Secure medical image watermarking based on reversible data hiding with Arnold's cat map

(1) * Aulia Arham Mail (Department of Information System, State Islamic University Imam Bonjol, Indonesia)
(2) Novia Lestari Mail (Department of Information System, State Islamic University Imam Bonjol, Indonesia)
*corresponding author

Abstract


The process of restoring medical images to their original form after the extraction process in application watermarking is crucial for ensuring their authenticity. Inaccurate diagnoses can occur due to distortions in medical images from conventional data embedding applications. To address this issue, reversible data hiding (RDH) method has been proposed by several researchers in recent years to embed data in medical images. After the extraction process, images can be restored to their original form with a reversible data-hiding method. In the past few years, several RDH methods have been rapidly developed, which are based on the concept of difference expansion (DE). However, it is crucial to pay attention to the security of the medical image watermarking method, the embedded data with RDH method can be easily modified, accessed, and altered by unauthorized individuals if they know the employed method. This research suggests a new approach to secure the RDH method through the use of Chaotic Map-based Arnold's Cat Map algorithms on the medical images. Data embedding was performed on random medical images using a DE method. Four gray-scale medical image modalities were used to assess the proposed method's efficacy. In our approach, we can incorporate capacity up to 0.62 bpp while maintaining a visual quality up to 41.02 dB according to PSNR and 0.9900 according to SSIM. The results indicated that it can enhance the security of the RDH method while retaining the ability to embed data and preserving the visual appearance of the medical images.

Keywords


Medical Image; Reversible Data Hiding; Difference Expansion; Chaotic Map; Arnold’s Cat Map.

   

DOI

https://doi.org/10.26555/ijain.v9i3.1029
      

Article metrics

Abstract views : 566 | PDF views : 100

   

Cite

   

Full Text

Download

References


[1] A. Arham and O. Secio Riza, “Reversible Data Hiding Using Hybrid Method of Difference Expansion on Medical Image,” J. Ilm. Tek. Elektro Komput. dan Inform., vol. 6, no. 2, p. 11, Jan. 2021, doi: 10.26555/jiteki.v6i2.16965.

[2] A. Arham, H. A. Nugroho, and T. B. Adji, “Multiple Layer Data Hiding Scheme Based on Difference Expansion of Quad,” Signal Processing, vol. 137, pp. 52–62, 2017, doi: 10.1016/j.sigpro.2017.02.001.

[3] A. Arham, H. A. Nugroho, and T. B. Adji, “Combination schemes Reversible Data Hiding for medical images,” in Science and Technology-Computer (ICST), International Conference on, 2016, pp. 44–49, doi: 10.1109/ICSTC.2016.7877345.

[4] W. Wang, “A reversible data hiding algorithm based on bidirectional difference expansion,” Multimed. Tools Appl., vol. 79, no. 9, pp. 5965–5988, 2020, doi: 10.1007/s11042-019-08255-z.

[5] M. Nazari and M. Mehrabian, “A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images,” Multimed. Tools Appl., vol. 80, no. 7, pp. 10615–10655, 2021, doi: 10.1007/s11042-020-10032-2.

[6] K. Balasamy and S. Suganyadevi, “A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD,” Multimed. Tools Appl., vol. 80, no. 5, pp. 7167–7186, 2021, doi: 10.1007/s11042-020-09981-5.

[7] E. E.-D. Hemdan, “An efficient and robust watermarking approach based on single value decompression, multi-level DWT, and wavelet fusion with scrambled medical images,” Multimed. Tools Appl., vol. 80, no. 2, pp. 1749–1777, 2021, doi: 10.1007/s11042-020-09769-7.

[8] A. Al-Haj and H. Abdel-Nabi, “An efficient watermarking algorithm for medical images,” Multimed. Tools Appl., vol. 80, no. 17, pp. 26021–26047, 2021, doi: 10.1007/s11042-021-10801-7.

[9] R. Thanki and S. Borra, “Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing,” Multimed. Tools Appl., vol. 78, no. 10, pp. 13905–13924, 2019, doi: 10.1007/s11042-018-6746-2.

[10] R. Thanki and A. Kothari, “Multi-level security of medical images based on encryption and watermarking for telemedicine applications,” Multimed. Tools Appl., vol. 80, no. 3, pp. 4307–4325, 2021, doi: 10.1007/s11042-020-09941-z.

[11] A. K. Singh, “Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image,” Multimed. Tools Appl., vol. 78, no. 21, pp. 30523–30533, 2019, doi: 10.1007/s11042-018-7115-x.

[12] F. Sabbane and H. Tairi, “Medical image watermarking technique based on polynomial decomposition,” Multimed. Tools Appl., vol. 78, no. 23, pp. 34129–34155, 2019, doi: 10.1007/s11042-019-08134-7.

[13] T.-C. Lu and T. N. Vo, “Introduction of Reversible Data Hiding Schemes,” in International Conference on Security with Intelligent Computing and Big-data Services, 2019, pp. 170–183, doi: 10.1007/978-3-030-46828-6_15.

[14] G. Gao, S. Tong, Z. Xia, B. Wu, L. Xu, and Z. Zhao, “Reversible data hiding with automatic contrast enhancement for medical images,” Signal Processing, vol. 178, p. 107817, 2021, doi: 10.1016/j.sigpro.2020.107817.

[15] S. Weng, W. Tan, B. Ou, and J.-S. Pan, “Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm,” Inf. Sci. (Ny)., vol. 549, pp. 13–33, 2021, doi: 10.1016/j.ins.2020.10.063.

[16] P. Maniriho, L. J. Mahoro, Z. Bizimana, E. Niyigaba, and T. Ahmad, “Reversible difference expansion multi-layer data hiding technique for medical images,” Int. J. Adv. Intell. Informatics, vol. 7, no. 1, pp. 1–11, 2021, doi: 10.26555/ijain.v7i1.483.

[17] Z. Syahlan and T. Ahmad, “Reversible data hiding method by extending reduced difference expansion,” Int. J. Adv. Intell. Informatics, vol. 5, no. 2, pp. 101–112, 2019, doi: 10.26555/ijain.v5i2.351.

[18] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, 2003, doi: 10.1109/TCSVT.2003.815962.

[19] T.-S. Nguyen, V.-T. Huynh, and P.-H. Vo, “A Novel Reversible Data Hiding Algorithm Based on Enhanced Reduced Difference Expansion,” Symmetry (Basel)., vol. 14, no. 8, p. 1726, 2022, doi: 10.3390/sym14081726.

[20] Y. Samudra and T. Ahmad, “Improved prediction error expansion and mirroring embedded samples for enhancing reversible audio data hiding,” Heliyon, vol. 7, no. 11, p. e08381, 2021, doi: 10.1016/j.heliyon.2021.e08381.

[21] A. J. Ilham and T. Ahmad, “Reversible Data Hiding Scheme based on General Difference Expansion Cluster,” Int. J. Adv. Soft Comput. Appl., vol. 12, no. 3, pp. 12-24, 2020. [Online]. Available at: http://188.247.81.52/.

[22] C.-F. Lee, J.-J. Shen, and C.-Y. Wu, “Hiding Scheme based on Improved Reduced Difference Expansion in Multi-block Shape,” in Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceeding of the IIH-MSP 2021 & FITAT 2021, Kaohsiung, Taiwan, Volume 2, Springer, 2022, pp. 297–310, doi: 10.1007/978-981-19-1053-1_27.

[23] T. Ahmad, H. I. Dewangkoro, W. Wibisono, and R. M. Ijtihadie, “Protecting Data by Improving the Performance of Controlling Expansion Method,” in Advances in Cyber Security: Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers 2, 2021, pp. 577–587, doi: 10.1007/978-981-33-6835-4_38.

[24] N. J. de La Croix, C. C. Islamy, and T. Ahmad, “Reversible Data Hiding using Pixel-Value-Ordering and Difference Expansion in Digital Images,” in 2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), 2022, pp. 33–38, doi: 10.1109/COMNETSAT56033.2022.9994516.

[25] A. Mehbodniya et al., “Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm,” Processes, vol. 10, no. 5, p. 858, 2022, doi: 10.3390/pr10050858.

[26] P. Maniriho and T. Ahmad, “Information hiding scheme for digital images using difference expansion and modulus function,” J. King Saud Univ. Inf. Sci., vol. 31, no. 3, pp. 335–347, 2019, doi: 10.1016/j.jksuci.2018.01.011.

[27] P. Maniriho and T. Ahmad, “Enhancing the Capability of Data Hiding Method Based on Reduced Difference Expansion.,” Eng. Lett., vol. 26, no. 1, p. 11, 2018. [Online]. Available at: https://www.researchgate.net/profile/Pascal-.

[28] C.-F. Lee, J. J. Shen, and Y. H. Lai, “Data hiding using multi-pixel difference expansion,” in 2018 3rd International Conference on Computer and Communication Systems (ICCCS), 2018, pp. 56–60, doi: 10.1109/CCOMS.2018.8463244.

[29] P. C. Mandal, I. Mukherjee, and B. N. Chatterji, “High capacity reversible and secured data hiding in images using interpolation and difference expansion technique,” Multimed. Tools Appl., vol. 80, no. 3, pp. 3623–3644, 2021, doi: 10.1007/s11042-020-09341-3.

[30] X. Wu, T. Qiao, M. Xu, and N. Zheng, “Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling,” Signal Processing, vol. 188, p. 108200, 2021, doi: 10.1016/j.sigpro.2021.108200.

[31] A. Meenpal and S. Majumder, “Image content based secure reversible data hiding scheme using block scrambling and integer wavelet transform,” Sādhanā, vol. 47, no. 2, p. 54, 2022, doi: 10.1007/s12046-022-01828-z.

[32] M. Fadhil et al., “Secure Reversible Data Hiding in the Medical Image using Histogram Shifting and RC4 Encryption,” in 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), 2019, pp. 1–6, doi: 10.1109/ISEMANTIC.2019.8884306.

[33] S. Kukreja and G. Kasana, “A secure reversible data hiding scheme for digital images using random grid visual secret sharing,” in 2019 Amity International Conference on Artificial Intelligence (AICAI), 2019, pp. 864–869, doi: 10.1109/AICAI.2019.8701360.

[34] M. Nasir et al., “Secure Reversible Data Hiding in Images Based on Linear Prediction and Bit-Plane Slicing,” Mathematics, vol. 10, no. 18, p. 3311, 2022, doi: 10.3390/math10183311.

[35] S. Kamil Khudhair, M. Sahu, R. KR, and A. K. Sahu, “Secure Reversible Data Hiding Using Block-Wise Histogram Shifting,” Electronics, vol. 12, no. 5, p. 1222, 2023, doi: 10.3390/electronics12051222.

[36] A. K. Sahu, “A logistic map based blind and fragile watermarking for tamper detection and localization in images,” J. Ambient Intell. Humaniz. Comput., vol.13, no. 8, pp. 3869-3881, 2021, doi: 10.1007/s12652-021-03365-9.

[37] “Partners Infectious Disesase Images, Emicrobes Digital Library.”. [Online]. Available at: https://cfar.globalhealth.harvard.edu/pages/partners-infectious-disease-images.




Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

___________________________________________________________
International Journal of Advances in Intelligent Informatics
ISSN 2442-6571  (print) | 2548-3161 (online)
Organized by UAD and ASCEE Computer Society
Published by Universitas Ahmad Dahlan
W: http://ijain.org
E: info@ijain.org (paper handling issues)
   andri.pranolo.id@ieee.org (publication issues)

View IJAIN Stats

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0