Secure and Robust Fragile Watermarking Scheme for Medical Images

Due to the advances in computer-based communication and health services over the past decade, the need for image security becomes urgent to address the requirements of both safety and non-safety in medical applications. This paper proposes a new fragile watermarking-based scheme for image authentication and self-recovery for medical applications. The proposed scheme locates image tampering as well as recovers the original image. A host image is broken into $4\times 4$ blocks and singular value decomposition (SVD) is applied by inserting the traces of block wise SVD into the least significant bit of the image pixels to figure out the transformation in the original image. Two authentication bits namely block authentication and self-recovery bits are used to survive the vector quantization attack. The insertion of self-recovery bits is determined with Arnold transformation, which recovers the original image even after a high tampering rate. SVD-based watermarking information improves the image authentication and provides a way to detect different attacked area of the watermarked image. The proposed scheme is tested against different types of attacks such as text removal attack, text insertion attack, and copy and paste attack. Compared with the state-of-the art methods, the proposed scheme greatly improves both tamper localization accuracy and the peak signal to noise ratio of self-recovered image.

[1]  Chih-Chin Lai,et al.  A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm , 2011, Digit. Signal Process..

[2]  Lingling Wu,et al.  Arnold Transformation Algorithm and Anti-Arnold Transformation Algorithm , 2009, 2009 First International Conference on Information Science and Engineering.

[3]  Sung Wook Baik,et al.  Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..

[4]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[5]  Millie Pant,et al.  Robust and false positive free watermarking in IWT domain using SVD and ABC , 2016, Eng. Appl. Artif. Intell..

[6]  Nasir D. Memon,et al.  On the Security of the Yeung Mintzer Authentication Watermark , 1999, PICS.

[7]  Chun-Chi Lo,et al.  Probability-based Tamper Detection Scheme for BTC-compressed Images Based on Quantization Levels Modification , 2013 .

[8]  C. Loan Generalizing the Singular Value Decomposition , 1976 .

[9]  Wen Gao,et al.  An image fragile watermark scheme based on chaotic image pattern and pixel-pairs , 2007, Appl. Math. Comput..

[10]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.

[11]  Khan Muhammad,et al.  Hash Based Encryption for Keyframes of Diagnostic Hysteroscopy , 2018, IEEE Access.

[12]  RhoSeungmin,et al.  A review on automated diagnosis of malaria parasite in microscopic blood smears images , 2018 .

[13]  Chokri Ben Amar,et al.  Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain , 2014, IET Image Process..

[14]  Ninghui Li,et al.  Oblivious signature-based envelope , 2003, PODC '03.

[15]  Shan Suthaharan,et al.  Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..

[16]  Radu Ovidiu Preda,et al.  Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain , 2014, 2014 10th International Conference on Communications (COMM).

[17]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[18]  Kaoru Kurosawa,et al.  On Parallel Hash Functions Based on Block-Ciphers , 2003, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[19]  Tieniu Tan,et al.  An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..

[20]  Seungmin Rho,et al.  A review on automated diagnosis of malaria parasite in microscopic blood smears images , 2018, Multimedia Tools and Applications.

[21]  Zhihan Lv,et al.  Secure video summarization framework for personalized wireless capsule endoscopy , 2017, Pervasive Mob. Comput..

[22]  Nitin N. Patil,et al.  Self Embedding Fragile Watermarking for Image Tampering Detection and Image Recovery Using Self Recovery Blocks , 2015, 2015 International Conference on Computing Communication Control and Automation.

[23]  Xinpeng Zhang,et al.  Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels , 2007, IEEE Signal Processing Letters.

[24]  Sung Wook Baik,et al.  Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices , 2017, Multimedia Tools and Applications.

[25]  Rui Sun,et al.  A SVD- and quantization based semi-fragile watermarking technique for image authentication , 2002, 6th International Conference on Signal Processing, 2002..

[26]  Sung Wook Baik,et al.  Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy , 2016, Journal of Medical Systems.

[27]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[28]  Sung Wook Baik,et al.  A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.

[29]  Balasubramanian Raman,et al.  A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .

[30]  Banani Patra,et al.  CRT-based fragile self-recovery watermarking scheme for image authentication and recovery , 2012, 2012 International Symposium on Intelligent Signal Processing and Communications Systems.