Hybrid Watermarking and Encryption Techniques for Securing Medical Images

被引:0
|
作者
Alhussan A.A. [1 ]
Abdallah H.A. [2 ]
Alsodairi S. [2 ]
Ateya A.A. [3 ]
机构
[1] Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh
[2] Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh
[3] Department of Electronics and Communications Engineering, Zagazig University, Sharqia, Zagazig
来源
关键词
chaotic encryption; circular encryption; discrete cosine transform; discrete wavelet transform; singular value decomposition; Watermarking;
D O I
10.32604/csse.2023.035048
中图分类号
学科分类号
摘要
Securing medical data while transmission on the network is required because it is sensitive and life-dependent data. Many methods are used for protection, such as Steganography, Digital Signature, Cryptography, and Watermarking. This paper introduces a novel robust algorithm that combines discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) digital image-watermarking algorithms. The host image is decomposed using a two-dimensional DWT (2D-DWT) to approximate low-frequency sub-bands in the embedding process. Then the sub-band low-high (LH) is decomposed using 2D-DWT to four new sub-bands. The resulting sub-band low-high (LH1) is decomposed using 2D-DWT to four new sub-bands. Two frequency bands, high-high (HH2) and high-low (HL2), are transformed by DCT, and then the SVD is applied to the DCT coefficients. The strongest modified singular values (SVs) vary very little for most attacks, which is an important property of SVD watermarking. The two watermark images are encrypted using two layers of encryption, circular and chaotic encryption techniques, to increase security. The first encrypted watermark is embedded in the S component of the DCT components of the HL2 coefficients. The second encrypted watermark is embedded in the S component of the DCT components of the HH2 coefficients. The suggested technique has been tested against various attacks and proven to provide excellent stability and imperceptibility results. © 2023 Authors. All rights reserved.
引用
收藏
页码:403 / 416
页数:13
相关论文
共 50 条
  • [1] Hybrid watermarking and encryption techniques for securing three-dimensional information
    Liu, Songxiao
    Yu, Nana
    Xi, Sixing
    Ji, Xiangxiang
    Yuan, Hao
    Wang, Xiaolei
    Zhu, Zhuqing
    PHYSICA SCRIPTA, 2024, 99 (05)
  • [2] An encryption scheme for securing multiple medical images
    Banik, Arpita
    Shamsi, Zeba
    Laiphrakpam, Dolendro Singh
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [3] A Hybrid Encryption Scheme for Securing Images in the Cloud
    Kulkarni, Pallavi
    Khanai, Rajashri
    Bindagi, Gururaj
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 795 - 800
  • [4] Robust watermarking method for securing color medical images using Slant-SVD-QFT transforms and OTP encryption
    Eltoukhy, Mohamed Meselhy
    Khedr, Ayman E.
    Abdel-Aziz, Mostafa M.
    Hosny, Khalid M.
    ALEXANDRIA ENGINEERING JOURNAL, 2023, 78 : 517 - 529
  • [5] Watermarking Techniques used in Medical Images: a Survey
    Seyed Mojtaba Mousavi
    Alireza Naghsh
    S. A. R. Abu-Bakar
    Journal of Digital Imaging, 2014, 27 : 714 - 729
  • [6] Watermarking Techniques used in Medical Images: a Survey
    Mousavi, Seyed Mojtaba
    Naghsh, Alireza
    Abu-Bakar, S. A. R.
    JOURNAL OF DIGITAL IMAGING, 2014, 27 (06) : 714 - 729
  • [7] A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images
    Bouslimi, Dalel
    Coatrieux, Gouenou
    Cozic, Michel
    Roux, Christian
    IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2012, 16 (05): : 891 - 899
  • [8] High Payload Reversible Watermarking for Securing Medical Images in a Cloud Environment
    Sukanesh, R.
    Karthikeyan, N.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 2, 2015, 325 : 17 - 24
  • [9] Complex entropy based encryption and decryption technique for securing medical images
    Vinod Kumar
    Vinay Pathak
    Neelendra Badal
    Purnendu Shekhar Pandey
    Rajesh Mishra
    Sachin Kumar Gupta
    Multimedia Tools and Applications, 2022, 81 : 37441 - 37459
  • [10] Complex entropy based encryption and decryption technique for securing medical images
    Kumar, Vinod
    Pathak, Vinay
    Badal, Neelendra
    Pandey, Purnendu Shekhar
    Mishra, Rajesh
    Gupta, Sachin Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (26) : 37441 - 37459