[BACK]
Computers, Materials & Continua
DOI:10.32604/cmc.2022.019302
images
Article

Secure Watermarking Scheme for Color DICOM Images in Telemedicine Applications

Kamred Udham Singh1, Hatem Salem Abu-Hamatta2, Abhishek Kumar3, Achintya Singhal4, Mamoon Rashid5,* and A. K. Bashir6

1Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan
2Department of Applied Sciences, Aqaba University College, Al Balqa Applied University, Aqaba, Jordan
3School of Computer Science & IT, JAIN (to be Deemed University), Bangalore, India
4Department of Computer Science, Banaras Hindu University, Varanasi, India
5Department of Computer Engineering, Faculty of Science and Technology, Vishwakarma University, Pune, 411048, India
6Department of Computing and Mathematics, Manchester Metropolitan University, UK
*Corresponding Author: Mamoon Rashid. Email: mamoon873@gmail.com
Received: 09 April 2021; Accepted: 03 June 2021

Abstract: Teleradiology plays a vital role in the medical field, which permits transmitting medical and imaging data over a communication network. It ensures data reliability and provides convenient communication for clinical interpretation and diagnostic purposes. The transmission of this medical data over a network raises the problems of legal, ethical issues, privacy, and copyright authenticity. The copyright protection of medical images is a significant issue in the medical field. Watermarking schemes are used to address these issues. A gray-level or binary image is used as a watermark frequently in color image watermarking schemes. In this paper, the authors propose a novel non-blind medical image watermarking scheme based on 2-D Lifting Wavelet Transform (LWT), Multiresolution Singular Value Decomposition (MSVD), and LU factorization to improve the robustness and authenticity of medical images. In this scheme, multiple color watermarks are embedded into the colored DICOM (Digital Imaging and Communications in Medicine) images obtained from Color Doppler images (DICOM format), and the average results achieved by our proposed scheme is 46.84 db for Peak Signal-to-Noise Ratio (PSNR), 37.46 db for Signal-to-Noise Ratio (SNR), 0.99 for Quality of Image and 0.998 for Normalized Correlation for various image processing attacks. These results make our watermarking technique an ideal candidate for medical image watermarking.

Keywords: Digital; imaging; medicine; multiresolution; medical image; watermarking

1  Introduction

Teleradiology allows to transmit radiological images for clinical and health care assistance from remote areas, enabling patients to get a second opinion from specialists worldwide. It also offers the means for healthcare assistance when patients afar from their doctors [1]. Teleradiology can be vital in continuously monitoring the health progress of a patient. Rapid growth and proliferation of computer-assisted technologies in medical sciences, coupled with fast, sophisticated, solid information and communication systems, have exponentially increased medical-related communication over networks [2,3]. Advance medical imaging technologies, viz. MRI, Neuroimaging Informatics Technology Initiative, Color Doppler Imaging, Positron Emission Tomography (PET), CT Scan, etc., have transformed the modern healthcare sector. Due to high printing costs and strenuous communication to distant places, film-based imaging has been replaced by filmless imaging for generating digital images on different devices.

Most hospitals have bulks of patients’ data like disease reports, patient's personal information, and medical images in the present scenario. Though hospitals, doctors, radiologist, and providers of medical images are not ready to distribute their patient's medical information in a networked environment due to the copying, ease of interception, unauthorized distribution, and manipulation of the data leading to copyright violations and challenging the integrity of medical data [4], but the need of the hour is that these records be transmitted in low cost and rapid ways through these data communication networks, without losing their qualities and integrity.

Medical information of a patient over the internet is subjected to the bi-fold challenge of noise attacks and damaged by intruders. Thus teleradiology has to ensure reliable data transmission and data authentication of these medical data over such unsecured networks. It also needs to deploy authentication mechanisms like watermarking to secure and authenticate medical images generated using Color Doppler Imaging, X-Ray, PET, MRI, CT Scans, and Neuroimaging Informatics Technology Initiative, etc. Watermarking of digital images provides a powerful way to authenticate the medical data for copyright ownership [5], which is a particular type of image steganography and that can embed the watermark in a carrier image without degrading the quality of the image; thus, preserving the medical image quality and information [6]. Robustness and security of watermarking schemes against various image-processing attacks are among the main challenges in watermarking medical images.

Most state-of-the-art works in the domain of medical image watermarking were proposed for .bmp and .jpg medical images [7]. Some researchers suggested DICOM image watermarking, which was limited to either gray-scale watermarks or gray-scale DICOM images [8]. But in the present medical scenario, various advanced medical imaging technologies have been developed. Like Color Doppler, Ultrasound, etc., these imaging technologies generate full-featured color DICOM medical images instead of flat and featureless .bmp or .jpg images. So the medical healthcare system needs a watermarking scheme for the authentication of these color DICOM images. To meet this requirement of a watermarking technique for the authentication of the color DICOM images, the authors proposed a secure watermarking system for color DICOM images based on LWT, MSVD, and LU factorization. The proposed watermarking methodology attempts to provide higher security and low complexity for DICOM image watermarking, thus overcoming the limitations of the highlighted state-of-art contributions in subsequent sections.

Based on the challenges referred to above, we highlight the significant contributions of this paper as:

(1)   A novel non-blind medical image watermarking scheme is developed based on 2-D Lifting Wavelet Transform (LWT), Multiresolution Singular Value Decomposition (MSVD), and LU factorization to improve the robustness and authenticity of medical images.

(2)   An efficient watermarking scheme for color DICOM images in securing access over insecure networks is implemented.

(3)   Multiple color watermarks are embedded into the colored Digital Imaging and Communications in Medicine (DICOM) image and then extracted successfully from it even after various attacks.

(4)   The evaluation of the watermarking scheme is performed on Color Doppler images (DICOM format), and the average results achieved by our proposed system outperform state-of-the-art.

This research article is structured as follows: Section 2 presents the literature survey. Section 3 reviews the MSVD, LWT and LU. Section 4 presents a proposed watermarking scheme. Experimental findings and evaluation of proposed work with medical images are described in Section 5. The robustness analysis of the introduced scheme is discussed in Section 6. Finally, the findings are concluded in Section 7.

2  Related Works

The rapid growth of telemedicine motivated researchers to work on medical imaging. Medical images are broadly classified as grayscale and color images. Moreover, the medical images are often grayscale, having lower faint contrast and faint characteristics due to the conditional limit. Therefore, it is hard for doctors to diagnose and interpret grayscale medical images [9]. Hence, researchers pay more emphasis to color images because of their numerous applications in the era of radiology.

In the present scenario, most medical organizations use color DICOM images for better diagnosing and color trademarks (watermark or logo) for greater security and authenticity. Since DICOM image is augmented with sensitive metadata, copyright protection of the Color Doppler Image, MRI, CT Scan, etc. became a more crucial problem. Consequently, it is necessary to develop a watermarking technique for color medical images with holographic logos. Watermarking methods are classified broadly into two types, viz. spatial domain and transform domain (frequency domain). In the spatial domain image, watermarking technique data is directly embedded in a host image by modifying its bits. In the transform domain or frequency domain, the watermarking image is transformed from spatial domain to frequency domain using various transformations such as Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), and Discrete Wavelet Transform (DWT). Compared to the spatial domain, transform domain watermarking techniques are computationally complex, but these techniques provide more embedding capacity and are more robust against noise attack [10]. In the last few years, the researchers developed many watermarking methods for the color image, based on a different type of matrix decomposition.

In the literature, several techniques are there for image watermarking based on various matrix decompositions. Onur et al. [11] proposed a scheme based on a hybrid image-watermarking scheme on DWT, SVD, Arnold's Cat Map, and LU matrix decomposition. The author initially applied the DWT on the host image, which decomposes it into four frequency sub-bands. It then uses the LU factorization (LDU) on the LL band that decomposes it in L, D, and U and then applies the SVD on the D component. D diagonal coefficients of singular value are modified with the oblique factors of the unique value's chaotic mapped watermark. Dongyan et al. [12] proposed a watermarking scheme for color images that work on LU, DWT, and Arnold Transform. The author initially applies the DWT on the host image and gets the four sub-band as usual. Now the author applies the LU factorization on the HL and LH bands. Furthermore, Arnold transform applies to the watermark, and then bits of a watermark are embedded using the quantization method. Gaurav et al. [13] suggested a semi-blind watermarking scheme and inserted a grayscale watermark in the host image. In this scheme, the author applied DWT on the host image and created a reference image from all sub-band. After that, the authors applied the SVD on the reference image and watermark. The watermark insertion is achieved by using a reference image's singular values with the watermark's singular values Z.

Zhiqiu et al. [14] proposed a robust null-watermarking scheme based on quaternion polar harmonic Fourier and chaotic map. This scheme is more robust against geometric and noise attacks. Onur et al. [15] suggested that the hybrid watermarking system that relies on DWT & SVD applies the DWT to the host picture first and then the SVD to the LL band. Now the author embedded the watermark in the diagonal singular value by modifying it. Saeid et al. [16] propose a hybrid scheme. The authors initially applied DWT on the host image, partitioned the LH and HL into 8 × 8 blocks, and then apply the DCT on these blocks. After that author, apply the SVD on those blocks. Singular SVD values can be used to match the watermark.

Falgun et al. [17] recently proposed a blind image-watermarking scheme focused on the discrete transformation of the value's wavelet and singular decomposition. Within this scheme, the author initially applies DWT to the region of interest of medical images to obtain specific frequency sub-bands of its wavelet decomposition. The author applied SVD on the lower frequency sub-band (LL band) of the region of interest to get different singular matrices. Watermark's bits are embedded in these pairs by modifying them using a certain threshold. This scheme is extended to different types of medical images, viz. CT scan, mammography, and X-ray. In the article [18], Singh et al. introduced a color image watermarking scheme that uses SVD, DWT, and QR Code in which QR code is used as the image of a watermark. The author initially applies the DWT on the host image and again applies it to the lower frequency band. Then divide the range of frequencies into a block size of m ∗ n, then locate each block's RGB component to use the SVD to each RGB part and get unique watermarking values.

Xiyao et al. [19] proposed a hybrid scheme based on recursive dither modulation, Slantlet transform, and SVD decomposition. They stated that the scheme is more subtle and robust against attacks. In the article [20], Gao et al. suggested an LWT-derived reversible-image watermarking scheme and chaotic system. The author initially divided the host image into non-overlapping blocks and then applied the LWT on each block and embedded the watermark into every block's LL band. The chaotic system is used for the shuffling of the position of blocks. This scheme is robust towards the cropping attack. Choudhary et al. [7] presented a passive image watermarking scheme using Polar Cosine Transform (PCT). The author initially extracts the image feature using PCT and then applied the patch match algorithm for forge regions to embed the watermark. Souvik et al. [21] present a strategy focused on LWT and SVD. The author first applies the LWT to the host image and divides the LL band into 2X2 size blocks. Furthermore, they used the SVD on these blocks and embedded the binary watermark by modifying these blocks’ singular values. In the article [22], Singh et al. suggested a new system based on LWT. In this scheme author initially apply the three-level LWT and divides the LH sub-band into non-overlapped blocks, and these blocks are randomly shuffled. A binary watermark is embedded in these blocks. The main drawback of this system is that it cannot withstand some attacks, i.e., filtering rotational attacks on salt and pepper noise. Singh et al. [23] proposed another scheme in which the three-level LWT was initially applied to the host image, and the binary watermark was embedded in the HL.

After reviewing the literature in-depth and their contributions, we found little state-of-the-art contributions are made for the color watermarking DICOM images. Recognizing the importance of color DICOM imaging to deter the challenges in transmitting over an unsecured network, a watermarking scheme, especially for color DICOM images generated by various latest medical equipment like Color Doppler, ultrasound, etc is proposed. In this scheme, multiple color watermarks are inserted in DICOM images instead of a single watermark without degrading the original image's quality. It is a secure hybrid watermarking scheme based on the LWT, MSVD, and LU factorization and robust against the various image processing attacks.

3  Preliminaries

This section describes the methodology used in this research. For secure image watermarking, we have used Multiresolution Singular Value Decomposition (MSVD), LU Factorization and, Lifting Wavelet Transform (LWT) to locate the most impactful feature of the color DICOM image and subsequently secure it using this Image Watermarking Scheme for Telemedicine Applications.

3.1 Multiresolution Singular Value Decomposition (MSVD)

MSVD computational process is simple and easily can be used in real-time applications. Like Discrete Cosine Transform (DCT), Fast Fourier Transform (FFT), and Wavelet, it doesn't have a fixed set based on vectors. One resolution feature is easy to detect, but the characteristics of multiresolution techniques are undetectable. It is the replacement of the wavelets and is comparable to the Wavelet Multi-Resolution Analysis (MRA) because it decomposes the original image into different frequency bands (lower frequency and higher frequency LL, LH, HL, and HH) [24]. MSVD has low computational power than wavelet transformation and directional information such as wavelet transformations. In MSVD, decomposition is done based on the data set [25]. It can be used at multiple levels and often provide robustness against the various geometrical image processing attack viz. rotation, cropping, and resizing.

For a matrix, A having dimension M ∗ N, the singular value decomposition (SVD) is the factorization of A into the three-matrix product and is shown in Eq. (1) as:

A=USVT(1)

where V and U columns are orthonormal, and matrix S is a diagonal matrix in descending order of singular values.

MSVD for image (I) of size M × N is computed by initially reshaping I to a matrix I′ of size 4 × MN/4. Consequently, the singular value decomposition of I′ is shown in Eq. (2) as:

[U,S]=SVD(I)(2)

Now, matrix T is shown by Eq. (3) as:

T=VTI(3)

where matrix U of size 4 × 4, matrix S of size 4 × MN/4 and matrix T of size [4 × MN/4]. In matrix T rows I, II, III, and IV are reshaped to produce size matrices M/2 × M/2. Such reformatted matrices are the image sub-bands i.e., LH, HL, LL, HH. The LL band includes the lower frequency information, and the high-frequency information is found in other sub-bands i.e., HL, LH, and HH. In this paper, we use LH band for watermarking.

3.2 Theorem: (LU Factorization)

If A ∈ Rnxn and det(A(l:k, l:k)) ≠ 0 for k = l:n – 1, instead there is a triangular lower unit L ∈ Rnxn and a triangular upper unit U ∈ Rnxn such that A = LU. If this is the scenario, and A is non-singular, the variables are special and det(A) = u11,…, unn [26].

LU factorization is an algebraic “high-level” definition of Gaussian elimination. Triangular system solving is an easy O(n2) computation. Any square matrix A is writable as a product of matrices L and U. LU for all instance's decomposition may not exist. Theorem 1 specifies the conditions in which the decomposition can be carried out. LU decomposition of 3 × 3 matrix is depicted in Eq. (4) as:

A=[a1,a2,a3]=[a11a12a13a21a22a24a31a32a34] (4)

Any matrix A=[a11a12a13a21a22a24a31a32a34] can be factorized in

L=[100a2110a31a321],U=[a11a12a130a22a2400a34].

where L stands for lower-triangular matrix, which has diagonal Identity Elements and upper non-diagonal elements are zero. U is the upper triangular matrix with some coefficients on the lower diagonal non-diagonal components, zero. The inverse decomposition of the LU can be defined as

L×U=A

The decomposition of the LU matrix has less computational complexity than the SVD and QR [27,28] and decomposition with LU is an interim step in the decomposition of QR. In factorization operation, count of LU is 23m2 whereas for QR factorization the operation count is 43m3, where m is the size of the matrix [22]. Due to lower computational complexity, LU will be explored for the watermarking technique.

3.3 Lifting Wavelet Transform (LWT)

In the article, Jayant et al. [29] suggested LWT. The essential characteristic of this scheme is that the spatial domain arises from all the constructions. It overcomes the conventional wavelet transformation limitations by decreasing the complexity of time and space (because it does not require complex mathematical calculations, unlike traditional wavelet transform). So computing wavelet transforms an efficient and most straightforward algorithm. Lifting Scheme does not rely on transforms from Fourier. Digital signals are a sequence of integers, but the resultant message is a sequence of floating-point numbers after the wavelet transform. This hinders the possibility of a perfect or a reasonable reconstruction of the signal. A transformation algorithm should have a feasible reversible implementation. It preserves the messages even after the transform, i.e., it behaves as an operator, which transforms integer-based sequences again into integer-based sequence signals. Lifting scheme provides this facility of preserving the domain of transform (i.e., integer to integer) with better computational efficiency than the conventional wavelet transformations, making it a commonly used change in image processing [30].

LWT decomposes the image into four frequency subgroups viz. LH, HL, LL, and HH. The sub-band LL has a lower frequency that contains most of the picture's energy, and other sub-bands (LH, HL, and HH) have elements of higher frequency that contain lower energy in the picture. The LWT can be applied several times on the LL band to decompose into sub-bands because it includes most original image energy.

4  Proposed Scheme

DICOM images are widely used in medical imaging, as they contain high-definition images and patient metadata, often known as the Electronic Patient Record (EPR). Watermarking of DICOM images is a crucial task in comparison to the other image formats viz .jpg, .bmp, .tiff, .png etc. The watermarking scheme must be imperceptible. There must not be any noticeable change in color, hue, and intensity, which may hamper the image's diagnosis. The metadata of the DICOM image is highly sensitive, so it has to be preserved carefully. This paper suggests a new watermarking algorithm for color DICOM images based on MSVD, LWT, and LU factorization, including the watermark embedding and extraction processes.

images

4.1 Insertion Algorithm

The metadata of the DICOM image is extremely sensitive, so we initially isolate this metadata from the DICOM image. Now medical images and watermarks are decomposed into RGB components, and each color component is subjected to the MSVD that decomposes it into four frequency bands viz. LH, HL LL, and HH. HL bands contain the most positive values, so we apply the LWT on the HL band, which decomposes into four different sub-band frequency, viz. LL, LH, HL, and HH. Most of the information on the images contained in LL band. Therefore, we select the LL band of the watermark embedding. Now apply the LU factorization on the watermark's primary color component, generate the new vector, and embed these vectors into the LL band of the LWT. Watermark embedding is controlled via a scaling factor (alpha) and performs the inverse process to generate the image. Finally, we integrate the patient's metadata with this watermarked image and create the watermarked DICOM image. The watermark embedding algorithm is explained in Tab. 1 and is presented in Fig. 1.

images

Figure 1: Watermark insertion process

4.2 Extraction Algorithm

The extraction of watermarks is an integral part of the success of any watermarking scheme. In Fig. 2, the watermark extraction method for the suggested scheme is illustrated. As shown in Fig. 2, the actual DICOM image is required when the watermark is extracted from the watermarked DICOM image. Initially, metadata is isolated from original and watermarked DICOM images and decomposed into three primary color components (RGB). After that, apply the MSVD on each primary color component of the original and watermarked image. Then HL band of MSVD is subjected to wavelet transformation that decomposes both images in four sub-bands with various frequencies, i.e., HL, LH, LL and, HH. Using LL sub-bands of both images, we separated the noisy components from the watermarked DICOM image. Then perform the Inverse LU factorization on these noise components to regenerate the watermarks. The extraction method algorithm is portrayed in Fig. 2 and explained in Tab. 2.

images

Figure 2: Watermark extraction process

images

5  Results and Discussion

The watermarking scheme trial was performed over color DICOM images (primary data) generated by the Color Doppler test, congregated from S.S.L. Hospital Banaras Hindu University Varanasi India (primary source), under ethical medical practices, without revealing the patient's identity and only for the experimental purpose. The scheme was implemented on MATLAB platform configured on Intel core TM i7-5500U CPU 2.5 GHz processor with 8 GB RAM and running Windows10 operating system. The host color DICOM images of dimension 1024 × 768 pixels, the BMP format watermark image of dimension 32 × 32 pixels, and bit depth of 24 bits are used in the experiment.

5.1 Performance Measures

The imperceptibility of the watermarking scheme is tested on various datasets and projected in this paper on six different DICOM images. The outcomes are inspected regarding image quality measurements viz. PSNR, MSE, Universal Image Quality Index, and Normalized Correlation. PSNR and two-dimensional Normalized Correlation (NC) is utilized as a measure for perceptual imperceptibility. For the watermark perceptibility estimation, PSNR is deliberated which, is outlined in terms of Eqs. (5)–(7) as follows [31]:

MSE (Mean Square Error)=1mni=0mj=0n(AijBij)2(5)

PSNR (Peak Signal to Noise Ratio)=10log10(Max)21mni=0mj=0n(AijBij)2(6)

NR=10log10i=1nj=1m(Aij)2i=1nj=1m(AijBij)2(7)

The watermarking system's robustness is calculated using Normalized correlation (NC) [32,33] and, between the original watermark W and the extracted watermark W+, which is defined in terms of Eq. (8).

NC=c=13x=1py=1q(W(x,y,c)×W+(x,y,c))c=13x=1py=1q(W(x,y,c)2)c=13x=1py=1q(W+(x,y,c)2)(8)

Universal image quality index Q [34] is defined in terms of Eq. (9) as follows:

Q=4σxyx¯y¯(σx2+σy2)[(x¯)2+(y¯)2](9)

where x¯,y¯,σx2andσy2 are defined interms of Eq. (10) as follows:

x¯=1Ni=1Nxiandy¯=1Ni=1Nyi

σx2=1N1i=1N(xix¯)2andσy2=1N1i=1N(yiy¯)2 (10)

σxy=1N1i=1N(xix¯)(yiy¯)

where X={xii=1,2,3,,N} and Y={yii=1,2,3,,N}. X and Y are the original and the test image signals, respectively.

Universal image quality index Q is the product of three components that can be defined in terms of Eq. (11) as:

Q=σxyσxσy×2x¯y¯(x¯)2+(y¯)2×2σxσyσx2+σy2(11)

5.2 Analysis of Proposed Scheme

The trial of the proposed scheme is presented on six diverse DICOM images viz. Img1, Img2, Img3, Img4, Img5, and Img6, depicted in Fig. 3, determine and analyze the imperceptibility and robustness parameters. The metadata containing the affected person's information is also preserved within the watermarked DICOM image. The scheme inserted various copies of the watermark across color DICOM images, and consequently, multiple watermarks are extracted from the watermarked DICOM image. All the images used for the experiment are of the same dimension and from the same source, which results in the same number of inserted watermarks. Consequently, we tend to determine that 12 watermarks were embedded throughout all the images, and therefore, a similar number of watermarks are extracted. Tab. 3 demonstrates the performance measures of watermarked images from Img1 to Img6.

Both Quality parameters NC and Q have values close to one, indicating a virtually excellent correlation between the initial and watermarked images. PSNR of the watermarked image is over thirty-nine decibels, which suggests that the watermarked image quality is exceptionally considerable.

images

Figure 3: Test DICOM images with their corresponding watermarked images and extracted watermarks

5.3 Analysis of the Proposed Scheme for Different Number of Watermarks Insertion

This scheme embeds multiple watermarks in the host image. The maximum watermark insertions in the DICOM image without influencing the diagnosis based on a radiologist's watermarked DICOM image are demonstrated in Tab. 4. The scheme is further tested with many watermark insertions and found that the outcomes are promising.

Tab. 4 demonstrates that the quality metrics are directly proportionate to the watermark insertion, and no notible changes are observed. Nevertheless, if we evaluate the PSNR of the img1 at 12 watermark insertions & 2 watermark insertions, there is a significant variation from 46.98049 to 54.356909 db. But there are no significant variations in NC and Q; that's why not influencing the diagnosis. The results of the suggested technique are compared with other existing techniques [17,34] in Tab. 5, and it is observed that the results are more significant.

images

images

images

6  Robustness Analysis

The watermarked color DICOM images have been subjected to different image processing/manipulation like Salt & Pepper, Poisson, Gaussian, Speckle noise, and image format conversion that may cause watermarks to purge as an attack. Sustenance of the watermarking scheme against these attacks is the test of the robustness of the system. Since the algorithm deals with medical images, we always keep in mind that the diagnosis based on these watermarked images may cause the patient's life and death. Therefore, the deterioration of these watermarked images beyond an acceptable quality is not acceptable. As the proposed scheme is a multiple watermark insertion scheme for increased robustness; hence we analyze the algorithm either with the maximum inserted watermarks or fewer, which i affects the diagnosis. Therefore, the technique is tested with the different attacks having different parameters until the quality of the image is acceptable according to the quality metrics. We have also tested the scheme to convert the DICOM images in flat and featureless formats like .bmp or .jpg. It is common to communicate in these formats because larger DICOM images require a resource-intensive communication medium.

6.1 Salt and Pepper Noise Attack

Salt and pepper noise attack implemented with noise density 0.001 and 0.002 on the watermarked DICOM picture, and then the watermark is successfully extracted. Tab. 6 tabulates the parametric data post-attack on watermarked DICOM healthcare images, and the findings reflect that the efficiency of the proposed technique for DICOM images is promising.

images

6.2 Gaussian Noise Attack

Gaussian noise attack introduced with variance 0.001 to 0.002 on the watermarked DICOM image, and then the watermark is successfully extracted by the suggested watermarking method. Tab. 7 shows the attack parameter and the subsequent image quality metrics. The parametric values are positive performance indicators of the proposed technique for DICOM images.

images

6.3 Poisson Noise Attack

Poisson noise attack introduced in the watermarked DICOM image, and then original image is effectively extracted by the suggested watermarking technique. Metric values tabulated in Tab. 8 depict the analysis of the attack for the DICOM medical images. The outcome indicates that the performance of the suggested method for DICOM images is promising.

images

6.4 Speckle Noise Attack

Speckle noise attack introduced with variance 0.001 to 0.003 on the watermarked DICOM picture, and then the suggested watermarking scheme successfully extracts the watermark. In Tab. 9, evaluation of the DICOM medical image attack is tabled and the findings show that the output of the proposed DICOM image scheme is strong.

images

7  Conclusion

Advancements in medical technologies worldwide gave rapid growth to medical imaging, thus providing digital projections in the various parts of the human body to diagnose the medical conditions for treatment purposes. These devices generate high-quality images of patients and provide an easy insight to understand the situation of patients. Nevertheless, this leads to challenges viz. authentication, theft, enforcement of medical ethics, etc. Thus, the watermarking scheme devised for DICOM images augmented with sensitive metadata using the combination of MSVD, and LWT followed by LU factorization addresses these challenges in medical healthcare. Different color DICOM images (1024 x 768 pixels) (primary data) sourced from the Color Doppler test are watermarked with 24-bit color watermark (32 x 32 pixel) have been tested in the proposed scheme. The parameters NC, Q, SNR, PSNR, and MSE are the basis for analyzing the quality of watermarked images. The tradeoff between image quality and watermark insertions ensures yielding the results of utter significance. Our proposed scheme provides robustness towards various image processing attacks such as Poisson, Salt & Pepper, Speckle, Gaussian interference, and image format conversion. The attacking parameters were controlled in that it does not affect the quality of the watermarked DICOM to the level that it becomes insignificant for medical purposes. The scheme's final result is compared with several other existing schemes, and we found that the elaborated scheme to be noteworthy. The proposed scheme has high potential and can be extended to other medical imaging formats viz. Neuroimaging Informatics Technology Initiative (Nifti) and Minc.

Funding Statement: The authors received no specific funding for this study.

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

 1.  K. Alavi, H. Al-Ahmad and F. Taher, “Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions,” in 2017 24th IEEE Int. Conf. on Electronics, Circuits and Systems, Batumi, Georgia, IEEE, pp. 397–400, 2017. [Google Scholar]

 2.  T. Rohit, S. Borra, V. Dwivedi and K. Borisagar, “An efficient medical image watermarking scheme based on FDCuT–DCT,” Engineering Science and Technology, An International Journal, vol. 20, no. 4, pp. 1366–1379, 2017. [Google Scholar]

 3.  T. Sriti, A. K. Singh and S. P. Ghrera, “Chaotic based secure watermarking approach for medical images,” Multimedia Tools and Applications, vol. 79, no. 26, pp. 4263–4276, 2020. [Google Scholar]

 4.  Z. Aditi, A. K. Singh and P. Kumar, “A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine,” Multimedia Tools and Applications, vol. 77, no. 4, pp. 4863–4882, 2018. [Google Scholar]

 5.  C. Lakshmi, K. Thenmozhi, J. B. B. Rayappan and R. Amirtharajan, “Encryption and watermark-treated medical image against hacking disease—An immune convention in spatial and frequency domains,” Computer Methods and Programs in Biomedicine, vol. 159, pp. 11–21, 2018. [Google Scholar]

 6.  T. Sriti, A. K. Singh andS. P. Ghrera, “Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications,” Multimedia Tools and Applications, vol. 78, no. 3, pp. 3457–3470, 2019. [Google Scholar]

 7.  P. Choudhary, S. H. Om and S. Maheshkar, “Authentication of medical images using passive approach,” IET Image Processing, vol. 13, no. 13, pp. 2420–2427, 2019. [Google Scholar]

 8.  S. Malini and R. S. Moni, “Image denoising using multiresolution singular value decomposition transform,” Procedia Computer Science, vol. 46, pp. 1708–1715, 2015. [Google Scholar]

 9.  C. D. Singh, A. K. Singh, B. Kumar and J. P. Saini, “Quantization based multiple medical information watermarking for secure e-health,” Multimedia Tools and Applications, vol. 78, no. 4, pp. 3911–3923, 2019. [Google Scholar]

10. L. C. Chin and C. C. Tsai, “Digital image watermarking using discrete wavelet transform and singular value decomposition,” IEEE Transactions on Instrumentation and Measurement, vol. 59, no. 11, pp. 3060–3063, 2010. [Google Scholar]

11. J. Onur, H. G. İlk and E. Elbaşı, “A secure and robust watermarking algorithm based on the combination of dwt, svd, and lu decomposition with arnold's cat map approach,” in 2013 8th Int. Conf. on Electrical and Electronics Engineering, Bursa, Turkey, IEEE, pp. 306–310, 2013. [Google Scholar]

12. W. Dongyan, F. Yang and H. Zhang, “Blind color image watermarking based on DWT and LU decomposition,” Journal of Information Processing Systems, vol. 12, no. 4, pp. 765–778, 2016. [Google Scholar]

13. B. Gaurav and B. Raman, “A new robust reference watermarking scheme based on DWT-SVD,” Computer Standards & Interfaces, vol. 31, no. 5, pp. 1002–1013, 2009. [Google Scholar]

14. X. Zhiqiu, X. Wang and C. Wang, “Geometrically invariant color medical image null-watermarking based on precise quaternion polar harmonic Fourier moments,” IEEE Access, vol. 7, pp. 122544–122560, 2019. [Google Scholar]

15. J. Onur and E. Elbaşi, “Hybrid non-blind watermarking based on DWT and SVD,” Journal of Applied Research and Technology, vol. 12, no. 4, pp. 750–761, 2014. [Google Scholar]

16. F. Saeid and M. Moeini, “A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks,” Optik, vol. 127, no. 2, pp. 964–972, 2016. [Google Scholar]

17. T. N. Falgun and V. K. Srivastava, “A blind medical image watermarking: Dwt-svd based robust and secure approach for telemedicine applications,” Multimedia Tools and Applications, vol. 76, no. 3, pp. 3669–3697, 2017. [Google Scholar]

18. S. R. Kumar, D. K. Shaw and J. Sahoo, “A secure and robust block based DWT-SVD image watermarking approach,” Journal of Information and Optimization Sciences, vol. 38, no. 6, pp. 911–925, 2017. [Google Scholar]

19. L. Xiyao, J. Lou, H. Fang, Y. Chen, P. Ouyang et al. “A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images,” IEEE Access, vol. 7, pp. 76580–76598, 2019. [Google Scholar]

20. T. G. Gao, T. Gang and Q. L. Gu, “Reversible watermarking algorithm based on wavelet lifting scheme,” in Int. Conf. on Wavelet Analysis and Pattern Recognition, Beijing, China, IEEE, vol. 4, pp. 1771–1775, 2007. [Google Scholar]

21. S. Souvik and K. Senthilkumar, “A highly secured digital watermarking algorithm for binary watermark using lifting wavelet transform and singular value decomposition,” in IET Chennai 3rd International on Sustainable Energy and Intelligent Systems, Tiruchengode, pp. 109–113, 2012. [Google Scholar]

22. V. V. Singh, R. K. Jha and A. Ojha, “Significant region based robust watermarking scheme in lifting wavelet transform domain,” Expert Systems with Applications, vol. 42, no. 21, pp. 8184–8197, 2015. [Google Scholar]

23. V. V. Singh and R. K. Jha, “Improved watermarking technique based on significant difference of lifting wavelet coefficients,” Signal, Image and Video Processing, vol. 9, no. 6, pp. 1443–1450, 2015. [Google Scholar]

24. M. Farhan, D. Dangwal, S. Kumar and V. Malik, “A chaos-based image encryption algorithm based on multiresolution singular value decomposition and a symmetric attractor,” Imaging Science Journal, vol. 68, no. 1, pp. 24–40, 2020. [Google Scholar]

25. S. Siddharth, R. Singh and T. J. Siddiqui, “MSVD based image watermarking in NSCT domain,” in 2016 Fourth Int. Conf. on Parallel, Distributed and Grid Computing, Waknaghat, India, IEEE, pp. 685–688, 2016. [Google Scholar]

26. G. Efstratios, B. Philippe and A. H. Sameh, In Parallelism in Matrix Computations. Netherlands: Springer, 2016. [Online]. Available: https://www.springer.com/gp/book/9789401771870. [Google Scholar]

27. Z. Yuhui, B. Jeon, D. Xu, Q. M. Wu and H. Zhang, “Image segmentation by generalized hierarchical fuzzy c-means algorithm,” Journal of Intelligent & Fuzzy Systems, vol. 28, no. 2, pp. 961–973, 2015. [Google Scholar]

28. H. Haseeb, A. K. Bashir, M. Ahmad, V. G. Menon, I. U. Afridi et al. “Real-time image dehazing by superpixels segmentation and guidance filter,” Journal of Real-Time Image Processing, vol. 17, pp. 1–21, 2020. [Google Scholar]

29. B. Jayant and A. Nayak, “Lifting wavelet transform based ultrasound image fusion scheme,” in Adaptive Optics: Analysis, Methods & Systems, Orlando, Florida, United States: Optical Society of America, pp. JTu4A-38, 2018. [Google Scholar]

30. T. S. Sharmila and K. Ramar, “Efficient analysis of hybrid directional lifting technique for satellite image denoising,” Signal Image Video Process, vol. 8, pp. 1399–1404, 2014. [Google Scholar]

31. P. Jakub, G. Mikolajczak and J. Kowalski, “The use of the universal quality index for user recognition based on fingerprint analysis,” in Multimedia and Network Information Systems, Springer: Cham, pp. 75–87, 2017. [Google Scholar]

32. H. Haseeb, A. K. Bashir, R. Abbasi, W. Ahmad and B. Luo, “Single image defocus estimation by modified Gaussian function,” Transactions on Emerging Telecommunications Technologies, vol. 30, no. 6, pp. e3611, 2019. [Google Scholar]

33. A. E. Eddien, A. B. Hamza and P. Bhattacharya, “Improved image watermarking scheme using fast hadamard and discrete wavelet transforms,” Journal of Electronic Imaging, vol. 16, no. 3, pp. 33020, 2007. [Google Scholar]

34. T. Agung, and F. P. Permana, “Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression,” in 2012 IEEE Int. Conf. on Communication, Networks and Satellite, Bali, Indonesia, IEEE, pp. 167–171, 2012. [Google Scholar]

images This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.