Skip to main content
Log in

A new robust and fragile scheme based on chaotic maps and dwt for medical image security

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Medical image security includes copyright protection, authentication, data integrity and confidentiality simultaneously. In this article, a new robust and fragile medical image security scheme has been introduced. The Beddington, Free and Lawton (BFL) map and the Hénon map based image encryption scheme is brought out for confidentiality. Further, a Discrete Wavelet Transform (DWT)-based image watermarking scheme is developed for copyright protection, authentication and data integrity. The proposed scheme is essentially robust and retrievable in terms of the watermark; however, it is highly sensitive and irretrievable with reference to the host image. The scheme separates the host image in Region of Interest (ROI) and Region of Non-Interest (RONI) parts, and it embeds the encoded message inside the RONI part. In addituon, the proposed scheme does not need any side information for message extraction. The performance of the scheme has been successfully tested and verified by several well known parameters. Moreover, the extensive experimental results exhibit the strength and effectiveness of the proposed technique with respect to the other state-of-the-art existing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 3
Algorithm 4
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Abd-Eldayem MM (2012) A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine. Egyptian Inform J 14(1):1–13

    Article  Google Scholar 

  2. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16(8):2129–2151

    Article  MathSciNet  MATH  Google Scholar 

  3. Beddington JR, Free CA, Lawton JH (1975) Dynamic complexity in predator–prey models framed in difference equations. Nature 255:58–60

    Article  Google Scholar 

  4. Cedillo-Hernández M, García-Ugalde F, Nakano-Miyatake M, Pérez-Meana HM (2014) Robust hybrid color image watermarking method based on DFT domain and 2D histogram modification. Signal Image Video Process 8(1):49–63

    Article  Google Scholar 

  5. Fazli S, Moeini M (2016) A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik 127(2):964–972

    Article  Google Scholar 

  6. Funt, et al. (2017) HDR dataset computational vision lab computing science, Simon Fraser University, Burnaby, BC, Canada. http://www.cs.sfu.ca/colour/data/funt_hdr/. Accessed 02 May 2017

  7. Hénon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50(1):69–77

    Article  MathSciNet  MATH  Google Scholar 

  8. Huang X (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67:2411–2417

    Article  MathSciNet  Google Scholar 

  9. Kester QA, Nana L, Pascu AC, Gire S, Eghan JM, Quaynor NN (2015) A security technique for authentication and security of medical images in health information systems. Proc Int Conf Comput Sci Appl:8–13

  10. Kumar R, Chand S, Singh S (2018) An improved histogram-shifting-imitated reversible data hiding based on HVS characteristics. Multimed Tools Appl 77:13445–13457

    Article  Google Scholar 

  11. Malik A, Singh S, Kumar R (2018) Recovery based high capacity reversible data hiding scheme using even-odd embedding. Multimed Tools Appl 77:15803–15827

    Article  Google Scholar 

  12. Nottingham Trent University, UK, “UCID image database”. http://jasoncantarella.com/downloads/ucid.v2.tar.gz. Accessed 02 May 2018

  13. Priya S, Santhi B (2019) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mobile Netw Appl:1–8

  14. Priyanka MS (2017) Region-based hybrid medical image watermarking for secure telemedicine applications. Multimed Tools Appl 76:3617–3647

    Article  Google Scholar 

  15. Rahimi F, Rabbani H (2011) A dual adaptive watermarking scheme in contourlet domain for DICOM images. BioMed Eng OnLine 10(53):1–18

    Google Scholar 

  16. Rahman AU, Sultan K, Aldhafferi N, Alqahtani A, Mahmud M (2018) Reversible and fragile watermarking for medical images. Comput Math Methods Med 2018(3461382):1–7

    Article  MATH  Google Scholar 

  17. Rahman AU, Sultan K, Musleh D, Aldhafferi N, Alqahtani A, Mahmud M (2018) Robust and fragile medical image watermarking: a joint venture of coding and chaos theories. J Healthcare Eng 2018(8137436):1–11

    Article  Google Scholar 

  18. Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking for medical images. Wireless Pers Commun 92:1611–1624

    Article  Google Scholar 

  19. Sheela SJ, Suresh KV, Tandur D (2018) Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 77:25223–25251

    Article  Google Scholar 

  20. Showkat S, Parah S A, Gull S (2021) Embedding in medical images with contrast enhancement and tamper detection capability. Multimed Tools Appl 80:2009–2030

    Article  Google Scholar 

  21. Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wireless Personal Commun 83:2133–2150

    Article  Google Scholar 

  22. Stinson D (2002) Cryptography: theory and practice. Second edn. CRC/C&H

  23. Thabit R, Khoo BE (2017) Medical image authentication using SLT and IWT schemes. Multimed Tools Appl 76:309–332

    Article  Google Scholar 

  24. Tong XJ, Wang Z, Zhang M, Liu Y, Xu H, Ma J (2015) An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn 80:1493–1508

    Article  MathSciNet  MATH  Google Scholar 

  25. The National Library of Medicine, U.S., “The dataset of the visible human project”. https://www.nlm.nih.gov/databases/download/vhp.html. Accessed 02 Nov 2019

  26. University of California, San Diego, “STARE Image Database”. https://cecas.clemson.edu/ahoover/stare/. Accessed 02 May 2018

  27. University of Southern California, “The USC-SIPI image database”. http://sipi.usc.edu/database/database.php. Accessed 02 May 2018

  28. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Select Areas Telecom (JSAT):31–38

  29. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Infor Sci 222:323–342

    Article  MathSciNet  MATH  Google Scholar 

  30. Zhang X, Mao Y, Zhao Z (2014) An efficient chaotic image encryption based on alternate circular S-boxes. Nonlinear Dyn 78:359–369

    Article  Google Scholar 

  31. Zhang X, Zhao Z, Wang J (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29 (8):902–913

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the reviewers and the Associate Editor for their valuable suggestions that helped in improving the quality, readability and presentation of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashok Kumar Das.

Ethics declarations

Conflict of Interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

De, S., Bhaumik, J., Giri, D. et al. A new robust and fragile scheme based on chaotic maps and dwt for medical image security. Multimed Tools Appl 82, 11753–11792 (2023). https://doi.org/10.1007/s11042-022-13585-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13585-6

Keywords

Navigation