1 Introduction

The emergence of modern technologies including IoT, IoMT, cloud computing, telemedicine, and other secluded health setups have overtaken conventional healthcare. Sharing of digital medical images over the cloud or internet is taking place in huge amounts resulting in increased active and passive attacks on this data. Manipulation, snoo**, deletion, copying, and other unauthorized access to medical data have increased by a huge amount [7, 8, 59, 60, 83, 88, 96]. The variation in medical image data along with the patient’s confidential data may lead to adverse effects. Yet there is an alarming increase in patient information-related thefts, even though it has been enlisted among the severe crimes. This has led the attention of various researchers towards enhancing the security of medical images. Various techniques have been developed for the secure communication of medical images along with the data being hidden within these images [19, 25, 49]. The main aim is that no person other than the two parties should be able to extricate the confidential message from the image. For such a purpose various data-hiding approaches like steganography, cryptography, fingerprinting, and digital watermarking have been proposed [8, 19, 20, 25, 49, 59] have presented an analysis of various medical image watermarking techniques to evaluate the robustness and precincts of these techniques. Thabit [84] has presented a review of medical image watermarking techniques specifically pertaining to authenticity verification. The review papers cited above and in Table 2 have not classified the Medical Image Watermarking Techniques in a broader spectrum and have just chosen to remain specific to a particular application. In this review, we have classified the medical image watermarking techniques into four broader classes and have provided the shortcoming of the literature for the readers to propose novel techniques by overcoming the potential challenges incurred in the already existing schemes. The earlier existing papers presenting the review of medical image watermarking techniques have not considered authentication, integration, and verification, although it is an important domain of medical image watermarking. Therefore there is a need for the updated review paper so as to fill the gap and shortage in the already existing literature. This will help the readers to quickly grasp the idea of existing literature and the shortcomings that need to be worked on for making the remote and online healthcare system more secure, convenient, and most importantly reliable.

Table 2 Summary of various review papers for medical image watermarking

The rest of the paper is organized as follows. Section 2 presents the prerequisites for medical image watermarking techniques followed by the general framework of digital image watermarking in Section 3. Section 4 presents applications of medical image watermarking techniques while Section 5 presents watermarking techniques for medical images. Section 6 gives the classification of medical image watermarking techniques based on domains. Further, Sections 7 and 8 present the State of the art watermarking techniques for medical images and assessment of watermarked medical images respectively. Section 9 presents the potential issues and challenges while the paper concludes in section 10.

2 Prerequisites for Medical Image Watermarking Techniques

There are several prerequisites for medical image watermarking. These have been depicted in Fig. 1.

Fig. 1
figure 1

Pre-requisites of medical image watermarking system

2.1 Image fidelity

It is a parameter that is used for the calculation of similarity between the original medical image and watermarked medical image [20, 88, 95]. The watermark should be embedded in the host medical image in a way that it (watermark) is not perceptible to the Human Visual System (HVS) and maintains the quality of the host image. This indicates that HVS should be unable to distinguish between the watermarked medical image and the original medical image. Image fidelity is one of the major properties a watermarking system should have, especially for medical image watermarking systems, where the slightest variation may cause the wrong diagnosis. Therefore, medical image watermarking systems should tend to keep the perceptivity as high as possible.

2.2 Image robustness

Robustness is the ability of the medical image watermarking system to withstand various signal processing and geometric attacks [89]. Since these images are susceptible to attacks including intentional as well as unintentional attacks, there is a requirement to check the robustness of the watermark against these attacks. Even though all medical image watermarking techniques need not be robust, some may be fragile. Fragile watermarks are those that neither resists intentional nor intentional attacks.

2.3 Image payload

It is the amount of data bits that can be obscured within the medical image without affecting/ degrading its quality. The payload can be embedded either to secure the image using a watermark or to send the message along with the image while maintaining its perceptual quality [9].

2.4 Image security

The medical image watermarking algorithm is said to be secure if the intruder is not able to extract the information embedded within the image [1]. Security of medical image is of prime importance due to the presence of crucial data including patient information, insurance information, and health-related information. This is usually obtained by the use of encryption keys with large key space while embedding and extracting the medical image watermark.

2.5 Watermark invisibility

Imperceptivity or watermark invisibility is the measure of similarity between the cover medical image (CMI) and the Watermarked Medical Image (WMI). It is the measure for the level of invisibility of the watermark in WMI and can be calculated as Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Metric (SSIM) [50, 88].

2.6 Reversibility

The reversibility is of paramount importance in the case of medical images since the slightest variation in medical image data may cause misdiagnosis leading to life-threatening consequences. Even after embedding the watermark or hiding data within the image, we can reconstruct the original image if the method is reversible. Although the watermarked image is not distortionless, the recovered image is distortion-free [26, 69].

2.7 Computational complexity

The complexity of the algorithm is determined by the time taken for its execution i.e., the time required for embedding and extraction of medical images. Medical image watermarking algorithms being mostly real-time, need to be efficient and computationally less complex [25].

2.8 Reliability

The MIWT needs to maintain the integrity, confidentiality, and authenticity of the data. This factor helps in gaining the trustworthiness of the patients over the electronic healthcare setup. Integrity ensures that the medical image data has not been manipulated or modified. Confidentiality ensures that only the authorized person has the access to the medical image data while authenticity ensures that the received medical image data is correct and authentic [57].

Further, we present the evaluation parameters and applications of various prerequisites in tabular form (Table 3).

Table 3 Evaluation parameters and their applications for MIWT

3 The general framework for digital image watermarking system

Digital watermarking is the method for hiding data in digital media. The watermark is hidden imperceptibly such that it can be used later for the identification and validation of data.

3.1 Basic elements of watermarking approaches

There are three basic components included in various watermarking approaches and these include:

  1. a)

    Generation of watermark

The watermark generation may vary for different applications according to specified properties and preferred objectives. Figure 2 depicts the process of generation of watermarking.

Fig. 2
figure 2

Generation of the watermark

  1. b)

    Hiding of watermark

Once the watermark is generated, it is hidden within the image to generate the watermarked image using a data hiding key. Figure 3 depicts the process of hiding the watermark.

Fig. 3
figure 3

Process of hiding the watermark

  1. iii)

    Extraction of watermark

At the receiver end, the process of extraction is done by performing a reverse information-hiding algorithm along with the use of the key. Figure 4 depicts the process of extraction of the watermark.

Fig. 4
figure 4

Process of extraction of the watermark

3.2 Basic components of medical image watermarking system

Section 3.1 described the general components of watermarking system. In this section, we introduce various other components required for MIWT. Figure 5 shows the components of medical image watermarking systems. These include:

Fig. 5
figure 5

Basic components of medical image watermarking system

  1. a)

    Generation of the medical image

Various methods including Computed Tomography Scan (CT), X-Rays, Magnetic Resonance Imaging (MRI), and other modalities have been developed in order to deliver better healthcare services to patients. It has helped doctors in proper diagnosis and hence is most commonly used. Medical images are collected according to the requirements of the patient. Once these images are generated, they can be used for diagnosis [12].

  1. b)

    Storage of medical image

After the generation of medical images, there is a need to store these medical images [64].

  1. iii)

    Data embedding and generation of authentication information

The EHI simultaneously with the authentication data is embedded within the medical image. After embedding this data in the medical image, we obtain a watermarked medical image that can be used for authentication prior to diagnosis [25].

  1. iv)

    Communication networks

The watermarked medical image is sent over an insecure communication network for remote doctor’s advice or a second opinion.

  1. e)

    Receipt of medical image

The medical image sent over communication networks is received via different devices including personal computers, smartphones, etc.

  1. f)

    Data extraction and verification of authenticity

On reception of the medical image, the data including patient information and authentication bits need to be extracted to verify the authenticity of the medical image. This is an important part of MIWT since unverified images may lead to wrong diagnosis and loss of patient information [25].

  1. g)

    Sharing for diagnosis

On verification of the medical image, it is shared with the doctor for diagnosis and required treatment.

4 Applications of MIWT’s

For safeguarding and securing medical images against various malicious attacks, watermarking plays an important role. The various applications of MIWT’s include:

  1. a)

    Providence of EHR

The EHR’s are embedded within the medical images for protecting their confidentiality. In region-based methods, this confidential information is embedded in Non-Region of Interest (NROI) in order to save the Region of Interest (ROI) from any degradation.

  1. b)

    Providence of medical prescription

Medical professionals these days tend to store and share medical prescriptions. These electronic prescriptions can be shared with other remote doctors for their opinion. It has made electronic healthcare cost-effective and easily accessible.

  1. iii)

    Providence of sensitive data

MIWT’s tend to secure patient information like insurance information, patient identity, patient payment information, etc. this information needs to be protected and secured since privacy, confidentiality, and trustworthiness are main necessities for MIWT’s.

  1. iv)

    Providence of medical image

An enormous amount of medical image data is generated in healthcare centers due to the gaining speed of electronic healthcare setups. This data is sent over the insecure channels for remote diagnosis and further monitoring of the patient. Various image modalities include CT scans, MRIs, ultrasonography, echocardiography, radiography, and functional MRI. The MIWT’s should be designed in a way that should conceal the information with nominal distortion.

5 Watermarking techniques for medical images

Watermarking is considered to be the best solution for protecting EPR’s containing sensitive patient information while the transmission of medical images [4, 16, 18, 21, 36, 38]. The fact that transmission over insecure channels leads to the stealing of biomedical images, has become a substantial concern for various researchers. This data is usually at risk of being manipulated intentionally or unintentionally. Further, the data can undergo various malicious attacks that may cause a loss of trustworthiness in the newly developed medical image communication system. Watermarking has been considered to be the best solution for the authentication and protection of medical images and EPR’s containing sensitive patient information while transmitting insecure channels.

Medical image authentication can be performed using the following two methods (Fig. 6).

Fig. 6
figure 6

Methods of medical image authentication techniques

5.1 Image-based watermark embedding

A logo or a watermark containing patient information is used for the validation of medical images [25]. This image can be encrypted prior to data embedding so that it cannot be decrypted other than a person who has the decryption keys.

The process of image-based watermarking is shown in Fig. 7.

Fig. 7
figure 7

Process of image-based watermarking

5.2 Self-generated watermark embedding

For authentication of medical images, a watermark required to authenticate the medical image data is generated from the image itself [70, 82]. This makes the watermarking algorithm dynamic in nature since the watermark is different for different images. The watermark can also be encrypted and embedded using a security key to obtain the watermarked image. The process of self-generated watermark embedding is shown in Fig. 8.

Fig. 8
figure 8

Process of self-generated watermark embedding

The watermarking techniques for image authentication can be either block-based [11, 25] or pixel-based [94, 97]. Pixel-based algorithms show higher accuracy because of the fact that in the block-based method, the presence of even a single altered pixel in the block leads to the declaration of the whole block as invalid. The authentication watermark can be further utilized for tamper detection, localization, and recovery (Fig. 9).

Fig. 9
figure 9

Utilization of Medical image authentication watermarking

Over years, various medical image authentication techniques have been presented [6, 10, 66, 76, 96] with different motives including tamper detection, tamper localization, and tamper recovery [22, 75]. The techniques developed for watermarking medical images should take image quality as a priority because distortion in these images can be fatal. These techniques should be computationally efficient as they have real-time applications. Watermarking techniques for Medical Image Authentication (WTMIA) are either region-based [46] or whole image based [25]. In the region-based method, there is the division of the medical image into ROI and NROI [69]. ROI contains the major portion of concern for diagnosis and hence needs to be accurate. For such a purpose, many watermarking techniques do not consider ROI for watermarking or data hiding. Also, many reversible data-hiding techniques have been developed for embedding watermark in ROI. The reversible watermarking techniques have the ability to reconstruct the lossless image at the receiver making it an efficient method for medical image watermarking.

For various WTMIA, there is always a trade-off. On increasing the data (i.e., detecting, localizing, and recovering the tamper), there will be a decrease in perceptual quality. In such a case, region-based watermarking plays a significant role wherein tamper detection, localization, and recovery of ROI is a priority. This decreases the number of bits being embedded within the image there are some cases the whole image is important for diagnosis by a remote doctor.

6 Classification of MIWT’s based on domains

The MIWT’s can be classified into two groups based on domain. These are discussed in the following subsections.

6.1 Spatial domain techniques

The spatial domain techniques for MIW modify the pixel intensity values of the medical image directly [57]. These techniques are computationally efficient, simple, and provide a higher payload. Spatial domain techniques provide the above-mentioned advantages but at the same time have several disadvantages. These techniques do not survive certain attacks. Also, the discovery of the watermarking techniques used for embedding can easily give access to the unauthorized user to obtain and alter the embedded watermark. Figure 10 a shows the general flow diagram for spatial domain watermark embedding and Fig. 10 b shows watermark extraction.

Fig. 10
figure 10

a The general flow diagram for spatial domain watermark embedding. b The general flow diagram for spatial domain watermark extraction

  1. a)

    Least Significant Bit Substitution (LSB)

It is one the oldest and yet simple methods for watermarking in the spatial domain. It is done by embedding the watermark in LSB [74]. The watermark is encoded before embedding. To embed the encoded bits, the pixel values are converted to the binary form and the rightmost bit of every pixel is replaced by the encoded watermark bits. After the replacement of LSB, the binary value image pixel is converted back to the decimal value image pixel. This has been illustrated in Fig. 11 a. Further, the flow graph for LSB substitution has been shown in Fig. 11 b.

Fig. 11
figure 11

a LSB substitution in image pixels. b Flow graph for LSB substitution

  1. b)

    Modification of image histogram

Histogram modification is another spatial domain technique that has been used for data hiding in the medical image [69]. This scheme makes use of peak bins to embed data in a histogram. This method is easy to implement, yet its embedding capacity is restricted to a number of maximum or peak points that are available.

  1. iii)

    Local Binary Patterns

LBT is the spatial domain technique that makes use of the difference value between the central pixel and other pixels. It segments the image into non-overlap** blocks before calculating the differences. Then, embedding is done in these pixels according to the rules given in [91].

6.2 Transform domain techniques

Transform domain techniques generate the transform coefficients once they are applied to medical images. These coefficients are used for embedding the data. The most commonly used transform domain techniques include Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DFW). The general flow graph for data embedding and extraction in the transform domain is presented in Fig. 12 a and 12 b respectively. At first, the image is transformed using a specific transformation. Then embedding is carried in the coefficients of the transform domain. The embedded data can be the authentication data or a logo required for verification of the medical image. After embedding the data, the image is transformed back to its original form for obtaining the watermarked image. At the receiver, extraction of the embedded data along with the generation of authentication data is carried out to validate the image. If the generated data is similar to that of embedded data, then the algorithm is terminated and the image is considered to be valid else tamper detection, localization, and recovery are carried out to obtain the tamper-corrected image.

Fig. 12
figure 12

a The general flow diagram for transform domain watermark embedding. b The general flow diagram for transform domain watermark extraction and authentication

These transform domain techniques have been discussed as under:

  1. a)

    Discrete Fourier Transform

It is the most approachable technique for the conversion of medical image from the spatial domain to the transform domain [76]. It decomposes the Medical image into sine and cosine forms. It has the ability to provide resistance against various geometrical attacks. Let ft(k, l) represent the image with dimensions P×Q, k = 0, 1, 2, …, (P-1) and l = 0, 1, 2, …, (Q-1). The DFT and Inverse DFT (IDFT) can be calculated using the following formulas

$${F}_T\left(m,n\right)=\sum_{k=0}^{P-1}\sum_{l=0}^{Q-1}{f}_t\left(k,l\right){e}^{-j2\pi \left(\frac{mk}{P}-\frac{nl}{Q}\right)}$$
(1)

And

$${f}_T\left(k,l\right)=\frac{1}{PQ}\sum_{m=0}^{P-1}\sum_{n=0}^{Q-1}{F}_T\left(m,n\right){e}^{j2\pi \left(\frac{mk}{P}+\frac{nl}{Q}\right)}$$
(2)

Here FT(u, v) is DFT coefficient with u = 0, 1, 2, …, P-1 and v = 0, 1, 2, …, Q-1. DFT composes the image into amplitude part and Phase part. The amplitude part is used for watermark embedding since it contains a lesser amount of information in it and helps in the reduction of image distortion.

  1. b)

    Discrete Cosine Transform

DCT provides an attractive and efficient image transformation that maps linearly and the n-dimensional vector to n number of coefficients. It divides the image into three different frequency components: Low-Frequency Component (LFC), Middle-Frequency Component (MFC), and High-Frequency Component (HFC). The highest amount of energy is compressed LFC [73]. DCT has higher robustness towards JPEG compression but shows a lag in resistance toward the geometric attacks including crop**, rotation, scaling, etc. the DCT and its inverse have been shown in the following equations.

$${C}_T\left(u,v\right)=\frac{2}{\sqrt{pq}}\beta (u)\beta (v)\sum_{x=0}^{p-1}\sum_{y=0}^{q-1}{f}_T\left(x,y\right)\times Cos\left(\frac{\left(2x+1\right) u\pi}{2p}\right)\times Cos\left(\frac{\left(2y+1\right) v\pi}{2q}\right)$$
(3)

And

$${f}_t\left(x,y\right)=\frac{2}{\sqrt{pq}}\sum_{u=0}^{p-1}\sum_{v=0}^{q-1}\beta (u)\beta (v){f}_T\left(x,y\right)\times Cos\left(\frac{\left(2x+1\right) u\pi}{2p}\right)\times Cos\left(\frac{\left(2y+1\right) v\pi}{2q}\right)$$
(4)

Here p and q are the block size and fT(x, y) represents the original image pixel, CT(u, v) is the transform domain coefficient and β(u) and β(v) is calculated as

$$\beta (u),\beta (v)=\left\{\begin{array}{c}\frac{1}{\sqrt{2}}, if\ u,v=0\\ {}1,\kern0.5em else\end{array}\right.$$
(5)
  1. iii)

    Discrete Wavelet Transform

DWT is the most efficient and commonly used transform domain technique. Due to the multi-resolution properties, it provides accurate spatial localization. It decomposes the image into four sub-bands including Low Low (LL), Low High (LH), High Low (HL), and High High (HH) as shown in Fig. 13. LL sub-band contains the most significant information regarding the image details while other sub-bands contain the detail that is missed in LL sub-band. Further, DWT offers the decomposition of LL sub-band hierarchically [13, 86]. The energy in the case of DWT is calculated using the following equations.

$${E}_N=\frac{1}{P_N{Q}_N}\sum_k\sum_l\mid {I}_C\left(k,l\right)\mid$$
(6)
Fig. 13
figure 13

Decomposition of the sub-bands in DWT

Here N represents the number of levels considered for decomposition, PN and QN represent image dimensions and IC gives the coefficients of the current sub-bands.

Further, we present the pros and cons of the spatial domain and transform domain techniques for the readers to get better discernment for choosing the domain of watermarking according to their requirements (Table 4).

Table 4 Pros and Cons of Spatial domain and Transform domain techniques

7 State of the Art watermarking techniques for medical image

7.1 Classical watermarking techniques for medical images

Classical watermarking or conventional watermarking takes whole image into consideration for watermarking. In medical images, distortion is not feasible and no radiologist may accept a distorted image for diagnosis. It may lead to wrong diagnosis leading to an increase in research pertaining to reversible data hiding (RDH). RDH has the capability to restore the original image from the image in which data is hidden. Figure 14 a shows the classical approach for embedding data while Fig. 14 b shows the extraction process.

Fig. 14
figure 14

a Classical approach for data embedding in medical images. b Classical approach for data extraction in medical images

The state-of-the-art techniques along with evaluation parameters, pros, and cons of classical watermarking techniques for medical image watermarking have been presented in Table 5 [14, 25, 27, 33, 47, 48, 56, 66, 71, 86].

Table 5 Evaluation Parameters, Pros, and Cons of classical watermarking techniques for medical image watermarking

7.2 Reversible watermarking for medical images

Embedding data into an image may lead to distortion of the image when compared to the original image. This distortion may lead to the wrong diagnosis and may prove fatal for the patient’s health. For such a purpose, reversible data-hiding techniques have been developed. These techniques can reconstruct the original image along with the embedded data accurately. Figure 15 a shows the framework for data embedding in reversible watermarking techniques for medical images and Fig. 15 b shows the data extraction and reconstruction of the original image after the extraction of hidden data.

Fig. 15
figure 15

a Embedding stage for reversible data hiding. b Extraction and reconstruction stage of reversible data hiding

The state-of-the-art techniques along with evaluation parameters, pros, and cons of reversible watermarking techniques for medical image watermarking have been presented in Table 6 [24, 26, 29, 32, 34, 40, 43, 52, 53, 67, 92].

Table 6 Evaluation Parameters, Pros, and Cons of Reversible data hiding techniques for medical image watermarking

7.3 Region-based watermarking techniques for medical images

Medical images can be divided into two regions namely ROI and NROI. ROI contains the important region for diagnosis purpose while the region other than ROI mostly contains black background which has no significance for diagnosis [69]. Usually, ROI is not preferred for data hiding since it contains significant information and its distortion is not acceptable. There are several methods that use NROI for hiding data but these methods have certain shortcomings. In this method, the amount of data to be embedded is determined by the size of the NROI. Further, it does not protect ROI from various malicious attacks. Also, these methods can only be implemented if NROI is present. Figure 16 a and 16 b show the data embedding and extraction in the case of region-based methods.

Fig. 16
figure 16

a Embedding stage for region-based watermarking techniques. b Extraction stage for region-based watermarking techniques

The state-of-the-art techniques along with evaluation parameters, pros, and cons of the region-based watermarking techniques for medical image watermarking have been presented in Table 7 [2, 17, 35, 42, 45, 55, 62, 74, 77, 80].

Table 7 Evaluation Parameters, Pros, and Cons of Region-based watermarking techniques for medical image watermarking

7.4 Authentication-based watermarking techniques for medical images

Authentication of images is a part of watermarking schemes. The authentication watermarking techniques for medical images (AWTMI) can perform operations including Medical Image Tamper Detection (MITD), Medical Image Tamper Localization (MITL), Medical Image Tamper Recovery (MITR), and EHR embedding (Fig. 17). MITD can be done using a logo, generating the data using a hash function for ROI or whole image, the identity of patients or doctors, medical image features, etc.

Fig. 17
figure 17

Authentication-based watermarking techniques for medical images

MITL is usually done by generating the average of each block of the image, using a logo, etc. MITR can be ROI-based or whole image based. It is usually done by considering the image pixels directly. Recovery of images increases image payload due to the fact that recovery of the image requires more data. The data is either generated from the average of each block or by using compression methods. EHR contains information related to the patient including patient identity, medical prescription, insurance information, payment information, etc. these watermarks are embedded either in the spatial domain (pixel domain) or in the transform domain in a medical image [15, 25]. The two main processes included in the watermarking process are watermark embedding and extraction as discussed earlier. Depending on the applicability of watermarking, the process of embedding and extraction is carried out. If we require only the detection of tamper in medical images, once detected the algorithm is terminated else the algorithm goes on till it performs the function of localizing and recovering the tamper. Most of the MIAT applied in the spatial domain use LSB substitution, difference expansion, exclusive OR, or chaotic key for watermarking. Spatial domain techniques make use of DCT, DWT, and others. Further, the watermarking domain can be selected on the basis of the required application.

Figure 18 a and 18 b show the framework for data embedding and extraction in authentication-based watermarking schemes. The state-of-the-art techniques along with evaluation parameters, pros, and cons of authentication-based watermarking techniques for medical image watermarking have been presented in Table 8 [30, 41, 44, 51, 61, 63, 68, 79, 81, 85]. Further in Table 9 we present the comparative analysis of several existing schemes in terms of PSNR, SSIM, and computational complexity.

Fig. 18
figure 18

a Embedding in authentication based watermarking schemes. b Extraction in authentication-based watermarking schemes

Table 8 Evaluation Parameters, Pros, and Cons of Authentication-based watermarking techniques for medical image watermarking
Table 9 Evaluation Parameters for various techniques presented in the review

8 Evaluation parameters for MIWT’s

For the evaluation of MIWT, various metrics can be calculated in order to determine the degree of distortion of the watermarked image. Also, the extracted watermark can be tested for its accuracy.

8.1 Assessment of watermarked medical Images

Various parameters including Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), and Structural Similarity Index Matrices (SSIM) can be calculated for the estimation of distortion among the original and watermarked image. For an image (O) of size P×Q and watermarked image OW, the above-mentioned parameters are calculated as under:

  1. a)

    Mean Square Error

MSE can be calculated among O and OW using the following equation [50].

$$MSE\left(O,{O}_W\right)=\frac{1}{PQ}\sum_{k=0}^{P-1}\sum_{l=0}^{Q-1}{\left(O\left(k,l\right)-{O}_W\left(k,l\right)\right)}^2$$
(7)
  1. b)

    Structural Similarity Index Metrics

SSIM gives the measure of correspondence among the images O and OW. It can be calculated using an equation [90].

$$SSIM\left(O,{O}_W\right)={\left[l\left(O,{O}_W\right)\right]}^{\alpha }.{\left[c\left(O,{O}_W\right)\right]}^{\beta }.{\left[s\left(O,{O}_W\right)\right]}^{\Upsilon}$$
(8)

Here,

$$l\left(O,{O}_W\right)=\frac{2{\upmu}_O{\upmu}_{O_W}+\textrm{E}1}{{\upmu_O}^2+{\upmu_{O_W}}^2+\textrm{E}1}$$
(9)
$$l\left(O,{O}_W\right)=\frac{2{\sigma}_O{\sigma}_{O_W}+E2}{{\sigma_O}^2+{\sigma_{O_W}}^2+\textrm{E}2}$$
(10)
$$l\left(O,{O}_W\right)=\frac{\sigma_{O{O}_W}+\textrm{E}3}{\sigma_O{\sigma}_{O_W}+\textrm{E}3}$$
(11)

In the above equations, μO, μOW are local means, σ0, σ0W are standard deviations and σOOW is the cross-covariance between the two images O and OW. On default selection of exponents and E3, the equation is reframed as under

$$SSIM\left(O,{O}_W\right)=\frac{\left(2{\upmu}_O{\upmu}_{O_W}+\textrm{E}1\right)\left(2{\sigma}_{O{O}_W}+\textrm{E}2\right)}{\left({\upmu_O}^2+{\upmu_{O_W}}^2+\textrm{E}1\right)\left({\sigma_O}^2+{\sigma_{O_W}}^2+\textrm{E}2\right)}$$
(12)
  1. iii)

    Peak Signal to Noise Ratio

PSNR is the measure of visual quality distortion among the two images O and OW. A high value of PSNR depicts higher visual similarity between the images [6]. PSNR is calculated using the following equation.

$$PSNR\left(O,{O}_W\right)=10\ {\log}_{10}\frac{255^2}{MSE}$$
(13)

PSNR is determined in terms of decibels (dB)

A high PSNR value indicates better perceptual quality. A PSNR value of 100 dB indicates no distortion. PSNR value of above 40 dB is acceptable for medical images. SSIM close to 1 indicates better image similarity. BER value close to 0 indicates lesser distortion among the original and watermarked image.

8.2 Assessment of extracted watermarked

To verify the reliability of the extracted watermark, various parameters can be evaluated. Let ‘L’ be the embedded logo or watermark and L’ be the extracted watermark, following are the various metrics calculated for assessment of extracted watermark.

  1. a)

    Correlation coefficient (CR)

CR is used to analyze the correspondence between L and L’. Its value ranges from 0 to 1 and it is calculated using the following equation [31].

$$CR=\frac{\sum_k\sum_lL\left(r,s\right){L}^{\prime}\left(r,s\right)}{\sqrt{\sum_k\sum_lL{\left(r,s\right)}^2\times \sum_k\sum_l{L}^{\prime }{\left(r,s\right)}^2}}$$
(14)
  1. b)

    Bit Error Rate (BER)

BER is the metric that gives the measure of wrongly extracted bits in binary sequence [28]. Lower BER depicts the efficiency of the embedding algorithm. BER is calculated as

$$BER=\frac{Number\ of\ wrongly\ decoded\ bits}{Total\ number\ of\ watermark\ bits}$$
(15)
  1. iii)

    Accuracy Rate (AR)

AR is metric that gives the measure of correctly extracted bits in a binary sequence [28]. The higher the value of AR, the better is the embedding algorithm. It can be calculated using the following equation.

$$AR=\frac{Number\ of\ correctly\ decoded\ bits}{Total\ number\ of\ watermark\ bits}$$
(16)

8.3 Assessment of embedding capacity

Embedding capacity or payload refers to the total number of binary data that can be embedded in the medical image using a particular watermarking algorithm. The payload can be calculated using the following equation.

$$EC=\frac{Number\ of\ binary\ bits\ that\ can\ be\ embedded}{Number\ of\ pixels\ in\ medical\ image}$$
(17)

8.4 Assessment of False Positive and False Negative Rates

In authentication-based watermarking schemes, classification on the basis of erroneous detection of pixels as tampered or non-tampered is done. False Positive Rates give the number of pixels erroneously detected as non-tampered whereas False Negative Rates (FNR) give the number of pixels erroneously detected as tampered. Further, the Tamper Detection Rate (TDR) gives the proportion of pixels sensed as tampered to the overall tampered pixels.

$${F}_{PR}\%=\frac{False\ detected\ tampered\ pixels}{Total\ number\ of\ pixels\ present\ in\ tampered\ regions}\times 100$$
(18)
$$F_{NR}\%=\frac{False\;detected\;non\;tampered\;pixels}{Total\;number\;of\;pixels\;present\;in\;non\;tampered\;regions}\times100$$
(19)
$${F}_{DR}\%=\frac{Number\ of\ pixels\ detected\ as\ tampered}{Number\ of\ actual\ tampered\ pixels}\times 100$$
(20)

9 Potential issues and challenges

Plenty of research has been carried out for watermarking in medical images. Various methods have been developed for the purpose of medical image authentication. Yet, there are potential issues and challenges that limit the practicality of health-related watermarking systems. This can be attributed to the fact that a trade-off always exists amid the necessities of watermarking systems (i.e., perceptivity, payload, security, robustness). It is not possible to accomplish these requirements altogether. For such a purpose, the medical image watermarking system should be able to attain a better trade-off among the above-given requirements. The potential issues and challenges of medical image watermarking techniques observed from the above-mentioned schemes have been summarized below

  • Medical image watermarking systems should attain better trade-offs among perceptivity, payload, and robustness.

  • These techniques have real-time applications, therefore should be computationally efficient.

  • Reversible data hiding is found to be an efficient technique in medical images, due to its ability to reconstruct the original cover at the receiver.

  • Compression techniques can be used for the enhancement of image payload while reducing storage requirements.

  • Several methods in medical image watermarking are able to detect tampered regions, but only a few are able to reconstruct these regions.

  • The time requirements for embedding/encryption, extracting/ decryption, and image reconstruction need to be considered because the process altogether should not be time-consuming.

  • For enhancing the security of medical images and EHI encryption algorithms can be used. However, there is a need to consider other parameters that depict the efficiency of the system.

  • On develo** the medical image watermarking system, it should be evaluated for its performance on various image processing and geometric attacks.

  • In ROI and NROI-based watermarking techniques, there is a possibility of the absence of NROI. Even if the NROI is present its size depicts the amount of data that can be hidden in the image.

  • To ensure reliability and perceptual quality, almost every method makes use of two benchmarks namely PSNR and SSIM. Yet, there is a need for considering clinically relevant information in order to provide an accurate diagnosis. Therefore, the addition of benchmarks that access the watermarking system clinically to enhance its relevance and credibility should be considered.

10 Conclusions

Medical image watermarking is taking a lead in the present world and has the latency to provide an appreciable solution for various applications of e-healthcare. The challenges do not only include confidentiality but also include the prevention of manipulations because of authorized or unauthorized users, so that trust may be built in the e-healthcare setups. Several medical image watermarking techniques have been developed in spatial and transform domains with a different applicability. This paper presents a compendious survey of various medical image watermarking techniques using classical methods, reversible data hiding, ROI-based watermarking, and authentication-based watermarking. Further, various prerequisites along with the general framework of medical image watermarking and its capabilities have been discussed. We have presented the critical review in tabular form for various notable medical image watermarking schemes. The aim of this survey is to help future researchers to propose medical image watermarking techniques that might address the potential issues and challenges in e-healthcare setups. Furthermore, these techniques can be collaborated with machine learning algorithms [5, 65, 78] for providing better security.