Next Article in Journal
Influence of Mo on the Microstructure and Corrosion Behavior of Laser Cladding FeCoCrNi High-Entropy Alloy Coatings
Previous Article in Journal
The Optimal Power Allocation for Sum Rate and Energy Efficiency of Full-Duplex Two-Way Communication Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Signing and Verifying Encrypted Medical Images Using Double Random Phase Encryption

by
Hanaa A. Abdallah
and
Dalia H. ElKamchouchi
*
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(4), 538; https://doi.org/10.3390/e24040538
Submission received: 21 March 2022 / Revised: 6 April 2022 / Accepted: 10 April 2022 / Published: 12 April 2022

Abstract

:
Digital Signature using Self-Image signing is introduced in this paper. This technique is used to verify the integrity and originality of images transmitted over insecure channels. In order to protect the user’s medical images from changing or modifying, the images must be signed. The proposed approach uses the Discrete Wavelet Transform to subdivide a picture into four bands and the Discrete Cosine Transform DCT is used to embed a mark from each sub-band to another sub-band of DWT according to a determined algorithm. To increase the security, the marked image is then encrypted using Double Random Phase Encryption before transmission over the communication channel. By verifying the presence of the mark, the authority of the sender is verified at the receiver. Authorized users’ scores should, in theory, always be higher than illegal users’ scores. If this is the case, a single threshold might be used to distinguish between authorized and unauthorized users by separating the two sets of scores. The results are compared to those obtained using an approach that does not employ DWT.

1. Introduction

Information security is to protect the integrity, confidentiality, and availability of data. Confidentiality is the process used to protect data from intruders who are not authorized to access the data. Authentication is the guarantee that both entities included in the communication can claim each other. Integrity assures that data are not modified or deleted by any unauthorized users and received data are exactly the same [1].
Electronic signatures obtained from content data are used to validate the identity of the signer of a document, similar to digital signatures. When a digital signature’s authentication mark is intentionally changed, the decoding of that signature yields content data that are completely different from the original data. Unlike digital signatures, however, digital watermark signatures have localization qualities that allow the precise location of probable content data changes to be determined. Furthermore, the goal of digital watermarks is to permanently and irreversibly label the image such that the attribution or assignment is unquestionable.
Digital watermarking inserts or hides information providing copyright protection intended for digital media. It has two major procedures, embedding and extraction. The procedures can be performed by means of hiding or visible methods. In order to protect possession and copyright, commonly digital watermarking has been applied in numerous purposes, for instance, content identification, authorization, and fingerprinting [2,3].
The following is the paper’s structure. Section 2 introduces a background of the Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and the Double Random Phase Encryption, which is used in encryption. Section 3 produces the background review and related work. The proposed scheme is presented in Section 4. The experimental results are introduced in Section 5. Finally, Section 6 introduces the conclusion.

2. Background Review

2.1. Discrete Transforms

2.1.1. Discrete Wavelet Transform (DWT)

In [4], DWT is a mathematical tool which applies to decompose the images or frames into sub-bands. DWT is used in image watermarking, image compression, and removal of noise in audio and image [5]. DWT uses filters to split the signal into high- and low- frequency components. The edges are represented by high-frequency coefficients, which convey information about them, while the low-frequency coefficients are decomposed again into high- and low-frequency components. The wavelet transform is shown in Figure 1.
Where g (n) is the low pass filter, h (n) is the high pass filter, and down arrow (↓) is the down sampling of the output coefficients by factor two.

2.1.2. Discrete Cosine Transform (DCT)

Discrete Cosine Transform is obtained from the real part of the Discrete Fourier Transform. It just carries the cosine term. The Discrete Cosine Transform (DCT) is transforming a signal from spatial domain to frequency domain. It is the result of combining cosine functions [6]. It divides an image into different frequency bands, to make embedding a watermark much easier. The middle frequencies are chosen to embed data they have minimized, which avoid the image’s most visually vital regions (low frequencies) without being overexposed to noise and compression attack (high frequencies) [7,8]. DCT domain watermarking can survive against the attacks, such as compression, sharpening, filtering, and noising.
The formal equations of DCT and IDCT as follows:
DCT equation:
F ( u , v ) = α ( u ) α ( v ) x = 0 N 1 y = 0 N 1 f ( x , y ) cos ( 2 x + 1 ) u π 2 N cos ( 2 y + 1 ) v π 2 N
IDCT equation:
F ( x , y ) = x = 0 N 1 y = 0 N 1 α ( u ) α ( v ) f ( u , v ) cos ( 2 x + 1 ) u π 2 N cos ( 2 y + 1 ) v π 2 N
where u , v , x , y = 0 ,   1 ,   2 ,   , N 1 , f (u, v) is the element of the transformed matrix, f (x, y) is the original matrix, and α ( u ) is defined as:
α ( u ) = { 1 N                                                                       for   u = 0 2 N                                                                   for   u 0

2.2. The Double Random Phase Encryption (DRPE)

Encryption is the technique of transforming a message in a way that only authorized users can access it. DRPE was proposed by Refregier and Javidi, it is based on the modification of the spectral distribution of the image [9]. At the receiver, the user must know prior information about the modification or the target image in order to decode the image. The principle of DRPE is to encode an image to stationary white noise by using two independent random phase masks, and Fourier transforms in a coherent 4-f optical system. One key is inserted into the input plane (RPM1) to be encrypted, and the second key is inserted into the Fourier plane (RPM2).
Let f (x, y) be an input image where the positive x and y values denote the spatial domain coordinates. f (x, y) is modulated by a random phase   θ ( x , y ) given by
θ ( x , y ) = e i 2 π θ 0 ( x , y )
where θ 0 ( x , y ) is a phase-function inserted into RPM1 and its value is randomly distributed over [0, 1].
We can obtain the Fourier transform of the modulated image after passing L1, the first lens. The second phase mask modulates the resulting image by the following equation:
( x , y ) = e i 2 π 0 ( u , v )
where 0 ( u , v ) is a phase-function inserted into RPM2and its value is randomly distributed over [0, 1].
The encoded image g ( x , y ) is resulting from the second lens L2, which performs the inverse Fourier transform by
g ( x , y ) = F T 1   { F T { f ( x , y ) · θ ( x , y ) } · φ ( u , v ) }
We can make the decryption procedure similar to the encryption procedure but in reverse order, using the equation
f ( x , y ) = F T 1   { F T { g ( x , y ) e i 2 π 0 ( u , v ) e i 2 π θ 0 ( x , y ) } }

3. Related Work

In [10], Junling Zhang et al. introduced a new scheme where a signer creates a digital signature by applying a hash function on the message to create a mathematical message digest. The receiver can verify the sent message by applying the same hash function followed by the sender’s public key. Digital signatures can be verified by a trusted certification authority. In this study, an overview of digital signature and its potential applications in the Kingdom of Saudi Arabia were highlighted. It also provides a brief description about the establishment of a national certification authority to issue digital certificates, identifying the potential applications. To protect data privacy, Dang Hai et al. [11] proposed a message authentication code. The suggested mechanism allows for data integrity verification using only a portion of the original data. It was also shown to be secure against chosen-message-attacks and privacy-preserving. They also ran a test to see how much it cost to compute compared to a hash message authentication code. Sheryl et al. [12] developed a security system using hybrid of digital signature and DNA cryptography. The digital signature is applied using multi-feature biometric traits that include fingerprints and iris image. Then, they increased the security by embedding DNA cryptography on a smart card, and to prevent unauthorized access manually or digitally, they used geo-detection which compares the unregistered device’s location with the user’s location using any of their personal devices such as smart phone or table. In 2018 [13], Dubrova et al. presented a message authentication using secure cyclic redundancy check (CRC). It detects both random and malicious faults without raising bandwidth, according to the researchers, and the distinction from prior systems is that it uses random generator polynomials rather than irreducible generator polynomials. They offered a quantitative study of the attained security as a function of message and CRC sizes, demonstrating that the technique was appropriate for short messages. In 2018, Mohamed et al. [14] presented a hybrid security technique to secure the diagnostic text data in medical images. The model used either 2-D discrete wavelet transform 1 level (2D-DWT-1L) or 2-D discrete wavelet transform 2 level (2D-DWT-2L) steganography in addition to the encryption scheme. They proposed a hybrid encryption schema using a combination of Advanced Encryption Standard, Rivest, Shamir, and Adleman algorithms. This model begins by encrypting the secret data, then hiding the result in a cover image using 2D-DWT-1L or 2D-DWT-2L. In [15], Cui et al. introduced a secure energy-saving data aggregation scheme designed for large-scale WSNs. They applied a homomorphic encryption algorithm to protect end-to-end data confidentiality and used MAC to achieve in-network false data filtering and utilized the homomorphic MAC algorithm to achieve end-to-end data integrity. In 2020 [16], Abeer et al. proposed a novel cryptosystem that consists of three stages, namely, fusion, substitution, and chaotic permutation, to apply confidentiality and secrecy. The first stage is the DWT fusion with the averaging fusion rule. The second stage supports the substitution through either DCT or DST. Finally, the third stage utilizes chaotic encryption to apply confusion to the signal. In the same year, for the protection of medical data, Anand et al. [17] introduced an upgraded DWT–SVD domain watermarking. To reduce the noise distortion of the text watermark, hamming coding is used. They examined two different encryption algorithms and three different compression schemes and found Chaotic-LZW (Lempel–Ziv–Welch) to be the most efficient. In [18], Nadir et al. presented an innovative procedure designed for embedding a ciphered electronic record for a patient by means of the Discrete Cosine Transform (DCT), where the medical image resultant is decomposed by means of the Discrete Wavelet Transform (DWT), then, the electronic record of the patient will be ciphered by means of the Elgamal cryptosystem, subsequently applying the Arnold map in order to increase the levels of unpredictability and randomness, which increase the system complexity. Recently, in 2022, ref. [19] S. Prasanth Vaidya presented a novel adaptive watermarking system utilizing a hybrid transform and patient fingerprint as a watermark intended for electronic health care techniques. The proposed algorithm shows its robustness and authentication with numerous medical image assaults. Additionally, in [20], a watermarking approach for patient identification and watermark integrity verification was presented, where a discrete wavelet transform is employed to divide the medical image into four sub-bands used for the integration procedure. Most recently [21], in 2022, Mohammad et al. introduced a BioHashing and watermarking method for ensuring the integrity, validity, and secrecy of various medical photographs. The BioHashing approach is utilized to generate the watermark on the sender side, all the conditions for the robustness and imperceptibility are met by the suggested technique.

4. Discussion

4.1. Signing Process

The signing process introduces the stages of signing and encrypting the data as shown in Figure 2. The medical image is applied as a plain image, and the cipher image will be a signed image by using the block content-based technique. The marked image is then encrypted to increase the level of security. The proposed technique is applied on the DWT sub-bands of the image. The signing process is described below:
Stage 1: Compute the 2D-DWT of the original medical image A. This operation generates four quarters LL, HL, LH, and HH. Each sub-band is a matrix of DWT coefficients at a specific resolution. Then, the four sub-bands are divided into (8 × 8) blocks.
Stage 2: For each sub-band, permutation is done by replacing coefficients from right to left, bottom to top through DCT coefficients of (LL, HL, LH, and HH) sub-bands.
Stage 3: For the first row and first column of each DCT, the coefficients for each block in the first sub-band (LL) are substituted by the last row and last column, respectively, of a corresponding block in the second sub-band (HL). For first row and column of each DCT, coefficients of each block in the third sub-band (LH) are substituted by the last row and column of a corresponding block in the fourth sub-band (HH). Then, IDCT and 2D-IDWT are applied.
Stage 4: The signed image is encrypted using DRPE encryption technique.

4.2. Verification Process

The encrypted marked image is decrypted to reconstruct the marked image as shown in Figure 3. Then, the marked one is verified. This is shown in the following stages:
Stage 1: The encrypted marked image is decrypted using DRPE to obtain a marked image.
Stage 2: 2D-DWT is applied to the marked image to generate four sub-bands LL, HL, LH, and HH. Four sub-bands are divided into (8 × 8) blocks; then, DCT is applied to each block.
Stage 3: Working from right to left, bottom to top, embedded rows and columns are extracted and compared to their corresponding cones through a correlation analysis.
Stage 4: Embedded rows and columns are extracted and compared to their corresponding cones through a correlation analysis.

5. Simulation Results and Discussions

For performance evaluation of the proposed frameworks, simulation tests are introduced to assess the efficiency of the proposed approaches. All proposed encryption approaches are implemented with MATLAB (R2017a). Different metrics and perspectives have been considered in the performance evaluation process. The proposed technique has been applied to a medical image and the results are shown in Table 1. The correlation coefficient between extracted rows or columns and the original ones is used to measure the signature’s resilience, while the peak signal-to-noise ratio (PSNR) is used to determine the image quality after marking or embedding, as well as encryption and decryption. The higher the PSNR, the better the signing and encryption algorithm. Higher PSNR means a higher imperceptibility [22]. This measure is given mathematically by the following equation:
P S N R   ( d B ) = 10 log 10 ( 255 2 1 N 2 x , y ( A w ( x , y ) A ( x , y ) ) 2 )
where A (x, y) is the original image and Aw (x, y) is the signed image.
The Correlation Coefficient measure is used between the extracted coefficients and the original coefficients [23], this measure is given mathematically by
c r ( W , W ^ ) = y W ( y ) W ^ ( y ) y W 2 ( y ) y W ^ 2 ( y )
where W and W ^ are the original and extracted marks, correspondingly.

5.1. Structural Similarity Index (SSIM)

The structural similarity index is a measure of how similar two structures are (SSIM). The SSIM is used to determine whether the plain signal and the encrypted or marked signal are similar. It provides a more accurate assessment than the Mean Square Error (MSE). Equation (10) [22] is used to compute it.
SSIM ( x , y ) = ( 2 μ x μ y + C 1 ) ( 2 σ x y + C 2 ) ( μ x 2 + μ y 2 + C 1 ) ( σ x 2 + σ y 2 + C 2 )
where μx and μy represent the mean values for signals x and y, correspondingly, σx, and σy are the variances of the signals x and y, respectively, σxy is the cross-covariance between two signals x and y. C1 and C2 have small values, the SSIM value is less than one. The correlation coefficient between extracted rows or columns and the original ones is used to assess the mark or signature’s robustness, while the mean square error (MSE) and peak signal-to-noise ratio (PSNR) are used to assess the image quality after marking or embedding.
Table 1 shows the original image, marked image, encrypted image, the decrypted image, and the correlation between extracted blocks and original blocks after decryption using the Double Random Phase Encryption. It is clear that the encryption increases the security, and the mean correlation between the recovered mark and the original mark is measured to be 0.9 in both cases.
The PSNR and SSIM between the original image and marked image are 35.99 db and 0.97, respectively, which means that the marking does not affect the quality of the original image and keeps the invisibility of mark in the image. After encrypting the marked image using the DPRE algorithm, the results show that PSNR and SSIM between the encrypted and marked image are 12 db and 0.1, which verifies the strength of the suggested cryptosystem, as there is no similarity between them. Moreover, the results show that the correlation between the embedded rows and columns with the original is near to 1, verifying the robustness of the mark or signature.
The study of the effect of noise on the encrypted and marked image in addition to the effect of noise on the recovered mark is shown in Table 2. It is clear that by increasing the additive white Gaussian noise (AWGN), the SNR between the noisy image and original image takes values from 5 dB to 50 dB, the correlation between the original and recovered rows and column with original, i.e., the correlation between extracted blocks and original blocks increased from 0.1 to 0.75, which verifies that the recovered mark does not match the original mark. The correlation values which are used to express the similarity between blocks in a marked image and blocks in a non-marked image are calculated in Table 3. A higher correlation means that the image is marked, this is explained as the blocks which have a mark within row or columns get a high value of correlation, which is near 1, but the others with no mark get low values of correlation. Correlation values in Figure 4 ensure the possibility of mark verification, which means that we can verify the presence of a mark when the correlation between the recovered rows and columns and the original is equal to 1, as it illustrates the correlation between blocks of a marked image which equals to 1. As a result, this confirms that the image is marked. In Table 3, we did not apply marking to the image, and we divided the image by the same technique and compared the blocks with each other. We find that the correlation is close to zero and this means that the image is not marked by this method. As a result, we verify the originality of the image which contains the mark.
From Table 4, it has been noticed that the correlation of the original image is high (CF = 0.9143) and close to one. In contrast, the correlation of the encrypted image is minimal (CF = 0.0071) and close to zero, which demonstrates that encryption using the DRPE algorithm can break the relativity efficiently, possesses a robust capability to withstand a statistical attack, and does not alter the quality of the output decrypted image after inserting the mark, i.e., the decrypted image is the same as the original.

5.2. Comparative Analysis

The proposed scheme is compared with other existing schemes using DWT and DCT transformations in their designs in order to make a generic comparison based on a set of generic performance indicators. Table 5. shows that by applying Gaussian noise to the correlation of the mark with the original mark, the proposed technique offers a better value, indicating the robustness of the proposed technique. Table 6. further compares our proposed scheme with other schemes, which proves that our suggested scheme is able to avoid an AWGN attack and achieve a favorable trade-off between resistance and imperceptibility due to its embedding method and additive Gaussian noise attack.
Table 6 shows the comparative study with the techniques which use watermark as a mark. We found that our technique, which is different in methodology with these techniques, presents a high correlation when comparing to the techniques in [26]. It is shown that when we apply (AWGN) noise to a marked image and we get the correlation between the recovered mark and original, we find that the correlation is higher than that of the techniques using DWT, SVD, DWT-based SVD and DT-CWT-based SVD, as our technique gives a correlation between 0.1 to 0.75 and these techniques give a correlation in the range from 0.05 to 0.3 which means that our technique is more robust. Figure 4 shows that the correlation between the intended rows and columns are close to 1, which means the image is marked.
The test data for picture authentication systems include both marked and unmarked images. The Probability of True Distribution (PTD) and Probability of False Distribution (PFD) are used to assess the correlation scores obtained during the authentication stage. As illustrated in Figure 5a, the Probability of True Distribution (PTD) is the probability distribution of the correlation between the designated image blocks, the marked blocks. The Probability of False Distribution (PFD) is the probability distribution of the correlation between the blocks of the unmarked image as shown in Figure 5b.

6. Conclusions

This paper investigates image integrity and privacy by using a digital signature and an encryption algorithm. The results showed that the proposed scheme has the ability to verify the presence of the mark as the embedded rows and columns are extracted and compared to the original cones through the correlation analysis. Moreover, after the addition of the AWGN noise to the marked image, the result showed that we still can verify the presence of the mark; therefore, it can resist different attacks. The proposed technique can be used to ensure the originality of data transmitted via channels and detect any odd modifications to the designated image. The upcoming exploration focus is primarily to utilize machine learning as well as pattern recognition system intended for better performance optimization and using new frequency domain transforms and singular value decomposition to resist various attacks.

Author Contributions

Conceptualization, H.A.A. and D.H.E.; Data curation, H.A.A. and D.H.E.; Formal analysis, H.A.A. and D.H.E.; Funding acquisition, H.A.A. and D.H.E.; Investigation, H.A.A. and D.H.E.; Methodology, H.A.A. and D.H.E.; Project administration, H.A.A. and D.H.E.; Resources, H.A.A. and D.H.E.; Software, H.A.A. and D.H.E.; Supervision, H.A.A. and D.H.E.; Validation, H.A.A. and D.H.E.; Visualization, H.A.A. and D.H.E.; Writing—original draft, H.A.A. and D.H.E.; Writing—review & editing, H.A.A. and D.H.E. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Princess Nourah Bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R238), Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

Princess Nourah Bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R238), Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Parah, S.A.; Sheikh, J.A.; Ahad, F.; Loan, N.A.; Bhat, G.M. Information hiding in medical images: A robust medical image watermarking system for E-healthcare. Multimed. Tools Appl. 2017, 76, 10599–10633. [Google Scholar] [CrossRef]
  2. Kumar, C.; Singh, A.K.; Kumar, P. A recent survey on image watermarking techniques and its application in e-governance. Multimed. Tools Appl. 2018, 77, 3597–3622. [Google Scholar] [CrossRef]
  3. Pan, J.-S.; Huang, H.-C.; Jain, L.C. (Eds.) Intelligent Watermarking Techniques; World Scientific: Singapore, 2004. [Google Scholar]
  4. Ghazy, R.A.; Amoon, M.; Abdallah, H.A.; El-Fishawy, N.A.; Hadhoud, M.M.; Dessouky, M.I.; Alshebeili, S.A.; El-Samie, F.E.A. Block based embedding of encrypted watermarks using singular value decomposition. Optik 2014, 125, 6299–6304. [Google Scholar] [CrossRef]
  5. Gunjal, B.L.; Manthalkar, R.R. An Overview of Transform Domain Robust Digital Image Watermarking Algorithms. J. Emerg. Trends Comput. Inf. Sci. 2010, 2, 37–42. [Google Scholar]
  6. Begum, M.; Uddin, M.S. Digital Image Watermarking Techniques: A Review. Information 2020, 11, 110. [Google Scholar] [CrossRef] [Green Version]
  7. Abdallaha, H.A.; Faragallahb, O.S.; Elsayed, H.S.; Hadhoudd, M.M.; Shaalan, A.A.; Abd El-samie, F.E. Robust Image watermarking Method Using Homomorphic Block-Based KLT. Optik 2016, 127, 2374–2381. [Google Scholar] [CrossRef]
  8. Abdallah, H.A.; Ghazy, R.A.; Kasban, H.; Faragallah, O.S.; Shaalan, A.A.; Hadhoud, M.M.; Dessouky, M.I.; El-Fishawy, N.A.; Alshebeili, S.A.; Abd El-samie, F.E. Homomorphic image watermarking with a singular value decomposition algorithm. Inf. Process. Manag. 2014, 50, 909–923. [Google Scholar] [CrossRef]
  9. Refregier, P.; Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 1995, 20, 767–769. [Google Scholar] [CrossRef] [PubMed]
  10. Zhang, J. A study on application of digital signature technology. In Proceedings of the 2010 International Conference on Networking and Digital Society, Wenzhou, China, 30–31 May 2010; pp. 498–501. [Google Scholar] [CrossRef]
  11. Van, D.H.; Thuc, N.D. A Privacy Preserving Message Authentication Code. In Proceedings of the 2015 5th International Conference on IT Convergence and Security (ICITCS), Kuala Lumpur, Malaysia, 24–27 August 2015. [Google Scholar]
  12. Mathew, S.; Saranya, G. Advanced Biometric Home Security System using Digital Signature and DNA Cryptography. In Proceedings of the 2017 International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT), Coimbatore, India, 16–18 March 2017. [Google Scholar]
  13. Dubrova, E.; Näslund, M.; Selander, G.; Lindqvist, F. Message Authentication Based on Cryptographically Secure CRC without Polynomial Irreducibility Test. Cryptogr. Commun. 2018, 10, 383–399. [Google Scholar] [CrossRef] [Green Version]
  14. Elhoseny, M.; Ramirez-Gonzalez, G.; Abu-Elnasr, O.M.; Shawkat, S.; Arunkumar, N.; Farouk, A. Secure Medical Data Transmission Model for IoT-Based Healthcare Systems. IEEE Access 2018, 6, 20596–20608. [Google Scholar] [CrossRef]
  15. Cui, J.; Shao, L.; Zhong, H.; Xu, Y.; Liu, L. Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Netw. Appl. 2017, 11, 1022–1037. [Google Scholar] [CrossRef] [Green Version]
  16. Algarni, A.D.; Soliman, N.F.; Abdallah, H.A.; El-Samie, F.E.A. Encryption of ECG signals for telemedicine applications. Multimedia Tools Appl. 2021, 80, 10679–10703. [Google Scholar] [CrossRef]
  17. Anand, A.; Singh, A.K. An improved DWT-SVD domain watermarking for medical information security. Comput. Commun. 2020, 152, 72–80. [Google Scholar] [CrossRef]
  18. Nadhir, N.; Ali, S.; Abdelkrim, G. Medical Image Watermarking Scheme in Transform Domain based on Asymmetric crypto-system and Arnold Chaotic Map. In Proceedings of the 2021 44th International Conference on Telecommunications and Signal Processing (TSP), Brno, Czech Republic, 26–28 July 2021. [Google Scholar]
  19. Vaidya, S.P. Fingerprint-based robust medical image watermarking in hybrid transform. Vis. Comput. 2022, 1–16. [Google Scholar] [CrossRef] [PubMed]
  20. Moad, M.S.; Kafi, M.R.; Khaldi, A. A wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Microprocess. Microsyst. 2022, 90, 104490. [Google Scholar] [CrossRef]
  21. Ramzan, M.; Habib, M.; Khan, S.A. Secure and efficient privacy protection system for medical records. Sustain. Comput. Inform. Syst. 2022, 35, 100717. [Google Scholar] [CrossRef]
  22. Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image. Process 2004, 13, 600–612. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  23. Ding, H.; Xie, C.; Zeng, L.; Xu, Y.; Dan, G. The correlation between signal distance and consonant pronunciation in Mandarin words. In Proceedings of the 2016 10th International Symposium on Chinese Spoken Language Processing (ISCSLP), Tianjin, China, 17–20 October 2016. [Google Scholar]
  24. Makbol, N.M.; Khoo, B.E. Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int. J. Electron. Commun. 2013, 67, 102–112. [Google Scholar] [CrossRef]
  25. Makbol, N.M.; Khoo, B.E. A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Digit. Signal Process. 2014, 33, 134–147. [Google Scholar] [CrossRef]
  26. Abdallah, H.A.; Alsodairi, S. A Novel Watermarking Technique Based on Hybrid Transforms. Int. J. Commun. Netw. Inf. Secur. 2020, 12, 316–325. [Google Scholar]
Figure 1. First-level discrete wavelet decomposition using filtering approach.
Figure 1. First-level discrete wavelet decomposition using filtering approach.
Entropy 24 00538 g001
Figure 2. Signing process.
Figure 2. Signing process.
Entropy 24 00538 g002
Figure 3. Verification process.
Figure 3. Verification process.
Entropy 24 00538 g003
Figure 4. Block-based correlation.
Figure 4. Block-based correlation.
Entropy 24 00538 g004
Figure 5. PTD and PFD using digital signature (a) PTD and (b) PFD.
Figure 5. PTD and PFD using digital signature (a) PTD and (b) PFD.
Entropy 24 00538 g005
Table 1. Results of marking and encrypting a medical image.
Table 1. Results of marking and encrypting a medical image.
Original ImageMarked ImageEncrypted Image (Chaotic)Decrypted ImageCorrelation between Extracted Blocks and Original Blocks
Entropy 24 00538 i001 Entropy 24 00538 i002
PSNR = 35.99 dB
SSIM = 0.97
Entropy 24 00538 i003
PSNR = 12.17 dB
SSIM = 0.1035
Entropy 24 00538 i004
PSNR = 35.99 dB
SSIM = 0.97
Entropy 24 00538 i005
Original ImageMarked ImageEncrypted Image (DRPE)Decrypted ImageCorrelation between Extracted Blocks and Original Blocks
Entropy 24 00538 i006 Entropy 24 00538 i007
PSNR = 34.26 dB
SSIM = 0.96
Entropy 24 00538 i008
PSNR = 12.84 dB
SSIM = 0.0349
Entropy 24 00538 i009
PSNR = 34.37 dB
SSIM = 0.96
Entropy 24 00538 i010
Table 2. The effect of AWGN noise on DRPE-encrypted images.
Table 2. The effect of AWGN noise on DRPE-encrypted images.
AWGN (SNR)Correlation between Extracted blocks and Original Blocks
5 dB Entropy 24 00538 i011
Mean correlation = 0.1192
Entropy 24 00538 i012
Mean correlation = 0.0374
10 dB Entropy 24 00538 i013
Mean Correlation = 0.4416
Entropy 24 00538 i014
Mean Correlation = 0.0737
20 dB Entropy 24 00538 i015
Mean Correlation = 0.3597
Entropy 24 00538 i016
Mean Correlation = 0.1600
30 db Entropy 24 00538 i017
Mean correlation = 0.5407
Entropy 24 00538 i018
Mean correlation = 0.3117
50 dB Entropy 24 00538 i019
Mean correlation = 0.7592
Entropy 24 00538 i020
Mean correlation = 0.6159
Table 3. Correlation between the original image and the marked image.
Table 3. Correlation between the original image and the marked image.
Original ImageOriginal Image with No MarkCorrelation between Extracted Blocks and Original Blocks in Image with No Mark
Entropy 24 00538 i021 Entropy 24 00538 i022 Entropy 24 00538 i023
Table 4. Horizontal correlation between the original image and the encrypted image.
Table 4. Horizontal correlation between the original image and the encrypted image.
Original ImageOriginal Image with Mark
Entropy 24 00538 i024 Entropy 24 00538 i025
Entropy 24 00538 i026 Entropy 24 00538 i027
Encrypted ImageDecrypted Image
Entropy 24 00538 i028 Entropy 24 00538 i029
Entropy 24 00538 i030 Entropy 24 00538 i031
Table 5. Comparative study with other techniques.
Table 5. Comparative study with other techniques.
Gaussian NoiseCR (Correlation)
Proposed Scheme[24][25][26]
Gaussian noise 0.50.750.630.580.28
Table 6. Comparative study with other techniques of marking [26].
Table 6. Comparative study with other techniques of marking [26].
Correlation (cr)
DWTSVDDWT Based SVDDT-CWT Based SVD
cr1cr2cr1cr1cr2cr1cr2cr3cr4
No attack0.950.960.990.990.980.99960.99960.99960.9997
Rotation angel
−900.090.10.990.340.250.82530.95510.85270.9763
−10.120.10.440.650.710.96550.93400.98980.9655
Noise variance
0.10.050.060.040.130.180.31290.33530.36130.3926
0.50.030.040.0020.10.140.22420.23930.24860.2703
Resizing ratio
0.70.210.220.740.720.90.97660.97400.98660.9896
0.90.350.350.950.940.970.98730.99560.99600.9973
Compression quality
10%0.30.260.810.970.970.98750.99060.99310.9937
30%0.550.480.930.970.980.99920.99780.99910.9985
Cropping ratio
512–3000.230.16−0.730.380.220.76000.65670.870.7719
512–1000.190.13−0.870.210.090.63170.58820.69700.7139
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Abdallah, H.A.; ElKamchouchi, D.H. Signing and Verifying Encrypted Medical Images Using Double Random Phase Encryption. Entropy 2022, 24, 538. https://doi.org/10.3390/e24040538

AMA Style

Abdallah HA, ElKamchouchi DH. Signing and Verifying Encrypted Medical Images Using Double Random Phase Encryption. Entropy. 2022; 24(4):538. https://doi.org/10.3390/e24040538

Chicago/Turabian Style

Abdallah, Hanaa A., and Dalia H. ElKamchouchi. 2022. "Signing and Verifying Encrypted Medical Images Using Double Random Phase Encryption" Entropy 24, no. 4: 538. https://doi.org/10.3390/e24040538

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop