Table of Contents Author Guidelines Submit a Manuscript
Computational and Mathematical Methods in Medicine
Volume 2018, Article ID 3461382, 7 pages
https://doi.org/10.1155/2018/3461382
Research Article

Reversible and Fragile Watermarking for Medical Images

1Department of Computer Science (CS), College of Computer Science and Information Technology (CCSIT), Imam Abdulrahman Bin Faisal University (IAU), P.O. Box 1982, Dammam, Saudi Arabia
2Department of CIT, JCC, King Abdulaziz University, Jeddah, Saudi Arabia
3Department of CIS, College of Computer Science and Information Technology (CCSIT), Imam Abdulrahman Bin Faisal University (IAU), P.O. Box 1982, Dammam, Saudi Arabia
4Department of MIS, College of Business Administraction, Imam Abdulrahman Bin Faisal University (IAU), P.O. Box 1982, Dammam, Saudi Arabia

Correspondence should be addressed to Atta-ur-Rahman

Received 20 November 2017; Revised 23 April 2018; Accepted 11 June 2018; Published 22 July 2018

Academic Editor: Chuangyin Dang

Copyright © 2018 Atta-ur-Rahman et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

A novel reversible digital watermarking technique for medical images to achieve high level of secrecy, tamper detection, and blind recovery of the original image is proposed. The technique selects some of the pixels from the host image using chaotic key for embedding a chaotically generated watermark. The rest of the pixels are converted to residues by using the Residue Number System (RNS). The chaotically selected pixels are represented by the polynomial. A primitive polynomial of degree four is chosen that divides the message polynomial and consequently the remainder is obtained. The obtained remainder is XORed with the watermark and appended along with the message. The decoder receives the appended message and divides it by the same primitive polynomial and calculates the remainder. The authenticity of watermark is done based on the remainder that is valid, if it is zero and invalid otherwise. On the other hand, residue is divided with a primitive polynomial of degree 3 and the obtained remainder is appended with residue. The secrecy of proposed system is considerably high. It will be almost impossible for the intruder to find out which pixels are watermarked and which are just residue. Moreover, the proposed system also ensures high security due to four keys used in chaotic map. Effectiveness of the scheme is validated through MATLAB simulations and comparison with a similar technique.

1. Introduction

Cryptography, watermarking, and steganography are technologies that are frequently being used to ensure the security, authentication, and privacy (hiding) of data, respectively, especially when it is transmitted over a public network [15]. In cryptography, the message is encrypted in such a way that it becomes incomprehensible. In watermarking, the message watermark (text, image) is embedded in the host data (image/file) in such a way that host remains imperceptible and can be authenticated later, whereas in steganography the message is embedded in a host without getting any attention of user other than intended. Transmission of an encrypted message may create suspense for an intruder, whereas this is not a case with a stego or watermarked message in a cover signal. Nevertheless, combination of these technologies can be used more protection [1].

Unlike the cryptography, the steganography and the watermarking benefits from the perceptual limitations of human audiovisual systems (HAVS), which fail to recognize difference between original and watermarked/stego-signals respectively [6]. Usually, in steganography the media files such as, image, audio, or video are used as host signals to hide the message. In general, using an image or video as steganography cover signal is more popular than the audio. This is because HVS is far less sensitive to noise in the signal than HAS [7, 8]. In [9], authors proposed a spread spectrum (SS) based invertible watermarking scheme for medical images. In this scheme, single chaotic map along with residue number systems was utilized to obtain the fragility and reversibility. In [10], authors proposed a reversible watermarking scheme for medical images using product codes and RNS. The technique provides good safeguard against various attacks due to the product codes as error correction codes but at the cost of a little enhanced complexity. In [1113], authors proposed a robust watermarking scheme using product code and cubic product code respectively. These codes provide a high level of error correcting capability against a variety of attacks in the image watermarking. Compared to simple product code, cubic product codes provide more error correction capability because of 3D codes. Similarly, in [14, 15], authors proposed reversible watermarking schemes for the medical images. In [16], authors presented a fragile image watermarking technique using SVD characteristics for authentication. Akin to this, in [17], authors presented a perceptual hash algorithm for multispectral image authentication. Yu et al. presented a comprehensive review of recoverable and nonrecoverable semifragile watermarking techniques on medical images in spatial and transform domain [18].

In this paper, a reversible image watermarking for medical images using RNS, CRC and double chaotic key is proposed. The scheme is highly fragile against any kind of tampering and highly sensitive to any type of change in the initial condition of chaotic system. Rest of the paper is organized as follows. Section 2 contains the detailed description of the system model being used for the sake of embedding and extracting the watermark into the host medical image in a step-by-step way. Section 3 contains the simulation results after experiment of the proposed scheme and Section 4 concludes the paper.

2. Proposed System Model

The block diagram for watermark embedding is given in Figure 1. Block diagram for extraction of watermark & original image can be seen in Figure 2. Detailed steps of embedding procedure are as follows.

Figure 1: Schematic for watermark embedding.
Figure 2: Schematic for watermark extraction.
2.1. Watermark Embedding

(i)Preprocessing(ii)Generation of chaos based sequence to determine the location of pixels to be watermarked.(iii)Watermark embedding in these pixels.(iv)Finding residues of the rest of the pixels and appending CRC bits.

The details of these mentioned components are given subsequently.

2.1.1. Preprocessing

Considering a gray-scale image of dimension MxN where M corresponds to rows and N corresponds to column, having pixels in intensity range . The factors of the highest value 255 can have factors 15 and 17, respectively, that are relatively prime and correspond to moduli (15,17) of the host medical image. Consequently, a pixel having intensity between 0 and 255 can be divided by the two factors to obtain the corresponding moduli. The procedure is adapted from previous work given in [20, 21].

2.1.2. Generation of Chaos

(i)Firstly, let us generate two separate binary chaotic sequences from the logistic map of (1). However, assume different initial conditions:where and belongs to (0,1).(ii)Multiply the sequences by 8 and take its lower integer (ceil) to obtain the chaotic integers with each integer range from 1 to 8 as follows:For the sake of simplicity, the chaotic integers from two logistic maps are(iii)Add the chaotic integers and change them into sum sequences asFor the sake of simplicity, the two sequences generated from (4) arewhere and , with M and N representing the image’s dimensions. For the chaotically chosen pixel pairs, ] the watermark to be embedded is and for the pixel pairs ] the watermark to be embedded is and so on.(iv)Now the pixels to be watermarked have positions w.r.t the Cartesian product set .

2.1.3. Watermark Embedding

When the pixels to be watermarked are chosen using the chaotic key, the watermark embedding consists of the following steps.(i)Choose the primitive polynomial of degree 4 as(ii)Make the message polynomial which is a pixel value in our case. Multiply by and divide it by to generate the remainder aswhere .(iii)Since the watermark for each pixel pair consists of four bits each and is also consisted of four bits so R(Y) is XORed with corresponding watermark (A) as(iv)Append with aswhere is the original watermark pixel.

2.1.4. Finding Residue and Appending CRC Bits

As we have seen, there is a set of pixels chosen in the image by a chaotic key in which the watermark is embedded. The complementary set of pixels undergoes the process of residue with CRC given below.

As explained above, our dynamic range is 0 to 254 and m1= 15, m2 =17. For any pixel, the residues (x1,x2) are obtained, where . Since and , x1 can be represented by four bits and x2 by five bits which makes a total of nine bits. Let us treat these nine bits as Residue Polynomial Res whose highest degree can be eight.(i)For each residue, make its polynomial Res and choose the primitive polynomial as(ii)Multiply Res by X3 and divide it by to get the remainder Rem as(iii)Append and as; is at the most eleven-degree polynomial that represents 12 bits.

2.2. Watermark and Host Image Extraction

Watermark and original image extraction consists of following steps:(i)Indicating the watermarked pixels using the chaotic key(ii)Watermark extraction and comparing(iii)Residues and CRC

2.2.1. Indicating Watermark Pixels

With the knowledge of the chaotic key of encoding side, the watermarked pixels can be given as

2.2.2. Watermark Extraction and Comparing

Extract from and the remaining part is which are the original pixels.

Multiply by and divide it by the known primitive polynomial used in embedding side:After that, to obtain the original watermark back, perform exclusive OR between and .If is the same watermark that means no pixel in the message is tampered and vice versa.

2.2.3. Residue and CRC

The set of pixels that are watermarked are chosen by the chaotic key while rest of them are residue. Each residue is divided by the known primitive polynomial and the remainder is obtained asIf the remainder is zero, that is an indication that none of the bits is corrupted and by utilizing (3), the original coefficients of image are recovered; otherwise, the image is tampered.

3. Simulation Results

To depict the viability of the proposed scheme, the simulations were conducted in MATLAB-8b. The parameters used in the simulation with their respective values are enlisted in Table 1.

Table 1: Simulation parameters.
3.1. Security Analysis

Figure 3(a) shows the original host MRI image of size 348x314 for watermarking. The chaotic maps used are the logistic map given in (1) with initial conditions x(0) = 0.25, r = 3.58 and x(0) = 0.56, r = 3.57 respectively at embedding side and chaotic watermark pattern of size 55x55 is considered for experiment. Figure 3(b) shows the chaotic watermark pattern. Figure 3(c) shows the watermarked image. Figure 3(d) shows the recovered image by using the exact initial conditions used on embedding side, that are, x(0) = 0.25 and r = 3.58 and x(0) = 0.56, r = 3.57 respectively. Figure 3(e) shows the recovered image with slightly modified initial conditions, that are, x(0) = 0.25000001, r = 3.58 and x(0) = 0.56, r = 3.57. In Figure 3(d), original image is recovered exactly because same set of initial conditions are used to retrieve the image. As we can see in Figure 3(e) that when initial conditions are slightly modified, the original MRI image neither recovered back nor conceivable, which demonstrates the high secrecy of the proposed technique. Similarly, Figure 4 shows identical results with an ultrasound medical image. Figures 4(a), 4(b), and 4(c) show the original image, recovered image with slightly modified initial conditions, and recovered image with exact initial conditions respectively.

Figure 3: (a) Original MRI image; (b) chaotic watermark; (c) watermarked image. (d) Recovered image with exact initial conditions. (e) Recovered image with x(0) = 0.25000001, r = 3.58, and x(0) = 0.56, r = 3.57.
Figure 4: (a) Original MRI image; (b) recovered image with slightly modified initial conditions. (c) Recovered image with exact initial conditions.
3.2. Fragility Analysis

In this section, the watermark is passed through various attacks and its fragility against those attacks is observed. Figure 5(a) shows the recovered image after passing through additive white Gaussian noise (AWGN) attack of variance 0.02. Similarly, Figure 5(b) shows the recovered watermarked image after attacked from Salt & Pepper noise attack of variance 0.1. As it is apparent from the figures obtained that the images are not recognizable at all. Although this time exact initial conditions were applied for the sake of image reconstruction but, due to the added noise, the residues are not regenerated properly. That is why the outline boundary depicts that it was an MRI image but recovery is not possible. This shows that the scheme is highly fragile against any type of attack and subject to any type of tampering or change in the initial conditions, no matter how little that change is. The only way to obtain the exact image, the watermark, and error free delivery of the host image is to provide the exact initial conditions and untampered image at receiver side.

Figure 5: (a) Recovered image after AWGN attack. (b) Recovered image after Salt & Pepper noise attack.
3.3. Imperceptibility Analysis

This is another figure of merit of the digital image watermarking. It is a measure of perceptual level of the watermarked image. That means, it must be noticed that image is watermarked. It is measured by peak signal to noise ratio (PSNR) of the image, given by the following [21]:

The obtained PSNR value of the watermarked image using the proposed scheme is 72.98dB for MRI image and 69.22dB for ultrasound image which is a very good measure because PSNR level 30dB or higher is practically viable [19].

3.4. Comparison

Table 2 shows the comparison of the proposed scheme with a similar technique by [22].

Table 2: Comparison summary.

4. Conclusion

This research focuses on a novel reversible watermarking scheme for medical images with blind recovery (no additional information needed) on receiver side. In the proposed scheme, the original host image is chaotically watermarked to provide maximum secrecy. The only thing we need for exact recovery is the knowledge of exact initial conditions as we have seen in the simulation results that slight modification in the initial conditions does not recover original image and the watermark which demonstrates the fragility and high security of the proposed scheme. Moreover, the proposed scheme exhibits a high level of imperceptibility which is inferred from obtained PSNR value of 72.98dB. In future, robustness characteristics can also be introduced in the scheme to make it hybrid or semifragile digital image watermarking scheme. Similarly, capacity analysis can also be performed.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

References

  1. A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. A. Nissar and A. H. Mir, “Classification of steganalysis techniques: A study,” Digital Signal Processing, vol. 20, no. 6, pp. 1758–1770, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. M. T. Naseem, I. M. Qureshi, Atta-Ur-Rahman, and M. Z. Muzaffar, “Novel technique for capacity maximizing in digital watermarking using fuzzy rule base,” Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, vol. 27, no. 5, pp. 2497–2509, 2014. View at Google Scholar · View at Scopus
  4. M. T. Naseem, I. M. Qureshi, T. A. Cheema et al., “Hash based medical image authentication and recovery using chaos and residue number system,” Journal of Basic and Applied Scientific Research, vol. 3, no. 6, pp. 488–495, 2013. View at Google Scholar
  5. M. Z. Muzaffar, I. M. Qureshi, and M. T. Atta-ur-Rahman Naseem, “Changing Slope Method: A Novel Technique for Digital Audio Steganography,” J. Basic Appl. Sci. Res, vol. 3, no. 12, pp. 71–81, 2013. View at Google Scholar
  6. X. Huang, Y. Abe, and I. Echizen, “Capacity adaptive synchronized acoustic steganography scheme,” Journal of Information Hiding and Multimedia Signal Processing, vol. 1, no. 2, pp. 72–90, 2010. View at Google Scholar · View at Scopus
  7. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3-4, pp. 313–335, 1996. View at Publisher · View at Google Scholar · View at Scopus
  8. E. Erçelebi and L. Batakçı, “Audio watermarking scheme based on embedding strategy in low frequency components with a binary image,” Digital Signal Processing, vol. 19, no. 2, pp. 265–277, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. M. T. Naseem, I. M. Qureshi, and M. Z. Atta-ur-Rahman, “Spread Spectrum based Invertible Watermarking for Medical Images using RNS Chaos,” International Arab Journal of Information Technology, vol. 13, no. 2, pp. 223–231, 2015. View at Google Scholar
  10. Atta-ur-Rahman, M. T. Naseem, I. M. Qureshi, and M. Z. Muzaffar, “Reversible and robust watermarking using residue number system and product codes,” Journal of Information Assurance and Security (JIAS), vol. 7, pp. 156–163, 2012. View at Publisher · View at Google Scholar
  11. Atta-ur-Rahman, N. Saba, and N. Ain, “A novel robust watermarking technique using Cubic Product Codes,” Journal of Information Security Research, vol. 6, no. 1, pp. 14–24, 2015. View at Google Scholar
  12. Atta-ur-rahman, I. M. Qureshi, and M. T. Naseem, “A novel technique for reliable image transmission using product codes,” International Journal of Computer Applications, vol. 65, no. 4, pp. 12–17, 2013. View at Google Scholar
  13. M. T. Naseem, I. M. Qureshi, . Atta-ur-Rahman, and M. Z. Muzaffar, “Robust watermarking for medical images resistant to geometric attacks,” in Proceedings of the 2012 15th International Multitopic Conference (INMIC), pp. 224–228, Islamabad, Punjab, Pakistan, December 2012. View at Publisher · View at Google Scholar
  14. M. T. Naseem, I. M. Qureshi, . Atta-ur-Rahman, and M. Z. Muzaffar, “Chaos based invertible authentication of medical images,” in Proceedings of the 2013 International Conference on Emerging Technologies (ICET), pp. 1–5, Islamabad, Pakistan, December 2013. View at Publisher · View at Google Scholar
  15. M. T. Naseem, I. M. Qureshi, and M. Z. Atta-ur-Rahman, “Chaos based Secure and Reversible Watermarking,” in Proceedings of the International Conference on Modeling and Simulation (ICOMS13, pp. 115–119, 2013.
  16. H. Zhang, C. Wang, and X. Zhou, “Fragile watermarking for image authentication using the characteristic of SVD,” Algorithms, vol. 10, no. 27, pp. 1–12, 2017. View at Publisher · View at Google Scholar · View at MathSciNet
  17. K. Ding, S. Chen, and F. Meng, “A novel perceptual hash algorithm for multispectral image authentication,” Algorithms, vol. 11, no. 1, Paper No. 6, 14 pages, 2018. View at Publisher · View at Google Scholar · View at MathSciNet
  18. X. Wang Yu and X. Zhou, “Review on semi-fragile watermarking algorithms for content authentication of digital images,” Future Internet, vol. 9, no. 56, pp. 1–17, 2017. View at Publisher · View at Google Scholar
  19. S. M. Mousavi, A. Naghsh, and S. A. R. Abu-Bakar, “Watermarking Techniques used in Medical Images: a Survey,” Journal of Digital Imaging, vol. 27, no. 6, pp. 714–729, 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. M. T. Naseem, I. M. Qureshi, T. A. Cheema, and M. Zubair, “Invertible and Fragile Watermarking for Medical Images Using Residue Number System and Chaos,” J. Basic. Appl. Sci. Res, pp. 10–10643, 2012. View at Google Scholar
  21. Atta-ur-Rahman, M. T. Naseem, I. M. Qureshi, and M. Z. Muzaffar, “Reversible watermarking using Residue Number System,” in Proceedings of the 2011 7th International Conference on Information Assurance and Security (IAS), pp. 162–166, Melacca, Malaysia, December 2011. View at Publisher · View at Google Scholar
  22. J. M. Zain and M. Clarke, “Reversible region of non-interest (RONI) watermarking for authentication of DICOM images,” International Journal of Computer Science and Network Security, vol. 7, no. 9, pp. 19–28, 2007. View at Google Scholar