Next Article in Journal
Effect of Sterilization Methods on Collagen Hydrolysate Obtained from Tuna Tendon
Previous Article in Journal
Acceleration of Service Life Testing by Using Weibull Distribution on Fiber Optical Connectors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A DWT-Based Approach with Gradient Analysis for Robust and Blind Medical Image Watermarking

1
Department of Computer Science and Information Technologies, University of Kasdi Merbah, Ouargla 30000, Algeria
2
Laboratoire d’Intelligence Artificiel et des Technologies de l’Information (LINATI), Ouargla 30000, Algeria
3
Faculty of Sciences and Technology, University of Ziane Achour, Djelfa 17000, Algeria
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(14), 6199; https://doi.org/10.3390/app14146199
Submission received: 27 May 2024 / Revised: 13 July 2024 / Accepted: 14 July 2024 / Published: 17 July 2024
(This article belongs to the Section Computing and Artificial Intelligence)

Abstract

:

Featured Application

The future applications of the present study are to secure patient information and diagnostic details within medical images, ensuring data integrity and authenticity. The method enhances the security of medical records during storage, transmission, and especially in telemedicine, where images are frequently shared over digital networks.

Abstract

The growing adoption of telemedicine necessitates robust security measures for medical images during transmission. This paper proposes a novel blind watermarking system for medical images that utilizes both image gradients and the Discrete Wavelet Transform (DWT). Image gradients, acting as spatial derivatives, provide a “topological map” of the image, aiding in the identification of areas susceptible to disruption. The DWT, with its multi-resolution analysis, offers a favorable balance between robustness and imperceptibility. The proposed method embeds the watermark within the low–low band (LL) of the DWT-decomposed image, specifically in 3 × 3 block regions selected based on gradient information. The mathematical relationships between the gradient’s direction and magnitude are employed to extract the corresponding blocks and their codes adequately. These codes are then XORed with the watermark and embedded into the chosen blocks using the least significant bit (LSB) technique. Extensive experimentation on a medical image dataset evaluates the system’s performance against some attacks like filtering, noise, and scaling. The results demonstrate the efficacy of the proposed approach in hiding information while ensuring the security and integrity of watermarked medical images.

1. Introduction

In today’s rapidly evolving healthcare landscape, telemedicine stands as a cornerstone in the delivery of medical services, enabling remote diagnosis, treatment, and consultation through integrated telecommunications networks. This paradigm shift has revolutionized healthcare delivery, transcending geographical barriers and enhancing access to quality medical care [1]. In a digitally connected ecosystem, healthcare professionals and patients can interact seamlessly, exchanging vital health information and receiving timely medical attention irrespective of physical distances. Telemedicine indeed provides convenience and accessibility, but concerns about data security and privacy are substantial [2]. Images are a rich source of information, recently used in tasks like object detection and medical imaging [3,4]. They can also hide information through techniques like steganography, embedding data within images for secure communication. The transmission of sensitive medical images and patient data over digital networks necessitates robust measures to safeguard confidentiality, authenticity, and integrity. This is where image watermarking emerges as a critical component in ensuring the secure exchange of medical information within telemedicine frameworks.
The primary aim of image watermarking in the field of telemedicine is twofold: to authenticate the origin and integrity of medical images and to protect patient confidentiality [1]. By embedding imperceptible digital watermarks within medical images, healthcare providers can verify the authenticity of images, ensuring they have not been tampered with during transmission or storage. Additionally, watermarking serves as a means to preserve patient privacy by embedding encrypted patient information directly into medical images, facilitating secure data exchange while mitigating the risk of unauthorized access. Within the realm of image watermarking, various techniques and methodologies have been developed to address specific security requirements and operational constraints. These techniques can be broadly categorized into spatial and frequency-based approaches, each offering unique advantages and trade-offs. Spatial domain techniques involve directly modifying pixel values within the image to embed the watermark, with methods like least significant bit (LSB) insertion being prominent examples [5]. On the other hand, frequency-based techniques operate by embedding the watermark within frequency transforms of the image, such as the Discrete Cosine Transform (DCT), the DWT, Singular-Value Decomposition (SVD), and so on [6,7,8]. These frequency domain methods offer enhanced robustness against certain types of attacks while preserving image quality, making them well suited for applications in telemedicine where image fidelity is crucial for accurate diagnosis. In the subsequent sections, we will delve into the intricacies of image watermarking techniques, exploring their strengths, weaknesses, and applicability in securing medical images within telemedicine frameworks. By understanding the nuances of watermarking methodologies, we aim to shed light on effective strategies for enhancing data security and privacy in the digital healthcare domain.
The proposed medical image watermarking technique, utilizing a combination of the Discrete Wavelet Transform (DWT) and gradients, significantly contributes to sustainability in healthcare. This method ensures patient privacy by offering a secure and reliable way to watermark images, preventing unauthorized access to sensitive data. Additionally, the DWT and gradient approach enhances image robustness and integrity, leading to accurate diagnosis and minimizing the risk of data breaches. Furthermore, by embedding watermarks securely, this technique reduces the need for repeated imaging procedures due to lost or corrupted images. This translates to lower resource consumption and a smaller environmental footprint for healthcare practices. The main contributions of the present work are as follows:
  • By effectively combining the DWT and gradients, the proposed method achieves superior robustness compared to existing techniques.
  • We employ image gradients to provide a “topological map” of the image, aiding in the identification of areas susceptible to disruption
  • The proposed method leverages the relationship between the gradient direction and magnitude to construct a robust histogram for feature extraction. This approach ensures reliable feature recovery even after attacks on the watermarked medical image.
  • The method is meticulously designed to strike a balance between robustness, imperceptibility, and computational efficiency, making it well suited for practical applications.
The remainder of the paper is organized as follows: Section 2 reviews existing watermarking techniques. The core of our proposed method is detailed in Section 3. Section 4 demonstrates the effectiveness of our approach through experimental results. Finally, we conclude the paper and outline potential areas for future research.

2. Related Work

In the pursuit of robust watermarking systems for telemedicine applications, researchers have explored various methodologies, including spatial and frequency-based approaches, to embed watermarks within medical images. Frequency domain watermarking techniques leverage transforms such as the DCT, the DWT, or SVD to decompose the image into frequency components. These methods offer enhanced robustness against certain types of attacks while preserving image fidelity, making them well suited for applications in telemedicine where image quality is paramount for accurate diagnosis [9]. By embedding the watermark within the frequency domain, researchers aim to achieve a balance between imperceptibility and robustness. Frequency-based methods exploit the properties of these transforms to ensure that the watermark is resilient to common attacks [10] such as compression, noise addition, and geometric alterations. However, frequency domain watermarking techniques may also face challenges, such as increased computational complexity and potential perceptual distortion [11].
Despite these challenges, ongoing research efforts continue to explore novel frequency domain watermarking techniques aimed at bolstering the security and integrity of medical images in telemedicine applications. The Wavelet Transform (DWT) is a mathematical technique used to decompose a signal into frequency components while capturing their locations. Unlike the Discrete Fourier Transform (DFT), which only provides frequency information, the DWT offers additional positional information [12]. This decomposition into frequency bands with spatial information (low-frequency details, high-frequency details at specific locations) makes the DWT particularly valuable for image watermarking. The ability to target specific frequency bands and locations within the image allows for precise watermark embedding, leading to a wide range of possibilities for robust watermarking techniques, as evidenced by the numerous DWT-based watermarking systems [6].
Anand et al. [13] developed a medical image watermarking technique that integrates multiple text and image watermarks. They first applied the DWT to the image, then SVD to the HH, HL, and LH sub-bands. The text watermark is embedded into the singular values of the HH sub-band, while the image watermarks are embedded into the singular values of the LH and HL sub-bands. To enhance security, the watermarked image is then encrypted using hyperchaotic encryption. Devi and Singh [14] used a DWT to transform the blue component of medical images. The LL sub-band is transformed using a fast Walsh–Hadamard transformation. Next, SVD is performed on the acquired blocks. The watermark bits are then incorporated into the singular values of the S matrix. To further protect the watermarked image, it is scrambled using the Arnold transform. In the paper of Devi and Mohapatra [6], a robust watermarking scheme for Digital Imaging and Communications in Medicine (DICOM) images is proposed. To ensure security, the binary watermark is first encrypted with a logistic chaotic map, then embedded into the cover DICOM image by dividing it into blocks. Subsequently, the blocks undergo a first-level DWT to decompose them in the frequency domain. A random set of coefficients within each block is then selected using a secret key. Finally, the encrypted watermark is embedded based on a rank-based criterion within these chosen coefficients. The approach of Tiwari et al. [15] performed zigzag scanning, then reorganized the coefficients within the Lifting Wavelet Transform (LWT) LL sub-band for watermark integration. The method of Thakur et al. [16] prioritized security through a two-step embedding process. The cover image undergoes a DWT decomposition, followed by the selection of specific sub-bands for watermark integration. To enhance robustness, these sub-bands are further transformed using SVD. This facilitates embedding two watermarks: the highly robust “patient report” and the less robust “patient medical image” directly into the singular values of the chosen DWT sub-bands. The study of Khare and Srivastava [17] proposed a novel image watermarking in which the HL sub-band of DWT is subjected to Homomorphic Transform (HT) separating the illumination and reflectance components. The watermark is then embedded into the singular values of the reflectance component using SVD. Inspired by the latter, Nawaz et al. [18] employed a pretrained Deep Neural Network (DNN) to extract key features of the image to be watermarked. The DWT and Discrete Cosine Transform (DCT) are utilized to transform these features into a more compact representation for more robustness. To further enhance the security, the watermark undergoes chaotic scrambling before being XORed with the medical image using a secret key. Soundrapandiyan et al. [19] developed a method that embeds feature information in the Region of Interest (ROI) using the DWT and tag information in the Non-Interest Region (NIR) using the DCT. The process starts by segmenting the original medical image into the ROI, containing crucial details, and an NIR. A two-level DWT is then applied to the ROI, generating specific coefficients (LL1, LH1, HL1, HH1, LL2, LH2, HL2, HH2). The watermark for quality features is embedded by modifying the low-frequency coefficients (LL2) of the DWT decomposition. Next, the NIR is divided into non-overlapping 8 × 8 blocks, and each block undergoes a DCT. The DCT coefficients are then rearranged using a zigzag scan, and eight intermediate-frequency coefficients are chosen for embedding the private label watermark. Another work of Araghi and Megías [20] explored two watermarking DWT-based schemes for medical image watermarking. The first scheme employed a single-level SVD on each DWT sub-band, while the second used a two-level SVD to compare the impact of SVD levels on the robustness and imperceptibility of the watermarking.
Among the modern methods of watermarking images is the use of gradients. The method proposed by Luo et al. [21] addresses medical image watermarking challenges by proposing a zero-watermarking scheme that combines feature extraction and encryption. The method extracted a feature vector using the Histogram of Oriented Gradients (HOG), capturing image’s edge information, which is transformed into a compact feature sequence through a perceptual hashing algorithm. The watermark image undergoes chaotic scrambling via a logical mapping process and then is embedded into the medical image. In the approach of Faheem et al. [22], the information is embedded in the LSB of the image by first dividing the image into non-overlapping 16 × 16 blocks, then for each block, the gradient magnitude and direction are calculated, and the central pixel’s LSB is selected for embedding. After scrambling with a chaotic system for security, the watermark bits are embedded based on the gradient values (i.e., stronger magnitudes or directions allow for more watermark bits to be embedded). The final watermarked image is constructed by combining the modified LSB with the original most significant bits (MSBs). In the method proposed by Mokhnache et al. [23], the cover image is decomposed with a specific DWT followed by a targeted transformation, using the DCT, on certain parts. Then, the smoothness of different image regions is analyzed to guide the division and embedding of the watermark, with specific thresholds determining the placement. The efficiency of this method hinges on using image features (smoothness) to select embedding locations. This approach enhances security by requiring a secret key based on the chosen embedding locations for successful watermark extraction.
A key challenge in medical image watermarking lies in achieving a balance between the desired properties of imperceptibility, capacity, and robustness. Existing literature revealed that many watermarking techniques prioritize robustness at the expense of the other two aspects due to inherent trade-offs. To address this limitation, we propose a novel DWT-based approach that leverages gradient analysis. This approach aligns well with existing research that demonstrates the effectiveness of the DWT for robust watermarking in medical images, often alongside additional techniques like feature extraction. Furthermore, gradient information has proven valuable in some watermarking methods, further supporting our focus on the DWT with gradient analysis to optimize the crucial balance between imperceptibility, capacity, and robustness.

3. Proposed Method

Most watermarking techniques share a similar framework, with variations arising in the specific methods used for embedding and extracting the watermark [24]. In this work, we introduce a new blind and robust watermarking approach that extends the capabilities of the Discrete Wavelet Transform (DWT) by scrutinizing both the gradient direction and magnitude across decomposed sub-bands. Figure 1 illustrates the schematic representation of the proposed approach.
Our proposed method consists of two main sections, namely (a) Information Embedding in which the information of the patient will be hidden in the cover image and (b) Information Extraction in which the hidden information will be extracted.
Our approach considers extracting three main components, which will be used later on for the embedding, from the cover image. The three components the L L sub-band for the Haar wavelet, the gradient magnitude, and the gradient direction are extracted as follows:
LL sub-band: We apply the Haar wavelet transform to the image, resulting in the frequency domain representation with the L L sub-band:
L L ( i , j ) = 1 2 I ( i , j ) + I ( i , j + 1 ) + I ( i + 1 , j ) + I ( i + 1 , j + 1 )
This sub-band captures the low-frequency content, representing a smoothed version of the original image. The forthcoming procedures are performed at block-levels of size n × n .
Gradient direction (D): This provides crucial information about the orientation of edges and structures in the image. The gradient direction at each pixel is calculated using the following function:
D ( i , j ) = atan 2 ( y I ( i , j ) , x I ( i , j ) )
To further improve robustness and to alleviate the noise effect, a binning is performed in the gradient direction according to the following formula:
f ( x ) = x c for 0 < x 2 π
where c is a constant that determines the size of each interval and . , the ceiling function, returns the smallest integer that is greater than or equal to the input value. In our work, c was set to π / 2 to provide greater flexibility and enhance robustness against noise effects.
Gradient magnitude (M): This represents the rate of change of pixel intensity across the image. It measures the overall intensity variation at each pixel, providing information about the edges. The gradient magnitude at each pixel is calculated using the gradient operators x and y in the horizontal and vertical directions, respectively:
M ( i , j ) = ( x I ( i , j ) ) 2 + ( y I ( i , j ) ) 2
where x I ( i , j ) and y I ( i , j ) represent the horizontal and vertical gradients of the image I at the pixel I ( i , j ) , respectively.
After having binned the gradient direction D ( i , j ) and extracted the gradient magnitude M ( i , j ) , we construct the watermark’s final histogram H accumulating binarized magnitudes according to the binned directions as follows:
H [ k ] = d D ( i , j ) S k d B α ( M ( i , j ) )
where D is the set of all possible binarized directions, S k d is the set of all pixel indices ( i , j ) having gradient directions d and that fall into the k-th bin of the histogram, and B α ( x ) is a binarization function defined as follows:
B α [ x ] = 1 if x α 0 if x < α
For simplicity, α can be set to the middle of the magnitude value range for each S k d , calculated as:
α = min ( M ( S k d ) ) + max ( M ( S k d ) ) 2
It should be mentioned that each block must produce a 1 byte code (8 bits) called the crypto_code. In case the crypto_codes generated are of a length less than or greater than 8 bits, they should be completed or reduced to 8 bits using the same approach uniformly over all blocks. Likewise, the watermark (i.e., information to be hidden) is partitioned into segments comprising 8 bits each and then encrypted with crypto_codes using the XOR operation. Thereafter, the least significant bits (LSBs) from the corresponding encrypted watermark are applied to each coefficient of the watermarked block. Finally, an inverse DWT is then applied to the modified L L sub-band, then combined with the original ones H L , L H , and H H to reconstruct the watermarked medical image.
For watermark extraction, the reverse operations of the embedding process should be executed. This involves first applying the DWT to the watermarked medical image to decompose it into sub-bands ( L L , H L , L H , H H ). The modified L L sub-band is then divided into non-overlapping n × n blocks. From each block’s coefficients, the least significant bits (LSBs) are extracted to retrieve the encrypted watermark segments. These segments are decrypted using the corresponding crypto_code with the XOR operation. Finally, the decrypted segments are combined to reconstruct the original watermark. By following these reverse operations, the embedded watermark can be accurately extracted from the watermarked medical image.

4. Experiments and Evaluation

In this section, we present a comprehensive evaluation of our proposed watermarking scheme. Various aspects of the proposed scheme have been meticulously evaluated, including its robustness, imperceptibility, and computational efficiency. Additionally, we perform a comparative analysis against other related works to highlight the advantages and improvements offered by our approach. The results demonstrate the effectiveness and reliability of our watermarking method in practical scenarios.
The images used in our experiments, as represented in Figure 2, were sourced from COVID-19 dataset (https://www.kaggle.com/datasets/fusicfenta/chest-xray-for-covid19-detection (accessed on 15 January 2024)). This dataset contains two types of chest X-ray images, one which represents COVID-19 infection and the other being normal. The images are gray-level images (only intensity channel), in the format of JPG, having variable sizes ranging from 1200 px to 2500 px.

4.1. Metrics

In order to thoroughly evaluate the performance of our watermarking technique, we employed several key metrics. These metrics are crucial for assessing the robustness, imperceptibility, and overall effectiveness of the watermarking scheme. The metrics used in our evaluation include the following:
Peak Signal-to-Noise Ratio (PSNR): The PSNR between the original image I and the watermarked image I is calculated as:
PSNR = 10 · log 10 MAX 2 MSE
where MAX is the maximum possible pixel value (typically 255 for 8-bit images) and MSE is the mean-squared error between the original and watermarked images:
MSE = 1 m n i = 1 m j = 1 n ( I ( i , j ) I ( i , j ) ) 2
Structural Similarity Index (SSIM): The SSIM index between the original image I and the watermarked image I is given by:
SSIM ( I , I ) = ( 2 μ I μ I + c 1 ) ( 2 σ I , I + c 2 ) ( μ I 2 + μ I 2 + c 1 ) ( σ I 2 + σ I 2 + c 2 )
where μ I and μ I are the mean intensities of the original and watermarked images, σ I and σ I are the standard deviations, and σ I , I is the covariance. The constants c 1 and c 2 are small positive constants to avoid division by zero.
Normalized Cross-Correlation (NC): The NC between the original watermark W and the extracted watermark W is calculated as:
NC ( W , W ) = i = 1 N W ( i ) W ( i ) i = 1 N W ( i )
where N is the number of bits in the watermark and W ( i ) and W ( i ) are the i-th bits of the original and extracted watermarks, respectively.
Bit Error Rate (BER): The BER between the original watermark W and the extracted watermark W is calculated as:
BER = 1 N i = 1 N δ ( W ( i ) , W ( i ) )
where N is the number of bits in the watermark and δ ( x , y ) is the Kronecker delta function that returns 0 if x = y and 1 otherwise.
These formulas provide quantitative measures for assessing the quality and fidelity of the watermarking process, aiding in the evaluation and comparison of different watermarking techniques.

4.2. Imperceptibility Assessment

We evaluated the imperceptibility of the watermarked images to the human eye using two key metrics: the Peak Signal-to-Noise Ratio (PSNR) and the Structural Similarity Index (SSIM). Higher PSNR values indicate better quality, with minimal visual distortion caused by the watermark. The PSNR provides a more comprehensive assessment of visual fidelity, as the PSNR can be fooled by noise that appears similar to the image details. The results assessing the effect of different watermark sizes on imperceptibility are summarized in Table 1.
From Table 1, it is evident that smaller watermark sizes tend to yield slightly higher PSNR values, indicating better imperceptibility. This aligns with the principle that smaller watermarks are less likely to introduce noticeable visual artifacts in the watermarked images. However, it is noteworthy that, even with larger watermark sizes, the imperceptibility remains high, underscoring the robustness of our watermarking technique. For instance, using a medium watermark size ( 10 3 bytes) results in an image with almost imperceptible changes. Human eyes generally would not perceive any significant quality difference between the original and watermarked images if the PSNR value is above 50 dB. This demonstrates the effectiveness of our method in preserving the visual quality of the medical images while embedding the watermark. The findings from this analysis reinforce the practical applicability of our watermarking approach in medical imaging scenarios. The ability to embed watermarks with minimal impact on image quality, even with larger sizes, enhances the sensitive medical data without compromising the diagnostic integrity of the images.
To further elucidate the impact of different sizes of watermarks on the imperceptibility of our watermarking technique, we provide a visual illustrations in Figure 3. As depicted in Figure 3, varying sizes of watermark images are embedded within the cover images, ranging from small to large. As it appears, the quality and structural similarity between the watermarked (b)–(c) and the cover image (a) does not degrade as the size of the watermark increases.
To establish the superiority of imperceptibility, we compared various watermarking methods. The primary objective was to evaluate each technique’s effectiveness in concealing watermarks within images while minimizing visual distortion. Notably, our method, as illustrated in Table 2, surpassed competing approaches by achieving the highest imperceptibility score. This outcome confirms our method’s exceptional ability to seamlessly integrate watermarks into medical images while preserving their original visual quality.

4.3. Robustness Evaluation

In addition to assessing imperceptibility, we also evaluated the robustness of our watermarking technique against common image processing operations and attacks. Robustness testing is crucial to ensure that the embedded watermark remains intact and detectable even after various modifications to the watermarked image. Random noise or intentional tampering could heavily affect the extracted watermark, making it essential to evaluate how well the watermark withstands such conditions. In Figure 4, we show the watermark extracted before and after applying image attacks using Gaussian and salt and pepper (S & P) noises. These results illustrate the robustness of our watermarking method under different types of noise, demonstrating its ability to maintain watermark integrity even in challenging conditions.
We subjected the watermarked images to a series of attacks, including noise, scaling, filtering, and intensity enhancement, among others. The goal was to determine the resilience of the embedded watermark under different scenarios.
Table 3 summarizes the results of our robustness testing, showing the performance of the watermark under each operation or attack.
From Table 3, it is evident that the proposed method demonstrates robustness across various attacks, achieving high NC values. Specifically, it exhibits strong resilience against both Gaussian and salt and pepper noises (NC: 0.97), outperforming most of the comparison methods. Despite the challenges posed by histogram equalization, the proposed method maintains a respectable NC value (0.8). Additionally, its robustness against the median filter (NC: 0.86) and scaling (NC: 0.78) underscores its applicability in medical imaging scenarios where image orientation and cropping are common. The Normalized Correlation (NC) metric is not sufficient for evaluating the performance of watermarking techniques, as it only reflects the true positives. A more important metric is the Bit Error Rate (BER), which considers the matching of both positive and negative bits, providing a more comprehensive assessment of the watermark’s performance. Our method outperforms all other methods in this task, demonstrating superior accuracy and reliability in watermark detection and integrity. Overall, while the proposed method exhibits promising robustness against a wide range of attacks, further exploration and refinement in certain areas could enhance its effectiveness in robust medical image watermarking applications.
These results demonstrate the effectiveness of our watermarking method in preserving the integrity and authenticity of medical images, even in the face of potential alterations and attacks. The high detection rates across various tests underscore the reliability and robustness of our approach, making it suitable for real-world applications where image security is paramount. The scaling and sharpening attacks highlight potential limitations of our method, requiring further investigation.

4.4. Computational Efficiency

The computational efficiency of the proposed approach, leveraging the Discrete Wavelet Transform (DWT) alongside image gradient scaling using Sobel edge detection for watermark embedding in the least significant bit (LSB), entails a multi-faceted process. Integrating Sobel edge detection adds a computational layer to identify image gradients efficiently, enhancing the security of watermark embedding. Considering N as the number of pixels in the image, M as the number of bits to be embedded, and L as the number of decomposition levels in the DWT, the overall complexity comprises three main components: DWT processing O ( L N log N ) , Sobel edge detection O ( N ) , and LSB embedding O ( M N ) . Thus, the total complexity is O ( L N log N ) + O ( N ) + O ( M N ) , with the dominant factor contingent on the interplay between L, M, and N. Knowing that M < < N , we can say with certainty that the increase of time consumption over the size of the watermark is Linear. In the subsequent Figure 5, we delineate the computational watermarking/extraction time over variations in the watermark size.
As anticipated from Figure 5, the consumed time exhibits a linear correlation with the size of the watermark. This linear relationship suggests that, as the size of the watermark increases, the time required for computation also increases proportionally. This stability implies that the proposed watermarking approach can efficiently handle varying sizes of watermarks, which is crucial for applications such as video processing where watermark sizes may vary.

5. Conclusions

Our research presents a pioneering approach to blind and robust watermarking for medical images, which capitalizes on the Discrete Wavelet Transform (DWT) in conjunction with gradient analysis. By integrating the LL sub-band, gradient magnitude, and gradient direction, our method achieves a balance between imperceptibility and robustness, ensuring the protection of sensitive medical data. Through comprehensive evaluations, including metrics like the PSNR, SSIM, NC, and BER, we have demonstrated the superiority of our technique over existing methods, promising enhanced security without compromising image quality. Moreover, simulations on real healthcare data involving various common attacks, such as median and noise addition, further underscored the resilience of our method, highlighting its efficacy in maintaining watermark integrity under adverse conditions. This innovative solution holds significant potential for practical applications in medical image authentication and secure data transmission within healthcare systems.

Author Contributions

Conceptualization, K.H.; Software, K.H. and A.B.; Validation, K.H., O.A. and A.B.; Formal analysis, O.A.; Investigation, B.K.; Data curation, A.B.; Writing—original draft, K.H. and O.A.; Writing—review & editing, B.K.; Visualization, B.K.; Supervision, B.K. and O.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Publicly available dataset was analyzed in this study. This data can be found here: https://www.kaggle.com/datasets/fusicfenta/chest-xray-for-covid19-detection (accessed on 15 January 2024).

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Gull, S.; Parah, S.A. Advances in medical image watermarking: A state of the art review. Multimed. Tools Appl. 2024, 83, 1407–1447. [Google Scholar] [CrossRef]
  2. Mata-Mendoza, D.; Cedillo-Hernandez, M.; Garcia-Ugalde, F.; Cedillo-Hernandez, A.; Nakano-Miyatake, M.; Perez-Meana, H. Secured telemedicine of medical imaging based on dual robust watermarking. Vis. Comput. 2022, 38, 2073–2090. [Google Scholar] [CrossRef]
  3. Aiadi, O.; Khaldi, B.; Korichi, A.; Chaa, M.; Bezziane, M.B.; Omara, I. Fusion of deep and local gradient-based features for multimodal finger knuckle print identification. Clust. Comput. 2024, 1–17. [Google Scholar] [CrossRef]
  4. Aiadi, O.; Khaldi, B. A fast lightweight network for the discrimination of COVID-19 and pulmonary diseases. Biomed. Signal Process. Control 2022, 78, 103925. [Google Scholar] [CrossRef]
  5. Gupta, M.K.; Dadheech, P.; Kumar, A.; Dogiwal, S.R.; Poonia, R.C.; Raja, L.; Bhatt, D.P. Detection and localization for watermarking technique using LSB encryption for DICOM Image. J. Discret. Math. Sci. Cryptogr. 2022, 25, 193–204. [Google Scholar] [CrossRef]
  6. Devi, H.S.; Mohapatra, H. A novel robust blind medical image watermarking using rank-based DWT. Int. J. Inf. Technol. 2023, 15, 1901–1909. [Google Scholar] [CrossRef]
  7. Singh, A.K. Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed. Tools Appl. 2019, 78, 30523–30533. [Google Scholar] [CrossRef]
  8. Zhang, Y.; Wang, H.; Zhao, J. Eliminating orthonormal constraints of SVD to guarantee full retrievability of blind watermarking. Multimed. Tools Appl. 2024, 83, 25365–25391. [Google Scholar] [CrossRef]
  9. Mun, S.M.; Nam, S.H.; Jang, H.; Kim, D.; Lee, H.K. Finding robust domain from attacks: A learning framework for blind watermarking. Neurocomputing 2019, 337, 191–202. [Google Scholar]
  10. Parah, S.A.; Sheikh, J.A.; Ahad, F.; Loan, N.A.; Bhat, G.M. Information hiding in medical images: A robust medical image watermarking system for E-healthcare. Multimed. Tools Appl. 2017, 76, 10599–10633. [Google Scholar] [CrossRef]
  11. Li, L.; Luo, Y.; Liu, J.; Qiu, S.; Li, L. A Robust Watermarking Scheme with High Security and Low Computational Complexity; Springer: Cham, Switzerland, 2020. [Google Scholar]
  12. Kumar, C. Hybrid optimization for secure and robust digital image watermarking with DWT, DCT and SPIHT. Multimed. Tools Appl. 2024, 83, 31911–31932. [Google Scholar] [CrossRef]
  13. Anand, A.; Singh, A.K. An improved DWT-SVD domain watermarking for medical information security. Comput. Commun. 2020, 152, 72–80. [Google Scholar] [CrossRef]
  14. Devi, H.S.; Singh, K.M. Red-cyan anaglyph image watermarking using DWT, Hadamard transform and singular value decomposition for copyright protection. J. Inf. Secur. Appl. 2020, 50, 102424. [Google Scholar] [CrossRef]
  15. Tiwari, A.; Srivastava, V.K. Novel schemes for the improvement of lifting wavelet transform-based image watermarking using Schur decomposition. J. Supercomput. 2023, 79, 13142–13179. [Google Scholar] [CrossRef]
  16. Thakur, S.; Singh, A.; Kumar, B.; Ghrera, S. Improved DWT-SVD-Based Medical Image Watermarking through Hamming Code and Chaotic Encryption; Springer: Berlin/Heidelberg, Germany, 2020; pp. 897–905. [Google Scholar]
  17. Khare, P.; Srivastava, V.K. A reliable and secure image watermarking algorithm using homomorphic transform in DWT domain. Multidimens. Syst. Signal Process. 2021, 32, 131–160. [Google Scholar] [CrossRef]
  18. Nawaz, S.A.; Li, J.; Shoukat, M.U.; Bhatti, U.A.; Raza, M.A. Hybrid medical image zero watermarking via discrete wavelet transform-ResNet101 and discrete cosine transform. Comput. Electr. Eng. 2023, 112, 108985. [Google Scholar] [CrossRef]
  19. Soundrapandiyan, R.; Rajendiran, K.; Gurunathan, A.; Victor, A.; Selvanambi, R. Analysis of DWT–DCT watermarking algorithm on digital medical imaging. J. Med. Imaging 2024, 11, 014002. [Google Scholar] [CrossRef]
  20. Araghi, T.K.; Megías, D. Analysis and effectiveness of deeper levels of SVD on performance of hybrid DWT and SVD watermarking. Multimed. Tools Appl. 2024, 83, 3895–3916. [Google Scholar] [CrossRef]
  21. Luo, Y.; Li, J.; Bhatti, U.A.; Huang, M.; Dong, F.; Li, Y. Robust Zero-Watermarking Algorithm for Medical Images Based on Direction Gradient Histogram and DCT. In Proceedings of the 2023 IEEE 6th International Conference on Pattern Recognition and Artificial Intelligence, Haikou, China, 18–20 August 2023; pp. 575–583. [Google Scholar]
  22. Faheem, Z.B.; Ali, M.; Raza, M.A.; Arslan, F.; Ali, J.; Masud, M.; Shorfuzzaman, M. Image watermarking scheme using LSB and image gradient. Appl. Sci. 2022, 12, 4202. [Google Scholar] [CrossRef]
  23. Mokhnache, S.; Bekkouche, T.; Chikouche, D. A robust watermarking scheme based on DWT and DCT using image gradient. Int. J. Appl. Eng. Res 2018, 13, 1900–1907. [Google Scholar]
  24. Wan, W.; Wang, J.; Zhang, Y.; Li, J.; Yu, H.; Sun, J. A comprehensive survey on robust image watermarking. Neurocomputing 2022, 488, 226–247. [Google Scholar] [CrossRef]
  25. Verma, U.; Sharma, N. Hybrid mode of medical image watermarking to enhance robustness and imperceptibility. Int. J. Innov. Technol. Explor. Eng. 2019, 9, 351–359. [Google Scholar] [CrossRef]
  26. Geetha, R.; Geetha, S. Embedding electronic patient information in clinical images: An improved and efficient reversible data hiding technique. Multimed. Tools Appl. 2020, 79, 12869–12890. [Google Scholar] [CrossRef]
  27. Gangadhar, Y.; Akula, V.G.; Reddy, P.C. An evolutionary programming approach for securing medical images using watermarking scheme in invariant discrete wavelet transformation. Biomed. Signal Process. Control 2018, 43, 31–40. [Google Scholar] [CrossRef]
  28. Khaldi, A.; Redouane, K.M.; Bilel, M. A medical image watermarking system based on redundant wavelets for secure transmission in telemedicine applications. Wirel. Pers. Commun. 2023, 132, 823–839. [Google Scholar] [CrossRef]
  29. Hurrah, N.N.; Parah, S.A.; Sheikh, J.A. Embedding in medical images: An efficient scheme for authentication and tamper localization. Multimed. Tools Appl. 2020, 79, 21441–21470. [Google Scholar] [CrossRef]
Figure 1. Proposed scheme with two main phases: (a) Information Embedding, (b) Information Extraction, GM: block (3 × 3) of gradient magnitude, GD: block (3 × 3) of gradient direction, BD: binning decomposition.
Figure 1. Proposed scheme with two main phases: (a) Information Embedding, (b) Information Extraction, GM: block (3 × 3) of gradient magnitude, GD: block (3 × 3) of gradient direction, BD: binning decomposition.
Applsci 14 06199 g001
Figure 2. Images used in our experiments sourced from the COVID-19 dataset. From the left to the right are the COVID-19-pneumonia-12, COVID-19-pneumonia-14-PA, COVID-19-pneumonia-35-1, NORMAL2-IM-0441-0001, NORMAL2-IM-0894-0001, and NORMAL2-IM-1275-0001 images.
Figure 2. Images used in our experiments sourced from the COVID-19 dataset. From the left to the right are the COVID-19-pneumonia-12, COVID-19-pneumonia-14-PA, COVID-19-pneumonia-35-1, NORMAL2-IM-0441-0001, NORMAL2-IM-0894-0001, and NORMAL2-IM-1275-0001 images.
Applsci 14 06199 g002
Figure 3. Illustration of watermark embedding and extraction process. (a) Cover image where the information will be hidden. (f) Watermark. (be) are watermarked images with increasingly larger watermark sizes. (gj) are the corresponding extracted watermarks from the watermarked images.
Figure 3. Illustration of watermark embedding and extraction process. (a) Cover image where the information will be hidden. (f) Watermark. (be) are watermarked images with increasingly larger watermark sizes. (gj) are the corresponding extracted watermarks from the watermarked images.
Applsci 14 06199 g003
Figure 4. The effect of noise on the watermark-extraction process. (ac) Watermarks extracted without image tampering. (df) Extracted watermarks after applying Gaussian noise. (gi) Extracted watermarks under salt and pepper noise.
Figure 4. The effect of noise on the watermark-extraction process. (ac) Watermarks extracted without image tampering. (df) Extracted watermarks after applying Gaussian noise. (gi) Extracted watermarks under salt and pepper noise.
Applsci 14 06199 g004
Figure 5. The impact of watermark size on the watermarking process in terms of calculation time.
Figure 5. The impact of watermark size on the watermarking process in terms of calculation time.
Applsci 14 06199 g005
Table 1. Imperceptibility assessment results across different watermark sizes.
Table 1. Imperceptibility assessment results across different watermark sizes.
Watermark Size (Bytes)PSNR (dB)SSIM
96 59.843 ± 1.738 0.91 ± 0.091
411 59.835 ± 1.735 0.85 ± 0.057
10,779 59.554 ± 1.549 0.81 ± 0.027
43,228 58.867 ± 1.122 0.8 ± 0.026
97,493 57.941 ± 0.698 0.79 ± 0.021
Table 2. Comparison of PSNR and SSIM scores.
Table 2. Comparison of PSNR and SSIM scores.
MethodPSNRSSIM
Anand et al. [13]44.190.85
Verma et al. [25]41.670.82
Geetha et al. [26]42.340.84
Gangadhar et al. [27]45.220.87
Devi et al. [6]46.640.89
Khaldi et al. [28]42.970.83
Hurrah et al. [29]470.91
Our method (Avg)59.840.91
Table 3. Comparisons of robustness (BER and NC) among different methods using a watermark of size 96 bytes (768 bits).
Table 3. Comparisons of robustness (BER and NC) among different methods using a watermark of size 96 bytes (768 bits).
[13][25][26][27][6][28][29]Our Method
AttacksNCNCNCBERNCNCNCBERNCNCBER
Median filter
(kernel)
0.94
(2 × 2)
-0.58
(3 × 3)
0.41--0.890.240.59
(3 × 3)
0.86
(3 × 3)
0.13
Salt and
Pepper
0.96
(0.001)
0.990.95
(0.01)
0.0480.84
(0.01)
-0.950.100.66
(0.01)
0.97
(0.01)
0.03
Gaussian
Noise
0.32
(0.05)
0.620.50
(0.02)
0.490.99
(0.01)
0.990.930.210.48
(0.01)
0.97
(0.05)
0.01
Scaling0.71
(×2)
-0.470.470.7410.740.320.520.78
(×2)
0.12
Histogram
Equalization
0.87---0.9810.890.230.540.80.08
JPEG
Compression
0.98
(60)
-0.55
(90)
0.44-0.990.91
(20)
0.130.540.98
(20)
0.08
Sharpening0.65
(01)
-0.500.49-0.930.880.210.540.66
(0.1)
0.15
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hebbache, K.; Khaldi, B.; Aiadi, O.; Benziane, A. A DWT-Based Approach with Gradient Analysis for Robust and Blind Medical Image Watermarking. Appl. Sci. 2024, 14, 6199. https://doi.org/10.3390/app14146199

AMA Style

Hebbache K, Khaldi B, Aiadi O, Benziane A. A DWT-Based Approach with Gradient Analysis for Robust and Blind Medical Image Watermarking. Applied Sciences. 2024; 14(14):6199. https://doi.org/10.3390/app14146199

Chicago/Turabian Style

Hebbache, Khaled, Belal Khaldi, Oussama Aiadi, and Ali Benziane. 2024. "A DWT-Based Approach with Gradient Analysis for Robust and Blind Medical Image Watermarking" Applied Sciences 14, no. 14: 6199. https://doi.org/10.3390/app14146199

APA Style

Hebbache, K., Khaldi, B., Aiadi, O., & Benziane, A. (2024). A DWT-Based Approach with Gradient Analysis for Robust and Blind Medical Image Watermarking. Applied Sciences, 14(14), 6199. https://doi.org/10.3390/app14146199

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop