Introduction

Fig. 1
figure 1

Various classifications of watermarking schemes

The corona virus COVID-19 pandemic is the defining global health crisis of our time and the greatest challenge we have faced since World War Two. The WHO formally declared the novel corona-virus severe acute respiratory syndrome corona-virus 2 [1]. To reduce the risk of person-to-person viral transmission during the COVID-19 pandemic, government introduced social distancing and other measures. Many hospitals have closed their doors to patients who have been trying to avail the facilities and doctors are not encouraged to meet the patient directly [7]. With all these considerations, now-a-days every doctor is meditating the patients through online only. Previously many metropolitan cities and multi-specialty clinics are only maintaining online data of patients reports and records. Due to the present situation, every doctor is asking the patients and hospital management to send the record online to diagnose the patient report. Transfer of medical records of patients over a communication channel is known as telemedicine. American Telemedicine Association (ATA) defined telemedicine as the medical data that are transferred from one location to another location through electronic communication channel for improving the patients health status [32]. During the communication channel, the patients data should not be corrupted or modified or morphed at the receiver side; it may lead to serious trouble to patient while diagnosis. For small hospitals, maintaining and storing Electronic Patient Record (EPR) is of great concern [25]. The EPR data containing patient details, like diagnosis, disease, treatment and so on, have to be maintained confidentially [35]. For this reason, security to the medical image is required, which can be achieved with watermarking technique with minimum probability of error. The medical image is used as host image to deplete the chance of tampering or modification.

Depending on the information required at the extraction side to get the watermark along with the key, watermarking is classified into three types: blind, non-blind and semi-blind [40]. Without the watermark information, the watermark can be extracted in blind watermarking. Original host data and keys are required in non-blind watermarking, partial host data and key are required in semi-blind watermarking [39]. In all the three types, non-blind watermarking extraction offers better robustness compared to other two classifications.

The watermarking scheme can be classified into spatial and transform domain based on the type of embedding [29]. Transform domain provides better robustness against attacks with high embedding capacity of watermark compared to spatial domain [41].

The watermarking scheme is also classified into visible or perceptible and imperceptible or invisible watermarking based on the perceptibility of the watermark in the watermarked image. Perceptible watermarks are visible to naked eye, whereas imperceptible are not visible to the naked eye.

Another watermarking classification that is based on resistance is robust and fragile. Robust watermarking scheme can withstand intentional and unintentional attacks, whereas fragile watermarking schemes cannot withstand minor modifications on the watermarked image.

The watermarking scheme is designed based on applications of multimedia like “text, audio, image and video”. The applications of watermarking scheme are Copyright Protection, Copy Control, Data Authentication, Fingerprinting, Broadcast Monitoring and so on. Various classifications of watermarking schemes are provided in Fig. 1.

Nowadays much research is going on in hybrid transform by combining different transformation techniques to increase the robustness and embedding capacity. This research article proposed a robust non-blind watermarking scheme for copyright protection, ownership identification and authentication of medical images in hybrid domain. In the proposed approach, fingerprint is considered as watermark for medical data of the patients. As the medical data of the patient are private data where the data should not be authorized by unknown persons. To make the authentic authorization of the data, direct finger print of the data is included to provide security to the medical image. Watermarking can be embedded into a host image through different transform operations, such as discrete cosine transform (DCT), discrete wavelet transform (DWT), lifting wavelet transform (LWT) and so on. However, a single transformation does not ensure all the design requirements simultaneously. To fill this gap, a hybrid digital image watermarking with a combination of LWT-DWT is proposed in this paper. The main purpose of hybrid transform is to develop LWT-DWT-based robust and invisible image watermarking scheme for obtaining a better tradeoff between imperceptibility and robustness requirements.

1 Literature survey

Anand et al. [3] propounded an improved DWT–SVD domain watermarking for medical information security. Hamming code is utilized to reduce the noise distortion of the text watermark. They have tested on two different encryption schemes and three different compression schemes and considered Chaotic-LZW (Lempel–Ziv–Welch) as the best.

Kahlessenane et al. [14] presented a robust blind watermarking scheme that accepts the incorporation of EPR into computerized tomography scan. Zigzag scanning method is utilized in selecting the subband of wavelet transform. Their results showcase the method is good against geometric and destructive attacks.

Fares et al. [7] proposed two blind watermarking schemes with combination of DCT-Schur and DWT-Schur. Their method results provide robust against conventional attacks. Yuan et al. [47] developed color image watermarking method using DCT in spatial domain. An effective watermarking algorithm based on Lagrangian support vector regression (LSVR) & LWT is designed [24] by considering the advantages of fast implementation, fast learning speed and high generation capacity compared to previous conventional methods.

Sing et al. [36] developed a semi blind gray scale watermarking scheme by using nonsubsampled contourlet transform and redundant discrete wavelet transform (RDWT) and SVD decomposition methods. Amit et al. [34] presented a paper on spread spectrum depended watermarking system using selective DWT approach. Amit et al. [33] presented a multiple watermarking scheme using DWT, DCT and SVD decomposition. Amit et al. [31] presented a hybrid multilevel watermarking scheme by fusing DWT, DCT and SVD decomposition techniques. Chandan et al. [17] presented a paper on improved watermarking scheme by using DWT, DCT and SVD. Further set partitioning in hierarchical tree and Arnold transform are utilized to improve the security. Priyank et al. [16] proposed a watermarking scheme based on homomorphic transform, RDWT and SVD decompositions.

Watermark insertion is done using principal components to handle attacks where region of interest (ROI) of compressed image is hidden using LZW [2]. The watermark generated with compressed image ROI allows 100% reversibility of the ROI. An imperceptible and zero watermarking for robust medical images is proposed [5]. Using modified spread spectrum method, the retaliation of the imperceptible watermarking detector & watermark data, the zero watermarking process authenticates the patient identity. Kannammal et al. [15] developed an algorithm with 2-level security with embedding and also with encryption using RSA and other algorithms. Sharma et al. [30] developed a method using digital multitoning in embedding binary watermark.

Combining LSVR and LWT has reduced the time complexity as well. To overcome the issues of information security (authentication), David et al. [23] proposed a hybrid watermarking scheme using quantization index modulation method beneath ditcher modulation in collaboration with error correction forwarding in embedding. Thakur et al. [38] proposed a multilayer security for medial data by utilizing chaotic encryption.

Hosny et al. [10] proposed a novel geometrically invariant multiple zero watermarking method for medical images. A set of multi-channels shifted Gegenbauer moments of fractional orders are used to extract invariant features from color medical images. Hosny et al. [11] have computed the moments of the polar complex exponential transform (PCET) and quaternion PCET in securing medical images for authentication. Hosny et al. [9] utilized Quaternion Legendre–Fourier moments for developing color image watermarking. Hosny et al. [8] utilized highly accurate moments of polar harmonic transforms for designing watermarking algorithm.

All the literature provided above is related to only medical image watermarking. They have followed different types of watermarking approaches based on extraction, and in embedding watermark different transformation techniques methods are utilized (most commonly DWT, DCT, LWT). The proposed watermarking approach can overcome the problems of authentication by embedding the fingerprint watermark. As the medical images are vulnerable to attacks, the proposed method has overcome that by using hybrid transformation and using adaptive embedding factor values for images. In the proposed scheme, 4 subbands LL, LH, HL and HH are obtained after 1 level LWT. LL is selected based on its efficient properties. The LL subband is again decomposed for 1 level using DWT then embedding the fingerprint watermark into it. The motivation behind this combination is to enhance the imperceptibility and the robustness. The imperceptibility requirement is achieved by using magnitudes of LWT coefficients, while robustness improvements are provided by applying DWT to LWT coefficients. The watermark is embedded by modifying the coefficients of DWT using secret keys.

Fig. 2
figure 2

Decomposition of Lifting Wavelet Transform

Fig. 3
figure 3

1-Level Decomposition of Discrete Wavelet Transform Representation

2 Methods used

2.1 Lifting wavelet transform

Over the past few years, LWT developed by Daubechies [6], enhanced as a husky tool for analysis of image because of systematic and fast implementation of LWT compared to conventional wavelet transform [18]. LWT has given best results in the area of watermarking, image compression, pattern recognition, feature extraction and image de-noising [42]. LWT saves a lot of time and also has superior results in frequency localizing frequency features that conquer the drawback of conventional wavelets [21, 24]. LWT decomposition of a signal is done with splitting, prediction and update steps as shown in Fig. 2.

Step 1: Splitting

In this step, the host signal S[n] is decomposed into non-overlapping odd and even signal samples as \(S_{o}[n]\) and \(S_{e}[n]\) which can be seen in Eq. 1.

$$\begin{aligned} S_e[n]=S[2n],S_o[n]=S[2n+1] \end{aligned}$$
(1)

Step 2: Prediction

In this step, both odd and even sample signals are correlated for predicting as shown in Eq. 2.

$$\begin{aligned} \mathrm{ds}[n]=S_o[n]-P(S_e[n]) \end{aligned}$$
(2)

where ds[n] is the difference the host signal sample and its predicted signal (high frequency component) using prediction operator P(.).

Step 3: Update

The even samples are updated with the help of step 1 and step 2 i.e., detailed signal (ds[n] and update operator (U(.)). The rough shape of the host signal can be obtained with low frequency component lfc[n] as shown in Eq. 3.

$$\begin{aligned} \mathrm{lfc}[n]=S_e[n]+U(ds[n]) \end{aligned}$$
(3)

2.2 Discrete wavelet transform (DWT)

DWT breaks down an image or signal into four subbands, \(S_{LL}\) lower resolution approximation module, and other three spatial directional modules are horizontal module \(S_{HL}\), vertical module \(S_{LH}\) and module \(S_{HH}\). The characteristics of the DWT image multi-resolution break down, and the image features are extremely consistent for selecting the spatial orientation. The filters applied on the DWT will be done along the rows and columns with the help of low pass and high pass resolvers (Lo_D, Hi_D), respectively. Mathematically, the host signal or image S(ab), the first level break down is shown in Eq. (4). The decomposition of signal into subbands and sample X-ray image 1-level decomposition is represented in Fig. 3.

$$\begin{aligned} \begin{aligned} LL(i,j)= \langle S(a,b), \varPsi ^{0} (a-2i,b-2j) \rangle \\ LH(i,j)= \langle S(a,b), \varPsi ^{1} (a-2i,b-2j) \rangle \\ HL(i,j)= \langle S(a,b), \varPsi ^{2} (a-2i,b-2j) \rangle \\ HH(i,j)= \langle S(a,b), \varPsi ^{3} (a-2i,b-2j) \rangle \\ \end{aligned} \end{aligned}$$
(4)

2.3 Local binary pattern (LBP)

Ojala et al. [26, 27] first developed LBP, initially utilized to calculate the local contrast in analysis of texture in images. LBP is utilized in many fields of image and video processing like text analysis, image authentication and image forgery detection due to its property of efficient texture feature descriptor [20]. LBP breaks down an image into multiple sub-blocks of size n \(\times \) n. The centre pixel value is utilized as a threshold value to decide the neighbouring pixel values by setting the smaller values as 0 and remaining as 1 by comparing with centre pixel, i.e., threshold value. The clockwise values of the binary values are considered and converted to decimal form. The LBP is formulated as shown in Eq. 5. The sample block operator of 3 \(\times \) 3 block and its local binary pattern conversion from binary to decimal are shown in Fig. 4.

$$\begin{aligned} \mathrm{LBP}(a_{j},b_{j})= \sum _{i=0}^{i=\infty } S(P_{i}-P_{j})2^{i} \end{aligned}$$
(5)

where \(P_{j}\) is central pixel \((a_{j},b_{j})\) value and \(P_{i}\) are corresponding pixel values. S is sign function defined as

$$\begin{aligned} S(a)= {\left\{ \begin{array}{ll} 1, \quad x\ge 0, \\ 0, \quad \mathrm{otherwise} \end{array}\right. } \end{aligned}$$
(6)
Fig. 4
figure 4

3 \(\times \) 3 Block LBP operator a Image block and b Local Binary Pattern of (a) block

The most important property of the LBP function in real-world applications is its robustness to monotonic gray-scale changes caused by illumination variations compared to other features. Other advantage of LBP is it has high discriminative power with simple computation.

2.4 Arnold transform

In the propounded watermarking scheme, Arnold Cat Transform is endorsed to provide assurance about the security of the scheme. The general Arnold Cat Transform is interpreted as follows:

$$\begin{aligned} \begin{pmatrix} g' \\ h' \end{pmatrix}= \begin{pmatrix} 1 &{} \quad i \\ j &{} \quad ij+1 \end{pmatrix} \begin{pmatrix} g \\ h \end{pmatrix}(\mathrm{mod} N) \end{aligned}$$
(7)

where (gh) is the native position of the pixels in the image and \((g',h')\) are the corresponding positions of the pixels in the image after permutation. The controls panels a and b will be used to change the position of the image pixels, and N is the size of the image. For different image sizes and parameters, period T will be different in Arnold transform. The image pixels will be back to its native position after certain permutations. Here, in applying the Arnold transform, the image gets scrambled and also we can use the T value as a key to provide better security to the scheme [44].

3 The propounded watermarking design

In the propounded watermarking scheme, approximation coefficients of LWT and \(S_{LL}\) lower resolution approximation module of DWT is utilized in immersing the fingerprint watermark of the patient because of maximum energy of the image is strenuous in low resolution approximation and also more robust and efficient to attacks of image and signal processing. Immersing the fingerprint watermark in the \(S_{LL}\) is highly perceivable for human eye. The propounded watermark embedding design using the combination of LWT–DWT with LBP feature values and semi-blind watermark extraction using the keys are given in the following subsections. The idea of applying two transform or hybrid transform is based on the fact that combined transforms could compensate the drawbacks of each other, resulting in effective watermarking. The LBP features are considered for calculating scaling and embedding factor adaptively because of its robustness to monotonic gray-scale changes caused by illumination variations compared to other features. The reason for combination of LWT–DWT combination can be observed from the Table 1. A medical image has been tested with combination of 2 level DWT, 2-level LWT and combination of LWT–DWT with various attacks. From the results, it is clear that the combination is robust to attacks compared to their transformations. For calculating the embedding factor, LBP features are utilized since it extracts texture features of an image which is robustness to monotonic grayscale changes.

Table 1 Reason for selecting the combination of transformations

3.1 Propounded watermark embedding design using LWT–DWT–LBP

In this embedding scheme, adaptive watermark is embedded in the hybrid transform of medical image with patient fingerprint watermark. The propounded watermarking embedding design is represented in Fig. 5.

Fig. 5
figure 5

Propounded Watermark Embedding Design using LWT–DWT–LBP

figure b

In the above propounded watermark embedding Algorithm 1, HMI represents host medical image, FPW represents fingerprint watermark, and \(\mu \) represents the mean of the LBP features. The steps of embedding fingerprint watermark into the medical image are given below.

Step 1 Scan the fingerprint watermark and host medical image

Step 2 Applying LWT for 1–Level to host medical image produces approximation coefficients (CA) and details coefficients (CH, CV, CD)

Step 3 For the approximation coefficients (CA), 1–Level DWT is applied by producing low (LL), diagonal (LH, HL) and high (HH) resolution coefficients.

Step 4 Low-resolution approximation (LL) is considered for embedding fingerprint watermark using the mean of the LBP features of host medical image

Step 5 Embedding of the fingerprint watermark is done using the embedding and scaling factor as represented in Algorithm 1 and is also shown below where \(\alpha \) and \(\beta \) are scaling and embedding factor values.

$$\begin{aligned} \widehat{HMI} = \alpha \times LL +\beta \times FPW \end{aligned}$$
(8)

Step 6 Inverse DWT is applied by combining watermarked LL subband with remaining subbands.

Step 7 Inverse LWT is applied by combining watermarked CA with remaining coefficients to form Imperceptible Watermarked Medical Image.

Step 8 Further, to improve security, Arnold transform is applied to the watermarked medical image with a secret key in generating the scrambled watermarked medical image.

The function of Arnold transform is to scramble the image so that the intruders cannot know the image. The reason for adding at the end of the embedding is to overcome tampering of medical images. To add extra security to the host medical image Arnold Transform is applied at the end of the process.

3.2 Propounded watermark extraction design using LWT–DWT–LBP

In this extraction scheme, adaptive patient fingerprint watermark is extracted in the hybrid transform from watermarked medical image. The propounded watermarking extraction design is represented in Fig. 6.

Fig. 6
figure 6

Propounded Watermark Extraction Design using LWT–DWT–LBP

figure c

In the above propounded watermark extraction Algorithm 2, \({}^{A}HMI^{fpw}\) represents scrambled watermarked host medical image, LL represents the decomposition of the watermark with LWT followed by DWT subband, and \( \alpha \& \beta \) represents the embedding and scaling factor. The steps of extraction of fingerprint watermark from imperceptible watermarked medical image are given below.

Step 1 Scan the scrambled watermarked host medical image(\({}^{A}HMI^{fpw}\))

Step 2 Apply inverse Arnold transform with secret key (Key-3) to descramble the medical image in generating watermarked host medical image.

Step 3 Applying LWT for 1–Level to watermarked host medical image produces watermarked approximation coefficients (\(CA_{w}\)) and watermarked details coefficients (\((CH_{w},CV_{w}, CD_{w})\))

Step 4 For the watermarked approximation coefficients (\(CA_{w}\)), 1–Level DWT is applied by producing watermarked low (\(LL_{w}\)), diagonal (\(LH_{w},HL_{w}\)) and watermarked high (\(HH_{w}\)) resolution coefficients.

Fig. 7
figure 7

Sample Host Medical images of X-Ray, CT, US, MRI that are utilized in the propounded watermarking scheme

Fig. 8
figure 8

Sample Fingerprint Images

Step 5 Watermarked low-resolution approximation (\(LL_{w}\)) is considered for extracting fingerprint watermark by using the same keys (Key-1 & Key-2) that are used in embedding the watermark represented in Algorithm 2.

4 Experimental results

The propounded medical image watermarked scheme is evaluated and scrutinized by numerous medical images like X-Ray, CT, US and MRI. For the easy analysis, the image names are considered as alphabets. The medical images of size \(512\times 512\) pixels and the fingerprint images of size \(128 \times 128\) pixels are considered and shown in Figs. 7 and 8. “Matlab” is utilized in executing the propounded schemes. The sample twelve medical images are taken from Fontaine medical records [22] dataset. The fingerprints are taken from Kaggle dataset [13]. Effectiveness of the propounded watermarking scheme is thoroughly estimated by applying attacks against it. Peak-signal-to-noise-ratio (PSNR) and structural similarity index (SSIM) are the measures utilized for estimating perceptual characteristics [43]. PSNR is utilized in calculating the visual similarity between the host image and the watermarked image [34]. After embedding the watermark, both the host image and watermarked image should look a like with minor distinction between them [12].

$$\begin{aligned} \mathrm{MSE} = \frac{\displaystyle \sum \nolimits _{i=0}^{m-1} \displaystyle \sum \nolimits _{j=0}^{n-1} \left( {HMI}_{i,j}-({HMI}^{fpw})_{i,j} \right) ^{2}}{mn} \end{aligned}$$
(9)
$$\begin{aligned} \mathrm{PSNR} = 20\log _{10}\left( {\frac{{MAX_{HMI}}}{\sqrt{\mathrm{MSE}}}}\right) \end{aligned}$$
(10)

where \(\mathrm{MAX}_{{HMI}}\) is maximum gray scale value of the image.

SSIM is a measure utilized to evaluate structural similarity between the host image and the watermarked image [37, 48]. SSIM includes luminance, contrast and structural functions used for comparing. SSIM value should be near to unity. SSIM is mathematically shown as:

$$\begin{aligned} \mathrm{SSIM}(HMI,HMI^{fpw})=l,c,s\{((HMI,HMI^{fpw}))\} \nonumber \\ \end{aligned}$$
(11)

Normalized Correlation coefficient (NCC) aids in estimating the robustness of the propounded method with attacks [46]. NCC computes the similarity between the patient fingerprint and extracted patient fingerprint. The values nearer to one mean the propounded method is sustain the image and signal processing attacks [4, 19].

$$\begin{aligned} \mathrm{NCC}=\frac{\sum \sum fpw \times fpw^{E} }{(\sqrt{\sum fpw^2}) (\sqrt{\sum (fpw^{E})^2})} \end{aligned}$$
(12)

Number of changing pixel rate (NPCR) and unified averaged changed intensity (UACI) are the evaluating measures that are utilized for calculating the credibility of the propounded scheme against different attacks [45]. NCPR calculates the number of changing pixel rate, and UACI calculates the difference of average change in the intensities between the watermarked image and encrypted watermarked image [28] Table 2.

$$\begin{aligned} \mathrm{NCPR}=\frac{\sum _{i,j} D\{i,j\}}{M\times M} \end{aligned}$$
(13)

where \(M\times M\) is the size of the image and \(D\{i,j\}\) denotes

$$\begin{aligned} D\{i,j\}= {\left\{ \begin{array}{ll} 0 \quad ({HMI^{fpw}})=({}^{A}{HMI^{fpw}}) \\ 1 \quad ({HMI^{fpw}})\ne ({}^{A}{HMI^{fpw}}) \end{array}\right. } \end{aligned}$$
(14)
$$\begin{aligned} \mathrm{UACI}=\frac{1}{M \times M} \left[ \sum _{i,j} \frac{({HMI^{fpw}})-({}^{A}{HMI^{fpw}})}{255} \right] \times 100\nonumber \\ \end{aligned}$$
(15)

The imperceptibility test and robustness testing with the metrics on the twelve medical images with no attacks are shown in Table 3. These measures attained values nearer to one which claims for good structural similarity between the host image and watermarked image. Visible similarity for the propounded scheme is measured with PSNR values which are above 30 dB which means the quality of the watermarked image is good. The SSIM is a metric used to quantify perceptual quality of an image during the communication channel. The SSIM values are calculated between original medical image and watermarked image. The SSIM values for all the images are above 0.98, which means the proposed algorithm has provides good image quality after watermark embedding. The closer the SSIM values to 1 means the quality of the watermarked image is high. From the results table, it is clear that for all the medical images the quality of the image is good. The similarity between the patient fingerprint and the extracted fingerprint is measured with NCC. The closer the value of NCC to one symbolizes for resilience of the propounded method against attacks. NPCR and UACI have the ability to assess potentiality of the propounded scheme against various attacks. The NPCR and UACI measure values are above their limiting values.

The embedding factor values are calculated adaptively by utilizing the LBP features of the host medical image. The adaptively calculated values for the sample twelve medical images are given in Table 2.

Table 2 Adaptively calculated embedding factor values for medical images
Table 3 Propounded scheme performance analysis with help of measure values

The watermarked images with fingerprint watermark, scrambled and unscrambled watermarked images with Arnold and Inverse Arnold transform, Extracted fingerprint watermarks are shown in Fig. 9. Robustness analysis of the propounded watermarking scheme under attacks of Salt & Pepper Noise (0.001), Gaussian Noise (0.01, 0.002), Sharpening, Scaling (2, 0.5), and JPEG Compression is shown in Table 4. From this table, the extracted fingerprint watermark is of good quality which can be viewed from third column and NCC values nearer to 1 tell the fingerprint is extracted successfully.

Fig. 9
figure 9

Sample watermarked images after embedding with patient fingerprint watermark, Scrambled watermarked Images, Descrambled Images, Extracted Fingerprint Watermarks

Table 4 Robustness analysis of the propounded watermarking scheme under attacks
Table 5 Robustness evaluation using NCC under various attacks

The NCC values for all the sample images (a to l) with Salt & Pepper, Gaussian Noise, Speckle Noise, Scaling, JPEG Compression, Mean Filtering, Median Filtering, Rotation and Cropping attacks are provided, respectively.

In case of Salt & Pepper noise attack, medical images are distorted by adding salt & pepper noise with density 0.001 and 0.002. The NCC values of the extracted watermark drop from 0.99 to 0.96 on an average when the noise density increases. In Gaussian noise, medical images are distorted in the similar way with mean and variance (0, 0.002) and (0.01, 0.002). The NCC values of extracted fingerprints drop upto 0.95 on average. In Speckle noise with density 0.0001, the extracted fingerprint has a high NCC with 0.98.

The medical images are re-sized at various scales: up-sampled twice and down-sampled half the size of the medical image. Even in varying the scaling of the image, the proposed method NCC values achieved high with 0.99.

In case of Mean and Median Filtering attacks, the mask of size \(3 \times 3\) is applied. The extracted fingerprint watermark NCC values have achieved 0.97 for mean filtering and 0.98 for median filtering on an average.

In case of rotation attack, the medical images are rotated with 2 degrees in clock wise direction. The extracted fingerprint watermark has a high NCC with 0.97 on an average.

In case of cropping, 10 percent of the medical image is cropped. The extracted fingerprint has NCC with 0.98 on an average.

NCPR and UACI measure values under five attacks for sample images (a, b, c, d, e) are graphically represented in Figs. 10 and  11. The attacks are “Salt & Pepper noise (0.001), Salt & Pepper noise (0.002), Gaussian noise (0, 0.0002), Gaussian noise (0.01, 0.0002) and Speckle noise(0.001)” indicated as Atk 1 to Atk 5. It can be observed that NPCR and UACI values under different attacks are satisfactory and are under acceptable range Table 5.

Fig. 10
figure 10

Graphical representation of NPCR values under different attacks

Fig. 11
figure 11

Graphical representation of UACI values under different attacks

Table 6 Robustness comparison between propounded method and other watermarking prevailing methods
Fig. 12
figure 12

Graphical comparison of proposed method

Table 7 Imperceptibility comparison between propounded method and other watermarking prevailing methods

Potency of the propounded method can be seen in Table 6 where it is compared with the other medical watermarking methods like [16, 17, 24, 31, 33, 34, 36, 38]. From the comparison results, it is clear that the propounded method has competed with the remaining techniques in terms of robustness. In Table 7, the imperceptibility of the watermarking schemes are compared with the proposed scheme, from all the methods the proposed method imperceptibility is high except for [16] method and in comparison with [24] proposed method results are better for noise attacks, and for all the remaining attacks they are almost similar. Graphical comparison (Same attacks of Table 6) of propounded method with [16, 33] is shown in Fig. 12. From the figure, it is clear that the robustness of the propounded method is far above than the other methods under similar attacks.

5 Conclusion and future work

The propounded scheme in this paper provides a novel method of medical image watermarking scheme in hybrid domain in which salient features of LWT, DWT and LBP are considered. LBP values are used to calculate the embedding factor values adaptively which acts as keys. Embedding fingerprint watermark of the patient in speculating component safeguards better robustness and imperceptibility of the watermark in resisting image and signal processing attacks. A triple layer security is provided to the scheme with Arnold transform which protects the medical image from modifications and tampering. The performance of the propounded scheme is better compared to other watermarking schemes in terms of metric evaluation. This paper provides an adaptive medical image watermarking scheme using hybrid transform and fingerprint of patient as watermark for e-health care systems.