Skip to main content
Log in

Chaotic based secure watermarking approach for medical images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a chaotic based secure medical image watermarking approach is proposed. The method is using non sub-sampled contourlet transform (NSCT), redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD) to provide significant improvement in imperceptibility and robustness. Further, security of the approach is ensured by applying 2-D logistic map based chaotic encryption on watermarked medical image. In our approach, the cover image is initially divided into sub-images and NSCT is applied on the sub-image having maximum entropy. Subsequently, RDWT is applied to NSCT image and the singular vector of the RDWT coefficient is calculated. Similar procedure is followed for both watermark images. The singular value of both watermarks is embedded into the singular matrix of the cover. Experimental evaluation shows when the approach is subjected to attacks, using combination of NSCT, RDWT, SVD and chaotic encryption it makes the approach robust, imperceptible, secure and suitable for medical applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 10(66):806–816

    Article  Google Scholar 

  2. Al-Haj A, Mohammad A (2017) Crypto-watermarking of transmitted medical images. J Digit Imaging 30(1):26–38

    Article  Google Scholar 

  3. Ansari IA, Pant M (2017) Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn Lett 15(94):228–236

    Article  Google Scholar 

  4. Anusudha K, Venkateswaran N, Valarmathi J (2016) Secured medical image watermarking with DNA codec. Multimed Tools Appl 2(76):2911–2932

    Google Scholar 

  5. Anwar AS, Ghany KKA, El Mahdy H (2015) Improving the security of images transmission. Int J Bio-Med Inform e-Health 3(4):7–13

    Google Scholar 

  6. Arsalan M, Qureshi AS, Khan A, Rajarajan M (2017) “Protection of medical images and patient related information in healthcare”, using an intelligent and reversible watermarking technique. Appl Soft Comput 51:168–179

    Article  Google Scholar 

  7. Bhatnagar G, Raman B (2009) A new robust reference watermarking scheme based on DWT-SVD. Computer Standards & Interfaces 31(5):1002–1013

    Article  Google Scholar 

  8. Chao HM, Hsu CM, Miaou SG (2002) A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6(1):46–53

    Article  Google Scholar 

  9. Dhole VS, Patil NN (2015) Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks. In: Proc. International Conference on Computing Communication Control and Automation (ICCUBEA), p 752–757

  10. El’Arbi M, Ben Amar C (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Image Process 8(11):619–626

    Article  Google Scholar 

  11. Elhoseny M, Ramírez-González G, Abu-Elnasr OM, Shawkat SA, Arunkumar N (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2817615

    Article  Google Scholar 

  12. El-Samie FEA, Ahmed HEH, Elashry IF, Shahieen MH, Faragallah OS, El-Rabaie E-SM, Alshebeili SA (2017) Image encryption: a communication perspective. CRC Press, Boca Raton

  13. Katzenbeisser S, Petitcolas F (2000) Information hiding techniques for steganography and digital watermarking. Artech house

  14. Khan MI, Rahman M, Sarker M, Hasan I (2013) Digital watermarking for image authentication based on combined DCT, DWT and SVD transformation. International Journal of Computer Science Issues 10(3)

  15. Lei B, Zhao X, Lei H, Ni D, Chen S, Zhou F, Wang T (2017) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimed Tools Appl:1–23

  16. Pandey R, Singh AK, Kumar B, Mohan A (2016) Iris based secure NROI multiple eye image watermarking for tele-ophthalmology. Multimed Tools Appl 75(22):14381–14397

    Article  Google Scholar 

  17. Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2015) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl 8(76):10599–10633

    Google Scholar 

  18. Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214–230

    Article  Google Scholar 

  19. Patra B, Patra JC (2012) Crt-based fragile self-recovery watermarking scheme for image authentication and recovery. IEEE International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS), Taipei, Taiwan, p 430–435

  20. Preda RO (2014) Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain. 10th International Conference on Communications, IEEE, Bucharest, Romania, p 1–4

  21. Rosiyadi D, Horng SJ, Fan P, Wang X, Khan MK, Pan Y (2012) Copyright protection for e-government document images. IEEE MultiMedia 19(3):62–73

    Article  Google Scholar 

  22. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6(1):10269–10278

    Article  Google Scholar 

  23. Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76(6):8881–8900

    Article  Google Scholar 

  24. Singh A, Tayal A (2012) Choice of wavelet from wavelet families for DWT-DCT-SVD image watermarking. Int J Comput Appl 48(17):9–14

    Google Scholar 

  25. Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. J Medi Imaging Health Inform 5(3):607–614

    Article  Google Scholar 

  26. Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381–8401

    Article  Google Scholar 

  27. Singh AK, Kumar B, Singh G, Mohan A (2017) “Medical image watermarking: techniques and applications”, book series on Multimedia Systems and Applications, ISBN: 978–3319576985

    Chapter  Google Scholar 

  28. Singh AK, Kumar B, Singh SK, Dave M, Singh VK, Kumar P, Ghrera SP, Gupta PK, Mohan A (2017) Guest editorial: robust and secure data hiding techniques for telemedicine applications. Multimed Tools Appl 76(5):7563–7573

    Article  Google Scholar 

  29. Singh S, Rathore VS, Singh R, Singh MK (2017) Hybrid semi-blind image watermarking in redundant wavelet domain. Multimed Tools Appl 76(18):19113–19137

    Article  Google Scholar 

  30. Singh S, Rathore VS, Singh R (2017) Hybrid NSCT domain multiple watermarking for medical images. Multimed Tools Appl 6(3):3557–3575

    Article  Google Scholar 

  31. Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2018) Multiple watermarking technique for securing online social network contents using back propagation neural network. Futur Gener Comput Syst 86:926–939

    Article  Google Scholar 

  32. Srivastava A, Saxena P (2013) DWT-DCT-SVD based semi blind image watermarking using middle frequency band. IOSR J Comput Eng 12(2):63–66

    Article  Google Scholar 

  33. Thakkar FN, Srivastava VK (2016) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 3(76):3669–3697

    Google Scholar 

  34. Thakur S, Singh AK, Ghrera SP, Elhoseny M (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6263-3

    Article  Google Scholar 

  35. Ustubioglu A, Ulutas G (2017) A new medical image watermarking technique with finer tamper localization. J Digit Imaging 30(6):665–680

    Article  Google Scholar 

  36. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscip J Sci Technol: J Sel Areas Telecommun 2(4):31–38

  37. Wu Y, Noonan JP, Yang G, Jin H (2012) Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging 21(1). https://doi.org/10.1117/1.JEI.21.1.013014

    Article  Google Scholar 

  38. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882

    Article  Google Scholar 

  39. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 6(181):1171–1186

    Article  Google Scholar 

Download references

Acknowledgments

The authors thank the anonymous reviewers for their supportive and productive comments that played a major role in significantly improving this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. K. Singh.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thakur, S., Singh, A.K., Ghrera, S.P. et al. Chaotic based secure watermarking approach for medical images. Multimed Tools Appl 79, 4263–4276 (2020). https://doi.org/10.1007/s11042-018-6691-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6691-0

Keywords

Navigation