| Literature DB >> 35818513 |
Kedar Nath Singh1,2, Om Prakash Singh1, Amit Kumar Singh1, Amrit Kumar Agrawal3.
Abstract
Over recent years, the volume of big data has drastically increased for medical applications. Such data are shared by cloud providers for storage and further processing. Medical images contain sensitive information, and these images are shared with healthcare workers, patients, and, in some scenarios, researchers for diagnostic and study purposes. However, the security of these images in the transfer process is extremely important, especially after the COVID-19 pandemic. This paper proposes a secure watermarking algorithm, termed WatMIF, based on multimodal medical image fusion. The proposed algorithm consists of three major parts: the encryption of the host media, the fusion of multimodal medical images, and the embedding and extraction of the fused mark. We encrypt the host media with a key-based encryption scheme. Then, a nonsubsampled contourlet transform (NSCT)-based fusion scheme is employed to fuse the magnetic resonance imaging (MRI) and computed tomography (CT) scan images to generate the fused mark image. Furthermore, the encrypted host media conceals the fused watermark using redundant discrete wavelet transform (RDWT) and randomised singular value decomposition (RSVD). Finally, denoising convolutional neural network (DnCNN) is used to improve the robustness of the WatMIF algorithm. The simulation experiments on two standard datasets were used to evaluate the algorithm in terms of invisibility, robustness, and security. When compared with the existing algorithms, the robustness is improved by 20.14%. Overall, the implementation of proposed watermarking for hiding fused marks and efficient encryption improved the identity verification, invisibility, robustness and security criteria in our WatMIF algorithm.Entities:
Keywords: DnCNN; Encryption; Medical images; Multimodal fusion; Security; Watermarking
Year: 2022 PMID: 35818513 PMCID: PMC9261166 DOI: 10.1007/s12559-022-10040-4
Source DB: PubMed Journal: Cognit Comput ISSN: 1866-9956 Impact factor: 4.890
Notation and explanation
| Notation | Explanation | Notation | Explanation | Notation | Explanation |
|---|---|---|---|---|---|
| Cover image | Image after fusion | RDWT coefficients of encrypted image | |||
| Confusion key | Redundant-discrete wavelet transform | RDWT coefficients of fused mark image | |||
| Diffusion key | Randomised-singular value decomposition | Received encrypted marked image | |||
| Encrypted cover image | Inverse RDWT | U and V are orthogonal and S is singular matrix | |||
| Confused image | Encrypted marked image | Modified singular value | |||
| CT and MRI images | Extracted fused mark image | Precision limited logistic map | |||
| Precision limited skew tent map | Initial values for | ||||
| Non-subsampled contourlet transform | Decrypted cover image | Parameters for two |
Fig. 1Proposed chaotic key generation framework
Fig. 2The framework of proposed scheme

Fig. 3Permutation procedure of plain image



Fig. 4Sample images used in the experiment
Fig. 5Original images (a1, b1, c1, d1, and e1) and their corresponding encrypted (a2, b2, c2, d2, and e2) and decrypted image (a3, b3, c3, d3, and e3)
Fig. 6Histogram evaluation
Correlation analysis
| Method | Image | Plain image | Encrypted image | ||||
|---|---|---|---|---|---|---|---|
| H | V | D | H | V | D | ||
Proposed method | M1 | 0.9576 | 0.9577 | 0.9356 | 0.0138 | −0.0087 | −0.0260 |
| M2 | 0.9941 | 0.9776 | 0.9719 | 0.0233 | −0.0018 | −0.0048 | |
| M3 | 0.9671 | 0.9783 | 0.9487 | 0.0163 | 0.0068 | 0.0115 | |
| M4 | 0.9954 | 0.9953 | 0.9826 | 0.0082 | −0.0110 | −0.0247 | |
| M5 | 0.9931 | 0.9948 | 0.9882 | 0.0047 | 0.0059 | 0.0189 | |
| M6 | 0.9093 | 0.9206 | 0.8627 | −0.0092 | 0.0470 | 0.0034 | |
| [ | Chest | 0.9936 | 0.9924 | 0.9878 | −0.0017 | −0.0008 | 0.0133 |
| [ | 46,529,543,479,051,320.dcm | NA | NA | NA | 0.0339 | −0.0143 | −0.0197 |
| [ | OPENi3 | 0.9670 | 0.9715 | 0.9408 | −0.0017 | −0.0013 | 0.0013 |
Fig. 7Correlation coefficient analysis in horizontal, vertical, and diagonal direction of original and encrypted image
Entropy analysis
| Method | Size of image | Tested image | Entropy | |
|---|---|---|---|---|
| Plain | Encrypted | |||
| Our encryption scheme | 256 × 256 | M1 | 3.7148 | 7.9972 |
| 256 × 256 | M2 | 6.1936 | 7.9976 | |
| 256 × 256 | M5 | 4.1097 | 7.9969 | |
| 256 × 256 | M6 | 4.4212 | 7.9973 | |
| 512 × 512 | M3 | 7.5920 | 7.9993 | |
| 512 × 512 | M4 | 6.7832 | 7.9993 | |
| Average (50 images of COVID-19 dataset[ | 7.3978 | |||
| [ | 256 × 256 | Chest | 6.5336 | 7.9981 |
| [ | 256 × 256 | OPENi3 | NA | 7.9976 |
| [ | 256 × 256 | Fingerprint | NA | 7.9899 |
The NPCR and UACI values of different medical images
| Method | Size of image | Tested image | NPCR | UACI |
|---|---|---|---|---|
| Our encryption scheme | 256 × 256 | M1 | 0.9958 | 0.3350 |
| 256 × 256 | M2 | 0.9961 | 0.3355 | |
| 256 × 256 | M5 | 0.9961 | 0.3346 | |
| 256 × 256 | M6 | 0.9960 | 0.3341 | |
| 512 × 512 | M3 | 0.9961 | 0.3344 | |
| 512 × 512 | M4 | 0.9960 | 0.3345 | |
| Average (50 images of COVID-19 dataset [ | 0.9960 | 0.3346 | ||
| [ | 256 × 256 | Chest | 0.9961 | 0.3346 |
| [ | 256 × 256 | OPENi3 | 0.9955 | 0.3336 |
| [ | 256 × 256 | Fingerprint | 0.9960 | 0.3355 |
Fig. 8Key sensitivity analysis
Time cost evaluation
| Scheme | Tested image | Size | Computation time (sec) | |
|---|---|---|---|---|
| Encryption | Decryption | |||
| Our encryption scheme | M1 | 256 × 256 | 0.2692 | 0.2293 |
| M2 | 256 × 256 | 0.2391 | 0.2393 | |
| M5 | 256 × 256 | 0.2054 | 0.2214 | |
| M6 | 256 × 256 | 0.2445 | 0.2304 | |
| M3 | 512 × 512 | 0.8906 | 0.9335 | |
| M4 | 512 × 512 | 0.9155 | 0.9205 | |
| [ | Chest | 256 × 256 | 0.2415 | 0.2288 |
| [ | OPENi1 | 256 × 256 | 3.9 | - |
| [ | Fingerprint | 256 × 256 | 0.459837 | 0.212294 |
Analysis of proposed scheme on various embedding strength
| Embedding Strength | PSNR | SSIM | NC |
|---|---|---|---|
| 0.001 | 49.1845 | 1.0000 | 0.9999 |
| 0.005 | 35.2051 | 1.0000 | 0.9999 |
| 0.01 | 29.1845 | 1.0000 | 0.9999 |
| 0.02 | 23.1639 | 1.0000 | 0.9999 |
| 0.03 | 19.6421 | 1.0000 | 0.9999 |
Evolution of fussed mark image with respect to same encrypted cover image
Evolution of fussed image with respect to different encrypted cover image
Evaluation of robustness for different noise attack
Robustness comparison
| Attack | Density | NC score | |||
|---|---|---|---|---|---|
| [ | [ | [ | |||
| Salt and pepper | 0.0001 | 0.9999 | 0.9934 | 0.9987 | 0.9942 |
| 0.001 | 0.9999 | 0.9921 | - | 0.9712 | |
| 0.01 | 0.9993 | 0.9908 | - | 0.8934 | |
| Gaussian | [0, 0.001] | 0.9999 | - | 0.9903 | - |
| [0, 0.05] | 0.8353 | 0.9896 | - | - | |
| Speckle | 0.001 | 0.9999 | 0.9936 | - | 0.9927 |
| 0.05 | 0.9711 | 0.8083 | - | - | |
| Histogram equalization | 0.8609 | 0.9125 | 0.9984 | 0.8491 | |
| Gaussian low-pass filter | Variance 0.04 | 0.9999 | 0.9902 | - | - |
| Rotation | 1′ | 0.8284 | 0.9829 | - | 0.9023 |
| 45′ | 0.7842 | 0.8799 | - | 0.9209 | |