Abstract

Watermarking is one of the most common techniques used to protect data’s authenticity, integrity, and security. The obfuscation in the frequency domain used in the watermarking method makes the watermarking stronger than the obfuscation in the spatial domain. It occupies an important place in watermarking works in imperceptibility, capacity, and robustness. Finding the optimal location to hide the watermarking is one of the most challenging tasks in these methods and affects the method’s performance. In this article, sample identification information is processed with the method of watermaking on the hiding environment created by using a chaos-based random number generator on biomedical data to provide solutions to problems such as visual attack, identity theft, and information confusion. In order to obtain biomedical data, a lensless digital in-line holographic microscopy (DIHM) setup was designed, and holographic data of human blood and cancer cell lines, which are widely used in the laboratory environment, were obtained. The standard USAF 1951 target was used to evaluate the resolution of our imaging setup. Various QR codes were generated for medical sample identification, and the captured medical data were processed by watermarking it with chaos-based random number generators. A new method using chaos-based discrete wavelet transform (DWT) and singular value decomposition (SVD) has been developed and applied to high-resolution data to eliminate the problem of encrypted data being directly targeted by third-party attacks. The performance of the proposed new watermarking method has been demonstrated by various robustness and invisibility tests. Experimental results showed that the proposed scheme reached an average PSNR value of 564588 dB and SSIM value of 0.9972 against several geometric and destructive attacks, which means that the proposed method does not affect the image quality and also ensures the security of the watermarking information. The results of the proposed method have shown that it can be used efficiently in various fields.

1. Introduction

In recent years, significant developments in medical imaging technologies have brought many new perspectives to hospital and laboratory environments. These developments have resulted in large databases of information such as medical images, experimental procedure records, diagnostic and treatment reports, and patient records. The secure management, indexing, and archiving of these digitized data that emerged with these technologies become a significant issue. Illegal access, copying, and unlawful data modification cause serious security problems [1, 2]. A high degree of security procedures is required to store, record, and transmit these data securely. In addition, other identifying data attached to images may be lost, hacked, or archived incorrectly. Although various methods have been proposed in the literature to solve these problems, the watermarking technique is one of the most popular methods [35].

Watermarking is defined as embedding the data in another signal; it is embedding additional information directly into the data by gradually altering the original data or some transformed version of these data. The characteristics of a watermarking algorithm vary depending on the application for which it is designed. Undetectability, robustness, and security are essential criteria for a successful watermarking operation [6]. Undetectability defines the confidentiality of the presence of the watermark in the data, and the signal embedded in the data should not be noticed. The watermark embedded in the data must survive any reasonable action applied to the carrier. Otherwise, it is called fragile if it is not detected after the slightest change. In addition, embedded data should be resistant to unauthorized access and should not show any hint of the presence of the watermark. With the digital watermarking process, data corruption and access by unauthorized persons are highly restricted, producing results that are highly resistant to attacks [610]. In addition, a digital watermark is used to check for privacy, integrity, and malpractice obligations and tackle ethical and legal issues [1113]. The watermarking of medical data brings with it various advantages. Thanks to the embedded data that contribute to savings in archiving large-scale digitized data. Embedded data reduce the need for additional bandwidth in transmission processes and increases the transfer rate. Thanks to the metadata hidden in the image data; it increases the safety of patients’ records in the hospital and the safety of experiments in laboratory environments. This situation primarily provides advantages in archiving and proper classification and prevents unauthorized access to these data from outside [14, 15].

In recent years, many studies have been conducted on watermarking medical data. Alshaikn et al. [16] tried to determine the most suitable region to embed the watermark in the discrete cosine transform (DCT) based watermarking approach. They use a modified pigeon algorithm to determine the optimal burial path. Hsu et al. [17] proposed a high-capacity QR decomposition (QRD) based blind watermarking algorithm with artificial intelligence technologies for color images. Applying the watermark involves dividing the main image into nonoverlapping blocks of 4×4 pixels and then applying the QRD to each block. Ernawan et al. [18] proposed a self-embedded watermark using a spiral block mapping for tamper detection and restoration. They implemented a 3×3 block-based encoding, self-embedding watermark with two authentication bits and seven recovery bits. Muigai et al. [19] proposed an imperceptible and reversible medical image watermarking (MIW) scheme based on image segmentation, image estimation, and nonlinear difference broadening for the integrity and authenticity of medical images and detection of both intentional and unintentional manipulations.

Huang and Wu [20] proposed a new visual information hiding technique called optical watermarking for authenticating original printed documents. An optical watermark is a two-dimensional binary image. It can be of any shape and can be printed anywhere in a document. An optical watermark is created by overlaying many two-dimensional binary images, each of which has different carrier structural patterns that embed confidential information. The hidden information is embedded in each layer using phase modulation. Xie and Arce [21] developed a blind watermarking technique with a digital image signature for authentication. The signature algorithm is first implemented in the discrete wavelet transform (DWT) domain and then combined into the SPIHT compression algorithm. The capacity of the watermarking method is determined by the upper limit of the bit rate of information that can be hidden in the image using the binary engraving and multibit engraving methods. Arena et al. [22] proposed digital watermarks to validate both video and images. In such embodiments, the watermark is embedded in a master image, so that subsequent changes in the watermarked image can be detected with a high probability. The study presents the possibility of applying a real-time watermark on a video stream. Sidiropoulas et al. [23] proposed a new technique combining localization and reversibility. Moreover, the watermark dependency on the original image and the nonlinear watermark placement procedure ensured that no malicious attack would generate information leakage.

Thakkar et al. proposed a blind image watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD). This study applied DWT to the medical image’s ROI (region of interest) to obtain different frequency subbands of wavelet decomposition [13]. Dhanalakshmi and Thaiyalnayaki proposed a binary watermarking method based on DWT-SVD and chaos cryptography [6]. A different spatial domain-based digital image watermarking method has been proposed by Lin et al. [24]. Today, encryption and watermarking methods have begun to work together to extend security to the electronic patient report (EPR) medical data [4]. An excellent watermarking algorithm must be robust and reliable against attacks [8]. Also, some studies have proposed the wavelet-based watermarking method for medical images [2530].

In the SVD method, the diagonal elements of the singular value matrices are less subject to change against possible attacks after watermarking [31]. In more detail, the large-valued ones of the singular value matrix do not undergo significant change. In addition, the imperceptibility of the cover image is better as it allows for hiding less data belonging to the watermark. The most important advantage of using the DWT-SVD method is reducing the SVD process cost [32]. For this, the scaling feature of the DWT technique was used. R-DWT is applied to realize the most appropriate scaling. Thus, a robust, transparent, and less costly scheme is obtained [33]. The disadvantage of the SVD method is the false positive problem. This is the case when another watermark (actually another logo or image that is not watermarked) could be extracted from the watermarked image. This study used chaos-based random number generators to counter the false positive problem. Watermarking is performed on randomly selected pixels. Thus, it is possible to remove the watermark only by those who know these chaotic keys.

This study developed a new method using chaos-based discrete wavelet transform (DWT) and singular value decomposition (SVD) for watermarking with high imperceptibility and robustness. In addition, a new application area has been gained by applying the proposed method to the data obtained from the DIHM system. In the following sections of this article, the theoretical details of holography and the design parameters of our microscopy setup are explained in detail. The standard USAF 1951 target was used to evaluate the resolution of the imaging setup. Human blood and cancer cell culture cells, which are widely investigated in clinical and laboratory applications, were used as medical samples. A QR code was created for information such as medical sample preparation procedures and patient information. The chaotic system is used for random number generators. The dynamic analysis results of the chaotic system determined as suitable for the watermarking process are shown. The randomness performance of random number generators has been demonstrated by NIST and ENT statistical tests. The new method using discrete wavelet transform (DWT) and singular value decomposition (SVD) intended for watermarking is explained in detail. The performance of the proposed new watermarking method has been demonstrated by various robustness and invisibility tests.

2. Lensless Digital In-Line Holographic Microscopy

Microscopy systems that allow imaging at the micro-nano level have an undeniable effect on the development of today’s scientific world. Micro-nano level sensors developed based on semiconductor technology have expanded the usage area of microscopy systems and caused this development to progress. With these developments, DIHM has begun to be used in many application areas, from physics to medical imaging [3437]. With its advantages such as wide field of view, high spatial resolution, easy integration, and low cost, DIHM has become a tool that performs essential functions, especially in the laboratory and clinical stages of medical imaging. DIHM is used in laboratory conditions to imaging microorganisms such as cancer cells, bacteria, yeast cells, or sperm cells, perform viability analyses, track the cells in 2D, and determine sample 3D localizations [3842]. It is used in the clinic for human-level counting and classifying blood cells, morphological examination of medical samples, and disease diagnosis [4345]. Considering all these areas of use, the commercial studies of DIHM systems are currently used for clinical and laboratory experiments. With DIHM, where algorithm integration is easy, various analyses can be obtained with high accuracy rates with traditional image processing methods, segmentation methods, or deep neural network methods [46, 47]. This situation constitutes an excellent alternative to the methods accepted as a gold standard, and it seems likely to reach more areas of use in the future. In this section, the basic principles of holography are mentioned, and the design parameters of our imaging system are detailed.

2.1. Hologram Theory

DIHM is based on Gabor’s holographic principle [48]. The interaction of the light source and the rays emanating from this light source with the sample and the diffraction patterns resulting from this interaction are recorded by charge-matched semiconductors (CCD) or complementary metal oxide semiconductors (CMOS). The interaction of the beams emitted from the light source with the sample and the diffraction patterns resulting from this interaction are recorded via charge-coupled devices (CCD) or complementary metal oxide semiconductors (CMOS) [49]. Coherent sources are used as light sources, and spatially filtered light-emitting diodes (LED) are used in many applications in the literature [38, 50]. DIHM, in which no optical lens is used, uses Fourier optics’ principles numerically in its image creation processes. According to the in-line principle, the hologram can be expressed aswhere is the diffraction image, is the reference wave, is the diffraction of the object, the intensity of the reference wave (constant term), and is the zero-order diffraction of the object and is very small compared to other terms, so that it can be neglected. is the real image and is the twin image. The hologram needs to be normalized [51]. For this, the constant DC term in (1) can be extracted from the hologram intensity data by recording between the sensor and the object plane without an object. It can be normalized with the average intensity value of the background of the hologram data. Normalization or background removal eliminates the inhomogeneous light distribution or unwanted noise in the hologram. In addition, the obtained hologram data can be obtained regardless of the reference wave or the imaging sensor’s sensitivity [52]. Therefore, the hologram’s real image and twin image terms must remain in the equation to obtain the object information. Thus, the result of background normalization is

2.2. Microscopy Setup and Imaging Evaluation

Our DIHM setup consists of a light source, pinhole, imaging sensor, and electronic components. All mechanical parts were 3D printed, and electronic components were controlled with a microcomputer. Due to the diffraction phenomenon, short-wavelength illumination sources can achieve higher spatial resolution [53]. For this reason, a Power LED source of 430 nm wavelength has been used as the light source. The power LED source was driven with a 250 mA constant current source. The microcomputer provides the PWM signal to coordinate the light source with the imaging sensor during hologram acquisition. With the PWM control, the heating of the light source is prevented, and therefore the temperature-dependent change of the wavelength is prevented. A 150 µm diameter laser cut pinhole was placed in front of the LED source to provide spatial filtering and make the light source partially coherent. Sony IMX 219PQ was used as the imaging sensor. The CMOS sensor has a maximum resolution of 3280 ×  2464 and a pixel pitch is 1.12 µm. The imaging sensor has an approximately active sensor area, which is equal to the field of view of the DIHM. All data obtained during the study were collected and processed at this resolution. The medical samples and the calibration slide were placed directly on the imaging sensor. The imaging sensor was connected to the microcomputer with the help of a flex cable, and parameters such as exposure time, gain, and white balance were adjusted. Considering the magnification factor in the produced imaging system, the distance between the sensor and the object was chosen as less than 1 cm, and the distance between the imaging sensor and the light source was chosen as 6 cm. Figure 1 shows a schematic representation of the DIHM system.

After the light source interacts with the object plane, the interference of the object’s diffraction waves and reference waves on the imaging sensor generate the hologram. The hologram and background images collected with the help of the microcomputer were recorded as color images and then transferred to the PC to perform the image processing steps. Since the imaging sensor has a Bayer filter, only the green channel is used to obtain maximum light information. Background data were extracted from the hologram, and images were converted to [0, 255] scale. The normalized hologram data is backpropagated in the optical axis between the sensor and object planes via the angular spectrum method [47, 54]. The angular spectrum method uses no approximations and is appropriate for small distances [55]. Fast Fourier transform (FFT) first transferred the hologram to the spatial frequency domain. Then, the hologram in the frequency domain is multiplied by the created transfer function. Finally, the images that have been multiplied in the frequency domain are converted to the spatial domain by inverse fast Fourier transform (IFFT). The angular spectrum method used in creating the transfer function can be mathematically expressed as follows:where represents the FFT and represents the IFFT. and are the spatial coordinates in the image plane, is the propagation distance, and represent th spectral coordinates in the Fourier space, and is the wavelength. is the expression of the hologram’s light-intensity field on the imaging sensor and the reconstructed image in the optic axis direction.

When creating the transfer function, the distance between the required image sensor and the sample may not be known in some cases. In order to solve this problem, it must be solved numerically by multiplying the transfer function formed from a small reconstruction distance with the hologram. In the study, 50 transfer functions were created with a 10 µm step size, multiplied with a hologram, and the sample images were obtained. Tenenbaum gradient, Brenner gradient, and Tamura gradient of all images were calculated to find the optimum distance through the images [56, 57]. The local maximum values of the calculated functions are taken as the best image. In order to improve the hologram images, methods such as phase retrieval and twin image elimination can be applied to images [58, 59]. However, in this study, these routines were not applied within the scope of the study, and the basic system microscopy scheme was considered.

The standard USAF 1951 resolution target was used to evaluate the resolution capability of our microscopy setup. USAF 1951 target has a maximum of seven groups and six elements. The raw hologram obtained by USAF 1951 is shown in Figure 2(a), the region of interest (ROI) is shown in Figure 2(a), the image resulting from the reconstruction of the ROI is shown in Figure 2(c), and the group is shown in Figure 2(d), the normalized pixel intensity value of group 7 and elements 6 is given. The figures show that the microscope designed for imaging resolves 228.1 (lp/mm).

2.3. Sample Preparation and Data Collection

As for medical data, the most analyzed medical samples in clinics and laboratories were preferred. Human blood cells were imaged as the first medical sample. The sample blood samples used in this study were approved by the Sakarya University Ethics Committee’s decision number 050.01.04/291. The participant was healthy laboratory personnel, verbal and written information was given about the study, and the samples were used with permission. Blood samples were prepared in 5 µL, and the samples were placed on a glass slide. MCF-7 breast cancer cell culture was used as a secondary medical sample, and MCF-7 cell culture is one of the most frequently used cell cultures in laboratory research. The MCF-7 cell line was supported and grew with 10% fetal bovine serum and 1% penicillin and incubated at 37°C with 5% CO2. Trypan blue was added to the cells in a ratio of 1 : 1. It was taken in the same volume as the blood sample and imaged in DIHM. In Figure 3, images of the obtained medical samples and regions of interest are given.

3. The Used Chaotic System, Its Dynamic Analysis, and RNG Design

Edward Lorenz introduced the concept of chaos and the attractor, which is very sensitive to initial conditions, in 1963 [60]. In recent years, developments related to chaotic systems have attracted the attention of researchers [61, 62]. The science of chaos, briefly defined as the order in disorder, is encountered in many applications such as electronics, computers, control, finance, and health because it is mathematically simple and can be used in practice [6367].

This section discusses the fundamental dynamic analysis of the chaotic system without equilibrium points used for watermarking. The chaos-based random generator will form the basis of watermarking work and its statistical tests. The equations for the chaotic system without equilibrium points used for the chaos-based random number generator are

The random numbers required for the watermarking application are generated from chaotic systems. 3D continuous-time chaotic system has six parameters. The values of these parameters are , and . In addition, the initial conditions of the chaotic system are . In other cases, the system may emerge from chaos. In (5), the set of equations can be seen with parameter values entered. The watermarking application generated random numbers according to the parameter values and initial conditions selected in the article study. In order to show that the system is chaotic, some analyzes are given in the article and it is shown that the system is chaotic. With the system that proved to be chaotic, random number generation was made as given in algorithm 1, and the watermarking application was carried out as a result of successful test processes.

3.1. Dynamic Analysis

The time series analysis, sensitivity to initial conditions, and phase portraits of the chaotic system used in the article are shown in Figures 46. The sensitivity analysis of the initial conditions shows that the system exhibits different behavior with a minimal change. For this reason, the chosen chaotic system is suitable for essential studies such as encryption, data hiding, and watermarking.

3.2. Random Number Generation

Random numbers are generally divided into pseudo (PRNG) and true (TRNG). If we obtain different random numbers every time we start a system, this system is called TRNG. Because of the production of different random numbers each time, the use of TRNG is, in some cases, not suitable for studies such as encryption. For this reason, PRNG s can be preferred to get the same numbers when the system is started from the beginning. In this article, pseudorandom numbers were preferred because the same random numbers were needed when the system was rerun for the watermarking application. The pseudocode for how random numbers are generated is given in Algorithm 1.

Input: System Parameters (a = 2.8, b = 0.2, c = 1.4, d = 1, e = 10, f = 2), Initial condition (x(0) = 0, y(0) = 0, z(0) = 0)
Output: Chaos-Based Random Numbers (CBRNG)
(1)Start
(2)Determination of the appropriate value of Δh (0.05)
(3)while minimum 1Mbit data do
  Solving the chaotic system using the RK-4 algorithm
  Obtaining time series
  Convert float to binary
  Select “s = 16” bit LSB
end while
(4)Apply randomness tests
(5)if test results = = pass then
  Ready-tested random numbers for engineering application
 else
  Test results = = false
  return Start
 end if
(6)Exit.

If Algorithm 1 is explained, a chaotic system without an equilibrium point selected for the PRNG design is discretized by the RK4 numerical analysis algorithm since it is a continuous-time system. After the discretization process, the obtained point-based numbers were converted to a binary number system. After the conversion process, a 32 bit binary number system is produced for each point-based number. This study created random number sequences by selecting low-significant 16 bit number series from the 32nd bit to the 17th bit of each generated number.

3.3. Statistical Tests

NIST-800-22 statistical tests with the highest standards at the international level were used to measure the randomness performance of the numbers produced. Although the NIST-800-22 tests consist of 16 different tests, a series of numbers consisting of a minimum of 1 Mbit “0” and “1” is required. If one or more NIST-800-22 tests fail, the bit series must be rebuilt and the test repeated. All tests must be successful for the produced series of bits to be successful. The NIST-800-22 Test results are interpreted according to P values. The result must be greater than the defined P-value for the test to be considered successful. The random bit series created successfully passed this study’s NIST-800-22 statistical tests. The chosen chaotic system is three-dimensional. Therefore, three different outputs can be obtained: x, y, and z. However, in this study, the tests were performed only with random numbers obtained from the output “x” and the results are given in Table 1.

According to Table 1, all P values are greater than 0.001. Therefore, the generated random bit series has successfully passed all NIST-800-22 statistical tests. Generated random numbers can be safely used in encryption, data hiding, and watermarking applications due to the test’s success.

Another reliable statistical test, the ENT test, is a test application developed by John Walker that applies various tests to byte sequences produced by pseudorandom number generator applications [25]. There are five different statistical tests found in the ENT test that define the randomness of bit sequences. ENT test results mean values of random numbers obtained from output x are given in Table 2. According to Table 2, it was concluded that the random numbers generated from the last 16 bit values of the x output, which passed all tests, provided randomness.

4. DWT-SVD Based Watermarking Application

This section describes watermarking the cover image and removing the watermark from the watermarked image. First, a 256 × 256 dimensional matrix (selected blocks) is obtained from the high-resolution medical images of blood and cancer cells through chaos-based random numbers. In other words, it forms the matrix, we call selected blocks, which consists of randomly selected pixels that we obtained from the large-size image we call cover image (C). R-level wavelet transform algorithm is applied to this obtained image. The watermarking process uses singular value decomposition (SVD) for the M ×M size image to be watermarked and the N × N size watermark. In the continuation of this section, details of the discrete wavelet transform, singular value decomposition, and watermarking algorithm are given.

4.1. Generating Selected Blocks Matrix from Cover/Watermarked Cover Image

This study hides the watermark in the B matrix created from the pixels selected with CBRNG from the original image. Then, this matrix with a watermark is placed on the cover image, pixel by pixel, to its previous positions with CBRNG. In this way, it is aimed to discover watermarking difficult.

According to Figure 7, random numbers were generated (CBRNG) with the proposed chaotic system according to the size (256 × 256) of the B matrix to be obtained. Then, the N-dimensional RNG array was obtained. In Figure 7, the B matrix is created by selecting the green pixel values of the CBRNG array of the cover image. With the watermark hidden in the B matrix with the proposed method, the 256 × 256 matrix B with the watermark shown in red in Figure 7 is obtained. As a result of the watermarking, the watermarked matrix is repositioned to the CBRNG array pixels marked in red. Since the watermarking process is performed on random numbers indicated by the CBRNG series, the chaotic system that makes up the CBRNG number system must be known to obtain the secret watermark.

The algorithm’s pseudocode for generating the B matrix in the proposed chaos-based RNG watermarking method is given in Algorithm 2.

According to Algorithm 2, the width (Width1) and height (Height1) values of matrix B are taken as input. Then, the cover image (img1) to be processed is selected, and the width (Width) and height (Height) values are read. By selecting the RNG file, the CBRNG sequence is divided into two: CBRNG X and Y. The values in the CBRNG array are checked and parsed as repetitive values. This is to avoid using the same location twice, thanks to unique values. The elements of the CBRNG X array are normalized with the width value and the elements of the CBRNG Y array with the height value, so the array number values are adjusted according to the width and height limit of the original image. An empty array is created according to the desired Width1 and Height1 values for the B matrix to be obtained. Two nested loops are created. It starts from the first row and first column of matrix B. All the image pixels are processed until the outer loop to the value of Height1 in the first iteration and the value of Width1 in the first iteration of the inner loop. In Algorithm 2, the outer loop variable i shows the rows in the cover image; if the inner loop variable j shows the column row, CBRNG Y shows the rows, and CBRNG X shows the random number generator values for the columns. In each step of the loop, the pixel of the cover image is taken at the position determined by the CBRNG sequence and placed in the next pixel of the B matrix. This process continues until all pixels of matrix B have been generated.

Input: Cover/Watermarked Image
Output: Selected Block Matrix (B)
(1)Start
(2)Read Cover Image (img1)
(3)Get Width and Height from img1
(4)Select CBRNG file
(5)Divide CBRNG numbers by CBRNG X and CBRNG Y
(6)Normalize the values in the CBRNG X array by modulo with Width
(7)Normalize the values in the CBRNG Y array by modulo with Height
(8)Discard repetitive values in CBRNG X and Y
(9)Get Width1 and Height1 from B
(10)Create an array of size B
(11)for i = 1: Height1: 1
  for j = 1: Width1: 1
  B(i, j) = img1(CBRNG Y(i), CBRNG X(j))
 end for
(12)Return
(13)End
4.2. Obtaining Cover/Watermarked Cover Image from Selected Blocks Matrix

In the proposed chaos-based CBRNG watermarking method, the flow diagram of the algorithm for placing the watermarked matrix B back to its previous positions in the cover image is given in Algorithm 3. By selecting the watermarked matrix B to be obtained according to Algorithm 3, the width (Width1) and height (Height1) values are read. Then, by selecting the cover image (img1) to be processed, the width (Width) and height (Height) values are obtained. By selecting the CBRNG file, the CBRNG sequence is divided into two CBRNG X, and Y. Duplicate values are parsed by checking the values in the CBRNG array. This avoids using the same location twice, thanks to unique values. The elements of the CBRNG X array are normalized with the width value, and the elements of the CBRNG Y array with the height value so that the array number values are set according to the width and height limit of the original image. Two nested loops are created. It starts from the first row and first column of matrix B. All the image pixels are processed until the outer loop to the value of Height1 in the 1st iteration and the value of Width1 in the 1st iteration of the inner loop. In Algorithm 3, the outer loop variable i represents the rows in the original image; if the inner loop variable j is the column row, CBRNG Y represents the rows, and CBRNG X represents the random number generator values for the columns. At each step of the loop, the pixel of matrix B in the j column position of the i row is taken and placed in the cover image pixel at the position determined by the CBRNG array. This process continues until all the indices of the watermarked matrix B have been placed back. Thus, a watermarked image is obtained by using CBRNG from matrix B. This process is also used in the watermarking and watermark removal algorithm.

Input: Cover Image,
Output: Watermarked Image
(1)Start
(2)Read Cover Image (img1)
(3)Get Width and Height from img1
(4)Select CBRNG file
(5)Divide CBRNG numbers by CBRNG X and CBRNG Y
(6)Normalize the values in the CBRNG X array by modulo with Width
(7)Normalize the values in the CBRNG Y array by modulo with Height
(8)Discard repetitive values in CBRNG X and Y
(9)Get array
(10)Get Width1 and Height1 from
(11)for i = 1: Height1: 1
  for j = 1: Width1: 1
  img1(CBRNG Y(i), CBRNG X(j)) =  (i,j)
 end for
(12)Create from img1 array
(13)Return
(14)End
4.3. DWT and SVD Methods

Discrete wavelet transform is one of the most basic methods that transform digital images from the spatial domain to the frequency domain. DWT is a feature extraction technique that allows the processing of images at different resolutions. It is especially preferred in watermarking research because it is resistant to attacks applied to the image [68]. In this study, R-level DWT, which considers the size of the selected blocks matrix and the watermark size, is used. Here, R is determined according to the result of the expression . For example, if M = 512 and N = 128, R = 2. Therefore, 2-level DWT is applied. After the DWT process, LL for low frequency, HL for horizontal mid-frequency, LH for vertical mid-frequency, and HH for high frequency are obtained. Performing the DWT process R times on these subbands obtained from the previous DWT operation is called R-LEVEL DWT. For example, Figure 8 shows the subbands obtained due to 1-level DWT and 2-level DWT.

Singular value decomposition (SVD), mainly used for dimension reduction in signal processing studies, is preferred in watermarking because it is more resistant to attacks. Assuming and , A is factored by the SVD operation as shown in the following equation:

The matrices U and V here are orthogonal and satisfy the conditions and , respectively. The Σ is a diagonal matrix, and it satisfies the condition , the diagonal elements being , respectively.

4.4. Proposed Watermarking Scheme

In this article, numbers produced by a chaos-based number generator and watermarking techniques were combined to protect medical confidentiality, and digital watermarking was made on medical images. The study considers a new binary watermarking scheme that includes encryption to improve medical images’ tenure, protection, and robustness. The security feature of the proposed watermarking technique is enhanced by chaos-based and uniquely number generation. The watermarked primary image is encrypted using the chaos-based encryption technique. It is then placed in the image and transmitted. The chaotic encryption scheme provides a large key space and high key precision, and the password can resist brute force attacks and statistical analyses. The proposed method is secure against third-party attacks and can meet the need for image encryption. A reliable watermark decryption scheme and an extraction scheme for both the primary and secondary watermark are established to remove the watermark. In the proposed method, the watermark is hidden in the image created by selecting random pixels with the numbers produced by RNG from the original image with medical content. The 8 bit images containing human blood and cancer cell samples were used. In the method, first, the watermark is hidden in the image created from the pixels selected with RNG from the original image. Then, the watermarked image is placed on the original image with RNG, pixel by pixel, to its previous positions. In this way, the method makes watermark detection difficult and makes it difficult to discover the watermark. The watermarked image recreated at the end of the method is not distinguishable from the original image. The watermark can be removed lossless from the watermarked image. The RNG sequence created through the chaotic system is needed for the watermark extraction process. By operating the chaotic system with the same initial conditions at the receiving end, the same RNG sequence can be produced, or a standard RNG sequence can be used. RNG sequence can be considered the proposed method’s chaotic encryption algorithm. Different encryptions can be made by changing the RNG sequence. This increases the system’s security and prevents malicious people from destroying the watermark.

In the next section, watermarking embedding and watermarking extraction algorithms are explained. In this algorithm, the cover image, selected block obtained with chaos-based random numbers, and the watermark are represented by , , and , respectively. After the watermarking embedding, and are obtained. After the watermarking extraction, is obtained. Here, the condition is met.

4.4.1. Watermarking Embedding Algorithm

First, B is obtained from the cover image (C) using CBRNG. In the second step, R-level DWT is applied to matrix B. The SVD is applied to the Rth LL obtained with the R-level DWT. and are obtained from this process. Also, singular value decomposition is applied to the matrix and and matrices are obtained. is obtained by taking into account the singular values ( and ) and the scaling factor (α) in

In (8), using , , and , is obtained.

With , the reverse of the R-level DWT process is applied and is obtained. Then, using and CBRNG, the pixels in are updated and is obtained. The watermarking embedding process is explained step by step in Algorithm 4. Figure 9 shows the proposed watermarking embedding scheme.

Input: Cover Image , Watermark Image , scaling factor
Output: Watermarked Hologram Image
(1)Start
(2)B = Generating the Selected Blocks Matrix (C)
(3)[ ve ] = R_Level_DWT(B)
(4)SVD is applied to the and and are obtained.
(5)SVD is applied to the and and are obtained.
(6)
(7)
(8)
(9)  = Generating the Watermarked Image
(10)return .
(11)End.
4.4.2. Watermarking Extraction Algorithm

In this algorithm, Watermarked hologram Image and the CBRNG used in the watermarking embedding algorithm are taken as inputs. As the output, the extracted watermark is obtained. As in the watermarking embedding algorithm, the watermarked selected block is obtained from the image using the same CBRNG.

Then, R-level DWT is applied to the matrix and is obtained. SVD is applied to the and and matrices are obtained. Then, the singular values of the watermark are extracted using the obtained during watermarking embedding process with

Using the and , and , the extracted watermark is obtained by equation (10). The watermarking extraction process is explained step by step in Algorithm 5. Figure 10 shows the proposed watermarking extraction scheme.

Input: Watermarked Cover Image
Output: Extracted watermark
(1)Start
(2) = Generating the Selected Blocks Matrix
(3) = R_Level_DWT
(5)SVD is applied to the and ve are obtained.
(6)
(7)
(8)return .
(9)End.

5. Experimental Results and Safety Analysis

In this section, performance tests were conducted to analyze the invisibility and the robustness of the proposed technique in this study. The human blood and cancer cell line images shown in Figure 11 are used as the cover image. The textual data in Figure 12(a) for blood images and Figure 12(b) for cancer images were used as watermarks. The QR codes as the visual representation of the texts given in Figures 12(a) and 12(b) are shown in Figure 13, respectively. All of the experiments were carried out on a Workstation with an Intel dual-core 2.7 GHz CPU with 32 GB of RAM, using the MATLAB R2018b version.

The proposed model’s time complexity is relatively low, considering that the watermark size is much smaller than the cover image size. The size of the watermark image is . Here the condition and is satisfied. Accordingly, the time complexity of the proposed method is . Here, a and b values are smaller than the dimensions of the cover image ( and ). The and values are very small relative to the dimensions of the cover image ( and ). Therefore, the time complexity of the proposed algorithm is not dependent on the size of the cover image.

The chaos-based random numbers were used to cope with the false positive problem encountered in the SVD technique used in the study. Tests were carried out to see if the proposed model was resistant to false positive problems. Table 3 provides the images and robustness results of the extracted watermark in cases where the chaotic keys are entered correctly or incorrectly. The results were obtained using the blood cell cover image and a 256 × 256 watermark. It is understood from the table that the watermark was not extracted correctly in all rows except the first row, where the correct keys were entered. Accordingly, it is impossible to extract the watermark for someone who does not know the keys of the random number generator and the chaos function used in the proposed model.

In order to obtain the best performance in the watermarking algorithm, the optimal scaling factor must be found. Normalized correlation (NC) is used for watermark robustness for performance analysis. In contrast, peak signal-to-noise ratio (PSNR) and structural similarity index measure (SSIM) metrics measure watermark imperceptibility. The calculation of the NC is shown in the following equation.

Equations for calculating MSR, PSNR, and SSIM metrics are

The and in the equations are the mean of and , respectively. and are the variances of and . and are two variables used to balance the partition with a weak denominator. Finally, is the covariance of and .

For the robustness and invisibility analysis of the watermark, three forms of watermarks (64 × 64, 128 × 128, and 256 × 256) were used. The best scaling factors for all three forms and each cover image were determined by considering the changes in NC, PSNR, and SSIM metrics. For the robustness analysis, various attacks were applied to the watermarked image, and the watermark’s invisibility was examined. In addition, robustness analyses were performed on the watermark extracted from the watermarked image. The applied attacks are basically noise (Gaussian, salt and peppers, and speckle noises), filter (median, Gaussian low-pass, and average), compression (JPEG with quality factor (QF) 50 and JPEG2000 with compression ratio (CR) 12), rescaling (0.25, 4), histogram equalization (HE), sharpening (threshold = 0.8), and motion blur (with Theta = 4, Len = 7) attacks.

It is necessary to analyze the durability of watermark and the cover image’s imperceptibility to determine the optimum scaling factor. For this, both NC values, as well as PSNR and SSIM metrics, were examined. Accordingly, cases where all three metrics are good can be selected as the scaling factor. In order to determine the optimum scaling factor, NC change under various attacks is shown in Figure 14 for blood and cancer cell line images, respectively. PSNR and SSIM results are also shown in Figures 15 and 16, respectively. When the changes are examined, the NC value increases as the alpha increases, while the PSNR and SSIM results decrease. In cases where noisy attacks such as Gaussian noise, speckle noise, salt and pepper noise, compression, and sharpening attacks are applied, the results give good results even at smaller alpha values. For example, relevant results were obtained when these attacks were applied even when α = 0.01.

Another issue to be measured in watermarking studies is invisibility. The fact that people cannot notice the watermarked information is essential for the security of the data. In this case, it is aimed that the watermarked image obtained after watermarking does not look much different from the original. For this reason, invisibility measurement is essential in order not to understand the watermark in the watermarked image. Figures 17 and 18 show the invisibility and robustness results obtained for exemplary blood and cancer cell line images, respectively. The watermark texts were transformed into QR codes in 256 × 256, 128 × 128, and 64 × 64 sizes. Here, the performance results after these three different watermarking are listed.

When Figures 17 and18 are examined, 100% successful access to the texts is achieved from the QR codes obtained. The literature states that acceptable invisibility is when the measured values for invisibility are PSNR>0.37 dB and SSIM>0.93. When all the images here are examined, it is observed that a value far above these limits is obtained. In addition, if the QR code images are taken into account, it has been observed that the NC results of the recalled watermarks are very close to 1.

Tables 4 and 5 provide the normalized correlation (robustness) of images against various attacks. Here, 256 × 256, 128 × 128, and 64 × 64 sized QR codes were watermarked separately, and the results were listed after these three different watermarks.

When Tables 4 and 5 are examined, it is seen that a robust watermarking process is performed for the sample blood and the sample cancer cells in the no attack condition. As the watermark size decreased, the performance decreased slightly, but outstanding results were still obtained.

There is almost no loss in the watermark after the applied noise (Gaussian, salt and peppers, and speckle noises) attacks. Similarly, outstanding performances were obtained in each Gaussian low-pass filter, rescaling (4, 0.25), JPEG compression, JPEG2000 compression, and sharpening attacks. It has been observed that the median and average filter attacks, rescaling (0.25.4), histogram equalization, and motion blur attacks are good enough but not as good as the above attacks. Outstanding results were obtained in all attacks, mainly when a 256 × 256 watermark was applied. Although the results obtained for Histogram equalization and Rescaling (0.25.4) attacks were sufficient when 128 × 128 and 64 × 64 size watermarks were applied, the robustness decreased more than the others. Lossless results were obtained in almost all of the proposed watermark methods against all attacks except these attacks. After the QR code of all watermarks is converted back to the text, completely lossless watermark texts are obtained.

6. Conclusion

Watermarking has excellent potential to provide valuable solutions for medical applications such as identity theft, data security, health data management, and storage. This study developed a new method using chaos-based discrete wavelet transform (DWT) and singular value decomposition (SVD) for watermarking with high imperceptibility and robustness. In order to obtain a high-resolution biomedical image, a low-cost, large field of view and easy-to-integrate LED-based DIHM setup was designed. The resolution capability of the imaging system is demonstrated with the standard USAF 1951 resolution target. The captured diffraction patterns of medical samples were reconstructed using the angular spectrum method. Images of human blood and cancer cell lines, which are widely used in the laboratory environment, were obtained. For the security feature of the proposed watermarking technique, chaos-based random number generators are used. Specifically, chaos-based random number generators were used to eliminate the false positive problem, which is the disadvantage of the SVD method. The chaotic system without equilibrium points is preferred for the chaos-based random number generator. The suitability of the selected chaotic system for use in studies such as encryption, data hiding, and watermarking has been proven by dynamic analysis. Random numbers are generated with CBRNG as the same random numbers are needed when the system is rerun for the watermarking application. NIST-800-22 and ENT statistical tests with the highest standards at the international level were used to measure the randomness performance of the numbers produced. For the watermarking process, a new method using chaos-based discrete wavelet transform (DWT) and singular value decomposition (SVD) has been developed and applied to high-resolution data in order to eliminate the problem of encrypted data being directly targeted by third-party attacks. The performance of the proposed new watermarking method has been demonstrated by various robustness and invisibility tests. Robustness and invisibility results show the watermarked host images have good visual quality, PSNRs, and SSIMs. Experimental results showed that the proposed scheme reached an average PSNR value of 564588 dB and an SSIM value of 0.9972 against several geometric and destructive attacks. Furthermore, the watermarks can be clearly extracted from the watermarked host image, and even for the watermarks with different sizes, the proposed image watermarking method achieved good invisibility and robustness. To the best of our knowledge, the proposed method has been applied for the first time in DIHM systems, along with producing solutions to the problems in the watermarking process. The proposed method can be applied to medical images obtained in both clinical and laboratory conditions and has the potential to be applied to many different high-resolution data. We can apply our proposed method to color images and many other areas in our future work. It is also possible to construct a blind and more secure watermarking system using some cutting-edge techniques like blockchain, deep learning, or machine learning, and better error-correcting code.

Data Availability

The datasets generated during and/or analyzed during the current study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by the Sakarya University of Applied Science Scientific Research Projects Coordination Unit (SUBU BAPK, Project Number: 2020-01-01-011). The author, Muhammed Ali PALA, is grateful to The Scientific and Technological Research Council of Turkey for granting a scholarship (TUBITAK, 2211-C) for his Ph.D. studies.