国产日韩欧美一区二区三区三州_亚洲少妇熟女av_久久久久亚洲av国产精品_波多野结衣网站一区二区_亚洲欧美色片在线91_国产亚洲精品精品国产优播av_日本一区二区三区波多野结衣 _久久国产av不卡

?

Reversible Watermarking Method with Low Distortion for the Secure Transmission of Medical Images

2022-03-16 05:56:52RizwanTajFengTaoShahzadaKhurramAteeqUrRehmanSyedKamranHaiderAkberAbidGardeziandSaimaKanwal

Rizwan Taj,Feng Tao,?,Shahzada Khurram,Ateeq Ur Rehman,Syed Kamran Haider,Akber Abid Gardezi and Saima Kanwal

1School of Computer and Communication,Lanzhou University of Technology,Lanzhou,China

2Faculty of Computing,The Islamia University of Bahawalpur,Bahawalpur,Pakistan

3Department of Electrical Engineering,Government College University,Lahore,Pakistan

4College of Internet of Things Engineering,Hohai University,Changzhou,China

5Department of Computer Science,COMSATS University Islamabad,Islamabad,Pakistan

ABSTRACT In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates distortions(which lead to an increase in the detection probability).In this article,we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security.The proposed method selects two adjacent gray pixels whose least significant bit(LSB)is different from the relevant message bit and then calculates the distortion degree.We use the LSB pairing method to embed the secret matrix of patient record into the cover image and exchange pixel values.Experimental results show that the designed method is robust to different attacks and has a high PSNR(peak signal-to-noise ratio)value.The MRI image quality and imperceptibility are verified by embedding a secret matrix of up to 262,688 bits to achieve an average PSNR of 51.657 dB.In addition,the proposed algorithm is tested against the latest technology on standard images,and it is found that the average PSNR of our proposed reversible watermarking technology is higher(i.e.,51.71 dB).Numerical results show that the algorithm can be extended to normal images and medical images.

KEYWORDS LSB;reversible watermarking;medical images security;data distortion

1 Introduction

In the next few decades,digital life is expected to change the e-health care system.With the rapid development of Internet technology,high-speed digital communication increasingly requires more and more medical image transmission.In addition,digital devices must also deal with security vulnerabilities.The e-health system is angering possible security risks,such as eavesdropping and unauthorized access.With the passage of time,digital information has become an important topic for data security researchers to ensure that this digital content is protected and reliable[1].Digital watermarking system has been widely used as a data authentication method for transmitting medical data[2–5].Watermarking technology has the following four key characteristics[6–8].First,the embedded watermark is robust against various types of attacks.Second,the extracted watermark verifies the provability of copyright ownership by verifying the watermark information.Third,the security feature makes the watermark information unable to be operated by unauthorized personnel.Finally,confidentiality is because the cover image will not cause a large amount of data loss by encoding the watermark.However,the watermarking method may cause a certain amount of permanent image distortion.These deformations can lead to erroneous diagnosis.Image distortion is considered to be an important issue in the use of digital watermarking systems to transmit medical images.In order to solve the problems related to permanent distortion,reversible technology has been applied for watermarking and zero watermarking[9,10].

In the embedding stage,the cover image pixels are modified during the reversible watermark,but at the receiver,the cover image can be restored by extracting the watermark[11].The watermark embedding method does not allow any changes to the pixels of the cover image in the zero watermark,several main features need to be taken out of the cover image and used as a guide during data authentication[12].However,the limitation of the zero-watermark is that in order to perform potential data identity verification,the specific attributes extracted from each cover image must be kept secret.This encourages us to propose a new watermarking method,called the reversible zero watermarking technology,which combines the reversible watermarking method and the zero watermarking method together.

In[13],the authors proposed the difference between two adjacent pixels in the cover image and calculated the size of the secret information to be hidden.This method shows that the consistency of the embedded watermark is very small.In[14],the authors pointed out that in unbalanced parity check asymmetric information,LSB replacement is considered to produce an imbalance in the watermark image.Due to the imbalance,some of the techniques such as test analysis and RS attack are used to detect the watermark generated by LSB replacement[15,16].In[14],the author found that the aforementioned detection can be resisted by reducing the histogram variation between the carrier image and the watermark image.In addition,in[17],the author proposed that reducing the histogram shift before and after steganography is a fact that resists the detection method.In[14],the authors propose to replace LSB with embedded DES(LSB-DES)encryption to reduce histogram changes.This scheme use DES in LSB-DES to encrypt the message,and then encode the ciphertext of the message in the carrier picture,while LSB replacement explicitly embeds the message in the carrier picture.More description of LSBDES is provided in[14].This paper proposes a new reversible watermarking algorithm based on the analysis idea,which aims to ensure the transmission security of certified medical images and reduce the distortion of medical watermark images.This new method can be used as an effective method to achieve robust watermarking with less distortion.In Fig.1,we have shown the block diagram of the proposed method.

Figure 1:Block diagram of the proposed reversible watermarking methodology

The main contributions of the proposed method are:

?The proposed method aims to embed a larger payload into the cover image,thereby taking into account the imperceptibility of medical images.

?In order to better hide data and improve the security of medical images,the original LSB method is improved by reducing the distortion of watermarked images.

?The proposed method has been evaluated and compared in detail,and compared with other similar cutting-edge technologies.

The rest of this article is structured as follows.Section 2 summarizes the current state of reversible watermarking methods.Section 3 describes the proposed scheme and implementation experiment,which consists of the embedding and extraction stages of the reversible watermark.In Section 4,we discussed the experimental results.Section 5 is about conclusions and future work.

2 Related Work

Early reversible watermarking methods are divided into three parts:reversible watermarking through differential expansion,reversible watermarking through compression,and reversible watermarking through moving histograms[11].In[18],a reversible watermarking appraoch with low distortion(HGW,watermark method based on histogram gap)is suggested.This method increases the standard histogram translation process and reduces the number of columns and distortion.We can find a lot of research work that applied classical histogram translation[19,20]and difference expansion[21,22]to predict errors.Reversible watermarking systems based on lossless data compression attempt to compress some cover images to create capacity for embedding watermark bits.This basic principle has been used in compression-based systems and is described in[23,24].

In[25],a new LSB method is proposed,therein authors articulate that a higher peak signalto-noise ratio(PSNR)can be obtained by embedding message bits and modifying the pixel pattern of the carrier image.LSB embedding is performed in units,because two pixels are paired into one unit in his algorithm.In[16],the authors suggested that coding distortion is easy to conceal analysis due to unbalanced distribution.In[26],it is found that when the secret message is embedded in the cover image,the original LSB digital watermark will have an imbalance of embedding distortion.In[14],a new embedding algorithm was proposed to check a pair of pixels,which revealed that the same amount of data can reduce the distortion of the cover image.It also shows that by minimizing image distortion,the resistance to watermark detection can be increased.In[27,28],the authors proposed an adaptive pixel pair matching(APPM)method,which uses pixel values to locate a pair of pixels near the embedded message bit based on them.However,when visualizing medical images,watermarking technology is still ineffective in e-Health care applications because it may cause incorrect diagnosis of treatment due to distortion.

3 Proposed Methodology

Our method relies on three main methods,including generating a secret matrix from a text file containing patient data,embedding and extracting.Textual dataTmsg,in the beginning,is loaded into the buffer and converted into its equivalent binary.By using the number conversion formula,the binary is converted into its equivalent decimal value.TheTmsgmust be accompanied by 8-bit character encoding.Each character encoding scheme details how to interpret byte sequences as code points(in contrast,how to encode code points as byte sequences).The next step is to create a secret matrixSmsg.Every single character’s decimal value represents a pixel.

wherebi,jis the intensity of pixel appereing ati-th row andj-th column,Mris the number of rows in the Smsg,andMcis the number of the columns in Smsg.TheSmsgsize sets automatically depending on the text length to be encoded.

3.1 Embedding Phase

In this process,we embed the secret matrixSmsginto the cover image to reduce the distortion of the watermark image.The cover image should be converted from a two-dimensional matrix to a one-dimensional matrix.Based on a one-dimensional matrix,it tries to find two adjacent LSB pairs of a pixel.In LSB substitution,the secret matrix bits are repeatedly embedded in the cover image,and one of the secret matrix bits is embedded in a pixel in a cycle.Embedding process of LSB pair for one loop can be summarized as the following steps:

Step 1.Two adjacent pixelsCiandCi+1,are pair or not in the cover image.If yes,go to Step(2),else If not,do LSB substitution of current pixelCi,then go to the next loop for the next pixel.To find LSB-pair pixels,following two conditions need to be satisfied:

TheX(Ci)sign indicates the grayscale value ofCipixels.Cirepresents a certain pixel in the cover image,with a sequential number indicatingiin the data,where

When transforming secret matrix message into binary,the ith binary value of this secret matrix is indicated by Si,where Si is represented by 0 or 1.Si and Si+1 are the respectively Ci and Ci+1 message bits.Finally,the LSB(X(Ci))symbolization represents the 8th bit of gray level value for a pixel.Let’s say that if the gray value of the 28th pixel was 152,the LS B(X(C28))= 0 LSB pixel could be used to represent the 28th pixel.We had LS B(X(C29))equal to 1 If the gray level of the 29th pixel was 153.The next phase is to identify how the variation changes when you embed the secret matrix message in LSB pairs.Since each pixel is 8 bits in the grayscale image,To represent image energy the distribution,we can use a range of 256 ordered variables.Every variable means a particular gray level frequency.The sequence of distortions can be viewed as:

The variation between the cover image and watermarked image can be measured byV′=v2?v1where v1 represents cover image distortion,and v2 represents watermarked image distortion.There are two different conditions in which secret matrix messages are embedded when using the LSB pair procedure.

First condition.Consider two pixels are:X(Ci)=154,X(Ci+1)= 155 and secret matrix message bits:Si = 1,Si+1= 0.A calculation is possible to obtain the LSB value of these two pixels:LS B(X(Ci))=0,LSB(X(Ci+1))=1.These pixels are considered to be a pair as they satisfy the requirements.

Step 2.Determine the distortion variationfor regular LSB substitution;if it is larger than 0,go to Step(3);else,go to Step(4).

Step 1 First condition.Let assume the distortion variation before doing LSB replacement is:

We obtained newX′(Ci)andafter embedding thei-th message bit into the cover image:

Then(i+1)thsecret matrix message bit is embedded into the cover image.We obtained newX′(Ci+1)andD′after:

At this location,distortion changes 0 mean that distortion is not modified after embedding watermarking messages.

Step 1 Second condition.Assume the distortion change before watermarking isThen using the LSB replacement method to embed message,we

After that,calculating the distortion variations:

Based on the current description,V′after?V′before<0 implies that the image distortion is minimized after embedding a message and vice versa.Suppose w >0,x<0,y<0 and z >0,thus we obtain

However,whenw+1<0;x?1>0;y?1>0 and z+1<0

Furthermore,the distortion change can be 0 in some conditions.Numerous permutations and combinations of the value of w,x,y,and z are possible.In this system,only two interesting states:increasing variation in distortion or decreasing variation.We are only interested in whether if the valueis positive or negative in LSB-pair methods.

Step 3.Shift the value of two pixels,then move to the next loop,go to one after the succeeding loop.From the first condition,gray level value 154 and 155 does not alter.After embedding,we getX′(Ci)=155,X′(Ci+1)=154 what looks like these adjacent pixels swap their values because before embedding values were X(Ci)= 154,X(Ci+1)= 155.Fig.2 points us to an elucidation to the second condition because after embedding,it looks like two pixels swap their position.From the second condition,before embedding,if we swap the value of two pixels X(Ci)=155;X(Ci+1)= 156;Si= 0;Si+1= 1,the result will be:X′(Ci)=154,X′(Ci+1)=157.Alternatively,the modification in distortion may be both positive and negative for applying a normal LSB substitution for the second case explicitly as in Fig.3.When variation modification is negative,it indicates applying regular LSB replacement,and when the variation modification is positive,LSB-pair is swapping pixels before using LSB replacement.

Figure 2:Swap pixels value before embedding

Figure 3:Swap pixels value after embedding

Algorithm 1:LSBs Extraction Require:Watermarked image Step 1:Initialize load watermarked image Step 2:cols:= n;Step 3:rows:= n;Step 4:for each i:= 1 do rows for each j:= 1 do cols ExtractedPixels;Nextpixel;end for end for Step 5: Transform Binary to Decimal;Step 6: Transform to String;Ensure:Secret matrix message

3.2 Extraction Phase

?Read a watermarked image after embedding a secret matrix message.

?Loop through every pixel in the image,one pixel at a time.

?The Least Significant Bit(LSB)location is stored in an array of extracted bits for each pixel.

?After the LSBs have been extracted from the requisite pixels,we must take each 8-bit extracted bits and transform them into the proper text.

4 Results and Discussion

To evaluate the proposed algorithm level of performance,experimental analyses were executed on MATLAB R2016a,Windows 10 development environment,3.5-GHz CPU with 4 GB RAM.We testedour methodology on a variety of medical images with dimensions of 512 × 512 using MRI cover images from a well-known data source1http://www.ehealthlab.cs.ucy.ac.cy/index.php/facilities/32-software/218-datasets..There are 38 directories in the data source folder which contains data for different patients.MRI images of two examinations are taken,one after the disease,and the second images were taken after six months of disease as shown in Fig.4.The proposed algorithm is evaluated under randomly selected MRI images.

Figure 4:MRI grayscale images dataset

4.1 Performance Evaluation

Embedding a watermark into the cover image introduces distortion.The performance of the proposed methodology is evaluated by comparing the level of distortion and secret data detectability to the public.To measure the level of distortion added into the cover image,the algorithm is evaluated using quality metrics Peak signal to noise ratio(PSNR),structural similarity index(SSIM),and mean squared error(MSE).The efficiency of the proposed methodology is properly analyzed by exposing it to different attacks.PSNR is primarily concerned with the pixel intensity between the cover image and watermarked image.The high PSNR value reveals that the cover image has undergone less distortion and improved the image’s quality.In[3],PSNR between the cover and watermarked image is calculated as:

where MSE is the mean square error,which is calculated in[3]as follows:

where m,n represents pixels size,O and S represent original and cover image,respectively.SSIM calculates cover image and watermarked image structural similarity,and It contains three functions,specifically:luminance(l),contrast(c),and structural(s)are used to compare similarity.SSIM value should ideally be similar to unity.SSIM is defined mathematically in[3]as:

Cover image and watermarked image are represented by the letters ‘S’and ‘Sw’.Normalized correlation(NC)aims to determine the robustness of the suggested reversible watermarking methodology by calculating similarities between the cover image and recovered watermarks when disclosed to an attack.This value should be more than 0.9 to retain attacks easily.In[3],we can find calculation of NC as,

wherestgindicates cover image andstg?indicates watermarked image while the mean value ofstgandstg?is represented byandrespectively.

4.2 Quantitative Performance Comparison

This section provides a detailed analysis of the suggested approach with other existing methodologies,including the traditional LSB algorithm.The experimental process was conducted by random images chosen from the data source and five standard images.Table 1 presents the performance metrics for 20 MRI medical images.The experiment of the PSNR,SSIM,and MSE reveals that watermarked images cannot be discriminated against by the human eye and are relatively imperceptible.The average PSNR value of 51.657 dB of twenty images shows an ideal performance,and the visual trend is represented in Fig.6.SSIM values are similar to 1,indicating high structural similarity between original and watermarked images.MRI5 attains a peak value of SSIM 0.988,and the average value of SSIM is 0.984.The average value of MSE is 0.444.NC is used to calculate the correlation of the cover image to the recovered watermark image.NC results are very close to 1,which represents the proposed approach resistance to attacks.Table 2 determines the suggested algorithm strength to various attacks.The table contains PSNR,SSIM,and NC metrics for randomly selected images ‘Image 1’,‘Image 9’,‘Image 11’,and ‘Image 19’subject to numerous attacks.The SSIM value of ‘Image 19’for cropping attack is 0.078,the comparison of the proposed scheme with the existing methodology.Table 3 shows the comparison of proposed scheme with existing methodology.The techniques have been compared with the methodology developed by Bailey et al.[29],Jassim[30],Karim et al.[31],Muhammad et al.[32],Rehman et al.[33],Siddiqui et al.[34],and Wazirali et al.[35].Bailey et al.[29–34]employ 104,857 bits to calculate the PSNR value.The performance of the watermarking is identified by embedding large secret data with a higher PSNR.

Table 1:Results of watermarked images of 512 × 512 dimension,having 32 KB embedding data size

Table 2:Imperceptibility and robustness evaluation under attacks

Table 3:PSNR results compared with the standard digital images when the image size is 512 × 512

Table 2(Continued)AttacksImage lImage 9Image 11Image 19 PSNR SSIM NCPSNR SSIM NCPSNR SSIM NCPSNR SSIM NC Salt&pepper noise(0.0002)39.726 0.987 0.999 38.014 0.967 0.998 41.264 0.992 0.999 39.855 0.978 0.999 Gaussian noise(0.0002)37.296 0.894 0.999 38.349 0.759 0.998 37.042 0.906 0.999 38.175 0.798 0.998 Gaussian noise(0.010,0.0002)35.071 0.831 0.998 35.011 0.538 0.997 35.236 0.885 0.999 35.096 0.604 0.997 Speckle noise(0.0001)46.706 0.990 1.000 47.887 0.974 0.999 45.032 0.990 0.999 47.323 0.981 0.999 Histogram equalization 8.696 0.285 0.866 5.891 0.115 0.641 11.324 0.462 0.927 7.042 0.170 0.748 Sharpening35.134 0.964 0.998 35.701 0.962 0.997 36.588 0.975 0.999 38.276 0.965 0.998 Gaussian filter(3×3)38.612 0.985 0.999 38.615 0.971 0.999 37.018 0.992 0.999 39.583 0.980 0.999 Median filter(3×3)30.064 0.938 0.994 30.053 0.948 0.989 27.605 0.966 0.994 30.501 0.954 0.992 Wiener filter(3×3)21.657 0.284 0.750 21.343 0.184 0.929 20.296 0.299 0.967 21.600 0.180 0.945 JPEG compression(80)40.074 0.953 0.999 41.540 0.919 0.998 41.655 0.980 0.999 42.199 0.938 0.999 JPEG compression(90)42.867 0.975 1.000 44.559 0.937 0.997 44.493 0.986 0.999 44.922 0.957 0.999 Rotattion216.656 0.545 0.853 16.429 0.661 0.745 15.044 0.460 0.885 17.819 0.677 0.856 Gamma correction(0.8)25.784 0.827 0.994 28.970 0.810 0.996 24.650 0.885 0.994 27.383 0.819 0.994 Scaling13.285 0.246 0.619 14.258 0.044 0.436 11.402 0.283 0.695 13.636 0.100 0.522 Cropping9.656 0.170 0.609 9.734 0.123 0.377 4.309 0.184 0.746 9.697 0.078 0.539 Shearing14.092 0.361 0.706 13.525 0.633 0.43 12.012 0.240 0.745 14.390 0.631 0.645 Motion blur21.644 0.714 0.954 21.746 0.741 0.926 20.707 0.715 0.969 23.086 0.794 0.958 Translation14.216 0.448 0.958 13.002 0.583 0.456 12.444 0.373 0.795 14.449 0.601 0.697

In[35],authors proposed the reversible watermarking technique by maximizing the secret data to 180,000 bits.The PSNR value of[35]methodology for standard images baboon and peppers shows better results.We performed our experiments by embedding 262,688 bits of secret data than these methodologies,and our algorithm outperforms.The average value of PSNR on standard images shown in Fig.5 Barbara,Baboon,Cameraman,Lena,and Peppers is 51.71 dB.Fig.7 shows a visual representation of the proposed scheme with existing methodologies.The PSNR values in[29–34]are measured employing 104,857 bits,whereas[35]increases the embedding capacity by hiding 180,000 bits.We outperform the existing techniques by employing 32 KB of patient data.

Figure 5:The sample set of standard cover images

Watermarking capacity quantifies the number of bits that can be embedded in a carrier image.According to distortion parameters,Fig.8 evaluates some of the current state-of-the-art methodologies discussed in this research with the suggested scheme.The proposed scheme has a high embedding of data with low distortion.If we maximize the number of embedding data,the proposed scheme shows robustness and human eyes cannot detect it.Wazirali et al.[35]shows an average PSNR of 51.37 with a maximum embedding capacity of 32 KB,The proposed scheme achieved a PSNR of 51.4 when hiding 36 KB.

Figure 6:PSNR values visual presentation

Figure 7:PSNR performance analysis visual representation of proposed scheme on the standard images with the state-of-the-art technique

Figure 8:Disortation comparison of various schemes cited in the paper

5 Conclusions

This article introduces a low-distortion reversible watermarking method suitable for remote medical image transmission.The core component of our method is to convert text information into secret matrix messages,embed low-distortion messages and extract messages from watermarked images.The proposed method has lower computational requirements because all processes are implemented in the spatial domain rather than the transform or frequency domain.When subjected to different attacks,the algorithm shows ideal resistance.For an MRI image with a size of 512 × 512,the average PSNR value is 51.657.Therefore,it can be said with certainty that the proposed reversible watermarking method will be effective in the medical field.In future work,the suggested method can be enhanced for color images.

Funding Statement:This work is supported by the National Natural Science Foundation of China(Grant 61762060),Educational Commission of Gansu Province,China(Grant 2017C-05),Foundation for the Key Research and Development Program of Gansu Province,China(Grant 20YF3GA016).

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

锡林郭勒盟| 车致| 五华县| 神池县| 申扎县| 宝丰县| 巨鹿县| 平江县| 晋州市| 日照市| 温泉县| 金山区| 新蔡县| 名山县| 麦盖提县| 河津市| 海宁市| 蕲春县| 镇远县| 察隅县| 嵩明县| 皋兰县| 万州区| 寿光市| 如东县| 油尖旺区| 丽江市| 清新县| 淮南市| 徐州市| 个旧市| 许昌县| 宁夏| 西乡县| 河北省| 石泉县| 襄汾县| 宁阳县| 徐闻县| 仲巴县| 祥云县|