Skip to main content
Erschienen in: Cluster Computing 2/2019

26.02.2018

An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO

verfasst von: K. Balasamy, S. Ramakrishnan

Erschienen in: Cluster Computing | Sonderheft 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents a novel medical image authentication system through wavelet decomposition and particle swarm optimization (PSO). First medical image is treated with wavelet transformation and another image is treated with tent map and a hash function to further protect the secret watermark. Tent map ensures the sensitivity towards changes in the initial value which, can better protect and encrypt the original watermark. The operations performed on the binary coded image are based on the encryption sequences generated from chaotic map. Particle swarm optimization (PSO) results in producing optimal balance between embedding capacity and imperceptibility by exploiting the image pixel correlation of neighboring pixels. The novelty of the proposed technique lies in its ability to create a model that can find optimal wavelet coefficients for embedding using PSO and also acts as an absolute feature for embedding the watermark. The proposed method is thus able to embed watermark with low distortion, take out the secret information and also recovers the original image. The proposed technique is valuable with respect to robustness, capacity and imperceptibility.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hu, Y.C., Chen, W.L., Lo, C.C., Wu, C.M.: A novel tamper detection scheme for BTC compressed images. Opto-Electron. Rev. 21(1), 137–146 (2013) Hu, Y.C., Chen, W.L., Lo, C.C., Wu, C.M.: A novel tamper detection scheme for BTC compressed images. Opto-Electron. Rev. 21(1), 137–146 (2013)
2.
Zurück zum Zitat Hu, Y.C., Lo, C.C., Chen, W.L., Wen, C.H.: Joint image coding and image authentication based on absolute moment block truncation coding. J. Electron. Image 22(1), 1–12 (2013) Hu, Y.C., Lo, C.C., Chen, W.L., Wen, C.H.: Joint image coding and image authentication based on absolute moment block truncation coding. J. Electron. Image 22(1), 1–12 (2013)
3.
Zurück zum Zitat Qin, C., Chang, C.C., Chen, K.N.: Adaptive self-recovery for tampered images based on VQ indexing and in painting. Signal Process 93, 933–946 (2013) Qin, C., Chang, C.C., Chen, K.N.: Adaptive self-recovery for tampered images based on VQ indexing and in painting. Signal Process 93, 933–946 (2013)
4.
Zurück zum Zitat Zhang, X., Qian, Z., Ren, Y., Feng, G.: Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4), 1223–1232 (2011) Zhang, X., Qian, Z., Ren, Y., Feng, G.: Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4), 1223–1232 (2011)
5.
Zurück zum Zitat Lo, C.C., Hu, Y.C.: A novel reversible image authentication scheme for digital images. Signal Process 98, 174–185 (2014) Lo, C.C., Hu, Y.C.: A novel reversible image authentication scheme for digital images. Signal Process 98, 174–185 (2014)
6.
Zurück zum Zitat Lee, S., Yoo, C.D., Kalker, T.O.N.: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. Forensics Secur. 2, 321–330 (2007) Lee, S., Yoo, C.D., Kalker, T.O.N.: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. Forensics Secur. 2, 321–330 (2007)
7.
Zurück zum Zitat Chang, C.C., Nguyen, T.S., Lin, C.C.: A reversible compression code hiding using SOC and SMVQ indices. Inf. Sci. 300, 85–99 (2015) Chang, C.C., Nguyen, T.S., Lin, C.C.: A reversible compression code hiding using SOC and SMVQ indices. Inf. Sci. 300, 85–99 (2015)
8.
Zurück zum Zitat Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006) Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)
9.
Zurück zum Zitat Parah, S.A., Ahad, F., Sheikh, J.A., Bhat, G.M.: Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J. Biomed. Inform., 214–230 (2017) Parah, S.A., Ahad, F., Sheikh, J.A., Bhat, G.M.: Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J. Biomed. Inform., 214–230 (2017)
10.
Zurück zum Zitat Nguyen, T.-S., Chang, C.-C., Yang, X.-Q.: A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. Int. J. Electron. Commun., 1055–1061 (2016) Nguyen, T.-S., Chang, C.-C., Yang, X.-Q.: A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. Int. J. Electron. Commun., 1055–1061 (2016)
11.
Zurück zum Zitat Sethuramalingam, T.K., Nagaraj, B.: A comparative approach on PID controller tuning using soft computing techniques. Int. J. Innov. Sci. Eng. Res. 1(12), 460–465 (2014) Sethuramalingam, T.K., Nagaraj, B.: A comparative approach on PID controller tuning using soft computing techniques. Int. J. Innov. Sci. Eng. Res. 1(12), 460–465 (2014)
12.
Zurück zum Zitat Lin, P.Y., Lee, J.S., Chang, C.C.: Dual digital watermarking for internet media based on hybrid strategies. IEEE Trans. Circuits Syst. Video Technol. 19(8), 1169–1171 (2009) Lin, P.Y., Lee, J.S., Chang, C.C.: Dual digital watermarking for internet media based on hybrid strategies. IEEE Trans. Circuits Syst. Video Technol. 19(8), 1169–1171 (2009)
13.
Zurück zum Zitat Swaminathan, A., Mao, Y.N., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur. 1(2), 215–230 (2006) Swaminathan, A., Mao, Y.N., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur. 1(2), 215–230 (2006)
14.
Zurück zum Zitat Xuan, G., Shi, Y.Q., Yang, C., Zheng, Y., Zou, D., Chai, P.: Lossless data hiding using integer wavelet transform and threshold embedding technique. In: IEEE inter-national conference on multimedia and expo, pp. 1520–1523 (2005) Xuan, G., Shi, Y.Q., Yang, C., Zheng, Y., Zou, D., Chai, P.: Lossless data hiding using integer wavelet transform and threshold embedding technique. In: IEEE inter-national conference on multimedia and expo, pp. 1520–1523 (2005)
15.
Zurück zum Zitat Chan, C.S.: An image authentication method by applying Hamming code on rearranged bits. Pattern Recognit. Lett. 32(14), 1679–1690 (2011) Chan, C.S.: An image authentication method by applying Hamming code on rearranged bits. Pattern Recognit. Lett. 32(14), 1679–1690 (2011)
16.
Zurück zum Zitat Zhu, X., Ho, A.T.S., Marziliano, P.: A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process. Image Commun. 22(5), 515–528 (2007) Zhu, X., Ho, A.T.S., Marziliano, P.: A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process. Image Commun. 22(5), 515–528 (2007)
17.
Zurück zum Zitat Preda, R.O.: Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1), 367–373 (2013) Preda, R.O.: Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1), 367–373 (2013)
18.
Zurück zum Zitat Usman, I., Khan, A., Ali, A., Choi, T.S.: Reversible watermarking based on intelligent coefficient selection and integer wavelet transform. Int. J. Innov. Comput. Inf. Control 5, 1-ISII08-237 (2005) Usman, I., Khan, A., Ali, A., Choi, T.S.: Reversible watermarking based on intelligent coefficient selection and integer wavelet transform. Int. J. Innov. Comput. Inf. Control 5, 1-ISII08-237 (2005)
19.
Zurück zum Zitat Chuang, J.C., Hu, Y.C.: An adaptive image authentication scheme for vector quantization compressed image. J. Vis. Commun. Image Represent. 22(5), 440–449 (2011) Chuang, J.C., Hu, Y.C.: An adaptive image authentication scheme for vector quantization compressed image. J. Vis. Commun. Image Represent. 22(5), 440–449 (2011)
20.
Zurück zum Zitat Sachnev, V., Nam, T., Kim, H.J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm, using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19, 989–998 (2009) Sachnev, V., Nam, T., Kim, H.J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm, using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19, 989–998 (2009)
21.
Zurück zum Zitat Chen, M., Chen, Z., Zeng, X., Xiong, Z.: Text fusion watermarking in medical image with semi-reversible for secure transfer and authentication. In: IEEE journal of selected topics in signal and process, vol. 4, pp. 592–604 (2010) Chen, M., Chen, Z., Zeng, X., Xiong, Z.: Text fusion watermarking in medical image with semi-reversible for secure transfer and authentication. In: IEEE journal of selected topics in signal and process, vol. 4, pp. 592–604 (2010)
22.
Zurück zum Zitat Al-Otum, H.M.: Semi-fragile watermarking for gray scale image authentication and tamper detection based on an adjusted expanded-bit multi-scale quantization-based technique. J. Vis. Commun. Image Represent. 25(5), 1064–1081 (2014) Al-Otum, H.M.: Semi-fragile watermarking for gray scale image authentication and tamper detection based on an adjusted expanded-bit multi-scale quantization-based technique. J. Vis. Commun. Image Represent. 25(5), 1064–1081 (2014)
23.
Zurück zum Zitat Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001) Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001)
24.
Zurück zum Zitat Qi, X., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image Represent. 22(2), 187–200 (2011) Qi, X., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image Represent. 22(2), 187–200 (2011)
25.
Zurück zum Zitat Zhang, W., Frank, Y.S.: Semi-fragile spatial watermarking based on local binary pattern operators. Opt. Commun. 284(16–17), 3904–3912 (2011) Zhang, W., Frank, Y.S.: Semi-fragile spatial watermarking based on local binary pattern operators. Opt. Commun. 284(16–17), 3904–3912 (2011)
26.
Zurück zum Zitat Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5(1), 187–193 (2011) Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5(1), 187–193 (2011)
27.
Zurück zum Zitat Minamoti, T., Ohura, R.: A blind digital image watermarking method based on the dyadic wavelet transform and interval arithmetic. Appl. Math. Comput. 236, 306–319 (2014) Minamoti, T., Ohura, R.: A blind digital image watermarking method based on the dyadic wavelet transform and interval arithmetic. Appl. Math. Comput. 236, 306–319 (2014)
28.
Zurück zum Zitat Yeo, D.G., Lee, H.Y., Kim, B.M.: High capacity reversible watermarking using differential histogram shifting and predicted error compensation. J. Electron. Imaging 20(1), 013001 (2011) Yeo, D.G., Lee, H.Y., Kim, B.M.: High capacity reversible watermarking using differential histogram shifting and predicted error compensation. J. Electron. Imaging 20(1), 013001 (2011)
29.
Zurück zum Zitat Kennedy, J., Eberhart, R.: Particle Swarm Optimization. In: Proceedings of the IEEE international conference on neural networks, vol. 4, pp. 1942–1948 (1995) Kennedy, J., Eberhart, R.: Particle Swarm Optimization. In: Proceedings of the IEEE international conference on neural networks, vol. 4, pp. 1942–1948 (1995)
Metadaten
Titel
An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO
verfasst von
K. Balasamy
S. Ramakrishnan
Publikationsdatum
26.02.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 2/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1991-8

Weitere Artikel der Sonderheft 2/2019

Cluster Computing 2/2019 Zur Ausgabe