Adaptive tamper detection watermarking scheme for medical images in transform domain

被引:8
作者
Sanivarapu, Prasanth Vaidya [1 ]
机构
[1] Aditya Engn Coll, Surampalem, India
关键词
Medical images; DWT; Tamper detection; Schur decomposition; Digital watermarking; DIGITAL WATERMARKING; ROBUST;
D O I
10.1007/s11042-022-12273-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A novel robust tamper detection medical watermarking scheme is proposed in the transform domain for authentication and detecting tamper pixels of medical images. In this scheme, 2-level Discrete Wavelet Transform is applied to a significant image to produce four sub-bands (SB) (C-LL,C-LH,C-HL,C-HH). Coefficients of LL sub-bands are considered in embedding the watermark. The SB is partitioned into blocks to overcome image processing attacks. LSB is set to zero for each block and then Schur decomposition is applied in generating Authenticated Block Bits (ABB). In developing confusion to the intruders, the watermark is scrambled using Quantum Hilbert Image Scrambling. Watermarking helps in authentication and tamper detection of the significant image after tampering. The scheme is tested with image processing attacks for robustness. Peak signal to noise ratio (PSNR) and Normalized Cross-Correlation (NCC) metrics are utilized as metrics in evaluating the proposed scheme with PSNR greater than 30dB and NCC values nearer to 1 without attacks and even with attacks, NCC values are greater than 0.95, which shows the robustness of the proposed scheme.
引用
收藏
页码:11605 / 11619
页数:15
相关论文
共 36 条
[1]  
[Anonymous], 2013, IOSR J COMPUTER ENG
[2]   Self Embedding Fragile Watermarking for Image Tampering Detection and Image Recovery using Self Recovery Blocks [J].
Dhole, Vinayak S. ;
Patil, Nitin N. .
1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, :752-757
[3]   Lossless medical image watermarking method based on significant difference of cellular automata transform coefficient [J].
Fan, Tzuo-Yau ;
Chao, Her-Chang ;
Chieu, Bin-Chang .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2019, 70 :174-183
[4]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[5]   A review on automated diagnosis of malaria parasite in microscopic blood smears images [J].
Jan, Zahoor ;
Khan, Arshad ;
Sajjad, Muhammad ;
Muhammad, Khan ;
Rho, Seungmin ;
Mehmood, Irfan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (08) :9801-9826
[6]   Quantum Hilbert Image Scrambling [J].
Jiang, Nan ;
Wang, Luo ;
Wu, Wen-Ya .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2014, 53 (07) :2463-2484
[7]   A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm [J].
Lai, Chih-Chin .
DIGITAL SIGNAL PROCESSING, 2011, 21 (04) :522-527
[8]   Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition [J].
Li, Jianzhong ;
Yu, Chuying ;
Gupta, B. B. ;
Ren, Xuechang .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (04) :4545-4561
[9]   Medical JPEG image steganography based on preserving inter-block dependencies [J].
Liao, Xin ;
Yin, Jiaojiao ;
Guo, Sujing ;
Li, Xiong ;
Sangaiah, Arun Kumar .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 67 :320-329
[10]  
Lingling Wu, 2009, 2009 1st International Conference on Information Science and Engineering (ICISE 2009), P1164, DOI 10.1109/ICISE.2009.347