Hybrid Watermarking and Encryption Techniques for Securing Medical Images

被引:0
|
作者
Alhussan A.A. [1 ]
Abdallah H.A. [2 ]
Alsodairi S. [2 ]
Ateya A.A. [3 ]
机构
[1] Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh
[2] Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh
[3] Department of Electronics and Communications Engineering, Zagazig University, Sharqia, Zagazig
来源
Computer Systems Science and Engineering | 2023年 / 46卷 / 01期
关键词
chaotic encryption; circular encryption; discrete cosine transform; discrete wavelet transform; singular value decomposition; Watermarking;
D O I
10.32604/csse.2023.035048
中图分类号
学科分类号
摘要
Securing medical data while transmission on the network is required because it is sensitive and life-dependent data. Many methods are used for protection, such as Steganography, Digital Signature, Cryptography, and Watermarking. This paper introduces a novel robust algorithm that combines discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) digital image-watermarking algorithms. The host image is decomposed using a two-dimensional DWT (2D-DWT) to approximate low-frequency sub-bands in the embedding process. Then the sub-band low-high (LH) is decomposed using 2D-DWT to four new sub-bands. The resulting sub-band low-high (LH1) is decomposed using 2D-DWT to four new sub-bands. Two frequency bands, high-high (HH2) and high-low (HL2), are transformed by DCT, and then the SVD is applied to the DCT coefficients. The strongest modified singular values (SVs) vary very little for most attacks, which is an important property of SVD watermarking. The two watermark images are encrypted using two layers of encryption, circular and chaotic encryption techniques, to increase security. The first encrypted watermark is embedded in the S component of the DCT components of the HL2 coefficients. The second encrypted watermark is embedded in the S component of the DCT components of the HH2 coefficients. The suggested technique has been tested against various attacks and proven to provide excellent stability and imperceptibility results. © 2023 Authors. All rights reserved.
引用
收藏
页码:403 / 416
页数:13
相关论文
共 50 条
  • [31] Encryption-Enhanced Reversible Watermarking for Medical Images via Prediction and RC4 Encryption
    Shareef, Mehbooba P.
    Divya, T., V
    Abraham, Nimisha
    Babu, Tina
    Reshma, K., V
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [32] Content based watermarking for securing color images
    Lo-Varco, G
    Dumas, M
    Puech, W
    JOURNAL OF IMAGING SCIENCE AND TECHNOLOGY, 2005, 49 (05) : 464 - 473
  • [33] Securing Medical Images for Mobile Health Systems Using a Combined Approach of Encryption and Steganography
    Jiang, Tao
    Zhang, Kai
    Tang, Jinshan
    INTELLIGENT COMPUTING METHODOLOGIES, ICIC 2018, PT III, 2018, 10956 : 532 - 543
  • [34] Securing Medical Data by Combining Encryption and Robust Blind Medical Image Watermarking Based on Zaslavsky Chaotic Map and DCT Coefficients
    Nawal Balaska
    Aissa Belmeguenai
    Ahcène Goutas
    Zahir Ahmida
    Selma Boumerdassi
    SN Computer Science, 2022, 3 (2)
  • [35] Novel Hybrid Fusion-Based Technique for Securing Medical Images
    Abdallah, Hanaa A.
    Alkanhel, Reem
    Ateya, Abdelhamied A.
    ELECTRONICS, 2022, 11 (20)
  • [36] Context-based watermarking cum chaotic encryption for medical images in telemedicine applications
    Joshua C. Dagadu
    Jianping Li
    Multimedia Tools and Applications, 2018, 77 : 24289 - 24312
  • [37] Multi-level security of medical images based on encryption and watermarking for telemedicine applications
    Rohit Thanki
    Ashish Kothari
    Multimedia Tools and Applications, 2021, 80 : 4307 - 4325
  • [38] Multi-level security of medical images based on encryption and watermarking for telemedicine applications
    Thanki, Rohit
    Kothari, Ashish
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (03) : 4307 - 4325
  • [39] Context-based watermarking cum chaotic encryption for medical images in telemedicine applications
    Dagadu, Joshua C.
    Li, Jianping
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (18) : 24289 - 24312
  • [40] Watermarking and selective encryption algorithms for JPEG images
    Zhang, CN
    Xie, JS
    Li, SC
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2000, : 132 - 136