Robust and Imperceptible Hybrid Watermarking Techniques for Medical Images

  • Amit Kumar SinghEmail author
  • Basant Kumar
  • Ghanshyam Singh
  • Anand Mohan
Part of the Multimedia Systems and Applications book series (MMSA)


This chapter presents an improved robust and imperceptible hybrid watermarking technique for medical images using fusion of DWT, DCT and SVD instead of applying DWT, DCT and SVD individually or combination of DWT-DCT, DWT-SVD, and DCT-SVD. In the embedding process, the host image is decomposed into first level discrete wavelet transforms where the low frequency band (LL) is transformed by DCT and SVD. The watermark image is also transformed by DCT and SVD. The ‘S’ vector of watermark information is embedded in the ‘S’ component of the host image. The watermarked image is generated by inverse SVD on modified ‘S’ vector and original U, V vectors followed by inverse DCT and inverse DWT. The watermark is extracted using an extraction algorithm. The performance of proposed technique is also tested by using the benchmark software 'Checkmark' and the technique is found to be robust against the 'Checkmark' attacks. Moreover, the performance of proposed algorithm has also been evaluated for multiple watermarking. The proposed multiple watermarking method preventing the problem of patient identity theft and health data management issues in the healthcare applications.


DWT DCT SVD EPR Checkmark Image and text watermark 


  1. 1.
    L. Der-Chyuan, S. Chia-Hung, Robust image watermarking based on hybrid transformation, in Proceedings of IEEE International Carnahan Conference on Security Technology, Taiwan, pp. 394–399, 2003Google Scholar
  2. 2.
    M. Ouhsain, E.E. Abdallah, A. Ben Hamza, An image watermarking scheme based on wavelet and multiple-parameter fractional fourier transform, in Proceedings of IEEE International Conference on Signal Processing and Communications, Dubai, United Arab Emirates, pp. 1375–1378, 2007Google Scholar
  3. 3.
    M. Jiansheng, L. Sukang, T. Xiaomei, A digital watermarking algorithm based On DCT and DWT, in Proceedings of International Symposium on Web Information Systems and Applications, Nanchang, P. R. China, pp. 104–107, 2009Google Scholar
  4. 4.
    A.S. Hadi, B.M. Mushgil, H.M. Fadhil, Watermarking based Fresnel transform, wavelet transform, and chaotic sequence. J. Appl. Sci. Res. 5(10), 1463–1468 (2009)Google Scholar
  5. 5.
    C. Cao, R. Wang, M. Huang, R. Chen, A new watermarking method based on DWT and Fresnel diffraction transforms, in Proceedings of IEEE International Conference on Information Theory and Information Security, Beijing, pp. 433–430, 2010Google Scholar
  6. 6.
    C.-C. Lai, C.-C. Tsai, Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11), 3060–3063 (2010)CrossRefGoogle Scholar
  7. 7.
    A.A. Nakhaie, S.B. Shokouhi, No reference medical image quality measurement based on spread spectrum and discrete wavelet transform using ROI processing, in Proceedings of 24th Canadian Conference on Electrical and Computer Engineering, pp. 121–125, 2011Google Scholar
  8. 8.
    V.K. Ahire, V. Kshirsagar, Robust watermarking scheme based on discrete wavelet transform (DWT) and discrete cosine transform (DCT) for copyright protection of digital images. IJCSNS Int.J. Comput. Sci. Network Security 11(8), 208–213 (2011)Google Scholar
  9. 9.
    A. Umaamaheshvari, K. Thanushkodi, High performance and effective watermarking scheme for medical images. Eur. J. Sci. Res. 67(2), 283–293 (2012)Google Scholar
  10. 10.
    M. Soliman, A.E. Hassanien, N.I. Ghali, H.M. Onsi, An adaptive watermarking approach for medical imaging using swarm intelligent. Int. J. Smart Home 6(1), 37–50 (2012)Google Scholar
  11. 11.
    M.A. Hajjaji, E.-B. Bourennane, A.B. Abdelali, A. Mtibaa, Combining Haar Wavelet and Karhunen Loeve transforms for medical images watermarking. Biomed. Res. Int. 2014, 1–15 (2014)CrossRefGoogle Scholar
  12. 12.
    A. Kannammal, S. Subha Rani, Two level security for medical images using watermarking/encryption algorithms. Int. J. Imaging Syst. Technol. 24(1), 111–120 (2014)CrossRefGoogle Scholar
  13. 13.
    A. Al-Haj, A. Amer, Secured telemedicine using region-based watermarking with tamper localization. J. Digit. Imaging 27(6), 737–750 (2014)CrossRefGoogle Scholar
  14. 14.
    S. Priya, B. Santhi, P. Swaminathan, Study on medical image watermarking techniques. J. Appl. Sci. 14(14), 1638–1642 (2014)CrossRefGoogle Scholar
  15. 15.
    L. Gao, T. Gao, G. Sheng, S. Zhang, Robust medical image watermarking scheme with rotation correction, in Intelligent Data Analysis and Its Applications, Vol. 2, Advances in Intelligent Systems and Computing, ed. by J.-S. Pan et al. (Eds), vol. 298, (2014), pp. 283–292Google Scholar
  16. 16.
    N.H. Divecha, N.N. Jani, Image watermarking algorithm using DCT, DWT and SVD. Proc. Natl. Conf. Innov. Paradigms Eng. Technol. 10, 13–16 (2012)Google Scholar
  17. 17.
    K.A. Navas, A.M. Cheriyan, M. Lekshmi, S. Archana Tampy, M. Sasikumar, DWT–DCT–SVD based watermarking, in Proceedings of the 3rd International Conference on Communication Systems Software and Middleware and Workshop, Bangalore, pp. 271–274, 2008Google Scholar
  18. 18.
    B. Wang, J. Ding, Q. Wen, X. Liao, C. Liu, An image watermarking algorithm based on DWT DCT and SVD, in IEEE International Conference on Network Infrastructure and Digital Content, Beijing, pp. 1034–1038, 2009Google Scholar
  19. 19.
    V. Kelkar, H. Shaikh, M.I. Khan, Analysis of robustness of hybrid digital image watermarking technique under various attacks. Int. J. Comput. Sci. Mobile Comput. 2(3), 137–143 (2013)Google Scholar
  20. 20.
    S. Madhesiya, S. Ahmed, Advanced technique of digital watermarking based on SVD–DWT–DCT and Arnold transform. Int. J. Adv. Res. Comput. Eng. Technol. 2(5), 1918–1923 (2013)Google Scholar
  21. 21.
    F. Golshan, K. Mohammadi, A hybrid intelligent SVD based perceptual shaping of a digital image watermark in DCT and DWT domain. Imaging Sci. J. 61(1), 35–46 (2013)CrossRefGoogle Scholar
  22. 22.
    A. Singh, A. Tayal, Choice of Wavelet from Wavelet Families for DWT–DCT–SVD Image Watermarking. Int. J. Comput. Appl. 48(17), 9–14 (2012)Google Scholar
  23. 23.
    M.I. Khan, M.M. Rahman, M.I.H. Sarker, Digital watermarking for image authentication based on combined DCT, DWT, and SVD transformation. Int. J. Comput. Sci. 10(5), 223–230 (2013)Google Scholar
  24. 24.
    A. Srivastava, P. Saxena, DWT-DCT-SVD based semi blind image watermarking using middle frequency band. IOSR J. Comput. Eng. 12(2), 63–66 (2013)CrossRefGoogle Scholar
  25. 25.
    N.J. Harish, B.B.S. Kumar, A. Kusagur, Hybrid robust watermarking techniques based on DWT, DCT, and SVD. Int. J. Adv. Electr. Electr. Eng. 2(5), 137–143 (2013)Google Scholar
  26. 26.
    A.K. Singh, M. Dave, A. Mohan, A Hybrid Algorithm for Image Watermarking Against Signal Processing Attack, ed. by S. Ramanna, et al., in Proceedings of 7th Multi-Disciplinary International Workshop in Artificial Intelligence, Krabi-Thailand, Lecture Notes in Computer Science (LNCS), vol. 8271, pp. 235–246, 2013Google Scholar
  27. 27.
    D. Rosiyadi, S.-J. Horng, P. Fan, X. Wang, Copyright protection for e-government document images. IEEE Multimedia 19(3), 62–73 (2012)CrossRefGoogle Scholar
  28. 28.
    D. Rosiyadi, S.-J. Horng, N. Suryana, N. Masthurah, A comparison between the hybrid using genetic algorithm and the pure hybrid watermarking scheme. Int. J. Comput. Theory Eng. 4(3), 329–331 (2012)CrossRefGoogle Scholar
  29. 29.
    H. Shi-Jinn, D. Rosiyadi, T. Li, T. Takao, K.M.K. GuoM, A blind image copyright protection scheme for e-government. J. Vis. Commun. Image Represent. 24(7), 1099–1105 (2013)CrossRefGoogle Scholar
  30. 30.
    H. Shi-Jinn, D. Rosiyadi, P. Fan, X. Wang, M.K. Khan, An adaptive watermarking scheme for e-government document images. Multimed Tools Appl. 72(3), 3085–3103 (2014)CrossRefGoogle Scholar
  31. 31.
    M. Ali, C. WookAhn, P. Siarry, Differential evolution algorithm for the selection of optimal scaling factors in image watermarking. Special issue on advances in evolutionary optimization based image processing. Eng. Appl. Artif. Intell. 31, 15–26 (2014)CrossRefGoogle Scholar
  32. 32.
    A.K. Singh, M. Dave, A. Mohan, Robust and secure multiple watermarking in wavelet domain. A special issue on advanced signal processing technologies and systems for healthcare applications (ASPTSHA). J. Med. Imaging Health Inf. 5(2), 406–414 (2015)CrossRefGoogle Scholar
  33. 33.
    A. Zear, A.K. Singh, P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools Appl. (2016). doi: 10.1007/s11042-016-3862-8
  34. 34.
    A. Sharma, A.K. Singh, S.P. Ghrera, Robust and secure multiple watermarking technique for medical images. Wirel. Pers. Commun. 92(4), 1611–1624 (2017)CrossRefGoogle Scholar
  35. 35.
    N. Terzjia, M. Repges, K. Luck, W. Geisselhardt, Digital image watermarking using discrete wavelet transform: performance comparison of error correction codes, in Proceedings of IASTED, 2002Google Scholar
  36. 36.
    Y. Zaz, L. El Fadil, Protecting EPR data using cryptography and digital watermarking, in Proceeding of International Conference on Models of Information and Communication Systems, Rabat, 2010Google Scholar
  37. 37.
    K.A. Navas, S. Nithya, R. Rakhi, M. Sasikumar, Lossless watermarking in JPEG2000 for EPR Data Hiding, in Proceeding of IEEEEIT, Chicago, USA, pp. 697–702, 2007Google Scholar
  38. 38.
  39. 39.
    S. Pereira, S. Voloshynovskiy, M. Madueño, S. Marchand-Maillet, T Pun, Second generation benchmarking and application oriented evaluation, in Proceeding of Information Hiding Workshop III, Pittsburgh, PA, USA, pp. 340–353, 2001Google Scholar
  40. 40.
    D. Kalman, A singularly valuable decomposition: the SVD of a matrix, The American University, February 13, 2002Google Scholar
  41. 41.
    B.L. Gunjal, R.R. Manthalkar, An overview of transform domain robust digital image watermarking algorithms. J. Emerg. Trends Comput. Inf. Sci. 2(1), 13–16 (2011)Google Scholar
  42. 42.
    K. Wu, W. Yan, J. Du, A robust dual digital-image watermarking technique, in Proceeding of International conference on Computational Intelligence and Security Workshop, pp. 668–671, 2007Google Scholar
  43. 43.
    C. Chemak, M.S. Bouhlel, J.C. Lapayre, A new scheme of robust image watermarking: the double watermarking algorithm, in Proceeding of 2007 Summer Computer Simulation Conference, San Diego, California, USA, pp. 1201–1208, 2007Google Scholar
  44. 44.
    H. Shen, B. Chen, From single watermark to dual watermark: a new approach for image watermarking. Comput. Electr. Eng. 38(5), 1310–1324 (2012)CrossRefGoogle Scholar
  45. 45.
    A.K. Singh, B. Kumar, S.K. Singh, S.P. Ghrera, A. Mohan, Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network. Futur. Gener. Comput. Syst. (2016). doi: 10.1016/j.future.2016.11.023
  46. 46.
    A.K. Singh, M. Dave, A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wireless Personal Commun.: Int. J. 83(3), 2133–2150 (2015)CrossRefGoogle Scholar
  47. 47.
    A.K. Singh, M. Dave, A. Mohan, Hybrid technique for robust and imperceptible multiple watermarking using medical images. J Multimedia Tools Appl. 75(14), 8381–8401 (2015)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Amit Kumar Singh
    • 1
    Email author
  • Basant Kumar
    • 2
  • Ghanshyam Singh
    • 3
  • Anand Mohan
    • 4
  1. 1.Department of Computer Science & EngineeringJaypee University of Information TechnologyWaknaghat, SolanIndia
  2. 2.Department of Electronics and Communication EngineeringMotilal Nehru National Institute of TechnologyAllahabadIndia
  3. 3.Department of Electronics and Communication EngineeringJaypee University of Information TechnologyWaknaghat, SolanIndia
  4. 4.Department of Electronics EngineeringIndian Institute of Technology (BHU)VaranasiIndia

Personalised recommendations