Copyright logo and cameraman image are shown as watermark image with Gaussian, Speckle, Salt & Pepper and Sharpening attacks. Fig. 11 shows the salt & pepper attack on watermark with density 0.2 and their NC = 0.924 for copyright logo and NC = 0.931 for cameraman image which shows the better robustness.

Fig. 11
figure 11

a and c 0.2 density salt & pepper noise watermarked medical images b and d extracted watermarks from various medical images of salt & pepper attack

As shown in Fig. 12, Gaussian noise attack with variance 0.1 results in better NC. Similarly in Fig. 13 with speckle noise with variance 0.1 and Fig. 14 with sharpening attack also shows the better performance of the proposed algorithm.

Fig. 12
figure 12

a and c 0.1 density gaussian noise watermarked image b and d extracted watermarks from various medical images undergone gaussian attack

Fig. 13
figure 13

a and c 0.1 density speckle noise watermarked image b and d extracted watermarks from various medical images undergone speckle attack

Fig. 14
figure 14

a and c watermarked medical images undergone sharpening attack, b and d extracted watermarks

6 Conclusion

Our proposed algorithm combines the watermark and encryption for better medical image security, which are processed for diagnosis. The experimental results demonstrate that the proposed method better authentication to the system with high integrity to the medical images and good confidentiality to the watermarked information which possess high efficiency when proposed scheme is compared with other algorithms on varying digital images such as: nuclear medicine, ultrasound, MRI, computed radiography (CR), computed tomography (CT). PSNR value for proposed method is about 49.5 mean that proposed method does not affect the image quality and in the same time securing watermark information. Proposed algorithm shows that high embedding rate is achieved with low distortion. This indicates that the quality of the watermarked image is high and provides good payload. Experimental images for proposed algorithm are grey scale images that can be extended to color images in future.