4.6 Article

A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images

Journal

MULTIMEDIA TOOLS AND APPLICATIONS
Volume 80, Issue 7, Pages 10615-10655

Publisher

SPRINGER
DOI: 10.1007/s11042-020-10032-2

Keywords

Identity authentication; Medical image watermarking; Integer wavelet transform; Least significant bit; Chaotic sequence; Encryption; Telemedicine

Ask authors/readers for more resources

The secure and blind watermarking algorithm described in the text utilizes Integer Wavelet Transform, Least Significant Bit, and chaotic sequences to embed a watermark with high capacity into medical images. The algorithm provides high-level security through the use of chaotic sequences and ensures a high payload capacity for the watermark.
Nowadays, secure medical data transmission is an essential issue in telemedicine through unsecured channels. Watermarking methods are widely used to provide optimal security for medical image transmission. In this method, a secure and blind watermarking algorithm based on Integer Wavelet Transform (IWT), Least Significant Bit (LSB), and chaotic sequences (ILC) with a high capacity for grayscale medical and non-medical images is ILC. In this scheme, the high-level security is achieved by chaotic sequences that are applied for watermark encryption and determining the location of host blocks and host coefficients in the embedding process. At first, the cover medical image is divided into two distinct parts: the region of interest (ROI) and the region of non-interest (RONI) areas. Due to the high sensitivity of the ROI data in disease diagnosis, no embedding is done in this area. An ROI integrity check data (ICR), produced by some significant features from ROI, to detect tampered blocks inside this area. The main watermark, which is the encryption of ICR along with the patient's personal and medical information, is embedded in the middle-frequency at the first and second levels of IWT sub-bands. Furthermore, to verify the watermark, integrity check data (ICW) is produced and sent along with other essential data to the receiver. For identifying authentication purposes, the physician's signature is embedded at the third level (LL3) sub-band of IWT which has the highest energy and robustness. Moreover, the algorithm is flexible for using different sizes of text watermarks and it guarantees a high payload capacity. It is noteworthy the maximum lengths of text watermarks used in the method for 512x512 and 1024x1024 images are 47,784 and 164,620 bits, respectively. Although the size of the embedded watermark increases with the size of the ROI area, the image transparency remains almost constant and also the watermark is extracted with a bit error rate of zero. By doing various analyses, the experimental results represent superior imperceptibility by an average PSNR value of 75 dB. This method provides high imperceptibility and robustness against various attacks compared with state-of-the-art algorithms.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available