Robust zero-watermarking method for multiple medical images using wavelet fusion and DTCWT-QR

IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of Information Security and Applications Pub Date : 2025-03-11 DOI:10.1016/j.jisa.2025.104028
Guangyun Yang , Xinhui Lu , Yu Lu , Junlin Tang , Xiangguang Xiong
{"title":"Robust zero-watermarking method for multiple medical images using wavelet fusion and DTCWT-QR","authors":"Guangyun Yang ,&nbsp;Xinhui Lu ,&nbsp;Yu Lu ,&nbsp;Junlin Tang ,&nbsp;Xiangguang Xiong","doi":"10.1016/j.jisa.2025.104028","DOIUrl":null,"url":null,"abstract":"<div><div>Following smart healthcare’s radical progression, medical images face security concerns, such as information leakage and malicious tampering. To enable copyright protection and cost reduction for multiple medical images, we propose a zero-watermarking method for multiple medical images with joint dual-tree complex wavelet transform (DTCWT), QR decomposition, and discrete cosine transform (DCT). First, numerous medical images are fused using a wavelet-transform-based fusion method to reduce costs. Next, the generated image is subjected to the DTCWT, which divides the resulting low-frequency sub-bands into blocks, after which each block is subjected to DCT and QR decomposition, generating a significant binary image using the magnitude of the relationship between the value of the two-norm of the first row of each block and the overall mean value. Lastly, a method based on improved Hénon mapping image encryption is presented for encrypting a copyrighted image. An XOR operation is performed on the encrypted copyrighted image with a binary image to yield a zero-watermarking image. Numerous results show that our method can withstand different types of attacks with the normalized correlation coefficients remaining higher than 0.96. Moreover, the proposed method achieves superior robustness with an average performance improvement of approximately 3.3% compared with the latest and similar methods. These results demonstrate the superiority of our method, which can be applied in copyright protection applications for medical images.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 104028"},"PeriodicalIF":3.7000,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625000663","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Following smart healthcare’s radical progression, medical images face security concerns, such as information leakage and malicious tampering. To enable copyright protection and cost reduction for multiple medical images, we propose a zero-watermarking method for multiple medical images with joint dual-tree complex wavelet transform (DTCWT), QR decomposition, and discrete cosine transform (DCT). First, numerous medical images are fused using a wavelet-transform-based fusion method to reduce costs. Next, the generated image is subjected to the DTCWT, which divides the resulting low-frequency sub-bands into blocks, after which each block is subjected to DCT and QR decomposition, generating a significant binary image using the magnitude of the relationship between the value of the two-norm of the first row of each block and the overall mean value. Lastly, a method based on improved Hénon mapping image encryption is presented for encrypting a copyrighted image. An XOR operation is performed on the encrypted copyrighted image with a binary image to yield a zero-watermarking image. Numerous results show that our method can withstand different types of attacks with the normalized correlation coefficients remaining higher than 0.96. Moreover, the proposed method achieves superior robustness with an average performance improvement of approximately 3.3% compared with the latest and similar methods. These results demonstrate the superiority of our method, which can be applied in copyright protection applications for medical images.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于小波融合和dtwt - qr的多医学图像鲁棒零水印方法
随着智能医疗的迅猛发展,医疗图像面临着信息泄露和恶意篡改等安全问题。为了实现多幅医学图像的版权保护和成本降低,我们提出了一种联合双树复小波变换(DTCWT)、QR分解和离散余弦变换(DCT)的多幅医学图像零水印方法。首先,采用基于小波变换的融合方法对大量医学图像进行融合,以降低融合成本。接下来,对生成的图像进行DTCWT处理,DTCWT将得到的低频子带分成块,然后对每个块进行DCT和QR分解,利用每个块第一行的两模值与整体均值之间的关系的大小,生成有效的二值图像。最后,提出了一种基于改进hsamnon映射图像加密的版权图像加密方法。将加密的版权图像与二值图像进行异或运算,得到零水印图像。大量实验结果表明,我们的方法能够抵御不同类型的攻击,且归一化相关系数均大于0.96。此外,与最新和类似的方法相比,该方法具有较好的鲁棒性,平均性能提高约3.3%。这些结果证明了该方法的优越性,可用于医学图像的版权保护。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Information Security and Applications
Journal of Information Security and Applications Computer Science-Computer Networks and Communications
CiteScore
10.90
自引率
5.40%
发文量
206
审稿时长
56 days
期刊介绍: Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.
期刊最新文献
Semantic characterization of android malware through runtime system call analysis Security analysis on a public-key inverted-index keyword search scheme with designated tester Accelerating volatile memory forensics for bare-metal malware analysis with FPGA devices Large language model (LLM) for software security: Code analysis, malware analysis, reverse engineering Reversible data hiding in encrypted images based on EMD and PSIS
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1