Abstract
The data used in the medical field have significantly expanded in recent years, especially after the pandemic. This type of data is shared over the cloud for verification and diagnosis. The patients and researchers share sensitive information and images of the medical field, so this information must be secured during transmission. Henon map is used to enhance the security of proposed work. The Schur decomposition, along with redundant discrete wavelet transform and randomized singular value decomposition, is used for embedding. The first watermark, i.e., the Aadhar card of patient, is modified using media access control (MAC) address. The second watermark image is created by fusing two images, a magnetic resonance imaging and a computerized tomography scan, using dual tree complex wavelet transform (DT-CWT). White shark optimization is used to get the optimum scaling factor. A secured hash algorithm is used for the authentication of the identity of the patient and MAC address. The average percentage improvement in imperceptibility is 25.98%, and in robustness is 14.01%.
Similar content being viewed by others
Data Availability
My manuscript has no associated data.
References
A. Anand, A.K. Singh, An improved DWT-SVD domain watermarking for medical information security. Comput. Commun. 152, 72–80 (2020). https://doi.org/10.1016/j.comcom.2020.01.038
A. Anand, A.K. Singh, Cloud based secure watermarking using IWT-Schur-RSVD with fuzzy inference system for smart healthcare applications. Sustain. Cities Soc. 75, 103398 (2021)
A. Anand, A.K. Singh, Hybrid nature-inspired optimization and encryption-based watermarking for E-healthcare. IEEE Trans. Comput. Social Syst. 10(4), 2033–2040 (2023). https://doi.org/10.1109/TCSS.2022.3140862
A. Anand, A.K. Singh, H. Zhou, ViMDH: visible-imperceptible medical data hiding for internet of medical things. IEEE Trans. Ind. Inf. 19(1), 849–856 (2023). https://doi.org/10.1109/TII.2022.3172622
A. Anand, A.K. Singh, Z. Lv, G. Bhatnagar, Compression-then-encryption-based secure watermarking technique for smart healthcare system. IEEE MultiMed. 27(4), 133–143 (2020). https://doi.org/10.1109/MMUL.2020.2993269
D. Awasthi, V.K. Srivastava, LWT-DCT-SVD and DWT-DCT-SVD based watermarking schemes with their performance enhancement using Jaya and Particle swarm optimization and comparison of results under various attacks. Multimed. Tools Appl. 81(18), 25075–25099 (2022). https://doi.org/10.1007/s11042-022-12456-4
D. Awasthi, V.K. Srivastava, Robust, imperceptible and optimized watermarking of DICOM image using Schur decomposition, LWT-DCT-SVD and its authentication using SURF. Multimed. Tools Appl. 82(11), 16555–16589 (2022). https://doi.org/10.1007/s11042-022-14002-8
D. Awasthi, V.K. Srivastava, hessenberg decomposition-based medical image watermarking with its performance comparison by particle swarm and JAYA optimization algorithms for different wavelets and its authentication using AES. Circuits Syst. Signal Process. 42(8), 4953–4984 (2023). https://doi.org/10.1007/s00034-023-02344-z
D. Awasthi, V.K. Srivastava, Performance enhancement of SVD based dual image watermarking in wavelet domain using PSO and JAYA optimization and their comparison under hybrid attacks. Multimed. Tools Appl. 82(23), 35685–35717 (2023). https://doi.org/10.1007/s11042-023-14723-4
D. Awasthi, P. Khare, V.K. Srivastava, BacterialWmark: telemedicine watermarking technique using bacterial foraging for smart healthcare system. J. Electron. Imaging 32(4), 042107–042107 (2023)
M. Braik, A. Hammouri, J. Atwan, M.A. Al-Betar, M.A. Awadallah, White shark optimizer: a novel bio-inspired meta-heuristic algorithm for global optimization problems. Knowl.-Based Syst. 243, 108457 (2022)
A. Budai, J. Odstrcilik J, High resolution fundus image database (2013)
K. Clark, B. Vendt, K. Smith, J. Freymann, J. Kirby, P. Koppel, S. Moore, S. Phillips, D. Maffitt, M. Pringle, L. Tarbox, F. Prior, The Cancer imaging archive (TCIA): maintaining and operating a public information repository. J. Digit. Imaging 26(6), 1045–1057 (2013)
H. Gilbert, H. Handschuh, Security analysis of SHA-256 and sisters, in Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003. Revised Papers. ed. by M. Matsui, R.J. Zuccherato (Springer, Heidelberg, 2004), pp.175–193
N. Hurrah, S. Parah, N. Loan, J. Sheikh, M. Elhoseny, K. Muhammad, Dual watermarking framework for privacy protection and content authentication of multimedia. Futur. Gener. Comput. Syst. 94, 654–673 (2018). https://doi.org/10.1016/j.future.2018.12.036
H.T. Hu, T.T. Lee, Robust complementary dual image watermarking in subbands derived from the laplacian pyramid, discrete wavelet transform, and directional filter bank. Circuits Syst. Signal Process 41(7), 4090–4116 (2022)
H. Ji, W. Yu, Y. Li, A rank revealing randomized singular value decomposition (R3SVD) algorithm for low-rank matrix approximations (2016). arXiv:1605.08134
P. Khare, V. K. Srivastava Robust digital image watermarking scheme based on RDWT-DCT-SVD. In: 2018 5th international conference on signal processing and integrated networks (SPIN) (pp. 88–93). IEEE (2018)
P. Khare, V.K. Srivastava, A novel dual image watermarking technique using homomorphic transform and DWT. J. Intell. Syst. 30(1), 297–311 (2021). https://doi.org/10.1515/jisys-2019-0046
D.K. Mahto, O.P. Singh, A.K. Singh, FuSIW: fusion-based secure RGB image watermarking using hashing. Multimed. Tools Appl. (2022). https://doi.org/10.1007/s11042-022-13454-2
D.K. Mahto, A.K. Singh, Firefly optimization-based dual watermarking for colour images with improved capacity. Multimed. Tools Appl. (2022). https://doi.org/10.1007/s11042-022-13795-y
B.C. Mohan, K.V. Swamy, On the use of Schur decomposition for copyright protection of digital images. Int. J. Comput. Electr. Eng. 2(4), 1793–8163 (2010)
V. Rathore, A.K. Pal, An image encryption scheme in bit plane content using Henon map based generated edge map. Multimed Tools Appl 80, 22275–22300 (2021). https://doi.org/10.1007/s11042-021-10719-0
S.J. Sheela, K.V. Suresh, D. Tandur, Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 77, 25223–25251 (2018). https://doi.org/10.1007/s11042-018-5782-2
S. Singh, V.S. Rathore, R. Singh, M.K. Singh, Hybrid semi-blind image watermarking in redundant wavelet domain. Multimed. Tools Appl. 76(18), 19113–19137 (2017)
A.K. Singh, Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed. Tools Appl. 78, 30523–30533 (2019)
F. Thakkar, V.K. Srivastava, A particle swarm optimization and block-SVD-based watermarking for digital images. Turk. J. Electr. Eng. Comput. Sci. 25(4), 3273–3288 (2017)
S. Thakur, A.K. Singh, S.P. Ghrera, A. Mohan, Chaotic based secure watermarking approach for medical images. Multimed. Tools Appl. 79(7–8), 4263–4276 (2020). https://doi.org/10.1007/s11042-018-6691-0
VPS Naidu (2023). DT CWT based image Fusion (https:// www. mathworks. com/ matlabcentral /fileexchange/32086-dt-cwt-based-image-fusion), MATLAB Central File Exchange. Retrieved January 4, 2023.
K. Wang, T. Gao, D. You, X. Wu, H. Kan, A secure dual-color image watermarking scheme based 2D DWT, SVD and Chaotic map. Multimed. Tools Appl. 81(5), 6159–6190 (2022)
A. Zear, A.K. Singh, P. Kumar, Multiple watermarking for healthcare applications. J. Intell. Syst. 27(1), 5–18 (2018)
A. Zear, P.K. Singh, Secure and robust color image dual watermarking based on LWT-DCT-SVD. Multimed. Tools Appl. 81(19), 26721–26738 (2022)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Awasthi, D., Srivastava, V.K. An Optimized and Secured Image Watermarking and Its Dual Authentication for Internet of Medical Things. Circuits Syst Signal Process 43, 1270–1297 (2024). https://doi.org/10.1007/s00034-023-02519-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00034-023-02519-8