999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Robust Zero-Watermarking Based on SIFT-DCT for Medical Images in the Encrypted Domain

2019-11-07 03:13:00JialingLiuJingbingLiYenweiChenXiangxiZouJierenChengYanlinLiuandUzairAslamBhatti
Computers Materials&Continua 2019年10期

Jialing Liu,Jingbing Li,,Yenwei Chen,Xiangxi Zou,Jieren Cheng,Yanlin Liu and Uzair Aslam Bhatti,

Abstract:Remote medical diagnosis can be realized by using the Internet,but when transmitting medical images of patients through the Internet,personal information of patients may be leaked.Aim at the security of medical information system and the protection of medical images,a novel robust zero-watermarking based on SIFT-DCT(Scale Invariant Feature Transform-Discrete Cosine Transform)for medical images in the encrypted domain is proposed.Firstly,the original medical image is encrypted in transform domain based on Logistic chaotic sequence to enhance the concealment of original medical images.Then,the SIFT-DCT is used to extract the feature sequences of encrypted medical images.Next,zero-watermarking technology is used to ensure that the region of interest of medical images are not changed.Finally,the robust of the algorithm is evaluated by the correlation coefficient between the original watermark and the attacked watermark.A series of attack experiments are carried out on this method,and the results show that the algorithm is not only secure,but also robust to both traditional and geometric attacks,especially in clipping attacks.

Keywords:Robustness,CT Image,zero-watermarking,SIFT-DCT,encrypted domain.

1 Introduction

With the development of science and technology,big data and cloud storage have become a hot topic.Various data processing methods and remote transmission schemes have been proposed.And cloud storage and data processing also have potential advantages in smart healthcare.In case Diagnosis,such as Feature Selection Method Based on Class Discriminative Degree for Intelligent Medical Diagnosis[Fang,Cai,Sun et al.(2018)],a decision support system that can assist Medical staff to diagnose and treat diseases can be established through Feature extraction of Medical images,which can improve efficiency.But it will encounter the information security question in the data transmission.Medical images contain some sensitive information,which may be leaked or tampered with.Digital watermarking technology is a possible information protection system[Guo,Zheng and Huang(2015)],which provides a way to embed unique code in each original image of distributed content.According to the literatures published in recent years,the digital watermarking technology can be grouped into two classes:The watermarking Information is directly embedded into the digital carrier,such as Information hiding in medical images:a robust medical image watermarking system for E-healthcare[Parah,Sheikh,Ahad et al.(2017)].The watermarking is embedded in different areas of the carrier,but the medical image is sensitive,and the selected location is crucial.The other method is blind watermarking[Fazlali,Samavi,Karimi et al.(2017)],which does not need to use the original data and only needs the key to detect.It will not destroy the original medical data and not affect the judgment of doctors.For example,Lang et al.[Lang and Zhang(2014)]have proposed a new blind digital image watermarking algorithm based on fractional Fourier transform(FRFT).In Parah et al.[Parah,Sheikh,Loan et al.(2016)],the authors have proposed a new DCT domain blind watermarking algorithm.These methods associate the watermark with the target image to reduce the damage to the original data.Though the watermark embedding method has been improved,they did not protect the privacy of the original image,which is an important factor for medical images.

So privacy protection is also a challenge for smart medicine.Large amounts of medical data are exposed online during transmission.Among the many encryption methods,the most interesting aspect of homomorphic encryption scheme is focused on data processing security[Han and Li(2016);Abdallah,Faragallah,Elsayed et al.(2016)].Algebraic relations between plaintext are preserved in the encryption domain,providing an appropriate method for secure signal processing.That is,someone else can work with encrypted data,but the process does not leak any of the original content.At the same time,the user with the key decrypts the processed data,resulting in the original data.This encryption has a huge impact in the cloud age.In addition,feature extraction is also a key link[Lv and Wang(2012);Li,Wang and Liu(2012)].It is mainly divided into global features,such as the classical algorithm Discrete Cosine Transformation(DCT)[Das,Panigrahi,Sharma et al.(2014);Wu,Li,Tu et al.(2018)],and local features,such as Scale Invariant Feature Transform(SIFT)[Priyatham,Nilkanta and Arijit(2014);Han,Zhou,Xu et al.(2017);Zhao,Jiang and Hong(2014);Liu,Li and Liu(2011);Dai and Tian(2014)].The SIFT algorithm can generate a large number of features even with a small amount of data,and has stability to rotation and translation,which is of profound significance to geometric attacks.

Considering the above mentioned problems,this paper proposes a robust zerowatermarking algorithm based on SIFT-DCT for encrypting medical images in the transform domain.In the transform domain,the original medical image is encrypted with the aid of chaotic mapping.Then feature of the encrypted medical image is extracted with SIFT-DCT.Finally,the correlation coefficients are calculated to evaluate the robustness of the algorithm.This algorithm has the following advantages:(1)It protects the privacy of original medical images through encryption;(2)The zero watermarking technology will not change the original medical images;(3)The feature sequences extracted by this algorithm are more robust to geometrical attacks.

This paper is organized as follows.The theoretical basis of data processing is introduced in the second part.The block diagram of image encryption is discussed in the third part,and the process of watermark is investigated in the fourth part.The simulation results are carried out and analyzed in the fifth part.The sixth part gives the conclusion of the paper.

2 Feature extraction and encryption methods

2.1 Scale invariant feature transform(SIFT)

SIFT is an algorithm for local feature extraction,and its subtlety lies in the adoption of gaussian difference pyramid(see Fig.1(a)).SIFT realizes feature extraction mainly by three processes:(1)Extract key points,as show in Fig.1(b);(2)Add detailed information(local features)to the key points and get the feature vector(see Fig.1(c)).

Figure 1:(a)Gaussian pyramid and DOG pyramid;(b)Extract SIFT extreme points;(c)SIFT feature vector generation

SIFT feature is a local feature of the image.Its advantages are invariant to rotation,scale scaling,brightness changes,as well as a certain degree of stability to view changes,affine transformation and noise.It is suitable for fast and accurate matching in massive feature database.It is also multidimensional,and even a few objects can produce a large number of SIFT feature.The different original medical images have found many key points after SIFT(see Fig.2).After extracting the medical image features by SIFT,the feature matrix is compressed by DCT to extract the feature sequences.the SIFT-DCT is the improvement of feature extraction algorithm in this study.Combining global feature and local feature,a more robust feature sequence is extracted.

Figure 2:Key points of different original medical images after SIFT(a)Abdominal CT image,(b)Brain CT image,(c)CT image of leg

2.2 The discrete wavelet transform(DWT)

DWT is a wavelet transform for which the wavelets are sampled at discrete intervals.DWT provides a simultaneous spatial and frequency domain information of the image.In DWT operation,the analysis filter bank consists of a pair of low and high pass filters corresponding to each decomposition level.The low pass filter extracts the approximate information of the image whereas the high pass filter extracts the details such as edges.The diagram is shown as Fig.3.

Figure 3:The image in DWT(a)Single Level Decomposition,(b)Two-Level Decomposition,(c)Three Level Decomposition

2.3 The discrete cosine transform(DCT)

The DCT is a classical global feature extraction transform.It uses only real numbers and concentrates most of its energy on the low frequencies.It is widely used in the field of image processing.

The DCT transform formula for N×N images is as follows:

where f(x,y)is the pixel value,F(u,v)is the 2D-DCT transform coefficients for f(x,y).

2.4 Logistic mapping

Logistic mapping is widely used in secure communication.Logistic mapping works in a chaotic state,that is to say,the sequence generated by the initial condition X0 under the action of Logistic mapping is non-periodic and non-convergent.Outside this range,the resulting sequence must converge to a particular value.The mathematical formula is as follows:

where the range ofxkis 0 to 1,0<μ<=4;besides,when 3.5699456<μ<=4,the logistic map gets a chaotic state and the chaotic sequence can be used as an ideal key sequence.

3 The encryption of medical image

Homomorphic encryption is used in medical images to better protect patient privacy and has a profound impact on future development.In this section,we propose a robust zerowatermarking scheme for the image in the encrypted domain.DWT and DCT are combined to encrypt the original image with chaotic mapping in Fig.4.

Figure 4:Encryption scheme of original medical images

Here are main steps:

Step 1.Transform the original image using DWT-DCT.

Step 2.Generating binary sequences through chaotic mapping.

Step 3.The chaos sequence and the transformed coefficient matrix are taken as the dot product.

Step 4.Perform inverse DCT(IDCT)and inverse DWT(IDWT)to obtain encrypted medical images(see Fig.5).

Figure 5:The medical image in the encrypted domain:(a)The original medical image;(b)The encrypted medical image;(c)The decrypted medical image

4 Zero watermarking algorithm

Compared with traditional embedded watermarking methods,the zero-watermarking can better guarantee the original information,which is of great significance in medical image and is beneficial to improve the robustness of algorithm.This section mainly introduces watermarking embedding and extraction.The robustness of the algorithm is evaluated by the correlation coefficient between the original watermark and the attacked watermark.

4.1 Watermarking embedding

The watermarking embedding process is shown in Fig.6.Here are main steps:

Step 1.Transform the encrypted CT image using SIFT-DCT.

Step 2.Select the transform coefficient(4×8).

Step 3.Obtain a 32-bit binary feature sequence of the medical image.

Step 4.The original watermarking is encrypted by generating a chaos sequence.

Step 5.Generat the key sequence of watermarking extraction through XOR operation.

Figure 6:The watermarking embedding process

4.2 Watermarking extraction

The watermarking extraction process is shown in Fig.7.The specific steps are as follows:

Step 1.Transform the attacked encrypted CT image using SIFT-DCT.

Step 2.Using the same method as embedding to obtain the 32-bit binary feature sequence of attacked CT image.

Step 3.Let the binary feature sequence of attacked medical image XOR the watermarking extraction key sequence.

Step 4.Inverse the scramble watermarking image.

Step 5.Calculate the correlation coefficient between the original watermarking and the attacked watermarking.

Figure 7:The watermarking extraction process

5 Experiments

We use the abdominal CT image(see Fig.8(a))as the research object in the experiment.Firstly,the original CT image is encrypted in the transform domain(DWT-DCT),and then the features of the encrypted medical image are extracted based on SIFT-DCT algorithm.The selected watermarking is a 32-bit image,so a 4-by-8 module is selected in the encrypted image to obtain a 32-bit binary feature sequence.The robustness of the proposed algorithm is evaluated by calculating the correlation of feature sequences between the original watermark and the attacked watermark,that is the value of NC.NC value is between 0 and 1,where 1 means no change.At this time,the algorithm is the best robust.In addition,a large number of experimental studies have shown that when the NC value is greater than 0.5,the embedded watermarking can still be extracted,so here we believe that the algorithm is robust when the NC value is greater than 0.5.The Fig.8(b)shows the encrypted medical image under no attacks,and the Fig.8(c)shows the key points of the encrypted medical image after SIFT.At this time,the NC value is 1.0(see Fig.8(d)).

Figure 8:(a)The original abdominal CT image;(b)The encrypted medical image;(c)Key points of the encrypted medical image after SIIFT;(d)The original Extracted watermarking

5.1 Conventional attacks

Conventional attacks on the encrypted CT image are carried out with various strengths,and NC values are calculated to test the robustness of the new algorithm(see Tab.1).It can be found that the value of NC is near 0.6 in Gaussian noise attacks.When JPEG compression attack is 2%,its value of NC can get 0.65.So,the proposed watermarking algorithm is performing satisfactorily.

Table 1:The PSNR and NC values under Conventional Attacks based on SIFT-DCT

5.1.1 Gaussian noise

When the encrypted medical image is under Gaussian noise(15%)attacks,the value of NC is 0.60.The data proved that the algorithm is robust against Gaussian noise attacks.The result is shown in Fig.9.

Figure 9:Medical image and Extracted watermarking under Gaussian noise attack 15%

5.1.2 JPEG compression

When the encrypted medical image is under JPEG compression(10%)attacks,the value of NC is 0.74.The data proved that the algorithm is robust against JPEG compression attacks.The result is shown in Fig.10.

Figure 10:Medical image and Extracted watermarking under JPEG compression 10%

5.2 Geometric attacks

The robustness of geometric attacks is always a problem.A series of geometric attacks are tested through this algorithm,and the results are shown in Tab.2.

Table 2:The PSNR and NC value under Geometric Attacks based on SIFT-DCT

5.2.1 Rotation attack.

When the encrypted medical image is rotated 10°(clockwise),the extracted watermark is shown in Fig.11.In this case,the degree of correlation is 0.60.So,the proposed algorithm has a good robustness against the rotation attacks.

Figure 11:Medical image and Extracted watermarking under rotation attack 10°

5.2.2 Scaling attack

When the encrypted medical image is Scaling(×1.5),the extracted watermark is shown in Fig.12.In this case,the degree of correlation is 0.79.So,the proposed algorithm has a good robustness against the scaling attacks.

Figure 12:Encrypted Medical image and Extracted watermarking under scaling attack(×1.5)

5.2.3 Translation attacks

The encrypted CT image is translated attack.When left translated 4%,the value of NC is 0.81(see Fig.13).When up translated 3%,the value of NC is 0.90(see Fig.14).And the watermarking is close to the original watermarking.This show that the algorithm has a fine robustness against translation attacks.

Figure 13:Experimental results under Translation left 4% attack

Figure 14:Experimental results under Translation up 3% attack

5.2.4 Clipping attacks

The CT image is clipped about 25% in the x direction.The cropped medical image is given in Fig.15.The degree of correlation is 0.72.When it is clipped about 30% in the y-axis direction,the clipped medical image is shown in Fig.16.The degree of correlation is 0.71.Therefore,the watermarking algorithm has strong robustness against clipping attacks.

Figure 15:Experimental results under Clipping x-axis 25% attack

Figure 16:Experimental results under Clipping y-axis 30% attack

5.3 Comparison with unencrypted Algorithm

The algorithm is compared with the unencrypted data,and it is shown in Tab.3.The experimental results show that the NC value of ciphertext domain is not significantly different from that of plaintext domain,which indicates that the encryption algorithm has homomorphism.

Table 3:Comparison with unencrypted Algorithm based on SIFT-DCT

Scaling ×1.5 0.61 0.79 Translation 4%(left)0.89 0.81 Translation 4%(right)0.88 0.81 Translation 3%(up)0.85 0.90 Cropping 25%(X axis)0.87 0.72 Cropping 30%(Y axis)0.61 0.72

5.4 Comparison with other encrypted Algorithms.

The NC value of this algorithm in ciphertext domain is compared with that of the classical feature extraction method,and the data is recorded in Tab.4.

Table 4:Comparison with other encrypted Algorithms

Through experiments,it can be found that the feature extraction method based on SIFTDCT is not as effective as the classical DCT in conventional attacks,especially in JPEG compression.Because the key points of SIFT include location,length,direction and so on.When compression or filtering attacks are carried out,the key points extracted by SIFT vary greatly,making the algorithm no longer has good robust.However,in terms of geometric attacks,the features extracted based on SIFT-DCT have better robust,which is significantly improved compared with the other three classical algorithms.In actual transmission,geometric attack is more challenging,so the improvement of robust of this algorithm in geometric attack has great significance.

6 Conclusion

In this paper,two different methods are combined to improve the traditional digital watermarking algorithm,which is a robust zero-watermarking algorithm based on SIFTDCT for medical images in the encryption domain.The original image is encrypted to protect the privacy of the original medical image.Then,zero-watermarking technology is adopted.The advantage of this technology is that the original medical image will not be damaged,which will not affect the doctor's judgment on the sensitive areas of tumors and other diseases in medical images.In addition,the algorithm uses SIFT-DCT to extract image features,Combining scale invariance of SIFT and energy concentration of DCT,and the selected features have strong robust in geometric attacks,which also solves one of the difficulties in transmission.Moreover,this algorithm is flexible,which can not only play a prominent role in medical image processing and ensure the security of image transmission,but also be applicable to other image recognition and retrieval.

Acknowledgement:This work is supported by the Key Reach Project of Hainan Province[ZDYF2018129],the National Natural Science Foundation of China[61762033],and the National Natural Science Foundation of Hainan[2018CXTD333],the Key Innovation and Entrepreneurship Project of Hainan University[Hdcxcyxm201711],and the Higher Education Research Project of Hainan Province(Hnky2019-73)and the Key Research Project of Haikou College of Economics[HJKZ18-01].

主站蜘蛛池模板: 国产一区二区三区精品久久呦| 亚洲三级成人| 国产免费羞羞视频| 亚洲第一色网站| 91成人在线观看| 国产主播在线观看| 精品亚洲欧美中文字幕在线看| 亚洲人成网18禁| 久久精品人人做人人综合试看| 在线观看国产精品第一区免费| 国产午夜小视频| 日本色综合网| lhav亚洲精品| 亚洲无码视频一区二区三区 | 国产福利2021最新在线观看| 国产精品入口麻豆| 激情综合激情| 欧美国产中文| 99久久精品国产麻豆婷婷| 五月婷婷丁香综合| 在线色国产| 黄网站欧美内射| 久久黄色小视频| 国产成人亚洲毛片| 久久网欧美| 91色爱欧美精品www| 亚洲精品第五页| 黄色网页在线播放| 99ri精品视频在线观看播放| 亚洲三级色| 麻豆国产精品| 潮喷在线无码白浆| 重口调教一区二区视频| 91po国产在线精品免费观看| 欧美成人一区午夜福利在线| 91蜜芽尤物福利在线观看| 欧美日韩高清在线| AV网站中文| 污污网站在线观看| 亚洲日韩AV无码一区二区三区人| 一级一级一片免费| 国产精品区视频中文字幕| 五月激情综合网| 国产欧美日韩精品第二区| 波多野结衣无码视频在线观看| 久久毛片基地| 国产成人精品三级| 波多野结衣中文字幕久久| 国产亚洲欧美在线专区| 亚洲国产天堂久久九九九| 亚洲天堂视频网站| 久久青草免费91观看| 日韩毛片免费视频| 精品一区二区三区四区五区| 国产美女一级毛片| 精品第一国产综合精品Aⅴ| 71pao成人国产永久免费视频| 国产精品第页| 99视频只有精品| 日韩a级毛片| 亚洲综合亚洲国产尤物| 午夜福利网址| 国产午夜在线观看视频| 亚洲免费播放| 99视频在线免费| 精品亚洲国产成人AV| 9啪在线视频| 亚洲AV无码一二区三区在线播放| 亚洲天堂在线免费| 98精品全国免费观看视频| 亚洲人成影院在线观看| 国产精品无码翘臀在线看纯欲| 久久免费视频播放| 国产最新无码专区在线| 欧美色伊人| 国产激情在线视频| 国产91久久久久久| 中文字幕日韩丝袜一区| 九月婷婷亚洲综合在线| 高清免费毛片| 久久久精品无码一区二区三区| 女同久久精品国产99国|