Skip to main content
Top
Published in: Cluster Computing 2/2019

26-02-2018

An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO

Authors: K. Balasamy, S. Ramakrishnan

Published in: Cluster Computing | Special Issue 2/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper presents a novel medical image authentication system through wavelet decomposition and particle swarm optimization (PSO). First medical image is treated with wavelet transformation and another image is treated with tent map and a hash function to further protect the secret watermark. Tent map ensures the sensitivity towards changes in the initial value which, can better protect and encrypt the original watermark. The operations performed on the binary coded image are based on the encryption sequences generated from chaotic map. Particle swarm optimization (PSO) results in producing optimal balance between embedding capacity and imperceptibility by exploiting the image pixel correlation of neighboring pixels. The novelty of the proposed technique lies in its ability to create a model that can find optimal wavelet coefficients for embedding using PSO and also acts as an absolute feature for embedding the watermark. The proposed method is thus able to embed watermark with low distortion, take out the secret information and also recovers the original image. The proposed technique is valuable with respect to robustness, capacity and imperceptibility.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hu, Y.C., Chen, W.L., Lo, C.C., Wu, C.M.: A novel tamper detection scheme for BTC compressed images. Opto-Electron. Rev. 21(1), 137–146 (2013) Hu, Y.C., Chen, W.L., Lo, C.C., Wu, C.M.: A novel tamper detection scheme for BTC compressed images. Opto-Electron. Rev. 21(1), 137–146 (2013)
2.
go back to reference Hu, Y.C., Lo, C.C., Chen, W.L., Wen, C.H.: Joint image coding and image authentication based on absolute moment block truncation coding. J. Electron. Image 22(1), 1–12 (2013) Hu, Y.C., Lo, C.C., Chen, W.L., Wen, C.H.: Joint image coding and image authentication based on absolute moment block truncation coding. J. Electron. Image 22(1), 1–12 (2013)
3.
go back to reference Qin, C., Chang, C.C., Chen, K.N.: Adaptive self-recovery for tampered images based on VQ indexing and in painting. Signal Process 93, 933–946 (2013) Qin, C., Chang, C.C., Chen, K.N.: Adaptive self-recovery for tampered images based on VQ indexing and in painting. Signal Process 93, 933–946 (2013)
4.
go back to reference Zhang, X., Qian, Z., Ren, Y., Feng, G.: Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4), 1223–1232 (2011) Zhang, X., Qian, Z., Ren, Y., Feng, G.: Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4), 1223–1232 (2011)
5.
go back to reference Lo, C.C., Hu, Y.C.: A novel reversible image authentication scheme for digital images. Signal Process 98, 174–185 (2014) Lo, C.C., Hu, Y.C.: A novel reversible image authentication scheme for digital images. Signal Process 98, 174–185 (2014)
6.
go back to reference Lee, S., Yoo, C.D., Kalker, T.O.N.: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. Forensics Secur. 2, 321–330 (2007) Lee, S., Yoo, C.D., Kalker, T.O.N.: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. Forensics Secur. 2, 321–330 (2007)
7.
go back to reference Chang, C.C., Nguyen, T.S., Lin, C.C.: A reversible compression code hiding using SOC and SMVQ indices. Inf. Sci. 300, 85–99 (2015) Chang, C.C., Nguyen, T.S., Lin, C.C.: A reversible compression code hiding using SOC and SMVQ indices. Inf. Sci. 300, 85–99 (2015)
8.
go back to reference Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006) Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)
9.
go back to reference Parah, S.A., Ahad, F., Sheikh, J.A., Bhat, G.M.: Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J. Biomed. Inform., 214–230 (2017) Parah, S.A., Ahad, F., Sheikh, J.A., Bhat, G.M.: Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J. Biomed. Inform., 214–230 (2017)
10.
go back to reference Nguyen, T.-S., Chang, C.-C., Yang, X.-Q.: A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. Int. J. Electron. Commun., 1055–1061 (2016) Nguyen, T.-S., Chang, C.-C., Yang, X.-Q.: A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. Int. J. Electron. Commun., 1055–1061 (2016)
11.
go back to reference Sethuramalingam, T.K., Nagaraj, B.: A comparative approach on PID controller tuning using soft computing techniques. Int. J. Innov. Sci. Eng. Res. 1(12), 460–465 (2014) Sethuramalingam, T.K., Nagaraj, B.: A comparative approach on PID controller tuning using soft computing techniques. Int. J. Innov. Sci. Eng. Res. 1(12), 460–465 (2014)
12.
go back to reference Lin, P.Y., Lee, J.S., Chang, C.C.: Dual digital watermarking for internet media based on hybrid strategies. IEEE Trans. Circuits Syst. Video Technol. 19(8), 1169–1171 (2009) Lin, P.Y., Lee, J.S., Chang, C.C.: Dual digital watermarking for internet media based on hybrid strategies. IEEE Trans. Circuits Syst. Video Technol. 19(8), 1169–1171 (2009)
13.
go back to reference Swaminathan, A., Mao, Y.N., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur. 1(2), 215–230 (2006) Swaminathan, A., Mao, Y.N., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Secur. 1(2), 215–230 (2006)
14.
go back to reference Xuan, G., Shi, Y.Q., Yang, C., Zheng, Y., Zou, D., Chai, P.: Lossless data hiding using integer wavelet transform and threshold embedding technique. In: IEEE inter-national conference on multimedia and expo, pp. 1520–1523 (2005) Xuan, G., Shi, Y.Q., Yang, C., Zheng, Y., Zou, D., Chai, P.: Lossless data hiding using integer wavelet transform and threshold embedding technique. In: IEEE inter-national conference on multimedia and expo, pp. 1520–1523 (2005)
15.
go back to reference Chan, C.S.: An image authentication method by applying Hamming code on rearranged bits. Pattern Recognit. Lett. 32(14), 1679–1690 (2011) Chan, C.S.: An image authentication method by applying Hamming code on rearranged bits. Pattern Recognit. Lett. 32(14), 1679–1690 (2011)
16.
go back to reference Zhu, X., Ho, A.T.S., Marziliano, P.: A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process. Image Commun. 22(5), 515–528 (2007) Zhu, X., Ho, A.T.S., Marziliano, P.: A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process. Image Commun. 22(5), 515–528 (2007)
17.
go back to reference Preda, R.O.: Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1), 367–373 (2013) Preda, R.O.: Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1), 367–373 (2013)
18.
go back to reference Usman, I., Khan, A., Ali, A., Choi, T.S.: Reversible watermarking based on intelligent coefficient selection and integer wavelet transform. Int. J. Innov. Comput. Inf. Control 5, 1-ISII08-237 (2005) Usman, I., Khan, A., Ali, A., Choi, T.S.: Reversible watermarking based on intelligent coefficient selection and integer wavelet transform. Int. J. Innov. Comput. Inf. Control 5, 1-ISII08-237 (2005)
19.
go back to reference Chuang, J.C., Hu, Y.C.: An adaptive image authentication scheme for vector quantization compressed image. J. Vis. Commun. Image Represent. 22(5), 440–449 (2011) Chuang, J.C., Hu, Y.C.: An adaptive image authentication scheme for vector quantization compressed image. J. Vis. Commun. Image Represent. 22(5), 440–449 (2011)
20.
go back to reference Sachnev, V., Nam, T., Kim, H.J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm, using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19, 989–998 (2009) Sachnev, V., Nam, T., Kim, H.J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm, using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19, 989–998 (2009)
21.
go back to reference Chen, M., Chen, Z., Zeng, X., Xiong, Z.: Text fusion watermarking in medical image with semi-reversible for secure transfer and authentication. In: IEEE journal of selected topics in signal and process, vol. 4, pp. 592–604 (2010) Chen, M., Chen, Z., Zeng, X., Xiong, Z.: Text fusion watermarking in medical image with semi-reversible for secure transfer and authentication. In: IEEE journal of selected topics in signal and process, vol. 4, pp. 592–604 (2010)
22.
go back to reference Al-Otum, H.M.: Semi-fragile watermarking for gray scale image authentication and tamper detection based on an adjusted expanded-bit multi-scale quantization-based technique. J. Vis. Commun. Image Represent. 25(5), 1064–1081 (2014) Al-Otum, H.M.: Semi-fragile watermarking for gray scale image authentication and tamper detection based on an adjusted expanded-bit multi-scale quantization-based technique. J. Vis. Commun. Image Represent. 25(5), 1064–1081 (2014)
23.
go back to reference Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001) Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001)
24.
go back to reference Qi, X., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image Represent. 22(2), 187–200 (2011) Qi, X., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image Represent. 22(2), 187–200 (2011)
25.
go back to reference Zhang, W., Frank, Y.S.: Semi-fragile spatial watermarking based on local binary pattern operators. Opt. Commun. 284(16–17), 3904–3912 (2011) Zhang, W., Frank, Y.S.: Semi-fragile spatial watermarking based on local binary pattern operators. Opt. Commun. 284(16–17), 3904–3912 (2011)
26.
go back to reference Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5(1), 187–193 (2011) Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5(1), 187–193 (2011)
27.
go back to reference Minamoti, T., Ohura, R.: A blind digital image watermarking method based on the dyadic wavelet transform and interval arithmetic. Appl. Math. Comput. 236, 306–319 (2014) Minamoti, T., Ohura, R.: A blind digital image watermarking method based on the dyadic wavelet transform and interval arithmetic. Appl. Math. Comput. 236, 306–319 (2014)
28.
go back to reference Yeo, D.G., Lee, H.Y., Kim, B.M.: High capacity reversible watermarking using differential histogram shifting and predicted error compensation. J. Electron. Imaging 20(1), 013001 (2011) Yeo, D.G., Lee, H.Y., Kim, B.M.: High capacity reversible watermarking using differential histogram shifting and predicted error compensation. J. Electron. Imaging 20(1), 013001 (2011)
29.
go back to reference Kennedy, J., Eberhart, R.: Particle Swarm Optimization. In: Proceedings of the IEEE international conference on neural networks, vol. 4, pp. 1942–1948 (1995) Kennedy, J., Eberhart, R.: Particle Swarm Optimization. In: Proceedings of the IEEE international conference on neural networks, vol. 4, pp. 1942–1948 (1995)
Metadata
Title
An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO
Authors
K. Balasamy
S. Ramakrishnan
Publication date
26-02-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 2/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1991-8

Other articles of this Special Issue 2/2019

Cluster Computing 2/2019 Go to the issue

Premium Partner