Log in

A cross-embedding based medical image tamper detection and self-recovery watermarking scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the rapid growth in communication and computing technologies, the transmission of medical images over the Internet is on the rise. In such a scenario, there is a special need to meet the security and privacy issues and challenges of individual and Intellectual Property (IP) owners. It is highly important for an individual to keep his/her personal medical images against invalid manipulation by impostors. Hence developments of authentication and tamper detection techniques are the need of the hour. For this, a tamper detection and self-recovery watermarking scheme for medical images based on texture degree and cross-embedding is proposed in this paper. Firstly, divide medical images into ROI (Region of Interest) and RONI (Region of Non-Interest); generate a double authentication watermark in ROI to improve the accuracy of tamper detection and reduce the probability of false alarm; calculate texture complexity based on 4-dimensional features in ROI, and divide ROI into texture blocks and smooth blocks; generate different recovery watermarks according to the characteristics of different blocks using compression-aware technology. Then, hide the recovery watermark in RONI based on the reference matrix and cross-embedding technology. Finally, locate the tampered blocks in the ROI based on three level tamper detection strategy including pixel-level, block-level, and multi-direction subband-level; restore the tampered region by the extracted recovery watermark. The experimental results indicate that the tamper detection accuracy of the ROI region is close to 100%. Additionally, at an embedding rate of 1.4074bpp, the PSNR reaches 45.0217 dB and the NC is 0.99. In addition, the scheme provides promising results against copy-paste attacks, collage attacks and steganalysis. Also, the scheme achieves privacy protection. This clearly demonstrates that the proposed scheme has several advantages, including strong tamper detection capability, effective self-recovery, high security, excellent concealment, and robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25

Similar content being viewed by others

Data availability

Data will be made available on reasonable request.

References

  1. AlShaikh M (2023) A novel tamper detection watermarking approach for improving image integrity[J]. Multimed Tools Appl 82(7):10039–10060

    Article  Google Scholar 

  2. Alshanbari HS (2021) Medical image watermarking for ownership & tamper detection[J]. Multimed Tools Appl 80(11):16549–16564

    Article  MathSciNet  Google Scholar 

  3. Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery[J]. Int J Mach Learn Cybern 7(6):1225–1239

    Article  Google Scholar 

  4. Benrhouma O (2023) Cryptanalysis and improvement of a semi-fragile watermarking technique for tamper detection and recovery[J]. Multimed Tools Appl 82:22149–22174

    Article  Google Scholar 

  5. Bhardwaj R, Aggarwal A (2021) An enhanced separable reversible and secure patient data hiding algorithm for telemedicine applications[J]. Expert Syst Appl 186:115721

    Article  Google Scholar 

  6. Bhardwaj R, Singh A (2021) An efficient reversible and secure patient data hiding algorithm for E-healthcare[J]. Multimed Tools Appl 80(21–23):31687–31703

    Article  Google Scholar 

  7. Boroumand M, Chen M, Fridrich J (2019) Deep residual network for steganalysis of digital images[J]. IEEE Trans Inf Forensic Secur 14(5):1181–1193

    Article  Google Scholar 

  8. Chang CC, Chou YC, Kieu TD (2008) An information hiding scheme using sudoku. The 3rd International Conference on Innovative Computing Information and Control, vol 8, pp 10184692

  9. Chang C, Lin C, Su G (2020) An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC[J]. Multimed Tools Appl 79(33–34):24795–24824

    Article  Google Scholar 

  10. Chen K, Chang C (2019) High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement[J]. J Vis Commun Image Represent 58:334–344

    Article  Google Scholar 

  11. Chen X, Hong C (2021) An efficient dual-image reversible data hiding scheme based on exploiting modification direction[J]. J Inf Secur Appl 58:102702

    Google Scholar 

  12. Chen Y, Yau H, Yang G (2013) A maximum entropy-based chaotic time-variant fragile watermarking scheme for image tampering detection[J]. Entropy 15(8):3170–3185

    Article  ADS  MathSciNet  Google Scholar 

  13. Chidambaram N, Raj P, Thenmozhi K et al (2021) A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images[J]. Multimed Tools Appl 80(15):23359–23375

    Article  Google Scholar 

  14. Chowdhuri P, Jana B (2020) Hiding data in dual color images reversibly via weighted matrix[J]. J Inf Secur Appl 50:102420

    Google Scholar 

  15. Clark K, Vendt B, Smith K et al (2013) The Cancer imaging archive (TCIA): maintaining and operating a public information repository[J]. J Digit Imaging 26(6):1045–1057

    Article  PubMed  PubMed Central  Google Scholar 

  16. De S, Bhaumik J, Giri D et al (2023) A new robust and fragile scheme based on chaotic maps and dwt for medical image security[J]. Multimed Tools Appl 82(8):11753–11792

    Article  Google Scholar 

  17. Delp E, Mitchell O (1979) Image compression using block truncation coding[J]. IEEE Trans Commun 27(9):1335–1342

    Article  Google Scholar 

  18. Gao G, Tong S, **a Z et al (2021) Reversible data hiding with automatic contrast enhancement for medical images[J]. Signal Process 178:107817

    Article  Google Scholar 

  19. Geetha R, Geetha S (2020) Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique[J]. Multimed Tools Appl 79(19–20):12869–12890

    Article  Google Scholar 

  20. Geetha R, Geetha S (2018) Improved reversible data embedding in medical images using I-IWT and pairwise pixel difference expansion. International Conference on Next Generation Computing Technologies, vol 9, pp 601–611

  21. Gull S, Mansour RF, Aljehane NO et al (2021) A self-embedding technique for tamper detection and localization of medical images for smart-health[J]. Multimed Tools Appl 80(19):29939–29964

    Article  Google Scholar 

  22. Iseed SY, Mahmoud KW (2023) Forensic approach for distinguishing between source and destination regions in copy-move forgery[J]. Multimed Tools Appl 82:31181–31210

    Article  Google Scholar 

  23. Jaiswal AK, Srivastava R (2023) Fake region identification in an image using deep learning segmentation model[J]. Multimed Tools Appl:1–21. https://doi.org/10.1007/s11042-023-15032-6

  24. Lema M, Mitchell O (1984) Absolute moment block truncation coding and its application to color images[J]. IEEE Trans Commun 32(10):1148–1157

    Article  Google Scholar 

  25. Liao X, Yu YB, Li B et al (2020) A new payload partition strategy in color image steganography.[J]. IEEE Trans Circ Syst Vid Technol 30(3):685–696

    Article  Google Scholar 

  26. Liao X, Yin JJ, Chen ML et al (2022) Adaptive payload distribution in multiple images steganography based on image texture features[J]. IEEE Trans Depend Sec Comput 19(2):897–911

    Google Scholar 

  27. Lu W, Xu WB, Sheng ZQ (2023) An interpretable image tampering detection approach based on cooperative game[J]. IEEE Trans Circ Syst Vid Technol 33(2):952–962

    Article  Google Scholar 

  28. Lin C, Liu X, Tai W et al (2015) A novel reversible data hiding scheme based on AMBTC compression technique[J]. Multimed Tools Appl 74(11):3823–3842

    Article  Google Scholar 

  29. Mansour RF, Parah SA (2021) Reversible data hiding for electronic patient information security for telemedicine applications[J]. Arab J Sci Eng 46(9):9129–9144

    Article  Google Scholar 

  30. Otair M, Abualigah L, Qawaqzeh MK (2022) Improved near-lossless technique using the Huffman coding for enhancing the quality of image compression[J]. Multimed Tools Appl 81(20):28509–28529

    Article  Google Scholar 

  31. Reddy GT, Bhattacharya S, Ramakrishnan SS et al (2020) An ensemble based machine learning model for diabetic retinopathy classification. 2020 international conference on emerging trends in information technology and engineering (ic-ETITE), vol 19573816, pp 1–6

  32. Sanivarapu PV, Rajesh KNVP, Reddy NVR et al (2020) Patient data hiding into ECG signal using watermarking in transform domain[J]. Phys Eng Sci Med 43(1):213–226

    Article  Google Scholar 

  33. Sanivarapu PV (2022) Adaptive tamper detection watermarking scheme for medical images in transform domain[J]. Multimed Tools Appl 81(8):11605–11619

    Article  Google Scholar 

  34. Shi H, Wang XH, Li MC et al (2017) Secure variable-capacity self-recovery watermarking scheme[J]. Multimed Tools Appl 76(5):6941–6972

    Article  Google Scholar 

  35. Showkat S, Parah SA, Gull S (2021) Embedding in medical images with contrast enhancement and tamper detection capability[J]. Multimed Tools Appl 80(2):2009–2030

    Article  Google Scholar 

  36. Singh S, Singh SK, Udmale SS (2023) An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability[J]. Multimed Tools Appl 82(1):1045–1066

    Article  Google Scholar 

  37. Su G, Chang C, Chen C (2021) A hybrid-Sudoku based fragile watermarking scheme for image tampering detection[J]. Multimed Tools Appl 80(8):12881–12903

    Article  Google Scholar 

  38. Swaraja K, Meenakshi K, Kora P (2020) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine[J]. Biomed Signal Process Control 55:101665

    Article  Google Scholar 

  39. Tan JX, Liao X, Liu JT et al (2022) Channel attention image steganography with generative adversarial networks[J]. IEEE Trans Netw Sci Eng 9(2):888–903

    Article  Google Scholar 

  40. Thanki R, Borra S (2019) Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing[J]. Multimed Tools Appl 78(10):13905–13924

    Article  Google Scholar 

  41. Wang X, Chang C, Lin C (2021) Reversible data hiding in encrypted images with block-based adaptive MSB encoding[J]. Inf Sci 567:375–394

    Article  MathSciNet  Google Scholar 

  42. Yang Y, Zhang W, Liang D et al (2018) A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images[J]. Multimed Tools Appl 77(14):18043–18065

    Article  Google Scholar 

  43. Yu J, Kuang Z, Zhang B et al (2018) Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing[J]. IEEE Trans Inf Forensic Secur 13(5):1317–1332

    Article  Google Scholar 

  44. Yu M, Wang J, Jiang G et al (2015) New fragile watermarking method for stereo image authentication with localization and recovery[J]. AEU Int J Electron Commun 69(1):361–370

    Article  Google Scholar 

Download references

Acknowledgments

Supported by National Science Foundation of China (No.61976109, 62006108, 61601214, 61877007); Liaoning Revitalization Talents Program (No.XLYC2006005); Liaoning Provincial Education Department (No. WQ2020014); Scientific Research Project of Liaoning Province(No.LJKZ0963); Key R&D projects of Liaoning Provincial Department of Science and Technology; Liaoning Provincial Key Laboratory Special Fund.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Hui Shi or Yonggong Ren.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shi, H., Yan, K., Geng, J. et al. A cross-embedding based medical image tamper detection and self-recovery watermarking scheme. Multimed Tools Appl 83, 30319–30360 (2024). https://doi.org/10.1007/s11042-023-16679-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16679-x

Keywords

Navigation