Literature DB >> 35818513

WatMIF: Multimodal Medical Image Fusion-Based Watermarking for Telehealth Applications.

Kedar Nath Singh1,2, Om Prakash Singh1, Amit Kumar Singh1, Amrit Kumar Agrawal3.   

Abstract

Over recent years, the volume of big data has drastically increased for medical applications. Such data are shared by cloud providers for storage and further processing. Medical images contain sensitive information, and these images are shared with healthcare workers, patients, and, in some scenarios, researchers for diagnostic and study purposes. However, the security of these images in the transfer process is extremely important, especially after the COVID-19 pandemic. This paper proposes a secure watermarking algorithm, termed WatMIF, based on multimodal medical image fusion. The proposed algorithm consists of three major parts: the encryption of the host media, the fusion of multimodal medical images, and the embedding and extraction of the fused mark. We encrypt the host media with a key-based encryption scheme. Then, a nonsubsampled contourlet transform (NSCT)-based fusion scheme is employed to fuse the magnetic resonance imaging (MRI) and computed tomography (CT) scan images to generate the fused mark image. Furthermore, the encrypted host media conceals the fused watermark using redundant discrete wavelet transform (RDWT) and randomised singular value decomposition (RSVD). Finally, denoising convolutional neural network (DnCNN) is used to improve the robustness of the WatMIF algorithm. The simulation experiments on two standard datasets were used to evaluate the algorithm in terms of invisibility, robustness, and security. When compared with the existing algorithms, the robustness is improved by 20.14%. Overall, the implementation of proposed watermarking for hiding fused marks and efficient encryption improved the identity verification, invisibility, robustness and security criteria in our WatMIF algorithm.
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.

Entities:  

Keywords:  DnCNN; Encryption; Medical images; Multimodal fusion; Security; Watermarking

Year:  2022        PMID: 35818513      PMCID: PMC9261166          DOI: 10.1007/s12559-022-10040-4

Source DB:  PubMed          Journal:  Cognit Comput        ISSN: 1866-9956            Impact factor:   4.890


Introduction

Over recent years, the volume of big data has drastically increased for medical applications. Such data are shared by cloud providers for storage and further processing. Medical data in the form of images, contain sensitive information, and these images are shared with healthcare workers, patients, and, in some scenarios, researchers for diagnostic and study purposes [1]. Additionally, cloud computing in healthcare becomes an important solution for the storage, processing, and continuous availability of data supplied by multiple sources. However, an increasingly serious concern is the illegal copying, modification, and forgery of medical records [2]. Furthermore, the issue of identity theft and copyright protection is becoming more prevalent by the day [3, 4]. The integrity of data must be safeguarded against unauthorised users. Encryption is a popular technique for protecting data confidentiality and privacy [5, 6]. It can be considered an a priori protection in the sense that data are protected until they are decrypted. Furthermore, once data are decrypted, several security questions arise. Watermarking is a popular solution to handling the security issue of any encryption scheme [7]. It involves embedding a secret mark in the host media as a form of identification [8, 9]. The primary aim of watermarking is to enhance three features—invisibility, capacity, and robustness—that should be maintained to ensure a secure system [8]. Presently, multimodal image fusion is the technique of merging information from two or more image modalities into a single composite image that is better suited for diagnosis and assessment. However, the security of fused medical information in the transfer process is extremely important, especially after the COVID-19 pandemic. This paper proposes a secure watermarking algorithm based on multimodal medical image fusion. The main contributions are as follows: Advantages of image fusion: An NSCT-based fusion scheme is employed to fuse MRI and CT scan images, generating the fused mark image. This fused mark image has rich information, which is better suited for diagnostic and assessment than an individual image; Encryption of host media before watermarking: A key-based encryption scheme is used to ensure the security of the watermarking system. The encryption scheme is fast without compromising the security of medical images, which is suitable for a telehealth scenario; Embedding of the fused image through RDWT and RSVD: The fusion of RDWT and RSVD is utilised to perform an imperceptible marking of the fused image within the encrypted media. This combination offers not only high robustness and imperceptibility, but also increases the mark capacity with linear complexity. RDWT is shift-invariant and offers all the desirable properties of discrete wavelet transform (DWT) [10]. Additionally, RSVD [10] can be used to embed the mark data in the source image for reducing the amount of calculation, i.e. the computational cost; Improved robustness: We have improved the robustness of the algorithm through DnCNN [11]. From the simulation, it is inferred that the WatMIF algorithm exhibits improved robustness compared to existing schemes. The rest of the article is organised as follows: the following section presents the existing work related to image fusion-based watermarking; the Methodology Section discusses the proposed WatMIF algorithm; the Experiments Section demonstrates the experimental evaluation of the WatMIF algorithm; the Conclusion Section contains the concluding remark.

Related Works

For the last few years, different fusion-based watermarking mechanisms have been proposed for telehealth scenarios. For example, Singh and Singh [8] proposed a data hiding scheme using the NSCT, SVD, and Hessenberg decomposition techniques. They utilised the pseudo-magic cubes approach for large data embedding and the reduction of distortion. Furthermore, chaotic maps, deoxyribonucleic acid (DNA), and MD5 are used to enhance security. Experimental results show that the proposed scheme has high robustness and better hiding efficiency when compared to the existing scheme. Anand and Singh [12] proposed a novel joint spatial-transform domain technique to embed a fused medical image watermark with the cover image. Chaotic sequencing and singular value decomposition (SVD) are used to encrypt the marked medical image. The findings suggest that the approach has a greater robustness effect than previous techniques, with outstanding invisibility and payload. However, other security features, like statistical analysis, key space, and key sensitivity of the scheme, need to be verified. Bhardwaj [13] presented a dual image reversible data hiding method with great capacity. Paillier cryptography is used to encrypt both cover image and secret data. Encrypted secret data is embedded into the encrypted cover image. Furthermore, a fragile watermark is utilised for content verification on the beneficiary side. Experimental findings show that the scheme is robust, secure, has high embedding capacity, and can embed data at a high resolution. However, the embedding time of the scheme is higher than others. Vaidya [14] suggested the lifting wavelet transform (LWT)-DWT domain-based watermarking technique for medical image privacy. Arnold Cat map is utilised to enhance the security of watermarked images. The scheme achieved superior imperceptibility and robustness. However, the encryption method used in this scheme was not much secure. Sayah et al. [15] propounded a watermarking technique to ensure the integrity of the watermark. The medical image of the patient is first compressed, and patient information is embedded into it by DWT. A hash code of patient information is generated using the MD5 algorithm and also integrated to ensure integrity. Furthermore, the RC4 encryption scheme is used to encrypt the watermarked image. The suggested technique preserves a good quality of watermarked images and a strong resilience against numerous assaults. Ramzan et al. [16] presented a medical image watermarking scheme to preserve the integrity and authorisation of medical images. Watermark embedding is done by using Weber local descriptor (WLD) and discrete cosine transform (DCT), and its integrity is verified by Bioshashing code. Despite the fact that the proposed approach is resistant to a variety of assaults, the retrieved watermark image is noisy, and the embedding time of the scheme is also high. Manikandan and Amirtharajan [17] designed secret embedding of patient information into encrypted medical images. The encryption process involves the Bülban map, Le Gall 5/3 Transform, confusion, and diffusion. The proposed scheme has good security features and low computational complexity; however, the robustness of the scheme needs to be verified. Singh et al. [18] offered medical image watermarking, based on DWT-SVD. Firstly, they divide the image into regions of interest (ROI) and regions of noninterest (RONI). For secrecy and payload, the electronic patient record is first compressed and then encrypted by human coding and a secret key, respectively. Watermarked image is generated by the embedding of a recovery bit, QR code, and cipher electronic patient record into RONI. The proposed scheme achieves good robustness against various attacks. Daoui et al. [19] offered copyright protection systems based on zero-watermarking and encryption techniques for images. They introduced modified logistic maps for image encryption. The ROI of the encrypted image is selected, and the XOR with QR code generates the zero-watermark. The suggested technique has a high level of security and is resistant to typical attacks, but it also has a high level of computing complexity.

Methodology

The proposed WatMIF algorithm consists of three major parts: the encryption of host media, the fusion of multi-modal medical images, and the embedding and extraction of the fused mark. The stepwise procedures for each phase are illustrated in Algorithm 1 to Algorithm 7, respectively. Some commonly used notations in these algorithms are listed in Table 1.
Table 1

Notation and explanation

NotationExplanationNotationExplanationNotationExplanation
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathrm{Cov}}_{img}$$\end{document}CovimgCover image\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathrm{Fus}}_{\mathrm{img}}$$\end{document}FusimgImage after fusion\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$a1, b1, c1, d1$$\end{document}a1,b1,c1,d1RDWT coefficients of encrypted image
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${X}_{p}$$\end{document}XpConfusion key\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathrm{RDWT}$$\end{document}RDWTRedundant-discrete wavelet transform\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$a2, b2, c2, d2$$\end{document}a2,b2,c2,d2RDWT coefficients of fused mark image
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${X}_{d}$$\end{document}XdDiffusion key\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathrm{RSVD}$$\end{document}RSVDRandomised-singular value decomposition\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathrm{Wat}}_{\mathrm{img}}^{,}$$\end{document}Watimg,Received encrypted marked image
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathrm{Enc}}_{img}$$\end{document}EncimgEncrypted cover image\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathrm{IRDWT}$$\end{document}IRDWTInverse RDWT\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$U S V$$\end{document}USVU and V are orthogonal and S is singular matrix
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathrm{Per}}_{img}$$\end{document}PerimgConfused image\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathrm{Wat}}_{\mathrm{img}}$$\end{document}WatimgEncrypted marked image\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${S}_{emb}$$\end{document}SembModified singular value
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathrm{img}1,$$\end{document}img1, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathrm{img}2$$\end{document}img2CT and MRI images\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathrm{Fus}}_{\mathrm{img}}^{,}$$\end{document}Fusimg,Extracted fused mark image\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$L()$$\end{document}L()Precision limited logistic map
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${r}_{i}$$\end{document}riith iteration value of the integrated map\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$S()$$\end{document}S()Precision limited skew tent map\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${I}_{0}$$\end{document}I0, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${J}_{0}$$\end{document}J0,\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${K}_{0}$$\end{document}K0Initial values for \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$L()$$\end{document}L() and two \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$S()$$\end{document}S()
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathrm{NSCT}$$\end{document}NSCTNon-subsampled contourlet transform\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathrm{Cov}}_{\mathrm{img}}^{,}$$\end{document}Covimg,Decrypted cover image\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${C}_{1}, {C}_{2}$$\end{document}C1,C2Parameters for two \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$S()$$\end{document}S()
Notation and explanation

The Encryption of Host Media

In this section, we will introduce a number of previous studies as the basis for the encryption scheme. First, we introduce a simplified process of an encryption scheme in terms of key initialisation and generation. Second, we will describe the confusion and diffusion processes in detail. Initially, this encryption scheme is proposed by Li et al. [20]. However, our key generation method is totally different from the scheme proposed in [20]. The proposed encryption technique offers improved security characteristics, such as large key space, high key sensitivity, and low computing cost. It can also withstand differential, statistical, and other common security attacks. In the encryption stage, a precision-limited logistic map and skew tent map are combined to generate a new chaotic sequence. Two random 156-bit secret keys are used to generate the two 32-bit keys, which are used for confusion and diffusion. The simplified procedure of key generation process and proposed WatMIF algorithm is shown in Figs. 1 and 2, respectively.
Fig. 1

Proposed chaotic key generation framework

Fig. 2

The framework of proposed scheme

Proposed chaotic key generation framework The framework of proposed scheme

Key Initialization and Generation Procedure

Key initialization is a very important step for any chaotic-based encryption because they are very sensitive to initial values. We first choose a secret key of 156 bit for initialising the value of precision limited logistic map (LM) and skew tent map (STM). This secret key is divided into five parts and used to initialize the initial values and parameters for the LM and STM. is the initial value for LM. are the initial and parameter value for the first STM and are the initial value and parameter value for the second STM. The encryption process is repeated twice, so two pseudo random number generators (PRNG) are initialised. The PRNG is initialised after 20 iterations. Furthermore, the key generation step involves the generation of two different sequences and for confusion and diffusion purpose, respectively. Each repetition of the precision-limited LM and STM yields a 32-bit sequence. For the cover image of size a random number of length R = ⌈(m × n)/4⌉ is generated. If the size of the image is not multiple of 2 then the size of is calculated as Rp = ⌊(m/2) × floor(n/2)⌋. The detailed procedure is key initialization and generation and is described in Algorithms 1 and 2, respectively.

Confusion and Diffusion Procedure

The encryption step utilised generated sequence matrix and to encrypt the cover image . Encryption is done by 2 times permutation and diffusion processes. Permutation step is done by creating a random number matrix R by combining maps, the size of this matrix is width/2 and height/2 of the since we are taking 2 × 2 parts of the image to reduce some amount of time in the permutation process, then It is sorted by its value with indexes. This yields matrix with only indexes of random number matrix R, and then the image is scrambled by these indexes. Each time, the is permuted by , and then the permuted image is diffused by . Furthermore, every time, and rounds of row and column diffusion are performed respectively. The simplified permutation procedure is shown in Fig. 3, and the detailed confusion and diffusion processes are included in Algorithm 3. The decryption process is just the inverse of the encryption process, which utilize the and . First, inverse diffusion is applied on by diffusion key then, inverse confusion is performed to recover the cover image . Algorithm 4 depicts the entire decryption procedure of our approach.
Fig. 3

Permutation procedure of plain image

Permutation procedure of plain image

Fusion of Multi-Modal Medical Images

In this section, an NSCT-based fusion approach is performed on multi-modal images, such as CT and MRI images, to obtain a fused mark image, . First, NSCT is utilised to transform the CT and MRI images into different resolutions and directions. After that, low- and high-frequency rules are applied to fuse the NSCT coefficients of CT and MRI images, respectively. Lastly, inverse NSCT is performed to generate the fused image. The fused image is used as a watermark. The simplified procedure of multimodal image fusion is described in Algorithm 5.

Embedding and Extraction Procedure of Fused Mark

In this section, and are transformed using RDWT and RSVD for embedding. Furthermore, the embedding operation is performed by altering the singular value of with the help of the embedding factor, ‘’. Lastly, the inverse operation of RSVD and RDWT is employed to obtain the encrypted marked image, . The detailed embedding procedure is explained in Algorithm 6. In addition, to recover fused mark image from received encrypted marked image , RDWT is utilised to obtain the coefficients of . RSVD is employed at the low-frequency coefficient . Then, singular value extraction is applied. Finally, inverse RSVD and RDWT are applied to recover the fused mark image. In addition, DnCNN is used to improve the robustness and degradation of . Algorithm 7 represents the detailed decryption process.

Experiments

In order to confirm the efficiency and resilience against many forms of attacks, we performed different experimental measures. All the experiments were done on MATLAB R2019a with an 8 GB RAM and a 64-bit core i5 processor. We have used different medical images of size 256 × 256 and 512 × 512 from different databases [21, 22]. Figure 4 represented the some of the sample images.
Fig. 4

Sample images used in the experiment

Sample images used in the experiment Encryption converts the image information into a meaningless form. From the encrypted image, the attacker cannot infer anything about the plain image. In order to demonstrate the visual perception security of the proposed encryption scheme, different medical images were encrypted and decrypted; the result is shown in Fig. 5. Additionally, to prove the robustness and security of the scheme, various analyses, like statistical, differential, key space, key sensitivity, noise attack, and visual quality, were performed in this section.
Fig. 5

Original images (a1, b1, c1, d1, and e1) and their corresponding encrypted (a2, b2, c2, d2, and e2) and decrypted image (a3, b3, c3, d3, and e3)

Original images (a1, b1, c1, d1, and e1) and their corresponding encrypted (a2, b2, c2, d2, and e2) and decrypted image (a3, b3, c3, d3, and e3)

Statistical Analysis

Statistical analysis determines the degree to which the pixels in an image are related. In a plain image, pixels are closely related, but in an encrypted image, there should be no relation [23]. We performed a histogram, correlation coefficient, and entropy analysis to measure the strength of our proposed scheme against statistical attacks.

Histogram Analysis

The histogram of an image represents the number of pixels of each grey level. Ideally, the histogram of the cipher image should be uniform for any encryption technique. The result of the histogram analysis of our encryption scheme is shown in Fig. 6. It is clear that all encrypted images have a uniform histogram and are completely different from the histogram of the corresponding plain images. Hence, the proposed scheme is highly secure against statistical attacks.
Fig. 6

Histogram evaluation

Histogram evaluation

Correlation Analysis

The correlation among the adjacent pixels is used to measure the strength of an encryption scheme against statistical attacks [6]. Generally, an encrypted image’s pixels are highly uncorrelated. To measure the correlation, correlation-coefficient is calculated in horizontal, vertical, and diagonal directions aswhere correlation is calculated between pixel l and , and indicates the number of pixel pairs (l, m). The correlation-coefficient value should be near zero, which indicates no correlation. To perform the correlation analysis, we randomly chose 3000 adjacent pixel pairs. Experimental results in Table 2 show that, for the encrypted image, all the values of the correlation-coefficient in all three directions are very close to zero, which means no correlation exists among the pixels of the encrypted image. Furthermore, the correlation performance of the proposed method is compared with that of recent schemes [24-26], indicating the effectiveness of our scheme. Figure 7 represents the correlation coefficients of plain and encrypted images.
Table 2

Correlation analysis

MethodImagePlain imageEncrypted image
HVDHVD

Proposed

method

M10.95760.95770.93560.0138 −0.0087 −0.0260
M20.99410.97760.97190.0233 −0.0018 −0.0048
M30.96710.97830.94870.01630.00680.0115
M40.99540.99530.98260.0082 −0.0110 −0.0247
M50.99310.99480.98820.00470.00590.0189
M60.90930.92060.8627 −0.00920.04700.0034
[24]Chest0.99360.99240.9878 −0.0017 −0.00080.0133
[25]46,529,543,479,051,320.dcmNANANA0.0339 −0.0143 −0.0197
[26]OPENi30.96700.97150.9408 −0.0017 −0.00130.0013
Fig. 7

Correlation coefficient analysis in horizontal, vertical, and diagonal direction of original and encrypted image

Correlation analysis Proposed method Correlation coefficient analysis in horizontal, vertical, and diagonal direction of original and encrypted image

Entropy Analysis

The measure of unpredictability in an image is represented by information entropy. A high entropy value shows high unpredictability in image data. Optimal value for grey scale encrypted image is eight [28]. Entropy is presented aswhere represent the probability of pixel . The entropy analysis of the proposed encryption scheme is included in Table 3. We found that the entropy of all encrypted images is very close to the optimal value. The maximum, minimum, and average entropy of the proposed scheme are 7.9993, 7.9969, and 7.9979, respectively. We also calculated the average entropy value of 50 images of a COVID-19 data set [22], which was 7.9980. Furthermore, we compare the entropy score with recent state-of-the art [24, 26, 27] which proves that our scheme provides a high level of randomness in encrypted images.
Table 3

Entropy analysis

MethodSize of imageTested imageEntropy
PlainEncrypted
Our encryption scheme256 × 256M13.71487.9972
256 × 256M26.19367.9976
256 × 256M54.10977.9969
256 × 256M64.42127.9973
512 × 512M37.59207.9993
512 × 512M46.78327.9993
Average (50 images of COVID-19 dataset[22])7.39787.9980
[24]256 × 256Chest6.53367.9981
[26]256 × 256OPENi3NA7.9976
[27]256 × 256FingerprintNA7.9899
Entropy analysis

Differential Analysis

Attackers frequently try to identify any meaningful association between the original and the encrypted images by modifying the value of one bit of the original image at a time and encrypting it with the set of keys and methods. If two cypher images have the same pixel values, the information about the plain image is likely to be exposed. Therefore, it is essential that a minor modification, even in a single bit in the plain image, causes the encrypted image to totally change in order to resist differential attacks. NPCR and UACI are two parameters that are used to assess the strength of an encryption scheme against differential attacks [29]. The ideal values for NPCR and UACI for an effective encryption technique are 0.996034 and 0.3346, respectively. NPCR and UACI are calculated aswhere, is the encrypted image corresponding to the plain image and the encrypted image is C′(p, q) after 1-bit modification to a plain image. Differential analysis in terms of NPCR and UACI of our encryption scheme are depicted in Table 4. We get the maximum, the minimum, and the average NPCR as 0.9961 and 0.9958, respectively. Furthermore, another 50 images were selected from a COVID-19 dataset [22], and the average NPCR and UACI were computed with values of 0.9960 and 0.3346, respectively.
Table 4

The NPCR and UACI values of different medical images

MethodSize of imageTested imageNPCRUACI
Our encryption scheme256 × 256M10.99580.3350
256 × 256M20.99610.3355
256 × 256M50.99610.3346
256 × 256M60.99600.3341
512 × 512M30.99610.3344
512 × 512M40.99600.3345
Average (50 images of COVID-19 dataset [22])0.99600.3346
[24]256 × 256Chest0.99610.3346
[26]256 × 256OPENi30.99550.3336
[27]256 × 256Fingerprint0.99600.3355
The NPCR and UACI values of different medical images The results show that all the values of NPCR and UACI are very close to idle values, and the average values of NPCR/UACI are equal to the optimal one. In addition, we also compared the result with recent schemes [24, 26, 27] and found it to be better than those. Therefore, the proposed scheme is suitable to handle differential attacks efficiently.

Key Sensitivity Analysis

A strong encryption scheme must be sensitive to its key, which means that a slight change in the encryption key cannot decrypt the encrypted image. To examine the key sensitivity, we encrypted the cover image with the correct key (key1) and, with a one-bit, changed the key (key2). Key1 decrypts the cypher image correctly while decrypting with key2 cannot recover the plain image. Figure 8 shows the result of the key sensitivity analysis. Furthermore, we calculated the difference between the decrypted image with key1 and with key2, which was 99.6177%. We can observe that both the decrypted images are totally different. Therefore, our scheme is very sensitive to its encryption key.
Fig. 8

Key sensitivity analysis

Key sensitivity analysis

Key Space

To withstand any brute force assaults, the key space of the encryption technique must be greater than or equal to 2100 [30]. In the proposed scheme, two chaotic maps, the precision-limited logistic map and the STM were utilised. This requires two different 156-bit random secret keys. Therefore, the key space of our suggested encryption approach is 2312, which is much higher than 2100. Hence, this scheme provides better resistance against brute force assaults.

Time Evaluation

The computational cost is the main feature of any encryption scheme for real-time implementation. Therefore, we have computed the encryption and decryption time of different medical images of sizes 256 × 256 and 512 × 512, which are tabulated in Table 5. Computation time is also compared with recent schemes [24, 26, 27]. Time computation analysis shows that our scheme takes much less time to encrypt and decrypt the images.
Table 5

Time cost evaluation

SchemeTested imageSizeComputation time (sec)
EncryptionDecryption
Our encryption schemeM1256 × 2560.26920.2293
M2256 × 2560.23910.2393
M5256 × 2560.20540.2214
M6256 × 2560.24450.2304
M3512 × 5120.89060.9335
M4512 × 5120.91550.9205
[24]Chest256 × 2560.24150.2288
[26]OPENi1256 × 2563.9-
[27]Fingerprint256 × 2560.4598370.212294
Time cost evaluation

Visual Perception and Robustness Analysis

The normalised coefficient (NC) is used to estimate the robustness of the proposed approach when it is subjected to assaults. The value of NC ranges from 0 to 1, and NC > 0.7 is desirable [31]. The PSNR and SSIM are used to measure the visual quality of an image [32]. Table 6 shows how the proposed approach performs with different embedding strengths (α).
Table 6

Analysis of proposed scheme on various embedding strength

Embedding StrengthPSNRSSIMNC
0.00149.18451.00000.9999
0.00535.20511.00000.9999
0.0129.18451.00000.9999
0.0223.16391.00000.9999
0.0319.64211.00000.9999
Analysis of proposed scheme on various embedding strength ‘α’ ranges from 0.001 to 1. We found that, when α = 0.001, the highest value of PSNR is 49.1845. When we increase the value of ‘α,’ the PSNR performance gradually decreases; however, the SSIM value is ideal to 1 in all cases. Furthermore, the best value of NC is 0.9999 for all the cases. Table 7 demonstrates the analysis of different fused images in respect to the same cover image. This indicates that, at α = 0.01, the highest and lowest PSNR between the encrypted cover image and the encrypted marked image are 33.8764 and 27.0869, respectively, whereas the SSIM value is 1 in all cases. This evaluation proves that perceptual quality is high, even when embedding the mark image.
Table 7

Evolution of fussed mark image with respect to same encrypted cover image

Evolution of fussed mark image with respect to same encrypted cover image Most importantly, the average NC value between the fused mark image and the recovered fused mark image is 0.9998, and the highest NC value is 0.9999. We also calculated the embedding and extraction time of the fused mark image. The best embedding time and extraction time are 0.1774 and 0.3796 s, respectively, and the average embedding time and extraction time are 0.1823 and 0.3883 s, respectively. The results indicate that the robustness of our scheme is very high against attacks, and it requires much less time to embed and extract the fused mark image. Furthermore, the analysis of the same fused image with respect to the different cover images is included in Table 8. Here, we get the best PSNR of 28.7966 db, and the SSIM is 1 every time. The best NC value obtained was 0.9999, and the best embedding and extraction times were 0.1677 and 0.3554 s, respectively. In addition to this, we also calculated the average value of PSNR, SSIM, NC, embedding time, and extraction time of 100 different cover images are 29.2699 dB, 1, 0.9998, 0.1708, and 0.3399 s, respectively.
Table 8

Evolution of fussed image with respect to different encrypted cover image

Evolution of fussed image with respect to different encrypted cover image

Noise Attack Analysis

The robustness of the proposed scheme against different noise attacks is evaluated, and the result is presented in Table 9. For a salt and pepper attack, if the noise intensity increases from 0.001 to 0.005, the NC value decreases by zero, and if the noise intensity increases from 0.001 to 0.01, the drop in NC value is 0.0006. It is observed that if the intensity of a speckle attack increases (from 0.005 to 0.01), then the NC value decreases slightly (0.008). A similar decrement is also observed for Gaussian noise. However, more degradation is observed for average and median noise attacks. Therefore, the propounded scheme is very robust to various noise attacks.
Table 9

Evaluation of robustness for different noise attack

Evaluation of robustness for different noise attack To analyse the effectiveness of our scheme, we compare the result of our scheme with some recent schemes in Table 10 [12, 33, 34]. It can be seen that the NC value of our scheme is better when, Gaussian, and Gaussian low-pass filter with noise strengths of, 0.001 and 0.04, respectively, Furthermore, the proposed scheme performs best for salt and pepper as well as speckle noise. Our suggested technique improves the NC score by 20.14%, and 11.85% when compared to the scheme in [12], and [34] respectively. For all other noise, our scheme provides similar robustness. Hence, our scheme proved improved robustness for several noise attacks.
Table 10

Robustness comparison

AttackDensityNC score
WatMIF[12][33][34]
Salt and pepper0.00010.99990.99340.99870.9942
0.0010.99990.9921-0.9712
0.010.99930.9908-0.8934
Gaussian[0, 0.001]0.9999-0.9903-
[0, 0.05]0.83530.9896--
Speckle0.0010.99990.9936-0.9927
0.050.97110.8083--
Histogram equalization0.86090.91250.99840.8491
Gaussian low-pass filterVariance 0.040.99990.9902--
Rotation1′0.82840.9829-0.9023
45′0.78420.8799-0.9209
Robustness comparison

Conclusion

This paper proposes a multimodal medical image fusion-based watermarking, named WatMIF. The proposed algorithm consists of three major parts: the encryption of cover media, the fusion of multi-modal medical images, and the embedding and extraction of the fused mark. Firstly, we encrypted the host media with a key-based encryption scheme. The encryption scheme is fast without compromising the security of medical images, which is suitable for telehealth scenarios. Secondly, an NSCT-based fusion scheme is employed to fuse the MRI and CT scan images to generate the fused mark image. Finally, the fused watermark is concealed in the encrypted host media using RDWT and RSVD. From the simulation, it is inferred that the WatMIF algorithm exhibits improved robustness compared to existing schemes. The proposed work can be improved with efficient deep learning models in the future.
  4 in total

1.  Beyond a Gaussian Denoiser: Residual Learning of Deep CNN for Image Denoising.

Authors:  Kai Zhang; Wangmeng Zuo; Yunjin Chen; Deyu Meng; Lei Zhang
Journal:  IEEE Trans Image Process       Date:  2017-02-01       Impact factor: 10.856

2.  Fingerprint-based robust medical image watermarking in hybrid transform.

Authors:  S Prasanth Vaidya
Journal:  Vis Comput       Date:  2022-01-29       Impact factor: 2.601

3.  An efficient image encryption scheme for healthcare applications.

Authors:  Parsa Sarosh; Shabir A Parah; G Mohiuddin Bhat
Journal:  Multimed Tools Appl       Date:  2022-01-25       Impact factor: 2.577

4.  A simple embed over encryption scheme for DICOM images using Bülban Map.

Authors:  Veerappan Manikandan; Rengarajan Amirtharajan
Journal:  Med Biol Eng Comput       Date:  2022-01-17       Impact factor: 2.602

  4 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.