Robust zero-watermarking algorithm for medical images based on Hadamard-DWT-DCT

被引:0
作者
Sheng M. [1 ]
Li J. [2 ]
Liu J. [3 ]
机构
[1] School of Information and Communication Engineering, Hainan University, Hainan, Haikou
[2] State Key Laboratory of Marine Resource Utilisation in the South China Sea, Hainan University, Hainan, Haikou
[3] Research Centre for Healthcare Data Science, Zhejiang Lab, Hangzhou
基金
中国国家自然科学基金;
关键词
Hadamard-DWT-DCT; invisibility; medical images; robustness; zero-watermarking;
D O I
10.1504/ijwmc.2022.126381
中图分类号
学科分类号
摘要
As the IT industry grows rapidly, information security is particularly important. Digital development is a double-edged sword for the medical field, which not only brings convenience to patients and doctors, but also has hidden dangers for information security. We propose a Hadamard-DWT-DCT-based zero watermark algorithm for medical images for the problem of privacy information leakage when medical images are transmitted on the internet. First, the raw medical image is chunked using the Hadamard transformation and produces a coefficient matrix, which is then transformed into a wavelet coefficient matrix, which can be efficiently compressed and stored. The wavelet coefficient matrix is then DCT-transformed to finally obtain the eigenvector. Experimental results show that the proposed algorithm is not only highly robust, and the watermark can still be effectively extracted against different degrees of geometric and conventional attack interference, but also can encrypt the patient privacy information contained in the medical image. Copyright © 2022 Inderscience Enterprises Ltd.
引用
收藏
页码:183 / 192
页数:9
相关论文
共 33 条
[1]  
Bi X.L., Zhang H.Y., Image Zero Watermarking Algorithm based on Radon Transform and DCT, (2009)
[2]  
Cedillo-Hernandez M., Cedillo-Hernandez A., Nakano-Miyatake M., Et al., Improving the management of medical imaging by using robust and secure dual watermarking, Biomedical Signal Processing and Control, 56, (2020)
[3]  
Cheng J.R., Xu R.M., Tang X.Y., Sheng V. S., Cai C.T., An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment, CMC, 55, 1, pp. 95-119, (2018)
[4]  
Cui Z., Jing X., Zhao P., Et al., A new subspace clustering strategy for AI-based data analysis in IoT system, IEEE Internet of Things Journal, pp. 1-1, (2021)
[5]  
Devi H.S., Singh K.M., Red-Cyan Anaglyph Image Watermarking Using DWT, Hadamard Transform and Singular Value Decomposition for Copyright Protection, Information Security Technical Report, (2020)
[6]  
Dong J.T., Li J.B., Duan Y.C., Guo Z., A robust zero-watermarking algorithm for encrypted medical images in the DWT-DFT encrypted domain, International Journal of Simulation: Systems, Science and Technology, 17, pp. 1-34, (2016)
[7]  
Fang Y., Liu J., Li J., Et al., A novel robust watermarking algorithm for encrypted medical image based on Bandelet-DCT, Innovation in Medicine and Healthcare, pp. 61-73, (2021)
[8]  
Han C., An image encryption algorithm based on modified logistic chaotic map, Optik International Journal for Light and Electron Optics, 181, pp. 779-785, (2019)
[9]  
Hou C.P., Liu Y., Yue G.H., Feng D.D., Ma T., Unreferenced image quality assessment in Walsh-Hadama transform domain, Journal of Hunan University, (2017)
[10]  
Jing L., Sun Z., Chen K., Wen X., Cheng X., Remote sensing image zero watermarking algorithm based on DFT, Journal of Physics: Conference Series, pp. 1-10, (2021)