A robust NIfTI image authentication framework to ensure reliable and safe diagnosis

Advancements in digital medical imaging technologies have significantly impacted the healthcare system. It enables the diagnosis of various diseases through the interpretation of medical images. In addition, telemedicine, including teleradiology, has been a crucial impact on remote medical consultation, especially during the COVID-19 pandemic. However, with the increasing reliance on digital medical images comes the risk of digital media attacks that can compromise the authenticity and ownership of these images. Therefore, it is crucial to develop reliable and secure methods to authenticate these images that are in NIfTI image format. The proposed method in this research involves meticulously integrating a watermark into the slice of the NIfTI image. The Slantlet transform allows modification during insertion, while the Hessenberg matrix decomposition is applied to the LL subband, which retains the most energy of the image. The Affine transform scrambles the watermark before embedding it in the slice. The hybrid combination of these functions has outperformed previous methods, with good trade-offs between security, imperceptibility, and robustness. The performance measures used, such as NC, PSNR, SNR, and SSIM, indicate good results, with PSNR ranging from 60 to 61 dB, image quality index, and NC all close to one. Furthermore, the simulation results have been tested against image processing threats, demonstrating the effectiveness of this method in ensuring the authenticity and ownership of NIfTI images. Thus, the proposed method in this research provides a reliable and secure solution for the authentication of NIfTI images, which can have significant implications in the healthcare industry.

[1]  Rutvij H. Jhaveri,et al.  HyPASS: Design of hybrid-SDN prevention of attacks of source spoofing with host discovery and address validation , 2022, Phys. Commun..

[2]  Yuan Ding,et al.  Mobile Collaborative Secrecy Performance Prediction for Artificial IoT Networks , 2022, IEEE Transactions on Industrial Informatics.

[3]  Mohammad Khalid Imam Rahmani,et al.  Energy Efficient Clustering Protocol for FANETS Using Moth Flame Optimization , 2022, Sustainability.

[4]  Akshay Kumar,et al.  Image-based decision making for reliable and proper diagnosing in NIFTI format using watermarking , 2022, Multimedia Tools and Applications.

[5]  R. I. Alsuwailem,et al.  Retinal Vessel Extraction via Assisted Multi-Channel Feature Map and U-Net , 2022, Frontiers in Public Health.

[6]  Ali Kashif Bashir,et al.  Secure Watermarking Scheme for Color DICOM Images in Telemedicine Applications , 2022, Computers, Materials & Continua.

[7]  Ali Al-Haj,et al.  An efficient watermarking algorithm for medical images , 2021, Multimedia Tools and Applications.

[8]  Narima Zermi,et al.  Robust SVD-based schemes for medical image watermarking , 2021, Microprocess. Microsystems.

[9]  Surbhi Bhatia,et al.  A Comparative Study of Opinion Summarization Techniques , 2021, IEEE Transactions on Computational Social Systems.

[10]  Jing-You Li,et al.  Blind watermarking scheme based on Schur decomposition and non-subsampled contourlet transform , 2020, Multimedia Tools and Applications.

[11]  Li Chen,et al.  COVID-19 CT Lung and Infection Segmentation Dataset , 2020 .

[12]  Jumana Waleed,et al.  An Efficient Scheme of Digital Image Watermarking Based on Hessenberg Factorization and DWT , 2020, 2020 International Conference on Computer Science and Software Engineering (CSASE).

[13]  Sudhir Tirumalasetty,et al.  SLT based watermarking system for secure telemedicine , 2020, Cluster Computing.

[14]  R. S. Bhuvaneswaran,et al.  A Robust Image Watermarking Scheme Using Z-Transform, Discrete Wavelet Transform and Bidiagonal Singular Value Decomposition , 2019, Computers, Materials & Continua.

[15]  Singara Singh Kasana,et al.  Dual hybrid medical watermarking using walsh-slantlet transform , 2019, Multimedia Tools and Applications.

[16]  Mary Agoyi,et al.  Colour Image Blind Watermarking Scheme Based on Fast Walsh Hadamard Transform and Hessenberg Decomposition , 2018, Studies in Informatics and Control.

[17]  A. Singhal,et al.  Channelized Noise Augmentation to Endorse DICOM Medical Image for Diagnosing , 2018 .

[18]  A. Singhal,et al.  Color Image Watermarking Scheme Based on QR Factorization and DWT with Compatibility Analysis on Different Wavelet Filters , 2018 .

[19]  Gaurav Bhatnagar,et al.  A new robust watermarking system in integer DCT domain , 2018, J. Vis. Commun. Image Represent..

[20]  Guangfeng Lin,et al.  A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength , 2018, Multimedia Tools and Applications.

[21]  Fatma Taher,et al.  Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions , 2017, 2017 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS).

[22]  Ling-Yuan Hsu,et al.  Robust blind image watermarking using crisscross inter-block prediction in the DCT domain , 2017, J. Vis. Commun. Image Represent..

[23]  Jau-Ji Shen,et al.  Features Classification Forest: A Novel Development that is Adaptable to Robust Blind Watermarking Techniques , 2017, IEEE Transactions on Image Processing.

[24]  Rutvij H. Jhaveri,et al.  Attack‐pattern discovery based enhanced trust model for secure routing in mobile ad‐hoc networks , 2017, Int. J. Commun. Syst..

[25]  Durgesh Singh,et al.  DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection , 2017, Multimedia Tools and Applications.

[26]  Bee Ee Khoo,et al.  A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition , 2014, Digit. Signal Process..

[27]  Osamah M. Al-Qershi,et al.  Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images , 2011, Journal of Digital Imaging.

[28]  J. Scolforo,et al.  Improving Route Discovery for AODV to Prevent Blackhole and Grayhole Attacks in MANETs , 2022 .