You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly.
Go to headerGo to navigationGo to searchGo to contentsGo to footer
In content section. Select this link to jump to navigation

Medical image watermarking using bit threshold map based on just noticeable distortion in discrete cosine transform

Abstract

BACKGROUND:

Medical images stored in a hospital system are generally confidential and integrated and require strict security. However, medical information stored on digital medical imaging systems, as well as picture archiving and communication systems (PACS), are vulnerable to attack when the data are transferred over wireless or wired communication networks.

OBJECTIVE:

To solve this problem, a watermarking algorithm for medical images is proposed using a bit threshold map based on just noticeable distortion (JND) in the discrete cosine transform (DCT) method.

METHODS:

The low-frequency component comprises a considerable amount of the signal energy for most images. As a result, it has a crucial effect on the image quality. Therefore, in this paper, the proposed algorithm embeds watermarks based on the low-frequency components of the image, such as the DC coefficient of the DCT.

RESULTS:

When watermarks are embedded in a low frequency area, the subjective image quality is often degraded. To compensate for the degradation of the imperceptibility of the watermarking system, which results from embedding watermarks in the low-frequency component, this research considers the human visual system. In addition, the embedding strength of the JND value is used to improve the watermarking imperceptibility.

CONCLUSIONS:

We applied the proposed watermarking algorithm to a variety of medical images using a computer simulation. The algorithm’s performance was verified using a variety of attacks for eliminating watermarks. The simulation results show that the proposed algorithm robustly provides protection against a variety of possible attacks.

1.Introduction

Digital image watermarking is an effective method in copyright protection. In watermarking technology, the robustness of the technology against attacks is key. A digital image watermarking system is generally similar to a communication system composed of three main elements: a watermark embedder, communication channel, and watermark detector. The embedder and detector are typically more attractive to researchers [1]. Researchers additionally consider the design properties of the digital watermarking system, as shown in Eq. (1), which is used to embed the watermark in frequency domain images [2].

(1)
vi=vi+αxi,

where vi denotes the discrete cosine transform (DCT) coefficients after conducting the watermarking process, vi denotes the DCT coefficients before the watermarking process is conducted, α is the control parameter, and xi denotes the binary values of the watermark.

Today, medical images containing information relating to the health of patients are widely used in patient diagnosis. However, owing to the large data size of medical images, high-quality telemetry communication technology is required for their transfer. Network safety is also significant when transferring medical images. To prevent security problems from occurring, the host medical image can be watermarked with patient information. The cover images used a watermark of encoded patient data that is not detectable before being transferred over the network. The doctor can then check whether the watermark is inserted before proceeding with the diagnosis; moreover, the watermark should not interfere with the image. This application is essential for telemedicine [3, 4].

The significant demand for these technologies has prompted the advancement of watermarking techniques that can be applied to various medical imaging media. Numerous medical image watermarking schemes in the frequency domain have been proposed [5]. More robust methods have been developed for frequency-domain-based watermarking scheme filtering and geometry attacks than for spatial-domain-based watermarking techniques. The fusion-based watermarking technique has also been studied [6, 7]. This technique prevents the distortion of the information contained in the noise added to the original image. Moreover, in 2014, Bose et al. proposed a method for biomedical applications of watermarking algorithms [8] in medical video watermarking systems. In 2014, Eswaraiah et al. presented a fragile region of interest (ROI)-based medical image watermarking technique using tampering detection and recovery [9]. The algorithm stored in the ROI of the fragile watermark information of the least significant bit (LSB) and enhanced ROI is part of the recovery without loss. Furthermore, the run-length coding scheme is used to improve filling capacity.

The most important aspect of the watermarking technique is determining the strength of the watermark insertion. To resist normal signal processing and related attacks, the embedding strength should be as high as possible. However, because the watermark directly affects the host image, the higher the embedding strength, the lower is the quality of the watermarked image. In other words, the robustness and imperceptibility of the watermark are inversely proportional. In addition, when improving invisibility of the embedded watermark, the human visual system (HVS) model must be considered. In this way, the strength of the watermark can be adapted to the features of the host image to guarantee the maximum-possible imperceptibility of the watermark [10, 11]. These technologies are utilized in information security technologies and testing techniques using images in industry, not just in the medical field. In particular, the use of the non-destructive testing technique of C-SCAN using an ultrasound image, and increase in industrial automation, as image processing techniques applied has been applied to security and inspection.

In this paper, we present a medical image watermarking algorithm using DCT and the just noticeable distortion (JND) method based on HVS. To improve the imperceptibility of the watermarking system, a JND mask based on the HVS model is used. In DCT, the domain of the discrete decomposed image has the highest energy in the host image; therefore, it has a crucial effect on the image quality. Conventional DCT watermarking algorithms do not utilize the baseband to retain invisibility. That is, they do not utilize the characteristics of the DC coefficients that participate in the watermark embedding. Therefore, their robustness deteriorates when facing various attacks. Thus, to reduce the limitations of the conventional algorithms, the proposed algorithm uses the DC coefficients in the watermark-embedding step. In addition, because embedding the watermark in the DC coefficients degrades the invisibility, this algorithm includes the JND mask as the embedding strength to compensate for the invisibility degradation.

2.Proposed watermarking methods

2.1Overview of proposed method

To embed watermarks in the low-frequency components of the original image, the proposed algorithm uses a 4 × 4 block DCT. Numerous DC coefficients are generated using a 4 × 4 block DCT in the original image. As a result, a large amount of the embedded watermark is robust to attack. However, the correct approach does not unconditionally increase the number of DC coefficients to reduce the amount of sub-sampling of the DCT block. Using a computer simulation, we confirmed that the 4 × 4 block DCT optimizes the trade-off between capacity and performance in resisting watermark attacks.

The proposed method changes the lower bits of a DC coefficient to embed a watermark, and one watermark bit is embedded in the DC coefficient of each block. To determine the number of lower bits needed for a DC coefficient to embed a watermark, a JND from a self-reference image is used as the embedding strength of the watermark. In the watermark extraction process, this method can extract watermarks using the lower bits of a DC coefficient for each block in the watermarked image. A block diagram of the proposed method is shown in Fig. 1.

Figure 1.

Block diagram of the proposed medical image watermarking process: (a) embedding process, (b) detecting process.

Block diagram of the proposed medical image watermarking process: (a) embedding process, (b) detecting process.

2.2Discrete cosine transformation

DCT is a widely used transformation technique for image processing of various types. Through DCT, spatial domain data can be transformed into the frequency domain, while frequency domain data can be transformed back to the spatial domain using the inverse DCT (IDCT). The DCT formulas [12] are as follows:

(2)
D(i,j)=12NC(i)C(j)x=0N-1y=0N-1f(x,y)×cos[(2x+1)iπ2N]cos[(2y+1)jπ2N]
y(x,y)=12Ni=0N-1j=0N-1C(i)C(j)D(i,j)×cos[(2x+1)iπ2N]cos[(2y+1)jπ2N]
(3)
whereC(k)={12ifk=0,1ifk=1,2,,N-1.

In the above formulas, f(x, y) stands for the pixel value at position (x, y), D(i,j) represents the coefficient value in frequency domain position (i, j), and N denotes the length or width of the image. The coefficient at the top left corner of the frequency domain matrix represents the DC value of the image’s frequency domain. The remaining parts are the AC values, with the absolute value of the AC in each position representing the magnitude of the energy.

2.3Just noticeable distortion

HVS is an important aspect of subjective image quality. Therefore, the subjective image quality can be improved by reflecting human visual characteristics. This capability is increasingly being studied [13, 14]. Human visual characteristics can be divided into human visual sensitivity and visual interest. HVS includes various characteristics of luminance adaptive motion and contrast sensitivity. Regarding these characteristics, Chou’s JND model [13] is mathematically constructed as a subjective quality correlation, which is characterized by the highest luminance adjustment.

For this reason, Chou’s JND model was selected for this study to embed the watermarks. JND refers to the maximum distortion that the HVS cannot perceive. It plays an important role in perceptual image processing. Chou’s JND model is employed to quantify the perceptual redundancy and provide each signal being coded with a visibility distortion threshold. Below this threshold, reconstruction errors are rendered imperceptible [15, 16, 17]. This model analyzes the local properties of image signals to incorporate threshold sensitivities due to background luminance and texture-masking effects. The model is estimated by analyzing local properties of image signals.

2.4Bit threshold map

This study uses the JND value and bit threshold map (BTM) for the watermark embedding strength and position. By referencing the bit threshold value of each block, a watermark is embedded or extracted from the lower bits of the DC coefficient. A block diagram of the bit threshold map is shown in Fig. 3. As shown in the block diagram, a BTM is generated by executing Step 4.

Figure 2.

Block diagram of bit threshold map.

Block diagram of bit threshold map.
Figure 3.

Example of calculating the bit threshold in each block.

Example of calculating the bit threshold in each block.

  • Step 1. Generate a self-reference image with parts of the low-frequency component in the original image.

  • Step 2. Apply Chou’s luminance mask to generate the JND matrix for the self-reference image.

  • Step 3. Decompose the JND matrix into a 4 × 4 block without overlap and apply DCT to each block.

  • Step 4. Use the DC coefficient to generate a BTM. Calculate the bit-threshold value in the DC coefficient using Eq. (4).

(4)
2m<DC(i,j)2m+1,where  0iH/4and  0jW/4

where DC(i,j) is the DC coefficient of the JND matrix, H and W represent the height and width of the matrix, respectively, and m represents the bit threshold for dividing each block.

In the proposed method, a one-bit threshold is generated per block; the bit threshold map is H/4 × W/4 of the matrix. Figure 3 shows an example of calculating the bit threshold in each block.

Figure 4.

Example of embedding the watermark in each block.

Example of embedding the watermark in each block.

Figure 5.

Example of the proposed watermark generation method and selected medical images in the simulation: (a) watermark generation and (b) MRI, (c) CT, and (d) X-ray images.

Example of the proposed watermark generation method and selected medical images in the simulation: (a) watermark generation and (b) MRI, (c) CT, and (d) X-ray images.

3.Simulation

3.1Proposed watermarking algorithm

3.1.1Watermark embedding algorithm

To embed watermarks in the low-frequency components of the original image, the proposed algorithm uses a 4 × 4 block DCT. This algorithm changes the lower bits of the DC coefficient to embed the watermark. A watermark bit is embedded in the DC coefficient of each block. To determine the number of lower bits needed for the DC coefficient to embed a watermark, a JND from a self-reference image is used as the embedding strength of the watermarks. If the determined number of lower bits of a DC coefficient is n, the corresponding n-1 lower bits are changed to 0, and the nth lower bit is replaced with a watermark bit.

3.1.2Watermark detecting algorithm

In the watermark extraction process, the algorithm can extract watermarks using the lower bits of the DC coefficient of each block in the watermarked image. Medical image watermark extraction is similar to reversing the watermark-embedding process. First, the image is decomposed into non-overlapping 4 × 4 blocks. The DCT is calculated to estimate where the watermark should be inserted. Extracting the watermark from the DC coefficient of the block results in a bit threshold value for each block. Second, in referencing the bit threshold value of each block, the watermark is extracted from the lower bits of the DC coefficient. If the bit threshold value of the block is m, the formula for extracting the watermark inserted in the DC coefficient is

DC(i,j)=aL2L++am×2m+am-1×2m-1++a0×20
𝑤𝑎𝑡𝑒𝑟𝑚𝑎𝑟𝑘=amam-1
(5)
where  0iH/4and  0jW/4

Finally, the extended watermark in the watermark bits is obtained for the entire block. A mean function is used in the expanded watermark to extract the final watermark.

3.2Evaluation methods

The performance of the proposed algorithm was tested on various image types. The test images included medical resonance imaging (MRI), computed tomography (CT), ultrasonic and X-ray images. The images were 512 × 512 pixels [18]. In the simulation, a 4 × 4 block was used for the DCT. The watermarks were 32 × 32 binary logos extended to 128 × 128. The peak-to-peak signal-to-noise ratio (PSNR) was used to analyze the quality of the watermarked image. The PSNR is defined as

(6)
𝑃𝑆𝑁𝑅=10log102552𝑀𝑆𝐸,𝑀𝑆𝐸=1MNi=1Mj=1N((Ii,j-Ii,j)2),

where I and I represent the host image and watermarked image, respectively, and M and N represent the image height and width, respectively.

The amount of mismatched data between the embedded watermark and extracted watermark is used to quantify the similarity of the watermarks. The normalized correlation (NC) of the embedded watermark and extracted watermark is defined as follows:

(7)
NC=i,jwi,jwi,j/i,jwi,j2,

where w and w respectively represent the embedded watermark and extracted watermark.

4.Results and discussion

A checkmark attack tool was used to evaluate the robustness of the proposed watermarking algorithm. We invoked three types of attacks: JPEG compression, various filters, and a crop method. The simulation results of a comparison of the PSNR value of the proposed method with conventional methods for invisibility evaluation are shown in Table 1. The sample images processed by the proposed method have higher invisibility than those processed by the conventional method. The higher invisibility is assumed to be on account of the HVS based on DC coefficients being changed to prevent quality degradation.

Table 1

PSNR values of the watermarked images processed by the proposed method and conventional method

ImageMRICTX-ray
MethodProposed methodLiu’s methodProposed methodLiu’s methodProposed methodLiu’s method
PSNR(dB)44.4039.2344.5338.5644.9937.36

Figure 6.

Attacked watermarked MRI images: (a) Gaussian noise, (b) median filter, (c) Wiener filter, (d) midpoint filter, (e) resampling, (f) sharpening, (g) trimmed mean filtering, (h) salt and pepper noise, (i) crop 25%, (j) crop 50%, (k) JPEG compression 10%, (l) JPEG compression 30%, (m) JPEG compression 50%, and (n) JPEG compression 70%.

Attacked watermarked MRI images: (a) Gaussian noise, (b) median filter, (c) Wiener filter, (d) midpoint filter, (e) resampling, (f) sharpening, (g) trimmed mean filtering, (h) salt and pepper noise, (i) crop 25%, (j) crop 50%, (k) JPEG compression 10%, (l) JPEG compression 30%, (m) JPEG compression 50%, and (n) JPEG compression 70%.

Visual analysis of the attacked watermarked image is shown in Fig. 6. Fourteen types of attack filtering, such as Gaussian noise, median filter, and Wiener filter, were used to evaluate the robustness of the proposed method compared to that of the conventional method. The results show that lower robustness against filters involves an emphasis in high frequency filtering, such as sharpening. However, the NC value is higher in the proposed method than in the conventional method, which indicates that the proposed algorithm has high robustness in protecting against the majority of attack filters.

The extracted watermark images and NC values of the proposed method and conventional method were obtained from the attacked watermarked medical images. These are shown in Table 2.

Table 2

Extracted watermark images and NC values according to various attacks for test embedded watermark images using the proposed and conventional methods

ImagesMRICTX-ray
MethodProposedLiu’sProposedLiu’sProposedLiu’s
methodmethodmethodmethodmethodmethod
AttackNC w NC w NC w NC w NC w NC w
Gaussian noise0.99 thc-25-thc1340-t001.jpg 0.80 thc-25-thc1340-t002.jpg 0.98 thc-25-thc1340-t003.jpg 0.71 thc-25-thc1340-t004.jpg 0.80 thc-25-thc1340-t005.jpg 0.69 thc-25-thc1340-t006.jpg
Median (3 × 3)0.98 thc-25-thc1340-t007.jpg 0.07 thc-25-thc1340-t008.jpg 0.97 thc-25-thc1340-t009.jpg 0.12 thc-25-thc1340-t010.jpg 0.99 thc-25-thc1340-t011.jpg 0.12 thc-25-thc1340-t012.jpg
Wiener (3 × 3)0.98 thc-25-thc1340-t013.jpg 0.17 thc-25-thc1340-t014.jpg 0.94 thc-25-thc1340-t015.jpg 0.22 thc-25-thc1340-t016.jpg 0.94 thc-25-thc1340-t017.jpg 0.20 thc-25-thc1340-t018.jpg
Midpoint0.95 thc-25-thc1340-t019.jpg 0.15 thc-25-thc1340-t020.jpg 0.96 thc-25-thc1340-t021.jpg 0.20 thc-25-thc1340-t022.jpg 0.85 thc-25-thc1340-t023.jpg 0.29 thc-25-thc1340-t024.jpg
Resampling0.98 thc-25-thc1340-t025.jpg 0.33 thc-25-thc1340-t026.jpg 0.97 thc-25-thc1340-t027.jpg 0.24 thc-25-thc1340-t028.jpg 0.94 thc-25-thc1340-t029.jpg 0.23 thc-25-thc1340-t030.jpg
Sharpening0.16 thc-25-thc1340-t031.jpg 0.35 thc-25-thc1340-t032.jpg 0.16 thc-25-thc1340-t033.jpg 0.29 thc-25-thc1340-t034.jpg 0.53 thc-25-thc1340-t035.jpg 0.55 thc-25-thc1340-t036.jpg
Trimmed mean0.92 thc-25-thc1340-t037.jpg 0.78 thc-25-thc1340-t038.jpg 0.99 thc-25-thc1340-t039.jpg 0.75 thc-25-thc1340-t040.jpg 0.83 thc-25-thc1340-t041.jpg 0.70 thc-25-thc1340-t042.jpg
Salt & pepper noise0.99 thc-25-thc1340-t043.jpg 0.56 thc-25-thc1340-t044.jpg 0.95 thc-25-thc1340-t045.jpg 0.50 thc-25-thc1340-t046.jpg 0.90 thc-25-thc1340-t047.jpg 0.47 thc-25-thc1340-t048.jpg
JPEG compression 70%1.00 thc-25-thc1340-t049.jpg 0.89 thc-25-thc1340-t050.jpg 1.00 thc-25-thc1340-t051.jpg 0.95 thc-25-thc1340-t052.jpg 1.00 thc-25-thc1340-t053.jpg 0.83 thc-25-thc1340-t054.jpg
JPEG compression 50%1.00 thc-25-thc1340-t055.jpg 0.50 thc-25-thc1340-t056.jpg 0.99 thc-25-thc1340-t057.jpg 0.60 thc-25-thc1340-t058.jpg 0.92 thc-25-thc1340-t059.jpg 0.55 thc-25-thc1340-t060.jpg
JPEG compression 30%0.69 thc-25-thc1340-t061.jpg 0.25 thc-25-thc1340-t062.jpg 0.88 thc-25-thc1340-t063.jpg 0.30 thc-25-thc1340-t064.jpg 0.55 thc-25-thc1340-t065.jpg 0.38 thc-25-thc1340-t066.jpg
JPEG compression 10%0.01 thc-25-thc1340-t067.jpg 0.11 thc-25-thc1340-t068.jpg 0.30 thc-25-thc1340-t069.jpg 0.15 thc-25-thc1340-t070.jpg 0.41 thc-25-thc1340-t071.jpg 0.18 thc-25-thc1340-t072.jpg
Crop 25%1.00 thc-25-thc1340-t073.jpg 0.65 thc-25-thc1340-t074.jpg 1.00 thc-25-thc1340-t075.jpg 0.74 thc-25-thc1340-t076.jpg 1.00 thc-25-thc1340-t077.jpg 0.78 thc-25-thc1340-t078.jpg
Crop 50%0.53 thc-25-thc1340-t079.jpg 0.49 thc-25-thc1340-t080.jpg 0.58 thc-25-thc1340-t081.jpg 0.47 thc-25-thc1340-t082.jpg 0.58 thc-25-thc1340-t083.jpg 0.51 thc-25-thc1340-t084.jpg

5.Conclusion

In this paper, we proposed a medical image watermarking algorithm that employs a bit threshold map based on JND in DCT methods. This technique for embedding and extracting a watermark based on the DC coefficients in the low frequency region of the DCT have been described. Because the low frequency comprises most energy of the original image, it crucially affects the image quality. The proposed algorithm depends on the bit threshold map based on the JND of the image. The watermark is automatically embedded in the DC coefficient. This has a considerable effect on robustness and image quality. Moreover, it provides excellent invisibility because it considers the HVS when embedding the watermark. We performed a simulation evaluation to verify the robustness of the proposed method. The robustness was confirmed by embedding the watermark in the low-frequency component of the DC coefficient. The results show that the proposed approach is robust against a variety of attacks.

In our future work, we intend to develop an ultrasonic scanning non-destructive testing (NDT) technique [19] to enhance the processing performance and reliability.

Conflict of interest

None to report.

Acknowledgments

This research was supported by the Ministry of Trade, Industry & Energy (MOTIE), Korea Institute for advancement of Technology (KIAT) through the Encouragement Program for The Industries of Economic Cooperation Region.

References

[1] 

Cox IJ, et al. Secure spread spectrum watermarking for multimedia. Image Processing, IEEE Transactions on 6: .12 ((1997) ): 1673-1687.

[2] 

Yen CT, and Huang YJ. Frequency domain digital watermark recognition using image code sequences with a back-propagation neural network. Multimedia Tools and Applications ((2015) ): 1-11.

[3] 

Smith AC, et al. Telemedicine and rural health care applications. Journal of Postgraduate Medicine 51: .4 ((2005) ): 286.

[4] 

Anan D, and Niranjan UC. Watermarking medical images with patient information. Engineering in Medicine and Biology Society, 1998. Proceedings of the 20th Annual International Conference of the IEEE. Vol. 2. IEEE, ((1998) ).

[5] 

Miao S, et al. Robust watermarking for medical images based on Arnold scrambling and DWT-DFT. Computing and Convergence Technology (ICCCT), 2012 7th International Conference on. IEEE, ((2012) ).

[6] 

Viswanathan P, and Venkata Krishna P. Text fusion watermarking in medical image with semi-reversible for secure transfer and authentication. Advances in Recent Technologies in Communication and Computing, 2009. ARTCom’09. International Conference on. IEEE, ((2009) ).

[7] 

Kunhu A, Taher F, and Al-Ahmad H. A new multi watermarking algorithm for medical images using DWT and hash functions. Innovations in Information Technology (IIT), 2015 11th International Conference on. IEEE, ((2015) ).

[8] 

Bose S, et al. Multi-thread video watermarking: A biomedical application. Circuits, Communication, Control and Computing (I4C), 2014 International Conference on. IEEE, ((2014) ).

[9] 

Eswaraiah R, and Sreenivasa Reddy E. A Fragile ROI-Based Medical Image Watermarking Technique with Tamper Detection and Recovery. Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on. IEEE, ((2014) ).

[10] 

Sridevi T, and Sameena Fathima S. Watermarking Algorithm based using Genetic Algorithm and HVS. International Journal of Computer Applications 74: .13 ((2013) ).

[11] 

Singh AK, Kumar B, Dave M et al. Digital Image Watermarking: Techniques and Emerging Applications. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security ((2016) ): 246.

[12] 

Lim JS, Two-Dimensional Signal Processing. Englewood Cliffs, NJ: Prentice-Hall, ((1990) ).

[13] 

Chou CH, and Li YC. A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile. Circuits and Systems for Video Technology, IEEE Transactions on 5: .6 ((1995) ): 467-476.

[14] 

Goferman S, Zelnik-Manor L, and Tal A. Context-aware saliency detection. Pattern Analysis and Machine Intelligence, IEEE Transactions on 34: .10 ((2012) ): 1915-1926.

[15] 

Barni M, and Bartolini F, et al. Watermarking systems engineering: enabling digital assets security and other applications. CRC Press, ((2004) ).

[16] 

Liu JL, et al. A robust watermarking scheme using self-reference image. Computer Standards & Interfaces 28: .3 ((2006) ): 356-367.

[17] 

Qi H, Zheng D, and Zhao J. Human visual system based adaptive digital image watermarking. Signal Processing 88: .1 ((2008) ): 174-188.

[18] 

Medical image; data characteristics: http//siim.org/?page=archiving_chapter2.

[19] 

Athi N, et al. Ultrasonic non-destructive evaluation for spot welding in the automotive industry. Sensors, 2009 IEEE. IEEE, ((2009) ).