Printer Friendly

Robust and Fragile Medical Image Watermarking: A Joint Venture of Coding and Chaos Theories.

1. Introduction

Digital watermarking is one of the most promising techniques for authentication, copyright protection, and ownership identification. In digital watermarking, the watermark information could be fragile, semifragile, robust, or hybrid. Fragile watermarks are very sensitive and are used for tamper detection, while the robust watermarks are used to withstand common image processing operations. The watermark having robustness against friendly attacks while fragile against malicious attacks is called semifragile, and the one having mixed properties is called a hybrid watermark [1]. Medical image watermarking is becoming more promising in terms of security, privacy, and authenticity; hence, several schemes have been investigated in this regard. Major purposes of the medical image watermarking are authenticity and integrity control. Here, the authenticity is referred to as the measure through which it is ensured that the image source is valid and the image belongs to the right patient. The integrity control is a capability to validate that image has not been tampered by any means. Since, in some cases, little modifications in the medical image may cause a wrong diagnosis [2, 3], the authors in [4] focused on integrity control and authentication of patient electronic record (PER). While in [5], the authors focused on three areas in medical image watermarking that are authentication, data hiding, and their combination. In this paper, a DICOM image was selected for experiments, after being divided into ROI and RONI parts. The major drawback of the technique was fragility of the watermark. Because the PER is an important information, it must not be preserved through the fragile methods that make it vulnerable against many attacks. In [6], the authors proposed an integrity verification and authentication of a medical image (ultrasound) by considering it from DICOM image bank. The ROI was divided by a rectangular region from the RONI area. Then, the hash value of the whole image was calculated by means of hash function SHA-256. For the sake of enhancing the security, two secret keys were used: one as the hash key and the other as the embedded watermark key. Eventually, the watermark was embedded in the LBS of the RONI area. The received image was assumed authenticated if it possessed a high degree of correlation. Akin to [6], in [7], the authors also selected the RONI as watermarking area for authentication purpose. However, the reversibility was not ensured, if the RONI was altered. In [8-10], the authors proposed a reversible watermarking scheme for medical images. The scheme is secure but exhibits a very low level of imperceptibility. The authors proposed a blind hybrid watermarking technique for medical images in [11]. The first watermark was made robust that consisted of doctor ID, patient information, and LSBs map of ROI which were embedded into the RONI after encryption. The second watermark was used for the sake of fragility (integrity control). It consisted of a binary pattern and was embedded inside the ROI. The results show that the proposed scheme does not provide a good measure of hybridization. In [12], the authors presented a fragile image watermarking technique using SVD characteristics for authentication. Akin to this, in [13], the authors presented a perceptual hash algorithm for multispectral image authentication. In [14], the authors presented a semifragile, blind image authentication using discrete curvelet transform. The scheme was promising in terms of robustness and high normalized correlation. In [15, 16], the authors proposed techniques to optimize the three conflicting parameters of image watermarking. However, the techniques are not suitable for medical images in general. In [17], the authors provide a secure transform domain watermarking scheme using error correcting codes. The scheme exhibits good protection against various attacks including checkmark and channel noise. A similar approach has been carried out in [18] where the authors utilized product codes and cubic product codes for watermark protection in spatial domain for medical images. However, there is no detail provided regarding imperceptibility and capacity. In [19], the authors proposed a spread spectrum-based medical image watermarking technique. The scheme provided high level of fragility, but the capacity and imperceptibility of the scheme were not up to the mark. In [20], the authors provided a medical image authentication technique using RNS and chaos theory. However, the scheme exhibits a very poor imperceptibility. Yu et al. [21] presented a comprehensive review of recoverable and nonrecoverable semifragile watermarking techniques on medical images in spatial and transform domain.

It is concluded that there does not exist a perfect semifragile watermarking technique that can distinguish between the friendly (image processing) and malicious attacks. Moreover, it is hard to balance between fragility and robustness [21]. Similarly, there does not exist a technique that results in a robust watermark (authentication) and a perfectly fragile host medical image that does not tolerate on a single pixel tamper (100% content integrity). Because that pixel/s may be important for some diagnostics such as tumor detection. The situation becomes even critical if the watermark information is significant in size compared to the host image and a considerable level of imperceptibility is to be achieved. To overcome these issues, in this paper, a spatial domain, secure, hybrid watermarking technique for making the watermark (patient information/organization logo) robust and the host medical image highly fragile (content integrity) using product codes, chaos theory, and RNS is proposed. The technique is unrecoverable in terms of the host image; however, the watermark is recoverable because of error correcting codes (ECC). The image is divided into the region of interest (ROI) and the region of noninterest (RONI) using the smallest rectangular area. Then, based on a chaotic key, some precalculated pixels in RONI are made zero. Then, this RONI is rearranged with residued ROI, and a hash is generated for the whole image which acts as a basis of a fragile watermark. This will give us 128 bits. On the contrary, the watermark is converted to redundant residues and then encoded using error correcting codes to achieve robustness and is concatenated with fragile watermark. Again, based on the same chaotic key, concatenated watermark is embedded in RONI pixels by replacing its 4 LSBs. On the receiver side, based on the chaotic key, both watermarks are extracted. Hence, the chaotic key provides the means of security.

The rest of the paper is divided as follows: Section 2 introduces the techniques used. Section 3 contains the proposed technique. Section 4 contains simulation results, while Section 5 concludes the paper.

2. Techniques Applied

2.1. Chaotic Systems. Chaotic systems exhibit many characteristics that differentiate them from the other systems. One characteristic is their sensitivity to the initial conditions which if slightly modified, an entirely different pattern is obtained. Hence, a chaotic system can be used as a pseudonoise (PN) generator. It means many nonperiodic and noise-like sequences can be generated. One of the simplest maps is logistic map which has a recursive relation that describes population growth over the time which is given as

[X.sub.n] + 1 = r[X.sub.n] (1 - [X.sub.n]), (1)

where r is a bifurcation parameter and 3.57 < r [less than or equal to] 4 for the system to be chaotic and [x.sub.0] belongs to (0, 1). Once the sequence of real numbers is generated, a binary sequence is produced with approximately equal number of 1's and 0's.

2.2. Hash Function. Hash is a one-way function that can produce a signature called a message digest/hash value after applying on the data. Reverse never happens that given the hash value, it computes the data as depicted in Figure 1. This, one-way property of hash algorithm can be used for authenticity of data. Secure hash algorithm (SHA-256) is also a kind of hashing function which gives 256-bit message digest.

2.3. Product Codes. Product codes are two-dimensional codes where each dimension contains block codes. Due to their unique arrangement, product codes have capability of correcting random errors as well as burst errors since any upcoming error in row-wise can be easily corrected through column-wise and vice versa. Since burst error occurring in rows will become single error for column code and vice versa so, by using these codes, the error correcting capability can be enhanced, as shown in Figure 2. More specifically, the product code can be easily understood in the following manner. In this work, a low complexity decoder of the product codes is utilized [22, 23]. Suppose we have two block codes [A.sub.1] with attributes ([n.sub.1], [k.sub.1], and [d.sub.1]) and [A.sub.2] with attributes ([n.sub.2], [k.sub.2], and [d.sub.2]), where [n.sub.i], [k.sub.i], and [d.sub.i] are code word length, message size, and minimum distance of constituent codes, respectively:

(1) Place an array of [k.sub.1] x [k.sub.2] information bits with [k.sub.2] columns and [k.sub.1] rows as shown in Figure 2

(2) Encode [k.sub.2] rows using code [A.sub.1], which will result in an array of [k.sub.2] x [n.sub.1]

(3) Now encode [n.sub.1] columns using code [A.sub.2], which will result in [n.sub.1] x [n.sub.2] product code.

2.4. Residue Number System (RNS) and Chinese Remainder Theorem (CRT). A riddle posted in a book by a Chinese scholar called Sun Tzu in the first century was the first documented manifestation of residue number system (RNS) representation as discussed by Grosswald (1996) and Jenkins (1993) [24]. In RNS, any integer X can be represented with a small set of integers called residues ([x.sub.1], [x.sub.2], ..., [x.sub.i]), where [x.sub.i] represents the ith residue. The relation can be given as

[x.sub.i] = X mod [m.sub.i], (2)

where [m.sub.i] is the ith modulus.

The RNS provides unique representation for all integers in the range between 0 and M. If the integer X is greater than M - 1, the RNS representation repeats itself. Therefore, more than one integer might have the same residue representation. The dynamic range of RNS is given as follows: [mathematical expression not reproducible]. It is important to emphasize that the moduli must be relatively prime to be able to exploit the full dynamic range M. Given a set of pair-wise relatively prime moduli and a residue representation ([x.sub.1], [x.sub.2], ..., [x.sub.k]) in that system from which residues have been made. Here, the number X can be calculated using CRT as follows:

[mathematical expression not reproducible], (3)

where [mathematical expression not reproducible] and [absolute value of [x.sub.i][L.sub.i]][m.sub.i] = 1, in which [L.sub.i] is the multiplicative inverse of [M.sub.i] with respect to [m.sub.i].

3. Proposed Watermarking Scheme

This section presents the proposed digital watermarking scheme for medical images.

3.1. Watermarking Embedding. Watermarking embedding and watermark and original image extraction schemes are given in Figures 3 and 4, respectively. Detailed steps of watermark embedding are as follows:

(1) Extract the possible ROI from the original image by bounding the smallest rectangle around the desired area, since only the ROI part of the image is to be converted to residues as explained in step 2.

(2) The value 255 is factorized to 17 and 15 (relatively prime factors) corresponding to the moduli pair ([m.sub.1], [m.sub.2]) of the RNS to be used for this image. Since the dynamic range of RNS is 0 to 254, every pixel with intensity value 255 is treated separately as explained below. Preprocessing of the pixel being converted to residue is a key to get pixels back. For every pixel of ROI, we get the residue pair ([x.sub.1], [x.sub.2]), where [x.sub.i] = X mod [m.sub.i] such that [x.sub.1] [less than or equal to] 16 and [x.sub.2] [less than or equal to] 14. Except for the case when [x.sub.1] = 16, where 5 bits are needed to represent 16, all [x.sub.i] occupied 4 bits. This makes the pair ([x.sub.1], [x.sub.2]) to be represented over 8 bits. Now to resolve the issue of having those pairs where the first residue [x.sub.1] is 16, here, we applied a trick. The pairs having first residue as 16 are mapped to corresponding unique pairs which do not otherwise occur in this RNS scheme. The mapping scheme is given in Table 1. All the pairs which were to be represented by 9 bits each are mapped to the unique pairs which can be represented by 8 bits each. Since 15 cannot occur in the normal pairs as a second residue, it acts as an indicator that these pairs are exceptional pairs. Forward process and inverse process for these exceptional pairs are as follows:

(a) Forward process at transmitter end: (16, 12) [right arrow] (12, 16) [right arrow] (12, 15)

(b) Inverse process at receiver end: (12, 15) [right arrow] (15, 12) [right arrow] (16, 12)

(3) Generate a chaotic sequence using (1) and multiply by 6 and take its ceil(.) so that the real chaotic sequence maps into integers as

S = {[X.sub.1], [X.sub.2], [X.sub.3], ...}. (4)

Similarly, pixel 255 has residue (0, 0). We need to differentiate it from pixel 0 which also has residue (0, 0). We send the pixel valued 255 as a pair (15, 15), which can again be represented by 8 bits. This unique pair will not occur in this residual scheme with moduli 17 and 1.

Now change the above sequence into sum sequence as

[mathematical expression not reproducible], (5)

where [Y.sub.i] = [[summation].sup.i.sub.n=1] [X.sub.n].

After changing into sum sequence, divide each sequence by 2 so that its range corresponds within RONI and then take its ceiling as

[mathematical expression not reproducible]. (6)

This sequence which is an outcome of chaotic key will give locations for embedding the concatenated watermark in RONI:

(4) Arrange all the pixels of RONI in the vector form using the chaotic sequence obtained in previous step and make the first 4 LSBs of those corresponding to pixel of RONI to zero.

(5) Rearrange the RONI pixels obtained in step 4 with residued ROI obtained in step 2.

(6) Compute the hash of the image obtained in step 5. This will give 128 bits one-way hash value which will be used as an authentication watermark for the image.

(7) Read the second watermark logo which should be made robust and convert it into binary [k.sub.1] x [k.sub.2] matrix.

(8) Encode the binary watermark logo using product codes which gives us a product encoded watermark.

(9) Arrange the encoded watermark in a vector and concatenate it with the hash computed in previous step and call it a concatenated watermark [W.sub.c] as

[W.sub.c] = [H, [W.sub.e]]. (7)

(10) Again, arrange the pixels of RONI in the vector form as in step 4 and embed the watermark [W.sub.c] based on the chaotic key computed in step 3 by replacing the four LSBs of RONI with every 4 bits of the watermark [W.sub.c].

(11) Rearrange the RONI pixels in their original position to obtain the watermarked image. Now the concatenated watermark [W.sub.c] exists in RONI while the ROI is residued.

3.2. Watermark and Original Image Extraction Scheme. Watermark and original image extraction steps are as follows:

(1) Separate the RONI from the ROI in the watermarked image.

(2) Arrange all the pixels of RONI in some arbitrary vector. Now by knowing the chaotic key, watermarked pixels are indicated as

[S.sub.1] = {[Y.sub.1], [Y.sub.2], [Y.sub.3], ..., [Y.sub.n]}. (8)

This sequence is an outcome of chaotic key which will give locations for extracting the concatenated watermark [W.sub.c] from RONI.

(3) Using the chaotic sequence obtained in step 2, extract the concatenated watermark [W.sub.c] from the first 4 LSBs of RONI pixels in some vector and place 4 bit values as zero at that location as [W.sub.c] = [H, [W.sub.e]].

(4) Separate the encoded watermark We from the concatenated watermark [W.sub.c] and decode it to get the actual information.

(5) Rearrange these RONI pixels with the residued ROI to form the image.

(6) Rearrange these RONI pixels with the residue converted ROI to form an image.

(7) Now compute the hash of this whole image and store it as hash_2. Also separate the hash from the concatenated watermark [W.sub.c] and store it as hash_1.

(8) Compare hash_1 with hash_2. If the hash is same, then the image is authentic, and hence it goes to next steps, otherwise the image is tampered.

(9) In scanning residued ROI, the residue pairs having second residue as 15 go through conversion process as given in the step 2 of embedding. In this way, all of the residue pairs are converted into 9 bits again. Then again apply CRT in (3) to get back original pixels of ROI from residues.

(10) Combine these ROI pixels with RONI pixels to get the original image.

4. Simulation Results

To see the effectiveness of the proposed system, the experiment was conducted in MATLAB. The test image is ultrasound image of size 194 x 259 greyscale pixels, and the watermark logo of size 30 x 30 was considered. BCH codes (127, 99, and 4) were used as row-wise as well as column-wise in the formation of product codes, respectively, for the robustness of the watermark. The proposed watermarking scheme effectively embeds both the watermarks into original image and then extracts both the watermarks from the watermarked image. The logistic map 2 given in (1) with initial conditions x(0) = 0.25 and r = 3.58 at embedding side and SHA-128 hash algorithm are used to calculate the hash of image. Figure 5(a) shows the original ultrasound image in which ROI is selected as the smallest rectangular region that bounds the ROI region, and Figure 5(b) shows the watermark logo and Figure 5(c) shows the watermarked image. Hash of the image is given with the figure captions.

4.1. Security Analysis. In this experiment, security analysis of the proposed scheme is shown firstly by using same initial conditions of the chaotic system at extracting stage and then by using slightly modifying initial conditions at extracting stage. Exact hash and original image is recovered when no attack is applied to the watermarked image. Figure 6 shows the recovered image and hash with initial conditions x(0) = 0.25 and r = 3.58 which are exactly the same as the image shown in Figure 5 and the hash given with Figure 5. Table 2 shows the recovered hash by using same initial conditions and with slightly modified initial conditions x(0) = 0.250001 and r = 3.58. In the latter case, exact hash is not recovered, which means the image is tampered. This shows the effectiveness of the proposed scheme in terms of fragility.

4.2. Robustness Analysis. This section provides analysis of the proposed scheme in terms of robustness. In this way, the watermark will be introduced to various well-known attacks, and effectiveness of the scheme is examined. To check the robustness of the image or how much the image is robust against an attack, a normalized correlation is calculated which is a correlation of original and recovered image, given by the following equation:

[mathematical expression not reproducible], (9)

where W and W' represent the original and extracted watermarks of dimension M x N each, respectively.

4.2.1. Robustness against Salt and Pepper Noise. Robustness of a watermark against salt and pepper noise having variances 0.02, 0.03, 0.05, and 0.2, respectively, are considered in this experiment, and objective measures for these variances are shown in Figure 7 with their extracted watermarks. As we can see that when noise variance was enhanced to 0.2, the watermark is still clearly detectable; this clearly demonstrates the robustness of our proposed scheme. The correlation analysis is given in Table 3. It shows that with variances 0.02, 0.03, and 0.05, there is no effect on image normalized correlation [N.sub.c] while in the case of 0.2, there is 0.0571 amount of degradation in the correlation value and still the image is very much recognizable by the naked eye.

4.2.2. Robustness against Speckle Noise. Robustness of the watermark against speckle noise having variances 0.02, 0.03, 0.05, and 0.2 is considered in this experiment, and objective measures for these variances are shown in Figure 8. The correlation analysis is given in Table 4. It shows that for all the variances of speckle noise taken (0.02, 0.03, 0.05, and 0.2), there is no effect on image normalized correlation; hence there is no significant degradation in the image. So, the scheme is highly robust against the speckle noise.

4.2.3. Robustness against Gaussian Noise. Robustness of the watermark against Gaussian noise having variances 0.03 and 0.05 is considered in this experiment. [N.sub.c] and hash for these variances are calculated and are given in Tables 5 and 8, respectively, while the recovered watermark is given in Figure 9.

4.2.4. Robustness against Median Filtering. Robustness of the watermark against median filtering with window sizes of 3 x 3 and 5 x 5 is considered.

Effects of these filters are shown in Figure 10.

The correlation analysis is given in Table 6. It shows that with the window size of 3 x 3, the effect on image correlation is 0.0739, while in case of window size 5 x 5, there is 0.0179 amount of degradation in the correlation value and hence the image is very much recognizable.

4.2.5. Robustness against Tampering. Robustness against tampering is demonstrated, as shown in Figure 11. A total of 9 bits were modified in RONI part of the watermarked image and the watermark is extracted. The watermark is still recognizable as shown in Figure 11(a). When the corrupted bits were of 18 bits, the watermark is still readable as shown in Figure 11(b), which shows the high robustness of the proposed scheme.

The correlation analysis is given in Table 7. It shows that with the tampering of 9 bits, the effect on image correlation is 0.0144, while in case of 18 bits tampering, there is 0.0917 amount of degradation in the correlation value and still the image is very much recognizable.

4.2.6. Robustness against Rotation. Robustness of the watermark against rotation attack of 2 and 8 degrees is shown in Figures 12(a) and 12(b), respectively. The experiment shows that the watermark is still recognizable after the rotation attack of 2 degrees, as shown in Figure 12(a). Similarly, when the watermarked image is again rotated with 8 degrees, the watermark is still detectable as shown in Figure 12(b) which demonstrates the high robustness of the proposed scheme against rotation. The normalized correlation is 0.9856 and 0.9752 which corresponds to a degradation of 0.0144 and 0.0248, respectively, which is given in Table 8.

The values given in Tables 3-8 show that the proposed scheme exhibits a significant level of robustness against the given attacks. This is how we made the watermark, which comprises the patient information, robust. This is accomplished by the product codes used in the proposed scheme, and this scheme exhibits good error correction capability.

4.3. Fragility Analysis. The proposed scheme offers high degree of fragility for medical image and high robustness against several attacks to safeguard the watermark. Table 8 shows the fragility analysis of the proposed scheme for all the aforementioned given attacks. In this regard, the only check is comparison of the recovered hash with the original embedded hash of the image. This is given by [a16c4d371f512de40f836428ea2541fe]. From Table 9, it is apparent that the recovered hash after any of the attacks is totally different from the original hash. It shows that the proposed scheme provides a high level of fragility to the medical images.

4.4. Imperceptibility Analysis. To show the efficiency of the proposed scheme in terms of imperceptibility, a different set of experiments are conducted. Same greyscale ultrasound image of size 194 x 259 pixels is taken as host image and the watermark logos "A," "C," "H," and "M" were considered having sizes 30 x 30, 40 x 40, 50 x 50, and 60 x 60, respectively, for different payload analysis. Figure 13(a) shows the original ultrasound image with rectangular selected ROI. Figures 13(b) and 13(c) show the watermark logo 'A,' the watermarked image. Figures 13(d)-13(f) show watermark logos "C," "H," and "M," respectively. Consequently, Figures 13(g)-13(i) contain watermarked images using logos "C," "H," and "M". Hash of the image is given with the figure caption.

As far as the perceptual quality of the watermarked images is concerned, from the naked eye test, the ROI area does not seem to be much affected, however, the RONI is changed. The peak signal to noise ratio (PSNR) values of the watermarked images (which is the measure of imperceptibility) are given with them. The worst PSNR is against the largest logo "M," which is 30.2 dB, which is acceptable practically [1]. PSNR can be given by the following equation:

[mathematical expression not reproducible], (10)

where f and f' are original and watermarked images, respectively, of dimensions M x N. Comparison of the proposed scheme with [6] in terms of capacity and imperceptibility is given in Table 10. Capacity is taken as a ratio of watermark size to image size. For the cases where capacity is lower than 10%, the scheme in [6] outperforms the proposed scheme in terms of imperceptibility, for example, a PSNR of 249.6 dB achieved at 7.2% capacity. However, for capacity values higher than 10%, proposed scheme outperforms. For example, the maximum capacity demonstrated in [6] is 14.6% with PSNR achieved as 27.4 dB while in the proposed scheme, 42.4 dB PSNR is achieved with 14% capacity. Moreover, for the capacity 42.9%, the proposed scheme exhibits a PSNR of 30.2 dB while in [6], PSNR value of 31.7 dB is achieved for capacity value 13.6%. Hence, for higher capacities, the proposed scheme performs way better.

Figure 14 shows the comparison of the proposed scheme with the scheme given in [6] in terms of capacity and imperceptibility. The graph is plotted based on Table 10 values. Capacity ratio and PSNR (dB) vales are shown on the x and y axis, respectively. For capacity values greater than 10%, the proposed scheme outperforms the scheme in [6]. Exponential trend lines show that the proposed scheme exhibits a linear drop while the scheme in [6] exhibits an exponential drop in imperceptibility with increasing capacity ratio. At the capacity ratio above 40%, the proposed scheme exhibits a sustainable imperceptibility while the scheme in [6] shatters.

5. Conclusion

A novel digital watermarking scheme for medical images which offers robustness to the watermark information and fragility to the host medical image based on chaotic key, hash function, product codes, and RNS is proposed. In the proposed watermarking scheme, the watermark is robust against a variety of common attacks while the host image is highly fragile against tampering. Added hash function and chaotic key-based embedding ensure the security measures. Embedding locations, duly generated with the help of chaotic system, are highly sensitive to initial conditions. These initial conditions are known at the receiver side that makes possible a blind recovery. The proposed scheme is robust against a variety of attacks because of the error correcting codes utilized. A wide spectrum of simulation results shows the effectiveness of the proposed scheme in terms of robustness, fragility, security, capacity, and imperceptibility. In future, the proposed scheme may be extended for colored (3D) medical images, and to withstand more attacks, host image robustness will make the scheme even interesting.

https://doi.org/10.1155/2018/8137436

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

References

[1] S. M. Mousvi, A. Naghsh, and S. A. R. Abu-Bakar, "Watermarking techniques used in medical images: a survey," Journal Digital Imaging, vol. 27, no. 6, pp. 714-729, 2014.

[2] V. S. Jabade and S. R. Gengaje, "Literature review of wavelet based digital image watermarking techniques," International Journal of Computer Applications, vol. 31, no. 1, pp. 28-35, 2011.

[3] W. A. W. Adnan, S. Hitarn, S. Abdul-Karim, and M. R. TamJis, "A review of image watermarking, in Research and Development," in Proceedings of Student Conference, pp. 381-384, Umea, Sweden, 2003.

[4] K. A. Navas and M. Sasikumar, "Survey of medical image watermarking algorithms," in International Conference: Sciences of Electronic Technologies of Information and Telecommunications, pp. 1-6, Hammamet, Tunisia, 2007.

[5] J. M. Zain, L. Baldwin, and M. Clarke, "Reversible watermarking for authentication of DICOM images," in Proceedings of the 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 3237-3240, San Francisco, CA, USA, September 2004.

[6] J. M. Zain and M. Clarke, "Reversible region of non-interest (RONI) watermarking for authentication of DICOM images," International Journal of Computer Science and Network Security, vol. 7, no. 9, pp. 19-28, 2007.

[7] N. A. Memon and S. A. M. Gilani, "Watermarking of chest CT scan medical images for content authentication," International Journal of Computer Mathematics, vol. 88, no. 2, pp. 265-280, 2010.

[8] A. Rahman, M. T. Naseem, I. M. Quresh, and M. Z. Muzaffar, "Reversible watermarking using Residue Number System," in Proceedings of IEEE 7th International Conference on Information Assurance and Security (IAS'11), pp. 162-166, Melacca, Malaysia, December 2011.

[9] A. Rahman, M. T. Naseem, and M. Z. Muzaffar, "reversible and robust watermarking using residue number system and product codes," Journal of Information Assurance and Security (JIAS), vol. 7, pp. 156-163, 2012.

[10] M. T. Naseem, I. M. Quresh, and A. Rahman, "Robust watermarking for medical images resistant to geometric attacks," in Proceedings of IEEE 15th International Multi-topic Conference (INMIC'12), pp. 224-228, Islamabad, Pakistan, December 2012.

[11] N. A. Memon, A. Chaudhry, M. Ahmad, and Z. A. Keerio, "Hybrid watermarking of medical images for ROI authentication and recovery," International Journal of Computer Mathematics, vol. 88, no. 10, pp. 2057-2071, 2011.

[12] H. Zhang, C. Wang, and X. Zhou, "Fragile watermarking for image authentication using the characteristics of SVD," Algorithms, vol. 10, no. 27, pp. 1-12, 2017.

[13] K. Ding, S. Chen, and F. Meng, "A novel perceptual hash algorithm for multispectral image authentication," Algorithms, vol. 11, no. 6, pp. 1-14, 2018.

[14] S. Nirmala and K. R. Cheta, "A new curvelet based blind semifragile watermarking scheme for authentication and tamper detection of digital images," in Advances in Intelligent Systems and Computing, pp. 11-20, Springer India, New Delhi, India, 2016.

[15] A. Rahman, M. T. Naseem, I. M. Quresh, and M. Z. Muzaffar, "Novel technique for capacity maximizing in digital watermarking using FRBS," Journal of Intelligent and and Fuzzy Systems, vol. 27, pp. 2497-2509, 2014.

[16] A. Rahman, M. T. Naseem, I. M. Quresh, and M. Z. Muzaffar, "Image selection criteria for embedding desired capacity using FRBS," Neural Network World, vol. 24, no. 5, pp. 521-538, 2014.

[17] D. S. Chauhan, A. K. Singh, B. Kumar, and J. P. Saini, "Quantization based multiple medical information watermarking for secure e-Health," Multimedia Tools and Applications, vol. 1, pp. 1-14, 2017.

[18] A. Rahman, M. Azam, and G. Zaman, "Performance comparison of product codes and cubic product codes using FRBS for robust watermarking," International Journal of Computer Information Systems and Industrial Management Applications (IJCISIMA), vol. 8, no. 1, pp. 57-66, 2016.

[19] A. Rahman, M. T. Naseem, I. M. Quresh, and M. Z. Muzaffar, "Spread spectrum based invertible watermarking for medical images using RNS & Chaos," International Arab Journal of Information Technology (IAJIT), vol. 13, no. 2, pp. 223-231, 2015.

[20] M. T. Naseem, I. M. Quresh, T. A. Cheema, and A. Rahman, "Hash based medical image authentication and recovery using chaos and residue number system," Journal of Basic and Applied Scientific, vol. 3, no. 6, pp. 488-495, 2013.

[21] X. Yu, C. Wang, and X. Zhou, "Review on semi-fragile watermarking algorithms for content authentication of digital images," Future Internet, vol. 9, no. 4, pp. 1-17, 2017.

[22] A. Rahman, S. A. Ghouri, H. Adeel, and A. Waheed, "Performance of modified iterative decoding algorithm for product codes," in Proceedings of IEEE International Conference on Computational Aspects of Social Networks (CASoN'11), pp. 147-151, Salamanca, Spain, October 2011.

[23] A. Rahman, M. T. Naseem, I. M. Quresh, and M. Z. Muzaffar, "Performance of modified iterative decoding algorithm for multilevel codes," in Proceedings IEEE International conference on Computational aspects of Social Networks (CaSoN'12), pp. 99-104, Sao Paulo, SP, Brazil, November 2012.

[24] O. Abdelfattah, Data conversion in Residue Number System, Department of Electrical and Computer Engineering, McGill University, Montreal, QC, Canada, 2011.

Atta Ur Rahman (iD), (1) Kiran Sultan, (2) Dhiaa Musleh, (1) Nahier Aldhafferi (iD), (3) Abdullah Alqahtani, (3) and Maqsood Mahmud (4)

(1) Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University (IAU), P.O. Box. 1982, Dammam, Saudi Arabia

(2) Department of CIT, JCC, King Abdulaziz University, Jeddah, Saudi Arabia

(3) Department of Computer Information System, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University (IAU), P.O. Box. 1982, Dammam, Saudi Arabia

(4) Department of MIS, College of Business Administration, Imam Abdulrahman Bin Faisal University (IAU), P.O. Box 1982, Dammam, Saudi Arabia

Correspondence should be addressed to Atta Ur Rahman; dr.ataurahman@gmail.com

Received 24 October 2017; Revised 23 March 2018; Accepted 16 April 2018; Published 2 July 2018

Academic Editor: Maurizio Schmid

Caption: Figure 1: Generic diagram for hashing.

Caption: Figure 2: Structure of product codes.

Caption: Figure 3: Watermark embedding.

Caption: Figure 4: Watermark extraction.

Caption: Figure 5: (a) Original ultrasound image. (b) Watermark logo. (c) Watermarked image. Hash of the image: a16c4d371f512de40f836428ea2541fe.

Caption: Figure 6: Recovered image using exact initial conditions x(0) = 0.25 and r = 3.58 at receiver side.

Caption: Figure 7: Robustness of the watermark against salt and pepper noise with variance (a) 0.02 ([N.sub.c] = 1), (b) 0.03 ([N.sub.c] = 1), (c) 0.05 ([N.sub.c] = 1), and (d) 0.2 ([N.sub.c] = 0.9249).

Caption: Figure 8: Robustness of the watermark against speckle noise with variances (a) 0.02, (b) 0.03, (c) 0.05, and (d) 0.2.

Caption: Figure 9: Robustness of the watermark against speckle noise with variances (a) 0.03 and (b) 0.05.

Caption: Figure 10: Robustness of the watermark against median filtering with window sizes (a) 3 x 3, (b) 5 x 5, and (c) 7 x 7.

Caption: Figure 11: Robustness of the watermark against tampering: (a) 9 bits and (b) 18 bits.

Caption: Figure 12: Robustness of the watermark against rotation: (a) 2 degrees and (b) 8 degrees.

Caption: Figure 13: (a) Original host ultrasound image (b, d, e, f), watermark logos (c, g, h, i), and watermarked images. (a) Original ultrasound image. (b) Watermark logo (30 x 30). (c) Watermarked image with logo "A," PSNR = 42.4 dB. (d) Watermark logo (40 x 40). (e) Watermark logo (50 x 50). (f) Watermark logo (60 x 60). (g) Watermarked image with logo "C," PSNR = 38.6 dB. (h) Watermarked image with logo "H" PSNR = 32.8 dB. (i) Watermarked image with logo "M," PSNR = 30.2 dB.

Caption: Figure 14: Comparison of the proposed scheme with [6] in terms of capacity and imperceptibility.
Table 1: Moduli mapping.

Original pair   Substituted pair

(16, 0)          (0, 15)
(16, 1)          (1, 15)
(16, 2)          (2, 15)
(16, 3)          (3, 15)
(16, 4)          (4, 15)
(16, 5)          (5, 15)
(16, 6)          (6, 15)
(16, 7)          (7, 15)
(16, 8)          (8, 15)
(16, 9)          (9, 15)
(16, 10)        (10, 15)
(16, 11)        (11, 15)
(16, 12)        (12, 15)
(16, 13)        (13, 15)
(16, 14)        (14, 15)

Table 2: Recovered hash values.

Initial conditions                   Recovered hash

x(0) = 0.25, r = 3.58       a16c4d371f512de40f836428ea2541fe
x(0) = 0.25001, r = 3.58    f838ea642a16c4d382706e5a9254c83a

Table 3: Robustness values against salt and pepper noise.

Variance   [N.sub.c] (proposed technique)

0.02                      1
0.03                      1
0.05                      1
0.2                    0.9429

Table 4: Robustness values against speckle noise.

Variance   [N.sub.c] (proposed technique)

0.02                      1
0.03                      1
0.05                      1
0.2                       1

Table 5: Robustness values against Gaussian noise.

Variance   [N.sub.c] (proposed technique)

0.03                   0.9261
0.05                   0.9204

Table 6: Robustness values against median filtering.

Window size   [N.sub.c] (proposed technique)

3 x 3                     0.9261
5 x 5                     0.9204
7 x 7                     0.9156

Table 7: Robustness values against tampering.

Tampered bits           [N.sub.c] (proposed technique)

9                                   0.9856
18                                  0.9083

Table 8: Robustness values against rotation.

Rotation (in degrees)   [N.sub.c] (proposed technique)

2                                   0.9856
8                                   0.9752

Table 9: Received hash after various attacks.

Attack type    Attack parameter             Recovered hash

Salt and         Variance 0.02     a16c4d382706e5a92f838ea64254c83a
pepper noise     Variance 0.03     82706e5a9254cf838ea642a16c4d383a
                 Variance 0.05     f86e5a9254c8338ea642a16c4d38270a
                 Variance 0.2      d382706e5a838ea642a16c492f54c83a

Speckle          Variance 0.02     834d3827f068ea642a16ce5a9254c83a
noise            Variance 0.03     f38ea642a54c8316c4d8382706e5a92a
                 Variance 0.05     8ea642a16c4d38270f836e5a9254c83a
                 Variance 0.2      f83d83382706e5a9254c8ea642a16c4a

Gaussian         Variance 0.02     ea5a9254c8642a16c4d382706f838e3a
noise            Variance 0.05     fa16c4d382706e5838ea642a9254c83a

Median         Window size 3 x 3   8ea642a16c4d382f83706e5a9254c83a
filtering      Window size 5 x 5   f8 ea642a16c4d38382706e5a9254c83a
               Window size 7 x 7   f8c454c83d382706e5a9238ea642a16a

Tampering           9 bits         f838ea69254ca16c4d382706e5a83abb
                    18 bits        f42a16c4d3829838ea6706e5a254bab01

Rotation           2 degrees       8a642a16c4d382f83706e5a9e254c83a
                   8 degrees       fc4d38382706e5a9254c838ea642a16a

Table 10: Imperceptibility versus capacity comparison.

Capacity (%)   PSNR (dB) [6]   Capacity (%)   PSNR (dB) (proposed)

7.2                249.6            7                121.6
11.4               51.5             11                67.9
12.6               42.9            12.4               60.7
13.6               31.7            13.2               56.3
14.6               27.4             14                42.4
25                  10             25.5               38.6
40                   5             39.9               32.8
43                   2             42.9               30.2
COPYRIGHT 2018 Hindawi Limited
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2018 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:Research Article
Author:Rahman, Atta Ur; Sultan, Kiran; Musleh, Dhiaa; Aldhafferi, Nahier; Alqahtani, Abdullah; Mahmud, Maqs
Publication:Journal of Healthcare Engineering
Date:Jan 1, 2018
Words:6397
Previous Article:Link Prediction Investigation of Dynamic Information Flow in Epilepsy.
Next Article:Numerical Response Surfaces of Volume of Ablation and Retropulsion Amplitude by Settings of Ho:YAG Laser Lithotripter.
Topics:

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters