Abstract
With the rapid growth in communication and computing technologies, the transmission of medical images over the Internet is on the rise. In such a scenario, there is a special need to meet the security and privacy issues and challenges of individual and Intellectual Property (IP) owners. It is highly important for an individual to keep his/her personal medical images against invalid manipulation by impostors. Hence developments of authentication and tamper detection techniques are the need of the hour. For this, a tamper detection and self-recovery watermarking scheme for medical images based on texture degree and cross-embedding is proposed in this paper. Firstly, divide medical images into ROI (Region of Interest) and RONI (Region of Non-Interest); generate a double authentication watermark in ROI to improve the accuracy of tamper detection and reduce the probability of false alarm; calculate texture complexity based on 4-dimensional features in ROI, and divide ROI into texture blocks and smooth blocks; generate different recovery watermarks according to the characteristics of different blocks using compression-aware technology. Then, hide the recovery watermark in RONI based on the reference matrix and cross-embedding technology. Finally, locate the tampered blocks in the ROI based on three level tamper detection strategy including pixel-level, block-level, and multi-direction subband-level; restore the tampered region by the extracted recovery watermark. The experimental results indicate that the tamper detection accuracy of the ROI region is close to 100%. Additionally, at an embedding rate of 1.4074bpp, the PSNR reaches 45.0217 dB and the NC is 0.99. In addition, the scheme provides promising results against copy-paste attacks, collage attacks and steganalysis. Also, the scheme achieves privacy protection. This clearly demonstrates that the proposed scheme has several advantages, including strong tamper detection capability, effective self-recovery, high security, excellent concealment, and robustness.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig12_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig13_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig14_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig15_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig16_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig17_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig18_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig19_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig20_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig21_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig22_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig23_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig24_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16679-x/MediaObjects/11042_2023_16679_Fig25_HTML.png)
Similar content being viewed by others
Data availability
Data will be made available on reasonable request.
References
AlShaikh M (2023) A novel tamper detection watermarking approach for improving image integrity[J]. Multimed Tools Appl 82(7):10039–10060
Alshanbari HS (2021) Medical image watermarking for ownership & tamper detection[J]. Multimed Tools Appl 80(11):16549–16564
Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery[J]. Int J Mach Learn Cybern 7(6):1225–1239
Benrhouma O (2023) Cryptanalysis and improvement of a semi-fragile watermarking technique for tamper detection and recovery[J]. Multimed Tools Appl 82:22149–22174
Bhardwaj R, Aggarwal A (2021) An enhanced separable reversible and secure patient data hiding algorithm for telemedicine applications[J]. Expert Syst Appl 186:115721
Bhardwaj R, Singh A (2021) An efficient reversible and secure patient data hiding algorithm for E-healthcare[J]. Multimed Tools Appl 80(21–23):31687–31703
Boroumand M, Chen M, Fridrich J (2019) Deep residual network for steganalysis of digital images[J]. IEEE Trans Inf Forensic Secur 14(5):1181–1193
Chang CC, Chou YC, Kieu TD (2008) An information hiding scheme using sudoku. The 3rd International Conference on Innovative Computing Information and Control, vol 8, pp 10184692
Chang C, Lin C, Su G (2020) An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC[J]. Multimed Tools Appl 79(33–34):24795–24824
Chen K, Chang C (2019) High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement[J]. J Vis Commun Image Represent 58:334–344
Chen X, Hong C (2021) An efficient dual-image reversible data hiding scheme based on exploiting modification direction[J]. J Inf Secur Appl 58:102702
Chen Y, Yau H, Yang G (2013) A maximum entropy-based chaotic time-variant fragile watermarking scheme for image tampering detection[J]. Entropy 15(8):3170–3185
Chidambaram N, Raj P, Thenmozhi K et al (2021) A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images[J]. Multimed Tools Appl 80(15):23359–23375
Chowdhuri P, Jana B (2020) Hiding data in dual color images reversibly via weighted matrix[J]. J Inf Secur Appl 50:102420
Clark K, Vendt B, Smith K et al (2013) The Cancer imaging archive (TCIA): maintaining and operating a public information repository[J]. J Digit Imaging 26(6):1045–1057
De S, Bhaumik J, Giri D et al (2023) A new robust and fragile scheme based on chaotic maps and dwt for medical image security[J]. Multimed Tools Appl 82(8):11753–11792
Delp E, Mitchell O (1979) Image compression using block truncation coding[J]. IEEE Trans Commun 27(9):1335–1342
Gao G, Tong S, **a Z et al (2021) Reversible data hiding with automatic contrast enhancement for medical images[J]. Signal Process 178:107817
Geetha R, Geetha S (2020) Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique[J]. Multimed Tools Appl 79(19–20):12869–12890
Geetha R, Geetha S (2018) Improved reversible data embedding in medical images using I-IWT and pairwise pixel difference expansion. International Conference on Next Generation Computing Technologies, vol 9, pp 601–611
Gull S, Mansour RF, Aljehane NO et al (2021) A self-embedding technique for tamper detection and localization of medical images for smart-health[J]. Multimed Tools Appl 80(19):29939–29964
Iseed SY, Mahmoud KW (2023) Forensic approach for distinguishing between source and destination regions in copy-move forgery[J]. Multimed Tools Appl 82:31181–31210
Jaiswal AK, Srivastava R (2023) Fake region identification in an image using deep learning segmentation model[J]. Multimed Tools Appl:1–21. https://doi.org/10.1007/s11042-023-15032-6
Lema M, Mitchell O (1984) Absolute moment block truncation coding and its application to color images[J]. IEEE Trans Commun 32(10):1148–1157
Liao X, Yu YB, Li B et al (2020) A new payload partition strategy in color image steganography.[J]. IEEE Trans Circ Syst Vid Technol 30(3):685–696
Liao X, Yin JJ, Chen ML et al (2022) Adaptive payload distribution in multiple images steganography based on image texture features[J]. IEEE Trans Depend Sec Comput 19(2):897–911
Lu W, Xu WB, Sheng ZQ (2023) An interpretable image tampering detection approach based on cooperative game[J]. IEEE Trans Circ Syst Vid Technol 33(2):952–962
Lin C, Liu X, Tai W et al (2015) A novel reversible data hiding scheme based on AMBTC compression technique[J]. Multimed Tools Appl 74(11):3823–3842
Mansour RF, Parah SA (2021) Reversible data hiding for electronic patient information security for telemedicine applications[J]. Arab J Sci Eng 46(9):9129–9144
Otair M, Abualigah L, Qawaqzeh MK (2022) Improved near-lossless technique using the Huffman coding for enhancing the quality of image compression[J]. Multimed Tools Appl 81(20):28509–28529
Reddy GT, Bhattacharya S, Ramakrishnan SS et al (2020) An ensemble based machine learning model for diabetic retinopathy classification. 2020 international conference on emerging trends in information technology and engineering (ic-ETITE), vol 19573816, pp 1–6
Sanivarapu PV, Rajesh KNVP, Reddy NVR et al (2020) Patient data hiding into ECG signal using watermarking in transform domain[J]. Phys Eng Sci Med 43(1):213–226
Sanivarapu PV (2022) Adaptive tamper detection watermarking scheme for medical images in transform domain[J]. Multimed Tools Appl 81(8):11605–11619
Shi H, Wang XH, Li MC et al (2017) Secure variable-capacity self-recovery watermarking scheme[J]. Multimed Tools Appl 76(5):6941–6972
Showkat S, Parah SA, Gull S (2021) Embedding in medical images with contrast enhancement and tamper detection capability[J]. Multimed Tools Appl 80(2):2009–2030
Singh S, Singh SK, Udmale SS (2023) An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability[J]. Multimed Tools Appl 82(1):1045–1066
Su G, Chang C, Chen C (2021) A hybrid-Sudoku based fragile watermarking scheme for image tampering detection[J]. Multimed Tools Appl 80(8):12881–12903
Swaraja K, Meenakshi K, Kora P (2020) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine[J]. Biomed Signal Process Control 55:101665
Tan JX, Liao X, Liu JT et al (2022) Channel attention image steganography with generative adversarial networks[J]. IEEE Trans Netw Sci Eng 9(2):888–903
Thanki R, Borra S (2019) Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing[J]. Multimed Tools Appl 78(10):13905–13924
Wang X, Chang C, Lin C (2021) Reversible data hiding in encrypted images with block-based adaptive MSB encoding[J]. Inf Sci 567:375–394
Yang Y, Zhang W, Liang D et al (2018) A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images[J]. Multimed Tools Appl 77(14):18043–18065
Yu J, Kuang Z, Zhang B et al (2018) Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing[J]. IEEE Trans Inf Forensic Secur 13(5):1317–1332
Yu M, Wang J, Jiang G et al (2015) New fragile watermarking method for stereo image authentication with localization and recovery[J]. AEU Int J Electron Commun 69(1):361–370
Acknowledgments
Supported by National Science Foundation of China (No.61976109, 62006108, 61601214, 61877007); Liaoning Revitalization Talents Program (No.XLYC2006005); Liaoning Provincial Education Department (No. WQ2020014); Scientific Research Project of Liaoning Province(No.LJKZ0963); Key R&D projects of Liaoning Provincial Department of Science and Technology; Liaoning Provincial Key Laboratory Special Fund.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Shi, H., Yan, K., Geng, J. et al. A cross-embedding based medical image tamper detection and self-recovery watermarking scheme. Multimed Tools Appl 83, 30319–30360 (2024). https://doi.org/10.1007/s11042-023-16679-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16679-x