Literature DB >> 36185319

Robust, imperceptible and optimized watermarking of DICOM image using Schur decomposition, LWT-DCT-SVD and its authentication using SURF.

Divyanshu Awasthi1, Vinay Kumar Srivastava1.   

Abstract

In this proposed work, a dual image watermarking algorithm is used to protect the data against copyright violations. In this work, the DICOM image is used as a host image. Two watermark images used are the MNNIT logo and the personal data of the patient. This method utilizes the advantages of Schur decomposition, lifting wavelet transform (LWT), discrete cosine transform (DCT) and singular value decomposition (SVD). The scaling factor is a vital parameter of watermarking technique. The firefly optimization technique is used to get the optimized scaling factor. The Speeded-up robust features (SURF) are used for watermarking authentication. To evaluate the performance of the proposed algorithm, peak signal-to-noise ratio (PSNR), normalized correlation coefficient (NCC), and structural similarity index measurement (SSIM) are used. The proposed method is tested against various attacks such as Salt and Pepper noise, Gaussian noise, Gaussian low pass filter, Average filter, Median filter, Histogram equalization, Sharpening, Rotation and Region of interest filtering. The proposed algorithm shows a high level of robustness and imperceptibility. It is found that the features of the input host image and the watermarked image are matching correctly on applying the SURF technique.
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022, Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Entities:  

Keywords:  Discrete cosine transform (DCT); Firefly optimization; Lifting wavelet transform (LWT); SURF; Schur decomposition; Singular value decomposition (SVD)

Year:  2022        PMID: 36185319      PMCID: PMC9513003          DOI: 10.1007/s11042-022-14002-8

Source DB:  PubMed          Journal:  Multimed Tools Appl        ISSN: 1380-7501            Impact factor:   2.577


Introduction

With the rapid development of digital technologies, several pressing security concerns have arisen, including the unlawful copying and distortion of private information. Digital image watermarking is thought to be a viable solution to these security concerns. In a watermarking algorithm, invisibility denotes the cover image and the watermarked image being similar enough to avoid being spotted. The robustness of the watermark shows that the watermark algorithm can withstand frequent attacks. DICOM stands for Digital Imaging and Communications in Medicine and it is a global standard for storing, exchanging and transmitting medical pictures. This standard is used by image technologies such as X-rays, ultrasound, microscopy, MRI and CT. The standard provides several benefits, including: (1) Both image and patient information will be transferred in a single network session, (2) Patient safety is improved, and (3) Save detailed acquisition and diagnostic protocol information. The recent literature survey of image watermarking methods is listed in Table 1.
Table 1

Summary of the recent literature survey of image watermarking techniques

Ref. No.PurposeTechniques usedInput imagePerformance parametersAttacksRemark
[1]To propose a robust method for linear and non-linear attacks and the transparency of the watermarked images will be protected.Discrete cosine transform (DCT), Discrete wavelet transform (DWT), Arnold transform (AT)

RGB host images: Baboon, Pears, Pepper, Jet plane, Barbara (1024x1024x3);

Watermark images: 96 × 96 grayscale Lena, Cameraman, and Saturn

Peak signal to noise ratio (PSNR), Normalized correlation coefficient (NCC)Blurring, Average filter, Sharpening, Resizing, JPEG, Median filter, Salt and Pepper, Speckle, RotationBy embedding the DCT transformed watermark parts separately into all the DWT bands of each color component of the cover image, high robustness and imperceptibility have been obtained with the proposed method.
[2]Blind watermarking targets the recovery of the watermark when the host is not available during the detection stageDiscrete Shearlet Transform (DST), Discrete Wavelet Transform (DWT), Contourlet Transform (CT), Laplacian distributionHost images of size 512 × 512: Baboon, Barbara, Clock, Cameraman, Pepper, BoatPeak signal to noise ratio (PSNR), Structural similarity index measurement (SSIM), Root mean square error (RMSE)The DST-based embedding provides a good imperceptibility and an improved payload, and the results demonstrate superior robustness against common image processing manipulations compared to DWT and CT
[3]To get high robustness against noise addition attacksDiscrete cosine transform (DCT), Discrete wavelet transform (DWT), Arnold cat map

Host image of size 512 × 512: Barbara, Baboon, Pepper;

Watermark logo: 32 × 32 binary image

Mean absolute error (MAE), Peak Signal to noise ratio (PSNR)Salt and pepper noises, Cropping, JPEG compression, Gaussian low pass filter, ScalingThe proposed method has high imperceptibility and robustness against different types of attacks.
[4]This paper proposed a survey on watermarking methods in the artificial intelligence domain and beyond.
[5]Dual Watermarking for Security of COVID-19 Patient Record.Redundant discrete wavelet transform (RDWT), Hessenberg Decomposition (HD), Randomized singular value decomposition (RSVD)

Host image of size 512 × 512: CT scan images of COVID-19 patients

Electronic patient record (266 bits) and watermark image (256 × 256)

Peak Signal to noise ratio (PSNR), Normalized correlation coefficient (NCC), Bit error rate (BER), Unified Average Change Intensity (UACI), Number of Pixels Change Rate (NPCR)Salt and pepper noises, Gaussian noise, Rotation, JPEG compression, Speckle noise, Median filter, Cropping, Scaling, TranslationImperceptibility and robustness are achieved by a fuzzy inference system. The extracted watermark is denoised using the concept of deep neural network (DNN) to improve its robustness.
[6]To get significant improvement in transparency and the robustness under attacks.Singular value decomposition (SVD), Genetic algorithm (GA)

Host image of size 256 × 256: Lena;

Watermark image of size: 32 × 32 (grey-level)

Correlation coefficient (CC), PSNRRotation, Average filter, Scaling, Gaussian noise, Gamma correction, Histogram, Median filter

In the proposed method, GA is utilized to

obtain multiple scaling factors (SF) for achieving the highest

possible robustness without degrading image quality.

[7]This paper provides a comparison between PSO and JAYA as well as between LWT and DWTLWT, DWT, DCT, SVD, PSO, JAYA

Host grayscale image: 512 × 512;

Watermark grayscale: 256 × 256

PSNR, SSIM, Normalized correlation coefficient (NCC), Mean square error (MSE)JPEG compression, Gaussian noise, Median filter, Salt and Pepper, Low pass filter, Sharpening, Gamma correction, Scaling, TranslationThe proposed work has been tested under different attacks and found robust and imperceptible.
[8]To improve the watermarked image’s integrity and perceived quality and to enhance the security of watermarkingDWT, SVD, Quantization,Shore, Lena, Baboon, Pepper, Dark cloud: 200 × 200PSNR, Bit error rate (BER)JPEG compression, Gaussian noise, Median filter, CroppingThe enhanced perceptual quality of the watermarked images and the proposed scheme preserve high PSNR.
[10]The proposed method uses 2-D Linear Discriminant Analysis (2DLDA) watermark scheme for copyright protection2-D linear discriminant analysis (2DLDA), Discrete cosine transform (DCT)

Host image: e 512 × 512, where each pixel is represented by 24 bits in the RGB color space;

watermark of a recognizable pattern of size 32 × 25

PSNR, Bit error rate (BER)Cropping, Blurring, Mosaic, Luminance and contrast adjustment, JPEGExperimental results demonstrate that the differences between the watermarked and original images are indistinguishable. The proposed method effectively resists standard image processing attacks.
[12]This paper proposed a dual watermarking-based multimedia content authentication and privacy preservation solution.DWT, DCT, Encryption, Arnold transform

Host grayscale image: 512 × 512

Watermark grayscale: 64 × 64

PSNR, BER (Bit error rate), NCC, BCR (Bit correction ratio)JPEG, Gaussian noise, Salt and Pepper, Median filter, Gaussian LPF, Rotation, Brightness, Darkening, Scaling recovery, WienerA highly robust watermarking framework for copyright protection applications is proposed. It also serves the purpose of authentication.
[13]This paper presents a reliable digital watermarking technique that provides high imperceptibility and robustness for copyright protectionOptimal discrete cosine transform (DCT), psychovisual threshold, Arnold transform

Host image of size 512 × 512: LENA, Baboon, Cameraman, Pepper, Airplane, Livingroom;

Watermark image: a binary logo image with 32 × 32 pixels

PSNR, BER (Bit error rate), NCC, Structural similarity index measurement (SSIM)Sharpening, Histogram, JPEG, Average, Wiener, Median, GLP, Gaussian noise, Salt and Pepper, Adjust, JPEG2000The proposed method has higher values of NC and SSIM when compared with other methods
[14]

In this paper, a robust and blind digital

image watermarking technique is proposed to achieve copyright

protection.

DWT, DCT, SVD

Host grayscale image: 512 × 512

Watermark grayscale: 256 × 256

PSNR, NCC, MSE (Mean square error)Motion blur, Gaussian blur, Sharpening, Gaussian noise, Salt and Pepper, Contrast, Rotation, Crop, Negative, SwirlThe suggested approach has been resistant to most attacks, which can be verified by recovering the watermark from any sub-bands.
[9]The proposed method is used for copyright protection and authentication.DWT, SVD, Zig-Zag sequence

Host grayscale image: 512 × 512

Watermark grayscale: 128 × 128

PSNR, NCCJPEG, JPEG2000, Gaussian noise, Resize, Rotation, CropThe proposed Dual image watermarking is robust.
[15]This paper proposed a dual watermarking-based multimedia content authentication and privacy preservation solution.DWT, DCT, Encryption, Arnold transform

Host grayscale image: 512 × 512

Watermark grayscale: 64 × 64

PSNR, BER (Bit error rate), NCC, BCR (Bit correction ratio)JPEG, Gaussian noise, Salt and Pepper, Median filter, Gaussian LPF, Rotation, Brightness, Darkening, Scaling recovery, Wiener filter,A highly robust watermarking framework for copyright protection applications is proposed. It also serves the purpose of authentication.
[16]To provide both robustness and imperceptibilityDWT, SVD

Host grayscale image: 512 × 512;

Watermark grayscale: 256 × 256

Peak signal to noise ratio (PSNR), Normalized correlation coefficient (NCC)Gaussian blurring, Histogram eq., Rotation, JPEG, Salt & Pepper, Gamma correction, Median filteringSignificant improvement in imperceptibility and robustness under various attacks
[17]To optimize the tradeoff between imperceptibility and robustness properties, this paper proposes a robust and invisible blind image watermarking schemeDWT, DCT, SVD, Chaotic map

Host image size of 512 × 512: Boat, Lena, Livingroom, Mandrill, Peppers, Pirate, Jet plane, Lake;

Watermark: 32 × 32 binary logo images

Peak signal to noise ratio (PSNR), Normalized correlation coefficient (NC), SSIM, BER, feature similarity (FSIM) indexGaussian blurring, Histogram eq., Rotation, JPEG, Salt & Pepper, Gamma correction, Median filtering, JPEG, JPEG2000The main aim of this work is to develop an effective watermarking scheme for protecting digital images against various signal processing attacks with high image quality
[20]Dual image watermarking is proposed to preserve ownership rights, using critical homomorphic transform features (HT).DWT, HT, SVD, AT

Host grayscale image: 512 × 512

Watermark grayscale: 512 × 512

PSNR, SSIM, Normalized correlation coefficientJPEG compression, Gaussian noise, Median filter, Salt and Pepper, Low pass filter, Sharpening, Gamma correction, Scaling, Translation, Rotation,The suggested technique is tested under multiple attacks; the simulation results demonstrate its high robustness and imperceptibility.
[18]To protect various types of digital data from malicious attacks and to provide high robustness and imperceptibilityHomomorphic transform (HT), DWT, SVD

Host grayscale image: 512 × 512

Watermark grayscale: 256 × 256

PSNR, Normalized correlation coefficient (NCC)Rotation, Gaussian noise, Histogram eq., Gaussian filter, Salt and Pepper, Sharpening, Average filter, MedianThis approach makes the scheme blind in nature and ensures copyright protection.
[19]To provide high imperceptibility, robustness, capacity, and securityRDWT (Redundant discrete wavelet transform), DCT (Discrete cosine transform), SVD

Host grayscale image: 512 × 512

Watermark grayscale: 256 × 256

PSNR, Normalized correlation coefficient (NCC)Gaussian noise, Wiener filter, Salt and Pepper, Median filter, Gamma correction, Shearing,The proposed watermarking algorithm is more robust than the existing watermarking scheme against various attacks.
[21]The proposed method uses a cloud-based buyer-seller watermarking technology that uses a semi-trusted third party to prevent copying and maintain privacy.
[22]To make the watermarking scheme resistant to geometric attacks, a geometric distortion detection method based upon the quaternion Zernike moment is introducedQuaternion Hadamard transform (QHT), Schur decomposition, Quaternion Zernike moment

Host image of size 512 × 512: Lena, Baboon, Boat;

Watermark image of size: 64 × 64

SSIM, Normalized correlation coefficientContrast adjustment, histogram equalization, gamma correction, sharpening, filtering, Cropping, rotation, scalingExperimental results show that the proposed scheme has not only good imperceptibility but also is robust to various kinds of attacks
[24]A novel image watermarking method is proposed. The fruit fly optimization is used to get an optimized scaling factorDWT, HD (Hessenberg decomposition), SVD, Fruit fly optimization

Host grayscale image: 512 × 512

Watermark grayscale: 256 × 256, 128 × 128, 64 × 64

PSNR, MSE, SSIM (Structural similarity index measurement), Normalized correlation coefficientJPEG compression, Gaussian noise, median filter, Cropping, Gaussian LPF, Rescaling, SharpeningSignificant improvement in imperceptibility and robustness under various attacks.
[23]This paper presents a dual watermarking technique for color images in which robust watermarks are embedded for copyright protectionLeast significant bit (LSB), DWT

Host image of size 512 × 512: Lena, Airplane, Baboon, Pepper, Lake, Splash, House

Watermark: 64 × 64

Peak signal to noise ratio (PSNR), Normalized correlation coefficient (NCC), SSIM, feature similarity (FSIM) indexSalt and Pepper, JPEG, Blurring, Gaussian noise, Darken, Twist, Resizing, ContrastThe proposed dual watermarking technique shows higher robustness and imperceptibility.
[26]To avoid the false positive problem by integrating the watermark image’s primary features and, therefore, provide copyright protectionDWT, SVD, Particle swarm optimization

Host grayscale image: 256 × 256

Watermark grayscale: 128 × 128

PSNR, Normalized correlation coefficient (NCC)Gaussian noise, Average filtering, JPEG compression, Histogram eq., Gamma correctionThe proposed algorithm removes the false-positive problem and diagonal line problem
[28]The proposed watermarking technique is used to protect data from illegal modification or reproductionDWT, SVDHost images: Cameraman, Cell, Circuit, MRI, PoutMSE, PSNR, SSIMGaussian noise, Sharpening, Blurring, Salt and Pepper, Rotation, CroppingSimulation results have shown that this technique can attain good imperceptibility, as the perceptual quality has not been degraded
[27]To propose a secured, robust and imperceptible watermarking technique.DWT, BEMD (bi-dimensional empirical mode decomposition), DCT, PSO (particle swarm optimization), and SVD

Host image of size 512 × 512: Barbara, baboon, cameraman, Lena, Tank, Goldhill

Watermark image of size: 128 × 128

PSNR, MSE, NCCSalt and pepper, Gaussian filter, rotation, median filter, speckle, gamma correction, scaling, ShearingIn comparison to the current methodologies, the proposed method offers a meaningful improvement in robustness, imperceptibility, and security.
[31]This paper proposed a blind watermarking technique. Medical images are used for watermarking purposes. This method is proposed to provide high imperceptibility and robustness.DWT, SVD, Region of interest (ROI)

Host images of size 1024 × 1024: X-ray, CT scan;

Watermark EC logo of size:

32 × 32

NCC, MSE, PSNR, WPSNR (Weighted PSNR)Salt & pepper noise, Histogram equalization, Gaussian noise, Sharpening, Average filter, Resize, Cropping, JPEG compressionAnalysis of the proposed scheme for color images shows that the scheme’s performance is better for medical images than natural images.
[32]To provide security, reliability, and robustness against attacks and to get an optimized scaling factorDWT, Block SVD, Particle swarm optimization (PSO)

Host grayscale image: 512 × 512

Watermark grayscale: 64 × 64

PSNR, NCC, Normalized similarity ratio (NSR)Rotation, Cropping, Gaussian noise, JPEG compression, Histogram eq., Gamma correction, Salt and PepperSignificant improvement in imperceptibility and robustness under various attacks
[33]

This paper is proposed a significant region (SR) based image watermarking technique to design a more robust scheme against various

attacks

Lifting Wavelet Transform (LWT), Random shuffling, Quantization, Block selection process

Host images of size 512× 512: Goldhill, Lena, Man, Airport, Tank, Truck, Boat, Barbara, Mandrill;

Binary watermark

of size 32 × 16

PSNR, Normalized correlation coefficient (NCC), MSE, BER

JPEG, Gaussian low pass, Histogram, Cropping, Median filter, Salt and Pepper, Gaussian noise, speckle noise, contrast

Adjustment, amplification, scaling

Significant improvement in imperceptibility and robustness under various attacks
[34]The current state of web service composition research based on bio-inspired algorithms is reviewed in this study.Ant Colony Optimization (ACO), Genetic Algorithm (GA), Evolutionary Algorithm (EA), and Particle Swarm (PSO)------This study provides an overview of the research on bio-inspired algorithms in web application composition and points out future directions.
[36]This paper proposes an algorithm for health care applications such as tele-ophthalmology, tele-medicine, etc.DWT, DCT, SVD, Back propagation neural network

Cover image: 512 × 512

Symptoms image: 128 × 128

Record image 64 × 64

PSNR, NCCJPEG, Salt, and Pepper, Gaussian noise, Crop, Rotation, Resize, Average filter, Low pass filter, Gamma correctionThe proposed technique is suitable for preventing patient identity theft and alteration for healthcare applications.
Summary of the recent literature survey of image watermarking techniques RGB host images: Baboon, Pears, Pepper, Jet plane, Barbara (1024x1024x3); Watermark images: 96 × 96 grayscale Lena, Cameraman, and Saturn Host image of size 512 × 512: Barbara, Baboon, Pepper; Watermark logo: 32 × 32 binary image Host image of size 512 × 512: CT scan images of COVID-19 patients Electronic patient record (266 bits) and watermark image (256 × 256) Host image of size 256 × 256: Lena; Watermark image of size: 32 × 32 (grey-level) In the proposed method, GA is utilized to obtain multiple scaling factors (SF) for achieving the highest possible robustness without degrading image quality. Host grayscale image: 512 × 512; Watermark grayscale: 256 × 256 Host image: e 512 × 512, where each pixel is represented by 24 bits in the RGB color space; watermark of a recognizable pattern of size 32 × 25 Host grayscale image: 512 × 512 Watermark grayscale: 64 × 64 Host image of size 512 × 512: LENA, Baboon, Cameraman, Pepper, Airplane, Livingroom; Watermark image: a binary logo image with 32 × 32 pixels In this paper, a robust and blind digital image watermarking technique is proposed to achieve copyright protection. Host grayscale image: 512 × 512 Watermark grayscale: 256 × 256 Host grayscale image: 512 × 512 Watermark grayscale: 128 × 128 Host grayscale image: 512 × 512 Watermark grayscale: 64 × 64 Host grayscale image: 512 × 512; Watermark grayscale: 256 × 256 Host image size of 512 × 512: Boat, Lena, Livingroom, Mandrill, Peppers, Pirate, Jet plane, Lake; Watermark: 32 × 32 binary logo images Host grayscale image: 512 × 512 Watermark grayscale: 512 × 512 Host grayscale image: 512 × 512 Watermark grayscale: 256 × 256 Host grayscale image: 512 × 512 Watermark grayscale: 256 × 256 Host image of size 512 × 512: Lena, Baboon, Boat; Watermark image of size: 64 × 64 Host grayscale image: 512 × 512 Watermark grayscale: 256 × 256, 128 × 128, 64 × 64 Host image of size 512 × 512: Lena, Airplane, Baboon, Pepper, Lake, Splash, House Watermark: 64 × 64 Host grayscale image: 256 × 256 Watermark grayscale: 128 × 128 Host image of size 512 × 512: Barbara, baboon, cameraman, Lena, Tank, Goldhill Watermark image of size: 128 × 128 Host images of size 1024 × 1024: X-ray, CT scan; Watermark EC logo of size: 32 × 32 Host grayscale image: 512 × 512 Watermark grayscale: 64 × 64 This paper is proposed a significant region (SR) based image watermarking technique to design a more robust scheme against various attacks Host images of size 512× 512: Goldhill, Lena, Man, Airport, Tank, Truck, Boat, Barbara, Mandrill; Binary watermark of size 32 × 16 JPEG, Gaussian low pass, Histogram, Cropping, Median filter, Salt and Pepper, Gaussian noise, speckle noise, contrast Adjustment, amplification, scaling Cover image: 512 × 512 Symptoms image: 128 × 128 Record image 64 × 64 From the literature survey presented in Table 1, it can be summarized that image watermarking poses several possible risks and challenges. Finding a balance between imperceptibility, resilience, and capacity is the first challenge because enhancing one aspect has a detrimental impact on the others. An effective watermarking system should have all three traits at once. The amount of data conveyed is referred to as the payload size. Less imperceptibility results from a larger payload. All of these features must be balanced out in a decent watermarking strategy. So, in this work, a method is proposed to get a highly robust and imperceptible dual image watermarking. The scaling factor plays a vital role in the proposed scheme, so to get the optimum value of the scaling factor, an optimization technique is used by taking a unique equation. Authentication is the process by which one can understand that the features of the watermarked medical image are valid and there is no adverse effect due to various attacks after applying the proposed watermarking scheme. In this work, SURF features are used for authentication purpose. This paper is divided into the following sections: section 2 is related to the preliminaries, section 3 shows the proposed watermarking embedding and extraction process, section 4 is results and discussion, section 5 is related to the SURF feature authentication, and section 6 is the conclusion.

Preliminaries

The proposed watermarking technique uses LWT-DCT-SVD and Schur decomposition for embedding. The work proposed in this paper is different from [27], as in this work, Firefly optimization is used instead of Particle swarm optimization and the scheme is also a dual watermarking scheme. DWT-DCT-SVD with backpropagation neural network is used in [36] to get the watermarked image, but the proposed work uses LWT-DCT-SVD with Schur decomposition for embedding.

Lifting wavelet transform (LWT)

Sweldens [30] introduced the lifting wavelet transform in 1998. The lifting Wavelet reduces the challenge of reversibility by immediately examining the problem in the integer domain, which is not observed in standard Wavelet transforms. The advantages of LWT over typical Wavelet transform aid in developing watermarking methods while also improving computing efficiency [33]. Splitting, prediction, and updating are the three essential steps of the lifting system [29]. The block diagram is shown in Fig. 1.
Fig. 1

Lifting wavelet decomposition

Lifting wavelet decomposition Split: Lazy wavelet transform is another name for splitting. In this step, the input signal S is divided into even and odd samples: S and, S [33]. Predict: This stage can be viewed as a high-pass filtering procedure [33]. Here we predict odd samples S using even samples S and the abstract difference d is generated. Update: This step can be viewed as a low-pass filtering operation [33]. The low-frequency component S represents a coarse approximation to the original signal SWhich is obtained by applying an update operator.

Discrete cosine transform (DCT)

The discrete cosine transform coefficient has only real values, unlike the discrete Fourier transform. DCT has the ability to compress an image’s pixels information into a small number of DCT coefficient values, resulting in data consolidation into less values [7]. The 2D DCT and inverse DCT of an N × N image are defined as shown in Eq. (1) and Eq. (2): The inverse discrete cosine transform (IDCT) in two dimensions is defined as follows [7]: where,

Schur decomposition (SD)

In numerical linear algebra, the Schur decomposition is a valuable technique. The Schur decomposition can be defined as shown in Eq. (3) for a real matrix H. where U: unitary matrix; D: upper triangular matrix. The matrix H can be obtained as shown in Eq. (4): where, U′ is the transpose of matrix U.

Singular value decomposition (SVD)

The N× M matrix’s SVD can be written as [7]: Where L and R are unitary orthogonal matrices shown in Eq. (6), Σ = diag (σ1, σ2, ⋯, σr, 0, ⋯, 0) is the singular value matrix, σi = √λi (i = 1, 2, …r), and r is the rank of matrix C. The SVD is significantly used in image alteration, particularly in digital watermarking. The singular values of a matrix characterize its data distribution qualities and are reasonably stable; a slight change in the singular value does not affect the aesthetic impression of the image [25]. Furthermore, the SVD has no limit on the size of the picture matrix.

Firefly optimization

Firefly Algorithms for Multimodal Optimization is proposed by Yang [35]. Firefly algorithm can be constructed by using one of the three rules: (1) any firefly can be attracted to any other brighter one regardless of their sex, (2) The brightness of the Firefly can be determined from the encoded objective function, and (3) The attractiveness is directly proportional to brightness, and they both decreases as their distance increases. It means that the Firefly will move towards the brighter one, and if there is no brighter one, it will move randomly. From elementary physics, the light intensity is inversely proportional to the square of the distance (r). The variation of attractiveness β can be defined as shown in Eq. (6): where β is the attractiveness at r = 0. If the Firefly is located at X is more attractive (brighter) than another firefly located at XThe Firefly is located at X will move towards X. The position update of the Firefly is located at X can be defined as shown in Eq. (7): where T is the iteration number, is the distance between the two Firefly, is the attractiveness, α is the constant parameter that defines randomness, and lies between 0 and 1, and is a vector of random numbers. If β = 0, then it becomes a simple random walk. If γ = 0, then it reduces to simple PSO. α can be defined as shown in Eq. (8): where α is the initial randomness scaling factor, and δ is essentially a cooling factor. For most of the applications δ = 0.95 to 0.97, β = 1, and α = 0.01L (L = Average scale of the problem interest). However, γ, should also be related to the scaling L. In general, we can set . In general, the Firefly algorithm has two inner loops when going through the population (n) and one outer loop for the iteration (T). So, the complexity in the extreme case is O(n2T). If n is very small and T is very large, the computational cost is relatively inexpensive because the algorithm complexity is linear in terms of T. Different cases of Firefly optimization are shown in Fig. 2. The flow chart of Firefly optimization is shown in Fig. 3.
Fig. 2

Different cases of Firefly optimization

Fig. 3

Flow chart of Firefly optimization

Different cases of Firefly optimization Flow chart of Firefly optimization

Advantages of firefly optimization

Firefly optimization is based on attraction, and attractiveness decreases with distance. This leads to the fact that the whole population can automatically be subdivided into subgroups. The parameters in Firefly can be tuned to control the randomness as iterations proceed, so that convergence can also be speed up. The natural capability of dealing with multimodal optimization. High ergodicity and diversity in the solution.

Working of firefly optimization

Parameters Setting: Population size = 5 Number of iterations = 20 β = 1, γ = 0.01, δ = 0.97, Dimension of the problem = 3 Fitness function: In the above equation, NCC is the normalized correlation coefficient for the first watermark image, NCC is the normalized correlation coefficient for the second watermark image, a represents the number of attacks, and μ shows the number of used host images. Randomly initialize the initial position (P) of the population using Eq. (10): where rand is the random number between 0 and 1, the lower limit for NCC is 0.9, and the Upper limit is 1. Compute the fitness value using Eq. (9) for every Firefly. Compare the result of the first Firefly with the second one and if the value of the first Firefly is greater than the second, then retain the old value. But if the value of the second Firefly is larger, use Eq. (7) and move the first Firefly towards the second one. This way compares the fitness value of the first Firefly with every other Firefly and updates the position if needed. Then again, compare the fitness value of every Firefly with the other one and completes the iterations.

Proposed watermarking algorithm

This section explains the watermarking embedding and extraction procedure. For watermarking embedding process, we have taken an Ultrasound image [size: 512 × 512] of the liver of three different patients, and two watermark logo images are used. MNNIT logo [size 256 × 256] is the first watermark image and the details of patient [size 256 × 256] are the second logo. The block diagram of the embedding and extraction algorithm is shown in Figs. 4 and 5.
Fig. 4

Embedding Block diagram

Fig. 5

Extraction Block diagram

Embedding Block diagram Extraction Block diagram

Watermark embedding process

Step 1: Decompose the input liver ultrasound image by applying a three-level lifting wavelet transform, and pick two sub-bands (HL and LH). Step 2: Perform the Schur decomposition on the sub-bands to get the unitary and upper triangular matrix. In Eq. (11), U1 is a unitary matrix, and T1 is the upper triangular matrix for the HL3 sub-band. In Eq. (12), U2 is a unitary matrix, and T2 is the upper triangular matrix for the LH3 sub-band. Step 3: Apply singular value decomposition (SVD) on the previously obtained upper triangular matrix to get the two different dominant matrices. In Eq. (13) L1 is left unitary orthogonal matrix, R1 is a right unitary orthogonal matrix, and ∑1 is dominant matrix corresponding to T1. In Eq. (14) L2 is left unitary orthogonal matrix, R2 is a right unitary orthogonal matrix, and ∑2 is dominant matrix corresponding to T1. Step 4: Take the first watermark image: the MNNIT logo. Step 5: Perform a two-level lifting wavelet transform on the MNNIT logo and pick the HL sub-band. Step 6: Apply DCT on HLMNNIT sub-band to get HL. Step 7: Apply singular value decomposition after applying DCT to the obtained dominant matrix. In Eq. (15), is left unitary orthogonal matrix, is a right unitary orthogonal matrix, and is the dominant matrix corresponding to the first watermark image. Step 8: Take the Second watermark image: Details of the patient. Step 9: Perform two-level lifting wavelet transform on Details of the patient, and pick LHDetails sub-band. Step 10: Apply DCT on the LHDetails sub-band to get LH. Step 11: Apply singular value decomposition (SVD) after applying DCT to the obtained dominant matrix. In Eq. (16), is left unitary orthogonal matrix, is a right unitary orthogonal matrix, and is the dominant matrix corresponding to the second watermark image. Step 12: Add the dominant matrix of both the watermark images with the dominant matrices of the host image. In Eq. (17), α is the scaling factor, and S1 is modified dominant matrix. In Eq. (18), α is the scaling factor, and S2 is modified dominant matrix. Step 12: Rebuild the sub-bands by applying inverse SVD and inverse Schur decomposition, then apply three-level inverse LWT to get the watermarked image.

Watermark extraction process

Step 1: Decompose the watermarked liver ultrasound image by applying a three-level lifting wavelet transform, and pick two sub-bands (HL and LH). Step 2: Apply Schur decomposition on both sub-bands and then apply SVD to get two dominant matrices. Step 3: Apply inverse embedding to both dominant matrices. In Eq. (19) is the dominant matrix obtained after applying reverse embedding, and is the dominant matrix of the watermarked image. In Eq. (20) is the dominant matrix obtained after applying reverse embedding, and is the dominant matrix of the watermarked image. Step 4: Apply inverse SVD and DCT on previously obtained inverse embed dominant matrices. Step 5: Apply the two-level inverse lifting Wavelet transform to get the extracted watermark.

Results and discussion

The proposed algorithm is implemented with the help of MATLAB R2017a installed in the system with specifications as Lenovo 11th generation Intel(R) Core (TM) i5-1135G7 @ 2.40GHz - 2.42 GHz. The proposed watermarking method is tested on an Ultrasound image [size: 512 × 512] of the liver of three different patients taken from the cancer imaging archive [11], shown in Fig. 6, and two watermark logo images are used, shown in Fig. 7. MNNIT logo [size 256 × 256] is the first watermark image, and the details of patient [size 256 × 256] are the second logo. The watermarked image is shown in Fig. 8, and extracted watermark logo is shown in Fig. 9. To check the performance of the proposed method, the peak signal to noise ratio (PSNR), structural similarity index measurement (SSIM), and normalized correlation coefficient (NCC1 is used for MNNIT logo, and NCC2 is used for Details of patient image). The PSNR and SSIM value is used for the imperceptibility of the proposed method, and NCC is used for robustness. Table 2 shows the PSNR, SSIM, and NCC values for different host images without attack. The PSNR value for patient 1 is 45.8168, patient 2 is 45.7966, and patient 3 is 45.8186. The PSNR value is highest for patient 3. The SSIM value for patient 1 is 0.9969, patient 2 is 0.9951, and patient 3 is 0.9967. The PSNR value is highest for patient 1. The performance parameters are shown in Eqs. (22), (23), (24), and (25).
Fig. 6

Host images: P1-Patient 1, P2-Patient 2, P3-Patient 3

Fig. 7

Watermark images: W1-Watermark 1 (MNNIT logo), W2-Watermark 2 (Details of Patient)

Fig. 8

Watermarked images: WP1- Watermarked Patient 1, WP2-Watermarked Patient 2, WP3-Watermarked Patient 3

Fig. 9

Extracted watermark images: EW1-Extracted watermark 1 (MNNIT logo), EW2- Extracted watermark 2 (Details of Patient)

Table 2

PSNR, SSIM, and NCC values for different host images without attack

Host ImagePSNR (dB)SSIMNCC1NCC2
P145.81680.99691.00001.0000
P245.79660.99511.00001.0000
P345.81860.99671.00001.0000
Host images: P1-Patient 1, P2-Patient 2, P3-Patient 3 Watermark images: W1-Watermark 1 (MNNIT logo), W2-Watermark 2 (Details of Patient) Watermarked images: WP1- Watermarked Patient 1, WP2-Watermarked Patient 2, WP3-Watermarked Patient 3 Extracted watermark images: EW1-Extracted watermark 1 (MNNIT logo), EW2- Extracted watermark 2 (Details of Patient) PSNR, SSIM, and NCC values for different host images without attack

Performance parameters

The proposed scheme uses the PSNR value to comment on imperceptibility. Pixel is the maximum pixel value in the above equation, and MSE is the mean square error value. Mean square error (MSE) can be defined as: where M × N is the size of the host image, H(i,j) is the host image, W(i,j) is the watermarked image, and i, j is used for pixels. Structural similarity index measurement (SSIM) is also used to comment on the imperceptibility of the proposed watermarking scheme and is defined as: where μ, μ, σ, σ, and σ are the local means, standard deviations, and cross-covariance for images x, y, and C and C are the regularization constant for the luminance and contrast. This paper uses normalized correlation coefficient (NCC) values to comment on the robustness of the proposed watermarking scheme and is defined as: where W(i,j) is the original watermark logo, and W(i,j) is the recovered watermark logo.

Imperceptibility analysis

The invisibility of the proposed scheme is determined by the PSNR. Table 3 shows the PSNR and SSIM values P1 host image under attacks. The PSNR value for Salt and Pepper noise (0.001) is 34.7385, Gaussian noise (0,0.001) is 30.8709, Speckle noise (0.02) is 26.2916, Gaussian low pass filter (3 × 3) is 45.1891, Average filter (3 × 3) is 38.9229, Median filter (3 × 3) is 43.0525, Sharpening is 31.7900, Wiener filter (3 × 3) is 42.5133, JPEG (90) is 43.9055, JPEG 2000 (10) is 45.1019, Motion blur is 35.8291, and Region of interest filtering is 44.7626. The highest PSNR value is for JPEG 2000 (10). The PSNR value for Rotation (2) is 12.5608, Histogram eq. is 11.7571, and Shearing is 12.2016. The lowest value of PSNR is for Histogram eq. The highest value of SSIM is for Gaussian low pass filter (0.9937), and the lowest value is for Histogram eq. (0.5618).
Table 3

PSNR, SSIM, and NCC values for P1 host image under attacks

AttacksPSNR (dB)SSIMNCC1NCC2
Salt and Pepper noise (0.001)34.73850.97510.99980.9999
Gaussian noise (0,0.001)30.87090.97160.99950.9994
Speckle noise (0.02)26.29160.71330.99710.9984
Gaussian low pass filter (3 × 3)45.18910.99370.99950.9998
Average filter (3 × 3)38.92290.98510.99570.9981
Median filter (3 × 3)43.05250.98830.99970.9999
Rotation (2)12.56080.62030.99500.9958
Histogram eq.11.75710.56180.98450.9861
Sharpening31.79000.97580.97300.9876
Wiener filter (3 × 3)42.51330.98700.99890.9995
JPEG (90)43.90550.99280.99940.9998
JPEG 2000 (10)45.10190.99240.99960.9998
Motion blur35.82910.97600.99820.9921
Shearing12.20160.60120.98700.9816
Region of interest filtering44.76260.99181.00001.0000
PSNR, SSIM, and NCC values for P1 host image under attacks Table 4 shows the PSNR and SSIM values P2 host image under attacks. The PSNR value for Salt and Pepper noise (0.001) is 35.2279, Gaussian noise (0,0.001) is 30.4923, Speckle noise (0.02) is 21.9830, Gaussian low pass filter (3 × 3) is 42.3107, Average filter (3 × 3) is 33.9608, Median filter (3 × 3) is 41.7102, Sharpening is 35.9569, Wiener filter (3 × 3) is 43.9449, JPEG (90) is 44.3145, JPEG 2000 (10) is 45.2125, Motion blur is 32.8780, and Region of interest filtering is 45.1307. The highest PSNR value is for Region of interest filtering. The PSNR value for Rotation (2) is 15.8857, Histogram eq. is 20.9272, and Shearing is 11.5788. The lowest value of PSNR is for Shearing. The highest value of SSIM is for Region of interest filtering (0.9948), and the lowest value is for Shearing (0.4518).
Table 4

PSNR, SSIM, and NCC values for P2 host image under attacks

AttacksPSNR (dB)SSIMNCC1NCC2
Salt and Pepper noise (0.001)35.22790.96670.99991.0000
Gaussian noise (0,0.001)30.49230.96300.99990.9999
Speckle noise (0.02)21.98300.81460.99780.9985
Gaussian low pass filter (3 × 3)42.31070.98450.99980.9999
Average filter (3 × 3)33.96080.96370.99810.9990
Median filter (3 × 3)41.71020.98730.99930.9997
Rotation (2)15.88570.58430.94300.9703
Histogram eq.20.92720.81020.99170.9884
Sharpening35.95690.94100.98640.9947
Wiener filter (3 × 3)43.94490.98780.99980.9996
JPEG (90)44.31450.99080.99991.0000
JPEG 2000 (10)45.21250.99381.00001.0000
Motion blur32.87800.95550.99910.9961
Shearing11.57880.45180.99640.9718
Region of interest filtering45.13070.99481.00001.0000
PSNR, SSIM, and NCC values for P2 host image under attacks Table 5 shows the PSNR and SSIM values P3 host image under attacks. The PSNR value for Salt and Pepper noise (0.001) is 34.5093, Gaussian noise (0,0.001) is 30.5798, Speckle noise (0.02) is 27.6779, Gaussian low pass filter (3 × 3) is 43.0262, Average filter (3 × 3) is 35.3777, Median filter (3 × 3) is 38.5289, Sharpening is 31.0042, Wiener filter (3 × 3) is 40.3403, JPEG (90) is 42.8298, JPEG 2000 (10) is 42.8298, Motion blur is 30.4943, and Region of interest filtering is 41.7626. The highest PSNR value is for JPEG 2000 (10). The PSNR value for Rotation (2) is 14.1548, Histogram eq. is 10.4261, and Shearing is 13.0938. The lowest value of PSNR is for Histogram eq. The highest value of SSIM is for JPEG 2000 (10) (0.9944), and the lowest value is for Shearing (0.4119). The Comparison of PSNR values for P1, P2, and P3 is shown in Fig. 10. The Comparison of SSIM values for P1, P2, and P3 is shown in Fig. 11 and the timing analysis is shown if Figs. 12 and 13.
Table 5

PSNR, SSIM, and NCC values for P3 host image under attacks

AttacksPSNR (dB)SSIMNCC1NCC2
Salt and Pepper noise (0.001)34.50930.97261.00000.9999
Gaussian noise (0,0.001)30.57980.67630.99990.9998
Speckle noise (0.02)27.67790.79930.99940.9992
Gaussian low pass filter (3 × 3)43.02620.99380.99980.9997
Average filter (3 × 3)35.37770.96420.99820.9975
Median filter (3 × 3)38.52890.97340.99950.9996
Rotation (2)14.15480.58400.99240.9970
Histogram eq.10.42610.41350.94930.9842
Sharpening31.00420.89470.98790.9827
Wiener filter (3 × 3)40.34030.97280.99930.9997
JPEG (90)42.82980.98621.00001.0000
JPEG 2000 (10)44.89130.99431.00001.0000
Motion blur30.49430.90900.99880.9883
Shearing13.09380.41190.99600.9821
Region of interest filtering41.76260.99230.99990.9999
Fig. 10

Comparison of PSNR values for P1, P2, and P3 (various attacks)

Fig. 11

Comparison of SSIM values for P1, P2, and P3 (various attacks)

Fig. 12

a Time analysis of Parent calling functions b Time analysis of Children calling functions

Fig. 13

Profile Summary

PSNR, SSIM, and NCC values for P3 host image under attacks Comparison of PSNR values for P1, P2, and P3 (various attacks) Comparison of SSIM values for P1, P2, and P3 (various attacks) a Time analysis of Parent calling functions b Time analysis of Children calling functions Profile Summary

Robustness analysis

The robustness of the proposed scheme is determined by the normalized correlation coefficient. NCC1 is used for the MNNIT logo, and NCC2 is used for Details of patient image. Table 3 shows the NCC1 and NCC2 values for P1. NCC1 and NCC2 values are the highest for Region of interest filtering (1.0000). The NCC1 value is lowest for sharpening (0.9730), and the NCC2 value is lowest for Shearing (0.9816). Table 4 shows the NCC1 and NCC2 values for P2. NCC1 and NCC2 values are highest for Region of interest filtering (1.0000) and JPEG 2000 (1.0000). The NCC1 value is lowest for rotation (0.9430), and the NCC2 value is lowest for rotation (0.9703). Table 5 shows the NCC1 and NCC2 values for P3. NCC1 value is highest for Salt and Pepper noise (1.0000), JPEG (1.0000), and JPEG 2000 (1.0000). NCC2 value is highest for JPEG (1.0000) and JPEG 2000 (1.0000). The NCC1 value is lowest for histogram (0.9493), and the NCC2 value is lowest for Shearing (0.9821). The extracted watermark logo images for P1, P2 and P3 are shown in Figs. 14, 15 and 16, respectively.
Fig. 14

Extracted watermark images for P1

Fig. 15

Extracted watermark images for P2

Fig. 16

Extracted watermark images for P3

Time analysis

Profiling is a technique for determining how long our code to run entirely takes and where MATLAB invests the most time. After determining which functions take the most time, we may assess them for potential performance enhancements. Figures 12 and 13 show the timing analysis of the algorithm. Function name: The function that the profiled code calls.Calls: The number of incidents the function was called by the profiled code.Total Time: In seconds, the overall time spent in the function. Time spent on child functions is included in the function time. The Profiler takes some time, which is reflected in the final results. For files with insignificant run times, the total duration can be nil.Self-Time: Time spent in a function in seconds, discounting time invested in any child functions. Self-time contains some overhead incurred during the profiling procedure. Extracted watermark images for P1 Extracted watermark images for P2 Extracted watermark images for P3 Matched features (a) Rotation 5 (P1) (b) Rotation 10 (P1) (c) Rotation 15 (P1) (d) Rotation 5 (P2) (e) Rotation 10 (P2) (f) Rotation 15 (P2) (g) Rotation 5 (P3) (h) Rotation 10 (P3) (i) Rotation 15 (P3) The dual image watermarking increases the security of the proposed watermarking technique. The proposed technique is highly robust against various attacks. The imperceptibility of the proposed scheme is also up to the mark. The firefly optimization is used to get the optimized scaling factor. The timing complexity is significantly less and the proposed scheme takes lesser time to implement. The SURF features successfully matches the concerned portions of the given medical image and there is no significant distortion in these portions.

SURF Feature Extraction & Matching

SURF is an enhancement on SIFT as an image key point definition operator depending on scale space. The SURF operator’s graphic features resist noise, filtering, and rotation. The Hessian matrix is used by the SURF technique to find extreme points. In feature extraction, the SURF method uses box filtering rather than Gauss filtering. Simple addition and deduction can be used to finish the image filtering operation. In Fig. 17, matched features between the original image and rotated images are shown. The performance of the efficient algorithm SURF is identical to that of SIFT, but its computational complexity is lower. The SIFT algorithm shows its strength in the majority of circumstances, but its performance is still sluggish. The SURF algorithm is similar to SIFT and it also performs well (Table 6).
Fig. 17

Matched features (a) Rotation 5 (P1) (b) Rotation 10 (P1) (c) Rotation 15 (P1) (d) Rotation 5 (P2) (e) Rotation 10 (P2) (f) Rotation 15 (P2) (g) Rotation 5 (P3) (h) Rotation 10 (P3) (i) Rotation 15 (P3)

Table 6

Matched features using SURF

Rotation in degreesMatched Features (P1)Matched Features (P2)Matched Features (P3)
5363233
10333336
15332624
Matched features using SURF In Fig. 13, the ultrasound image of the liver is shown. In all the images, the black portion represents the presence of fluid, and the white part shows the presence of fat. There is a concentration of black portion, i.e., fluid in all the images in some parts. So, these two points are mainly the concerns of this medical image. With the help of SURF, the features of these two portions are extracted, even after taking one of the image as a rotated watermarked image. It is clear from the above images that the concerned portions of the used DICOM medical image are not changed or distorted because the SURF feature matches these portions, and there is no error in matching.

Conclusion

In the proposed scheme, a dual image watermarking technique is proposed, which utilizes the properties of Schur decomposition, SVD-DCT-LWT for embedding to improve the robustness and imperceptibility and to further improve the performance of the scheme firefly optimization is used. SURF features are used for authentication. The SURF features successfully matches the Region of interest of the given DICOM medical image and there is no distortion or alteration to these portions. The security of the scheme is also increased due to the use of dual image watermarking. The proposed watermarking method is robust against various attacks like Salt and Pepper noise, Speckle noise, Gaussian noise, Gaussian low pass filter, Average filter, Median filter, Rotation, Histogram, Motion blur, and Region of interest filter. The PSNR values for different input images are greater than 40 dB (without attack), the PSNR values for salt and pepper noise, Gaussian noise, Gaussian low pass filter, Average filter, Median filter, Sharpening, Wiener filter, JPEG, JPEG 2000, Motion blur and Region of interest filtering are greater than 30 dB except for Rotation, Histogram equalization and Shearing. By observing the PSNR values, it shows that the imperceptibility or invisibility of the proposed watermarking scheme is improved. The proposed technique can further be improved by using machine learning techniques for feature matching or authentication. The security of the scheme for medical data can be improved by using encryption techniques.
  2 in total

1.  The Cancer Imaging Archive (TCIA): maintaining and operating a public information repository.

Authors:  Kenneth Clark; Bruce Vendt; Kirk Smith; John Freymann; Justin Kirby; Paul Koppel; Stephen Moore; Stanley Phillips; David Maffitt; Michael Pringle; Lawrence Tarbox; Fred Prior
Journal:  J Digit Imaging       Date:  2013-12       Impact factor: 4.056

2.  A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preserving.

Authors:  Ashwani Kumar
Journal:  Multimed Tools Appl       Date:  2022-03-15       Impact factor: 2.757

  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.