Hybrid Watermarking and Encryption Techniques for Securing Medical Images

被引:0
作者
Alhussan A.A. [1 ]
Abdallah H.A. [2 ]
Alsodairi S. [2 ]
Ateya A.A. [3 ]
机构
[1] Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh
[2] Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh
[3] Department of Electronics and Communications Engineering, Zagazig University, Sharqia, Zagazig
来源
Computer Systems Science and Engineering | 2023年 / 46卷 / 01期
关键词
chaotic encryption; circular encryption; discrete cosine transform; discrete wavelet transform; singular value decomposition; Watermarking;
D O I
10.32604/csse.2023.035048
中图分类号
学科分类号
摘要
Securing medical data while transmission on the network is required because it is sensitive and life-dependent data. Many methods are used for protection, such as Steganography, Digital Signature, Cryptography, and Watermarking. This paper introduces a novel robust algorithm that combines discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) digital image-watermarking algorithms. The host image is decomposed using a two-dimensional DWT (2D-DWT) to approximate low-frequency sub-bands in the embedding process. Then the sub-band low-high (LH) is decomposed using 2D-DWT to four new sub-bands. The resulting sub-band low-high (LH1) is decomposed using 2D-DWT to four new sub-bands. Two frequency bands, high-high (HH2) and high-low (HL2), are transformed by DCT, and then the SVD is applied to the DCT coefficients. The strongest modified singular values (SVs) vary very little for most attacks, which is an important property of SVD watermarking. The two watermark images are encrypted using two layers of encryption, circular and chaotic encryption techniques, to increase security. The first encrypted watermark is embedded in the S component of the DCT components of the HL2 coefficients. The second encrypted watermark is embedded in the S component of the DCT components of the HH2 coefficients. The suggested technique has been tested against various attacks and proven to provide excellent stability and imperceptibility results. © 2023 Authors. All rights reserved.
引用
收藏
页码:403 / 416
页数:13
相关论文
共 29 条
  • [1] Asgari Taghanaki S., Abhishek K., Cohen J. P., Cohen-Adad J., Hamarneh G., Deep semantic segmentation of natural and medical images: A review, Artificial Intelligence Review, 54, 1, pp. 137-178, (2021)
  • [2] Thabit R., Review of medical image authentication techniques and their recent trends, Multimedia Tools and Applications, 80, 9, pp. 13439-13473, (2021)
  • [3] Sangeetha N., Anita X., Vijayarajan R., Medical image watermarking: A review on wavelet-based methods, Signal and Image Processing Techniques for the Development of Intelligent Healthcare Systems, pp. 203-221, (2021)
  • [4] Kadian P., Arora S. M., Arora N., Robust digital watermarking techniques for copyright protection of digital data: A survey, Wireless Personal Communications, 118, 4, pp. 3225-3249, (2021)
  • [5] Keyvanpour M. R., Khanbani N., Boreiry M., A secure method in digital video watermarking with transform domain algorithms, Multimedia Tools and Applications, 80, 13, pp. 20449-20476, (2021)
  • [6] Zhang X., Su Q., A spatial domain-based color image blind watermarking scheme integrating multilevel discrete Hartley transform, International Journal of Intelligent Systems, 36, 8, pp. 4321-4345, (2021)
  • [7] Ooi J., Khor H. L., Liew S. C., Hisham S. I., Performance comparison of spatial domain-based watermarking techniques, Proc. 2021 Int. Conf. on Software Engineering & Computer Systems and 4th Int. Conf. on Computational Science and Information Management (ICSECS-ICOCSIM), pp. 64-69, (2021)
  • [8] Stallin A., Kumar K. P., Prabha B., Hidden image watermarking based on frequency domain technique, Proc. 2022 Second Int. Conf. on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), pp. 1-6, (2022)
  • [9] Sahin A., Guler I., A survey of digital image watermarking techniques based on discrete cosine transform, International Journal of Information Security Science, 10, 3, pp. 99-110, (2021)
  • [10] Kumar S., Panna B., Jha R. K., Medical image encryption using fractional discrete cosine transform with chaotic function, Medical & Biological Engineering & Computing, 57, 11, pp. 2517-2533, (2019)