Skip to main content
Log in

An Optimized and Secured Image Watermarking and Its Dual Authentication for Internet of Medical Things

  • Published:
Circuits, Systems, and Signal Processing Aims and scope Submit manuscript

Abstract

The data used in the medical field have significantly expanded in recent years, especially after the pandemic. This type of data is shared over the cloud for verification and diagnosis. The patients and researchers share sensitive information and images of the medical field, so this information must be secured during transmission. Henon map is used to enhance the security of proposed work. The Schur decomposition, along with redundant discrete wavelet transform and randomized singular value decomposition, is used for embedding. The first watermark, i.e., the Aadhar card of patient, is modified using media access control (MAC) address. The second watermark image is created by fusing two images, a magnetic resonance imaging and a computerized tomography scan, using dual tree complex wavelet transform (DT-CWT). White shark optimization is used to get the optimum scaling factor. A secured hash algorithm is used for the authentication of the identity of the patient and MAC address. The average percentage improvement in imperceptibility is 25.98%, and in robustness is 14.01%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

Data Availability

My manuscript has no associated data.

References

  1. A. Anand, A.K. Singh, An improved DWT-SVD domain watermarking for medical information security. Comput. Commun. 152, 72–80 (2020). https://doi.org/10.1016/j.comcom.2020.01.038

    Article  Google Scholar 

  2. A. Anand, A.K. Singh, Cloud based secure watermarking using IWT-Schur-RSVD with fuzzy inference system for smart healthcare applications. Sustain. Cities Soc. 75, 103398 (2021)

    Article  Google Scholar 

  3. A. Anand, A.K. Singh, Hybrid nature-inspired optimization and encryption-based watermarking for E-healthcare. IEEE Trans. Comput. Social Syst. 10(4), 2033–2040 (2023). https://doi.org/10.1109/TCSS.2022.3140862

    Article  Google Scholar 

  4. A. Anand, A.K. Singh, H. Zhou, ViMDH: visible-imperceptible medical data hiding for internet of medical things. IEEE Trans. Ind. Inf. 19(1), 849–856 (2023). https://doi.org/10.1109/TII.2022.3172622

    Article  Google Scholar 

  5. A. Anand, A.K. Singh, Z. Lv, G. Bhatnagar, Compression-then-encryption-based secure watermarking technique for smart healthcare system. IEEE MultiMed. 27(4), 133–143 (2020). https://doi.org/10.1109/MMUL.2020.2993269

    Article  Google Scholar 

  6. D. Awasthi, V.K. Srivastava, LWT-DCT-SVD and DWT-DCT-SVD based watermarking schemes with their performance enhancement using Jaya and Particle swarm optimization and comparison of results under various attacks. Multimed. Tools Appl. 81(18), 25075–25099 (2022). https://doi.org/10.1007/s11042-022-12456-4

    Article  Google Scholar 

  7. D. Awasthi, V.K. Srivastava, Robust, imperceptible and optimized watermarking of DICOM image using Schur decomposition, LWT-DCT-SVD and its authentication using SURF. Multimed. Tools Appl. 82(11), 16555–16589 (2022). https://doi.org/10.1007/s11042-022-14002-8

    Article  Google Scholar 

  8. D. Awasthi, V.K. Srivastava, hessenberg decomposition-based medical image watermarking with its performance comparison by particle swarm and JAYA optimization algorithms for different wavelets and its authentication using AES. Circuits Syst. Signal Process. 42(8), 4953–4984 (2023). https://doi.org/10.1007/s00034-023-02344-z

    Article  Google Scholar 

  9. D. Awasthi, V.K. Srivastava, Performance enhancement of SVD based dual image watermarking in wavelet domain using PSO and JAYA optimization and their comparison under hybrid attacks. Multimed. Tools Appl. 82(23), 35685–35717 (2023). https://doi.org/10.1007/s11042-023-14723-4

    Article  Google Scholar 

  10. D. Awasthi, P. Khare, V.K. Srivastava, BacterialWmark: telemedicine watermarking technique using bacterial foraging for smart healthcare system. J. Electron. Imaging 32(4), 042107–042107 (2023)

    Article  Google Scholar 

  11. M. Braik, A. Hammouri, J. Atwan, M.A. Al-Betar, M.A. Awadallah, White shark optimizer: a novel bio-inspired meta-heuristic algorithm for global optimization problems. Knowl.-Based Syst. 243, 108457 (2022)

    Article  Google Scholar 

  12. A. Budai, J. Odstrcilik J, High resolution fundus image database (2013)

  13. K. Clark, B. Vendt, K. Smith, J. Freymann, J. Kirby, P. Koppel, S. Moore, S. Phillips, D. Maffitt, M. Pringle, L. Tarbox, F. Prior, The Cancer imaging archive (TCIA): maintaining and operating a public information repository. J. Digit. Imaging 26(6), 1045–1057 (2013)

    Article  Google Scholar 

  14. H. Gilbert, H. Handschuh, Security analysis of SHA-256 and sisters, in Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003. Revised Papers. ed. by M. Matsui, R.J. Zuccherato (Springer, Heidelberg, 2004), pp.175–193

    Chapter  Google Scholar 

  15. https://thingspeak.com/

  16. N. Hurrah, S. Parah, N. Loan, J. Sheikh, M. Elhoseny, K. Muhammad, Dual watermarking framework for privacy protection and content authentication of multimedia. Futur. Gener. Comput. Syst. 94, 654–673 (2018). https://doi.org/10.1016/j.future.2018.12.036

    Article  Google Scholar 

  17. H.T. Hu, T.T. Lee, Robust complementary dual image watermarking in subbands derived from the laplacian pyramid, discrete wavelet transform, and directional filter bank. Circuits Syst. Signal Process 41(7), 4090–4116 (2022)

    Article  Google Scholar 

  18. H. Ji, W. Yu, Y. Li, A rank revealing randomized singular value decomposition (R3SVD) algorithm for low-rank matrix approximations (2016). arXiv:1605.08134

  19. P. Khare, V. K. Srivastava Robust digital image watermarking scheme based on RDWT-DCT-SVD. In: 2018 5th international conference on signal processing and integrated networks (SPIN) (pp. 88–93). IEEE (2018)

  20. P. Khare, V.K. Srivastava, A novel dual image watermarking technique using homomorphic transform and DWT. J. Intell. Syst. 30(1), 297–311 (2021). https://doi.org/10.1515/jisys-2019-0046

    Article  Google Scholar 

  21. D.K. Mahto, O.P. Singh, A.K. Singh, FuSIW: fusion-based secure RGB image watermarking using hashing. Multimed. Tools Appl. (2022). https://doi.org/10.1007/s11042-022-13454-2

    Article  Google Scholar 

  22. D.K. Mahto, A.K. Singh, Firefly optimization-based dual watermarking for colour images with improved capacity. Multimed. Tools Appl. (2022). https://doi.org/10.1007/s11042-022-13795-y

    Article  Google Scholar 

  23. B.C. Mohan, K.V. Swamy, On the use of Schur decomposition for copyright protection of digital images. Int. J. Comput. Electr. Eng. 2(4), 1793–8163 (2010)

    Google Scholar 

  24. V. Rathore, A.K. Pal, An image encryption scheme in bit plane content using Henon map based generated edge map. Multimed Tools Appl 80, 22275–22300 (2021). https://doi.org/10.1007/s11042-021-10719-0

    Article  Google Scholar 

  25. S.J. Sheela, K.V. Suresh, D. Tandur, Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 77, 25223–25251 (2018). https://doi.org/10.1007/s11042-018-5782-2

    Article  Google Scholar 

  26. S. Singh, V.S. Rathore, R. Singh, M.K. Singh, Hybrid semi-blind image watermarking in redundant wavelet domain. Multimed. Tools Appl. 76(18), 19113–19137 (2017)

    Article  Google Scholar 

  27. A.K. Singh, Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed. Tools Appl. 78, 30523–30533 (2019)

    Article  Google Scholar 

  28. F. Thakkar, V.K. Srivastava, A particle swarm optimization and block-SVD-based watermarking for digital images. Turk. J. Electr. Eng. Comput. Sci. 25(4), 3273–3288 (2017)

    Article  Google Scholar 

  29. S. Thakur, A.K. Singh, S.P. Ghrera, A. Mohan, Chaotic based secure watermarking approach for medical images. Multimed. Tools Appl. 79(7–8), 4263–4276 (2020). https://doi.org/10.1007/s11042-018-6691-0

    Article  Google Scholar 

  30. VPS Naidu (2023). DT CWT based image Fusion (https:// www. mathworks. com/ matlabcentral /fileexchange/32086-dt-cwt-based-image-fusion), MATLAB Central File Exchange. Retrieved January 4, 2023.

  31. K. Wang, T. Gao, D. You, X. Wu, H. Kan, A secure dual-color image watermarking scheme based 2D DWT, SVD and Chaotic map. Multimed. Tools Appl. 81(5), 6159–6190 (2022)

    Article  Google Scholar 

  32. A. Zear, A.K. Singh, P. Kumar, Multiple watermarking for healthcare applications. J. Intell. Syst. 27(1), 5–18 (2018)

    Google Scholar 

  33. A. Zear, P.K. Singh, Secure and robust color image dual watermarking based on LWT-DCT-SVD. Multimed. Tools Appl. 81(19), 26721–26738 (2022)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Divyanshu Awasthi.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Awasthi, D., Srivastava, V.K. An Optimized and Secured Image Watermarking and Its Dual Authentication for Internet of Medical Things. Circuits Syst Signal Process 43, 1270–1297 (2024). https://doi.org/10.1007/s00034-023-02519-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00034-023-02519-8

Keywords

Navigation