Narima 2021
Narima 2021
A R T I C L E I N F O A B S T R A C T
Article history: In this work, we propose a blind watermarking approach for medical image protection. In this approach,
Received 16 September 2020 the watermark will be constituted of the Electronic Patient Record and the image acquisition data. In
Received in revised form 26 November 2020 order to enhance the security and guarantee the data integrity, the Electronic Patient Record hash will be
Accepted 12 January 2021
added to the watermark. The integration process is based on a DWT-SVD combination, a DWT is applied
Available online 13 January 2021
to the retinal image, then, an SVD is applied to the LL sub-band. The watermark will be then integrated
into the least significant bits of the S component obtained by combining the parity of the successive
Keywords:
coefficients. Experimental results for imperceptibility and robustness show that the proposed scheme
Digital watermarking
Color image watermarking
maintains a high quality watermarked image and remains highly robust against several conventional
Medical image attacks.
Electronic patient record © 2021 Elsevier B.V. All rights reserved.
Discrete wavelet transform
Singular value decomposition
http://dx.doi.org/10.1016/j.forsciint.2021.110691
0379-0738/© 2021 Elsevier B.V. All rights reserved.
N. Zermi, A. Khaldi, R. Kafi et al. Forensic Science International 320 (2021) 110691
coefficient for the integration of two bits of the watermark. The information, a WPT is applied to segment the image and find the
watermarked image must provide the same clinical interpretation minimum energy band where the watermark text is embedded. After
as the original image, so it should not be damaged in any way that the embedding process, a cryptographic key is generated and the
affects the diagnosis. Modifying few information for the water- watermarked image is encrypted. Anand & al proposes a multi-
mark integration will thus allow to obtain a watermarked image watermark embedding method for medical image [19]. The
similar to the original. The watermark extraction will allow embedding watermark is composed of a text and an image. A four
patients authentication using the Electronic Patient Record sub-band decomposition of the host image is first performed by
obtained. The integrity of this information can be verified through applying a DWT. An SVD is applied to the HH sub-band and the text is
the extracted hash, and the image acquisition data will guarantee embedded in the singular value S. The image watermark is divided
the copyright. In order to verify the imperceptibility of our into two sub images, these two parts are then integrated (after
approach, distortion measurements will be calculated between the applying an SVD to both sub bands) into the singular S values of the
original and watermarked images. Robustness tests will be HL and LH sub bands of the cover image. To enhance security, the
performed by applying the most commonly used attacks (filtering, watermarked image is then encrypted using HyperChaotic encryp-
compression, adding noise . . . etc.). This paper is organized as tion algorithm. Devi & al [20] present a blind watermarking scheme
follows: In Section 2 will be presented some recent related work, that combines DWT and SVD. A DWT is applied to the blue
the proposed approach will be presented in Section 3, Section 4 component of the cover image; the resulting LL sub-band is then
will be dedicated to experiments and imperceptibility and decomposed into 8*8 blocks. For each block, a fast Walsh Hadamard
robustness tests. The conclusion of this work and perspectives transformation is applied. Singular value decomposition is then
will be presented in Section 5. applied to the blocks of the LL sub-band formed by the Hadamard
transform. The watermark bits are then integrated into the singular
2. Related works values obtained. In order to increase security, the watermark image is
scrambled using the Arnold Transform. Khare & Srivastava propose a
The various watermarking images methods available in the combination of a discrete wavelet transform, homomorphic
literature are related to the insertion domain of the mark (spatial, transform; singular value decomposition and Arnold transform
frequential, multi-resolution, etc). Each image representation space [21]. In this work, a DWT is first performed, and then homomorphic
brings diverse possibilities in terms of performance [12]. The choice transform is applied to the HL subband to decompose it in
of the insertion domain is therefore a very delicate step in the design illumination and reflectance components. Using Arnold transform,
of watermarking systems. Spatial domain insertion is performed by the watermark is scrambled. The integration process is then
directly modifying the pixel values of the image. The main advantage performed using the singular values of the reflectance component.
of this domain is that the insertion and detection operations are Zhou & al propose a robust and hybrid watermarking scheme [22]. In
inexpensive in computing time, which allows it to be used in real- this work, discrete wavelet transform is performed. Singular value
time watermarking applications [13]. But the main disadvantage is decomposition is then applied to the HL and LH subbands and the
the visual quality degradation of the image after the integration. watermark is embedded by modifying the direct current coefficients.
Moreover, these techniques are not very robust to attacks. Frequency Benoraira & al present a blind and robust image watermarking
domain insertion consists of inserting the mark not directly into the scheme based on discrete wavelet transform and discrete cosine
image but into the transformed domain. The frequency representa- transform [23]. In this approach, discrete cosine transform is first
tion of the image is obtained by applying a Discrete Fourier applied. Then, the two DCT-transformed sub-vectors are used to
Transform or a Discrete Cosine Transform [14]. The main difficulty of embed the bits of the watermark bits. The original sub-vectors are
this type of scheme is the choice of the marked coefficients. The best obtained by the sub-sampling of the approximation coefficients of
schemes offering a good robustness-invisibility compromise gener- the DWT transform of the host image.
ally opt for an insertion in the middle frequencies of the image in
order to maximize imperceptibility by avoiding the low frequencies, 3. Proposed watermarking scheme
without risking that the mark could be removed by compressing or
noise addition if it was inserted in the high frequencies [15]. Despite We can classify watermarking schemes according to their
the main advantage of this domain, which is the invariance to robustness. The robust watermark is designed to protect docu-
translation and scaling, this technique has the disadvantage of being ments. It must be as resistant as possible against attacks. The
expensive in terms of computation time and is not resistant to fragile watermark allows verifying whether the protected image
windowing and small local deformations [16]. The multiresolution has been modified (integrity check). The mark must be fragile, if
domain is a very interesting watermarking space since it is used in the document is modified the mark must disappear [24]. In the
recent JPEG2000 or MPEG4 compression standards. It is character- proposed approach we try to guarantee robustness to attacks while
ized by the decomposition of the image into sub-bands allowing the including a data integrity checker. The proposed watermarking
isolation of low frequency components, which constitute an scheme consists of three main steps: watermark generation,
insertion space less sensitive to modifications [17]. On the other integration and extraction processes.
hand, the spatial content of the image remains preserved after a
multi-resolution transformation; this same content can then be used 3.1. Watermark generation
to locate the mark after a geometric transformation. Mohti & al [18]
propose a hybrid watermarking approach that combines visual The watermark used in this approach is a combination of three
cryptography and Wavelet Packet Transform (WPT). For the parts (Fig. 1). The first part consists of the information that
integration of a watermark containing the medical image owner's identifies the patient during the extraction process (surname, first
2
N. Zermi, A. Khaldi, R. Kafi et al. Forensic Science International 320 (2021) 110691
name, date of birth, etc.). The second part contains information Table 1
related to the image acquisition (date, time, place, etc.). This Energy distribution of medical image after 2D DWT.
information will allow identifying the source and the author of the Red componenent Green componenent Blue componenent
image.
Sub-band Entropy Energy Entropy Energy Entropy Energy
In order to guarantee the integrity, the information of the first
two parts are concatenated and a hash (by applying the MD5 LL 2,47 % 99,92 % 2,35 % 99,89 % 2,64 % 99,49 %
LH 32,23 % 0,04 % 30,81 % 0,03 % 31,08 % 0,18 %
algorithm) is performed, this 128-bit hash will constitute the third
HL 32,13 % 0,04 % 33,54 % 0,06 % 32,53 % 0,31 %
part of the watermark. All this concatenated information will be HH 33,18 % 0,00 % 33,30 % 0,02 % 33,75 % 0,03 %
put in binary form for insertion.
3
N. Zermi, A. Khaldi, R. Kafi et al. Forensic Science International 320 (2021) 110691
4
N. Zermi, A. Khaldi, R. Kafi et al. Forensic Science International 320 (2021) 110691
see in the example of Fig. 8, using Eq. (7) on a matrix of 48 The resulting binary sequence will then be divided into three
coefficients allows the extraction of 24 watermark bits. parts, one part will constitute the patient information, the second
For the second variant, the bits (X and Y) of the watermark will part will contain the information related to the image acquisition.
correspond to the parity of the subtraction of three successive The last part represents the hash of the first two parts. It will then
coefficients S1, S2 and S3: be possible to verify the integrity of the extracted data by
comparing the extracted hash with the hash calculated from the
X ¼ ðS1 S2Þ% 2 ð8Þ
information contained in the first two parts.
5
N. Zermi, A. Khaldi, R. Kafi et al. Forensic Science International 320 (2021) 110691
Medical Technology Co., Ltd [28]. from different hospitals/medical Robustness indicates the ability to detect the mark after
centers in China (Fig. 10). The experiments were performed on 200 modifications due to some involuntary attacks (treatments that
images from this database.In this experiment, all methods are do not necessarily aim to remove the mark) or voluntary attacks
performed on the same platform of 2.27GHZ CPU, 2.00GB RAM, that have the sole purpose of removing the watermark.
Win 7 and MATLAB 8.5.0 (R2015a). In order to evaluate our
approach and determine the efficiency of the decomposition in
4.1. Imperceptibility and capacity test
singular values, we conducted two experiments. The first is to
apply both variants by integrating the watermark in the least
The watermarking process should allow the patient's informa-
significant bits of the LL subband coefficients (without applying
tion integration while maintaining good image quality. Many
SVD). DWT-V1 and DWT-V2 will correspond to the watermarking
distortions can be generated during the integration process. To
results obtained by applying the first and second variant
evaluate the imperceptibility of the proposed scheme, different
respectively. In the second experiment, the watermark is
distortion measurements are calculated:
integrated into the coefficients of the Singular values matrix S
of the LL sub-band according to the two variants proposed in
The PSNR allows to evaluate the degradation in dB caused by the
Section 3. DWT-SVD-V1 and DWT-SVD-V2 will correspond to the
integration process to the watermarked image. When PSNR is
watermarking results obtained by the application of the first and
high, the distortion becomes less significant [29]. Generally a
second variants respectively.
watermarking scheme is considered as imperceptible when the
As can be seen in Fig. 11, the two images are visually similar and
PSNR is higher than 36 dB:
the distortions caused by the integration process are visually
undetectable. Whatever the watermark scheme, the developer has
" #
to make a compromise between imperceptibility, capacity and maxI2 ði; jÞ
robustness to attack. Capacity represents the amount of informa- PSNR dB ¼ 10 log10 M N P 2
ð10Þ
i; j ½ Iði; jÞ J ði; jÞ
tion embedded in proportion to the amount of information
contained in the digital image. Imperceptibility consists in Where I (i, j) is the value of the luminance of the reference pixel
reducing the visual impact of the watermark so that the water- (i, j) and J (i, j) that of the image to be tested, the two images being
marked image is visually equivalent to the original image. of size [M x N].
Fig. 10. Medical images used for the analysis of the proposed scheme.
6
N. Zermi, A. Khaldi, R. Kafi et al. Forensic Science International 320 (2021) 110691
M X
X N
NCVC ¼ ðPr ði; jÞ Q r ði; jÞÞ þ ðPg ði; jÞ Q g ði; jÞÞ
i¼1 j¼1
þ ðQ b ði; jÞ Q b ði; jÞÞ ð15Þ
XM X N
CI1 ði; jÞ CI2 ði; jÞ
The MSE represents the mean square error between the UACI ¼ 100% ð16Þ
watermarked and original image [30]. This measure evaluates i¼1 j¼1
FT
the influence of the mark on the image and is defined as follows:
Where F is the largest pixel value supported by the image format
1 X X
MSE ¼ i ð Iði; jÞ J ði; jÞÞ2 ð11Þ The bits per pixel (BPP) allows to measure the payload capacity
MN j [35], it represents the number of bits integrated compared to the
number of pixels of the image.
Where I (i, j) is the value of the luminance of the reference pixel (i,
j) and J (i, j) that of the image to be tested, the two images being of
size [M x N].
Number of secret bits embedded
BPP ¼ ð17Þ
SSIM (Structural SIMilarity) is a measure of similarity between Total pixels in the cover image
two images [31]. It was developed to measure the visual quality According to the results obtained in Tables 2 and 3, the two
of a compressed image compared with the original image. The variants combining DWT and SVD offer better imperceptibility
idea of SSIM is to measure the structural similarity between the results. The integration of the watermark in the least significant bit
two images, rather than a pixel-to-pixel difference as is done for of the singular values generates less distortion than the integration
example by PSNR. The SSIM metric is calculated over multiple in the DWT image coefficients. The combination of DWT and SVD
windows of an image. The measurement between two x and y during the integration process generates watermarked images
windows of size N x N is defined by the following formula: similar to the original images with SSIM rates of 0.9997 and 0.9998.
However, the number of pixels and values changed by the DWT-
SVD combination are significantly higher than the integration in
2mx my þ C 1 2dxy þ C 2
SSIMðx; yÞ ¼ ð12Þ the DWT coefficients. Furthermore, the integration in singular
m2x þ m2y þ C 1 d2x þ d2y þ C 2 (non-zero) values considerably reduces the integration capacity of
our approach.
2 2
Where: mx - Average of x. my - average of y. dx - variance of x. dy - In order to evaluate the capacity of the proposed approach as
variance of y. dxy - covariance of x y. C1=k1L2-Constant to avoid well as the impact on imperceptibility, we experimented several
instability when m2x þ m2y is close to zero; k1 = 0.01, = 255. integration rates and calculated the average value of PSNR
2 2
obtained. As we can see in Table 3, the more the capacity of the
C2=k2L2- Constant to avoid instability when dx þ dy is close to approach increases, the more the PSNR obtained decreases. The
zero; k2 = 0.03, = 255.
NPCR is defined by the following formula: DWT-V1 27.34 2.32 0.8989 15.5% 0.00017 65.90% 10.52
DWT-V2 27.19 2.12 0.8919 11.9% 0.00004 75.12% 7.89
DWT-SVD-V1 56.12 0.10 0.9998 4.2% 0.00006 16.72% 0.10
XM X N
Dði; jÞ
DWT-SVD-V2 57.41 0.13 0.9998 4.0% 0.00016 12.81 % 0.13
NPCR ¼ 100% ð13Þ
i¼1 j¼1
T
Table 3
Imperceptibility and capacity results for different integration rate.
0; if CI1 ði; jÞ ¼ CI2 ði; jÞ
Dði; jÞ ¼ ð14Þ
1; if CI1 ði; jÞ 6¼ CI2 ði; jÞ DWT-V1 DWT-V2 DWT-SVD-V1 DWT-SVD-V2
Integration rate PSNR BPP PSNR BPP PSNR BPP PSNR BPP
25 % 64.71 3.15 69.81 0.78 69.42 0.02 69.23 0.03
50% 44.00 5.26 45.44 3.94 55.90 0.04 63.87 0.06
The number of colorimetric values changed (NCVC) is used to 100 % 27.34 10.5 27.19 7.89 56.12 0.095 57.41 0.13
calculate the number of colorimetric values modified by the
7
N. Zermi, A. Khaldi, R. Kafi et al. Forensic Science International 320 (2021) 110691
Table 4
Imperceptibility results comparison with related work.
DWT-V1 DWT-V2 DWT-SVD-V1 DWT-SVD-V2 Mothi & al Anand & al Devi & al
PSNR 27.34 27.19 56.12 57.41 49.62 44.19 54.64
Table 5
Robustness comparison with related work.
Mothi & al Devi & al Anand & al DWT-V1 DWT-V2 DWT-SVD-V1 DWT-SVD-V2
Salt & Pepper Noise 0.9671 / 0.9251 0.9296 0.9250 0.9882 0.9782
Gaussian noise 0.9819 0.9953 0.9803 0.9741 0.9681 0.9622 0.9707
Rotation 0.8713 0.85933 0.8817 0.8215 0.8391 0.8709 0.8611
JPEG compression 0.9873 0.9965 0.9388 0.9464 0.9570 0.9204 0.9238
Speckle noise 0.8191 / 0.9687 0.8707 0.8529 0.9012 0.9197
Cropping 0.9473 0.8141 0.3586 0.5613 0.6925 0.8101 0.7913
Average filtering 0.9603 0.7690 0.9860 0.9708 0.9661 0.9613 0.9595
Histogram equalization 0.9688 0.8764 0.7223 0.8191 0.8034 0.9877 0.9873
Resizing / 0.9057 / 0.8992 0.8879 0.8976 0.9103
Gamma correction 0.9347 1 / 0.9664 0.9711 0.9688 0.9881
Sharpening 0.9732 0.9253 0.6506 0.8479 0.7632 0.9690 0.9736
Scaling / / 0.7157 0.8215 0.8937 0.8982 0.9519
choice of the amount of information to be integrated will allow for robustness tests are satisfactory. The proposed watermarking
a trade-off between capacity and imperceptibility. The images used scheme generates a watermarked image that is robust to geometric
in our experiments are of size 512 * 512, the application of a DWT to and destructive attacks. This is due to the small amount of
this image will generate 82636 L L coefficient for each color plane information required for the watermark integration. In the second
(R, G and B). The first variant of our integration process requires proposed variant, only one bit (of only one coefficient out of three)
two coefficients for the integration of two bits of the watermark, so is probably modified for the integration of two watermark bits.
this variant allows the integration of 123954 watermark bits which Based on the obtained results, we found that in terms of
corresponds approximately to 15494 characters. The second imperceptibility, all the four schemes offer the same PSNR rates
variant of our approach allows the integration of two watermark for the concealment of a small amount of information. However,
bits by combining three coefficients. This makes it possible to hide for the concealment of a large number of bits, the scheme
165272 bits (approximately 20659 characters). The combination of combining DWT and SVD is more efficient. Robustness tests
a DWT and an SVD considerably reduces the capacity of our concluded that the two variants combining DWT and SVD are
approach, a singular value decomposition of the LL sub-band almost similar. We can conclude from the capacity tests that the
coefficients allows to generate 3820 embeddable coefficients. The second variant combining DWT and SVD is significantly better.
first variant of the integration process will allow to integrate 1910 Indeed, the first variant of the integration process will allow
bits of the watermark which corresponds to approximately 238 integrating 1910 bits of the watermark which corresponds to
characters. The second variant of the integration process will allow approximately 238 characters. The second variant of the integra-
to conceal 2546 bits (approximately 318 characters). tion process will allow concealing 2546 bits (approximately 318
In order to evaluate our approach, we compared the imper- characters).
ceptibility results of our approach with related works. As we can
see in Table 4, the PSNR rates obtained by the two variants 5. Conclusion
combining a DWT and an SVD are higher than those obtained in
recent related works that make the imperceptibility of our scheme Medical information protection ensures the security of medical
acceptable. Indeed, in the proposed integration scheme, the parity information records which are, for a patient, a complex set of
of the coefficients is combined for the watermark integration clinical examinations, diagnostic annotations and other findings
which considerably reduces the modifications made to the image. and images, contained in the Electronic Patient Records (EPR). The
importance of the security of medical images is due to the serious
4.2. Robustness test consequences that can be caused by malicious alterations or
attacks, such as misdiagnosis, invalidity of computerized data in
We evaluated the robustness of the proposed system against forensic medicine, possibility of misleading medical insurance
some attacks on the watermarked image such as noise addition, agencies, etc. In this work, we proposed an approach to ensure the
and JPEG compression, for each attack the different correlations are reliability of retinal images. The watermark composed of Patient
calculated. The correlation variation for each attack is given in the information allows to authenticate the patient as well as the data
Table 5. related to the image acquisition. In addition, the hash embedded in
As we can see in Table 5, both approaches have the same the watermark guarantees that the data has not been altered by
resistance to resizing and scaling attacks, but, the approach using unauthorized persons. After applying a DWT to the medical image,
only DWT is more resistant to average filtering and JPEG a SVD is performed in the LL sub-band. The bits of the watermark
compression attacks. We can also conclude from the obtained are then integrated into the least significant bits of the single
results that the approach combining a DWT and SVD offers better values obtained by combining the parity of the successive
resistance to rotation and Salt & Pepper noise attacks. The obtained coefficients. The wavelet transform allows overcoming some
results of this approach are also significantly better for Histogram weaknesses of the Fourier transform, essentially the space-
equalization and Sharpening attacks. From the normalized frequency localization. The representations at different resolutions
correlation values obtained, it can be concluded that the make possible to extract the main trends of the image in a small
8
N. Zermi, A. Khaldi, R. Kafi et al. Forensic Science International 320 (2021) 110691
number of coefficients, while precisely locating the discontinuities. [8] D. Degadwala, M. Kulkarni, D. Vyas, A. Mahajan, Novel image watermarking
This allows enhancement of the most significant areas of the approach against noise and RST attacks, Procedia Comput. Sci. 167 (2020)
213–223.
image. Experimental results of imperceptibility and robustness [9] S. Thakur, A.K. Singh, S.P. Ghrera, A. Mohan, Chaotic based secure water-
show that the proposed scheme maintains a high quality of marking approach for medical images, Multimed. Tools Appl. 79 (2020) 4263–
watermarked images and is very robust against several conven- 4276.
[10] A. Anand, A.K. Singh, Z. Lv, G. Bhatnagar, Compression-then-Encryption based
tional attacks. Experiments performed on the test images allowed secure watermarking technique for smart healthcare system, IEEE Multimed.
to evaluate the performance of this method and to evaluate its (2020), doi:http://dx.doi.org/10.1109/MMUL.2020.2993269 pp. 1–1.
robustness against JPEG compression and the addition of noise. [11] R.M. Hadi, P. Ayubi, Blind digital image watermarking based on CT-SVD and
chaotic cellular automata, 2012 2nd International Econference on Computer
However, instead of using the Singular value decomposition, we and Knowledge Engineering (ICCKE) (2012) 301–306, doi:http://dx.doi.org/
could in future works use the Schur decomposition. The successful 10.1109/ICCKE.2012.6395396 October.
application of singular values decomposition in digital water- [12] A.K. Singh, Data hiding: current trends, innovation and potential challenges,
ACM Trans. Multimedia Comput. Commun. Appl. (2020), doi:http://dx.doi.org/
marking suggests the use of Schur decomposition for the same
10.1145/3382772.
purpose. Schur decomposition represents an alternative to [13] M. Yousefi Valandar, M. Jafari Barani, P. Ayubi, A blind and robust color images
the singular values decomposition. Indeed, singular value decom- watermarking method based on block transform and secured by modified 3-
position requires about 11N3 flops as compared to a Schur dimensional Hénon map, Soft Comput. 24 (2020) 771–794.
[14] M. Jafari Barani, M. Yousefi Valandar, P. Ayubi, A new digital image tamper
decomposition which requires only 8N3/3. This represents about detection algorithm based on integer wavelet transform and secured by
three times less computing time. This might be interesting to encrypted authentication sequence with 3D quantum map, Optik 187 (2019)
reduce the computation time. DWT is a typical multi-scale 205–222.
[15] O.P. Singh, A.K. Singh, G. Srivastava, N. Kumar, Image watermarking using soft
transform (MST) method that does not have the translation- computing techniques: a comprehensive survey, Multimed. Tools Appl. (2020),
invariance property. In addition, DWT decompose the image into doi:http://dx.doi.org/10.1007/s11042-020-09606-x.
one low-frequency sub-band and three high-frequency sub-bands [16] M.Y. Valandar, M.J. Barani, P. Ayubi, M. Aghazadeh, An integer wavelet
transform image steganography method based on 3D sine chaotic map,
(horizontal, vertical, and diagonal). Only three decomposition Multimed. Tools Appl. 78 (2019) 9971–9989.
directions are not enough to represent textures of different scales. [17] A.K. Singh, Robust and distortion control dual watermarking in LWT domain
It might be interesting in future work to use non-subsampled MST using DCT and error correction code for color medical image, Multimed. Tools
Appl. 78 (2019) 30523–30533, doi:http://dx.doi.org/10.1007/s11042-018-
methods, such as non-subsampled contourlet transform (NSCT) or
7115-x.
non-subsampled shearlet transform (NSST). In order to improve [18] R. Mothi, M. Karthikeyan, Protection of bio medical iris image using
the security of the proposed scheme, a watermark encryption watermarking and cryptography with WPT, Measurement 136 (March)
(2019) 67–73.
before integration could be performed by a symmetrical encryp-
[19] A. Anand, A. Kumar Singh, An improved DWT-SVD domain watermarking for
tion algorithm using a pre-shared key. medical information security, Comput. Commun. 152 (February) (2020) 72–80.
[20] H. Devi, K. Singh, Red-cyan anaglyph image watermarking using DWT,
Ethical approval Hadamard transform and singular value decomposition for copyright
protection, J. Inf. Secur. Appl. 50 (February) (2020).
[21] P. Khare, V.K. Srivastava, A reliable and secure image watermarking algorithm
This article does not contain any studies with human using homomorphic transform in DWT domain, Multidimens. Syst. Signal
participants or animals performed by any of the authors Process. (June) (2020), doi:http://dx.doi.org/10.1007/s11045-020-00732-1.
[22] X. Zhou, H. Zhang, C. Wang, A robust image watermarking technique based on
DWT, APDCBT, and SVD, Symmetry 10 (2018), doi:http://dx.doi.org/10.3390/
CRediT authorship contribution statement sym10030077.
[23] A. Benoraira, K. Benmahammed, N. Boucenna, Blind image watermarking
technique based on differential embedding in DWT and DCT domains,
Zermi Narima: Conceptualization, Methodology, Formal anal- EURASIP J. Adv. Signal Process. 1 (2015), doi:http://dx.doi.org/10.1186/s13634-
ysis, Investigation, Software, Writing - original draft. Khaldi 015-0239-5.
Amine: Supervision, Resources, Validation, Writing - original draft. [24] S. Bravo-Solorio, F. Calderon, C. Li, K. Nandi, Fast fragile watermark embedding
and iterative mechanism with high self-restoration performance, Digit. Signal
Kafi Redouane: Methodology, Writing - original draft. Kahlesse- Process. 73 (February) (2018) 83–92.
nane Fares: Investigation, Software, Writing - original draft. [25] M.E. Moghaddam, N. Nemati, A robust color image watermarking technique
Euschi Salah: Methodology, Software, Validation, Writing - using modified Imperialist Competitive Algorithm, Forensic Sci. Int. 233 (2013)
193–200, doi:http://dx.doi.org/10.1016/j.forsciint.2013.09.005.
original draft.
[26] I. Assini, A. Badri, K. Safi, A. Sahel, A. Baghdad, A robust hybrid watermarking
technique for securing medical image, Int. J. Intell. Eng. Syst. 11 (June) (2018)
Declaration of Competing Interest 169–176.
[27] N. Falgun, V.K. Srivastava, A blind medical image watermarking: DWT-SVD
based robust and secure approach for telemedicine applications, Multimed.
The authors declare that they have no known competing Tools Appl. 76 (2017) 3669–3697.
financial interests or personal relationships that could have [28] H. Hu, L. Hsu, H. Chou, An improved SVD-based blind color image
appeared to influence the work reported in this paper. watermarking algorithm with mixed modulation incorporated, Inf. Sci. 519
(May) (2020) 161–182.
[29] Ocular Disease Recognition, Right and Left Eye Fundus Photographs of 5000
References Patients, (2021) . https://odir2019.grand-challenge.org/.
[30] Fares Kahlessenane, Amine Khaldi, Redouane Kafi, Salah Euschi, A DWT
[1] K. Swaraja, K. Meenakshi, P. Kora, An optimized blind dual medical image Based Watermarking Approach for Medical Image Protection, J. Ambient
watermarking framework for tamper localization and content authentication Intell. Humaniz. Comput. (2020), doi:http://dx.doi.org/10.1007/s12652-020-
in secured telemedicine, Biomed. Signal Process. Control 55 (January) (2020). 02450-9.
[2] A.K. Singh, C. Kumar, Encryption-then-Compression-Based copyright protec- [31] Q. Hu, M.D. Abràmoff, M.K. Garvin, Automated separation of binary
tion scheme for E-Governance, IT Prof. 22 (2020) 45–52. overlapping trees in low-contrast color retinal images, Med. Image Comput.
[3] P. Ayubi, M. Jafari Barani, M. Yousefi Valandar, B. Yosefnezhad Irani, R. Comput. Assist. Interv. 16 (2013) 436–443.
Sedagheh Maskan Sadigh, A new chaotic complex map for robust video [32] F. Kahlessenane, A. Khaldi, S. Euschi, A robust blind color image watermarking
watermarking, Artif. Intell. Rev. (2020), doi:http://dx.doi.org/10.1007/s10462- based on Fourier transform domain, Optik 208 (April) (2020).
020-09877-8. [33] R. Dubolia, R. Singh, S. Bhadoria, R. Gupta, Digital image watermarking by
[4] E. Farri, P. Ayubi, A blind and robust video watermarking based on IWT and using discrete wavelet transform and discrete cosine transform and
new 3D generalized chaotic sine map, Nonlinear Dyn. 93 (2018) 1875–1897. comparison based on PSNR, International Conference on Communication
[5] C. Kumar, A.K. Singh, P. Kumar, Dual watermarking: an approach for securing Systems and Network Technologies (2011) 593–596.
digital documents, Multimed. Tools Appl. 79 (2020) 7339–7354. [34] Euschi Salah, Khaldi Amine, Kafi Redouane, Kahlessenane Fares, A Fourier
[6] A. Anand, A.K. Singh, Joint Watermarking-Encryption-ECC for patient record Transform Based Audio Watermarking Algorithm, Appl. Acoust. 172 (2021)
security in wavelet domain, IEEE Multimed. 27 (2020) 66–75. 107652, doi:http://dx.doi.org/10.1016/j.apacoust.2020.107652.
[7] A. Khaldi, Diffie-Hellman Key Exchange through Steganographied Images, [35] S. Ahmadi, G. Zhang, S. Wei, Robust and hybrid SVD-based image water-
Revista de Direito Estado e Telecomunicações 10 (May) (2018) 147–160. marking schemes: a survey, Multimed. Tools Appl. 79 (2020) 1075–1117.