Abstract
Medical image copyright protection is becoming increasingly relevant as medical images are used more frequently in medical networks and institutions. The traditional embedded watermarking system is inappropriate for medical images since it degrades the original images’ quality. Furthermore, medical-colored image watermarking options are constrained since most medical watermarking systems are built for gray-scale images. This paper proposes a zero-watermarking scheme for medical color image copyright protection based on a chaotic system and Resnet50, which is a convolutional neural network method. The network Resnet50 is used to extract features from the color medical image, and then a logistic Gaussian map is used to scramble these features and scramble the binary image. Finally, an exclusive OR operation is performed (scrambled binary image, scrambled features for the medical color image) to form a zero watermarking. The experimental result proves that our scheme is effective and robust to geometric and common image processing attacks. The BER values of the extracted watermarks are below 0.0039, and the NCC values are above 0.9942, while the average PSNR values of the attacked images are 29.0056 dB. Also, it is superior to other zero-watermark schemes for medical images in terms of robustness to conventional image processing and geometric attacks. Furthermore, the experimental results show that the Resnet50 model outperforms other models in terms of reducing the mean squared errors of the features between the attacked and original image.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
Technology digital watermarking [1,2,3] is an important subfield of today’s information security [4,5,6]. Digital image watermarking has also emerged as a significant research focus for digital watermarking technology, and it has been significant in content authentication [7] and protection for copyright in digital images [8, 9]. However, for most traditional digital watermarking algorithms [10,11,12], the watermark needs to be embedded into the carrier. This watermark embedding method has two significant drawbacks: it degrades the original image’s quality, and it is difficult to balance robustness and imperceptibility.
The use of medical images in therapy and medical decisions is becoming increasingly important as medical imaging technologies advance [13, 14]. However, processing and sharing medical images may result in poorer data security and greater copyright infringement; hence, securing these images has been an important concern in recent years. Confidentiality, integrity, and authenticity are required for medical image transfer. Unauthorized usage of these images may result in the disclosure of patient data. Furthermore, because these images are susceptible to minor changes, an incorrect diagnosis could endanger patients’ lives. For these reasons, researchers addressed image protection issues with traditional embedded watermarking.
Watermarking technologies in medical images hide the personal information of patients, safeguarding their privacy and guaranteeing secure information transmission [15]. However, medical images have distinct properties. The majority of medical images are gray-scale, single-channel images. A specific disease may be represented due to a little change in extremely comparable background tissues. Any minor alteration might generate mutilated medical images and adversely affect the diagnosis of a doctor [16, 17]. Due to the specificity of medical images, these issues are challenging to overcome using typical medical watermarking methods. As a result, for protecting medical images experts did not desire direct embedding with loss watermarking techniques. To protect the integrity of original medical images, lossless watermarking methods have been introduced, like zero watermarking [18,19,20,21,22,23,24] and reversible watermarking [25,26,27]. Zero-watermark techniques provide a significant advantage over reversible watermarking. There is no information embedded inside the original image with zero-watermark techniques. As a result, the zero watermarking preserves the original medical image from tampering. Reversible watermarking, on the other hand, embeds a watermark to restore the original image. Furthermore, to verify image content, reversible watermarking techniques mostly are employed, whereas zero-watermarking tactics safeguard copyright. High robustness to numerous forms of attacks and improved imperceptibility are the main benefits of the zero-watermark approaches [28]. Because changes to medical images are not permitted, zero watermarking draws the attention of researchers. A new direction of research in zero watermarking is presented by Fierro-Radilla [29] recently where they presented a zero-watermarking technique using CNN. According to [29], Han et al. [30] and Mohamed et al. [31] used VGG19 deep convolution neural network to present a robust approach for zero watermarking.
This paper proposes a new zero-watermarking algorithm for medical color images using the Resnet50 deep convolution neural network which has excellent intrinsic properties. When compared to other forms of CNNs, Resnet50 improves network depth and uses an alternate structure with numerous nonlinear activation layers and convolution layers. This is beneficial for extracting precise features. As a result, and the preprocessing procedure, to extract deep feature maps from color medical images, we simply use the max pooling layers and convolution layers from the pre-trained Resnet50, as opposed to image classification tasks. In contrast to other zero-watermarking algorithms, the suggested scheme is capable of extracting high-level features from color medical images to increase anti-geometric zero-watermarking’s attack capability. Additionally, a chaotic system based on a logistic and Gaussian chaotic system known as LOGAM [32] is used to ensure the proposed scheme’s high level of security. This paper’s contributions and novelty are as follows:
-
(1)
The proposed scheme used a deep conventional neural network called Resnet50 to extract the robust essential features of the medical color images for zero watermarking.
-
(2)
To improve security and equalization, the feature images are scrambled as well as an original watermark is encrypted using a novel approach LOGAM [32].
-
(3)
Resnet50 is used to create feature images, and its beneficial intrinsic properties ensure that the proposed scheme has significantly increased robustness against geometric attacks and common signal processing.
-
(4)
Experimental results demonstrate that the proposed scheme achieves a good balance between robustness and imperceptibility and outperforms other algorithms in terms of security and robustness.
In this paper, the feature map for the original medical color image is firstly created during the CNN (Resnet50) training process using the output of the last convolutional layer with the maximum number of features known as “res5c_branch2b”; then, using a security chaos sequence created by a LOGAM, the extracted features are transformed to the binarized features. Next, the owner’s watermark sequence is combined with the binarized features. Finally, an XOR operation is performed on the encrypted version of the binarized features of the image and the encrypted version of the binary watermark digits to create a verification key of ownership, also known as a zero watermark.
The rest of this paper is organized as follows. Section 2 reviews the existing digital image watermarking approaches. Section 3 provides preliminary information used in the context of our work. Section 4 describes the proposed zero-watermarking algorithm for medical color images. Section 5 contains an in-depth experimental analysis and comparison. Section 6 concludes this paper and makes suggestions for further research.
2 Literature study
Many approaches and techniques for watermarking medical images have been developed, particularly for transmission across various healthcare networks. A blind watermarking approach for safeguarding medical images was proposed by Thakkar and Srivastava [33] using DWTSVD combinations. Their method was applied in telemedicine applications. Rayachoti et al. [34] developed a watermarking approach based on a region of interest (ROI) to protect medical images in telemedicine using the singular value decomposition (SVD) and Slantlet transform (SLT). For secure telemedicine transmission, Moad et al. [35] introduced a wavelet-based medical image watermarking approach. Yan et al. [36] suggested a multi-medical image watermarking approach using the brainstorming optimization technique and a quantum random walk. For the authentication of the medical image and tamper pixels detection, Sanivarapu [37] presented a robust medical watermarking tamper detection approach in the transform domain. Depending on the decomposition of Schur and chaotic sequences, Soualmi et al. [38] presented for medical images a blind watermarking approach. Singh et al. [39] suggested a hybrid region-based watermarking technique to assure the validity, authorization, integrity, and confidentiality of medical images transferred over a public network in IoMT. Kahlessenane et al. [40] employed the decomposition of Schur and four discrete frequency domain transformations to incorporate image collection data and patient information into the image. Zheng et al. [41] proposed a convolution kernel feature extraction-based robust watermarking method for medical images. Li et al. [42] proposed a robust medical image watermarking algorithm that integrated discrete cosine transform (DCT) and log-polar transform (LPT), allowing for the lossless embedding of patient information in medical images. A secured and efficient watermark approach that is described as WatMIF and depends on multimodal medical image fusion was implemented by Singh et al. [43].
Three main components make up the suggested approach: multimodal medical image fusion, host media encryption, and fused mark embedding and extraction. These approaches are watermarking with lossy direct embedding approaches. Furthermore, due to their failure to accomplish geometric invariances, these approaches are vulnerable to geometric attacks.
Zero watermarking has been a significant study issue in the medical industry as an efficient means of medical image protection to safeguard the copyright of digital images. Xiao et al. [44] developed an approach utilizing improved cellular neural networks and singular value decomposition to overcome the issue of diagonal distortion. An effective medical image watermarking method was developed by Wu et al. [45]. In this method, vectors of low-frequency sub-bands are constructed by employing the discrete cosine transform (DCT), and multi-scale image features are obtained by utilizing the contourlet transform. This method has been proven to be robust in medical applications. To generate feature vectors, Qin et al. [46] employed an RSA pseudo-random sequence with curvelet-DCT and utilized the curvelet-DCT by extracting the most concentrated energy from medical images. They used the RSA technique to encrypt the watermarking, which improved patient privacy protection. To obtain image characteristics for medical images, Wu et al. [47] presented a method that combined singular value decomposition, curvelet transform, and discrete wavelet transform. They also made use of subdivision blocks to further increase the algorithm’s stability. A zero-watermarking approach based on Hessenberg decomposition and the nonsubsampled Shearlet transform (NSST) was proposed by Xue et al. [48]. They created a feature matrix by executing operations on the image, including block Hessenberg decomposition and NSST transformation, and then QR codes were combined with it to create a zero-watermarking image, which significantly increased resistance to cropping and rotation attacks. Liu et al. [49] developed a technique for medical imaging, using the DCT transformation with the dual-tree complex wavelet transform, to create feature sequences. They used the logistic chaos encryption technique to improve security. Xia et al. [50] created a zero-watermarking method using FoRHFMs. In this method, the IoRHFMs expanded to FoRHFMs, which significantly increased robustness and numerical stability. Vaidya et al. [51] presented a watermarking approach using a hybrid transform. This approach improved the robustness and imperceptibility against image attacks by combining the best features of the local binary pattern (LBP) in the hybrid domain, DWT, and lifting wavelet transform (LWT). Watermarking algorithms were developed by Fang et al. [52]. They extracted visual features using an improved Bandelet and DCT (Bandelet-DCT) and incorporated the scale-invariant feature transform (SIFT) for data preparation, which is effectively resistant to several types of assaults. In IoMT applications, for medical image copyright protection and security, Magdy et al. [53] used multi-channel fractional Legendre Fourier moments (MFrLFMs) to provide multiple zero-watermarking approaches without distorting the original medical images. Because of their great precision, geometric invariances, resilience to numerous attacks, and numerical stability, MFrLFMs are frequently used. Depending on KAZE-DCT, Zeng et al. [54] suggested a medical images zero-watermarking approach. First, KAZE-DCT is employed to extract medical image feature vectors, and then perceptual hashing is utilized to create medical image feature sequences. The multi-watermark images are then encrypted using chaotic mapping, and the watermarks are embedded and extracted using the zero-watermarking technique. Lastly, the correlation coefficient is utilized to assess the relationship between the watermark extraction and the embedding algorithm. A zero-watermarking technique for colored medical images utilizing 1D Chebyshev chaotic features and accurate MFrGHMs was provided by Khafaga et al. [55] to accomplish lossless copyright protection. Dai et al. [56] successfully combined the complementary benefits of zero and reversible watermarking in an approach of hybrid reversible zero watermarking (HRZW) to secure medical images. Ali et al. [57] suggested a hybrid efficient method for digital medical images using fragile zero watermarking. Visual cryptography and chaotic randomization are key components of their method for preventing unauthorized information breaches.
3 Preliminaries
This section explains Resnet50 feature extraction and the logistic Gaussian map in detail.
3.1 Resnet50 feature extraction
Resnet50 is a residual network with 50 layers trained with ImageNet-1k at 224 × 224 resolution. He et al. [58] initially discussed it in their paper image recognition based on deep residual learning. The Resnet50 model’s input size is equal to or greater than 224 × 224 × 3, and convolutional layers have a size of 3 × 3 filters and follow certain simple designs such as the output being the same for layers with the same number of filters. To maintain the time complexity per layer, if the convolved output size is cut in half, the number of filters is doubled. The model terminates with a 1000-way SoftMax fully linked layer and an average pooling layer.
If \({T}_{j}\) and \({\delta }_{j}\) are the weights and biases of the jth convolution layer, the feature may be retrieved as follows:
where \({Z}_{j}^{\text{in}}\) and \({Z}_{j}^{\text{out}}\) indicate the feature maps input and output, respectively, and \(S\) denotes the rectified linear unit (ReLU). The Resnet50 network architecture, depicted in Fig. 1, is utilized in our zero-watermark technique. The feature map was created using the output of the “res5c_branch2b” layer, as shown in Fig. 1.
3.2 Logistic Gaussian map
3.2.1 Logistic map
Logistic maps are a type of chaotic dynamical system that is both simple and widely studied. In a 1976 publication, biologist Robert May presented the map, in part as a discrete-time demographic model akin to the logistic equation initially developed by Pierre François Verhulst. One of the most studied chaotic maps is the logistic map, which is theoretically expressed by the equation:
wherein \({u}_{i}\in \left[0, 1\right]\) denotes the discrete state of the resulting chaotic sequence, and \(r\) denotes the control parameter with values ranging from \(0\) to 4. When \(r\in (3.569945972, ..., 4]\) the logistic map operates chaotically.
3.2.2 Gaussian map
The chaotic Gaussian map (GM) is formally expressed as follows [32]:
where \(\mu \in [4.7, 17]\), and \(c\in [-1, 1]\) is the control parameter. This map, often known as the mouse map, is the result of several mathematical assumptions and approximations over the Gaussian noise function [59]. It is insufficient on its own due to the system’s small range of chaotic intervals.
3.2.3 Logistic Gaussian map
The improved dynamical system emerges from the LOGAM established in [32] and may theoretically expressed as:
where \({u}_{i}\in \left[0, 1\right], r\in \left[0, 4\right], \mu \in \left[4.7, 17\right].\)
4 Proposed zero-watermarking scheme
The scheme proposed is organized into two stages: “Embedding and encryption scheme” and “Extraction and decryption scheme.” The objective of zero-watermark production is to generate a zero watermark by utilizing an important feature of an original image, and the purpose of zero-watermark verification is to validate the original image’s copyright. The proposed scheme’s phases are described in the following two subsections.
4.1 Embedding and encryption scheme
Our technique utilizes a binary image with a specified meaning \(W\) with size \(P\times Q\) as the initial watermarking image in the experiment, and a color medical image \(I\) with size \(M\times N\). Let \(P=Q=64\) and \(M=N=512\) for ease of computation. Algorithm 1 and Fig. 2, shows the watermarking embedding technique. The major steps are listed below:
(1) The deep feature maps \(FM(k,l,p)\) of the original medical color image \(I\left(i,j\right)\) are extracted using the pre-trained Resnet50:
where the feature map \(FM\) produced by the Resnet50 network architecture seen in Fig. 1 has matrix dimensions denoted by \(k\), \(l\), and \(p\), \(1\le k\le 16, 1\le l\le 16, 1\le p\le 512\).
(2) We build the \(BF\) feature matrix by randomly selecting \(P\times Q\) features from the feature maps and then binarizing each one.
where r is a random number, \(1\le r\le 16\times 16\times 512\), and \(ME\) is the mean of feature maps selected.
(3) Binary feature sequence permutation. A decimal chaotic sequence \({S}_{3}\) is used to scramble the binary feature sequence \(BF\) to \(B{F}_{s}\), \({S}_{3}\) created by LOGAM with the secret key \(S{K}_{3}\), which is then translated into the matrix \(B{F}_{s}\) with \(P\times Q\) (as seen on the left side of Fig. 3). Figure 3 depicts the architecture for using LOGAM in the proposed zero-watermarking scheme. Encryption of the watermark (shown in the right section of Fig. 3) employs bit operation diffusion and pixel-level scrambling to randomly confuse the pixel coordinates and modify the watermark image’s bit values. The following are the procedures for watermark encryption using LOGAM, assuming the watermark \(W\) is \(P\times Q\) in size.
-
(1)
Using the secret keys \(S{K}_{1}=({u}_{0}^{1},{r}^{1}, {\mu }^{1})\), the chaotic system (6) is executed for \(P\times Q\) iterations to obtain \(P\times Q\) values of \({u}_{i+1}\)
-
(2)
A chaotic decimal sequence \(C{S}_{1}\) of length, \(P\times Q\) can be generated. Similarly, the chaotic decimal sequences \(C{S}_{2}\) and \({CS}_{3}\) are built using \(S{K}_{2}=({u}_{0}^{2},{r}^{2}, {\mu }^{2})\) and \(S{K}_{3}=({u}_{0}^{3},{r}^{3}, {\mu }^{3})\), respectively.
-
(3)
The following equation transforms the decimal chaotic sequence \({S}_{2}\) into a chaotic binary sequence.
$${CS}_{2}\left(i\right)=\left\{\begin{array}{cc}1& when\; {CS}_{2}\left(i\right)\ge ME,\\ 0& \text{when}\; {CS}_{2}\left(i\right)<ME,\end{array} 1\le i\le P\times Q.\right.$$(7)
where \(ME\) is the decimal chaotic sequence’s mean \({CS}_{2}\).
-
(4)
The decimal chaotic sequence \(C{S}_{1}\) is ordered ascendingly based on the pixel location in the initial chaotic sequence \(C{S}_{1}\), and the related index vector \(L=({L}_{1},{L}_{2},\dots , {L}_{P\times Q})\) is computed.
-
(5)
To obtain the shuffled watermark \({W}_{c}\), the original watermark \(W\) is reorganized as a \(P\times Q\) 1D array \({W}_{b}\), and then scrambled on the level of a pixel using the index vector \(L\)’s members.
-
(6)
To generate the encrypted version \({W}_{sc}\), use the following formula to conduct an (XOR) operator at the bit level on the shuffled watermark \({W}_{c}\):
$${W}_{sc}={W}_{c}\oplus {CS}_{2},$$(8)
in which the symbol \(\oplus \) stands for an exclusive OR operator.
(4) Signal construction with zero watermarks. To generate the zero-watermark signal \({W}_{\text{zero}}\), an (XOR) operator is performed on the scrambled binary feature matrix \({BF}_{s}\) and the encrypted watermark image \({W}_{s}\), as shown below.
in which the symbol \(\oplus \) represents the exclusive OR operator, \({W}_{s}\) denotes the encrypted watermark image, and \({BF}_{s}\) is the permuted binary feature matrix.
(5) Lastly, the copyright verification database stores the zero-watermark signal \({W}_{\text{zero}}\), as well as the secret keys \(S{K}_{1}\), \(S{K}_{2}\), and \(S{K}_{3}\).
4.2 Verification and decryption scheme
During the verification stage, only the protected image and the accompanying reserved zero-watermark signal are required. The zero-watermark verification process is shown in Algorithm 2, Fig. 2, and the full process is described below.
Step 1–Step 3: The first three steps of the verification of the proposed zero-watermarking and decryption scheme are the same as the first three steps of the zero-watermarking embedding and encryption procedure.
Step 4: Create the encrypted watermark image. To construct the encrypted watermark image \({W{\prime}}_{s}\), an (XOR) operator is performed on the scrambled binary feature matrix \(B{F{\prime}}_{s}\) and the protected image’s corresponding reserved zero-watermark signal \({W}_{\text{zero}}\) as follows:
Step 5: The recovery of a watermark that can be verified. Lastly, by decrypting the encrypted watermark image \({W}_{s}^{\prime}\) with LOGAM, the verifiable watermark image \({W}^{\prime}\) is retrieved.
In the initial phase of the descrambling process, a binary chaotic sequence, \(C{S}_{2}\), is used to execute a back-diffusion operation on the scrambled image \({W}_{s}^{\prime}\). This particular chaotic sequence is constructed by using a LOGAM with a secret key called \(S{K}_{2}\). The primary objective of this method is to provide unpredictability and confusion to the image. The original watermarking image \(W^{\prime}\) is then recovered using an inverse scrambling method. This process makes use of the ascending order index of a chaotic decimal sequence \(C{S}_{1}\), which is also generated by a LOGAM with a secret key \(S{K}_{1}\). The purpose of this technique is to restore the watermarking image’s original structure and appearance. The reverse scrambling of the watermarking image will be identical to the original watermarking image if the secret keys \(S{K}_{1}\) and \(S{K}_{2}\) are accurate and match those used in the scrambling method. Figure 2 shows a graphical illustration of this reverse scrambling process, demonstrating how accurately the original watermarking image can be recovered when the same secret keys are utilized.
5 Experimental result
Experiments were carried out in order to assess the suggested scheme. As shown in Fig. 4, 18 medical color MRI images with size \(256\times 256\) are selected from the “Whole-Brain Atlas” [60], \(32\times 32\) binary images as watermarks, as illustrated in Fig. 5. Table 1 contains abbreviations for a number of the attacks used in this section.
5.1 Evaluation metrics
To assess the visual quality of the attacked images, the peak signal-to-noise-ratio (PSNR) between the attacked and original images is calculated as follows:
in which \(I\left(x,y\right)\) and \(I^{\prime}\left(x,y\right)\) are the original and attacked images of size \(M\times N\), respectively, \(k\epsilon \{R,G,B\}\). The bit error rate (BER) and normalized cross-correlation (NCC) of the recovered watermark image were used to assess the robustness of the suggested scheme. The terms BER and NCC are defined as follows:
wherein \(W^{\prime}(i,j)\) and \(W(i, j)\) represent the recovered and original \(P \times Q\) watermark images. Obviously, when the BER value is low, the NCC value increases, and this indicates that the robustness is better, and when the PSNR ratio is high, this indicates an increase in quality.
5.2 Feature extraction analysis
Experiments in this part were carried out to verify the efficiency and superiority of the feature matrix extracted from Resnet50, and we measured the mean square error (MSE) between the feature matrix extracted from the attacked image and the original image, and then the results were compared with the MSE of VGG16, VGG19 [61] and Alexnet deep learning models. We used the \(512\times 512\) medical color image “Image 13” as a carrier image and the \(64\times 64\) binary image “Flower” as a watermark. Watermarked images are typically subjected to various attacks in this part such as filtering, additive noise, rotation, JPEG compression, scaling, and combination attacks.
According to Table 2, the suggested Resnet50 model outperforms other models such as VGG16, VGG19, and AlexNet in terms of mean square error (MSE). The Resnet50 model outperforms other models in terms of reducing the mean squared errors of the features between the attacked and original image. This indicates that the Resnet50 model extracts features with greater accuracy and precision than the other models mentioned. The Resnet50 model stands out as a practical and dependable alternative for a variety of tasks and applications, particularly zero watermarking of medical images, because of its outstanding MSE values.
5.3 Ablation experiment
The scheme in this paper used a special layer “res5c_branch2b” to extract high-dimensional robust features from medical images; we will refer to the feature map generated by this layer using FM_7. In this ablation experiment, we will use NCC and BER to evaluate the performance of the base model feature map FM_7 against six other Resnet50 feature maps. The feature maps FM_1, FM_2, FM_3, FM_4, FM_5, and FM_6, were generated from the following Resnet50 layers: “res4c_branch2b,” “res4f_branch2a,” “res4f_branch2c,” “res5a_branch2a,” “res5a_branch1,” and “res5c_branch2c,” respectively. The medical color image “Image 13” was used as a carrier image with size \(256\times 256\) and the binary image “Flower” as a watermark with size \(32\times 32\). Watermark image is typically subjected to various attacks listed in Table 1.
According to the results in Table 3, the NCC values obtained from the base model FM_7 for various attacks were 1 or very close to the ideal value of 1. Moreover, these NCC values were higher than other Resnet50 feature maps, FM_1, FM_2, FM_3, FM_4, FM_5, and FM_6, further highlighting the superior performance of the selected feature map, FM_7. The BER results in Table 4 were consistent with the NCC results in Table 3 and the BER values for FM_7 were zero or very close to the optimal value of zero. The results of Tables 3 and 4 indicate that FM_7 outperforms the other Resnet50 feature maps, FM_1, FM_2, FM_3, FM_4, FM_5, and FM_6. These findings justify our selection of the “res5c_branch2b” layer in the proposed zero-watermarking approach, as it is more resistant to attacks.
5.4 Zero-watermark equalization
The equalization specifies that the “1” and “0” bit distribution in a produced zero watermark must be balanced. It can be calculated by dividing the difference in the number of “1” and “0” bits by the total number of bits. Zero watermarking has a high level of security when there is good equalization, which occurs when the numbers “0” and “1” are equal or nearly equal. Table 5 shows the zero-watermark equalization obtained from the eighteen color medical images displayed in Fig. 4. The mean of 18 zero-watermark equalizations is 0.0180, according to Table 5, indicating that the numbers of “0” and “1” in the zero watermarks are roughly equal, and from a statistical standpoint, the suggested zero watermarking has strong security and good equalization.
5.5 Robustness
Experiments in this section were carried out to verify the robustness of the suggested scheme, rotation, LWR changing attacks, scaling, JPEG compression, additive noise, filtering, and other attacks are commonly subjected to the watermarked images. We can divide this section into two main parts. In the first, we utilized 256 × 256 medical color image “Image 13” as a carrier image and 32 × 32 binary image “Flower” as a watermark. In the second one, we utilized six medical color images “Image 19 to Image 24” with size 512 × 512 as a carrier images and 64 × 64 binary image “Flower” as a watermark.
5.5.1 Analysis of anti-attack performance
(1) Rotation attacks.
The rotation test and rotation with cropping for the color medical image “Image 13” were performed, and the rotation angle is selected as θ = 5°, 10°, 15°, 25°, 30°. Table 6 shows the results of the rotation attacks. The NCC values after the rotation attack exceed 0.9956 at multiple angles, indicating that this method can effectively resist rotation attacks.
(2) LWR changing attacks
The \(M\times N\) rectangular image \(I\) is scaled to become the square image \({I}^{*}=\{{g}^{*}\left(s,t\right),0\le s,t<\frac{M+N}{2}\}\) with the size of \(\frac{M+N}{2}\times \frac{M+N}{2}\) to resist the image LWR changing attack before the zero-watermark detection. In LWR changing attack, two parameters are used: the first represents the image’s vertical scaling factor, which takes the values (0.25, 0.5, 0.75, 1.0, 1.0), and the second represents the image’s horizontal scaling factor, which takes the values (1.0, 1.0, 1.0, 0.5, 1.5). Table 7 displays the results achieved after altering the LWR. When the LWR was modified, the PSNR could not be computed between the images, as with the scaling attacks, hence the PSNR value was not provided here.
Following the adjustment of the various ratios’ LWR, the NCC values of the detected logos are all 1.0, demonstrating that this method can successfully resist LWR changing attacks. It should be noted that the LWR altering attack becomes a scaling attack when the horizontal scaling factor equals the vertical scaling factor.
(3) Scaling attacks.
The watermarked image is scaled in this experiment utilizing the following scaling factors: 0.25, 0.5, 2, and 4. Table 8 shows the experimental result for scaling attacks. Table 8 indicates that all NCC values are 1 and that the proposed scheme is extremely resistant to scaling attacks.
(4) Filtering attacks.
Filtering attacks under consideration include Win_F, Med_F, Gus_F, and Avr_F. Table 9 displays the NCC values for various sorts of filtering attacks. All NCC values for filtering attacks are more than 0.9941 in the testing results, showing that the extracted and original watermarks are more similar and that the suggested scheme can successfully resist image filtering attacks.
(5) Noisy attacks.
The robustness measures for two forms of additive noise are computed by altering the noise density or variance in increments of 0.1, 0.2, 0.3, and 0.5, as shown in Table 10. The NCC values in Table 10 show that the suggested scheme is extremely robust to S&P_N and Gus_N.
(6) JPEG compression.
For the simulation of JPEG compression attacks, QF (quality factor) varies between 5 and 90%, and the results are shown in Table 11. After compressing the watermarked image with a lower QF of 5%, all NCC values are 1, indicating that the watermark can be detected effectively by the proposed scheme.
(7) Additional attacks.
Sharpening, histogram, flipping H, flipping V and cropping attacks are also applied, and the result is presented in Table 12. According to Table 12, all NCC values are 1, and the suggested scheme is highly resistant to sharpening, histogram, flipping, and cropping attacks.
5.5.2 Robustness evaluation for different medical images
In this subsection, we used six 512 × 512 different medical color images (“Image 19 to Image 24”) as carrier images and a 64 × 64 binary image (“Flower”) as a watermark. We measured the BER values and their averages for various medical images under several types of attacks in Table 13. The findings reported in Table 13 show that the suggested strategy performs very well in terms of BER. Specifically, when different types of attacks were applied to various images, the majority of the BER values for the proposed technique were zero or quite close to zero. The average BER value was found to be 0.0002, while the maximum reported BER value was 0.0010. These findings show that the suggested scheme is also extremely robust to various attacks when using different images and dimensions.
5.5.3 Comparison of robustness
To thoroughly evaluate how well the proposed scheme worked, the neural network methods and some representative zero-watermarking schemes were used for comparison. The comparison experiments were conducted on two levels. In the first level, a general comparison was carried out between the robustness of the proposed method and existing zero-watermarking methods [62,63,64,65,66,67]. More specifically, in the second level, an evaluation was performed to compare the robustness of the proposed method against existing approaches that utilize deep neural network models for zero watermarks [29, 68, 69]. The two comparison levels are thoroughly explained in the two subsections that follow.
5.5.3.1 Level 1: general zero-watermark comparison
We examined the robustness of the suggested zero-watermarking scheme in this experiments using 512 × 512 medical images as carrier images and the 64 × 64 binary image “Flower” as a watermark against various attacks such as Gus_N 0.03, S&P_N 0.03, Gus_F 5 × 5, Med_F 5 × 5, J_Com 70%, J_Com 90%, Rot 15°, Rot 25°, Rot 35°, Scaling 0.75, Scaling 1.75, and Rot 25° & J_Com 80%. The proposed scheme outperforms the zero-watermarking algorithms [62,63,64,65,66,67], as evidenced by the comparative experiment results in Fig. 6 and Tables 14 and 15. Table 14 summarizes the obtained results, and Fig. 6 depicts the obtained results for readability and simplicity. In Fig. 6 and Table 14, we compare these results to the outcomes of the zero-watermarking approaches [62,63,64,65,66,67]. The findings of Fig. 6 and Table 14 demonstrate that the suggested scheme’s BER values for various attack outcomes are extremely near to zero and less than the values compared in [62,63,64,65,66,67]. These findings show that as compared to zero-watermarking techniques, the suggested scheme can effectively withstand image-based attacks [62,63,64,65,66,67]. Lastly, based on the experimental results in Table 15, the NCC values of the proposed approach are quite near to the optimum 1. This highlights the suggested scheme’s obvious boost in resistance against multiple attacks over zero-watermarking techniques [62,63,64,65,66,67].
5.5.3.2 Level 2: comparison with neural network methods
In these experiments, the robustness of the proposed zero-watermarking scheme was investigated. Specifically, 256 × 256 medical images were used as carrier images, while 32 × 32 binary images as the watermark. The scheme was subjected to various attacks, including Gus_N, Med_F, J_Com, Rot, Scaling, and cropping, to assess its effectiveness. The analysis of the results presented in Table 16 reveals a notable decrease in the robustness of most schemes as the severity of the attacks increases. Specifically, high-intensity Gaussian attacks, cropping attacks, and compression attacks demonstrate a significant impact on the robustness of these schemes. In contrast, our proposed scheme exhibits remarkable robustness, as evidenced by the clear and unaffected extraction of the watermark even under high-intensity attacks, and it outperforms existing zero-watermarking algorithms [29, 68, 69]. The NCC values obtained from the comparative experiment for different attacks were 1 or close to the optimal value of 1. Moreover, these NCC values were higher than those reported in [29, 68, 69], further highlighting the superior performance of the suggested scheme. This exceptional performance ensures the preservation of copyright for medical images. The superiority of our scheme can be attributed to the utilization of more comprehensive and robust model features compared to other approaches. Additionally, the simplicity and effectiveness of the employed method enables the restoration of essential watermark information that may have been lost due to attacks. Consequently, our scheme exhibits stability against various geometric and high-intensity attacks.
6 Conclusion
We presented a robust medical-colored image zero-watermarking technique based on Resnet50 and a chaotic system in this work. Resnet50, a deep convolutional neural network, outperformed other deep convolutional neural networks in image feature extraction. It was well-suited for zero-watermark generation and verification because of its ability to learn intricate features in images. A logistic Gaussian map was used to confuse and diffuse the feature matrix of the medical image and the watermark image to increase security and equalization. The suggested zero-watermarking scheme in this study may be utilized to protect the copyright of color images while maintaining significant resistance against geometric and signal processing attacks and good image visual quality. The experiments’ outcomes assure resistance and robustness to many forms of attack. Furthermore, when compared to other current strategies, the proposed scheme achieves a balanced trade-off between robustness and imperceptibility, and it has some benefits in terms of security, equalization, and robustness. In terms of mean square error, the proposed Resnet50 model outperformed other models such as VGG16, VGG19, and AlexNet. Future work will include some research investigations. The proposed scheme will be enhanced to handle stereoscopic images and 3D images. Furthermore, utilizing a new chaotic map, to increase security. Additionally, we will apply the suggested scheme to different real-world applications, such as IoT medical systems.
Data availability
The Whole-Brain data are available at the official page: http://www.med.harvard.edu/AANLIB/home.html.
References
Xia Z, Wang X, Wang C et al (2021) Local quaternion polar harmonic Fourier moments-based multiple zero-watermarking scheme for color medical images. Knowl Based Syst 216:106568. https://doi.org/10.1016/j.knosys.2020.106568
Jyothsna Devi K, Singh P, Thakkar HK, Kumar N (2022) Robust and secured watermarking using Ja-Fi optimization for digital image transmission in social media. Appl Soft Comput 131:109781. https://doi.org/10.1016/j.asoc.2022.109781
Bolourian Haghighi B, Taherinia AH, Harati A, Rouhani M (2021) WSMN: an optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II. Appl Soft Comput. https://doi.org/10.1016/j.asoc.2020.107029
Wang C, Ma B, Xia Z et al (2022) Stereoscopic image description with trinion fractional-order continuous orthogonal moments. IEEE Trans Circuits Syst Video Technol 32:1998–2012. https://doi.org/10.1109/TCSVT.2021.3094882
Wang X, Wang X, Ma B et al (2021) High precision error prediction algorithm based on ridge regression predictor for reversible data hiding. IEEE Signal Process Lett 28:1125–1129. https://doi.org/10.1109/LSP.2021.3080181
Li Q, Wang X, Wang X, Shi Y (2021) CCCIH: content-consistency coverless information hiding method based on generative models. Neural Process Lett 53:4037–4046. https://doi.org/10.1007/s11063-021-10582-y
Chen YH, Huang HC (2015) Coevolutionary genetic watermarking for owner identification. Neural Comput Appl 26:291–298. https://doi.org/10.1007/s00521-014-1615-z
Lin SD, Chen CF (2000) A robust DCT-based watermarking for copyright protection. IEEE Trans Consum Electron 46:415–421. https://doi.org/10.1109/30.883387
Wang Y, Doherty JF, Van Dyck RE (2002) A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans Image Process 11:77–88. https://doi.org/10.1109/83.982816
Nandini DU, DIvya S (2017) A literature survey on various watermarking techniques. In: Proceedings of the international conference on inventive systems and control, ICISC 2017. IEEE, pp 1–4
Gao X, Deng C, Li X, Tao D (2010) Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Trans Syst Man Cybern Part C Appl Rev 40:278–286. https://doi.org/10.1109/TSMCC.2009.2037512
Deng C, Gao X, Li X, Tao D (2010) Local histogram based geometric invariant image watermarking. Signal Process 90:3256–3264. https://doi.org/10.1016/j.sigpro.2010.05.032
Mozaffari J, Amirkhani A, Shokouhi SB (2023) A survey on deep learning models for detection of COVID-19. Neural Comput Appl 35:16945–16973. https://doi.org/10.1007/s00521-023-08683-x
Najafi A, Amirkhani A, Papageorgiou EI, Mosavi MR (2017) Medical decision making based on fuzzy cognitive map and a generalization linguistic weighted power mean for computing with words. In: IEEE international conference on fuzzy systems, pp 1–6
Gangadhar Y, Giridhar Akula VS, Reddy PC (2018) An evolutionary programming approach for securing medical images using watermarking scheme in invariant discrete wavelet transformation. Biomed Signal Process Control 43:31–40. https://doi.org/10.1016/j.bspc.2018.02.007
Balasamy K, Suganyadevi S (2021) A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimed Tools Appl 80:7167–7186. https://doi.org/10.1007/s11042-020-09981-5
Fares K, Khaldi A, Redouane K, Salah E (2021) DCT & DWT based watermarking scheme for medical information security. Biomed Signal Process Control 66:102403. https://doi.org/10.1016/j.bspc.2020.102403
Wang H, Chen Y, Zhao T (2022) Modified Zernike moments and its application in geometrically resilient image zero-watermarking. Circuits Syst Signal Process 41:6844–6861. https://doi.org/10.1007/s00034-022-02076-6
Roček A, Javorník M, Slavíček K, Dostál O (2021) Zero watermarking: critical analysis of its role in current medical imaging. J Digit Imaging 34:204–211. https://doi.org/10.1007/s10278-020-00396-0
Ali Z, Shamim Hossain M, Muhammad G, Aslam M (2018) New zero-watermarking algorithm using Hurst exponent for protection of privacy in telemedicine. IEEE Access 6:7930–7940. https://doi.org/10.1109/ACCESS.2018.2799604
Wen Q, Sun TF, Wang SX (2003) Concept and application of zero-watermark. Tien Tzu Hsueh Pao/Acta Electron Sin 31:214–216
Gao J, Li Z, Fan B (2022) An efficient robust zero watermarking scheme for diffusion tensor-magnetic resonance imaging high-dimensional data. J Inf Secur Appl 65:103106. https://doi.org/10.1016/j.jisa.2021.103106
Liu X, Zhang Y, Du S et al (2022) DIBR zero-watermarking based on invariant feature and geometric rectification. IEEE Multimed 29:27–37. https://doi.org/10.1109/MMUL.2022.3148301
Wang X, Wen M, Tan X et al (2022) A novel zero-watermarking algorithm based on robust statistical features for natural images. Vis Comput 38:3175–3188. https://doi.org/10.1007/s00371-022-02544-9
Roček A, Slavíček K, Dostál O, Javorník M (2016) A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters. Biomed Signal Process Control 29:44–52. https://doi.org/10.1016/j.bspc.2016.05.005
Attaur-Rahman SK, Aldhafferi N et al (2018) Reversible and fragile watermarking for medical images. Comput Math Methods Med. https://doi.org/10.1155/2018/3461382
Vazhora Malayil M, Vedhanayagam M (2021) A novel image scaling based reversible watermarking scheme for secure medical image transmission. ISA Trans 108:269–281. https://doi.org/10.1016/j.isatra.2020.08.019
Kavitha C, Sakthivel S (2019) An effective mechanism for medical images authentication using quick response code. Clust Comput 22:4375–4382. https://doi.org/10.1007/s10586-018-1905-9
Fierro-Radilla A, Nakano-Miyatake M, Cedillo-Hernandez M, et al (2019) A robust image zero-watermarking using convolutional neural networks. In: 2019 7th international workshop on biometrics and forensics, IWBF 2019. Cancun, Mexico, pp 1–5
Han B, Du J, Jia Y, Zhu H (2021) Zero-watermarking algorithm for medical image based on VGG19 deep convolution neural network. J Healthc Eng. https://doi.org/10.1155/2021/5551520
Darwish MM, Farhat AA, El-Gindy TM (2023) Convolutional neural network and 2D logistic-adjusted-Chebyshev-based zero-watermarking of color images. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-16649-3
Qobbi Y, Abid A, Jarjar M, et al (2023) An image encryption algorithm based on substitution and diffusion chaotic boxes. In: Lecture notes networks system 635 LNNS, pp 184–190. https://doi.org/10.1007/978-3-031-26254-8_26
Thakkar FN, Srivastava VK (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76:3669–3697. https://doi.org/10.1007/s11042-016-3928-7
Rayachoti E, Tirumalasetty S, Prathipati SC (2020) SLT based watermarking system for secure telemedicine. Clust Comput 23:3175–3184. https://doi.org/10.1007/s10586-020-03078-2
Khaldi A, Redouane KM, Bilel M (2023) A medical image watermarking system based on redundant wavelets for secure transmission in telemedicine applications. Wirel Pers Commun 132:823–839. https://doi.org/10.1007/s11277-023-10636-5
Yan F, Huang H, Yu X (2022) A multiwatermarking scheme for verifying medical image integrity and authenticity in the internet of medical things. IEEE Trans Ind Inform 18:8885–8894. https://doi.org/10.1109/TII.2022.3159863
Sanivarapu PV (2022) Adaptive tamper detection watermarking scheme for medical images in transform domain. Multimed Tools Appl 81:11605–11619. https://doi.org/10.1007/s11042-022-12273-9
Soualmi A, Alti A, Laouamer L (2022) A novel blind medical image watermarking scheme based on Schur triangulation and chaotic sequence. Concurr Comput Pract Exp 34:e6480. https://doi.org/10.1002/cpe.6480
Singh P, Devi KJ, Thakkar HK, Kotecha K (2022) Region-based hybrid medical image watermarking scheme for robust and secured transmission in IoMT. IEEE Access 10:8974–8993. https://doi.org/10.1109/ACCESS.2022.3143801
Kahlessenane F, Khaldi A, Kafi R, Euschi S (2021) A robust blind medical image watermarking approach for telemedicine applications. Clust Comput 24:2069–2082. https://doi.org/10.1007/s10586-020-03215-x
Zheng J, Li J, Liu J et al (2022) A novel convolution kernel-based robust watermarking scheme applied in medical image. Int J Wirel Mob Comput 22:290–299. https://doi.org/10.1504/IJWMC.2022.124820
Li D, Chen Y, Wei J et al (2022) Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform. IET Biom 11:534–546. https://doi.org/10.1049/bme2.12102
Singh KN, Singh OP, Singh AK, Agrawal AK (2022) WatMIF: multimodal medical image fusion-based watermarking for telehealth applications. Cognit Comput. https://doi.org/10.1007/s12559-022-10040-4
Xiao Z, Zhang H, Chen H (2017) Zero watermarking for enhanced singular value decomposition and cellular neural network. Chin J Image Graph 22:288–296
Wu X, Li J, Tu R et al (2019) Contourlet-DCT based multiple robust watermarkings for medical images. Multimed Tools Appl 78:8463–8480. https://doi.org/10.1007/s11042-018-6877-5
Qin F, Li J, Li H, et al (2020) A robust zero-watermarking algorithm for medical images using Curvelet-Dct and RSA pseudo-random sequences. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics). Springer, pp 179–190
Wu D, Tang Y, Zhao W et al (2020) Zero-watermarking algorithm based on Curvelet-DWT-SVD. J Yanshan Univ 44:42–52
Xue H, Chi W, Liu X (2020) A zero-watermarking algorithm based on NSST and Hessenberg decomposition. Mod Comput 89:103
Liu J, Li J, Zhang K et al (2019) Zero-watermarking algorithm for medical images based on dual-tree complex wavelet transform and discrete cosine transform. J Med Imaging Health Inform 9:188–194. https://doi.org/10.1166/jmihi.2019.2559
Xia Z, Wang X, Wang C et al (2022) A robust zero-watermarking algorithm for lossless copyright protection of medical images. Appl Intell 52:607–621. https://doi.org/10.1007/s10489-021-02476-2
Vaidya SP (2023) Fingerprint-based robust medical image watermarking in hybrid transform. Vis Comput 39:2245–2260. https://doi.org/10.1007/s00371-022-02406-4
Zhang Q, Li J, Liu J et al (2023) Robust zero-watermarking algorithm for medical images based on SUSAN-DCT. Smart Innov Syst Technol SIST 357:191–204. https://doi.org/10.1007/978-981-99-3311-2_17
Magdy M, Ghali NI, Ghoniemy S, Hosny KM (2022) Multiple zero-watermarking of medical images for internet of medical things. IEEE Access 10:38821–38831. https://doi.org/10.1109/ACCESS.2022.3165813
Zeng C, Liu J, Li J et al (2022) Multi-watermarking algorithm for medical image based on KAZE-DCT. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-021-03539-5
Khafaga DS, Karim FK, Darwish MM, Hosny KM (2022) Robust zero-watermarking of color medical images using multi-channel Gaussian-hermite moments and 1D Chebyshev chaotic map. Sensors 22:5612. https://doi.org/10.3390/s22155612
Dai Z, Lian C, He Z et al (2022) A novel hybrid reversible-zero watermarking scheme to protect medical image. IEEE Access 10:58005–58016. https://doi.org/10.1109/ACCESS.2022.3170030
Ali Z, Fazal-E-amin HM (2022) A novel fragile zero-watermarking algorithm for digital medical images. Electron 11:710. https://doi.org/10.3390/electronics11050710
He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition, pp 770–778
Ahmad M, Bhatia D, Hassan Y (2015) A novel ant colony optimization based scheme for substitution box design. Procedia Comput Sci 57:572–580. https://doi.org/10.1016/j.procs.2015.07.394
Sutton D (1999) The whole brain atlas. In: Bmj. http://www.med.harvard.edu/AANLIB/home.html
Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: 3rd international conference on learning representations, ICLR 2015—conference track proceedings
Yang H, Qi S, Niu P, Wang X (2020) Color image zero-watermarking based on fast quaternion generic polar complex exponential transform. Signal Process Image Commun 82:115747. https://doi.org/10.1016/j.image.2019.115747
Kang X, Zhao F, Chen Y et al (2020) Combining polar harmonic transforms and 2D compound chaotic map for distinguishable and robust color image zero-watermarking algorithm. J Vis Commun Image Represent 70:102804. https://doi.org/10.1016/j.jvcir.2020.102804
Xia Z, Wang X, Wang C et al (2021) Novel quaternion polar complex exponential transform and its application in color image zero-watermarking. Digit Signal Process A Rev J. https://doi.org/10.1016/j.dsp.2021.103130
Xia Z, Wang X, Han B et al (2021) Color image triple zero-watermarking using decimal-order polar harmonic transforms and chaotic system. Signal Process. https://doi.org/10.1016/j.sigpro.2020.107864
Hosny KM, Darwish MM, Fouda MM (2021) New color image zero-watermarking using orthogonal multi-channel fractional-order Legendre-Fourier moments. IEEE Access 9:91209–91219. https://doi.org/10.1109/ACCESS.2021.3091614
Hosny KM, Darwish MM (2021) New geometrically invariant multiple zero-watermarking algorithm for color medical images. Biomed Signal Process Control 70:103007. https://doi.org/10.1016/j.bspc.2021.103007
Xiang R, Liu G, Li K et al (2023) Zero-watermark scheme for medical image protection based on style feature and ResNet. Biomed Signal Process Control 86:105127
Dong F, Li J, Bhatti UA et al (2023) Robust zero watermarking algorithm for medical images based on improved NasNet-mobile and DCT. Electronics 12:3444
Funding
Open access funding provided by The Science, Technology & Innovation Funding Authority (STDF) in cooperation with The Egyptian Knowledge Bank (EKB).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Farhat, A.A., Darwish, M.M. & El-Gindy, T.M. Resnet50 and logistic Gaussian map-based zero-watermarking algorithm for medical color images. Neural Comput & Applic 36, 19707–19727 (2024). https://doi.org/10.1007/s00521-024-10121-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-024-10121-5