HH 2
HH 2
Computer Communications
journal homepage: www.elsevier.com/locate/comcom
1. Introduction
Some potential applications of digital watermarking are depicted in
Fig. 1 [6,8,9].
Security and privacy of medical information are mostly presented Currently, encryption and watermarking approaches are used to
as major issue in teleHealth services [1]. The teleHealth services uses provide authenticity and confidentiality of medical record [10–13]. The
advanced cost effective information and communication technology watermarked media being transmitted might get some unwanted chan-
(ICT) tools to manage, store and transmit medical record for vari- nel noises or get attacked upon. This makes the technique less robust
ous purpose [2]. These services are convenient and potentially useful resulting in receiving distorted media. So the concept of encryption
in medical domain but also bring a privacy leakage, identity theft is combined with watermarking to make the technique anti-attack in
and risk of data tampering and authenticity at the same time [3]. nature [14,15]. Encryption deals with the secure transmission of the
Further, digital imaging and communications in medicine (DICOM) data over an insecure transmission media [16].
is used as standard to exchange the electronic patient report over In order to this, many researchers used combined (Encryption-
open network [4]. A header file is attached with DICOM image which Watermarking) approach to address the security issues of teleHealth ap-
contains significant patient related information. However, this header plications [4,10–13]. However, few studied of watermarking-
consumes extra bandwidth and may be altered, removed or attacked encryption-compression concepts for the applications [14,17]. In this
during the transmission. Furthermore, medical related identity theft is paper, we developed an improved dual watermarking approach that
booming problem as demonstrated by various surveys [3,5]. According uses combination of DWT-SVD, Encryption-compression and hamming
to a survey conducted by Experian Information Solutions in 2017, code to provide security for medical information exchanged via unse-
medical thefts constitute more than 27% of the total identity thefts [5]. cured networks. The approach uses multi-watermarks embedded into
The stolen information affects the individual life to a great extent. SVD of cover image in DWT domain. The DWT has great spatio-
Therefore, there is a need for strong mechanisms to be proposed which frequency properties which help in recognizing the area where the
resolves the security and privacy issue of medical information for watermark can be embedded with high imperceptibility. Also, embed-
teleHealth services. Recently, digital watermarking techniques have ding in the singular matrix of SVD does not have noticeable change
attracted remarkable interest for protection of medical data [3,6]. The in the visual quality of the cover image. Thus, using a hybrid of DWT
technique refers the embedding of confidential information in a me- and SVD helps in achieving higher robustness and imperceptibility [4].
dia/entity for determining any ownership conflicts that can arise [3,7]. An encoded text watermark via hamming code is also embedded in the
∗ Corresponding author.
E-mail addresses: [email protected] (A. Anand), [email protected] (A.K. Singh).
https://doi.org/10.1016/j.comcom.2020.01.038
Received 25 November 2019; Received in revised form 9 January 2020; Accepted 18 January 2020
Available online 22 January 2020
0140-3664/© 2020 Elsevier B.V. All rights reserved.
A. Anand and A.K. Singh Computer Communications 152 (2020) 72–80
visual feature vector of the host image which is extracted using SWT-
DCT. Also, to improve the authenticity, the watermark is encrypted
using chaotic map. This watermarking technique is robust against
conventional and geometric attacks. It was experimentally proved that
on embedding more data, the pixel value of the host image does
not change and maintains low complexity. In [23], three watermarks
are embedded in the RONI part of transformed DWT cover. RNOI is
obtained by sub-band decomposition of the host image. Prior hiding,
error correcting code (ECC) is used to provide better robustness of the
hidden data. A biometric based watermarking technique was proposed
in [13] for protection of medical data. In this method, minutia feature
of the fingerprint and encrypted EPR report is considered as watermark.
These watermarks are embedded in the ROI part of the cover. The
resulting watermark image is further compressed by arithmetic coding
scheme to generate the final watermark image. The final watermark
data and a pseudo random number id are placed inside the cover image.
Different results showed the proficiency of the scheme for medical data
authentication and reliability of the system. Soualmi et al. developed a
Fig. 1. Novel applications of digital watermarking.
blind watermarking for securing the medical data [24]. It uses a fusion
of DWT-Schur decomposition for hiding the medical data. Also, to
improve the robustness, each non-overlapping block of cover image is
higher level DWT to provide more security. Additionally, the water- scrambled. This technique offers better robustness and imperceptibility
marked image is first encrypted then compressed prior transmission to when compared with similar proposed techniques [25–29].
achieve extra security and reduce the bandwidth demand. Therefore, DWT-SVD based robust and secure watermarking technique is pro-
the major advantages the of our technique are (1) Robustness and posed by Singh et al. for medical images [30]. The image watermark
imperceptibility is increased by using hybrid transform (DWT-SVD) is hidden in the RNOI region of the cover image, offering better
at low distortion, (2) Providing extra level of security by embedding imperceptibility and hence reducing the distortion in the medical cover
multiple watermarks, (3) Encryption of the marked image is providing image.
confidentiality at the same time, and (4) Compression of encrypted data A robust watermarking approach is proposed in [4]. Two water-
shown the good compression performance. marks are placed inside the cover using a hybrid form of DWT-SVD.
Rest of the paper is organized as follows. Recent work related to Prior the embedding procedure, the image watermark was sub-divided
teleHealth applications is introduced in Section 2. Section 3 describes into two parts and text watermark is encoded using error correcting
the more important concepts related to our work. The embedding and codes to increase the robustness. Four types of ECC were studied to
recovery part of our method is elaborated in Section 4. Section 5 determine the performance of the technique. The sub-part of the image
presents the performance analysis of the work. Finally, conclusions are watermark data and encoded text is imperceptibly placed inside the
drawn in Section 6. transformed cover media.
3. Preliminary
2. Literature review
73
A. Anand and A.K. Singh Computer Communications 152 (2020) 72–80
Table 1
Properties of U, V and S matrices [35].
Matrix Size Type of matrix Features
U m × m Unitary, ∙ Represents set of output vector direction
Orthogonal for input matrix
Unitary, ∙ Conjugate transpose of V.
VT n × n
Orthogonal ∙ Represents set of input vector direction
for input matrix
Diagonal, ∙ Non-negative numbers in the diagonal.
S m × n
singular ∙ Represents singular value of input image
in descending order i.e. 𝜎i > 𝜎i+1
Table 2
Relationship between parity bits and data bits.
Parity bit Relationship with data bits Fig. 4. Encryption then compression technique [37].
p1 d1 ⊕d2 ⊕d4
p2 d1 ⊕d3 ⊕d4
p3 d2 ⊕d3 ⊕d4
calculated using odd or even parity of the associated bits. These bits
are then used to identify one or two bits error [36] by ensuring that
each parity bit and their corresponding data bits together achieve even
3.2. Singular value decomposition (SVD) parity. Fig. 3 shows the representation of (7, 4) hamming code.
SVD reduces an image of any size into smaller invertible and square 3.4. Compression of encrypted data
matrices. It has good energy compaction properties. SVD of a matrix X
of size m × n can be stated as [33]: Encryption Then Compression (ETC) technique helps for transfer-
ring the image more securely over the unprotected network. Sender
protects the privacy of the data by encrypting it before handing over
X = U S VT (7)
to the network provider. He also compresses the encrypted data without
Here, U and V are orthogonal matrices and S is a diagonal matrix knowing the encryption key, resulting in reduced network traffic. The
representing the singular values of X in descending order. SVD can be receiver will obtain the original data by performing joint decompres-
applied to all sizes of image including square and rectangular images, sion and decryption on the received data. This method is suitable for
making it one of the widely used forms of transform in watermarking two work plans; (a) when the storage service provider wants to reduce
technique. Also, slight alterations in the intensity values of the singular the memory usage without any knowledge of the encryption key, and
values do not make significant variations in the visual quality of the (b) when there is a strong need to secure transmission through an
image [34]. The properties of U, V and S matrices are described in untrusted channel provider [14,15]. This technique is represented in
Table 1. Fig. 4.
In our study, two different encryption scheme (Chaotic and Hy-
3.3. Error correcting code (ECC) perChaotic) and three lossless compression techniques (LZW, Huffman,
and a hybrid of Huffman and LZW) are considered. Hence, some small
During the transmission of the data over the communication chan- background is given below.
nel, noises may introduce. Hence, small noisy data may cause big Chaotic system [38], developed in 1989, is a non-linear system which
problems in some sensitive applications [36]. Note that different error is invertible and dynamic in nature. The chaotic sequence can be
correcting methods have been introduced to correct the errors such modeled using non-linear logistic maps, defined as
[ ]
as repetition codes, Hamming codes, BCH codes and Reed–Solomon Ci+1 = 𝜎 Ci 1 − Ci (8)
codes [36,37].
where, Ci ∈ (0, 1) ; 𝜎 ∈ (0, 4)
In our method, hamming code (7, 4) is used where four data bits (d1 ,
d2 , d3 and d4 ) are represented using seven bits. Rest three bits are the Here, 𝐶𝑖+1 and 𝜎 represents the chaotic sequence and bifurcation
parity bits (p1 , p2 and p3 ). Relationships between these bits are depicted factor respectively. This sequence will be obtained by iterating for
in Table 2. Each parity bit is generated by applying exclusive or (XOR), a specified amount of number. XOR operation of the binary form
denoted by ‘‘⊕’’, on three data bits. Value of each parity bit added is of chaotic sequence and the image produced the encrypted image.
74
A. Anand and A.K. Singh Computer Communications 152 (2020) 72–80
4. Proposed method
The non-periodic, uncorrelated and pseudorandom features make the 𝑊 𝑎𝑡𝑒𝑟𝑚𝑎𝑟𝑘_𝑖𝑚𝑔 = 𝑊1 + 𝑊2 (14)
chaotic system appropriate for encryption. Since chaotic system only
Step 4: Embed the two parts of the watermark image into singular
diffuses in single direction, HyperChaotic system was introduced. Hy-
matrices (SHL1 , SLH1 ) obtained in Step 2 using a gain factor (𝛼).
perChaotic system [39,40] diffuses in at least two directions, which
results in more than one positive Lyapunov exponent. This property 𝑊 𝑆𝐻𝐿1 = 𝑆𝐻𝐿1 + 𝛼 ∗ W1 (15)
makes it more robust against the attacks. Higher number of posi- 𝑊 𝑆𝐿𝐻1 = 𝑆𝐿𝐻1 + 𝛼 ∗ W2 (16)
tive Lyapunov exponent has high randomness, which makes the sys-
tem more complex and anti-attack. The mathematical definition of Step 5: Apply inverse SVD to obtain the watermarked DWT sub-bands.
HyperChaotic system is defined as, ( )𝑇
𝑊 𝐻𝐿1 = 𝑈𝐻𝐿1 ∗ 𝑊 𝑆𝐻𝐿1 ∗ 𝑉𝐻𝐿1 (17)
( )𝑇
⎧ 𝑊 𝐿𝐻1 = 𝑈𝐿𝐻1 ∗ 𝑊 𝑆𝐿𝐻1 ∗ 𝑉𝐿𝐻1 (18)
⎪ 𝑎̇ = 𝑝(𝑏 − 𝑎)
⎪𝑏̇ = (𝑟 − 𝑝) 𝑎 − 𝑎𝑐 + 𝑟𝑏 + 𝑑 Step 6: Read the text watermark and convert it into binary form.
⎨ (9)
⎪ 𝑐̇ = 𝑎𝑏 − 𝑞𝑐
⎪ 𝑑̇ = −𝑖𝑎 + 𝑗𝑏 𝑇𝑏𝑖𝑛 = 𝑏𝑖𝑛𝑎𝑟𝑦(‘Ashima NITP01’) (19)
⎩
Step 7: Apply Hamming error correcting code on Tbin to obtain the
where, a (0) = b(0) = c(0) = d(0) = 1, p = 35, q = 3, r = 28, i = 2, j =
encoded message.
0.5.
Lempel–Ziv–Welch (LZW) [41] is a lossless dictionary-based com- 𝑇𝑒𝑛𝑐𝑜𝑑𝑒𝑑 = 𝐻𝑎𝑚𝑚𝑖𝑛𝑔𝐶𝑜𝑑𝑒(𝑇𝑏𝑖𝑛 ) (20)
pression technique used for both images and text data. Unlike some
Step 8: Replace (0,1) with (−1,1) in the encoded bits to obtain Tf inal
compression methods, the code length is fixed in LZW compression and embed it into HH2 obtained in Step 1.
and additional information or probability density is not required to
decompress the media. The LZW encoding algorithm is depicted in 𝑊 𝐻𝐻2 = 𝑡𝑒𝑥𝑡_𝑒𝑚𝑏𝑒𝑑(𝐻𝐻2 , 𝑇𝑓 𝑖𝑛𝑎𝑙 , 𝐿, 𝛼1 ) (21)
Fig. 5 [42]. where, L is the length of Tf inal and 𝛼1 is the gain factor used to embed
Huffman compression [43] technique is based on the frequency of the text.
occurrence of a symbol in original file. Higher the frequency, shorter Step 9: 𝑊 𝑎𝑡𝑒𝑟𝑚𝑎𝑟𝑘𝑒𝑑_𝑖𝑚𝑔 (marked image) is obtained via inverse-DWT.
is the length of bit string representing that symbol. Huffman-tree
represents the relationship between the original symbols and their 𝑊 𝐿𝐿1 = 𝐼𝐷𝑊 𝑇 (𝐿𝐿2 , 𝐻𝐿2 , 𝐿𝐻2 , 𝑊 𝐻𝐻2 ) (22)
corresponding bit strings. Both compression and decompression pro- 𝑊 𝑎𝑡𝑒𝑟𝑚𝑎𝑟𝑘𝑒𝑑_𝑖𝑚𝑔 = 𝐼𝐷𝑊 𝑇 (𝑊 𝐿𝐿1 , 𝑊 𝐻𝐿1 , 𝑊 𝐿𝐻1 , 𝐻𝐻1 ) (23)
cess is carried out using this Huffman tree. This tree is formed by
Step 10: Encrypt the watermarked image using either Chaotic or Hy-
sorting the symbols in descending order of their frequencies and then
perChaotic encryption algorithm.
merging the frequencies together until all frequencies are merged. For
decompression, reverse compression process is performed. 𝐸𝑛𝑐𝑖𝑚𝑔 = 𝐸𝑛𝑐𝑟𝑦𝑝𝑡𝑖𝑜𝑛(𝑊 𝑎𝑡𝑒𝑟𝑚𝑎𝑟𝑘𝑒𝑑_𝑖𝑚𝑔) (24)
75
A. Anand and A.K. Singh Computer Communications 152 (2020) 72–80
76
A. Anand and A.K. Singh Computer Communications 152 (2020) 72–80
Fig. 7. Sample of our images and text data as a. cover image, b. watermark image, c. watermarked image, d. text watermark.
Table 3
Various metrics used for objective measures.
Standard metric Formula Description
(255)2
Peak Signal to Noise 𝑃 𝑆𝑁𝑅 = 10 𝑙𝑜𝑔 where, Mean Square Error (MSE) -Determines the similarity between original and
𝑀𝑆𝐸
Ratio (PSNR) [8] 1 ∑𝑋 ∑𝑌 2 watermarked image.
is, 𝑀𝑆𝐸 = 𝑋×𝑌 𝑖=1 𝑗=1 (𝐼𝑖𝑗 − 𝑊𝑖𝑗 )
Iij = Pixel of original image of size X × Y -Higher the PSNR value, greater the similarity between
𝑊ij = Pixel of watermarked image of size X × Y. the two images.
-Ideally, the value of PSNR should be more than 28 dB.
∑𝑋 ∑𝑌
𝐼=1 𝑗=1 (𝑊𝑜𝑟𝑔𝑖𝑗 ×𝑊𝑟𝑒𝑐𝑖𝑗 )
Normalized Coefficient 𝑁𝐶 = ∑𝑋 ∑𝑌 ( 2 ) -Calculates similarity between original and extracted
𝐼=1 𝑗=1 𝑊𝑜𝑟𝑔_𝑖𝑗
(NC) [8] watermark.
Worigij = Pixel of original watermark of size X × Y
-Its value lies between 0 and 1
𝑊recij = Pixel of recovered watermark of size X × Y.
-Acceptable above 0.7 value.
-Determines the robustness.
(𝑁𝑜.𝑜𝑓 𝑖𝑛𝑐𝑜𝑟𝑟𝑒𝑐𝑡𝑙𝑦𝑑𝑒𝑐𝑜𝑑𝑒𝑑𝑏𝑖𝑡𝑠)
Bit Error Rate (BER) 𝐵𝐸𝑅 = -Ideally it should be zero.
(𝑇 𝑜𝑡𝑎𝑙𝑛𝑢𝑚𝑏𝑒𝑟𝑜𝑓 𝑏𝑖𝑡𝑠)
[4]
{
0, 𝑖𝑓 𝐶 1 (𝑖, 𝑗) = 𝐶 2 (𝑖, 𝑗)
𝐷 (𝑖, 𝑗) =
0, 𝑖𝑓 𝐶 1 (𝑖, 𝑗) ≠ 𝐶 2 (𝑖, 𝑗)
∑ 𝐷 (𝑖, 𝑗)
1 2
Number of Changing 𝑁𝑃 𝐶𝑅 ∶ N(𝐶 , 𝐶 ) = -Used evaluate the efficiency of the image encryption
𝑖,𝑗
𝑇
Pixel Rate (NPCR) and algorithm against different attacks.
Unified Averaged ∑ |𝐶 1 (𝑖, 𝑗) − 𝐶 2 (𝑖, 𝑗) | -Higher the NPCR/UACI value, higher the resistance
𝑈 𝐴𝐶𝐼 ∶ U(𝐶 1 , 𝐶 2 ) =
Changed Intensity 𝑖,𝑗
𝐹 .𝑇 provided against the attacks.
(UACI) [44] where,
C1 ,C2 = Ciphertext images before and after one pixel
change,
F = Largest supported pixel value,
T = Total number of pixels in ciphertext image.
𝑆𝑆𝐼𝑀 = 𝑓 (𝑎 (𝑚, 𝑛) , 𝑏 (𝑚, 𝑛) , 𝑐(𝑚, 𝑛))
2𝜇𝑚 𝜇𝑛 + 𝐶1
𝑎 (𝑚, 𝑛) =
𝜇𝑚2 + 𝜇𝑛2 + 𝐶1
Structural Similarity 2𝜎𝑚 𝜎𝑛 + 𝐶2 -Used to find how similar are the watermarked and
Index (SSIM) [8] 𝑏 (𝑚, 𝑛) = original image with each other.
𝜎𝑚2 + 𝜎𝑛2 + 𝐶2
-Value ranges from −1 to +1. Ideally the value should be
𝜎𝑚𝑛 + 𝐶3
𝑐 (𝑚, 𝑛) = + 1.
𝜎𝑚 𝜎𝑛 + 𝐶 3
where,
a(m,n)= luminance comparison function,
b(m,n) = contrast comparison function,
c(m,n)= structure comparison function
(𝑆𝑖𝑧𝑒𝑎𝑓 𝑡𝑒𝑟𝑐𝑜𝑚𝑝𝑟𝑒𝑠𝑠𝑖𝑜𝑛)
Compression Ratio [45] 𝐶𝑅 = -Ratio of size of data after compression and size of data
(𝑆𝑖𝑧𝑒𝑏𝑒𝑓 𝑜𝑟𝑒𝑐𝑜𝑚𝑝𝑟𝑒𝑠𝑠𝑖𝑜𝑛)
before compression.
-Value to be less than 1 and more than 0.
-Value approaching 0 is better.
77
A. Anand and A.K. Singh Computer Communications 152 (2020) 72–80
Table 4
Performance analysis at varying gain.
Technique used
Gain Factor PSNR (in dB) NC BER NPCR UACI SSIM CR
Encoding Compression
0.05 36.1007 0.9851 0 0.9954 0.3865 0.996153 0.9976
Huffman
0.10 35.8572 0.9911 0 0.9954 0.3865 0.995939 0.9976
Table 5
Performance analysis for various medical and non-medical images.
Cover Image ETC technique PSNR (in dB) NC BER NPCR UACI SSIM CR
Chaotic-LZW 38.3532 0.9994 0 0.9961 0.3922 0.997860 0.9413
MRI
Hyper chaotic-LZW 38.0974 0.9933 0 0.9959 0.4004 0.997209 0.9475
Chaotic-LZW 31.1201 0.9860 0 0.9960 0.3505 0.994665 0.9408
Kidney stones
Hyper chaotic-LZW 28.9437 0.9643 0 0.9960 0.3528 0.993634 0.9470
Chaotic-LZW 33.1555 0.9873 0 0.9954 0.3867 0.996885 0.9221
Colon MRI
Hyper chaotic-LZW 32.1846 0.9695 0 0.9961 0.3882 0.995945 0.9468
Chaotic-LZW 36.1058 0.9835 0 0.9953 0.3865 0.996157 0.9085
Head CT scan
Hyper chaotic-LZW 34.2674 0.9668 0 0.9961 0.3964 0.996074 0.9466
Chaotic-LZW 29.7203 0.9991 0 0.9960 0.2957 0.988501 0.9462
Barbara
Hyper chaotic-LZW 29.2983 0.9937 0 0.9961 0.2991 0.985800 0.9473
Chaotic-LZW 32.3953 0.9982 0 0.9961 0.3059 0.995167 0.9455
Camera man
Hyper chaotic-LZW 31.4553 0.9939 0 0.9959 0.3112 0.994635 0.9458
Chaotic-LZW 44.1232 0.9997 0 0.9948 0.2353 0.993538 0.9249
Cell
Hyper chaotic-LZW 44.1944 0.9942 0 0.9959 0.2556 0.991374 0.9463
Chaotic-LZW 36.3285 0.9999 0 0.9957 0.2738 0.995821 0.9457
Rice
Hyper chaotic-LZW 36.3419 0.9716 0 0.9962 0.2826 0.994264 0.9467
Step 11: Compress Encimg using Huffman compression or LZW com- The highest PSNR values as 44.1944 dB is observed for Cell image using
pression or hybrid of both compressing techniques. Hyperchaotic-LZW technique. BER is 0 for all images with every ETC
technique. Best value of CR, NC, NPCR, UACI and SSIM are 0.9085,
𝐶𝑜𝑚𝑝𝑟𝑒𝑠𝑠𝑒𝑑_𝑑𝑎𝑡𝑎 = 𝑐𝑜𝑚𝑝𝑟𝑒𝑠𝑠𝑖𝑜𝑛(𝐸𝑛𝑐𝑖𝑚𝑔 ) (25)
0.9999, 0.9961, 0.3865 and 0.996153 respectively.
Further, we have tested our method on hundred dissimilar medical
5. Result and analysis
cover images [46]. Table 6 shows the average value of performance
parameters obtained during the validation. Using chaotic-LZW tech-
We conducted experiments on hundred different medical cover
nique, higher value of average PSNR and SSIM is obtained. However,
images (size: 512 × 512) [46], watermark data: image of size 256 × 256
average values for NPCR, UACI and NC are better for Hyperchaotic-
and text of size up to 12 characters, using MATLAB R2017a. Addition-
LZW technique. BER is 0 for both the cases. The subjective measure is
ally, ‘‘Ashima NIT01’’ is taken as text watermark. Fig. 7 presents the
formulated by combining the opinions of significant amount of people
some samples of our images and text data. The objective and subjective
method [3] are used to determine the performance of our approach. and is tabulated in Table 7. With small value gain factor (𝛼 = 0.001),
The detail description of all considered standard metric (objective supreme quality of watermarked image is obtained. As gain factor in-
measures) is provided in Table 3. creases, the quality of watermarked image degraded, making it difficult
The proposed method is simulated on different values of gain factor for diagnosis.
(𝛼) as 0.05 and 0.10. The results are shown in Table 4. In this Table, two Three different size of text watermark along with cover image
different encoding techniques (chaotic and hyper chaotic encoding) are shown in Fig. 7 are considered to evaluate the standard metrics, as
used with three compression techniques including Huffman, LZW and depicted in Table 8. It can be noticed the highest PSNR value is 36.1058
a hybrid of Huffman and LZW techniques. Without any noise attack, dB with BER = 0. Further, value of NC and SSIM are also very close to
highest PSNR = 36.1007 dB is obtained using chaotic encryption with 1. Hence, we have robustly recovered all hidden data from the cover.
𝛼 = 0.05 with highest NC = 0.9911 at 𝛼 = 0.10 and BER=0. It is observed Tables 9 and 10 present the robustness analysis of the proposed work
that on increasing the value of gain factor the robustness increases using Chaotic-LZW and Hyperchaotic-LZW, respectively. It is observed
but the image quality decreases. NPCR and UACI are approximately that the technique is robust against salt and pepper noise, Gaussian
reaching the acceptable values for all gain factors. Table 5 provides noise, JPEG compression, speckle noise, median filter and histogram
the performance for eight dissimilar cover images at gain value = 0.05. attacks. Value of BER is obtained as ‘0’ expect for rotation and cropping
78
A. Anand and A.K. Singh Computer Communications 152 (2020) 72–80
Table 6 Table 9
Average values of the performance parameters when tested on hundred medical Performance of NC and BER value for different attacks using chaotic-LZW technique.
images. Noise density Attack NC (image) BER (text)
Performance Parameter Average value for each measure
0.0001 0.9879 0
Chaotic_ LZW Hyper-Chaotic_ LZW 0.0005 Salt and pepper noise 0.9693 0
0.001 0.9251 0
PSNR (dB) 34.0455 32.6229
NPCR 0.9953 0.9961 0.0001 0.9803 0
Gaussian noise
UACI 0.3859 0.3914 0.0005 0.8761 0
SSIM 0.9955 0.9950
1˚ Rotation 0.8817 46.4286
BER 0 0
NC 0.9724 0.9873 QF = 10 0.7924 0
QF = 50 JPEG Compression 0.9388 0
QF = 90 0.9796 0
0.001 0.9687 0
Speckle noise
0.005 0.7564 0
Table 7
[20 20 400 480] Cropping 0.3586 45.2381
Evaluation of imperceptibility of proposed technique through subjective measure.
Gain Factor Visual quality of watermarked image [1 1] Median filter 0.9860 0
Table 8
Performance analysis for various length of text watermark.
Text watermark ETC technique PSNR (in dB) NC BER SSIM CR
Chaotic-LZW 36.1058 0.9835 0 0.996157 0.9085
‘‘Ashima NIT01’’
Hyper chaotic-LZW 34.2674 0.9668 0 0.996074 0.9466
Chaotic-LZW 36.0640 0.9820 0 0.996119 0.9084
‘‘BRTPA0411023’’
Hyper chaotic-LZW 34.2674 0.9672 0 0.996052 0.9466
Chaotic-LZW 36.0082 0.9833 0 0.996069 0.9084
‘‘NIT Patna’’
Hyper chaotic-LZW 34.2674 0.9692 0 0.995996 0.9466
79
A. Anand and A.K. Singh Computer Communications 152 (2020) 72–80
Table 11
Performance of proposed scheme against technique [4] method.
Attacks NC [4] NC (Proposed technique with NC (Proposed technique with
chaotic-LZW technique) Hyper chaotic-LZW technique)
Value Percentage Value Percentage
improvement improvement
JPEG compression (QF-60) 0.9325 0.9904 6.20 0.9839 5.51
Gaussian noise with mean = 0, Var = 0.05 0.3150 0.3226 2.41 0.3215 2.06
Salt and pepper noise (Density = 0.001) 0.7553 0.7751 2.62 0.9687 28.25
Scaling factor 2 0.7075 0.7075 0 0.7157 1.16
Histogram-Equalization 0.5880 0.7223 22.82 0.8716 48.23
Median filtering [2,2] 0.9116 0.9457 3.74 0.9438 3.53
Gaussian LPF with standard deviation = 0.6 0.8780 0.7265 0.8045
Sharpening mask with threshold = 0.1 0.6073 0.6763 11.36 0.6506 7.12
Cropping attack 0.7451 0.9337 25.31 0.9279 24.53
References [23] D.S. Chauhan, A.K. Singh, B. Kumar, J.P. Saini, Quantization based multiple
medical information watermarking for secure e-health, Multimedia Tools Appl.
[1] B. Hassan, R. Ahmed, B. Li, O. Hassan, An imperceptible medical image 78 (4) (2019) 3911–3923.
[24] A. Soualmi, A. Alti, L. Laouamer, A blind image watermarking method for
watermarking framework for automated diagnosis of retinal pathologies in an
personal medical data security, in: International Conference on Networking and
eHealth arrangement, IEEE Access 7 (2019) 69758–69775.
Advanced Systems (ICNAS), 2019.
[2] A.B. Houshyari, M. Bahadorani, M. Tootoonchi, J.J. Gardiner, R.A. Pena, P.
[25] E. Mansoori, S. Soltani, A new semi-blind watermarking algorithm using ordered
Adibi, Information and communication technology in medical education: an
hadamard transform, J. Imaging Sci. 64 (4) (2016) 204–214.
experience from a developing country, J. Pak. Med. Assoc. 62 (3) (2012).
[26] S.M. Mousavi, A. Naghsh, A.A. Manaf, S.A.R. Abu-Bakar, A robust medical image
[3] A.K. Singh, B. Kumar, G. Singh, A. Mohan, Medical Image Watermarking: Tech- watermarking against salt and pepper noise for brain MRI images, Multimedia
niques and Applications, in: Book Series on Multimedia Systems and Applications, Tools Appl. 76 (2017) 10313–10342.
Springer, USA, 2017. [27] A. Ustubioglu, G. Ulutas, A new medical image watermarking technique with
[4] A.K. Singh, B. Kumar, M. Dave, A. Mohan, Robust and imperceptible dual finer tamper localization, J. Digit Imaging 30 (2017) 665–680.
watermarking for telemedicine applications, Wirel. Pers. Commun. 80 (4) (2014) [28] N. Falgun Thakkar, V. Kumar Srivastava, A blind medical image watermarking:
1415–1433. DWT-SVD based robust and secure approach for telemedicine applications,
[5] https://www.experian.com/blogs/ask-experian/identity-theft-statistics/. Multimedia Tools Appl. 76 (2017) 3669–3697.
[6] C. Kumar, A.K. Singh, P. Kumar, A recent survey on image watermarking [29] A. Singh, M. Dave, A. Mohan, Hybrid technique for robust and imperceptible
techniques and its application in e-governance, Multimedia Tools Appl. 77 (2017) multiple watermarking using medical images, Multimedia Tools Appl. 75 (14)
3597–3622. (2015) 8381–8401.
[7] M.T. Ahvanooey, Q. Li, H.J. Shim, Y. Huang, A comparative analysis of infor- [30] H.V. Singh, A. Rai, Medical image watermarking in transform domain, Adv.
mation hiding techniques for copyright protection of text documents, Hindawi Intell. Syst. Comput. 48 (2018) 5–493.
Secur. Commun. Netw. 2018 (2018) 1–22. [31] Ali Al-Haj, Combined DWT-DCT digital image watermarking, J. Comput. Sci. 3
[8] S. Thakur, A.K. Singh, S.P. Ghrera, M. Dave, Watermarking techniques and its (9) (2007) 740–746.
applications in tele-health: A technical survey, in: Cryptographic and Information [32] D. Ravichandran, R. Nimmatoori, M.G. Ahamad, Mathematical representations
Security Approaches for Images and Videos by S. Ramakrishnan Chapter -17, of 1D, 2D and 3D wavelet transform, Image Coding 5 (3) (2016) 2319–2526.
[33] A.K. Singh, M. Dave, A. Mohan, Hybrid technique for robust and imperceptible
2018, pp. 467–511.
image watermarking in DWT- DCT-SVD domain, Nat. Acad. Sci. Lett. 37 (4)
[9] K. Sahu, P. Malviya, A survey on robust image watermarking techniques and
(2014) 351–358.
different applications, Int. J. Sci. Res. Eng. Trends 4 (4) (2018) 656–659.
[34] N. Singh, S. Joshi, S. Birla, Color image watermarking with watermark authen-
[10] J. Liu, J. Li, J. Ma, N. Sadiq, Y. Ai, FDCT and perceptual hash-based wa-
tication against false positive detection using SVD, in: International Conference
termarking algorithm for medical images, Smart Innov. Syst. Technol. (2019)
on Sustainable Computing in Science, Technology and Management (SUSCOM),
157–168.
2019.
[11] T.K. Araghi, A.A. Manaf, An enhanced hybrid image watermarking scheme for [35] K.A. Navas, M.C. Ajay, M. Lekshmi, Tampy S. Archana, M. Sasikumar, DWT-DCT-
security of medical and non-medical images based on DWT and 2-D SVD, Future SVD based watermarking, in: 3rd International Conference on Communication
Gener. Comput. Syst. 101 (2019) 1223–1246. Systems Software and Middleware and Workshops (COMSWARE ’08), 2008.
[12] Q. Dai, J. Li, U.A. Bhatti, Y.-W. Chen, J. Liu, SWT-DCT-based robust [36] C.-C. Chang, K.-N. Chen, C.-F. Lee, L.-J. Liu, A secure fragile watermarking
watermarking for medical image, Smart Innov. Syst. Technol. (2019) 93–103. scheme based on chaos-and-hamming code, J. Syst. Softw. 84 (9) (2011)
[13] P. Aparna, P.V.V. Kishore, Bio -metric based efficient medical image wa- 1462–1470.
termarking in ehealthcare application, IET Image Process. 13 (3) (2018) [37] I. Lee, M. Sullivan, E. Krimer, D.W. Kim, M. Basoglu, D.H. Yoon, L. Kaplan, M.
421–428. Erez, Survey of error and fault detection mechanisms, Technical Report, LPH
[14] M. Kumar, A. Vaish, An efficient encryption-then-compression technique for Group, Department of Electrical and Computer Engineering, The University of
encrypted images using SVD, Digit. Signal Process. 60 (2017) 81–89. Texas at Austin, 2012.
[15] T. Chuman, W. Sirichotedumrong, H. Kiya, Encryption-then-compression systems [38] P. Aparna, P.V.V. Kishore, Biometric-based efficient medical image watermarking
using grayscale-based image encryption for JPEG images, IEEE Trans. Inf. in E-healthcare application, IET Image Process. 13 (3) (2019) 421–428.
Forensics Secur. 14 (8) (2018) 1–11. [39] J. Sun, J. Lang, C. Miao, N. Yang, S.S. Wang, A digital watermarking algorithm
[16] I.J. Cox, G. Doërr, T. Furon, Watermarking is not cryptography, in: Y.Q. Shi, B. based on hyperchaos and discrete fractional fourier transform, in: 2012 5th
Jeon (Eds.), Digital Watermarking. IWDW 2006, in: Lecture Notes in Computer International Congress on Image and Signal Processing, 2012.
Science, vol. 4283, 2006, pp. 1–15. [40] S. Zhang, T. Gao, L.L. Gao, A novel encryption frame for medical image with
[17] P. Khare, A.K. Verma, V.K. Srivastava, Digital image watermarking scheme in watermark based on hyperchaotic system, Math. Probl. Eng. 2014 (2014) 1–11.
[41] C.-C. Chen, C.-C. Chang, High-capacity reversible data-hiding for LZW codes, in:
wavelet domain using chaotic encryption, in: Students Conference on Engineering
Second International Conference on Computer Modeling and Simulation, 2010,
and Systems, 2014.
pp. 3–8.
[18] A. Boonyapalanant, M. Ketcham, M. Piyaneeranart, Hiding patient injury in-
[42] G. Badshah, S.-C. Liew, J.M. Zain, M. Ali, Watermark compression in med-
formation in medical images with QR code, Adv. Intell. Syst. Comput. (2019)
ical image watermarking using Lempel–Ziv-Welch (LZW) lossless compression
258–267.
technique, J. Digit. Imaging 29 (2) (2015) 216–225.
[19] R. Mothi, M. Karthikeyan, Protection of bio medical iris image using [43] M. Stabno, R. Wrembel, RLH: Bitmap compression technique based on run-length
watermarking and cryptography with WPT, Measurement 136 (3) (2019) 67–73. and Huffman encoding, Inf. Syst. 34 (4–5) (2009) 400–414.
[20] P. Murali, V. Sankaradass, An efficient ROI based copyright protection scheme [44] Y. Wu, J.P. Noonan, S. Agaian, NPCR and UACI randomness tests for image
for digital images with SVD and orthogonal polynomials transformation, Optik encryption, Cyber J.: Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun.
170 (10) (2018) 242–264. (JSAT) (2011) 31–38.
[21] L. Bao, Y. Zhou, Image encryption: generating visually meaningful encrypted [45] S.R. Kodituwakku, U.S. Amarasinghe, Comparison of lossless data compression
images, Inform. Sci. 324 (2015) 197–207. algorithms for text data, Indian J. Comput. Sci. Eng. 1 (4) (2010) 416–426.
[22] Sonika C. Rathi, Vandana S. Inamdar, Medical images authentication through [46] https://medpix.nlm.nih.gov/home.
watermarking preserving ROI, Health Inform. - Int. J. (HIIJ) 1 (1) (2012) 27–42.
80