Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Integrating Fresnelet Transform and Spiking Cortical Model for robust medical image cryptosystem in zero-watermarking

Published: 18 November 2024 Publication History

Abstract

Medical imaging is essential in modern healthcare as it enables accurate diagnosis, planning of therapies, and monitoring of various medical problems. The security and integrity of medical images have become of utmost importance due to the growing dependence on digital imaging technologies. Zero-watermarking is a technique used in digital image processing where the watermark is not embedded into the medical image instead, a key is generated for security purposes to achieve the information process. In the context of medical images, preserving visual fidelity and diagnostic accuracy is of utmost importance, making zero-watermarking an attractive approach for safeguarding sensitive healthcare data. This paper proposes a zero-watermarking system that utilizes the Frensnelet Transform and Spiking Cortical Model (FT-SCM) for extracting image features and enhancing the system’s resilience against various attacks. The proposed system uses FT-SCM techniques to generate a perceptual hash of size 1 × 64. The proposed cryptosystem is used to encrypt the watermark for better security. Later, the encrypted watermark and perceptual hash are merged to create a zero-watermark image (key). The proposed system yields an average PSNR, SSIM, and NC values of 57.07 dB, 0.99, and 0.75, respectively, which demonstrates an improved performance from the state-of-the-art zero-watermarking approaches. Also, the proposed cryptosystem is analysed and compared using security metrics. Security assessments demonstrate the proposed image cryptosystem approach’s efficiency, security, and realizability because of key generation in the confusion and diffusion process, which gives a chaotic nature compared to state-of-the-art approaches encryption methods.

Highlights

We proposed a new method to improve the watermark image security during encryption.
We proposed a novel FT-SCM hash generation technique.
We introduced a novel Zero-Watermarking System using FT-SCM hash and encryption.
The proposed zero-watermarking system is robust against double and multiple attacks.
The system handles colour, grayscale, and binary watermarks to boost robustness.

References

[1]
Begum M., Uddin M.S., Analysis of digital image watermarking techniques through hybrid methods, Adv Multimedia 2020 (2020) 1–12.
[2]
Gull S., Parah S.A., Advances in medical image watermarking: a state of the art review, Multimedia Tools Appl (2023) 1–41.
[3]
Yu Y.-H., Chang C.-C., Lin I.-C., A new steganographic method for color and grayscale image hiding, Comput Vis Image Underst 107 (3) (2007) 183–194.
[4]
Magdy M., Ghali N.I., Ghoniemy S., Hosny K.M., Multiple zero-watermarking of medical images for internet of medical things, IEEE Access 10 (2022) 38821–38831.
[5]
Soualmi A., Benhocine A., Midoun I., Artificial bee colony-based blind watermarking scheme for color images alter detection using BRISK features and DCT, Arab J Sci Eng 49 (3) (2024) 3253–3266.
[6]
Soualmi A., Laouamer L., Adel A., A blind watermarking approach based on hybrid imperialistic competitive algorithm and SURF points for color images’ authentication, Biomed Signal Process Control 84 (2023).
[7]
Anand A., Singh A.K., Watermarking techniques for medical data authentication: a survey, Multimedia Tools Appl 80 (2021) 30165–30197.
[8]
Zhang L., Cai P., Tian X., Xia S., A novel zero-watermarking algorithm based on DWT and edge detection, in: International congress on image and signal processing, vol. 2, IEEE, 2011, pp. 1016–1020.
[9]
Shaik A., Masilamani V., Zero watermarking scheme for privacy protection in e-health care, Automatika 64 (3) (2023) 453–466.
[10]
Yu Y., Lei M., Liu X., Qu Z., Wang C., Novel zero-watermarking scheme based on DWT-DCT, China Commun 13 (7) (2016) 122–126.
[11]
Wang C.-p., Wang X.-y., Chen X.-j., Zhang C., Robust zero-watermarking algorithm based on polar complex exponential transform and logistic mapping, Multimedia Tools Appl 76 (2017) 26355–26376.
[12]
Tu S., Jia Y., Du J., Han B., Application of zero-watermarking formedical image in intelligent sensor network security, CMES Comput Model Eng Sci 136 (1) (2023).
[13]
Wang B., Wang W., Zhao P., A zero-watermark algorithm for multiple images based on visual cryptography and image fusion, J Vis Commun Image Represent 87 (2022).
[14]
Yuan Z., Yang B., Zhao W., Liu Y., A robust zero watermarking algorithm based on nsct_Dct, in: International conference on mechanical, electronic, control and automation engineering, Atlantis Press, 2017, pp. 117–121.
[15]
Liu J., Li J., Chen J., Zou X., Cheng J., Liu J., Medical image watermarking based on SIFT-DCT perceptual hashing, in: International conference on cloud computing and security, Springer, 2018, pp. 334–345.
[16]
Singh A., Dutta M.K., A robust zero-watermarking scheme for tele-ophthalmological applications, J King Saud Univ-Comput Inf Sci 32 (8) (2020) 895–908.
[17]
Zhao J., Xu W., Zhang S., Fan S., Zhang W., et al., A strong robust zero-watermarking scheme based on shearlets’ high ability for capturing directional features, Math Probl Eng 2016 (2016).
[18]
Kang X.-b., Lin G.-f., Chen Y.-j., Zhao F., Zhang E.-h., Jing C.-n., Robust and secure zero-watermarking algorithm for color images based on majority voting pattern and hyper-chaotic encryption, Multimedia Tools Appl 79 (2020) 1169–1202.
[19]
Wu D., Li L., Wang J., Ma P., Wang Z., Wu H., Robust zero-watermarking scheme using DT CWT and improved differential entropy for color medical images, J King Saud Univ-Comput Inf Sci 35 (8) (2023).
[20]
Liu J., Li J., Ma J., Sadiq N., Bhatti U.A., Ai Y., A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and henon map, Appl Sci 9 (4) (2019) 700.
[21]
Wu D., Wang M., Zhao J., Wang J., Zhong M., Zheng H., et al., Color zero-watermarking algorithm for medical images based on BEMD-Schur decomposition and color visual cryptography, Secur Commun Netw 2021 (2021) 1–12.
[22]
Gong C., Li J., Bhatti U.A., Gong M., Ma J., Huang M., Robust and secure zero-watermarking algorithm for medical images based on harris-SURF-DCT and chaotic map, Secur Commun Netw 2021 (2021) 1–13.
[23]
Zeng C., Liu J., Li J., Cheng J., Zhou J., Nawaz S.A., et al., Multi-watermarking algorithm for medical image based on KAZE-DCT, J Ambient Intell Humaniz Comput (2022) 1–9.
[24]
Huang T., Xu J., Yang Y., Han B., Robust zero-watermarking algorithm for medical images using double-tree complex wavelet transform and hessenberg decomposition, Mathematics 10 (7) (2022) 1154.
[25]
Yamni M., Karmouni H., Daoui A., Sayyouri M., Qjidaa H., et al., Blind image zero-watermarking algorithm based on radial krawtchouk moments and chaotic system, in: International conference on intelligent systems and computer vision, IEEE, 2020, pp. 1–7.
[26]
Daoui A., Yamni M., Karmouni H., Sayyouri M., Qjidaa H., Ahmad M., et al., Color stereo image encryption and local zero-watermarking schemes using octonion hahn moments and modified henon map, J King Saud Univ-Comput Inf Sci 34 (10) (2022) 8927–8954.
[27]
Yamni M., Karmouni H., Sayyouri M., Qjidaa H., Color stereo image zero-watermarking using quaternion radial tchebichef moments, in: International conference on intelligent systems and computer vision, IEEE, 2020, pp. 1–7.
[28]
Yamni M., Daoui A., Karmouni H., Sayyouri M., Qjidaa H., Wang C., et al., A powerful zero-watermarking algorithm for copyright protection of color images based on quaternion radial fractional hahn moments and artificial bee colony algorithm, Circuits Systems Signal Process 42 (9) (2023) 5602–5633.
[29]
Yamni M., Daoui A., Karmouni H., Elmalih S., Ben-Fares A., Sayyouri M., et al., Copyright protection of multiple CT images using octonion krawtchouk moments and grey wolf optimizer, J Franklin Inst 360 (7) (2023) 4719–4752.
[30]
Xia Z., Wang X., Wang M., Unar S., Wang C., Liu Y., et al., Geometrically invariant color medical image null-watermarking based on precise quaternion polar harmonic Fourier moments, IEEE Access 7 (2019) 122544–122560.
[31]
Gao J., Li Z., Fan B., An efficient robust zero watermarking scheme for diffusion tensor-magnetic resonance imaging high-dimensional data, J Inf Secur Appl 65 (2022).
[32]
Kang X., Zhao F., Chen Y., Lin G., Jing C., Combining polar harmonic transforms and 2D compound chaotic map for distinguishable and robust color image zero-watermarking algorithm, J Vis Commun Image Represent 70 (2020).
[33]
Chu R., Zhang S., Mou J., Gao X., A zero-watermarking for color image based on LWT-SVD and chaotic system, Multimedia Tools Appl (2023) 1–24.
[34]
Nawaz S.A., Li J., Shoukat M.U., Bhatti U.A., Raza M.A., Hybrid medical image zero watermarking via discrete wavelet transform-ResNet101 and discrete cosine transform, Comput Electr Eng 112 (2023).
[35]
Xiang R., Liu G., Li K., Liu J., Zhang Z., Dang M., Zero-watermark scheme for medical image protection based on style feature and ResNet, Biomed Signal Process Control 86 (2023).
[36]
Huang T., Xu J., Tu S., Han B., Robust zero-watermarking scheme based on a depthwise overparameterized VGG network in healthcare information security, Biomed Signal Process Control 81 (2023).
[37]
Sheng M., Li J., Bhatti U.A., Liu J., Huang M., Chen Y.W., Zero watermarking algorithm for medical image based on resnet50-DCT, CMC-Comput Mater Continua 75 (1) (2023) 293–309.
[38]
Gong C., Liu J., Gong M., Li J., Bhatti U.A., Ma J., Robust medical zero-watermarking algorithm based on residual-DenseNet, IET Biometr 11 (6) (2022) 547–556.
[39]
Liebling M., Blu T., Unser M., Fresnelets: new multiresolution wavelet bases for digital holography, IEEE Trans Image Process 12 (1) (2003) 29–43.
[40]
Wang Q., Lei Y., Ren C., Li M., Spiking cortical model: A new member in the third generation of artificial neural network, in: International conference on electronic information technology and computer engineering, IEEE, 2019, pp. 1883–1887.
[41]
Zhan K., Zhang H., Ma Y., New spiking cortical model for invariant texture retrieval and image processing, IEEE Trans Neural Netw 20 (12) (2009) 1980–1986.
[42]
Roy M., Thounaojam D.M., Pal S., PIH-mSCM: a modified spiking cortical model for perceptual image hashing and its application to copy detection, Multimedia Tools Appl (2023) 1–22.
[43]
Kou G., Ma Y., Color image authentication method based on triple-channel spiking cortical model, in: International conference on broadband and wireless computing, communication and applications, IEEE, 2015, pp. 490–493.
[44]
Wang N., Ma Y., Zhan K., Spiking cortical model for multifocus image fusion, Neurocomputing 130 (2014) 44–51.
[45]
Ahmed M.H., Shibeeb A.K., Abbood F.H., An efficient confusion-diffusion structure for image encryption using plain image related henon map, Int J Comput 19 (3) (2020) 464–473.
[46]
Laiphrakpam D.S., Thingbaijam R., Singh K.M., Al Awida M., Encrypting multiple images with an enhanced chaotic map, IEEE Access 10 (2022) 87844–87859.
[47]
Feng W., He Y.-G., Li H.-M., Li C.-L., Cryptanalysis of the integrated chaotic systems based image encryption algorithm, Optik 186 (2019) 449–457.
[48]
Roy M., Thounaojam D.M., Pal S., Perceptual hashing scheme using KAZE feature descriptors for combinatorial manipulations, Multimedia Tools Appl 81 (20) (2022) 29045–29073.
[49]
Islam M.N., Hasan M., Hossain M.K., Alam M.G.R., Uddin M.Z., Soylu A., Vision transformer and explainable transfer learning models for auto detection of kidney cyst, stone and tumor from CT-radiography, Sci Rep 12 (1) (2022) 11440.
[50]
Janowczyk A., Madabhushi A., Deep learning for digital pathology image analysis: A comprehensive tutorial with selected use cases, J Pathol Inf 7 (1) (2016) 29.
[51]
Cen L.-P., Ji J., Lin J.-W., Ju S.-T., Lin H.-J., Li T.-P., et al., Automatic detection of 39 fundus diseases and conditions in retinal photographs using deep neural networks, Nat Commun 12 (1) (2021) 4828.
[52]
Ali M., Ahn C.W., An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain, Signal Process 94 (2014) 545–556.
[53]
Kim K.-S., Lee M.-J., Lee J.-W., Oh T.-W., Lee H.-Y., Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging, Comput Vis Image Underst 115 (9) (2011) 1308–1323.
[54]
Shao Z., Shang Y., Zhang Y., Liu X., Guo G., Robust watermarking using orthogonal Fourier–Mellin moments and chaotic map for double images, Signal Process 120 (2016) 522–531.
[55]
Pareek N.K., Patidar V., Sud K.K., Image encryption using chaotic logistic map, Image Vis Comput 24 (9) (2006) 926–934.
[56]
Alawida M., Teh J.S., Alshoura W., A new image encryption algorithm based on DNA state machine for UAV data encryption, Drones 7 (1) (2023) 38.
[57]
Weber A., The university of southern california SIPI image database, 2018.
[58]
Tahiri M.A., Karmouni H., Bencherqui A., Daoui A., Sayyouri M., Qjidaa H., et al., New color image encryption using hybrid optimization algorithm and krawtchouk fractional transformations, Vis Comput 39 (12) (2023) 6395–6420.
[59]
Elkandoz M.T., Alexan W., Image encryption based on a combination of multiple chaotic maps, Multimedia Tools Appl 81 (18) (2022) 25497–25518.
[60]
Daoui A., Karmouni H., Sayyouri M., Qjidaa H., et al., Robust image encryption and zero-watermarking scheme using SCA and modified logistic map, Expert Syst Appl 190 (2022).
[61]
Alawida M., A novel chaos-based permutation for image encryption, J King Saud Univ-Comput Inf Sci 35 (6) (2023).
[62]
Abba A., Teh J.S., Alawida M., Towards accurate keyspace analysis of chaos-based image ciphers, Multimedia Tools Appl (2024) 1–20.
[63]
Shafique A., Mehmood A., Alawida M., Elhadef M., Rehman M.U., A fusion of machine learning and cryptography for fast data encryption through the encoding of high and moderate plaintext information blocks, Multimedia Tools Appl (2024) 1–27.
[64]
Kamal S.T., Hosny K.M., Elgindy T.M., Darwish M.M., Fouda M.M., A new image encryption algorithm for grey and color medical images, IEEE Access 9 (2021) 37855–37865.
[65]
Daoui A., Yamni M., Karmouni H., Sayyouri M., Qjidaa H., Ahmad M., et al., Biomedical multimedia encryption by fractional-order meixner polynomials map and quaternion fractional-order meixner moments, IEEE Access 10 (2022) 102599–102617.
[66]
Kamal S.T., Hosny K.M., Elgindy T.M., Darwish M.M., Fouda M.M., A new image encryption algorithm for grey and color medical images, IEEE Access 9 (2021) 37855–37865.
[67]
Lai Q., Hu G., Erkan U., Toktas A., A novel pixel-split image encryption scheme based on 2D salomon map, Expert Syst Appl 213 (2023).
[68]
Anand A., Singh A.K., Watermarking techniques for medical data authentication: a survey, Multimedia Tools Appl 80 (2021) 30165–30197.
[69]
Hosny K.M., Kamal S.T., Darwish M.M., Papakostas G.A., New image encryption algorithm using hyperchaotic system and fibonacci q-matrix, Electronics 10 (9) (2021) 1066.
[70]
Andono P.N., et al., Improved pixel and bit confusion-diffusion based on mixed chaos and hash operation for image encryption, IEEE Access 10 (2022) 115143–115156.
[71]
Azzaby F.E., Akkad N.E., Sabour K., Kabbaj S., A new encryption scheme for RGB color images by coupling 4D chaotic laser systems and the heisenberg group, Multimedia Tools Appl (2023) 1–20.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Computers and Electrical Engineering
Computers and Electrical Engineering  Volume 118, Issue PA
Aug 2024
1425 pages

Publisher

Pergamon Press, Inc.

United States

Publication History

Published: 18 November 2024

Author Tags

  1. Zero-watermarking
  2. Spiking Cortical Model
  3. Perceptual hash
  4. Fresnelet Transform
  5. Medical imaging
  6. Cryptosystem

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media