Adaptive tamper detection watermarking scheme for medical images in transform domain

被引:8
作者
Sanivarapu, Prasanth Vaidya [1 ]
机构
[1] Aditya Engn Coll, Surampalem, India
关键词
Medical images; DWT; Tamper detection; Schur decomposition; Digital watermarking; DIGITAL WATERMARKING; ROBUST;
D O I
10.1007/s11042-022-12273-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A novel robust tamper detection medical watermarking scheme is proposed in the transform domain for authentication and detecting tamper pixels of medical images. In this scheme, 2-level Discrete Wavelet Transform is applied to a significant image to produce four sub-bands (SB) (C-LL,C-LH,C-HL,C-HH). Coefficients of LL sub-bands are considered in embedding the watermark. The SB is partitioned into blocks to overcome image processing attacks. LSB is set to zero for each block and then Schur decomposition is applied in generating Authenticated Block Bits (ABB). In developing confusion to the intruders, the watermark is scrambled using Quantum Hilbert Image Scrambling. Watermarking helps in authentication and tamper detection of the significant image after tampering. The scheme is tested with image processing attacks for robustness. Peak signal to noise ratio (PSNR) and Normalized Cross-Correlation (NCC) metrics are utilized as metrics in evaluating the proposed scheme with PSNR greater than 30dB and NCC values nearer to 1 without attacks and even with attacks, NCC values are greater than 0.95, which shows the robustness of the proposed scheme.
引用
收藏
页码:11605 / 11619
页数:15
相关论文
共 36 条
[11]   An image fragile watermark scheme based on chaotic image pattern and pixel-pairs [J].
Liu, Shao-Hui ;
Yao, Hong-Xun ;
Gao, Wen ;
Liu, Yong-Liang .
APPLIED MATHEMATICS AND COMPUTATION, 2007, 185 (02) :869-882
[12]   A new digital image watermarking scheme based on Schur decomposition [J].
Mohammad, Ahmad A. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2012, 59 (03) :851-883
[13]  
Mr MR., 2019, INT J FUTURE REVOLUT, V5, P08
[14]   Image steganography using uncorrelated color space and its application for security of visual contents in online social networks [J].
Muhammad, Khan ;
Sajjad, Muhammad ;
Mehmood, Irfan ;
Rho, Seungmin ;
Baika, Sung Wook .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 :951-960
[15]  
Oussama N, 2014, ARXIV14042952
[16]  
Prabakaran G, 2013, PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), P1188, DOI 10.1109/ICCPCT.2013.6528835
[17]  
Prasanth Vaidya S., 2020, Smart Computing Paradigms: New Progresses and Challenges. Proceedings of ICACNI 2018. Advances in Intelligent Systems and Computing (AISC 766), P11, DOI 10.1007/978-981-13-9683-0_2
[18]   An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture [J].
Priya, Swarna R. M. ;
Maddikunta, Praveen Kumar Reddy ;
Parimala, M. ;
Koppu, Srinivas ;
Gadekallu, Thippa Reddy ;
Chowdhary, Chiranji Lal ;
Alazab, Mamoun .
COMPUTER COMMUNICATIONS, 2020, 160 :139-149
[19]  
Reddy G T., 2020, INT C EM TRENDS INF, DOI [DOI 10.1109/IC-ETITE47903.2020.235, 10.1109/ic-ETITE47903.2020.235]
[20]   Patient data hiding into ECG signal using watermarking in transform domain [J].
Sanivarapu, Prasanth Vaidya ;
Rajesh, Kandala N. V. P. S. ;
Reddy, N. V. Rajasekhar ;
Reddy, N. Chandra Sekhar .
PHYSICAL AND ENGINEERING SCIENCES IN MEDICINE, 2020, 43 (01) :213-226