Log in

A Blind and High-Capacity Data Hiding Scheme for Medical Information Security

  • Published:
Circuits, Systems, and Signal Processing Aims and scope Submit manuscript

Abstract

How to guarantee the confidentiality of sensitive data communicated over the Internet and restrict access to designated information is today’s key security and protection concern in telemedicine. In this work, we suggest a reliable and blind medical image watermarking method that combines integer wavelet transform (IWT) and singular value decomposition to keep such information private. A major drawback of current IWT-based watermarking systems is their low embedding capacity. This paper suggests an IWT-based secure large capacity watermarking solution to overcome this specific drawback. The proposed technique effectively preserves a considerable quality of watermarked images, and the watermark is resistant to the most frequently used attacks in watermarking, according to experiment results on imperceptibility and robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data Availability

The data used to support the findings of this study could be found freely here: https://odir2019.grand-challenge.org/.

References

  1. Z. Aditi, A.K. Singh, P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed. Tools Appl. 77, 4863–4882 (2018). https://doi.org/10.1007/s11042-016-3862-8

    Article  Google Scholar 

  2. W.H. Alshoura, Z. Zainol, J.S. Teh, M.A. Alawida, A new chaotic image watermarking scheme based on SVD and IWT. IEEE Access 8, 43391–43406 (2020). https://doi.org/10.1109/ACCESS.2020.2978186

    Article  Google Scholar 

  3. K. Amine, K. Fares, K.M. Redouane, E. Salah, Medical image watermarking for telemedicine application security. J. Circ. Syst. Comp. 31, 2250097 (2022). https://doi.org/10.1142/S0218126622500979

    Article  Google Scholar 

  4. K. Amine, K. Redouane, M. Bilel, A redundant wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Multimed. Tools Appl. 82, 7901–7915 (2023). https://doi.org/10.1007/s11042-022-13649-7

    Article  Google Scholar 

  5. K. Amine, K.M. Redouane, Z. Narima, ECG signal protection for telemedicine applications. Circuits Syst. Signal Process. 41, 5856 (2022). https://doi.org/10.1007/s00034-022-02063-x

    Article  Google Scholar 

  6. K. Amine, K.M. Redouane, M.M. Sayah, A wavelet-based watermarking for secure medical image transmission in telemedicine application. Multimed. Tools Appl. 82, 35401 (2023). https://doi.org/10.1007/s11042-023-14792-5

    Article  Google Scholar 

  7. P. Ayubi, M. Jafari Barani, M. Yousefi Valandar, B. Yosefnezhad Irani, R. Sedagheh Maskan Sadigh, A new chaotic complex map for robust video watermarking. Artif. Intell. Rev.. Intell. Rev. 54, 1237 (2020). https://doi.org/10.1007/s10462-020-09877-8

    Article  Google Scholar 

  8. S. Borra, R. Thanki, A FRT-SVD based blind medical watermarking technique for telemedicine applications. Int. J. Digit. Crime Forensics (IJDCF) 11, 13–33 (2019). https://doi.org/10.4018/IJDCF.2019040102

    Article  Google Scholar 

  9. S. Borra, R. Thanki, Crypto-watermarking scheme for tamper detection of medical images. Comput. Methods Biomech. Biomed. Eng. Imaging Vis. 8, 345–355 (2020). https://doi.org/10.1080/21681163.2019.1595730

    Article  Google Scholar 

  10. S. Borra, R. Thanki, N. Dey, K. Borisagar, Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing. Smart Health 12, 35–48 (2019). https://doi.org/10.1016/j.smhl.2018.02.001

    Article  Google Scholar 

  11. C.F. Duan, J. Zhou, L.H. Gong, J.Y. Wu, N.R. Zhou, New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt. Lasers Eng. 150, 106881 (2022). https://doi.org/10.1016/j.optlaseng.2021.106881

    Article  Google Scholar 

  12. K. Fares, K. Amine, E. Salah, A robust blind color image watermarking based on Fourier transform domain. Optik 208, 164562 (2020). https://doi.org/10.1016/j.ijleo.2020.164562

    Article  Google Scholar 

  13. K. Fares, A. Khaldi, K. Redouane, E. Salah, DCT & DWT based watermarking scheme for medical information security. Biomed. Signal Process. Control 66, 102403 (2021). https://doi.org/10.1016/j.bspc.2020.102403

    Article  Google Scholar 

  14. A.K. Gulve, M.S. Joshi, An image steganography method hiding secret data into coefficients of integer wavelet transform using pixel value differencing approach. Math. Probl. Eng.Probl. Eng. (2015). https://doi.org/10.1155/2015/684824

    Article  Google Scholar 

  15. K.M. Hosny, M.M. Darwish, M.M. Fouda, Robust color images watermarking using new fractional-order exponent moments. IEEE Access 9, 47425–47435 (2021). https://doi.org/10.1109/ACCESS.2021.3068211

    Article  Google Scholar 

  16. Q. Hu, M.D. Abràmoff, M.K. Garvin, in Automated Separation of Binary Overlap** Trees in Low-Contrast Color Retinal Images, Medical Image Computing and Computer-Assisted Intervention – MICCAI 2013, pp. 436–443 (2013). https://doi.org/10.1007/978-3-642-40763-5_54

  17. M. Jafari Barani, P. Ayubi, M. Yousefi Valandar, B. Yosefnezhad Irani, A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multimed. Tools Appl. 79, 2127–2159 (2020). https://doi.org/10.1007/s11042-019-08225-5

    Article  Google Scholar 

  18. M. Jafari Barani, M. Yousefi Valandar, P. Ayubi, A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map. Optik 187, 205–222 (2019). https://doi.org/10.1016/j.ijleo.2019.04.074

    Article  Google Scholar 

  19. F. Kahlessenane, A. Khaldi, M.R. Kafi, S. Euschi, A color value differentiation scheme for blind digital image watermarking. Multimed. Tools Appl. 80, 19827–19844 (2021). https://doi.org/10.1007/s11042-021-10713-6

    Article  Google Scholar 

  20. F. Kahlessenane, A. Khaldi, R. Kafi, S. Euschi, A robust blind medical image watermarking approach for telemedicine applications. Clust. Comput.. Comput. 24, 2069–2082 (2021). https://doi.org/10.1007/s10586-020-03215-x

    Article  Google Scholar 

  21. F. Kahlessenane, A. Khaldi, R. Kafi, S. Euschi, A DWT based watermarking approach for medical image protection. J. Ambient Intell. Human Comput. 12, 2931–2938 (2021). https://doi.org/10.1007/s12652-020-02450-9

    Article  Google Scholar 

  22. F. Kahlessenane, A. Khaldi, M.R. Kafi, N. Zermi, S. Euschi, A value parity combination based scheme for retinal images watermarking. Opt. Quant. Electron. 53, 161 (2021). https://doi.org/10.1007/s11082-021-02793-3

    Article  Google Scholar 

  23. H.R. Kanan, B. Nazeri, A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Appl. 41, 6123–6130 (2014). https://doi.org/10.1016/j.eswa.2014.04.022

    Article  Google Scholar 

  24. A. Khaldi, M.R. Kafi, A.Z.E. Boukhamla, Deformable model segmentation for range image watermarking. Multimed. Tools Appl. 82, 12211–12227 (2023). https://doi.org/10.1007/s11042-022-13724-z

    Article  Google Scholar 

  25. A. Khaldi, M.R. Kafi, B. Meghni, Electrocardiogram signal security by digital watermarking. J. Ambient Intell. Human Comput. (2022). https://doi.org/10.1007/s12652-022-04101-7

    Article  Google Scholar 

  26. A. Khaldi, M.R. Kafi, M.S. Moad, Wrap** based curvelet transform approach for ECG watermarking in telemedicine application. Biomed. Signal Process. Control 75, 103540 (2022). https://doi.org/10.1016/j.bspc.2022.103540

    Article  Google Scholar 

  27. P.C. Mandal, I. Mukherjee, B.N. Chatterji, High capacity steganography based on IWT using eight-way CVD and n-LSB ensuring secure communication. Optik 247, 167804 (2021). https://doi.org/10.1016/j.ijleo.2021.167804

    Article  Google Scholar 

  28. M.S. Moad, M.R. Kafi, A. Khaldi, A non-subsampled Shearlet transform based approach for heartbeat sound watermarking. Biomed. Signal Process. Control 71, 103114 (2022). https://doi.org/10.1016/j.bspc.2021.103114

    Article  Google Scholar 

  29. M.S. Moad, M.R. Kafi, A. Khaldi, A wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Microprocess. Microsyst. 90, 104490 (2022). https://doi.org/10.1016/j.micpro.2022.104490

    Article  Google Scholar 

  30. M.S. Moad, M.R. Kafi, A. Khaldi, Medical image watermarking for secure e-healthcare applications. Multimed. Tools Appl. (2022). https://doi.org/10.1007/s11042-022-12004-0

    Article  Google Scholar 

  31. M.S. Moad, N. Zermi, A. Khaldi, M.R. Kafi, Stationary wavelet-based image watermarking for E-healthcare applications. Cybern. Syst.. Syst. (2023). https://doi.org/10.1080/01969722.2023.2166253

    Article  Google Scholar 

  32. M. Sahu, N. Padhy, S.S. Gantayat, A.K. Sahu, Shadow image based reversible data hiding using addition and subtraction logic on the LSB planes. Sens Imaging 22, 7 (2021). https://doi.org/10.1007/s11220-020-00328-w

    Article  Google Scholar 

  33. A.K. Sahu, G. Swain, Reversible image steganography using dual-layer LSB matching. Sens Imaging 21, 1 (2019). https://doi.org/10.1007/s11220-019-0262-y

    Article  Google Scholar 

  34. A.K. Sahu, G. Swain, High fidelity based reversible data hiding using modified LSB matching and pixel difference. J. King Saud Univ. Comput. Inf. Sci. (2019). https://doi.org/10.1016/j.jksuci.2019.07.004

    Article  Google Scholar 

  35. K. Sahu, G. Swain, Data hiding using adaptive LSB and PVD technique resisting PDH and RS analysis. Int. J. Electron. Security Digit. Forensics 11, 458 (2019). https://doi.org/10.1504/IJESDF.2019.102567

    Article  Google Scholar 

  36. A.K. Sahu, G. Swain, An optimal information hiding approach based on pixel value differencing and modulus function. Wireless Pers. Commun. 108, 159–174 (2019). https://doi.org/10.1007/s11277-019-06393-z

    Article  Google Scholar 

  37. A.K. Sahu, G. Swain, E.S. Babu, Digital image steganography using bit flip**. Cybern. Inf. Technol. 18, 69–80 (2018). https://doi.org/10.2478/cait-2018-0006

    Article  MathSciNet  Google Scholar 

  38. S. Sajasi, A.M. Eftekhari Moghadam, An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl. Soft Comput.Comput. 30, 375–389 (2015). https://doi.org/10.1016/j.asoc.2015.01.032

    Article  Google Scholar 

  39. E. Salah, K. Amine, K.M. Redouane, K. Fares, Spatial and frequency approaches for audio file protection. J. Circuit Syst. Comput. 30, 2150210 (2021). https://doi.org/10.1142/S0218126621502108

    Article  Google Scholar 

  40. E. Salah, K. Amine, K.M. Redouane, K. Fares, A Fourier transform based audio watermarking algorithm. Appl. Acoust. 172, 107652 (2021). https://doi.org/10.1016/j.apacoust.2020.107652

    Article  Google Scholar 

  41. M.M. Sayah, K.M. Redouane, K. Amine, Secure transmission and integrity verification for color medical images in telemedicine applications. Multimed. Tools Appl. 8, 43613–43638 (2022). https://doi.org/10.1007/s11042-021-11791-2

    Article  Google Scholar 

  42. R. Thabit, B.E. Khoo, A new robust lossless data hiding scheme and its application to color medical images. Digit. Signal Process. 38, 77–94 (2015). https://doi.org/10.1016/j.dsp.2014.12.005

    Article  Google Scholar 

  43. R. Thanki, S. Borra, Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing. Multimed. Tools Appl. 78, 13905–13924 (2019). https://doi.org/10.1007/s11042-018-6746-2

    Article  Google Scholar 

  44. R. Thanki, S. Borra, V. Dwivedi, K. Borisagar, A steganographic approach for secure communication of medical images based on the DCT-SVD and the compressed sensing (CS) theory. Imaging Sci. J. 65, 457–467 (2017). https://doi.org/10.1080/13682199.2017.1367129

    Article  Google Scholar 

  45. R. Thanki, A. Kothari, D. Trivedi, Hybrid and blind watermarking scheme in DCuT – RDWT domain. J. Inf. Security Appl. 46, 231–249 (2019). https://doi.org/10.1016/j.jisa.2019.03.017

    Article  Google Scholar 

  46. Q. Wen, T.-F. Sun, S.-X. Wang, Concept and application of zero-watermark. Acta Electron. Sin. 31, 214–216 (2003)

    Google Scholar 

  47. M. **ao, Z. He, High capacity image steganography method based on framelet and compressive sensing, in Proceedings of SPIE, vol. 9811, p. 98110Y (2015). https://doi.org/10.1117/12.2205279

  48. M.Y. Yousefi Valandar, M.J. Jafari Barani, P. Ayubi, A new transform domain steganography based on modified logistic chaotic map for color images. J. Inf. Security Appl. 34, 142–151 (2017). https://doi.org/10.1016/j.jisa.2017.04.004

    Article  Google Scholar 

  49. M.Y. Yousefi Valandar, M.J. Jafari Barani, P. Ayubi, An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimed. Tools Appl. 78, 9971–9989 (2019). https://doi.org/10.1007/s11042-018-6584-2

    Article  Google Scholar 

  50. M.Y. Yousefi Valandar, M.J. Jafari Barani, P. Ayubi, A blind and robust color images watermarking method based on block transform and secured by modified 3-dimensional Hénon map. Soft. Comput.Comput. 24, 771–794 (2020). https://doi.org/10.1007/s00500-019-04524-z

    Article  Google Scholar 

  51. N. Zermi, A. Khaldi, M.R. Kafi, F. Kahlessenane, S. Euschi, A lossless DWT-SVD domain watermarking for medical information security. Multimed. Tools Appl. 80, 24823–24841 (2021). https://doi.org/10.1007/s11042-021-10712-7

    Article  Google Scholar 

  52. N. Zermi, A. Khaldi, R. Kafi, F. Kahlessenane, S. Euschi, A DWT-SVD based robust digital watermarking for medical image security. Forensic Sci. Int. 320, 110691 (2021). https://doi.org/10.1016/j.forsciint.2021.110691

    Article  Google Scholar 

  53. N. Zermi, A. Khaldi, M.R. Kafi, F. Kahlessenane, S. Euschi, Robust SVD-based schemes for medical image watermarking. Microprocess. Microsyst. 84, 104134 (2021). https://doi.org/10.1016/j.micpro.2021.104134

    Article  Google Scholar 

  54. N. Zermi, A. Khaldi, M.R. Kafi, F. Kahlessenane, S. Euschi, An SVD values ordering scheme for medical image watermarking. Cybern. Syst.. Syst. 53, 282–297 (2022). https://doi.org/10.1080/01969722.2021.1983700

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by “La Direction Générale de la Recherche Scientifique et du Développement Technologique (DGRSDT)” of Algeria.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khaldi Amine.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sayah, M.M., Narima, Z., Amine, K. et al. A Blind and High-Capacity Data Hiding Scheme for Medical Information Security. Circuits Syst Signal Process (2024). https://doi.org/10.1007/s00034-024-02684-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00034-024-02684-4

Keywords

Navigation