Hybrid Watermarking and Encryption Techniques for Securing Medical Images

被引:0
|
作者
Alhussan A.A. [1 ]
Abdallah H.A. [2 ]
Alsodairi S. [2 ]
Ateya A.A. [3 ]
机构
[1] Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh
[2] Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh
[3] Department of Electronics and Communications Engineering, Zagazig University, Sharqia, Zagazig
来源
关键词
chaotic encryption; circular encryption; discrete cosine transform; discrete wavelet transform; singular value decomposition; Watermarking;
D O I
10.32604/csse.2023.035048
中图分类号
学科分类号
摘要
Securing medical data while transmission on the network is required because it is sensitive and life-dependent data. Many methods are used for protection, such as Steganography, Digital Signature, Cryptography, and Watermarking. This paper introduces a novel robust algorithm that combines discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) digital image-watermarking algorithms. The host image is decomposed using a two-dimensional DWT (2D-DWT) to approximate low-frequency sub-bands in the embedding process. Then the sub-band low-high (LH) is decomposed using 2D-DWT to four new sub-bands. The resulting sub-band low-high (LH1) is decomposed using 2D-DWT to four new sub-bands. Two frequency bands, high-high (HH2) and high-low (HL2), are transformed by DCT, and then the SVD is applied to the DCT coefficients. The strongest modified singular values (SVs) vary very little for most attacks, which is an important property of SVD watermarking. The two watermark images are encrypted using two layers of encryption, circular and chaotic encryption techniques, to increase security. The first encrypted watermark is embedded in the S component of the DCT components of the HL2 coefficients. The second encrypted watermark is embedded in the S component of the DCT components of the HH2 coefficients. The suggested technique has been tested against various attacks and proven to provide excellent stability and imperceptibility results. © 2023 Authors. All rights reserved.
引用
收藏
页码:403 / 416
页数:13
相关论文
共 50 条
  • [41] Watermarking and encryption of color images in the Fibonacci domain
    Battisti, F.
    Cancellaro, M.
    Carli, M.
    Boato, G.
    Neri, A.
    IMAGE PROCESSING: ALGORITHMS AND SYSTEMS VI, 2008, 6812
  • [42] Hybrid Encryption for Securing SharedPreferences of Android applications
    Kumbhar, Sourabh Shivaji
    Lee, Young
    Yang, Jeong
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 246 - 249
  • [43] IMAGE SECURING BASED CHAOTIC ENCRYPTION COUPLED WITH DCT ROBUST WATERMARKING
    Seddik, Hassen
    Ben Braiek, Ezzdine
    2013 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND SOFTWARE APPLICATIONS (ICEESA), 2013, : 653 - 658
  • [44] Hybrid technique for robust and imperceptible multiple watermarking using medical images
    Singh, Amit Kumar
    Dave, Mayank
    Mohan, Anand
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (14) : 8381 - 8401
  • [45] Hybrid technique for robust and imperceptible multiple watermarking using medical images
    Amit Kumar Singh
    Mayank Dave
    Anand Mohan
    Multimedia Tools and Applications, 2016, 75 : 8381 - 8401
  • [46] Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment
    Neela, K. L.
    Kavitha, V
    APPLIED INTELLIGENCE, 2023, 53 (04) : 4733 - 4747
  • [47] Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment
    K. L. Neela
    V. Kavitha
    Applied Intelligence, 2023, 53 : 4733 - 4747
  • [48] Hybrid multiple watermarking technique for securing medical image using DWT-FWHT-SVD
    Assini, Imane
    Badri, Abdelmajid
    Safi, Khadija
    Sahel, Aicha
    Baghdad, Abdennaceur
    2017 3RD INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2017, : 574 - 579
  • [49] Medical images, security and watermarking
    Coatrieux, G
    Maître, H
    ANNALS OF TELECOMMUNICATIONS, 2003, 58 (5-6) : 782 - 800
  • [50] Digital watermarking for medical images
    Milanova, M
    Ford, C
    Kountchev, R
    Kountcheva, R
    METMBS'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MATHEMATICS AND ENGINEERING TECHNIQUES IN MEDICINE AND BIOLOGICAL SCIENCES, 2003, : 509 - 514