Abstract
Medical image security includes copyright protection, authentication, data integrity and confidentiality simultaneously. In this article, a new robust and fragile medical image security scheme has been introduced. The Beddington, Free and Lawton (BFL) map and the Hénon map based image encryption scheme is brought out for confidentiality. Further, a Discrete Wavelet Transform (DWT)-based image watermarking scheme is developed for copyright protection, authentication and data integrity. The proposed scheme is essentially robust and retrievable in terms of the watermark; however, it is highly sensitive and irretrievable with reference to the host image. The scheme separates the host image in Region of Interest (ROI) and Region of Non-Interest (RONI) parts, and it embeds the encoded message inside the RONI part. In addituon, the proposed scheme does not need any side information for message extraction. The performance of the scheme has been successfully tested and verified by several well known parameters. Moreover, the extensive experimental results exhibit the strength and effectiveness of the proposed technique with respect to the other state-of-the-art existing techniques.
Similar content being viewed by others
References
Abd-Eldayem MM (2012) A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine. Egyptian Inform J 14(1):1–13
Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16(8):2129–2151
Beddington JR, Free CA, Lawton JH (1975) Dynamic complexity in predator–prey models framed in difference equations. Nature 255:58–60
Cedillo-Hernández M, García-Ugalde F, Nakano-Miyatake M, Pérez-Meana HM (2014) Robust hybrid color image watermarking method based on DFT domain and 2D histogram modification. Signal Image Video Process 8(1):49–63
Fazli S, Moeini M (2016) A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik 127(2):964–972
Funt, et al. (2017) HDR dataset computational vision lab computing science, Simon Fraser University, Burnaby, BC, Canada. http://www.cs.sfu.ca/colour/data/funt_hdr/. Accessed 02 May 2017
Hénon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50(1):69–77
Huang X (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67:2411–2417
Kester QA, Nana L, Pascu AC, Gire S, Eghan JM, Quaynor NN (2015) A security technique for authentication and security of medical images in health information systems. Proc Int Conf Comput Sci Appl:8–13
Kumar R, Chand S, Singh S (2018) An improved histogram-shifting-imitated reversible data hiding based on HVS characteristics. Multimed Tools Appl 77:13445–13457
Malik A, Singh S, Kumar R (2018) Recovery based high capacity reversible data hiding scheme using even-odd embedding. Multimed Tools Appl 77:15803–15827
Nottingham Trent University, UK, “UCID image database”. http://jasoncantarella.com/downloads/ucid.v2.tar.gz. Accessed 02 May 2018
Priya S, Santhi B (2019) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mobile Netw Appl:1–8
Priyanka MS (2017) Region-based hybrid medical image watermarking for secure telemedicine applications. Multimed Tools Appl 76:3617–3647
Rahimi F, Rabbani H (2011) A dual adaptive watermarking scheme in contourlet domain for DICOM images. BioMed Eng OnLine 10(53):1–18
Rahman AU, Sultan K, Aldhafferi N, Alqahtani A, Mahmud M (2018) Reversible and fragile watermarking for medical images. Comput Math Methods Med 2018(3461382):1–7
Rahman AU, Sultan K, Musleh D, Aldhafferi N, Alqahtani A, Mahmud M (2018) Robust and fragile medical image watermarking: a joint venture of coding and chaos theories. J Healthcare Eng 2018(8137436):1–11
Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking for medical images. Wireless Pers Commun 92:1611–1624
Sheela SJ, Suresh KV, Tandur D (2018) Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 77:25223–25251
Showkat S, Parah S A, Gull S (2021) Embedding in medical images with contrast enhancement and tamper detection capability. Multimed Tools Appl 80:2009–2030
Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wireless Personal Commun 83:2133–2150
Stinson D (2002) Cryptography: theory and practice. Second edn. CRC/C&H
Thabit R, Khoo BE (2017) Medical image authentication using SLT and IWT schemes. Multimed Tools Appl 76:309–332
Tong XJ, Wang Z, Zhang M, Liu Y, Xu H, Ma J (2015) An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn 80:1493–1508
The National Library of Medicine, U.S., “The dataset of the visible human project”. https://www.nlm.nih.gov/databases/download/vhp.html. Accessed 02 Nov 2019
University of California, San Diego, “STARE Image Database”. https://cecas.clemson.edu/ahoover/stare/. Accessed 02 May 2018
University of Southern California, “The USC-SIPI image database”. http://sipi.usc.edu/database/database.php. Accessed 02 May 2018
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Select Areas Telecom (JSAT):31–38
Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Infor Sci 222:323–342
Zhang X, Mao Y, Zhao Z (2014) An efficient chaotic image encryption based on alternate circular S-boxes. Nonlinear Dyn 78:359–369
Zhang X, Zhao Z, Wang J (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29 (8):902–913
Acknowledgements
The authors would like to thank the reviewers and the Associate Editor for their valuable suggestions that helped in improving the quality, readability and presentation of the paper.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interests
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
De, S., Bhaumik, J., Giri, D. et al. A new robust and fragile scheme based on chaotic maps and dwt for medical image security. Multimed Tools Appl 82, 11753–11792 (2023). https://doi.org/10.1007/s11042-022-13585-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13585-6