Вы находитесь на странице: 1из 14

Engineering Science and Technology, an International Journal 20 (2017) 1366–1379

Contents lists available at ScienceDirect

Engineering Science and Technology,


an International Journal
journal homepage: www.elsevier.com/locate/jestch

Full Length Article

An efficient medical image watermarking scheme based on FDCuT–DCT


Rohit Thanki a,⇑, Surekha Borra b, Vedvyas Dwivedi a, Komal Borisagar c
a
Faculty of Technology and Engineering, C. U. Shah University, Wadhwan City, India
b
Department of ECE, K. S. Institute of Technology, Bangalore, India
c
Department of ECE, Atmiya Institute of Technology and Science, Rajkot, India

a r t i c l e i n f o a b s t r a c t

Article history: In this paper, a blind medical image watermarking scheme based on Fast Discrete Curvelet Transform
Received 23 March 2017 (FDCuT) and Discrete Cosine Transform (DCT) is proposed. FDCuT is applied on the medical image to
Revised 16 June 2017 get different frequency coefficients of its curvelet decomposition. On the high frequency curvelet coeffi-
Accepted 19 June 2017
cients of the medical image, block wise DCT is applied to get different frequency coefficients. Then mid
Available online 1 July 2017
band frequency coefficients of the medical image are modified by White Gaussian Noise (WGN)
sequences according to watermark bit to get watermarked medical image. At extraction end, blind recov-
Keywords:
ery of watermark data is performed by correlation of WGN sequences. The proposed scheme is tested for
Blind watermarking
Fast Discrete Curvelet Transform (FDCuT)
its effectiveness on various types of medical images such as X-ray, Ultrasound (US), Magnetic Resonant
Medical Image Security Imaging (MRI) and Computerized Tomography (CT). Result analysis shows that imperceptibility of water-
Robustness marked medical image is better as PSNR is above 45 dB for all types of the medical images. In addition,
Telemedicine the robustness of the scheme is better than an existing scheme for a similar set of medical images in
White Gaussian Noise (WGN) terms of Normalized Correlation (NC). Experimental results show that scheme is robust to geometric
attacks, signal processing attacks and JPEG compression attacks. An analysis is also carried out to verify
the performance of the proposed scheme to support binary watermarks with different details in it: text
and logos. Moreover, the proposed scheme resulted in zero false positive rate when tested on 100 non-
watermarked images.
Ó 2017 Karabuk University. Publishing services by Elsevier B.V. This is an open access article under the CC
BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

1. Introduction These medical images are corrupted or modified by various


manipulations when it is transferred to the internet and another
During the last few years, the medical information of the transmission/storage medium. Various approaches and techniques
patient is transferred from one doctor to another doctor for better are available for the security of medical image. The digital
health solution and treatment. Transferring medical information watermarking technique is one of the solutions for the security
over a transmission medium is known as telemedicine. Telemedi- of medical images. This paper proposed a robust and secure hybrid
cine is defined by The American Telemedicine Association (ATA) watermarking technique for medical image copyright protection.
as ‘‘the use of medical information exchanged from one site to A variety of watermarking techniques are proposed by researchers
another via electronic communications to improve a patient’s clin- for the security of medical images in the last seven years.
ical health status, including an increasing variety of applications
and services using two-way video, email, smart phones, wireless 1.1. Related work
tools and other forms of telecommunications technology” [1,2].
The telemedicine application includes emergency treatment, home Thakkar et al. [3] have proposed wavelet transform and block
monitor, military applications and medical education [2]. When a SVD based blind watermarking technique for the security of med-
medical image is corrupted or modified by someone during its ical images. In this technique, watermark logo and Electronic
transferring over any open access network, it leads to deviations Patient Record (EPR) data are embedded into the singular values
in the diagnosis which may create serious health issues for any of wavelet subbands of the host medical image. This technique
individual. Thus, the security of medical image is necessary. provides robustness against all possible watermarking attacks.
The limitation of this technique is that it is only applicable for
⇑ Corresponding author. Region of Interest (ROI) of medical image. Nagpal et al. [4] pro-
E-mail address: rohitthanki9@gmail.com (R. Thanki). posed wavelet transform, neural network, and Rivest-Shamir-
Peer review under responsibility of Karabuk University. Adleman (RSA) encryption based robust watermarking technique

http://dx.doi.org/10.1016/j.jestch.2017.06.001
2215-0986/Ó 2017 Karabuk University. Publishing services by Elsevier B.V.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
R. Thanki et al. / Engineering Science and Technology, an International Journal 20 (2017) 1366–1379 1367

for the security of medical images. In this technique, RSA encryp- medical image to generate watermarked medical image. Dey et al.
tion is applied on watermark image to get a scrambled and secure [14] proposed a blind watermarking technique using canny edge
watermark image, which can further be embedded into wavelet detection on ROI and RONI to get the edges of the medical image.
subbands of the host medical image using Artificial Neural Net- Later, the watermark data is embedded into the edges of the med-
work (ANN) approach. ical image to get watermarked medical image.
Kishore et al. [5] have given a review of various medical image Pal et al. [15] have described a watermarking technique using
watermarking techniques and have provided a comparison of three even-odd shifting approach and difference approach for color med-
medical image watermarking techniques such as RSA-Discrete ical image protection. In this technique, the R channel of the host
Wavelet Transform (DWT), DWT-Artificial Neural Network (ANN) medical image is modified using even-odd shifting approach, while
and DWT-SVD. The comparison shows that the DWT-SVD based B channel is modified using difference approach according to
technique performed better than other two techniques. Mahmood watermark bit. This technique has not used any security approach
[6] have proposed an adaptive and non-reversible watermarking for watermark data or host medical image. Dey et al. [16,17] pro-
technique for protection of medical images. In this technique, after posed a hybrid medical watermarking technique using three image
diving host medical image into blocks, Region of Background (ROB) processing transforms such as DCT, DWT, and SVD. Authors pro-
is found using segmentation map approach. Then the entropy of posed this technique for protection of ECG signal and Ultrasound
each blocks are calculated and few low entropy valued blocks are video. In this technique, first a 2D DWT is applied to host medical
chosen for embedding. The DCT is applied to these blocks of host data to get LL, LH, HL and HH subband of host medical data. The
medical image, and the watermark data is inserted into DCT coef- DCT is applied on HH subband and then SVD is applied on DCT
ficients of blocks using LSB approach or difference expansion coefficients to get singular value of host medical data. The singular
approach. This technique has low imperceptibility for water- value of host medical data is modified using singular value of the
marked medical image. HH sub band of the watermark image after applying DWT and
Singh et al. [7] have proposed two DWT, SVD, and cryptography DCT on it. This technique too has not used any security mechanism
based robust watermarking techniques for the security of medical for encrypting the medical data. Dey et al. [18] have described
images. In this technique, authors used three different error cor- wavelet transform and Pseudo Noise sequences based watermark-
recting codes for encoding watermark data. They are: Hamming, ing technique for the protection of biomedical signal. In this tech-
Bose-Chaudhuri-Hocquenghem (BCH) code and Reed-Solomon nique, detailed wavelet coefficients such as horizontal, vertical and
code. The encoded watermark data is embedded into wavelet coef- diagonal are modified by three PN sequences according to water-
ficients of the medical image in wavelet based technique and sin- mark bits. Chakraborty et al. [19] have proposed particle swarm
gular value of medical image in SVD based technique, respectively. optimization based medical information hiding. This technique is
Authors suggested that Reed-Solomon based encoded watermark modified version of Dey technique [18] developed to achieve better
data performed better than other two error correcting codes. imperceptibility. Biswas et al. [20] proposed a visible watermark-
Venkatram et al. [8] have proposed 2D Lifting Wavelet Transform ing technique based on fuzzy logic and Harris corner detection
(LWT) and SVD based medical image watermarking technique. In for a medical image.
this technique, first LWT is applied to host medical image to Acharjee et al. [21] proposed motion vector estimation based
get all wavelet sub-bands. Then SVD is applied on all wavelet watermarking for the security of biomedical videos. In this tech-
sub-bands to obtain and modify the singular value of each sub- nique, first find motion vector of the host medical videos for
band according to watermark bits so as to get watermarked med- watermark embedding using motion vector estimation. Then
ical image. The limitation of this technique is that it does not use watermark data is resampled according to selected size of motion
any security approach for host medical image or watermark image. vector of host medical video frame. Finally, watermark data is
Rathi et al. [9] have proposed a region of non-interest (RONI) and embedded into host medical video frame using bit shifting opera-
LWT based medical image watermarking technique. This technique tion. This procedure is repeated for all frames of medical video to
is modified version of Venkatram technique. In this technique, first generate watermarked medical video. Nyeem et al. [22] gave
RONI of the medical image is extracted and then LWT is applied on requirements and design parameters for effective medical image
it to get wavelet coefficients. Then multiple watermark data are watermarking. Singh et al. [23,24] have proposed hybrid water-
inserted into wavelet coefficients using a secret key. marking techniques for medical image protection. These tech-
Kumar et al. [10] have proposed a spread spectrum based med- niques are designed by DWT, SVD and spread spectrum
ical image watermarking technique in DWT. In this technique, two approach. Authors described two approaches using correlation
PN sequences are inserted into horizontal and vertical wavelet property of PN sequences to achieve blind extraction. In first
coefficients of the medical image when watermark bit is zero. approach, horizontal and vertical wavelet subbands of host med-
For the extraction of a watermark bit, the correlation between ical image are modified by two PN sequences according to water-
PN sequences is performed. Based on the correlation results, mark bits. In second approach, singular value of horizontal and
watermark bit value is set. Mostafa et al. [11] have proposed a dis- vertical wavelet subbands of host medical image is modified by
crete wavelet packet transform and cryptography based water- two PN sequences according to the watermark bits. Authors used
marking technique for protection of EPR information and medical BCH encryption method for security of watermark data. Eswaraiah
image. The EPR data is encoded using BCH code in this technique. et al. [25] described ROI based watermarking for medical image
Here, first DWPT is applied to host medical image to get wavelet tampering. This technique first finds ROI of the host medical
subbands. Then two wavelet subbands are chosen for embedding image and then converts this ROI into nonoverlapping blocks.
encoded EPR data. These two wavelet subbands are divided into Then watermark bits are embedded into nonoverlapping blocks
blocks and each block are modified by watermark bit. In this tech- of host medical image using LSB approach.
nique, each block is embedded with one bit. Rohit et al. [26] proposed a curvelet transform and CS theory
Huang et al. [12] have described a DCT based medical image based watermarking for the security of multibiometric image pro-
watermarking. Kallel et al. [13] proposed a spatial domain medical tection. In this technique, high frequency curvelet coefficients of
image watermarking technique. In this technique, a hash function host biometric image are modified according to sparse measure-
is applied to the 7th bit of host medical image and then XORed ment of watermark biometric image which is generated using
with diagnosis information of doctor to generate the watermark DCT and CS theory process. Bazargani et al. [27] gave a comparison
information. This watermark information is inserted in LSB of host of robust watermarking techniques in wavelet, contourlet, and cur-
1368 R. Thanki et al. / Engineering Science and Technology, an International Journal 20 (2017) 1366–1379

velet domains for standard image protection. Xu et al. [28] pro- where j = 0, 1, 2. . . is a scale parameter; l = 0, 1, 2. . . is an orientation
posed a watermarking technique based on Fast Discrete Curvelet parameter; and k = (k1, k2) 2 Z2 is a translation parameter. The scale
Transform for standard image protection. In this technique, the parameter depends on the size of the image and is calculated as
binary watermark data is embedded into low frequency curvelet log2 ðminðM; NÞ  3, where M, N is the size of row and column of
coefficients of the host image. Zhang et al. [29] proposed first the image. The orientation parameter must be set to a multiplier
watermarking technique based on curvelet transform for copyright of 4 and the default value of orientation parameter is 16.
protection. In this technique, image hash is computed using curve- The discrete time curvelet transform has been redesigned with
let transform. These hash values are embedded into a different a new mathematical architecture, which is simple and easy to be
level of curvelet transform of the host image. Surekha et al. implemented. It is known as a Fast Discrete Curvelet Transform
[38,39] gave new watermarking schemes for copyright protection (FDCuT) [30,31]. This curvelet transform is divided into two types:
using visual cryptography. These schemes are applicable for med- Unequi Spaced Fast Fourier Transform (USFFT) based FDCuT and
ical image protection. frequency wrapping based FDCuT. The USFFT based FDCuT is an
After reviewing papers, it is observed that most of the existing unequal size of the sample, complex and requires more computa-
watermarking schemes are designed using DWT, SVD, and DCT tional time. The frequency wrapping based FDCuT is easy to imple-
and have less imperceptibility of watermarked medical images. ment and simpler to understand. Further, the computational time
Many existing watermarking schemes have used the correlation of frequency wrapping based FDCuT is fast compared to USFFT
of PN sequences for blind extraction of the watermark. Also, the based FDCuT, and hence is chosen by many researchers. The imple-
robustness test of many existing watermarking schemes is missing menting steps of frequency wrapping based FDCuT is given below
against various watermarking attacks. In this paper, a scheme is [30,31]:
proposed to overcome the limitations of Dey scheme [18], Singh
scheme [25] and Thakkar scheme [3]. The Dey scheme and Singh 1. Take FFT of the image.
scheme used two PN sequences and their correlation for blind 2. Divide FFT into a collection of Digital Corona Tiles (Fig. 1).
extraction of watermark data. These two schemes have less imper- 3. For each corona tile
ceptibility for medical image of standard database and are less  Translate the tile to the origin (Fig. 2(a, b)).
robust against watermarking attacks. The reason behind chosen  Wrap the parallelogram shaped support of the tile around a
these schemes is that it is most related to the proposed scheme rectangle centered at the origin (Fig. 2(c)).
as the proposed scheme has also used the correlation of white  Take the Inverse FFT of the wrapped support.
Gaussian noise sequences. Also, Thakkar scheme [3] has a limita-  Add the Curvelet array to the Collection of Curvelet
tion that it is only applicable on Region of Interest (ROI) of medical coefficients.
image. Thus, there is requirement for design of new watermarking
technique which overcomes the above mentioned problems in There are very few watermarking schemes where FDCuT is
watermarking field. used. The frequency wrapping based curvelet transform is used
In this paper, a blind watermarking scheme is proposed for in the proposed watermarking because it has equal sample rate
securing medical images. The scheme is designed using Fast Dis- and low computational time. If frequency wrapping based curvelet
crete Curvelet Transform (FDCuT), Discrete Cosine Transform transform is applied on the image, it produces three different fre-
(DCT) and White Gaussian Noise (WGN) sequences. The scheme quency subbands such as Low Frequency (LF), Middle Frequency
is robust against geometric attacks, signal processing attacks and (MF) and High Frequency (HF). The curvelet transform decomposes
JPEG compression attack. To suit the telemedicine applications, a the image into a number of different frequency coefficients cells
variety of copyright information in terms of the image, binary logo which are shown in Fig. 3. The number of cells depends on the size
and binary symbol are embedded into the medical image. To of the image.
implement this scheme, first FDCuT is applied on the medical For example, an image with a size of 512  512 pixels are
image. Then DCT is applied on the blocks of high frequency (HF) decomposed using frequency wrapping based FDCuT with 6 scale
curvelet subband with the size of 8  8. The mid band frequency parameters and 16 orientation parameters into different cells, such
DCT coefficients of each DCT block are modified by two WGN as C (1, 1) to C (1, 6). Where, C (1, 1) is a low frequency curvelet
sequences to embed watermark bits. At extraction side, blind coefficient, C (1, 2) to C (1, 5) are medium frequency curvelet coef-
watermark extraction is performed using correlation properties ficients, and C (1, 6) is high frequency curvelet coefficient. The size
of WGN sequence. Rest of the paper is organized as follows; in Sec- of the cells C (1, 1) to C (1, 5) is less than the actual size of image but
tion 2, preliminaries used in the proposed scheme are given. Sec- size of C (1, 6) is equal to the size of the image. The reason behind
tion 3 gives the proposed scheme, whereas experimental results chosen high frequency curvelet coefficients in proposed scheme is
and discussion are given in Section 4. Finally, the conclusions of
the paper are given in section 5.

2. Preliminaries

2.1. Fast Discrete Curvelet Transform (FDCuT)

The Discrete Time Curvelet Transform (DTCuT) is applied on the


image to get various frequency subbands. The DTCuT plays an
important role in image processing applications [30,31], as this
represents image into curves or edges. The discrete time curvelet
transform is linear and takes as input the Cartesian arrays of form
f [t1, t2], 0  t1, t2 < n, which allows the output as a collection of
coefficients:
X
C D ðj; l; kÞ :¼ 0 6 t1 ; t 2 < nf ½t 1 ; t2 /Dj;l;k ½t 1 ; t2  ð1Þ
Fig. 1. The basic 2D Discrete Curvelet Transform.
R. Thanki et al. / Engineering Science and Technology, an International Journal 20 (2017) 1366–1379 1369

Fig. 2. Wrapping data, initially inside a parallelogram, into a rectangle by periodicity. The black parallelogram is the tile which contains the frequency support of the Curvelet,
whereas the gray parallelograms are the replicas resulting from periodization. The rectangle is centered at the origin. The wrapped ellipse appears ‘‘broken into pieces” but
this is not an issue in the periodic rectangle, where the opposite edges are identified (taken from [30,31]).

Fig. 3. Curvelet Decomposition of an Image.

(a) Original Image

(b) Curvelet Coefficients of Image (c) High Frequency Curvelet Coefficients of Image
Fig. 4. Curvelet Coefficients of an Image.
1370 R. Thanki et al. / Engineering Science and Technology, an International Journal 20 (2017) 1366–1379

that it results in better imperceptibility and achieves good payload 3. Proposed scheme
capacity compared to other curvelet coefficients. The curvelet coef-
ficients of an image are shown in Fig. 4(b). Fig. 4(c) shows the high In this paper, a blind watermarking scheme based on
frequency curvelet coefficients of an image. FDCuT–DCT is proposed, to be more imperceptible and robust
against different watermarking attacks. In this scheme, FDCuT
2.2. Discrete Cosine Transform (DCT) is applied on host medical image to get different frequency sub-
bands such as LF, MF, and HF. The reason behind choosing
For any digital image, it’s DCT and inverse DCT is calculated FDCuT in proposed scheme is that it represents an image in
using Eqs. (1) and (2), respectively [32]. The DCT can be applied terms of edges and provides better imperceptibility compared
on an image in two ways: block wise and without block wise. to another transforms. Also, when FDCuT is applied to the image,
the size of the high frequency sub bands is equal to the actual
XX
M1 N1 size of the image which provides more embedding capacity. Fur-
Fðu; v Þ ¼ aðuÞ  aðv Þ f ðx; yÞ ther, it is easy to perform watermark embedding in the proposed
x¼1 y¼1
    scheme. For FDCuT decomposition of an image, 7 scale parame-
ð2x þ 1Þup ð2y þ 1Þv p ter and 16 orientation parameter are used. A block-wise DCT is
 cos cos ð2Þ
2M 2N applied on HF curvelet sub band of the host medical image. Then
pffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffi two White Gaussian Noise sequences are inserted into mid band
where, aðuÞ ¼ 1=M for u = 0; aðuÞ ¼ 2=M for u = 1, 2, 3. . . M1; frequency DCT coefficients based on the watermark bits to gen-
pffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffi
aðv Þ ¼ 1=N for v = 0; aðv Þ ¼ 2=N for v = 1, 2, 3 . . . N1. erate watermarked medical image. In this technique, HF curvelet
subband is divided into 8  8 overlapped blocks to achieve
XX
M1 N1
better robustness. The blind extraction of watermark data is pos-
f ðx; yÞ ¼ aðuÞ  aðv Þ  Fðu; v Þ
u¼0 v ¼0
sible in proposed scheme using the correlation between WGN
   
ð2y þ 1Þv p
sequences and watermarked data. The steps for watermark
ð2x þ 1Þup
 cos cos ð3Þ embedding and watermark extraction are given in the following
2M 2N
subsections.
The mid band DCT coefficients are used in the watermarking
application due to its following properties [33,34]. 3.1. Watermark embedding procedure

1. These coefficients of image do not change the visibility of the In this scheme, a watermark bit is embedded into FDCuT-DCT of
image much. host medical image using WGN sequences. The block diagram of a
2. These coefficients are less affected by watermarking attacks. proposed embedding procedure is given in Fig. 5. The algorithm for
watermark embedding is given below.
For the proposed robust watermarking scheme, block wise DCT Step 1. Calculate the size of watermark image. The watermark
is applied on the image to different frequency subbands such as image is converting into the vector of watermark bit.
low, mid band and high. Step 2. Calculate the size of the host medical image.
Step 3. Apply frequency wrapping based FDCuT to get LF, MF
2.3. White Gaussian Noise (WGN) sequence and HF subband of host medical image.
Step 4. Convert HF curvelet subband into non-overlapped
In signal processing, white noise is a random noise signal which blocks.
has a constant power spectral density [35]. Any sequence S[n] is Step 5. Apply block-wise DCT on non-overlapped blocks to get
called a white noise sequence if coefficients like Low Band Frequency (LBF), Mid Band Frequency
(MBF) and High Band Frequency (HBF).
N Step 6. Generate two high uncorrelated White Gaussian Noise
SS ð x Þ ¼ ; p 6 x 6 p ð4Þ
2 (WGN) sequences using noise generator, each of size equal to the
where N is a real constant and is called white noise intensity. The size of MBF.
autocorrelation of white noise sequence is calculated as Step 7. Choose MBF DCT coefficients are chosen for watermark
bit embedding. Embed each watermark bit in MBF DCT coefficients
N of the block based on following conditions.
RS ½n ¼ d½n ð5Þ
2
 If watermark bit is zero then
where d[n] is the unit impulse sequence.
The average power of white noise sequence is finite and uni- Modified DCTblock ¼ DCTblock þ k  WGN Sequence 0 ð6Þ
formly distributed over all frequencies. If PSD of this sequence fol-
lows Gaussian distribution, then this sequence is called as White where, Modified_DCTblock corresponds to the modified MBF
Gaussian Noise (WGN) Sequence. In the discrete time domain, this DCT coefficients of the block, DCTblock is original MBF DCT coef-
noise is a discrete signal whose samples are represented as a ficients of the block, k is the gain factor, and WGN_Sequence_0 is
sequence of uncorrelated random variables with zero mean and WGN sequence for watermark bit 0.
some variance. In practice, each sample of the sequence has a nor-  If watermark bit is one then
mal distribution with zero mean where each pixel follows a Gaus- Modified DCTblock ¼ DCTblock þ k  WGN Sequence 1 ð7Þ
sian distribution. In image processing, this random noise is
represented in two-dimensions. In the proposed robust water- where, Modified_DCTblock corresponds to the modified MBF
marking scheme, this noise sequence is used for blind extraction DCT coefficients of the block, DCTblock is original MBF DCT coef-
of watermark bits at recovery side. The reason behind using this ficients of the block, k is the gain factor, and WGN_Sequence_1 is
sequence is that it results in highly uncorrelated sequences of dif- WGN sequence for watermark bit 1.
ferent values. So it is easy to find a correlation between two  This process is repeated for all the MBF DCT coefficients of each
sequences in making a decision about watermark bit extraction. block of host medical image.
R. Thanki et al. / Engineering Science and Technology, an International Journal 20 (2017) 1366–1379 1371

Fig. 5. Block Diagram of Proposed Watermark Embedding Procedure.

Step 8. Apply inverse block-wise DCT on modified MBF coeffi- dure is given in Fig. 6. The algorithm for watermark extraction is
cients keeping with other coefficients as it is so as to get modified given below.
HF curvelet subband of host medical image. Step 1. Calculate the size of watermarked medical
Step 9. Apply Inverse frequency wrapping based FDCuT on mod- image.
ified HF curvelet subband to get watermarked medical image. Step 2. Apply frequency wrapping based FDCuT to get LF, MF
and HF subband of watermarked medical image.
3.2. Watermark extraction procedure Step 3. HF curvelet subband is converted into non-overlapped
blocks.
In this scheme, a watermark bit is extracted blindly using the Step 4. Apply block-wise DCT on non-overlapped blocks to get
correlation between watermarked medical image and two WGN coefficients like Low Band Frequency (LBF), Mid Band Frequency
sequences. The block diagram of the proposed extraction proce- (MBF) and High Band Frequency (HBF).

Fig. 6. Block Diagram of Proposed Watermark Extraction Procedure.


1372 R. Thanki et al. / Engineering Science and Technology, an International Journal 20 (2017) 1366–1379

Step 5. Take the two highly uncorrelated White Gaussian Noise converted into 16,384 non-overlapping blocks with size 8  8.
(WGN) sequences which are generated during Watermark embed- The DCT coefficients of each block are obtained by application of
ding process. block-wise DCT on it. The watermark image with size 128  128
Step 6. Extract he watermark bit from MBF DCT coefficients pixels is converted into a vector of size 16,384. Then according to
based on the following conditions. watermark bit value, MBF DCT coefficients value of each block of
a medical image is modified by two WGN sequences. The modified
Correlation Sequence 1 ¼ corr2ðMBF DCTblock; WGN Sequence 1Þ
16,384 blocks of medical image with watermark bits are obtained
ð8Þ after watermark embedding process. The inverse block-wise DCT is
applied to modified DCT to get modified high frequency curvelet
Correlation Sequence 0 ¼ corr2ðMBF DCTblock; WGN Sequence 0Þ coefficients with the size of 1024  1024. Then inverse FDCuT is
ð9Þ applied to modified high frequency curvelet coefficients with
unmodified curvelet coefficients to get watermarked medical
Step 7. If Correlation_Sequence_1 > Correlation_Sequence_0 then image. Here, one watermark bit is embedded into each block of
watermark bit is set as bit 1. Otherwise, a watermark bit is set as the medical image. The maximum watermark data can be embed-
bit 0. ded by this proposed scheme is calculated using below Eq. (10):
Step 8. Apply reshape on bits vector to get extracted watermark
image. MN
Maximum Watermark ¼ 2
ð10Þ
Blocksize
4. Simulation results where M is row size and N is column size of Host Image,
respectively.
The proposed scheme is tested and analyzed by various medical In this proposed scheme, the size of host medical image is
images such as X-ray, US, MRI, and CT. The size of these images is 1024  1024 and block size is 8. Thus, the proposed scheme can
1024  1024 pixels. The test host medical images are taken from embed a maximum watermark image with a size of 128  128 pix-
the MedPixTM Medical Image Database [36] and shown in Fig. 7. els. The maximum payload of the proposed scheme can be 1 bit for
The test medical images are 8 bit grayscale images. every 64 pixels of host medical image.
A set of 3 watermark image with contents such copyright infor-
mation text in term of the image, logo with more smooth details 4.1. Performance measures
and logo with more sharp details are used for testing. The dimen-
sion of watermark images is 128  128 pixels. The watermark A peak signal to noise ratio (PSNR) is used to measure imper-
images are 8 bit binary images (shown in Fig. 8). Here the size of ceptibility between original host medical image and watermarked
each watermark image is chosen same for better comparison of medical image. The PSNR is given in Eq. (5). A PSNR depends on
schemes and better visualization of experiment results. The imple- Mean Square Error (MSE) which is an error between the original
mentation of the proposed scheme is done on the laptop 2 GHz image and processed image. The MSE is calculated using Eq. (6).
core two Duo processor with 2 GB RAM using MATLAB 2013a The MSE is measured in real value while PSNR is measured in dB
software. value. A high value of PSNR indicated more imperceptibility of
In this proposed scheme, a medical image with size the algorithm.
1024  1024 pixels is tested as host image and FDCuT is applied !
to it to get its curvelet coefficients. The high frequency curvelet 2552
PSNR ¼ 10  log10 ð11Þ
coefficients with size 1024  1024 are chosen for watermark MSE
image embedding. Then high frequency curvelet coefficients are

(a) (b) (c) (d)


Fig. 7. Test Host Medical Image (a) X-ray (b) US (c) MRI (d) CT.

(a) Watermark 1 (WM1) (b) Watermark 2 (WM2) (c) Watermark 3 (WM3)


Fig. 8. Test Watermark Image.
R. Thanki et al. / Engineering Science and Technology, an International Journal 20 (2017) 1366–1379 1373

XX
1 M1 N1 4.2. Imperceptibility test
MSE ¼ ðCðx; yÞ  CWðx; yÞÞ2 ð12Þ
M  N x¼0 y¼0
An imperceptibility test of proposed scheme is tested using dif-
where, C is original host medical image and CW is watermarked ferent medical images like X-ray, US, MRI and CT. The test is per-
medical image, respectively. formed to check how degradation is appearing in the medical
The robustness of watermarking scheme can be measured by image after watermark data embedding into it. For any watermark-
normalized correlation (NC). The normalized correlation can be ing scheme, the watermarked image must appear close to the orig-
calculated using Eq. (7). NC measures the similarity between orig- inal image for better imperceptibility. For imperceptibility test,
inal watermark image and extracted watermark image. The robust- PSNR is calculated between original host medical image and water-
ness of any watermarking scheme is high if NC value is close to marked medical image, and NC is calculated between original
one. watermark image and extracted watermark image. The PSNR and
XM XN NC values of proposed scheme are compared with the existing
x¼1 y¼1
wðx; yÞ  w  ðx; yÞ technique [18]. Fig. 9 shows quantitative results of proposed
NC ¼ XM XN ð13Þ scheme when tested on a different set of host and watermark
x¼1 y¼1
w2 ðx; yÞ images. Results include watermarked medical images and
extracted watermark images. The watermark embedding proce-
In above equation, w is original watermark image and w⁄ is
dure is performed by a constant gain factor k with value 2.
extracted watermark image. Using above measures, imperceptibil-
In the proposed scheme, the performance of watermark embed-
ity test and robustness test of proposed scheme are performed for
ding process depends on the gain factor and the WGN sequences.
various medical images.

Test Image X-Ray US MRI CT

Watermarked
Image (after
embedding
WM1)

Extracted
Watermark 1

Watermarked
Image (after
embedding
WM2)

Extracted
Watermark 2

Watermarked
Image (after
embedding
WM3)

Extracted
Watermark 3

Fig. 9. Watermarked Medical Images and Extracted Watermark Images using Proposed Scheme using Gain Factor k = 2.
1374 R. Thanki et al. / Engineering Science and Technology, an International Journal 20 (2017) 1366–1379

Test Image X-Ray US MRI CT

Extracted
Watermark 1

Extracted
Watermark 2

Extracted
Watermark 3

(a) Using Gain Factor k = 4

Test Image X-Ray US MRI CT

Extracted
Watermark 1

Extracted
Watermark 2

Extracted
Watermark 3

(b) Using Gain Factor k = 6

Test Image X-Ray US MRI CT

Extracted
Watermark 1

Extracted
Watermark 2

Extracted
Watermark 3

(c) Using Gain Factor k = 8

Fig. 10. Extracted Watermark Images using Different Gain Factor k values.

While the value of WGN sequences is fixed, the value of gain factor gain factor k varies from 2 to 8, as per HVS property of watermark-
is variable. The gain factor affects the quality of watermarked med- ing requirements. The results in Fig. 9 show the extracted water-
ical images and extracted watermark images. Here, the range of mark image with some degradation without application of any
R. Thanki et al. / Engineering Science and Technology, an International Journal 20 (2017) 1366–1379 1375

watermarking attacks. This happens because White Gaussian Noise The corresponding PSNR values and NC values of proposed
(WGN) sequences are used for embedding the watermark bits and scheme are compared with existing scheme [18] and are tabulated
these sequences have influence on grayscale value of the water- in Table 2. The comparison of schemes is performed using gain fac-
marked medical image. At watermark extraction, correlation tor k as 2, and without application of any watermarking attacks.
between these sequences and watermarked medical image is The average value of PSNR of watermarked medical images of pro-
performed. The resultant correlation values are less for small gain posed scheme is around 49.36 dB while the average value of PSNR
factors which cause low quality extracted watermark images. As of watermarked medical images of existing scheme [18] is around
the value of gain factor increases, the correlation values 37.58 dB. Thus, it indicates that the watermarked image is not
also increases. Fig. 10 shows the extracted watermark images using much affected by embedding watermark bits. The proposed
different gain factor k values. The corresponding PSNR and NC scheme provides better imperceptibility compared to existing
values are tabulated in Table 1. The results show that when gain scheme [18].
factor is high, the quality of extracted watermark images is Note that the average value of NC of extracted watermark
also high. images of proposed scheme is around 0.9618 while the average

Table 1
PSNR(dB) and NC Value of Proposed Scheme using Different Gain Factor k values.

Test Image PSNR (dB) NC


Watermark 1 Watermark 2 Watermark 3 Watermark 1 Watermark 2 Watermark 3
(a) For Gain Factor k = 2
X-ray 55.06 51.58 53.10 0.9230 0.9784 0.9408
US 50.27 49.62 50.13 0.9551 0.9411 0.9400
MRI 48.99 45.52 47.86 0.9692 0.9918 0.9765
CT 47.18 46.54 46.55 0.9827 0.9647 0.9780
(b) For Gain Factor k = 4
X-ray 45.01 43.81 45.06 0.9906 0.9850 0.9571
US 42.68 40.39 40.41 0.9809 0.9751 0.9722
MRI 39.36 40.49 39.79 0.9925 0.9902 0.9932
CT 38.86 38.26 38.69 0.9929 0.9872 0.9758
(c) For Gain Factor k = 6
X-ray 39.86 40.08 37.80 0.9928 0.9945 0.9795
US 35.06 33.83 36.89 0.9937 0.9912 0.9851
MRI 32.45 36.12 33.54 0.9998 0.9956 0.9995
CT 33.03 32.39 32.51 0.9919 0.9887 0.9860
(d) For Gain Factor k = 8
X-ray 34.21 34.77 33.73 0.9932 0.9945 0.9957
US 29.38 32.52 32.84 0.9976 0.9930 0.9871
MRI 31.21 32.55 30.40 0.9995 0.9995 1.0000
CT 35.51 28.37 28.98 0.9937 0.9933 0.9928

Table 2
Comparison of PSNR(dB) and NC Value of Proposed Scheme with Existing Scheme [18] without Application of Watermarking Attacks.

Test Image Proposed Scheme Existing Scheme [18]


Watermark 1 Watermark 2 Watermark 3 Watermark 1 Watermark 2 Watermark 3
(a) Comparison of PSNR (dB) Values
X-ray 55.06 51.58 53.10 39.40 36.72 34.07
US 50.27 49.62 50.13 40.60 37.92 35.28
MRI 48.99 45.52 47.86 40.61 37.92 35.28
CT 47.18 46.54 46.55 40.40 37.71 35.07
(b) Comparison of NC Values
X-ray 0.9230 0.9784 0.9408 0.6018 0.6667 0.7409
US 0.9551 0.9411 0.9400 0.5524 0.5822 0.6481
MRI 0.9692 0.9918 0.9765 0.5485 0.5818 0.6461
CT 0.9827 0.9647 0.9780 0.5705 0.6168 0.6844

Table 3
NC Value of Proposed Scheme and Existing Scheme [18] under JPEG Compression Attack.

Test image X-ray US MRI CT X-ray US MRI CT


JPEG Compression Attack Existing Scheme [18] Proposed Scheme
Q = 90 0.7374 0.6346 0.6272 0.6758 0.9713 0.9314 0.9806 0.9806
Q = 80 0.7209 0.6186 0.6086 0.6588 0.9282 0.6989 0.7364 0.9578
Q = 70 0.7146 0.6097 0.6026 0.6502 0.9525 0.7204 0.7114 0.7402
Q = 60 0.7102 0.6037 0.5862 0.6474 0.7551 0.6307 0.5889 0.7931
Q = 50 0.6933 0.6010 0.5884 0.6361 0.7125 0.6067 0.5945 0.6404
1376 R. Thanki et al. / Engineering Science and Technology, an International Journal 20 (2017) 1366–1379

Table 4
NC Value of Proposed Scheme and Existing Scheme [18] under Noise Addition Attack.

Test image X-ray US MRI CT X-ray US MRI CT


Noise Addition Attack Existing Scheme [18] Proposed Scheme
Speckle Noise (Variance = 0.004) 0.7168 0.6470 0.6383 0.6817 0.8713 0.9451 0.9456 0.9396
Salt & Pepper Noise (Variance = 0.005) 0.7054 0.6266 0.6183 0.6666 0.8730 0.8878 0.9002 0.9125
Gaussian Noise (Mean = 1, Variance = 0.001) 0.7129 0.6292 0.6228 0.6686 0.9322 0.8049 0.8135 0.8620

Existing Scheme [18] Proposed Scheme

Fig. 11. Watermarked Medical Images and Extracted Watermark Images under Speckle Noise Attack.

Table 5
NC Value of Proposed Scheme and Existing Scheme [18] under Filtering Attack.

Test image X-ray US MRI CT X-ray US MRI CT


Filtering Attack Existing Scheme [18] Proposed Scheme
Median Filtering (2  2) 0.7180 0.6157 0.6067 0.6517 0.9538 0.8943 0.9700 0.9607
Mean Filtering (2  2) 0.6794 0.5838 0.5782 0.6206 0.8688 0.8950 0.8461 0.8771
Gaussian LPF (2  2) 0.6794 0.5838 0.5782 0.6206 0.8657 0.8900 0.9458 0.9668

Table 6
NC Value of Proposed Scheme and Existing Scheme [18] under Blurring Attack, Sharpening Attack, and Histogram Equalization Attack.

Test image X-ray US MRI CT X-ray US MRI CT


Various Attacks Existing Scheme [18] Proposed Scheme
Blurring 0.5660 0.5271 0.5347 0.5510 0.6952 0.7385 0.9627 0.9078
Sharpening 0.7617 0.6638 0.6617 0.7124 0.9408 0.9661 0.9661 0.9674
Histogram Equalization 0.7480 0.7010 0.7468 0.7170 0.9689 0.9720 0.9629 0.9708

Existing Scheme [18] Proposed Scheme

Fig. 12. Watermarked Medical Images and Extracted Watermark Images under Histogram Equalization Attack.

value of NC of extracted watermark images of existing scheme [18] image is possible from corrupted watermarked contents then the
is around 0.6201. Thus, it indicates that the extraction of water- scheme is robust, authentic and secure. In this paper, the robust-
mark images in the proposed scheme is better than the existing ness of proposed scheme against various watermarking attacks is
scheme [18]. measured by normalized correlation (NC). In addition, NC value
of proposed scheme is compared with NC value of the existing
scheme [18] for the same set of medical images. The NC value’s
4.3. Robustness test
obtained for various watermarking attacks for different water-
marked medical image (which is watermarked by WM 3 image)
For robustness test of proposed scheme, various watermarking
are given below.
attacks such as JPEG compression, filtering such as median, mean,
and Gaussian low pass filter, cropping, blurring, sharpening, Gaus-
sian noise, salt & pepper noise, speckle noise and geometric attacks 4.3.1. JPEG compression attack
such as rotation, cropping and flipping are applied on watermarked JPEG compression compresses any image without much affect-
medical images. At extraction side, if the extraction of watermark ing the visual information of the image. The JPEG compression with
R. Thanki et al. / Engineering Science and Technology, an International Journal 20 (2017) 1366–1379 1377

different quality factors are applied on watermarked medical 4.3.2. Noise addition attack
images and then WM 3 image is extracted using proposed scheme. The different noises such as Gaussian noise, salt & pepper noise,
In Table 3, the NC values for the compression attack of an image and speckle noise are applied on the watermarked medical images
like X-ray, US, MRI and CT are summarized. The results show that and then the watermark WM3 is extracted using proposed scheme.
the proposed scheme performed better than existing scheme [18] In Table 4, the NC value for this attack for test images is summa-
under this attack. rized. The results show that the proposed scheme performed better

Table 7
NC Value of Proposed Scheme and Existing Scheme [18] under Geometric Attack.

Test image X-ray US MRI CT X-ray US MRI CT


Various Attacks Existing Scheme [18] Proposed Scheme
Flipping 0.5056 0.4977 0.5040 0.5029 0.8691 0.8519 0.7258 0.8917
Rotation (90°) 0.4976 0.4968 0.5025 0.4996 0.7895 0.8510 0.9005 0.9448
Cropping (20%) 0.7298 0.6363 0.6371 0.6817 0.9704 0.9352 0.9687 0.9593

Table 8
Sample false positive test results for proposed method.

Extracted Extracted Extracted


watermark1 watermark2 watermark3
Non-watermarked
Sl. No using the NC1 using the NC2 using the NC3
Image
proposed proposed proposed
algorithm algorithm algorithm

1 0.5013 0.4884 0.4973

2 0.4981 0.5093 0.4943

3 0.4984 0.5297 0.5046

4 0.4987 0.5040 0.5004

5 0.4990 0.4963 0.5187


1378 R. Thanki et al. / Engineering Science and Technology, an International Journal 20 (2017) 1366–1379

Table 9
Performance Comparison of Proposed Scheme with Existing Schemes [3,18,25] for X-ray Medical image under Various Watermarking Attacks.

Attacks NC for Watermark Logo


Dey Scheme et al., 2013 [18] Singh Scheme et al., 2015 [25] Thakkar Scheme et al., 2016 [3] Proposed Scheme
JPEG Compression (Q = 90) 0.7374 0.7394 0.0543 0.9806
Sharpening 0.7617 0.7364 0.0737 0.9674
Median (2  2) 0.6794 0.6662 0.0252 0.9607
Gaussian LPF 0.6794 0.7102 0.0196 0.9668
Gaussian Noise (l = 0, r = 0.01) 0.6233 0.7394 0.0520 0.6377
Salt & Pepper Noise (l = 0.1) 0.5817 0.7072 0.0132 0.7532
Histogram Equalization 0.7480 0.7402 0.0264 0.9708

Table 10
Comparison of Proposed Scheme with Existing Schemes [3,18,25] with Various Features.

Features Dey Scheme Singh Scheme et al., Thakkar Scheme et al., 2016 [3] Proposed Algorithm
et al., 2013 [18] 2015 [25]
Type of Watermarking Robust Robust Robust Robust
No. of Image Processing Transforms 1 1 2 2
Used Transform for Watermark Discrete Wavelet Discrete Wavelet Discrete Wavelet Transform Discrete Fast Curvelet Transform
Embedding Transform Transform and Singular Value Decomposition and Discrete Cosine Transform
No. of Noise Sequences Three PN Sequences Two PN Sequences Not used Two WGN Sequences
Maximum PSNR (dB) 39.03 37.75 31.17 55.06
Maximum NC 0.7409 0.7544 0.6676 0.9998
Execution Time 108.92 s Not mentioned Not mentioned 29.95 s
False Positive Zero Non mentioned Zero Zero

than existing scheme [18] under this attack. Fig. 11 shows water- problem should be avoided. Given multiple non watermarked
marked CT image is corrupted by speckle noise and the corre- medical images and a watermark, the proposed Watermark Extrac-
sponding extracted watermarks of proposed and existing [18] tion algorithm is applied on each one of them using the same
methods. owner secret keys to extract the watermark from non-
watermarked images. The sample subjective and objective results
4.3.3. Filtering attack for 5 non watermarked images are shown in Table 8. A false posi-
Different filters like median filter mean filter and Gaussian low tive is said to occur, if an extracted watermark shows a visual trace
pass filter are applied on the watermarked medical images and of the owner’s watermark. The false positive rate decreases with
then the WM3 image is extracted using proposed scheme. In increased uniqueness of the selected features for watermarking.
Table 5, the NC values for this attack are summarized. The results A watermark which was shown in Fig 8 is used in all kinds of
show that the proposed scheme performed better than existing simulations.
scheme [18] under this attack. When testing on a large data set, by assuming that a false pos-
itive arises if the NC value of such extracted watermark is high
4.3.4. Blurring attack, sharpening attack, and histogram equalization (exceeds 0.6); a false positive rate of zero is obtained for the pro-
attack posed method, when tested on 100 test medical images which
Another set of attacks: blurring, sharpening, and histogram are available in the MedPixTM Medical Image Database [36]. Accord-
equalization are also applied on the watermarked medical images ing to I. J. Cox [37] ‘‘A false positive rate of 106 can meet the secu-
and used for robustness test. In Table 6, the NC value for these rity requirements” and hence our developed method can meet the
attacks for test images is summarized. The results show that the security requirements of watermarking.
proposed scheme is performed better than existing scheme [18]
under this attack. Fig. 12 shows watermarked CT image is cor- 4.5. Comparison of the proposed scheme with existing schemes
rupted by Histogram Equalization and the corresponding extracted
watermarks of proposed and existing [18] methods. In Table 9, the performance of proposed scheme is compared
with some recently watermarking schemes developed for medical
4.3.5. Geometric attack image protection.
Different geometric attack: flipping, rotation, and cropping are The proposed scheme performs well compared to three of the
applied on the watermarked medical images and then the WM3 existing scheme [3,18,25] against all type of watermarking attacks
image is extracted using proposed scheme. In Table 7, the NC value except for Gaussian noise attack with mean (0) and variance (0.01).
for this attack for test images is summarized. The results show that The comparison of the schemes is performed by same medical
the proposed scheme is performed better than existing scheme images which are used in proposed scheme. For better comparison
[18] under all these kind of attacks. of schemes, same database is use.
The proposed scheme is also compared with the existing
4.4. False positive test schemes [3,18,25] by various features in Table 10. The watermark-
ing in the scheme [3] is performed in DWT + SVD domain and
The results of this test are useful in evaluating the security schemes [18,25] is performed in DWT domain. The watermarking
requirements of the proposed method. A false positive is a result in proposed scheme is performed in the FDCuT-DCT domain. While
of extraction of a watermark from an unauthorized image, which two PN sequences are used in the scheme [25] and three PN
doesn’t actually belong to the owner. Since, false positives encour- sequences are used in the scheme [18], the proposed scheme uses
age malicious owners in claiming other unauthorized images, this two WGN sequences. The maximum PSNR value in the scheme [3]
R. Thanki et al. / Engineering Science and Technology, an International Journal 20 (2017) 1366–1379 1379

is 31.17 dB, [18] is 39.03 dB, [25] is 37.75 dB, and in proposed [14] N. Dey P. Maji P. Das S. Biswas A. Das S. Chaudhuri An Edge based blind
watermarking technique of medical images without devalorizing diagnostic
scheme is 52.76 dB, respectively. The maximum NC value in the
parameters IEEE Int. Conf. Adv. Technol. Eng. 2013 1 5
scheme [3] is 0.6676, in the scheme [18] is 0.7409, in the scheme [15] A. Pal, N. Dey, S. Samanta, A. Das, S. Chaudhuri, A hybrid reversible
[25] is 0.7544, and in the proposed scheme it is 0.9918. The average watermarking technique for color biomedical images, IEEE Int. Conf.
results indicate that performance of the proposed scheme is better Comput. Intell. Comput. Res. (2013) 1–6.
[16] N. Dey, D. Biswas, A. Roy, A. Das, S. Chaudhuri, DWT-DCT-SVD based blind
than existing schemes in term of imperceptibility, robustness, and watermarking technique of gray image in electrooculogram signal, in: 2012
security. 12th International Conference on Intelligent Systems Design and Applications
(ISDA), 2012, pp. 680–685.
[17] Dey N., Das P., Roy A., Das A., Chaudhuri S., DWT-DCT-SVD based intravascular
5. Conclusion ultrasound video watermarking, in: 2012 World Congress on Information and
Communication Technologies (WICT), October 2012, pp. 224–229.
[18] N. Dey, S. Samanta, X. Yang, A. Das, S. Chaudhuri, Optimization of scaling
This paper proposed a new blind Fast Discrete Curvelet Trans-
factors in electrocardiogram signal watermarking using cuckoo search, Int. J.
form (FDCuT); Discrete Cosine Transform (DCT) and White Gaus- Bio-Inspired Comput. 5 (5) (2013) 315–326.
sian Noise sequences based medical image watermarking [19] Chakraborty S., Samanta S., Biswas D., Dey N., Chaudhuri S., Particle swarm
optimization based parameter optimization technique in medical information
technique. For blind extraction of watermark data, mid band fre-
hiding, in: 2013 IEEE International Conference on Computational Intelligence
quency DCT coefficients of HF curvelet subband of the medical and Computing Research (ICCIC), pp. 1–6, December 2013.
image is modified by two WGN sequences in such a way that blind [20] D. Biswas, P. Das, P. Maji, N. Dey, S. Chaudhuri, Visible watermarking within
extraction of watermark bit is possible at detector side. The pro- the region of non-interest of medical images based on fuzzy c-means and
Harris corner detection, in: 4th International Workshop Communications
posed scheme is tested for various medical images such as X-ray, Security & Information Assurance (CSIA-2013), Springer, 2013, pp. 161–168.
US, MRI, and CT and compared with the performance of existing [21] S. Acharjee, R. Ray, S. Chakraborty, S. Nath, N. Dey, Watermarking in motion
scheme [18]. It is found that proposed scheme performed better vector for security enhancement of medical videos, IEEE Int. Conf. Control
Instrum. Commun. Comput. Technol. (2014) 532–537.
than existing schemes [3,18,25] in terms of imperceptibility, [22] H. Nyeem, W. Boles, C. Boyd, A review of medical image watermarking
robustness, and security. The average PSNR value is above 45 dB, requirements for teleradiology, J. Digit. Imaging 26 (2) (2013) 326–343.
and NC value is above 0.94 for all types of watermarked medical [23] A. Singh, Some new techniques of improved wavelet domain watermarking for
medical images Ph.D. Thesis, NIT Kurukshetra, 2015.
image in the proposed scheme. This scheme may be used for med- [24] A. Singh, B. Kumar, M. Dave, A. Mohan, Multiple watermarking on medical
ical image protection in telemedicine application. The limitation of images using selective discrete wavelet transform coefficients, J. Med. Imaging
this proposed scheme is that noise is always present in the Health Inf. 5 (3) (2015) 1–8.
[25] R. Eswaraiah, E. Sreenivasa, Reddy, ‘‘Medical image watermarking technique
extracted watermark image. Further the method can embed only
for accurate tamper detection in roi and exact recovery of roi, Int. J. Telemed.
binary watermarks, and is unable to embed EPR data which is in Appl. 2014 (2014) 1–10.
text format. [26] R. Thanki, K. Borisagar, Biometric watermarking technique based on CS theory
and fast discrete curvelet transform for face and fingerprint protection, Adv.
Intell. Syst. Comput. 425 (2015) 133–144.
References [27] M. Bazargani, H. Ebrahimi, R. Dianat, Digital image watermarking in wavelet,
contourlet and curvelet domains, J. Basic Appl. Sci. Res. 2 (11) (2012) 11296–
[1] American Hospital Association, The promise of telehealth for hospitals, health 11308.
systems and their communities, Trend Watch, 2015. [28] J. Xu, H. Pang, J. Zhao, Digital image watermarking algorithm based on fast
[2] N. Yassin, Digital watermarking for telemedicine applications: a review, Int. J. curvelet transform, J. Softw. Eng. Appl. 3 (2010) 939–943.
Comput. Appl. 129 (17) (2015) 30–37. [29] C. Zhang, L. Cheng, Q. Zhengding, L. Cheng, Multipurpose watermarking based
[3] F. Thakkar, V. Srivastava, A blind medical image watermarking: DWT-SVD on multiscale curvelet transform, IEEE Trans. Inf. Forensics Secur. 3 (4) (2008)
based robust and secure approach for telemedicine applications, Springer, 611–619.
2016. Multimedia Tools and Applications. [30] E. Candes, L. Demanet, D. Donoho, L. Ying, Fast discrete curvelet transforms,
[4] S. Nagpal, S. Bhushan, M. Mahajan, An enhanced digital image watermarking SIAM Mult. Model Sim. 5 (3) (2006) 861–889.
scheme for medical images using neural network, DWT and RSA, Int. J. Mod. [31] E. Candes, D. Donoho, New tight frames of curvelets and optimal
Educ. Comput. Sci. 4 (2016) 46–56. representations of objects with pricewise-C2 singularities, Commun. Pure
[5] P. Kishore, M. Rao, Ch. Prasad, D. Kumar, Medical image watermarking: run Appl. Math. 57 (2004) 219–266.
through review, ARPN J. Eng. Appl. Sci. 11 (5) (2016) 2882–2899. [32] A. Jain, Fundamentals of digital image processing, Prentice Hall Inc., New
[6] A. Mahmood, Adaptive approaches for medical imaging security Ph.D. Thesis, Jersey, 1999, pp. 151–153.
University of Guelph, Canada, 2015. [33] P. Amin, L. Ning, K. Subbalakshmi, Statistically secure digital image data
[7] A. Singh, M. Dave, A. Mohan, Hybrid technique for robust and imperceptible hiding, IEEE 7th Workshop on Multimedia Signal Processing, pp. 1–4, 2005.
dual watermarking using error correcting codes for application in [34] J. Hernandez, M. Amado, F. Gonzalez, DCT-domain watermarking techniques
telemedicine, Int. J. Electron. Secur. Digit. Forensics 6 (4) (2014) 285–305. for still images: detector performance analysis and a new structure, IEEE
[8] N. Venkatram, L. Reddy, P. Kishore, Blind medical image watermarking with Trans. Image Process. 9 (2000) 55–68.
LWT-SVD for telemedicine applications, WSEAS Trans. Signal Process. 10 [35] C. Mancini, R. Bruce, OP amps for everyone, Texas Instruments, 2009. pp. 10–
(2014) 288–300. 11.
[9] S. Rathi, V. Inamdar, Medical images authentication through watermarking [36] MedPixTM Medical Image Database available at http://rad.usuhs.mil/medpix/
preserving ROI, Health Inf. Int. J. 1 (1) (2012) 27–42. medpix.html, https://medpix.nlm.nih.gov/home
[10] B. Kumar, H. Singh, S. Singh, A. Mohan, Secure spread spectrum watermarking [37] I.J. Cox, M.L. Miller, J.A. Bloom, Watermarking applications and their
for telemedicine applications, J. Inf. Secur. 2 (2011) 91–98. properties, in: Proceedings of the International Conference on Information
[11] S. Mostafa, N. El-sheimy, A. Tolba, F. Abdelkader, H. Elhindy, Wavelet packets Technology: Coding and Computing-ITCC 2000, 2000, pp. 6–10.
based blind watermarking for medical image management, Open Biomed. Eng. [38] B. Surekha, G. Swamy, Sensitive digital image watermarking for copyright
J. 4 (2010) 93–98. protection, Int. J. Netw. Secur. 15 (2) (2013) 95–103.
[12] H. Huang, W. Fang, S. Chen, Privacy protection and authentication for medical [39] B. Surekha, P. Babu, G. Swamy, in: IEEE International Conference on Computing
images with record-based watermarking, IEEE/NIH Life Science Systems and and Communication Technologies, Osmania University, Hyderabad, 2014, pp.
Applications Workshop, Bethesda, MD, USA, 2009. 1–5.
[13] M. Kallel, J. Lapayre, M. Bouhlel, A multiple watermarking scheme for medical
image in the spatial domain, GVIP J. 7 (1) (2007) 37–42.

Вам также может понравиться