Crypto-Watermarking Algorithm Using Weber's Law and AES: A View to Transfer Safe Medical Image

被引:6
作者
Ajili, Sondes [1 ]
Hajjaji, Mohamed Ali [1 ,2 ]
Mtibaa, Abdellatif [1 ]
机构
[1] Univ Monastir, Lab Elect & Microelect, LR99ES30, Monastir 5000, Tunisia
[2] Univ Sousse, Higher Inst Appl Sci & Technol, Sousse, Tunisia
关键词
SCHEME;
D O I
10.1155/2021/5559191
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose a novel method for medical image watermarking in the DCT domain using the AES encryption algorithm. First, we decompose the original medical image into subblocks of 8 x 8. Besides, we apply the DCT and the quantization, respectively, to each subblock. However, in the DCT domain, an adequate choice of the DCT coefficients according to the quantization table in the middle frequencies band is performed. After that, we embed the patient's data into the corresponding medical image. The insertion step is carried out just after the quantization phase. To increase the robustness, we encrypt the watermarked medical images by using the AES algorithm based on chaotic technique. Arnold's cat map is used to shuffle the pixel values, and a chaotic Henon map is utilized to generate an aleatory sequence for the AES algorithm. The shuffled watermarked image is encrypted using the modified AES algorithm. The constant of Weber is used to choose the suitable visibility factor for embedding a watermark with high robustness. To control identification, after application of attacks, we use the serial turbo code for correction of the watermark to recover the data inserted. The average peak signal-to-noise ratio (PSNR) of the medical images obtained is 61,7769 dB. Experimental results demonstrate the robustness of the proposed schema against various types of attacks.
引用
收藏
页数:22
相关论文
共 59 条
  • [1] Abdel-Nabi H., 2017, P 2017 8 INT C INF C
  • [2] Secure patient data transmission on resource constrained platform
    Afzal, Ifrah
    Parah, Shabir A.
    Hurrah, Nasir N.
    Song, O. Y.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (05) : 15001 - 15026
  • [3] Ajili S., 2014, P 2014 GLOB SUMM COM, P1
  • [4] Ajili S., 2015, P 2 INT C AUT CONTR
  • [5] Combining watermarking and encryption algorithm for medical image safe transfer: method based on DCT
    Ajili, Sondes
    Hajjaji, Mohamed Ali
    Mtibaa, Abdellatif
    [J]. INTERNATIONAL JOURNAL OF SIGNAL AND IMAGING SYSTEMS ENGINEERING, 2016, 9 (4-5) : 242 - 251
  • [6] Ajili S, 2015, I C SCI TECH AUTO CO, P69, DOI 10.1109/STA.2015.7505164
  • [7] Al-Haj A, 2017, 2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), P437, DOI 10.1109/INFOMAN.2017.7950423
  • [8] Ali Hajjaji M., 2018, P INT C CONTR DEC IN
  • [9] [Anonymous], 2012, P INT C COMM DEV INT
  • [10] An audio watermarking scheme using singular value decomposition and dither-modulation quantization
    Bhat K, Vivekananda
    Sengupta, Indranil
    Das, Abhijit
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 52 (2-3) : 369 - 383