Printer Friendly

Reversible and Fragile Watermarking for Medical Images.

1. Introduction

Cryptography, watermarking, and steganography are technologies that are frequently being used to ensure the security, authentication, and privacy (hiding) of data, respectively, especially when it is transmitted over a public network [15]. In cryptography, the message is encrypted in such a way that it becomes incomprehensible. In watermarking, the message watermark (text, image) is embedded in the host data (image/file) in such a way that host remains imperceptible and can be authenticated later, whereas in steganography the message is embedded in a host without getting any attention of user other than intended. Transmission of an encrypted message may create suspense for an intruder, whereas this is not a case with a stego or watermarked message in a cover signal. Nevertheless, combination of these technologies can be used more protection [1].

Unlike the cryptography, the steganography and the watermarking benefits from the perceptual limitations of human audiovisual systems (HAVS), which fail to recognize difference between original and watermarked/stego-signals respectively [6]. Usually, in steganography the media files such as, image, audio, or video are used as host signals to hide the message. In general, using an image or video as steganography cover signal is more popular than the audio. This is because HVS is far less sensitive to noise in the signal than HAS [7, 8]. In [9], authors proposed a spread spectrum (SS) based invertible watermarking scheme for medical images. In this scheme, single chaotic map along with residue number systems was utilized to obtain the fragility and reversibility. In [10], authors proposed a reversible watermarking scheme for medical images using product codes and RNS. The technique provides good safeguard against various attacks due to the product codes as error correction codes but at the cost of a little enhanced complexity. In [11-13], authors proposed a robust watermarking scheme using product code and cubic product code respectively. These codes provide a high level of error correcting capability against a variety of attacks in the image watermarking. Compared to simple product code, cubic product codes provide more error correction capability because of 3D codes. Similarly, in [14,15], authors proposed reversible watermarking schemes for the medical images. In [16], authors presented a fragile image watermarking technique using SVD characteristics for authentication. Akin to this, in [17], authors presented a perceptual hash algorithm for multispectral image authentication. Yu et al. presented a comprehensive review of recoverable and nonrecoverable semifragile watermarking techniques on medical images in spatial and transform domain [18].

In this paper, a reversible image watermarking for medical images using RNS, CRC and double chaotic key is proposed. The scheme is highly fragile against any kind of tampering and highly sensitive to any type of change in the initial condition of chaotic system. Rest of the paper is organized as follows. Section 2 contains the detailed description of the system model being used for the sake of embedding and extracting the watermark into the host medical image in a step-by-step way. Section 3 contains the simulation results after experiment of the proposed scheme and Section 4 concludes the paper.

2. Proposed System Model

The block diagram for watermark embedding is given in Figure 1. Block diagram for extraction of watermark & original image can be seen in Figure 2. Detailed steps of embedding procedure are as follows.

2.1. Watermark Embedding

(i) Preprocessing

(ii) Generation of chaos based sequence to determine the location of pixels to be watermarked.

(iii) Watermark embedding in these pixels.

(iv) Finding residues of the rest of the pixels and appending CRC bits.

The details of these mentioned components are given subsequently.

2.1.1. Preprocessing. Considering a gray-scale image of dimension MxN where M corresponds to rows and N corresponds to column, having pixels in intensity range [0,255]. The factors of the highest value 255 can have factors 15 and 17, respectively, that are relatively prime and correspond to moduli (15,17) of the host medical image. Consequently, a pixel having intensity between 0 and 255 can be divided by the two factors to obtain the corresponding moduli. The procedure is adapted from previous work given in [20, 21].

2.1.2. Generation of Chaos

(i) Firstly, let us generate two separate binary chaotic sequences from the logistic map of (1). However, assume different initial conditions:

[A.sub.n+1] = [rA.sub.n] (1 -[A.sub.n]) (1)

where 3.57 < r [less than or equal to] 4 and [x.sub.0] belongs to (0,1).

(ii) Multiply the sequences by 8 and take its lower integer (ceil) to obtain the chaotic integers with each integer range from 1 to 8 as follows:

[A.sub.n+1] = ceil ([A.sub.n+1] x 8) (2)

For the sake of simplicity, the chaotic integers from two logistic maps are

[P.sub.1] = [A.sub.1], [A.sub.2], [A.sub.3],...

[P.sub.2] = [B.sub.1], [B.sub.2], [B.sub.3],... (3)

(iii) Add the chaotic integers and change them into sum sequences as

[Q.sub.1] = [A.sub.1], [A.sub.1]+[A.sub.2], [A.sub.1]+[A.sub.2]+[A.sub.3],...

[Q.sub.2] = [B.sub.1],[B.sub.1]+[B.sub.2], [B.sub.1]+[B.sub.2]+[B.sub.3],... (4)

For the sake of simplicity, the two sequences generated from (4) are

[Q.sub.1] = [[Q.sub.11], [Q.sub.12] + [Q.sub.13],...,[Q.sub.1p]]

[Q.sub.2] = [[Q.sub.21], [Q.sub.22] + [Q.sub.23], ...,[Q.sub.2q]] (5)

where [Q.sub.1p] [less than or equal to] M and [S.sub.2q] [less than or equal to] N, with M and N representing the image's dimensions. For the chaotically chosen pixel pairs, [([Q.sub.11],[Q.sub.21]) + ([Q.sub.11], [Q.sub.22])...([Q.sub.11],[Q.sub.2q])] the watermark to be embedded is [A.sub.1] and for the pixel pairs [([Q.sub.12],[Q.sub.21]) + ([Q.sub.12], [Q.sub.22])...([Q.sub.12],[Q.sub.2q])] the watermark to be embedded is [A.sub.2] and so on.

(iv) Now the pixels to be watermarked have positions w.r.t the Cartesian product set Q = [Q.sub.1] x [Q.sub.2].

2.1.3. Watermark Embedding. When the pixels to be watermarked are chosen using the chaotic key, the watermark embedding consists of the following steps.

(i) Choose the primitive polynomial G(Y) of degree 4 as

G(Y) = [Y.sup.4] + [Y.sup.3] + 1 (6)

(ii) Make the message polynomial M(Y) which is a pixel value in our case. Multiply M(Y) by [Y.sup.4] and divide it by G(Y) to generate the remainder P(X) as

Rem [[X.sup.4] M(Y)/G(Y)] = R(Y) (7)

where decree (P(Y)) < decree (G(Y)).

(iii) Since the watermark for each pixel pair consists of four bits each and P(Y) is also consisted of four bits so R(Y) is XORed with corresponding watermark (A) as

C(X) = P(X) [direct sum] A (8)

(iv) Append C(Y) with M(Y) as

T(Y) = [C(Y),M(Y)] (9)

where T(Y) is the original watermark pixel.

2.1.4. Finding Residue and Appending CRC Bits. As we have seen, there is a set of pixels chosen in the image by a chaotic key in which the watermark is embedded. The complementary set of pixels undergoes the process of residue with CRC given below.

As explained above, our dynamic range is 0 to 254 and [m.sub.1] = 15, m2 =17. For any pixel, the residues ([x.sub.1],[x.sub.2]) are obtained, where [x.sub.i] = X mod [m.sub.i]. Since [x.sub.1] [less than or equal to] 14 and [x.sub.2] [less than or equal to] 16, [x.sub.1] can be represented by four bits and [x.sub.2] by five bits which makes a total of nine bits. Let us treat these nine bits as Residue Polynomial Res(Y) whose highest degree can be eight.

(i) For each residue, make its polynomial Res(Y) and choose the primitive polynomial H(Y) as

H(Y) = [Y.sup.3] + [Y.sup.2] + 1 (10)

(ii) Multiply Res(X) by [X.sup.3] and divide it by H(X) to get the remainder Rem(X) as

Rem [[Y.sup.3]Res(Y)/H(Y)] = Rem (11)

(iii) Append Pem(Y) and Pes(Y) as;

P(Y) = [Y.sup.3]Pes (Y) + Pern (Y) (12)

P(Y) is at the most eleven-degree polynomial that represents 12 bits.

2.2. Watermark and Host Image Extraction. Watermark and original image extraction consists of following steps:

(i) Indicating the watermarked pixels using the chaotic key

(ii) Watermark extraction and comparing

(iii) Residues and CRC

2.2.1. Indicating Watermark Pixels. With the knowledge of the chaotic key of encoding side, the watermarked pixels can be given as

(i) [Q.sub.1] = [[Q.sub.11], [Q.sub.l2] + [Q.sub.l3],..., [Q.sub.1p]]

(ii) [Q.sub.2] = [[Q.sub.21], [Q.sub.22] + [Q.sub.23],...,[Q.sub.2q]] (23)

2.2.2. Watermark Extraction and Comparing. Extract C(Y) from T(Y) and the remaining part is M(Y) which are the original pixels.

Multiply M(Y) by [Y.sup.4] and divide it by the known primitive polynomial G(Y) used in embedding side:

Rem [[Y.sup.4]M(Y)/G(XY)] = R(Y) (14)

After that, to obtain the original watermark back, perform exclusive OR between C(Y) and R(Y).

W = C(Y) [direct sum] R(Y) (15)

If W is the same watermark that means no pixel in the message M(Y) is tampered and vice versa.

2.2.3. Residue and CRC. The set of pixels that are watermarked are chosen by the chaotic key while rest of them are residue. Each residue is divided by the known primitive polynomial H(Y) and the remainder is obtained as

= Rem [R(Y)/H(Y)]

= Rem [[Y.sup.3]Res(Y)+Rem(Y)/H(Y)] = 0

If the remainder is zero, that is an indication that none of the bits is corrupted and by utilizing (3), the original coefficients of image are recovered; otherwise, the image is tampered.

3. Simulation Results

To depict the viability of the proposed scheme, the simulations were conducted in MATLAB-8b. The parameters used in the simulation with their respective values are enlisted in Table 1.

3.1. Security Analysis. Figure 3(a) shows the original host MRI image of size 348x314 for watermarking. The chaotic maps used are the logistic map given in (1) with initial conditions x(0) = 0.25, r = 3.58 and x(0) = 0.56, r = 3.57 respectively at embedding side and chaotic watermark pattern of size 55x55 is considered for experiment. Figure 3(b) shows the chaotic watermark pattern. Figure 3(c) shows the watermarked image. Figure 3(d) shows the recovered image by using the exact initial conditions used on embedding side, that are, x(0) = 0.25 and r = 3.58 and x(0) = 0.56, r = 3.57 respectively. Figure 3(e) shows the recovered image with slightly modified initial conditions, that are, x(0) = 0.25000001, r = 3.58 and x(0) = 0.56, r = 3.57. In Figure 3(d), original image is recovered exactly because same set of initial conditions are used to retrieve the image. As we can see in Figure 3(e) that when initial conditions are slightly modified, the original MRI image neither recovered back nor conceivable, which demonstrates the high secrecy of the proposed technique. Similarly, Figure 4 shows identical results with an ultrasound medical image. Figures 4(a), 4(b), and 4(c) show the original image, recovered image with slightly modified initial conditions, and recovered image with exact initial conditions respectively.

3.2. Fragility Analysis. In this section, the watermark is passed through various attacks and its fragility against those attacks is observed. Figure 5(a) shows the recovered image after passing through additive white Gaussian noise (AWGN) attack of variance 0.02. Similarly, Figure 5(b) shows the recovered watermarked image after attacked from Salt & Pepper noise attack of variance 0.1. As it is apparent from the figures obtained that the images are not recognizable at all. Although this time exact initial conditions were applied for the sake of image reconstruction but, due to the added noise, the residues are not regenerated properly. That is why the outline boundary depicts that it was an MRI image but recovery is not possible. This shows that the scheme is highly fragile against any type of attack and subject to any type of tampering or change in the initial conditions, no matter how little that change is. The only way to obtain the exact image, the watermark, and error free delivery of the host image is to provide the exact initial conditions and untampered image at receiver side.

3.3. Imperceptibility Analysis. This is another figure of merit of the digital image watermarking. It is a measure of perceptual level of the watermarked image. That means, it must be noticed that image is watermarked. It is measured by peak signal to noise ratio (PSNR) of the image, given by the following [21]:

PSNR = 10 [log.sub.10] [255.sup.2]/MSE

where MSE = 1/MN [M-1.summation over (i=0)][N-1.summation over (j=0)][[f(x,y)-f'(x,y)].sup.2] (17)

The obtained PSNR value of the watermarked image using the proposed scheme is 72.98dB for MRI image and 69.22dB for ultrasound image which is a very good measure because PSNR level 30dB or higher is practically viable [19].

3.4. Comparison. Table 2 shows the comparison of the proposed scheme with a similar technique by [22].

4. Conclusion

This research focuses on a novel reversible watermarking scheme for medical images with blind recovery (no additional information needed) on receiver side. In the proposed scheme, the original host image is chaotically watermarked to provide maximum secrecy. The only thing we need for exact recovery is the knowledge of exact initial conditions as we have seen in the simulation results that slight modification in the initial conditions does not recover original image and the watermark which demonstrates the fragility and high security of the proposed scheme. Moreover, the proposed scheme exhibits a high level of imperceptibility which is inferred from obtained PSNR value of 72.98dB. In future, robustness characteristics can also be introduced in the scheme to make it hybrid or semifragile digital image watermarking scheme. Similarly, capacity analysis can also be performed.

Conflicts of Interest

The authors declare that they have no conflicts of interest.


[1] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, "Digital image steganography: survey and analysis of current methods," Signal Processing, vol. 90, no. 3, pp. 727-752, 2010.

[2] A. Nissar and A. H. Mir, "Classification of steganalysis techniques: A study," Digital Signal Processing, vol. 20, no. 6, pp. 1758-1770, 2010.

[3] M. T. Naseem, I. M. Qureshi, Atta-Ur-Rahman, and M. Z. Muzaffar, "Novel technique for capacity maximizing in digital watermarking using fuzzy rule base," Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, vol. 27, no. 5, pp. 2497-2509, 2014.

[4] M. T. Naseem, I. M. Qureshi, T. A. Cheema et al., "Hash based medical image authentication and recovery using chaos and residue number system," Journal of Basic and Applied Scientific Research, vol. 3, no. 6, pp. 488-495, 2013.

[5] M. Z. Muzaffar, I. M. Qureshi, and M. T. Atta-ur-Rahman Naseem, "Changing Slope Method: A Novel Technique for Digital Audio Steganography," J. Basic Appl. Sci. Res, vol. 3, no. 12, pp. 71-81, 2013.

[6] X. Huang, Y. Abe, and I. Echizen, "Capacity adaptive synchronized acoustic steganography scheme," Journal of Information Hiding and Multimedia Signal Processing, vol. 1, no. 2, pp. 7290, 2010.

[7] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Systems Journal, vol. 35, no. 3-4, pp. 313-335, 1996.

[8] E. Ercelebi and L. Batakci, "Audio watermarking scheme based on embedding strategy in low frequency components with a binary image," Digital Signal Processing, vol. 19, no. 2, pp. 265-277, 2009.

[9] M. T. Naseem, I. M. Qureshi, and M. Z. Atta-ur-Rahman, "Spread Spectrum based Invertible Watermarking for Medical Images using RNS Chaos," International Arab Journal of Information Technology, vol. 13, no. 2, pp. 223-231, 2015.

[10] Atta-ur-Rahman, M. T. Naseem, I. M. Qureshi, and M. Z. Muzaffar, "Reversible and robust watermarking using residue number system and product codes," Journal of Information Assurance and Security (JIAS), vol. 7, pp. 156-163, 2012.

[11] Atta-ur-Rahman, N. Saba, and N. Ain, "A novel robust watermarking technique using Cubic Product Codes," Journal of Information Security Research, vol. 6, no. 1, pp. 14-24, 2015.

[12] Atta-ur-rahman, I. M. Qureshi, and M. T. Naseem, "A novel technique for reliable image transmission using product codes," International Journal of Computer Applications, vol. 65, no. 4, pp. 12-17, 2013.

[13] M. T. Naseem, I. M. Qureshi, . Atta-ur-Rahman, and M. Z. Muzaffar, "Robust watermarking for medical images resistant to geometric attacks," in Proceedings of the 201215th International Multitopic Conference (INMIC), pp. 224-228, Islamabad, Punjab, Pakistan, December 2012.

[14] M. T. Naseem, I. M. Qureshi, . Atta-ur-Rahman, and M. Z. Muzaffar, "Chaos based invertible authentication of medical images," in Proceedings of the 2013 International Conference on Emerging Technologies (ICET), pp. 1-5, Islamabad, Pakistan, December 2013.

[15] M. T. Naseem, I. M. Qureshi, and M. Z. Atta-ur-Rahman, "Chaos based Secure and Reversible Watermarking," in Proceedings of the International Conference on Modeling and Simulation (ICOMS13, pp. 115-119, 2013.

[16] H. Zhang, C. Wang, and X. Zhou, "Fragile watermarking for image authentication using the characteristic of SVD," Algorithms, vol. 10, no. 27, pp. 1-12, 2017

[17] K. Ding, S. Chen, and F. Meng, "A novel perceptual hash algorithm for multispectral image authentication," Algorithms, vol. 11, no. 1, Paper No. 6,14 pages, 2018.

[18] X. Wang Yu and X. Zhou, "Review on semi-fragile watermarking algorithms for content authentication of digital images," Future Internet, vol. 9, no. 56, pp. 1-17, 2017

[19] S. M. Mousavi, A. Naghsh, andS. A. R. Abu-Bakar, "Watermarking Techniques used in Medical Images: a Survey," Journal of Digital Imaging, vol. 27, no. 6, pp. 714-729, 2014.

[20] M. T. Naseem, I. M. Qureshi, T. A. Cheema, and M. Zubair, "Invertible and Fragile Watermarking for Medical Images Using Residue Number System and Chaos," J. Basic. Appl. Sci. Res, pp. 10-10643, 2012.

[21] Atta-ur-Rahman, M. T. Naseem, I. M. Qureshi, and M. Z. Muzaffar, "Reversible watermarking using Residue Number System," in Proceedings of the 2011 7th International Conference on Information Assurance and Security (IAS), pp. 162-166, Melacca, Malaysia, December 2011.

[22] J. M. Zain and M. Clarke, "Reversible region of non-interest (RONI) watermarking for authentication of DICOM images," International Journal of Computer Science and Network Security, vol. 7, no. 9, pp. 19-28, 2007.

Atta-ur-Rahman (iD),(1) Kiran Sultan, (2) Nahier Aldhafferi (iD),(3) Abdullah Alqahtani, (3) and Maqsood Mahmud (4)

(1) Department of Computer Science (CS), College of Computer Science and Information Technology (CCSIT), Imam Abdulrahman Bin Faisal University (IAU), P O. Box 1982, Dammam, Saudi Arabia

(2) Department of CIT, JCC, King Abdulaziz University, Jeddah, Saudi Arabia

(3) Department of CIS, College of Computer Science and Information Technology (CCSIT), Imam Abdulrahman Bin Faisal University (IAU), P O. Box 1982, Dammam, Saudi Arabia

(4) Department of MIS, College of Business Administration, Imam Abdulrahman Bin Faisal University (IAU), P.O. Box 1982, Dammam, Saudi Arabia

Correspondence should be addressed to Atta-ur-Rahman;

Received 20 November 2017; Revised 23 April 2018; Accepted 11 June 2018; Published 22 July 2018

Academic Editor: Chuangyin Dang

Caption: Figure 1: Schematic for watermark embedding.

Caption: Figure 2: Schematic for watermark extraction.

Caption: Figure 3: (a) Original MRI image; (b) chaotic watermark; (c) watermarked image. (d) Recovered image with exact initial conditions. (e) Recovered image with x(0) = 0.25000001, r = 3.58, and x(0) = 0.56, r = 3.57

Caption: Figure 4: (a) Original MRI image; (b) recovered image with slightly modified initial conditions. (c) Recovered image with exact initial conditions.

Caption: Figure 5: (a) Recovered image after AWGN attack. (b) Recovered image after Salt & Pepper noise attack.
Table 1: Simulation parameters.

Sr. No.          Parameter

1         Host medical image size
2           Watermark image size

3         Chaos initial conditions

4                Image type
5               Attack type
6              Watermark type

Sr. No.                        Value

1                             348x314
2                              55x55
                            x(0) = 0.25
3                             r = 3.58
                            x(0) = 0.56,
                              r = 3.57
4                         MRI, Ultrasound
5                       AWGN, Salt & Pepper
6             Chaotically generated random sequence of
          grayscale pixels having intensity between 0-255

Table 2: Comparison summary.

Sr. No.     Comparison parameter

1              PSNR achieved
2         Security /authentication
3           Embedding method and
4             Type of attacks
5             Tamper detection
6              Robustness of
7                Host image

8                Image type

Sr. No.            Zain & Clarke [19]

1                        51.5dB
2                         Hash

3               Plain LSB embedding with
              self-generated binary string
4                Adobe photoshop cloning
5                          Yes
6                          No

7         Fragile and recoverable only ifthere
                      is no attack
8                      Ultrasound

Sr. No.            Proposed scheme

1                      72.98dB
2                   CRC and Chaos

3         Residue with chaotically selected
                   pixel embedding
4             Salt & Pepper noise, AWGN
5                        Yes
6                         No

7             Highly fragile and exactly
              recoverable without attack
8                  MRI, Ultrasound
COPYRIGHT 2018 Hindawi Limited
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2018 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:Research Article
Author:Atta-ur-Rahman; Sultan, Kiran; Aldhafferi, Nahier; Alqahtani, Abdullah; Mahmud, Maqsood
Publication:Computational and Mathematical Methods in Medicine
Date:Jan 1, 2018
Previous Article:Advanced Signal Processing for Cardiovascular and Neurological Diseases.
Next Article:Insights into the Molecular Mechanisms of Protein-Ligand Interactions by Molecular Docking and Molecular Dynamics Simulation: A Case of Oligopeptide...

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters