Abstract
Image watermarking can provide ownership identification as well as tamper protection. Transform domain based image watermarking has been proven to be more robust than the spatial domain watermarking against different signal processing attacks. On the other hand, tamper detection is found to be working well in spatial domain. In the proposed work, the focus is on the improvement of the medical image watermarking by incorporating the concept of multiple watermarking of the host image. The principal components (PC) based insertion make the scheme secured towards ownership attack. On the other hand, LZW (Lempel–Ziv–Welch) based fragile watermarking is used to hide compressed image’s ROI (region of interest) to tackle the intentional tampering attacks. The ROI based watermark generation provides the complete reversibility of the ROI. In this way, proposed scheme provides perfect reversibility of ROI, good imperceptibility in addition to satisfactory robustness. The tamper handing ability of proposed scheme is also tested against various attacks, which turns out to be quite good. The proposed scheme is found to be more useful, when compared with recently proposed schemes in term of features and usefulness.
Similar content being viewed by others
Abbreviations
- LZW:
-
Lempel–Ziv–Welch
- ROI:
-
Region of Interest
- PC:
-
Principal Component
- RONI:
-
Region of Non-Interest
- DWT:
-
Discrete Wavelet transform
- SVD:
-
Singular value decomposition
- 2D:
-
Two-Dimension
- LSB:
-
Least significant bit
- Hex:
-
Hexadecimal
- SHA:
-
Secure Hash Algorithm
- HH:
-
High-High
- LL:
-
Low-Low
- LH:
-
Low-High
- HL:
-
High-Low
- WM:
-
Watermarked
- WM (R):
-
Watermarked (Robust)
- WM (R&F):
-
Watermarked (Robust & Fragile)
- PSNR :
-
Peak Signal to Noise Ratio
- NC :
-
Normalized correlation
- EW:
-
Extracted watermark
- LDOPA:
-
Low-distortion overflow processing algorithm
- U.S.:
-
United States
- JPEG:
-
Joint Photographic Experts Group
- QF:
-
Quality Factor
References
Nayak NR, Mishra BK, Rath AK, Swain S (2015) Improving the efficiency of color image segmentation using an enhanced clustering methodology. International Journal of Applied Evolutionary Computation (IJAEC) 6(2):50–62
Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39(1):1–46
Fatema, M., Maheshkar, V., Maheshkar, S., & Agarwal, G. (2018, August). Tamper detection using fragile image watermarking based on chaotic system. In international conference on wireless intelligent and distributed environment for communication (pp. 1-11). Springer, Cham.
Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik-International Journal for Light and Electron Optics 125(1):428–434
Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. Journal of electronic imaging 14(4):043004–043004
Rastegar, S., Namazi, F., Yaghmaie, K., & Aliabadian, A. (2011). Hybrid watermarking algorithm based on singular value decomposition and radon transform. AEU-international journal of electronics and Communications,65(7), 658-663.
Ansari IA, Pant M (2018) Quality assured and optimized image watermarking using artificial bee colony. International Journal of System Assurance Engineering and Management 9(1):274–286
Badshah G, Liew SC, Zain JM, Ali M (2016) Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. J Digit Imaging 29(2):216–225
Dugad, R., Ratakonda, K., & Ahuja, N. (1998). A new wavelet-based scheme for watermarking images. In image processing, 1998. ICIP 98. Proceedings. 1998 international conference on (Vol. 2, pp. 419-423). IEEE.
Hsieh MS, Tseng DC, Huang YH (2001) Hiding digital watermarks using multiresolution wavelet transform. IEEE Trans Ind Electron 48(5):875–882
Shao-Zhang N, Xin-Xin N, Yi-Xian Y (2004) Digital watermarking algorithm based on LU decomposition. Journal of Electronics & Information Technology 26(10):1620–1625
Jane O, ELBAŞI E (2014) A new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition. Turkish Journal of Electrical Engineering & Computer Sciences 22(5):1354–1366
Zhang C, Cheng LL, Qiu Z, Cheng LM (2008) Multipurpose watermarking based on multiscale curvelet transform. IEEE Transactions on Information Forensics and Security 3(4):611–619
Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010 Mar) Reversible image watermarking using interpolation technique. IEEE Transactions on information forensics and security 5(1):187–193
Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digital Signal Processing 38:77–94
Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5(3):607–614
Roček A, Slavíček K, Dostál O, Javorník M (2016) A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters. Biomedical Signal Processing and Control 29:44–52
Ansari IA, Pant M, Ahn CW (2017) Artificial bee colony optimized robust-reversible image watermarking. Multimed Tools Appl 76(17):18001–18025
Zhang Z, Wu L, Gao S, Sun H, Yan Y (2018) Robust reversible watermarking algorithm based on RIWT and compressed sensing. Arab J Sci Eng 43(2):979–992
Ishtiaq M, Ali W, Shahzad W, Jaffar MA, Nam Y (2018) Hybrid predictor based four-phase adaptive reversible watermarking. IEEE Access 6:13213–13230
Qin C, He Z, Yao H, Cao F, Gao L (2018) Visible watermark removal scheme based on reversible data hiding and image inpainting. Signal Process Image Commun 60:160–172
Khor HL, Liew SC, Zain JM (2017) Region of interest-based tamper detection and lossless recovery watermarking scheme (ROI-DR) on ultrasound medical images. J Digit Imaging 30(3):328–349
Feng B, Yu B, Bei Y, Duan X (2019) A reversible watermark with a new overflow solution. IEEE Access 7:28031–28043. https://doi.org/10.1109/ACCESS.2018.2875923
Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882
Liu XL, Lin CC, Yuan SM (2016) Blind dual watermarking for color images authentication and copyright protection. IEEE Transactions on Circuits and Systems for Video Technology 28(5):1047–1055
Gupta D, Choubey S (2015) Discrete wavelet transform for image processing. International Journal of Emerging Technology and Advanced Engineering 4(3):598–602
Blessie AA, Nalini J, Ramesh SC (2011) Image compression using wavelet transform based on the lifting scheme and its implementation. International Journal of Computer Science Issues (IJCSI) 8(3):449
Bute YS, Jasutkar RW (2012) Implementation of discrete wavelet transform processor for image compression. Int J Comp Sci Netw 1(3):1–5
Klema V, Laub A (1980) The singular value decomposition: its computation and some applications. IEEE Trans Autom Control 25(2):164–176
Andrews H, Patterson C (1976) Singular value decompositions and digital image processing. IEEE Trans Acoust Speech Signal Process 24(1):26–53
Mendel, F., Pramstaller, N., Rechberger, C., & Rijmen, V. (2006). Analysis of step-reduced SHA-256. In international workshop on fast software encryption (pp. 126-143). Springer, Berlin, Heidelberg
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alshanbari, H.S. Medical image watermarking for ownership & tamper detection. Multimed Tools Appl 80, 16549–16564 (2021). https://doi.org/10.1007/s11042-020-08814-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08814-9