A Blind Fragile Based Medical Image Authentication Using Schur Decomposition

  • Abdallah Soualmi
  • Adel AltiEmail author
  • Lamri Laouamer
  • Morad Benyoucef
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 921)


Image watermarking is an effective and powerful solution in multimedia security. Imperceptibility and less computational complexity are the most desirable properties for any watermarking approach. For that purpose, several fragile watermarking based methods have been proposed in the last decade. Many of those methods suffer from low ratios of imperceptibility. In order to authenticate medical images, this paper proposes a new blind fragile watermarking method using Schur decomposition. Indeed, perturbation due to watermark embedding is reduced using Schur decomposition, which can be considered in designing a watermarking approach to enhance imperceptibility and computational complexity. The main idea is to embed the watermark in the Schur decomposition coefficients of the host image using a new embedding technique. The experiments results show interesting values of imperceptibility with low computational complexity.


Fragile watermarking Authentication Integrity Blind watermarking Schur decomposition Medical image 


  1. 1.
    Al-shaikh, M.: Protection des contenue des images médicales par camouflage d’information secrète pour l’aide à la télémédecine, Ph.D thesis (2016)Google Scholar
  2. 2.
    Saini, S.: A survey on watermarking web contents for protecting copyright. In: The IEEE Second International Conference on Innovations in Information Embedded and Communication Systems ICIIECS, pp. 1–4. IEEE (2015)Google Scholar
  3. 3.
    Su, Q., Niu, Y., Wang, Q., Sheng, G.: A blind color image watermarking based on DC component in the spatial domain. Optik Int. J. Light Electron Opt. 124(23), 6255–6260 (2013)CrossRefGoogle Scholar
  4. 4.
    Mohammad, A.: A new digital image watermarking scheme based on Schur decomposition. Multimed. Tools Appl. 59, 851–883 (2012)CrossRefGoogle Scholar
  5. 5.
    Golub, G.H., Van Loan, C.F.: Matrix Computations. Johns Hopkins Univ Press, Baltimore (1989)zbMATHGoogle Scholar
  6. 6.
    Kamran, A., Khan, A., Malik, S.: A high capacity reversible watermarking approach for authenticating images: Exploiting down-sampling, histogram processing, and block selection. Inf. Sci. 256, 162–183 (2014)CrossRefGoogle Scholar
  7. 7.
    Agarwal, H., Raman, B., Venkat, I.: Blind reliable invisible watermarking method in wavelet domain for face image watermark. Multimed. Tools Appl. 74(17), 6897–6935 (2014)CrossRefGoogle Scholar
  8. 8.
    Kurniawan, F., Khalil, M.S., Khan, M.K., Alginahi, Y.M.: DWT + LSB-based fragile watermarking method for digital Quran images. In: International Symposium on Biometrics and Security Technologies (ISBAST), pp. 290–297. IEEE (2014)Google Scholar
  9. 9.
    Khalil, M.S., Kurniawan, F., Khan, M.K., Alginahi, Y.M.: Two-layer fragile watermarking method secured with chaotic map for authentication of digital holy Quran. Sci. World J. 1–29 (2014)Google Scholar
  10. 10.
    Lin, C., Liu, X.L., Lin, C.H., Yuan, S.M.: Fragile watermarking-based authentication scheme for demosaicked images. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 97–100. IEEE (2015)Google Scholar
  11. 11. Accessed 15 Oct 2018
  12. 12.
  13. 13.
    Pinjari, S.A., Patil, N.N.: A pixel based fragile watermarking technique using LBP (Local Binary Pattern). In: International Conference on Global Trends in Signal Processing, Information Computing and Communication, pp. 194–196. IEEE (2016)Google Scholar
  14. 14.
    Zhang, H., Wang, C., Zhou, X.: Fragile watermarking for image authentication using the characteristic of SVD. Algorithms 10(27), 1–12 (2017)MathSciNetzbMATHGoogle Scholar
  15. 15.
    Sikder, I., Kumar Dhar, P., Shimamura, T.: A semi-fragile watermarking method using slant transform and LU decomposition for image authentication. In: International Conference on Electrical, Computer and Communication Engineering (ECCE), IEEE, Cox’s Bazar, Bangladesh, 16–18 February (2017)Google Scholar
  16. 16.
    Soualmi, A., Alti, A., Laouamer, L.: A new blind medical image watermarking based on weber descriptors and Arnold chaotic map. Arab. J. Sci. Eng. 1–13 (2018)Google Scholar
  17. 17.
    AL-Nabhani, Y., Jalab, H., Wahid, A., Noor, R.: Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. J. King Saud Univ. Comput. Inf. Sci. 27(4), 393–401 (2015) Google Scholar
  18. 18.
    Ghadi, M., Laouamer, L., Nana, L., Pascu, A.C.: A novel zero-watermarking approach of medical images based on Jacobian matrix model. Secur. Commun. Netw. 16(1), 62–71 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Abdallah Soualmi
    • 1
  • Adel Alti
    • 1
    Email author
  • Lamri Laouamer
    • 2
  • Morad Benyoucef
    • 3
  1. 1.Department of Computer ScienceLRSD Laboratory University of Sétif-1SétifAlgeria
  2. 2.Lab-STICC (UMR CNRS 6285)University of Bretagne OccidentaleBrest CedexFrance
  3. 3.Telfer School of ManagementUniversity of OttawaOttawaCanada

Personalised recommendations