iconOpen Access

ARTICLE

crossmark

A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications

by Walid El-Shafai1,2,*, Fatma Khallaf2,3, El-Sayed M. El-Rabaie2, Fathi E. Abd El-Samie2, Iman Almomani1,4

1 Security Engineering Lab, Computer Science Department, Prince Sultan University, Riyadh, 11586, Saudi Arabia
2 Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering,Menoufia University, Menouf, 32952, Egypt
3 Department of Electrical Engineering, Faculty of Engineering, Ahram Canadian University, Giza, Egypt
4 Computer Science Department, King Abdullah II School of Information Technology, The University of Jordan, Jordan, 11942, Jordan

* Corresponding Author: Walid El-Shafai. Email: email

Computer Systems Science and Engineering 2023, 46(3), 3599-3618. https://doi.org/10.32604/csse.2023.037655

Abstract

This paper presents a robust multi-stage security solution based on fusion, encryption, and watermarking processes to transmit color healthcare images, efficiently. The presented solution depends on the features of discrete cosine transform (DCT), lifting wavelet transform (LWT), and singular value decomposition (SVD). The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks. During watermark embedding, the host color medical image is transformed into four sub-bands by employing three stages of LWT. The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed by SVD operation. Furthermore, a fusion process is used for combining different watermarks into a single watermark image. This single fused image is then ciphered using Deoxyribose Nucleic Acid (DNA) encryption to strengthen the security. Then, the DNA-ciphered fused watermark is embedded in the host medical image by applying the suggested watermarking technique to obtain the watermarked image. The main contribution of this work is embedding multiple watermarks to prevent identity theft. In the presence of different multimedia attacks, several simulation tests on different color medical images have been performed. The results prove that the proposed security solution achieves a decent imperceptibility quality with high Peak Signal-to-Noise Ratio (PSNR) values and high correlation between the extracted and original watermark images. Moreover, the watermark image extraction process succeeds in achieving high efficiency in the presence of attacks compared with related works.

Keywords


1  Introduction

Nowadays, digital multimedia watermarking is heavily used to solve many issues related to media security, privacy, and copyright. Digital watermarking is a method by which a marker is inconspicuously hidden in a noise-tolerant signal, such as an image, audio, or video. In other words, it is used for hiding some data related to the signal in the signal itself. The hidden message imparts a digital signature to the digital content and identifies the owner or the authorized distributor, whichever is the case. This concept is similar to steganography, the difference being in their goals. In steganography, any secret message can be hidden, and the cover signal is simply there to hide this message. On the other hand, in watermarking, the message is related to the actual content of the cover signal [1]. Data watermarking or hiding is an efficient and important scheme in the case of multimedia communication. Many watermarking techniques have been suggested in the literature for different security applications and services, such as copyright protection and authentication, broadcast monitoring, law enforcement, and medical diagnosis.

The security efficiency of any watermarking scheme is a tradeoff between three main watermarking requirements: embedding capacity, imperceptibility, and robustness against communication attacks [2]. Many related works of watermarking schemes were introduced in the literature [114]. Zhou et al. [1] suggested a color watermarking scheme that employed two levels of Discrete Wavelet Transform (DWT) on the original and watermark images after separating Red/Green/Blue (RGB) components. This scheme achieved good PSNR and correlation coefficient (CC) results. The disadvantage of this scheme was its low efficiency, when employing higher levels of the DWT. In addition, more attacks like rotation and cropping attacks were not tested. Kumar et al. [2] suggested a blind hybrid gray-scale watermarking approach that is based on fast Haar and redundant wavelet transforms to decompose the original and watermark images. This approach was examined against attacks like Poisson, salt-and-pepper, and speckle noise. The advantage of the suggested technique was introducing good PSNR and Cr values, but at the price of high complexity.

Al-Haj et al. [3] presented a medical image watermarking scheme that is based on the region of interest (ROI) and region of non-interest (RONI) classification process. A multi-level DWT process is employed in this scheme on the RONI. It works on three different watermark images: integrity, authentication, and tampering watermarks. The main advantage of this scheme is that it introduces appreciated security and imperceptibility. Ghosh et al. [4] introduced hybrid watermarking and cryptography schemes to efficiently transmit digital images. Their main work is based on the Hamming code, XOR process, and the least significant bit (LSB) methods. This scheme has good robustness and imperceptibility, but it was employed in the spatial domain, not in the transform domain.

Kumar et al. [5] suggested a block-based copyright protection and authentication technique based on the LSB insertion process for digital image communication. It guarantees good perceptibility results with high watermark robustness, but its efficiency was not tested and evaluated against the communication attacks. Malonia et al. [6] introduced a color image watermarking scheme that employed arithmetic progression and DWT processes. It presented higher robustness and good perceptibility.

Recently, different DCT and LWT-based image watermarking techniques have been introduced. Chen et al. [7] suggested a robust and secure copyright protection technique based on the LWT process. Tomar et al. [8] presented a hybrid structure of DCT and LWT image watermarking schemes. Mishra et al. [9] introduced an efficient LWT-based color video watermarking technique that applied machine learning and deep neural network methods. This technique performance was evaluated against various image processing attacks. Lalitha et al. [10] presented a hybrid secure approach for high-capacity audio and image watermarking based on LWT, SVD, DWT, and DCT. The disadvantage of this hybrid approach is its complexity without achieving higher robustness against attacks.

DNA encoding and chaos-based image ciphering techniques were recently introduced for efficient cryptography performance [11,12]. Wang et al. [13] proposed an algorithm that consists of two parts. The first part comprises the piecewise linear chaotic map and other chaos methods to generate an image key. The second part is the key and plain image encoding using the DNA rules and logistic map. Preet et al. [14] developed a mixture of multiple image watermarking and ciphering algorithms using LWT, DCT, and Arnold transformation.

Many research works discussed medical security, IoT, and data hiding. Huang et al. designed a healthcare system (HES) that depends on wireless body area networks (WBANs) to collect medical data. Then, the medical data is transmited through a wireless sensor network and published via a gateway [15]. Huang et al. [16] introduced a hybrid approach that considers encryption and data hiding. The image becomes secure by focusing on compressed sensing (CS). During the quantization stage, the sign bits of the CS are encrypted based on a semantic-secure stream cipher. In addition, the hiding scheme is implemented by using a non-separable histogram-shifting. Baran et al. in [17] studied DCT compression and decompression techniques. A bubble sorting technique selects the highest signal strength coefficients obtained from DCT. Kamili et al. in 2020 [18] presented a framework of industrial image communication with dual watermarking, one of the watermarks for content authentication and the other for tamper localization. DCT coefficients and energy compaction properties have been used for achieving robust embedding.

Of late, Wang et al. [19] proposed a watermarking defense algorithm to identify linear divergence attacks in the cyber-physical system (CPS) using a Kullback-Leibler (K-L) divergence detector. Guo et al. in [20] provided an efficient scheme in order to find the nearest neighbor over encrypted medical image exactly. Moreover, they computed the lower bound of the Euclidean distance with rejected candidates for medical diagnosis.

As a result of the shortcomings of the existing works, this paper aims to introduce a solution for securing medical color images. The proposed solution ensures the integrity and authenticity of the medical images by providing cover image reconstruction and complete watermark recovery. Additionaly, it improves the security and ciphering performance by reducing the ciphering time. Recently, securing medical images in telemedicine applications has become a challenging issue, which motivated this research to design a robust multi-level security framework based on fusion, encryption, and watermarking processes to transmit color medical images with high efficiency. The proposed watermarking technique depends on the mixture of DCT, LWT, and SVD.

The most important contributions of this work are multi-fold and are summarized as follows:

•   Employing both DNA encoding and watermarking stages as a secure solution. Each stage comprises sub-stages to accomplish high levels of privacy, integrity, and security.

•   Examining the security efficacy performance of the introduced solution by testing several security measures on various medical images with distinct characterstics.

•   Exploring the impact of different noise types and the computational processing overhead of the proposed solution.

•   Analyzing the robustness and security performance of the proposed solution against several types of attacks.

•   Conducting a comprehensive comparative analysis with recent related works to prove the proposed solution dominance.

The rest of the paper is structured as follows. The proposed multi-level security solution is introduced in Section 2. Section 3 presents the simulation results and security assessment. Also, it gives a discussion and comparison of some related algorithms. Finally, Section 4 gives the concluding remarks of the paper and some future directions.

2  Proposed Color Medical Image Multi-Level Security Solution

This section introduces the proposed multi-level security solution composed of watermarking, encryption, and fusion schemes is introduced in this section. First, the LWT, SVD, DCT-based watermarking process is employed for color medical image copyright protection to improve the capacity of watermark embedding while preserving the imperceptibility of the watermarked color medical images. Next, the fusion process is performed in the suggested security algorithm based on the DWT transform to create the fused watermark image. Finally, this resulting fused image is encrypted using the DNA-based ciphering algorithm before being embedded inside the host color medical image to generate the watermarked color medical image. Fig. 1 shows the main three stages of the suggested multi-level security algorithm. In the receiver side, the inverse processes of these three stages are performed. Thus, the watermark extraction process is accomplished using the fused watermark image extraction, the deciphering procedure, and the anti-fusion procedure to obtain the first and second watermarks.

images

Figure 1: The general diagram of the suggested fusion-encryption-watermarking algorithm

2.1 Fusion Stage

In the fusion process, the suggested DWT-based fusion algorithm is exploited to merge the main features of the first and second watermark images. The main concept of the suggested DWT-based fusion algorithm is that the first and second watermarks are decomposed using DWT. After that, the procedure of average fusion is performed, and then the Inverse DWT (IDWT) is utilized to create the final fused image. Fig. 2 shows the main steps of the suggested DWT-based fusion algorithm.

images

Figure 2: The main steps of two watermarks DWT-based fusion process

2.2 Encryption Stage

In the encryption process, the DNA-based ciphering scheme [11] is employed to cipher the watermark fused image to increase the security level of the transmitted images. After that, the ciphered image is inserted into the host image. Figs. 3 and 4 show the flowcharts of the proposed row and column rotation steps for encrypting the fused watermark image, respectively.

images

Figure 3: Block diagram of row rotation steps of the suggested cryptosystem

images

Figure 4: Column rotation steps of the suggested cryptosystem

2.3 Watermarking Stage

The proposed multi-level security algorithm inserts the encrypted image into the cover image (medical image) utilizing the proposed watermarking algorithm of the three-level LWT, DCT, and SVD. We need to remember that the main properties while performing medical image watermarking are imperceptibility and robustness. The watermarking procedure is required to achieve a tradeoff between these two features. The embedding of an image in the perceptually significant components of an image may ensure robustness, but it may be perceptible by the naked eye. Otherwise, robustness may be compromised if the watermark is hidden in perceptually unimportant components. The balance between these two factors needs to be achieved.

The proposed hybrid watermarking technique employs the LWT on the cover color medical image to split it into four sub-bands: LH1, LL1, HH1, and HL1. Then, the LWT is employed on the LL1 sub-band to split it into LH2, LL2, HH2, and HL2. Moreover, the LWT is performed on the LL2 sub-band to split it further into LL3, LH3, HL3, and HH3. After that, the three levels of SVD and DCT are performed on the LL3 sub-band. The extraction steps are the reversal of the embedding steps. As it is a non-blind watermarking algorithm, the original cover image will be needed to extract the watermark. Therefore, the proposed watermarking algorithm composes two major phases: the embedding phase and the extraction phase, which are demonstrated in Figs. 5 and 6, respectively, and are discussed as follows:

images

Figure 5: Embedding process of the proposed multi-level security algorithm

images

Figure 6: Extraction process of the proposed multi-level security algorithm

2.3.1 Embedding Steps

The in-detail steps of the suggested embedding process are shown in Fig. 5 and can be summarized as follows:

1.    The colored watermark image is divided into three RGB components (Red, Green, and Blue).

2.    Each of the RGB components of the color watermark image is fused with a different gray-scale image individually using the proposed wavelet procedure. This generates fused watermark image 1 for the R component, fused watermark image 2 for the G component, and fused watermark image 3 for the B component.

3.    The DNA-based encryption process is performed on the three fused watermark images image 1, image 2, and image 3 to produce the three ciphered fused watermark images: encrypted fused watermark 1, encrypted fused watermark 2, and encrypted fused watermark 3.

4.    Three levels of LWT are applied to the resulting encrypted fused watermark images, and finally, the LL3 sub-bands of the watermark images are selected to be embedded in the host medical image.

5.    Three levels of DCT are applied on the selected LL3 sub-bands of the watermark images to obtain the coefficient matrices.

6.    The SVD is repeatedly performed on the resulting DCT coefficient matrices of the ciphered fused watermark images.

Aj=UjSjVjT(1)

where j is equal to 3 to refer to the DCT frequency components of the {HH3, LL3, LH3, HL3}.

7.    The host color medical image is divided into three RGB components: red, green, and blue.

8.    Three levels of the LWT are performed on the host color image components, and finally, the LL3 sub-band is selected for the original host image, where the watermark image is supposed to be embedded.

9.    Three levels of DCT are applied on the analyzed LL3 sub-band of the host color medical image to obtain the coefficient matrices.

10.   The SVD transform is performed on the resulting DCT matrices of the host color image.

Bi=UiSiViT(2)

where i is equal to 3, and it refers to the DCT frequency components of the {HH3, LL3, LH3, HL3}.

11.   The singular values (SVs) of the host color image are embedded in the SVs components of the ciphered watermark images.

Sw=Si+αSj(3)

where α is the watermarking factor.

12.   The SVD is performed on the new modified (Sw matrix) of each one of the three watermarked ciphered fused images: encrypted fused image1, encrypted fused image2, and encrypted fused image3, repeatedly.

Sw=UwSVwT(4)

13.   The Aw matrices of the color watermarked image components are acquired using the matrices VT, Sw, and U.

Aw=USwVT(5)

14.   Three levels of the inverse DCT are implemented to generate the watermarked image.

15.   Three levels of the inverse LWT are implemented to generate the watermarked image.

2.3.2 Extraction Steps

The steps of the watermark extraction process from the host color medical image are shown in Fig. 6, and they can be summarized as follows:

1.    The colored watermarked medical image is divided into three RGB components (Blue, Green, and Red).

2.    Three levels of the LWT are repeatedly separated for the color watermarked medical image.

3.    Three levels of the DCT are performed on the obtained LWT sub-bands to get their corresponding frequency coefficient matrices.

4.    The SVD transform is applied to the DCT coefficients of the color watermarked image.

Awi=UiSwiViT(6)

where i is equal to 3, and it refers to the DCT frequency components of the {LL3, LH3, HL3, HH3}.

5.    Matrices of the color watermarked image are calculated.

D=UwSwiVwT(7)

where * refers to the conjugate transpose.

6.    The three extracted ciphered fused images: ciphered fused image1, ciphered fused image2, and ciphered fused image3 are obtained, repeatedly.

W=(DSwj)/α(8)

7.    Three levels of the inverse LWT and DCT are implemented to construct the extracted three ciphered fused images: ciphered fused image1, ciphered fused image2, and ciphered fused image3.

8.    The DNA decryption process is applied on the extracted ciphered fused image1, ciphered fused image2, and ciphered fused image3.

9.    The wavelet anti-fusion process is employed on the resulting decrypted fused images to obtain the gray-scale watermark images, respectively.

10.   The correlation value between the separated fused and original images is determined.

11.   The correlation value between the separated gray-scale watermarks and original images is determined.

3  Results and Discussions

This section presents the simulation environment and experiment results to evaluate the performance of the proposed multi-level security solution that utilizes fusion, encryption, and watermarking techniques. Three different color medical images were examined in our assessment experiments. The simulation experiments were conducted using MATLAB 2018a on Windows 10 with an Intel® Core™i7-7890HD CPU @2.80 GHz with 16 GB memory capacity. The correlation coefficient (CC) and the PSNR were used as quality metrics to evaluate the suggested security solution. The mathematical formulas of these evaluation metrics are presented in Eqs. (9)(11) [2125].

MSE=i=1mj=1n(ORG(i,j)WM(i,j))m×n2(9)

PSNR=10log10(max2MSE)dB(10)

where the original image size is given by m and n. For a gray image, where max = 255. It is the maximum possible pixel value, e.g., 255 for an 8-bit gray-level image. As the host image has 8-level grayscale bits, so, max = 28 − 1 = 255, WM = watermarked image, and ORG = original image.

CC=mn(XmnX')  (YmnY')(mn(XmnX')2)  (mn(YmnY')2)(11)

where X′ is the estimated average value of the original image X. Y′ is the estimated average value of the modified image Y. In the embedding algorithm, the original image is the host image, while the modified image is the watermarked image. In the extraction algorithm, the original image is the original watermark image, while the modified image is the extracted watermark image. For further details and explanations of the CC parameter, it can be investigated and found in [2629].

The performance efficiency of an image watermarking algorithm can be evaluated by calculating the CC value. Therefore, the range of the CC value is [0–1]. Therefore, to achieve a high image embedding/extraction performance, it is better to get a high CC value between the original and extracted watermark images. Also, it is better to have a high CC value between the host and watermarked images [30,31].

The two main benefits of the suggested watermarking process are preserving the quality of the watermarked image and concealing encrypted watermarks in the host medical image. The PSNR and MSE (Mean Square Error) calculate the watermarked medical image quality. In the standard case, lower MSE and higher PSNR values are appropriate. In addition, in the best situation, the CC has the value of one. However, this is not probable; therefore, a near value to one is desired.

3.1 Experiments

Simulation tests on three medical images have been carried out to evaluate the presented multi-stage security solution. The subjective results guarantee watermark indiscernibility and no retrogression in the watermarked color medical image quality in contrast to the host images. The CC values of the extracted distorted watermarks and the PSNR values of the watermarked images were calculated. Various multimedia attacks were implemented and tested in the simulation experiments on the watermarked medical images. Then, the watermarks were extracted to assess the strength of the proposed security algorithm. Different simulation experiments were conducted on three host medical images. Fig. 7 shows the three host medical images and their RGB elements. All these plaintext medical images are collected from (https://openmd.com/) and (https://medpix.nlm.nih.gov). Fig. 8 presents the color watermarks and their RGB elements, whereas Fig. 9 shows the gray watermarks.

images

Figure 7: Medical images and their RGB elements

images

Figure 8: Color watermarks and their RGB elements

images

Figure 9: Gray watermarks

3.2 Non-Attack Scenario

This section examines the proposed security algorithm in case of no attacks. The experiments and evaluations are based on both subjective and objective outcomes, including the CC of the extracted watermarks and the PSNR values of the watermarked medical color images. Figs. 10, 12, and 14 present the subjective outcomes with the obtained CC and PSNR values of the examined watermark and watermarked images. Figs. 11, 13, and 15 illustrate the subjective findings with the obtained CC outcomes of the examined enciphered images. It is clear from all presented results that a higher similarity amongst the watermarked and original images is found in addition to achieving higher PSNR and CC values and good imperceptibility and robustness.

images

Figure 10: The embedding results of examined medical image 1

images

Figure 11: The extraction results of the examined medical image 1

images

Figure 12: The embedding results of the examined medical image 2

images

Figure 13: The extraction results of the examined medical image 2

images

Figure 14: The embedding results of the examined medical image 3

images

Figure 15: The extraction results of the examined medical image 3

Table 1 introduces the average outcomes of the CPU time in the absence of attacks. The results reveal that the proposed security algorithm introduces suitable CPU time for the embedding process, which makes it recommended for real-time and online telemedicine applications.

images

3.3 Attacks Scenarios

Tables 25 present the obtained PSNRs of the watermarked images and the obtained CC values of the obtained images in the presence of different attacks, where CC1 to CC3 are the correlation coefficient in the case of the examined attacks. The obtained results prove that the proposed security algorithm accomplishes recommended security performance. Moreover, it is noticed that the security algorithm has in average a significant gain in the PSNR and CC values for the tested medical images in the presence of various categories of multimedia attacks.

images

images

images

images

Table 2 presents the simulation findings in the presence of resizing, crop, and blurring (Motion, Disk, and Average) attacks. Table 3 introduces the results in the presence of rotation attacks. Table 4 includes the results in the presence of Gaussian attacks. Table 5 gives the simulation results in the presence of JPEG compression attacks. It is perceived that the proposed security algorithm provides the highest PSNRs in the presence of blurring, crop, resizing rotation, Gaussian noise, and JPEG compression attacks.

3.4 Comparisons with Related Works

Furthermore, more simulation tests were carried out to compare the proposed security algorithm with the state-of-the-art techniques [7,8,10,14,22,23,24,25] to validate the security and robustness efficiency of the multi-level security algorithm. Table 6 presents the PSNR findings of the watermarked images, the CC values of the extracted watermarks, and the calculated CPU times for the proposed algorithm in comparison with the related work without the existence of attacks. The comparison results show that the presented security work accomplishes higher PSNR and CC values than the conventional techniques.

images

4  Conclusion and Future Work

This paper proposed an efficient security solution for medical images communications. This security solution uses multi-level LWT, DCT, SVD watermarking, wavelet-based fusion process, and DNA-based encryption algorithms. The combination of LWT, DCT, and SVD results in better performance than applying state-of-the-art methods. Furthermore, the watermark is encrypted using DNA encryption technique before being embedded in the cover color medical image to provide additional security and confidentiality. Moreover, to improve the capacity of the embedded information, the proposed wavelet-based fusion technique is employed to increase the robustness of the proposed security algorithm without affecting the perceptual quality of the original color medical images. The security algorithm is validated by using different medical images under the presence of different attacks on the transmitted images. Additionally, this paper provided a comparison study between the proposed security algorithm and the existing ones. In addition, the proposed multi-level security algorithm is tolerant to versatile attacks. This signifies the supremacy of the suggested security algorithm in maintaining superior reliability and strength in the occurrence of multimedia attacks.

As part of future plans, the security performance of the suggested security algorithm can be improved by building a multi-level security framework that combines efficient encryption, steganography, and watermarking algorithms to achieve higher fidelity, robust storage, and transmission of color medical images. Additionally, simultaneous implementation of compression encryption on medical images to be compatible with big data analysis applications could be considered.

Acknowledgement: The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges (APC) of this publication.

Funding Statement: The authors received no specific funding for this study.

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

1. X. Zhou, Z. Ma, Q. Zhang, M. Mohammed and R. Damaševičius, “A reversible watermarking system for medical color images: Balancing capacity, imperceptibility, and robustness,” Electronics, vol. 10, no. 9, pp. 10–24, 2021. [Google Scholar]

2. N. Kumar, C. Shahnaz, K. Kumar, M. Mohammed and R. Raw, “Advance concepts of image processing and pattern recognition,” Pattern Recognition, vol. 4, no. 2, pp. 1–10, 2020. [Google Scholar]

3. A. Al-Haj, N. Hussein and G. Abandah, “Combining cryptography and digital watermarking for secured transmission of medical images,” in Proc. IEEE Int. Conf. on Green Computing Communication and Electrical Engineering (ICGCCEE), Coimbatore, India, pp. 1–5, 2014. [Google Scholar]

4. S. Ghosh, S. De, S. Maity and H. Rahaman, “A novel dual purpose spatial domain algorithm for digital image watermarking and cryptography using extended hamming code,” in Proc. IEEE Annual Int. Conf. of the Engineering in Medicine and Biology Society (ICEMBS), Minneapolis, MN, USA, pp. 3707–3710, 2009. [Google Scholar]

5. S. Kumar and A. Dutta, “A novel spatial domain technique for digital image watermarking using block entropy,” in Proc. IEEE 14th IEEE India Council Int. Conf. (INDICON), Roorkee, India, pp. 1–5, 2017. [Google Scholar]

6. M. Malonia and S. Agarwal, “Digital image watermarking using discrete wavelet transform and arithmetic progression technique,” in Proc. IEEE Int. Conf. on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, India, pp. 748–753, 2017. [Google Scholar]

7. H. Chen and W. Xu, “Secure and robust color image watermarking for copyright protection based on lifting wavelet transform,” in Proc. IEEE Int. Conf. on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, pp. 144–148, 2018. [Google Scholar]

8. V. Tomar, A. Kumar and A. Choudhary, “Conception & implementation of a novel digital image watermarking algorithm using cascading of DCT and LWT,” in Proc. IEEE Visual Communications and Image Processing (VCIP), Singapore, pp. 1–4, 2015. [Google Scholar]

9. A. Mishra, C. Agarwal and G. Chetty, “Lifting wavelet transform based fast watermarking of video summaries using extreme learning machine,” in Proc. Int. Conf. on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, India, pp. 1202–1207, 2016. [Google Scholar]

10. N. Lalitha, P. Prasad and S. Rao, “Performance analysis of DCT and DWT audio watermarking based on SVD,” in Proc. IEEE Visual Communications and Image Processing (VCIP), Chengdu, China, pp. 1–4, 2016. [Google Scholar]

11. M. El-Khalil and F. Abd El-Samie, “Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications,” Journal of Ambient Intelligence and Humanized Computing, vol. 5, no. 9, pp. 1–29, 2021. [Google Scholar]

12. A. Alarifi, S. Sankar, T. Altameem, K. Jithin, M. Amoon et al., “A novel hybrid cryptosystem for secure streaming of high efficiency H.265 compressed videos in IoT multimedia applications,” IEEE Access, vol. 8, pp. 128548–128573, 2020. [Google Scholar]

13. X. Wang and C. Liu, “A novel and effective image encryption algorithm based on chaos and DNA encoding,” Multimedia Tools and Applications, vol. 76, no. 5, pp. 62–99, 2021. [Google Scholar]

14. C. Preet and R. Aggarwal, “Multiple image watermarking using LWT, DCT and arnold transformation,” in Proc. IEEE Visual Communications and Image Processing (VCIP), Chengdu, China, pp. 16–20, 2019. [Google Scholar]

15. O. Faragallah, H. El-sayed and A. Afifi, “Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform,” Optics and Lasers in Engineering, vol. 137, no. 6, pp. 1–15, 2021. [Google Scholar]

16. H. Huang, T. Gong, N. Ye and Y. Dou, “Private and secured medical data transmission and analysis for wireless sensing healthcare system,” IEEE Transactions on Industrial Informatics, vol. 13, no. 3, pp. 1227–1237, 2019. [Google Scholar]

17. E. Baran, A. Kuzu, S. Bogosyan and A. Sabanovic, “Comparative analysis of a selected DCT-based compression scheme for haptic data transmission,” IEEE Transactions on Industrial Informatics, vol. 12, no. 3, pp. 1146–1155, 2019. [Google Scholar]

18. A. Kamili, N. Hurrah, S. Parah and K. Muhammad, “DWFCAT: Dual watermarking framework for industrial image authentication and tamper localization,” IEEE Transactions on Industrial Informatics, vol. 17, no. 7, pp. 5108–5117, 2020. [Google Scholar]

19. D. Wang, J. Huang, Y. Tang and F. Li, “A watermarking strategy against linear deception attacks on remote state estimation under K–L divergence,” IEEE Transactions on Industrial Informatics, vol. 17, no. 5, pp. 3273–3281, 2020. [Google Scholar]

20. C. Guo, S. Su, K. Choo and X. Tang, “A fast nearest neighbor search scheme over outsourced encrypted medical images,” IEEE Transactions on Industrial Informatics, vol. 17, no. 1, pp. 514–523, 2018. [Google Scholar]

21. A. Alarifi, M. Amoon and M. Aly, “Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system,” IEEE Access, vol. 8, pp. 221246–221268, 2020. [Google Scholar]

22. W. El-Shafai and E. Hemdan, “Robust and efficient multi-level security framework for color medical images in telehealthcare services,” Journal of Ambient Intelligence and Humanized Computing, vol. 5, no. 8, pp. 1–16, 2021. [Google Scholar]

23. O. Faragallah, M. Alzain, H. El-Sayed and J. Al-Amri, “Block-based optical color image encryption based on double random phase encoding,” IEEE Access, vol. 7, pp. 4184–4194, 2018. [Google Scholar]

24. K. Al-Afandy, F. Abd El-Samie, E. El-Rabaie, F. Abd El-Samie and O. Faragallah, “Robust hybrid watermarking techniques for different color imaging systems,” Multimedia Tools and Applications, vol. 77, no. 19, pp. 25709–25759, 2018. [Google Scholar]

25. W. El-Shafai, S. El-Rabaie and F. Abd El-Samie, “Security of 3D-HEVC transmission based on fusion and watermarking techniques,” Multimedia Tools and Applications, vol. 78, no. 19, pp. 27211–27244, 2019. [Google Scholar]

26. W. El-Shafai, S. El-Rabaie, M. El-Halawany and F. Abd El-Samie, “Efficient hybrid watermarking schemes for robust and secure 3D-MVC communication,” International Journal of Communication Systems, vol. 31, no. 4, pp. 1–23, 2018. [Google Scholar]

27. S. Ibrahim, M. Egila, H. Shawky and M. Elsaid, “Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption,” Multimedia Tools and Applications, vol. 79, pp. 1–26, 2020. [Google Scholar]

28. O. Faragallah, M. AlZain, H. El-Sayed and J. Al-Amri, “Secure color image cryptosystem based on chaotic logistic in the FrFT domain,” Multimedia Tools and Applications, vol. 79, no. 3, pp. 2495–2519, 2020. [Google Scholar]

29. O. Faragallah, A. Afifi and H. El-Sayed, “Investigation of chaotic image encryption in spatial and FrFT domains for cybersecurity applications,” IEEE Access, vol. 8, pp. 42491–42503, 2020. [Google Scholar]

30. M. El-Halawany, “Encoder-independent decoder-dependent depth-assisted error concealment algorithm for wireless 3D video communication,” Multimedia Tools and Applications, vol. 77, no. 11, pp. 13145–13172, 2018. [Google Scholar]

31. W. El-Shafai, “Pixel-level matching based multi-hypothesis error concealment modes for wireless 3D H. 264/MVC communication,” 3D Research, vol. 6, no. 3, pp. 1–11, 2015. [Google Scholar]


Cite This Article

APA Style
El-Shafai, W., Khallaf, F., El-Rabaie, E.M., El-Samie, F.E.A., Almomani, I. (2023). A multi-stage security solution for medical color images in healthcare applications. Computer Systems Science and Engineering, 46(3), 3599-3618. https://doi.org/10.32604/csse.2023.037655
Vancouver Style
El-Shafai W, Khallaf F, El-Rabaie EM, El-Samie FEA, Almomani I. A multi-stage security solution for medical color images in healthcare applications. Comput Syst Sci Eng. 2023;46(3):3599-3618 https://doi.org/10.32604/csse.2023.037655
IEEE Style
W. El-Shafai, F. Khallaf, E. M. El-Rabaie, F. E. A. El-Samie, and I. Almomani, “A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications,” Comput. Syst. Sci. Eng., vol. 46, no. 3, pp. 3599-3618, 2023. https://doi.org/10.32604/csse.2023.037655


cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 944

    View

  • 565

    Download

  • 0

    Like

Share Link