Skip to main content
Log in

Securing Medical Data by Combining Encryption and Robust Blind Medical Image Watermarking Based on Zaslavsky Chaotic Map and DCT Coefficients

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

The transmission of patient records through communication networks requires techniques which guarantee the security and confidentiality of telemedicine means. This paper presents an improved robust blind medical image watermarking algorithm based on two dimensional discrete cosine transform (2D-DCT) and Zaslavsky chaotic map able to increase the size of the embedded watermark and to provide protection of patient data. In the proposed scheme, we use the X-ray, scanner, magnetic resonance, and ultrasound image, the size of gray medical images is 512 × 512 pixels, and the digital watermark is composed from 4096 bits of electronic patient records (EPR) and 4096 bits of binary logo image, so a payload of 8192 bits. The encrypted watermark is embedded in the shuffled blocks of discrete cosine transform coefficients of the medical image using a 256-bit secret key to increase the security. The experimental results show the robustness of the proposed method to various common attacks, for example, JPEG compression, Gaussian noise, salt and pepper noise, filtering, cropping, rotation and histogram equalization. Also, the security analysis, demonstrates that the proposed watermarking algorithm achieves high security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R. Relevance of watermarking in medical imaging. In: Proceedings 2000 IEEE EMBS international conference on information technology applications in biomedicine. ITAB-ITIS 2000, joint meeting third IEEE EMBS international conference on information technol, Arlington, VA, USA, pp 250–255; 2000. https://doi.org/10.1109/ITAB.2000.892396.

  2. Agarwal N, Singh AK, Singh PK. Survey of robust and imperceptible watermarking. Multimed Tools Appl. 2019;78:8603–33. https://doi.org/10.1007/s11042-018-7128-5.

    Article  Google Scholar 

  3. Allaf AH, Kbir MA. A review of digital watermarking applications for medical image exchange security. In: SCA 2018, LNITI, pp 472–480; 2019. https://doi.org/10.1007/978-3-030-11196-0_40.

  4. Singh G. A review of secure medical image watermarking. In: 2017 IEEE international conference on power, control, signals and instrumentation engineering (ICPCSI), Chennai, pp 3105–3109; 2017. https://doi.org/10.1109/ICPCSI.2017.8392297.

  5. Nyeem H, Boles W, Boyd C. A review of medical image watermarking requirements for teleradiology. J Digit Imaging. 2013;26:326–43. https://doi.org/10.1007/s10278-012-9527-x.

    Article  Google Scholar 

  6. Abraham J, Paul V. An imperceptible spatial domain color image watermarking scheme. J King Saud Univ Comput Inf Sci. 2019;31:125–33. https://doi.org/10.1016/j.ijleo.2020.165272.

    Article  Google Scholar 

  7. Sunesh, Rama Kishore R. A novel and efficient blind image watermarking in transform domain. Proc Comput Sci. 2020;167:1505–14. https://doi.org/10.1016/j.procs.2020.03.361.

    Article  Google Scholar 

  8. Yuan Z, Liu D, Zhang X, Su Q. New image blind watermarking method based on two-dimensional discrete cosine transform. Optik. 2020;204(164152):1–12. https://doi.org/10.1016/j.ijleo.2019.164152.

    Article  Google Scholar 

  9. Moosazadeh M, Ekbatanifard G. A new DCT-based robust image watermarking method using teaching-learning-based optimization. J Inf Secur Appl. 2019;47:28–38. https://doi.org/10.1016/j.jisa.2019.04.001.

    Article  Google Scholar 

  10. Fares K, Amine K, Salah E. A robust blind color image watermarking based on Fourier transform domain. Optik. 2020;208(164562):1–9. https://doi.org/10.1016/j.ijleo.2020.164562.

    Article  Google Scholar 

  11. Anand A, Singh AK. An improved DWT-SVD domain watermarking for medical information security. Comput Commun. 2020;152:72–80. https://doi.org/10.1016/j.comcom.2020.01.038.

    Article  Google Scholar 

  12. Soualmi A, Alti A, Laouamer L. A blind image watermarking method for personal medical data security. In: 2019 International conference on networking and advanced systems (ICNAS). https://doi.org/10.1109/ICNAS.2019.8807442.

  13. Thakur S, Singh AK, Kumar B, Ghrera SP. Improved DWT-SVD-based medical image watermarking through hamming code and chaotic encryption. In: Advances in VLSI, communication, and signal processing, lecture notes in electrical engineering, vol 587, pp 897–905; 2020. https://doi.org/10.1007/978-981-32-9775-3_80.

  14. Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM. Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl. 2017;76:10599–633. https://doi.org/10.1007/s11042-015-3127-y.

    Article  Google Scholar 

  15. Liu Y, Li J, Liu J, Bhatti UA, Chen Y, Hu S. Watermarking algorithm for encrypted medical image based on DCT-DFRFT. In: Innovation in medicine and healthcare systems, and multimedia, smart innovation, systems and technologies, vol 145, pp 105–114; 2019. https://doi.org/10.1007/978-981-13-8566-7_10.

  16. Singh S, Singh R, Singh AK, Siddiqui TJ. SVD-DCT based medical image watermarking in NSCT domain. In: Quantum computing: an environment for intelligent large scale real application, studies in big data, vol 33, 467–486; 2018. https://doi.org/10.1007/978-3-319-63639-9_20.

  17. Liu Y, Li J, Liu J, Cheng J, Liu J, Wang L, Bai X. Robust encrypted watermarking for medical images based on DWT-DCT and tent mapping in encrypted domain. In: ICAIS 2019, LNCS 11633, pp 584–596; 2019. https://doi.org/10.1007/978-3-030-24265-7_50.

  18. Dai Q, Li J, Bhatti UA, Chen Y-W, Liu J. SWT-DCT-based robust watermarking for medical image. In: Innovation in medicine and healthcare systems, and multimedia, smart innovation, systems and technologies, vol 145, pp 93–103; 2019. https://doi.org/10.1007/978-981-13-8566-7_9.

  19. Dogan S, Tuncer T, Avci E, et al. A new watermarking system based on discrete cosine transform (DCT) in color biometric images. J Med Syst. 2012;36:2379–85. https://doi.org/10.1007/s10916-011-9705-2.

    Article  Google Scholar 

  20. Thanki R, Borra S, Dwivedi V, Borisagar K. An efficient medical image watermarking scheme based on FDCuT–DCT. Eng Sci Technol Int J. 2017;20:1366–79. https://doi.org/10.1016/j.jestch.2017.06.001.

    Article  Google Scholar 

  21. Parah SA, Loan NA, Shah AA, et al. A new secure and robust watermarking technique based on logistic map and modification of DC coefficient. Nonlinear Dyn. 2018;93:1933–51. https://doi.org/10.1007/s11071-018-4299-6.

    Article  Google Scholar 

  22. Liu N, Li H, Dai H, et al. Robust blind image watermarking based on chaotic mixtures. Nonlinear Dyn. 2015;80:1329–55. https://doi.org/10.1007/s11071-015-1946-z.

    Article  Google Scholar 

  23. Singh RK, Singh AK. A recent survey of DCT based digital image watermarking theories and techniques: a review. In: ICAICR 2019, CCIS 1075, pp 431–440; 2019. https://doi.org/10.1007/978-981-15-0108-1_40.

  24. Zaslavsky GM. The simplest case of a strange attractor. Phys Lett A. 1978;69(3):145–7.

    Article  MathSciNet  Google Scholar 

  25. Balaska N, Ahmida Z, Belmeguenai A, Boumerdassi S. Image encryption using a combination of Grain-128a algorithm and Zaslavsky chaotic map. IET Image Process. 2020;14(6):1120–31. https://doi.org/10.1049/iet-ipr.2019.0671.

    Article  Google Scholar 

  26. Ernawan F, Kabir MN. A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access. 2018;6:20464–80. https://doi.org/10.1109/ACCESS.2018.2819424.

    Article  Google Scholar 

  27. Byun S, Son H, Lee S. Fast and robust watermarking method based on DCT specific location. IEEE Access. 2019;7:100706–18. https://doi.org/10.1109/ACCESS.2019.2931039.

    Article  Google Scholar 

  28. Tomar R, Patni JC, Dumka A, Anand A. Blind watermarking technique for grey scale image using block level discrete cosine transform (DCT). In: Advances in intelligent systems and computing, vol 338. Springer, Cham; 2015. https://doi.org/10.1007/978-3-319-13731-5_10.

  29. Tong XJ, Wang Z, Zhang M, et al. A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dyn. 2013;72:229–41. https://doi.org/10.1007/s11071-012-0707-5.

    Article  MathSciNet  Google Scholar 

  30. Sam IS, Devaraj P, Bhuvaneswaran RS. An efficient quasigroup based image encryption using modified nonlinear chaotic maps. Sens Imaging. 2014;15:92. https://doi.org/10.1007/s11220-014-0092-x.

    Article  Google Scholar 

  31. Shatheesh Sam I, Devaraj P, Bhuvaneswaran RS. An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn. 2012;69:1995–2007. https://doi.org/10.1007/s11071-012-0402-6.

    Article  MathSciNet  Google Scholar 

  32. Farah MAB, Farah A, Farah T. An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. 2020;99:3041–64. https://doi.org/10.1007/s11071-019-05413-8.

    Article  Google Scholar 

  33. Zhao CF, Ren HP. Image encryption based on hyper-chaotic multi-attractors. Nonlinear Dyn. 2020;100:679–98. https://doi.org/10.1007/s11071-020-05526-5.

    Article  Google Scholar 

  34. Wang Q, et al. Theoretical design and FPGA-based implementation of higher-dimensional digital chaotic systems. IEEE Trans Circuits Syst I Regul Pap. 2016;63(3):401–12. https://doi.org/10.1109/TCSI.2016.2515398.

    Article  MathSciNet  MATH  Google Scholar 

  35. AboAlNaga BADM, Said LA, Madian AH, Radwan AG. Analysis and FPGA of semi-fractal shapes based on complex Gaussian map. Chaos Solitons Fractals. 2020. https://doi.org/10.1016/j.chaos.2020.110493 (ISSN 0960-0779).

    Article  Google Scholar 

  36. Abd El-Maksoud AJ, Abd El-Kader AA, Hassan BG, Rihan NG, Tolba MF, Said LA, Radwan AG, Abu-Elyazeed MF. FPGA implementation of sound encryption system based on fractional-order chaotic systems. Microelectron J. 2019;90:323–35. https://doi.org/10.1016/j.mejo.2019.05.005 (ISSN 0026-2692).

    Article  Google Scholar 

  37. Li B, Liao X, Jiang Y. A novel image encryption scheme based on improved random number generator and its implementation. Nonlinear Dyn. 2019;95:1781–805. https://doi.org/10.1007/s11071-018-4659-2.

    Article  MATH  Google Scholar 

  38. Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F. A privacy-preserving cryptosystem for IoT E-healthcare. Inf Sci. 2020;527:493–510. https://doi.org/10.1016/j.ins.2019.01.070 (ISSN 0020-0255).

    Article  MathSciNet  MATH  Google Scholar 

  39. Tutueva AV, Nepomuceno EG, Karimov AI, Andreev VS, Butusov DN. Adaptive chaotic maps and their application to pseudo-random numbers generation. Chaos Solitons Fractals. 2020;133:109615. https://doi.org/10.1016/j.chaos.2020.109615 (ISSN 0960-0779).

    Article  MathSciNet  Google Scholar 

  40. Hénon M. A two-dimensional mapping with a strange attractor. Commun Math Phys. 1976;1:69–77.

    Article  MathSciNet  Google Scholar 

  41. Wu Y, Yang G, Jin H, et al. Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging. 2012;21(1):3014–43.

    Article  Google Scholar 

  42. Gonzalo A, Shujun L. Some basic cryptographic requirements for chaos based cryptosystems. Int J Bifurc Chaos. 2006;16(08):2129–51. https://doi.org/10.1142/S0218127406015970.

    Article  MathSciNet  MATH  Google Scholar 

  43. Agren M, Hell M, Johansson T. Grain-128a: a new version of grain-128 with optional authentication. Int J Wirel Mob Comput. 2011;5(1):48–59.

    Article  Google Scholar 

  44. https://medpix.nlm.nih.gov/home.

  45. Singh AK, Dave M, Mohan A. Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wirel Pers Commun. 2015;83:2133–50. https://doi.org/10.1007/s11277-015-2505-0.

    Article  Google Scholar 

  46. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process. 2004;13(4):600–12. https://doi.org/10.1109/TIP.2003.819861.

    Article  Google Scholar 

  47. Selvam P, Balachandran S, Iyer SP, Jayabal R. Hybrid transform based reversible watermarking technique for medical images in telemedicine applications. Optik. 2017;145:655–71. https://doi.org/10.1016/j.ijleo.2017.07.060.

    Article  Google Scholar 

  48. Wu Y, Noonan JP, Agaian S. NPCR and UACI randomness tests for image encryption. In: Cyber journals: multidisciplinary journals in science and technology. J. Sel. Areas Telecommun. (JSAT), pp 31–38; 2011.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nawal Balaska.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Balaska, N., Belmeguenai, A., Goutas, A. et al. Securing Medical Data by Combining Encryption and Robust Blind Medical Image Watermarking Based on Zaslavsky Chaotic Map and DCT Coefficients. SN COMPUT. SCI. 3, 118 (2022). https://doi.org/10.1007/s42979-021-01012-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-021-01012-w

Keywords