iconOpen Access

ARTICLE

crossmark

Robust Watermarking Algorithm for Medical Images Based on Non-Subsampled Shearlet Transform and Schur Decomposition

Meng Yang1, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2, Chunyan Shao1, Yen-Wei Chen3

1 School of Information and Communication Engineering, Hainan University, Haikou, 570228, China
2 State Key Laboratory of Marine Resource Utilization in the South China Sea, Hainan University, Haikou, 570228, China
3 Graduate School of Information Science and Engineering, Ritsumeikan University, Kyoto, 5258577, Japan

* Corresponding Author: Jingbing Li. Email: email

Computers, Materials & Continua 2023, 75(3), 5539-5554. https://doi.org/10.32604/cmc.2023.036904

Abstract

With the development of digitalization in healthcare, more and more information is delivered and stored in digital form, facilitating people’s lives significantly. In the meanwhile, privacy leakage and security issues come along with it. Zero watermarking can solve this problem well. To protect the security of medical information and improve the algorithm’s robustness, this paper proposes a robust watermarking algorithm for medical images based on Non-Subsampled Shearlet Transform (NSST) and Schur decomposition. Firstly, the low-frequency subband image of the original medical image is obtained by NSST and chunked. Secondly, the Schur decomposition of low-frequency blocks to get stable values, extracting the maximum absolute value of the diagonal elements of the upper triangle matrix after the Schur decomposition of each low-frequency block and constructing the transition matrix from it. Then, the mean of the matrix is compared to each element’s value, creating a feature matrix by combining perceptual hashing, and selecting 32 bits as the feature sequence. Finally, the feature vector is exclusive OR (XOR) operated with the encrypted watermark information to get the zero watermark and complete registration with a third-party copyright certification center. Experimental data show that the Normalized Correlation (NC) values of watermarks extracted in random carrier medical images are above 0.5, with higher robustness than traditional algorithms, especially against geometric attacks and achieve watermark information invisibility without altering the carrier medical image.

Keywords


1  Introduction

As computer, network, and communication technologies have advanced, social development has entered the digital era, and medical and health care, which is closely related to human beings, has also gradually stepped into informationization and digitalization. Digitalization makes medical care more convenient and facilitates the storage, transmission and communication of a large amount of medical data. By using computer image processing technology to improve medical imaging technology, it can effectively improve the accuracy of clinical judgment of patient’s conditions. Therefore, medical images play an irreplaceable role in pathology presentation, diagnosis and treatment. However, at the same time, tampering, forgery and copying of original information have also developed, and privacy violations and security concerns abound. How to protect patient’s personal information [1] is an urgent problem. Digital watermarking [2] is an effective means to solve such problems. By applying digital watermarking to the medical field, the patient’s privacy, pathological data or signature can be embedded in the carrier medical image in the form of a watermark, and the watermark is encrypted to improve security [3,4]. In this way, even after the original medical image has been maliciously altered or attacked during transmission, etc., the watermark information can still be effectively extracted. Information exchange is achieved while ensuring the security of digital health care.

There have been lots of researches on digital watermarking in recent years. Digital watermarking algorithms for copyright protection should have good invisibility, high embedding volume and strong robustness [58]. Considering the difference of embedding domains, we can divide the digital watermark into two different kinds of watermarks, spatial domain-based and transform domain-based. At the beginning of the technology development stage, the study of digital watermarking was fundamentally based on the spatial domain, that is, adding watermark information to the spatial domain of the carrier data. For example, reference [9] shows that by embedding the processed watermark signal into the gaps of the original image, the spatial domain algorithm is simple, but once the image is attacked so that the spatial domain pixel points change, the watermark information embedded in the carrier medical image can also be corrupted. Thus, the watermark cannot be extracted well and the algorithm is less resistant to geometric attacks. Current research on digital watermarking is mainly focused on the frequency domain. Unlike the spatial domain embedding algorithm, it is implemented by embedding watermark information after transforming the carrier data, and this method does not affect the spatial pixel values of the carrier data. In addition, in the transform domain, the energy distribution is concentrated, which is helpful to ensure the invisibility of the watermark and improve its robustness of the watermark, so this algorithm is widely used. Reference [10] shows that discrete wavelet transform (DWT) has better characteristics of time domain localization and multi-resolution analysis and can better aggregate the image energy, so it is widely used. However, the robustness is not strong and still needs to be improved. Reference [11] shows that DWT first transforms the original image, then singular value decomposition (SVD) is performed on the transformed low-frequency part, and finally, the singular values extracted from the encrypted watermarked image are embedded into the singular values of the original image, the algorithm encrypts the watermark information, which enhances the security and alleviates the false alarm problem brought by SVD, but the extraction process needs to use the original image information, which is a non-blind watermark, and the practical value is not high. Reference [12] shows a fast zero watermarking algorithm based on DWT and Schur decomposition, the low-frequency subband obtained by DWT is chunked, and Schur decomposition is performed to obtain stable values and construct hash binary feature vectors. Schur decomposition avoids the false alarm problem, while the method has strong resistance to geometric attacks and belongs to zero watermarks. However, wavelet transform still has limitations for image texture feature analysis, and the effect is not as good as contourlet, shearlet, and other multiscale decomposition tools. Reference [13] shows feature extraction in the contourlet domain overcomes the limitations of conventional wavelets in scale analysis, but the ability to resist geometric attacks needs to be improved.

The algorithms above meet the requirements of digital watermarking, but their robustness needs to be improved. In this paper, we propose a novel digital watermarking algorithm for medical images with high robustness based on the Non-Subsampled Shearlet Transform (NSST) [14] and Schur decomposition. NSST is a novel multiscale geometric analysis tool, which is an improved algorithm of the shearlet transform. It has the advantages of multi-direction, translation invariance and low computational complexity. Firstly, using NSST to get the low-frequency subband image of the original medical image, which is then separated into blocks. Next, Schur decomposition is performed to obtain stable values, combined with perceptual hash binarization, and extraction of the medical image feature vector. Then the information of watermark is encrypted by logistic chaos system. Finally, the extracted feature sequences and the encrypted watermark information are exclusive OR (XOR) operations to generate the key and realize zero watermarking with third-party authentication. This paper is divided into five parts: introduction, basic theory, proposed algorithm, experiments, and analysis of results and conclusion. Experimental tests show that this algorithm outperforms the traditional wavelet domain-based zero watermarking algorithms and is more robust, especially in the case of resistance to scaling and translation attacks.

2  Basic Theory

2.1 Non-Subsampled Shearlet Transform (NSST)

Shearlet transform is the inner product of the shearlet and signal. Shearlet is a function generated by an elementary function through affine transformation, stretching, shearing and translation, etc., which can better express the characteristics of curves in two dimensions or even multi-dimensional space, solving the problem that the traditional wavelet transform cannot achieve the optimal linear error approximation. The non-Subsampled Shearlet Transform (NSST) is a novel multiscale geometric analysis tool, which is an improved algorithm of shearlet transform, it has the advantages of multi-direction, translation invariance and low computational complexity. The processing of NSST involves two essential parts: multiscale decomposition and direction localization. A non-subsampled pyramid (NSP) achieves multiscale decomposition, which ensures translation invariance and suppresses the pseudo-Gibbs phenomenon. Directional localization decomposition of images by a shear filter (SF). After the original image is decomposed by n-level NSST, one low-frequency subband image is obtained, and n high-frequency subband images with the same size and different scales are obtained. In our experiments, low-frequency image containing a large amount of contour information of the original image is usually selected for further analysis. The low-frequency subband image obtained by NSST decomposition of the medical image in this thesis, see Fig. 1 below.

images

Figure 1: Low-frequency subband image obtained after NSST decomposition

2.2 Matrix Schur Decomposition

Schur decomposition, a matrix A∈Rn×n, is decomposed into a unitary matrix U∈Rn×n and an upper triangular matrix T∈Rn×n. See Eq. (1).

A=U×T×UT(1)

For example:

[158269587]=U×[17.80422.19433.699900.20270.7044003.6014]×UT

The theory of matrix Schur decomposition has the following three properties, as follows:

(1)   The algorithm has low time complexity. Compared to singular value decomposition (SVD) [15], the time complexity of matrix Schur decomposition as the primary, intermediate step of SVD decomposition is Ο(8N3/3), Schur decomposition is less than one-third as computationally intensive as SVD, which has a temporal complexity of O(11N3). This means that Schur decomposition will be used more extensively in digital watermarking.

(2)   The Schur vector is scaling invariant. When matrix A is expanded by a factor of one, the Schur vector remains unchanged; what changes is that its eigenvalues are boosted by the same factor. Therefore, in the watermarking domain, Schur vectors can effectively resist scaling attacks.

(3)   The perturbation is relatively stable. According to the related literature, since the grayscale image can be regarded as a real matrix, and the concern of the diagonal elements of the upper triangular matrix T obtained by the Schur decomposition of the matrix with the image matrix A is also relatively stable. The energy of the matrix after the Schur decomposition is mainly concentrated in the diagonal of the matrix T.

Because of the above properties, the Schur decomposition is a fast, stable, and low false alarm. In addition, previous literature mainly used Schur decomposition to extract the maximum element on the main diagonal of the matrix T to complete the embedding. In this paper, we construct the transition matrix by extracting the maximum of the absolute values of the main diagonal elements of the matrix T, so that the problem of wrongly selecting the largest segment of energy due to positive and negative can be avoided. Therefore, the matrix Schur decomposition theory is applied to digital watermarking, and the algorithm is highly robust and fast in operation.

2.3 Logistic Map

The encryption of images carrying private information is usually done in the form of chaotic systems to protect the information. Chaos refers to the seemingly random results that occur in a specific regular process, whose behavior is uncertain and unpredictable, which is the chaos phenomenon. Common chaotic systems include a Logistic map [1618], Tent [19], etc. The most common, well-known, and widely used chaotic system is the Logistic Map. It is a standard one-dimensional chaotic system, which is widely studied and used because of its simple composition structure and convenience in implementation. The composition of the Logistic Map chaotic system is formulated as follows. See Eq. (2).

Xk+1=μXk(1Xk)(2)

μ is the growth parameter in the above equation, 0 ≤ μ ≤ 4, and the number of iterations is K. In the case of 3.5699456 < μ ≤ 4, the system is in a completely chaotic state, and the trajectory of the equations exhibits chaotic characteristics in this interval, the Logistic Map system was chaotic. In this paper, μ = 4 and an initial value of 0.2 are taken.

3  Proposed Algorithm

To avoid this situation that when the watermark is applied directly to the spatial domain of the carrier image, the image is easily attacked to change the pixel value during transmission, sharing and saving, thus causing instability and low accuracy. In this paper, we propose a novel digital watermarking algorithm for medical images with high robustness based on NSST and Schur decomposition, which correlates the watermark information with a stable feature vector extracted in the transform domain to achieve a balance of invisibility and robustness. In addition, the algorithm is more resistant to geometric attacks than the traditional wavelet-based algorithm, which is divided into four parts: image preprocessing, image feature extraction, watermark embedding and watermark extraction.

3.1 Image Preprocessing

3.1.1 Watermark Encryption

To ensure the security and accuracy of the embedded watermark information, the watermark image needs to be preprocessed with logistic chaos encryption before embedding the watermark information. The logistic chaotic system’s initial value X0 generates the chaotic sequence X(j), which is one-dimensional, yet the watermark matrix is a two-dimensional matrix, so a dimensional transformation is required. The one-dimensional sequence generated by the chaotic system coefficient values is converted into the desired binary encryption matrix C(i, j) by the dimensional formula. Finally, the binary encryption matrix is an exclusive OR (XOR) operation with the binary watermark W(i, j) to obtain the encrypted watermark CW(i, j). See Eq. (3). In this paper, μ = 4 and an initial value of 0.2 are taken. For the process of watermark encryption, see Fig. 2 below.

CW(i,j)=C(i,j)W(i,j)(3)

images

Figure 2: Encryption process of watermark

3.1.2 Medical Image Preprocessing

In order to extract stable regions of the original medical image to improve the resistance of the algorithm to attacks, the actual medical image needs to be preprocessed before embedding the watermark information. So as to overcome the limitations of traditional wavelet transform in direction and scale analysis, this paper adopts a non-downsampling multiscale geometric analysis tool to preprocess medical images. The original image is transformed by NSST to get a low-frequency subband image that better reflects its texture information. It is then processed in chunks, and the matrix Schur decomposition is applied to each chunk to obtain its stability value.

3.2 Extraction of Visual Feature Vectors of Medical Images

To chunk the preprocessed medical images and perform matrix Schur decomposition on each chunk, extract the maximum value of the absolute value of the diagonal elements of the upper triangular matrix obtained from the Schur decomposition, and construct the transition matrix from it, the mean of the matrix is compared to each element’s value, creating a feature matrix by combining perceptual hashing, selecting 32 bits as the feature vector. For further validate the stability of the extracted image feature vectors, various attacks are performed on the images before extracting their feature sequences. From the experimental data, it can be seen that the image feature sequences extracted under different attacks do not change, and the correlation coefficients between them are all 1. See Table 1. Next, we further test whether the image feature sequences extracted using this algorithm can be used to distinguish between different medical images. We selected six different medical images, see Fig. 3 below, and their feature sequences were extracted separately, see Table 2, and conducted similarity tests for each of the two images, see Table 3. The experimental data show that the correlation coefficient values between the images with differences are less than 0.5, which confirms that the image feature vectors extracted by the algorithm can be used to distinguish the features of different images. Therefore, the 32-bit binary sequences extracted by this transformation can be used as visual features of medical images.

images

images

Figure 3: Six different medical images. (a) Pleural. (b) Cervical vertebra. (c) Abdomen. (d) Pancreas. (e) Lumbar spine. (f) Hand

images

images

3.3 Embed Watermark

The extracted image feature sequence and the encrypted watermark information are subjected to XOR logic operation to complete the embedding of the watermark, and the key K(i, j) generated in the watermark embedding process is then stored in the third-party copyright authentication center for the extraction process of watermark information. The extraction of feature vectors and the process of implementing the zero watermark, see Fig. 4 below.

images

Figure 4: Feature vector extraction and watermark embedding

3.4 Extraction of Watermark

End of attack experiment, the medical image to be tested is obtained. Extracting feature sequences from attacked image and performing XOR logic operation with the key stored in the third-party authentication center at the time of embedding to get a binary logic sequence containing watermark information, see Eq. (4). And then uses logistic system to get a chaotic sequence with the same parameters to decrypt the watermarked image, see Eq. (5), and finally realizes the extraction of the watermark, see Fig. 5 below.

images

Figure 5: Extraction of watermark

CW(i,j)=V(j)K(i,j)(4)

W(i,j)=CW(i,j)C(i,j)(5)

4  Experiments and Analysis of Results

In this paper, the experiments were conducted in MATLAB R2017b platform, two 512 × 512 size medical images and a 32 × 32 size watermarked image were selected for the experiments (we currently use medical images that are publicly available online and medical images that come with MATLAB for research purposes), see Fig. 6 below, and the experimental effect evaluation criteria used Peak Signal to Noise Ratio (PSNR) [20,21], see Eq. (6), and Normalized Correlation (NC) [22], see Eq. (7). PSNR demonstrates the contrast between the original and attacked images. which symbolizes the strength of the attack, the smaller its value indicates the stronger and more destructive the attack. NC can more accurately use the data to objectively evaluate the similarity between images. In this experiment, the NC value represents how similar the original watermark and the watermark created from the attacked image are to one another, which is used to measure the robustness of the algorithm. The larger its value indicates the better effect of the extracted watermark, that is, the stronger the robustness is. In our experiments, using medical images containing watermarked information, we execute conventional and geometric attacks, respectively.

images

Figure 6: Medical pictures and watermarks. (a) Original medical image 1. (b) Original medical image 2. (c) Original binary watermark. (d) Encrypted watermark

PSNR=10lg [ MNmaxi,  j(I(i,j))2ij(I(i,j))I'(i,j))2 ](6)

NC=ijW(i,j)W(i,j)ijW2(i,j)(7)

The above equation I(i, j) denotes the grayscale value of the original medical image, and I(i, j) means the grayscale value of the embedded watermarked image, M and N represent the number of matrix rows and columns. W(i, j) is the grayscale value of the binary watermarked image, and W(i, j) is the gray value of the extracted binary watermarked image, and in general, when NC ≥ 0.5 means the two have a good correlation.

4.1 Conventional Attacks

To test the experimental effectiveness of this algorithm, we tested several common conventional attacks on carrier medical images. It can be seen that the PSNR gets smaller as the intensity of different attacks rises, the damage increases with the degree of image distortion, and the NC value eventually drops. The experimental result data showed that when the interference intensity of gaussian noise reaches 25%, the NC value is above 0.88, which is much larger than 0.5; even though the JPEG attack compression quality is only 10%, the NC value is still 1.00; under the attack of 10 repetitions of the median filter with a window size of [7 × 7], it still above 0.79, see Fig. 7 below, indicating that this algorithm is highly robust against conventional attacks. For the experimental data under conventional attacks, see Table 4.

images

Figure 7: Under conventional attacks. (a) Gaussian noise 10%. (b) Extracted watermarks under attack a. (c) JPEG compression 10%. (d) Extracted watermarks under attack c. (e) Median filter [7 × 7] (10 times). (f) Extracted watermarks under attack e

images

4.2 Geometric Attacks

The geometric attack resistance of the algorithm is significant, we tested several common geometric attacks on the images containing watermark information, and the NC value can reach above 0.69 when the rotation attack reaches 20 degrees; the NC value can reach 1.00 when the scaling attack is two times; even if the translation (down) is larger degrees, the NC value is above 0.6, see Fig. 8 below, which indicates that the algorithm has strong geometric attack resistance and can be well applied in the zero watermark algorithm. For the data under geometric attacks, see Table 5.

imagesimages

Figure 8: Under geometric attacks. (a) Clockwise rotation 10°. (b) Extracted watermarks under attack a. (c) Scaling 2 times. (d) Extracted watermarks under attack c. (e) Left translation 5%. (f) Extracted watermarks under attack e. (g) Down translation 20%. (h) Extracted watermarks under attack g

images

To present more clearly the effectiveness of the algorithm against various common attacks. The data under six different attacks are presented on a chart and the average NC value of each attack under two additional medical images is given. See Fig. 9 below. It can be found that the average NC value of the same medical image under different attack types is all above 0.75 and applies to other medical images. It is proved that this algorithm has strong robustness against conventional and geometric attacks.

images

Figure 9: The average NC value of each type of attack under two different medical images

4.3 Comparison of Algorithms

Comparing this algorithm with two existing zero watermarking algorithms under the same attacks and the same medical image, we can find that although this algorithm has a slight weakness against the median filter and rotation attacks, its robustness against other attacks is significantly higher than that of the two different algorithms. Even when the attack strength is significant, the NC value is still between 0.63 and 1.00, which is stable and has a stronger resistance to attacks, see Table 6.

images

To express the superiority of this algorithm more clearly, we take the average NC value of each attack and obtain a line graph of the average NC value. It can be found that this algorithm is significantly more robust against geometric attacks, especially against scaling and translation attacks. See Fig. 10 below.

images

Figure 10: Comparison of the average NC values of these three algorithms under six different attacks

5  Conclusion

This paper proposes a robust watermarking algorithm for medical images based on NSST and Schur decomposition. We combine chaotic encryption and zero-watermarking techniques to improve security and invisibility significantly. Firstly, to reasonably express the texture information of the medical image, the NSST is applied to the medical image to achieve multiscale and multi-directional decomposition of the image. Then, using Schur decomposition, the stable values of the low-frequency subband are obtained, combined with perceptual hash binarization to extract the medical image feature sequences. Finally, the extracted feature sequences and the encrypted watermark information are XOR operations to generate the key and realize zero watermarking with third-party authentication. Combined with a large amount of experimental data research found that this algorithm can effectively resist various types of attacks that often appear on the Internet and in our daily lives, with significant robustness advantages, especially for geometric attacks. To further improve the algorithm, we will combine deep learning methods to extract medical image features for better results.

Acknowledgement: Thanks to the editors and reviewers for suggestions for improving the manuscript.

Funding Statement: This work was supported in part by the Natural Science Foundation of China under Grants 62063004, the Key Research Project of Hainan Province under Grant ZDYF2021SHFZ093, the Hainan Provincial Natural Science Foundation of China under Grants 2019RC018 and 619QN246, and the postdoctoral research from Zhejiang Province under Grant ZJ2021028.

Conflicts of Interest: The authors declare they have no conflicts of interest to report regarding the present study.

References

1. H. Shi, Y. Wang, Y. N. Li, Y. G. Ren and C. Guo, “Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication,” Multimedia Tools and Applications, vol. 80, pp. 24631–24667, 2021. [Google Scholar]

2. Y. L. Li and C. K. Chen, Research on Digital Watermarking Algorithm for Medical Images. Tianjin: Tianjin University of Technology, 2018. [Google Scholar]

3. X. Sun and Y. Yao, R esearch of Image Encryption and Decryption Algorithm Based on Digital Watermarking. Wuhan: Central China Normal University, 2020. [Google Scholar]

4. Y. P. Cao, F. Yu and Y. M. Tang, “A digital watermarking encryption technique based on FPGA cloud accelerator,” IEEE Access, vol. 8, pp. 11800–11814, 2020. [Google Scholar]

5. D. K. Li, Y. W. Chen, J. B. Li, L. Cao, U. A. Bhatti et al., “Robust watermarking algorithm for medical images based on AKAZE-DCT,” IET Biometrics, vol. 11, no. 6, pp. 534–546, 2022. [Google Scholar]

6. S. Y. Sun and W. J. Liu, Research on Zero Watermarking Algorithm with Resistance to Geometric Attacks. Fuxin: Liaoning University of Engineering and Technology, 2018. [Google Scholar]

7. W. X. Zhang, J. B. Li, U. A. Bhatti, M. X. Huang, J. X. Ma et al., “Robust zero-watermarking algorithm for medical images based on K-means and DCT,” International Journal of Wireless and Mobile Computing (IJWMC), vol. 23, no. 2, pp. 163–172, 2022. [Google Scholar]

8. M. S. Sheng, J. B. Li and J. Liu, “Robust zero-watermarking algorithm for medical images based on Hadamard-DWT-DCT,” International Journal of Wireless and Mobile Computing (IJWMC), vol. 23, no. 2, pp. 183–192, 2022. [Google Scholar]

9. C. H. Yu, “On the application of digital watermarking technology in image encryption,” Journal of Huaiyin Institute of Technology, vol. 18, no. 5, pp. 57–62, 2009. [Google Scholar]

10. D. L. Cui, “Zero watermarking technique for digital images based on DWT,” Journal of Chengdu Information Engineering Institute, vol. 3, pp. 306–308, 2007. [Google Scholar]

11. Z. J. Xiong and L. Wang, “Improved reference watermarking scheme in DWT-SVD domain,” Computer Engineering and Applications, vol. 50, no. 7, pp. 75–79, 2014. [Google Scholar]

12. W. J. Liu, S. Y. Sun and H. C. Qu, “Fast zero watermarking algorithm for Schur decomposition,” Computer Science and Exploration, vol. 13, no. 3, pp. 494–504, 2019. [Google Scholar]

13. X. Q. Wu, J. B. Li, R. Tu, J. R. Cheng, U. A. Bhatti et al., Research on Digital Watermarking Algorithm of Medical Images Based on Contourlet Transform. Haikou: Hainan University, 2020. [Google Scholar]

14. F. F. Jiang, J. Y. Liu, T. Li, M. J. Luo and D. Li, “An introduction to zero watermarking algorithm based on NSST-DCT,” Heilongjiang Science and Technology Information, vol. 13, pp. 121, 2017. [Google Scholar]

15. C. Liu, J. G. Sun, Y. K. Zhang and W. J. Liu, “Robust zero watermarking algorithm based on SVD,” Journal of Liaoning University of Engineering and Technology (Natural Science Edition), vol. 38, no. 4, pp. 372–376, 2019. [Google Scholar]

16. A. Kamrani, K. Zenkouar and S. Najah, “A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory,” Multimedia Tools and Applications, vol. 79, pp. 20263–20279, 2020. [Google Scholar]

17. B. Vijayakumar and S. Khond, “Wavelet based reversible image watermarking with logistic encryption for health informatics systems,” International Journal of Recent Technology and Engineering (IJRTE), vol. 8, pp. 3567–3570, 2019. [Google Scholar]

18. W. H. Wang and Y. L. Liu, “Research on image encryption algorithm based on two-dimensional logistic chaotic sequence,” Journal of Changchun University of Science and Technology (Natural Science Edition), vol. 33, no. 4, pp. 111–113, 2010. [Google Scholar]

19. Y. L. Liu, J. B. Li, J. Liu, J. R. Cheng, J. L. Liu et al., “Robust encrypted watermarking for medical images based on DWT-DCT and tent mapping in encrypted domain,” Artificial Intelligence and Security, vol. 11633, pp. 584–596, 2019. [Google Scholar]

20. M. K. Feng, S. M. Zhao and C. Xing, “A PSNR image evaluation method based on visual characteristics,” Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), vol. 35, no. 4, pp. 33–38, 2015. [Google Scholar]

21. W. Dong and H. X. Bie, Research on Image Quality Evaluation Method Based on Shearlet Transform. Beijing: Beijing University of Posts and Telecommunications, 2021. [Google Scholar]

22. Z. Cao, “Exploring the intrinsic relationship of covariance, correlation coefficient, and regression coefficient,” China Collective Economy, vol. 25, pp. 76–78, 2022. [Google Scholar]

23. C. Zeng, J. Liu, J. B. Li, J. R. Cheng, J. J. Zhou et al., “Multi-watermarking algorithm for medical image based on KAZE-DCT,” Journal of Ambient Intelligence and Humanized Computing, pp. 1–9, 2022. [Google Scholar]

24. X. L. Xiao, J. B. Li, J. Liu, Y. X. Fang, C. Zeng et al., “A Zero-watermarking algorithm for medical images based on Gabor-DCT,” Cyberspace Safety and Security (CSS), vol. 12653, pp. 144–156, 2020. [Google Scholar]


Cite This Article

APA Style
Yang, M., Li, J., Bhatti, U.A., Shao, C., Chen, Y. (2023). Robust watermarking algorithm for medical images based on non-subsampled shearlet transform and schur decomposition. Computers, Materials & Continua, 75(3), 5539-5554. https://doi.org/10.32604/cmc.2023.036904
Vancouver Style
Yang M, Li J, Bhatti UA, Shao C, Chen Y. Robust watermarking algorithm for medical images based on non-subsampled shearlet transform and schur decomposition. Comput Mater Contin. 2023;75(3):5539-5554 https://doi.org/10.32604/cmc.2023.036904
IEEE Style
M. Yang, J. Li, U.A. Bhatti, C. Shao, and Y. Chen "Robust Watermarking Algorithm for Medical Images Based on Non-Subsampled Shearlet Transform and Schur Decomposition," Comput. Mater. Contin., vol. 75, no. 3, pp. 5539-5554. 2023. https://doi.org/10.32604/cmc.2023.036904


cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1113

    View

  • 487

    Download

  • 5

    Like

Share Link