Skip to main content
Log in

Medical image watermarking for ownership & tamper detection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Image watermarking can provide ownership identification as well as tamper protection. Transform domain based image watermarking has been proven to be more robust than the spatial domain watermarking against different signal processing attacks. On the other hand, tamper detection is found to be working well in spatial domain. In the proposed work, the focus is on the improvement of the medical image watermarking by incorporating the concept of multiple watermarking of the host image. The principal components (PC) based insertion make the scheme secured towards ownership attack. On the other hand, LZW (Lempel–Ziv–Welch) based fragile watermarking is used to hide compressed image’s ROI (region of interest) to tackle the intentional tampering attacks. The ROI based watermark generation provides the complete reversibility of the ROI. In this way, proposed scheme provides perfect reversibility of ROI, good imperceptibility in addition to satisfactory robustness. The tamper handing ability of proposed scheme is also tested against various attacks, which turns out to be quite good. The proposed scheme is found to be more useful, when compared with recently proposed schemes in term of features and usefulness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Abbreviations

LZW:

Lempel–Ziv–Welch

ROI:

Region of Interest

PC:

Principal Component

RONI:

Region of Non-Interest

DWT:

Discrete Wavelet transform

SVD:

Singular value decomposition

2D:

Two-Dimension

LSB:

Least significant bit

Hex:

Hexadecimal

SHA:

Secure Hash Algorithm

HH:

High-High

LL:

Low-Low

LH:

Low-High

HL:

High-Low

WM:

Watermarked

WM (R):

Watermarked (Robust)

WM (R&F):

Watermarked (Robust & Fragile)

PSNR :

Peak Signal to Noise Ratio

NC :

Normalized correlation

EW:

Extracted watermark

LDOPA:

Low-distortion overflow processing algorithm

U.S.:

United States

JPEG:

Joint Photographic Experts Group

QF:

Quality Factor

References

  1. Nayak NR, Mishra BK, Rath AK, Swain S (2015) Improving the efficiency of color image segmentation using an enhanced clustering methodology. International Journal of Applied Evolutionary Computation (IJAEC) 6(2):50–62

    Article  Google Scholar 

  2. Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39(1):1–46

    Article  Google Scholar 

  3. Fatema, M., Maheshkar, V., Maheshkar, S., & Agarwal, G. (2018, August). Tamper detection using fragile image watermarking based on chaotic system. In international conference on wireless intelligent and distributed environment for communication (pp. 1-11). Springer, Cham.

  4. Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik-International Journal for Light and Electron Optics 125(1):428–434

    Article  Google Scholar 

  5. Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. Journal of electronic imaging 14(4):043004–043004

    Article  Google Scholar 

  6. Rastegar, S., Namazi, F., Yaghmaie, K., & Aliabadian, A. (2011). Hybrid watermarking algorithm based on singular value decomposition and radon transform. AEU-international journal of electronics and Communications,65(7), 658-663.

  7. Ansari IA, Pant M (2018) Quality assured and optimized image watermarking using artificial bee colony. International Journal of System Assurance Engineering and Management 9(1):274–286

    Google Scholar 

  8. Badshah G, Liew SC, Zain JM, Ali M (2016) Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. J Digit Imaging 29(2):216–225

    Article  Google Scholar 

  9. Dugad, R., Ratakonda, K., & Ahuja, N. (1998). A new wavelet-based scheme for watermarking images. In image processing, 1998. ICIP 98. Proceedings. 1998 international conference on (Vol. 2, pp. 419-423). IEEE.

  10. Hsieh MS, Tseng DC, Huang YH (2001) Hiding digital watermarks using multiresolution wavelet transform. IEEE Trans Ind Electron 48(5):875–882

    Article  Google Scholar 

  11. Shao-Zhang N, Xin-Xin N, Yi-Xian Y (2004) Digital watermarking algorithm based on LU decomposition. Journal of Electronics & Information Technology 26(10):1620–1625

    Google Scholar 

  12. Jane O, ELBAŞI E (2014) A new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition. Turkish Journal of Electrical Engineering & Computer Sciences 22(5):1354–1366

    Article  Google Scholar 

  13. Zhang C, Cheng LL, Qiu Z, Cheng LM (2008) Multipurpose watermarking based on multiscale curvelet transform. IEEE Transactions on Information Forensics and Security 3(4):611–619

    Article  Google Scholar 

  14. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010 Mar) Reversible image watermarking using interpolation technique. IEEE Transactions on information forensics and security 5(1):187–193

    Article  Google Scholar 

  15. Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digital Signal Processing 38:77–94

    Article  Google Scholar 

  16. Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5(3):607–614

    Article  Google Scholar 

  17. Roček A, Slavíček K, Dostál O, Javorník M (2016) A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters. Biomedical Signal Processing and Control 29:44–52

    Article  Google Scholar 

  18. Ansari IA, Pant M, Ahn CW (2017) Artificial bee colony optimized robust-reversible image watermarking. Multimed Tools Appl 76(17):18001–18025

    Article  Google Scholar 

  19. Zhang Z, Wu L, Gao S, Sun H, Yan Y (2018) Robust reversible watermarking algorithm based on RIWT and compressed sensing. Arab J Sci Eng 43(2):979–992

    Article  Google Scholar 

  20. Ishtiaq M, Ali W, Shahzad W, Jaffar MA, Nam Y (2018) Hybrid predictor based four-phase adaptive reversible watermarking. IEEE Access 6:13213–13230

    Article  Google Scholar 

  21. Qin C, He Z, Yao H, Cao F, Gao L (2018) Visible watermark removal scheme based on reversible data hiding and image inpainting. Signal Process Image Commun 60:160–172

    Article  Google Scholar 

  22. Khor HL, Liew SC, Zain JM (2017) Region of interest-based tamper detection and lossless recovery watermarking scheme (ROI-DR) on ultrasound medical images. J Digit Imaging 30(3):328–349

    Article  Google Scholar 

  23. Feng B, Yu B, Bei Y, Duan X (2019) A reversible watermark with a new overflow solution. IEEE Access 7:28031–28043. https://doi.org/10.1109/ACCESS.2018.2875923

    Article  Google Scholar 

  24. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882

    Article  Google Scholar 

  25. Liu XL, Lin CC, Yuan SM (2016) Blind dual watermarking for color images authentication and copyright protection. IEEE Transactions on Circuits and Systems for Video Technology 28(5):1047–1055

    Article  Google Scholar 

  26. Gupta D, Choubey S (2015) Discrete wavelet transform for image processing. International Journal of Emerging Technology and Advanced Engineering 4(3):598–602

    Google Scholar 

  27. Blessie AA, Nalini J, Ramesh SC (2011) Image compression using wavelet transform based on the lifting scheme and its implementation. International Journal of Computer Science Issues (IJCSI) 8(3):449

    Google Scholar 

  28. Bute YS, Jasutkar RW (2012) Implementation of discrete wavelet transform processor for image compression. Int J Comp Sci Netw 1(3):1–5

    Google Scholar 

  29. Klema V, Laub A (1980) The singular value decomposition: its computation and some applications. IEEE Trans Autom Control 25(2):164–176

    Article  MathSciNet  Google Scholar 

  30. Andrews H, Patterson C (1976) Singular value decompositions and digital image processing. IEEE Trans Acoust Speech Signal Process 24(1):26–53

    Article  Google Scholar 

  31. Mendel, F., Pramstaller, N., Rechberger, C., & Rijmen, V. (2006). Analysis of step-reduced SHA-256. In international workshop on fast software encryption (pp. 126-143). Springer, Berlin, Heidelberg

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hanan S. Alshanbari.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alshanbari, H.S. Medical image watermarking for ownership & tamper detection. Multimed Tools Appl 80, 16549–16564 (2021). https://doi.org/10.1007/s11042-020-08814-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08814-9

Keywords

Navigation