Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 8/2022

21.10.2021 | Research Article-Computer Engineering and Computer Science

Watermarking Techniques for the Security of Medical Images and Image Sequences

verfasst von: Hani Alquhayz, Basit Raza

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 8/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Digital medical images and image sequences, such as magnetic resonance imaging, computed tomography, and ultrasound, are widely used to diagnose diseases and abnormalities. The secure storage and exchange of such images and image sequences present challenges for hospital management. The objective of this study is to provide a framework for the integrity verification and copyright protection of medical images and image sequences. We design a systematic dual-medium watermarking model that focuses on the security of these images and sequences. Watermark bits (Wbs) are embedded in the transformed and temporal domains of images and image sequences, respectively, instead of in the spatial domain. The images are transformed using integer wavelet transforms, and motion vectors (MVs) are estimated from the image sequences to transform them into the temporal domain using seven block-matching algorithms. The best-performing MVs during frame reconstruction are reconstructed using a genetic algorithm to improve imperceptibility in the watermark-embedded image sequences. To increase the embedding capacity, the Wbs are embedded in regions with minimum or no movement, contrary to the conventional method. Conventionally, Wbs are embedded in regions of image sequences with significant movements. We evaluate the proposed model on typically used MATLAB test images and video datasets available online in Luminance (Y), blue–luminance (U), red–luminance (V) format. A comparison with five state-of-the-art methods shows that the proposed model outperforms the other methods in terms of imperceptibility and embedding capacity.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shih, F.Y.; Zhong, X.; Chang, I.-C.; Satoh, S.I.: An adjustable-purpose image watermarking technique by particle swarm optimization. Multimed. Tools Appl 77(2), 1623–1642 (2018)CrossRef Shih, F.Y.; Zhong, X.; Chang, I.-C.; Satoh, S.I.: An adjustable-purpose image watermarking technique by particle swarm optimization. Multimed. Tools Appl 77(2), 1623–1642 (2018)CrossRef
2.
Zurück zum Zitat Qasim, A.F.; Meziane, F.; Aspin, R.: Digital watermarking: applicability for developing trust in medical imaging workflows state of the art review. Comput. Sci. Rev. 27, 45–60 (2018)MathSciNetCrossRef Qasim, A.F.; Meziane, F.; Aspin, R.: Digital watermarking: applicability for developing trust in medical imaging workflows state of the art review. Comput. Sci. Rev. 27, 45–60 (2018)MathSciNetCrossRef
3.
Zurück zum Zitat Begum, M.; Uddin, M.S.: Digital image watermarking techniques: a review. Information 11(2), 110 (2020)CrossRef Begum, M.; Uddin, M.S.: Digital image watermarking techniques: a review. Information 11(2), 110 (2020)CrossRef
4.
Zurück zum Zitat Pizzolante, R., Carpentieri, B., & Castiglione, A.: A secure low complexity approach for compression and transmission of 3-D medical images, IEEE. In: Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, October 2013, pp. 387–392 Pizzolante, R., Carpentieri, B., & Castiglione, A.: A secure low complexity approach for compression and transmission of 3-D medical images, IEEE. In: Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, October 2013, pp. 387–392
5.
6.
Zurück zum Zitat Muyco, S.D., and Hernandez, A.A.: Least significant bit hash algorithm for digital image watermarking authentication, ICCAI '19: Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence, April 2019, Pages 150–154 https://doi.org/10.1145/3330482.3330523 Muyco, S.D., and Hernandez, A.A.: Least significant bit hash algorithm for digital image watermarking authentication, ICCAI '19: Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence, April 2019, Pages 150–154 https://​doi.​org/​10.​1145/​3330482.​3330523
7.
Zurück zum Zitat Zeki, A.; Abubakar, A.; Chiroma, H.: An intermediate significant bit (ISB) watermarking technique using neural networks. Springerplus 5(1), 868 (2016)CrossRef Zeki, A.; Abubakar, A.; Chiroma, H.: An intermediate significant bit (ISB) watermarking technique using neural networks. Springerplus 5(1), 868 (2016)CrossRef
8.
Zurück zum Zitat Moosazadeh, M.; Ekbatanifard, G.: A new DCT-based robust image watermarking method using teaching-learning-based optimization. J. Inf. Secur. Appl. 47, 28–38 (2019) Moosazadeh, M.; Ekbatanifard, G.: A new DCT-based robust image watermarking method using teaching-learning-based optimization. J. Inf. Secur. Appl. 47, 28–38 (2019)
9.
Zurück zum Zitat Sharma, S., Sharma, H., and Sharma, J.B.: ‘An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization’, Applied Soft Computing, 2019, 84, pp. 105696 Sharma, S., Sharma, H., and Sharma, J.B.: ‘An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization’, Applied Soft Computing, 2019, 84, pp. 105696
10.
Zurück zum Zitat Thanki, R.; Borra, S.; Dwivedi, V.; Borisagar, K.: An efficient medical image watermarking scheme based on FDCuT–DCT. Eng. Sci. Technol. Int. J. 20(4), 1366–1379 (2017) Thanki, R.; Borra, S.; Dwivedi, V.; Borisagar, K.: An efficient medical image watermarking scheme based on FDCuT–DCT. Eng. Sci. Technol. Int. J. 20(4), 1366–1379 (2017)
11.
Zurück zum Zitat Ullah, R.; Alquhayz, H.A.: Intelligent watermarking scheme for image authentication and recovery. Int. J. Adv. Comput. Sci. Appl 8, 216–223 (2017) Ullah, R.; Alquhayz, H.A.: Intelligent watermarking scheme for image authentication and recovery. Int. J. Adv. Comput. Sci. Appl 8, 216–223 (2017)
12.
Zurück zum Zitat Xuan, G., Yang, C., Zhen, Y., Shi, Y.Q., and Ni, Z.: Reversible data hiding using integer wavelet transform and companding technique, International Workshop on Digital Watermarking, IWDW 2004: Digital Watermarking pp 115–124 (Springer, 2004), pp. 115–124 Xuan, G., Yang, C., Zhen, Y., Shi, Y.Q., and Ni, Z.: Reversible data hiding using integer wavelet transform and companding technique, International Workshop on Digital Watermarking, IWDW 2004: Digital Watermarking pp 115–124 (Springer, 2004), pp. 115–124
13.
Zurück zum Zitat Soleimanpour-Moghadam, M.; Talebi, S.: A novel technique for steganography method based on improved genetic algorithm optimization in spatial domain. Iranian J. Electr. Electron. Eng 9(2), 67–75 (2013) Soleimanpour-Moghadam, M.; Talebi, S.: A novel technique for steganography method based on improved genetic algorithm optimization in spatial domain. Iranian J. Electr. Electron. Eng 9(2), 67–75 (2013)
14.
Zurück zum Zitat Cedillo-Hernandez, A.; Cedillo-Hernandez, M.; Garcia-Vazquez, M.; Nakano-Miyatake, M.; Perez-Meana, H.; Ramirez-Acosta, A.: Transcoding resilient video watermarking scheme based on spatio-temporal HVS and DCT. Signal Process. 97, 40–54 (2014)CrossRef Cedillo-Hernandez, A.; Cedillo-Hernandez, M.; Garcia-Vazquez, M.; Nakano-Miyatake, M.; Perez-Meana, H.; Ramirez-Acosta, A.: Transcoding resilient video watermarking scheme based on spatio-temporal HVS and DCT. Signal Process. 97, 40–54 (2014)CrossRef
15.
Zurück zum Zitat Gaobo, Y., Xingming, S., and Xiaojing, W.: A genetic algorithm based video watermarking in the DWT domain. In: 2006 International Conference on Computational Intelligence and Security, Guangzhou, China (IEEE, 2006), pp. 1209–1212 Gaobo, Y., Xingming, S., and Xiaojing, W.: A genetic algorithm based video watermarking in the DWT domain. In: 2006 International Conference on Computational Intelligence and Security, Guangzhou, China (IEEE, 2006), pp. 1209–1212
16.
Zurück zum Zitat Himeur, Y.; Boukabou, A.: A robust and secure key-frames based video watermarking system using chaotic encryption. Multimed. Tools Appl. 77(7), 8603–8627 (2018)CrossRef Himeur, Y.; Boukabou, A.: A robust and secure key-frames based video watermarking system using chaotic encryption. Multimed. Tools Appl. 77(7), 8603–8627 (2018)CrossRef
17.
Zurück zum Zitat Barjatya, A.: Block matching algorithms for motion estimation. IEEE Trans. Evol. Comput. 8(3), 225–239 (2004)CrossRef Barjatya, A.: Block matching algorithms for motion estimation. IEEE Trans. Evol. Comput. 8(3), 225–239 (2004)CrossRef
18.
Zurück zum Zitat Li, R.; Zeng, B.; Liou, M.L.: A new three-step search algorithm for block motion estimation. IEEE Trans. Circuits Syst. Video Technol. 4(4), 438–442 (1994)CrossRef Li, R.; Zeng, B.; Liou, M.L.: A new three-step search algorithm for block motion estimation. IEEE Trans. Circuits Syst. Video Technol. 4(4), 438–442 (1994)CrossRef
19.
Zurück zum Zitat Lu, J.; Liou, M.L.: A simple and efficient search algorithm for block-matching motion estimation. IEEE Trans. Circuits Syst. Video Technol. 7(2), 429–433 (1997)CrossRef Lu, J.; Liou, M.L.: A simple and efficient search algorithm for block-matching motion estimation. IEEE Trans. Circuits Syst. Video Technol. 7(2), 429–433 (1997)CrossRef
20.
Zurück zum Zitat Po, L.-M.; Ma, W.-C.: A novel four-step search algorithm for fast block motion estimation. IEEE Trans. Circuits Syst. Video Technol. 6(3), 313–317 (1996)CrossRef Po, L.-M.; Ma, W.-C.: A novel four-step search algorithm for fast block motion estimation. IEEE Trans. Circuits Syst. Video Technol. 6(3), 313–317 (1996)CrossRef
21.
Zurück zum Zitat Zhu, S.; Ma, K.-K.: A new diamond search algorithm for fast block-matching motion estimation. IEEE Trans. Image Process. 9(2), 287–290 (2000)CrossRef Zhu, S.; Ma, K.-K.: A new diamond search algorithm for fast block-matching motion estimation. IEEE Trans. Image Process. 9(2), 287–290 (2000)CrossRef
22.
Zurück zum Zitat Nie, Y.; Ma, K.-K.: Adaptive rood pattern search for fast block-matching motion estimation. IEEE Trans. Image Process. 11(12), 1442–1449 (2002)CrossRef Nie, Y.; Ma, K.-K.: Adaptive rood pattern search for fast block-matching motion estimation. IEEE Trans. Image Process. 11(12), 1442–1449 (2002)CrossRef
23.
Zurück zum Zitat Jue, W., Min-qing, Z., and Juan-li, S.: Video steganography using motion vector components. In: 3rd International Conference on Communication Software and Networks (IEEE, 2011), pp. 500–503 Jue, W., Min-qing, Z., and Juan-li, S.: Video steganography using motion vector components. In: 3rd International Conference on Communication Software and Networks (IEEE, 2011), pp. 500–503
24.
Zurück zum Zitat Rezagholipour, K., and Eshghi, M.: Video steganography algorithm based on motion vector of moving object. In: Eighth International Conference on Information and Knowledge Technology (IKT) (IEEE, 2016), pp. 183–187 Rezagholipour, K., and Eshghi, M.: Video steganography algorithm based on motion vector of moving object. In: Eighth International Conference on Information and Knowledge Technology (IKT) (IEEE, 2016), pp. 183–187
25.
Zurück zum Zitat Abraham, J.; Paul, V.: An imperceptible spatial domain color image watermarking scheme. J. King Saud Univ.Comput. Inf. Sci. 31(1), 125–133 (2019) Abraham, J.; Paul, V.: An imperceptible spatial domain color image watermarking scheme. J. King Saud Univ.Comput. Inf. Sci. 31(1), 125–133 (2019)
26.
Zurück zum Zitat Shaik, A., and Thanikaiselvan, V.: Comparative analysis of integer wavelet transforms in reversible data hiding using threshold based histogram modification. J. King Saud Univ. Comput. Inf. Sci., 2018 Shaik, A., and Thanikaiselvan, V.: Comparative analysis of integer wavelet transforms in reversible data hiding using threshold based histogram modification. J. King Saud Univ. Comput. Inf. Sci., 2018
27.
Zurück zum Zitat Hsu, L.-Y.; Hu, H.-T.: Robust blind image watermarking using crisscross inter-block prediction in the DCT domain. J. Vis. Commun. Image Represent. 46, 33–47 (2017)CrossRef Hsu, L.-Y.; Hu, H.-T.: Robust blind image watermarking using crisscross inter-block prediction in the DCT domain. J. Vis. Commun. Image Represent. 46, 33–47 (2017)CrossRef
28.
Zurück zum Zitat Yao, Y.; Zhang, W.; Yu, N.; Zhao, X.: Defining embedding distortion for motion vector-based video steganography. Multimed. Tools Appl. 74(24), 11163–11186 (2015)CrossRef Yao, Y.; Zhang, W.; Yu, N.; Zhao, X.: Defining embedding distortion for motion vector-based video steganography. Multimed. Tools Appl. 74(24), 11163–11186 (2015)CrossRef
29.
Zurück zum Zitat Rana, S.; Kamra, R.; Sur, A.: Motion vector based video steganography using homogeneous block selection. Multimed. Tools Appl. 79(9), 5881–5896 (2020)CrossRef Rana, S.; Kamra, R.; Sur, A.: Motion vector based video steganography using homogeneous block selection. Multimed. Tools Appl. 79(9), 5881–5896 (2020)CrossRef
30.
Zurück zum Zitat Salman, S., A., Mustafa, S., S., and Gathban, S.A.: Block matching of motion estimation by using new technique quintet search algorithm. J. Eng. Appl. Sci. 15(6), 1346–1350 (2020) Salman, S., A., Mustafa, S., S., and Gathban, S.A.: Block matching of motion estimation by using new technique quintet search algorithm. J. Eng. Appl. Sci. 15(6), 1346–1350 (2020)
31.
Zurück zum Zitat Yaakob, R.; Aryanfar, A.; Halin, A.A.; Sulaiman, N.: A comparison of different block matching algorithms for motion estimation. Procedia Technol. 11, 199–205 (2013)CrossRef Yaakob, R.; Aryanfar, A.; Halin, A.A.; Sulaiman, N.: A comparison of different block matching algorithms for motion estimation. Procedia Technol. 11, 199–205 (2013)CrossRef
32.
Zurück zum Zitat Hassanat, A., Almohammadi, K., Alkafaween, E., Abunawas, E., Hammouri, A., and Prasath, V.: Choosing mutation and crossover ratios for genetic algorithms—a review with a new dynamic approach. Information, 10, (12), pp. 390 (2019) Hassanat, A., Almohammadi, K., Alkafaween, E., Abunawas, E., Hammouri, A., and Prasath, V.: Choosing mutation and crossover ratios for genetic algorithms—a review with a new dynamic approach. Information, 10, (12), pp. 390 (2019)
36.
Zurück zum Zitat Amirtharajan, R.; Rayappan, J.B.B.: An intelligent chaotic embedding approach to enhance stego-image quality. Inf. Sci. 193, 115–124 (2012)CrossRef Amirtharajan, R.; Rayappan, J.B.B.: An intelligent chaotic embedding approach to enhance stego-image quality. Inf. Sci. 193, 115–124 (2012)CrossRef
37.
Zurück zum Zitat Kumar, V.; Kumar, D.: A modified DWT-based image steganography technique. Multimed. Tools Appl. 77(11), 13279–13308 (2018)CrossRef Kumar, V.; Kumar, D.: A modified DWT-based image steganography technique. Multimed. Tools Appl. 77(11), 13279–13308 (2018)CrossRef
38.
Zurück zum Zitat Bhuiyan, S.N.; Malek, N.A.; Khalifa, O.O.; Rahman, F.A.: An improved image steganography algorithm based on PVD. Indonesian J. Electr. Eng. Comput. Sci. 10(2), 569–577 (2018)CrossRef Bhuiyan, S.N.; Malek, N.A.; Khalifa, O.O.; Rahman, F.A.: An improved image steganography algorithm based on PVD. Indonesian J. Electr. Eng. Comput. Sci. 10(2), 569–577 (2018)CrossRef
39.
Zurück zum Zitat Wu, D.-C.; Tsai, W.-H.: A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24(9–10), 1613–1626 (2003)CrossRef Wu, D.-C.; Tsai, W.-H.: A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24(9–10), 1613–1626 (2003)CrossRef
40.
Zurück zum Zitat Chang, K.-C., Chang, C.-P., Huang, P.S., and Tu, T.-M.: A novel image steganographic method using tri-way pixel-value differencing. J. Multimed. 3(2) (2008) Chang, K.-C., Chang, C.-P., Huang, P.S., and Tu, T.-M.: A novel image steganographic method using tri-way pixel-value differencing. J. Multimed. 3(2) (2008)
41.
Zurück zum Zitat Aly, H.A.: Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Trans. Inf. Forensics Secur. 6(1), 14–18 (2010)CrossRef Aly, H.A.: Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Trans. Inf. Forensics Secur. 6(1), 14–18 (2010)CrossRef
42.
Zurück zum Zitat Xu, C., Ping, X., and Zhang, T.: ‘Steganography in compressed video stream. In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August–1 September, Beijing, China’ (IEEE, 2006), pp. 269–272 Xu, C., Ping, X., and Zhang, T.: ‘Steganography in compressed video stream. In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August–1 September, Beijing, China’ (IEEE, 2006), pp. 269–272
43.
Zurück zum Zitat Cao, Y., Zhao, X., Feng, D., and Sheng, R.: ‘Video steganography with perturbed motion estimation’, In: Information Hiding—13th International Conference, IH 2011, Prague, Czech Republic, May 18–20, Revised Selected Papers (Springer, 2011), pp. 193–207 Cao, Y., Zhao, X., Feng, D., and Sheng, R.: ‘Video steganography with perturbed motion estimation’, In: Information Hiding—13th International Conference, IH 2011, Prague, Czech Republic, May 18–20, Revised Selected Papers (Springer, 2011), pp. 193–207
Metadaten
Titel
Watermarking Techniques for the Security of Medical Images and Image Sequences
verfasst von
Hani Alquhayz
Basit Raza
Publikationsdatum
21.10.2021
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 8/2022
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-021-06254-7

Weitere Artikel der Ausgabe 8/2022

Arabian Journal for Science and Engineering 8/2022 Zur Ausgabe

Research Article-Computer Engineering and Computer Science

Probability Quantization Model for Sample-to-Sample Stochastic Sampling

Research Article-Computer Engineering and Computer Science

Learning Deep Pyramid-based Representations for Pansharpening

Research Article-Computer Engineering and Computer Science

DeepComp: A Hybrid Framework for Data Compression Using Attention Coupled Autoencoder

Research Article-Computer Engineering and Computer Science

AI-Based Mobile Edge Computing for IoT: Applications, Challenges, and Future Scope

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.