Next Article in Journal
Casorati Inequalities for Statistical Submanifolds in Kenmotsu Statistical Manifolds of Constant ϕ-Sectional Curvature with Semi-Symmetric Metric Connection
Next Article in Special Issue
Privacy-Preserving Design of Scalar LQG Control
Previous Article in Journal
Gamow Temperature in Tsallis and Kaniadakis Statistics
Previous Article in Special Issue
B-DP: Dynamic Collection and Publishing of Continuous Check-In Data with Best-Effort Differential Privacy
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Medical Image Authentication Method Based on the Wavelet Packet and Energy Entropy

1
Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China
2
School of Information and Electrical Engineering, Xuzhou University of Technology, Xuzhou 221008, China
3
School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(6), 798; https://doi.org/10.3390/e24060798
Submission received: 27 April 2022 / Revised: 31 May 2022 / Accepted: 6 June 2022 / Published: 8 June 2022
(This article belongs to the Special Issue Adversarial Intelligence: Secrecy, Privacy, and Robustness)

Abstract

:
The transmission of digital medical information is affected by data compression, noise, scaling, labeling, and other factors. At the same time, medical data may be illegally copied and maliciously tampered with without authorization. Therefore, the copyright protection and integrity authentication of medical information are worthy of attention. In this paper, based on the wavelet packet and energy entropy, a new method of medical image authentication is designed. The proposed method uses the sliding window to measure the energy of the detail information. In the time–frequency data distribution, the local details of the data are mined. The complexity of energy is quantitatively described to highlight the valuable information. Based on the energy weight, the local energy entropy is constructed and normalized. The adjusted entropy value is used as the feature vector of the authentication information. A series of experiments show that the authentication method has good robustness against shearing attacks, median filtering, contrast enhancement, brightness enhancement, salt-and-pepper noise, Gaussian noise, multiplicative noise, image rotation, scaling attacks, sharpening, JPEG compression, and other attacks.

1. Introduction

With the widespread application of digital diagnosis technology, hospitals are producing a large amount of digital medical information every day. The digital medical information includes all kinds of medical images, electronic medical records (EPRs), electronic health records (EHRs), and diagnosis data. The rapid development of image analysis, signal processing, and 5G network technology have provided technical support for telemedicine, telemedicine consultation, and telemedicine teaching. Relying on efficient information processing methods, medical experts in different places can discuss diseases in real time. The application of new technology has further improved the diagnosis and treatment effect for patients.
In the public network environment, the dissemination of digital medical information not only provides convenience for patients but also brings new security risks. When increasing amounts of medical data are transmitted to medical centers, the confusion of the medical data of different patients may cause medical negligence. Therefore, the medical data of different patients require extra care in the storage and distribution processes. At the same time, during the process of network transmission, any minor changes in medical information may create new medical disputes. Therefore, the security authentication of medical information is particularly important. In recent years, experts and scholars have studied a variety of medical image authentication schemes [1,2]. Some researchers have focused their efforts on detecting whether the medical images have been tampered. Others focused their efforts on identifying the tampered areas and repairing the tampered areas [3,4]. However, from the perspective of practical application, the authentication process of medical images should focus on whether the medical images have been tampered. The process should also focus on whether the authentication process impacts the medical diagnosis. In order to avoid distortion, some researchers divided the medical images into blocks; that is, the images were divided into regions of interest (ROIs) and regions of noninterest (RONIs). Different authentication methods are used for the ROI region and the RONI region. This kind of method is simple to implement, easy to operate, and easy to recover. The disadvantage of this scheme is that the method has poor fault tolerance and is easy for attackers to recover [1,5,6]. Some scholars have integrated different kinds of transformation domain operations such as DWT, DCT, DFT, quantization index modulation under dither modulation (QIM-DM), SVD, neural networks, and cryptography to authenticate medical images [7,8,9]. Several classical authentication schemes integrate various transform domain operations. For example, Anand integrated ECC encryption and digital watermarking technology to protect the security of medical information [3]. Singh used Hamming error correction code, a digital watermark, and cryptography to improve the security of authentication methods and reduce the bandwidth redundancy [8]. Thakur designed a double watermark model suitable for medical image security authentication by comprehensively using DWT, SVD, Hamming code, and chaotic encryption [9]. Jinhua designed a quantization-based image watermarking scheme by using the information entropy of the wavelet domain [10]. Hu et al. used a key to control the logistic chaotic map, and searched for the same binary sequence as the watermark information to realize authentication [11]. Based on DWT and visual cryptography, Hsieh and Huang proposed an authentication scheme, which is characterized by the mean and variance of the wavelet coefficients [12]. Aiming at the security protection of telemedicine applications, scholars such as Borra, Pirbhulal, and Farhan fully integrated FRT-SVD and cryptographic methods to realize the authentication of medical information [13,14,15,16]. Scholars such as Hsu and Hou have studied some security authentication methods by integrating cryptography and zero watermark. The implementation of such methods requires the integration of special transformation operations [17,18,19,20]. Compared with the spatial domain methods, the transformation domain methods have strong reversibility, high security, good visual quality, and resist attack. The disadvantages are that the calculation is complex and the implementation of the algorithm needs a specially designed scheme.
The effectiveness of all of the authentication schemes has been confirmed, and the different authentication methods each have their own advantages and disadvantages. Under the application background, the authentication model should ensure the uniqueness of data sources. The authentication model should also ensure the one-to-one correspondence between the data information and the relevant patients. A good authentication model should have good invisibility and robustness. Invisibility means that the authentication process cannot affect the quality of medical information. At the same time, the authentication process should not cause new medical disputes. Robustness means that the authentication model is still available under various geometric attacks and noise attacks. On the basis of previous work, we discussed the problem from the perspective of energy entropy. By using energy entropy, a suitable method for medical image authentication was designed. The innovations of this method are as follows:
(1)
In the time–frequency data distribution, the energy of the detailed information is described. Then, the complexity weight of the energy is measured. Based on this, the local energy entropy is constructed.
(2)
From the perspective of energy, the local details of the data are mined and then the local energy entropy is normalized. The processed entropy is used as the feature of the authentication information.
(3)
The proposed authentication method combines the advantages of multiresolution analysis and the stability of local energy entropy. No noise is added in the authentication process. The integrity goal of the authentication is achieved.
A series of attack experiments verified that the proposed method is robust in image compression, channel noise, as well as against intentional and unintentional attacks.

2. Basic Theory

2.1. Basic Theory of Wavelet Packet Transform

The wavelet packet transform is an extension of the wavelet transform, and its theory and algorithm are based on the wavelet transform [21,22,23]. The wavelet transform adopts a tower-type signal decomposition mode; that is, the signal is continuously decomposed on the low-frequency channel. The wavelet transform only extracts the low-frequency components and ignores the middle- and high-frequency features that may reflect the important information in the signal. The wavelet packet transform can gather in all frequency ranges, which not only retains the multiresolution characteristics but also makes full use of the rich detail information.
In orthogonal wavelet decomposition, through multiresolution analysis, only the subspace Vj is decomposed into mutually orthogonal subspaces Vj+1 and Wj+1, namely:
V j = V j + 1 W j + 1
Different from the wavelet transform, the wavelet packet transform also further decomposes Wj at any decomposition level. Assuming that the decomposition starts from V0, let W 0 0 = V 0 , ψ 0 0 ( t ) = ϕ ( t ) , where ϕ ( t ) is the scaling function, then { ψ 0 0 ( t k ) } k Z is the orthonormal basis of W 0 0 . First, W 0 0 is decomposed into W 1 0 and W 1 1 , and there are W 1 0 W 1 1 and W 0 0 = W 1 0 W 1 1 . The subspace W j n is decomposed into W j + 1 2 n and W j + 1 2 n + 1 , and there are W j + 1 2 n W j + 1 2 n + 1 and W j n = W j + 1 2 n W j + 1 2 n + 1 .Then, the orthonormal bases of subspaces W j n , W j + 1 2 n , and W j + 1 2 n + 1 are { ψ j n ( t 2 j k ) } k Z , { ψ j + 1 2 n ( t 2 j + 1 k ) } k Z , and { ψ j + 1 2 n + 1 ( t 2 j + 1 k ) } k Z , respectively, and they satisfy the following two-scale equations:
{ ψ j + 1 2 n ( t ) = k z h k ψ j n ( t 2 j k ) ψ j + 1 2 n + 1 ( t ) = k z g k ψ j n ( t 2 j k )
where h k and g k are a pair of conjugate mirror filters, and g k = ( 1 ) k h 1 k .
Let f ( t ) V 0 ; according to the decomposition relationship of V 0 , for any specified layer j, V 0 = W j 0 W j 1 W j 2 j 1 .
Using the known filter { h k , g k } and the projection coefficient d j , k n of f in subspace W j n at scale j, the projection coefficients d j + 1 , k 2 n , d j + 1 , k 2 n + 1 of f in subspaces W j + 1 2 n and W j + 1 2 n + 1 at scale j + 1 are calculated.
The decomposition and reconstruction algorithm of the wavelet packet are as follows:
Equation (3) gives the decomposition algorithm of the wavelet packet:
{ d j + 1 , k 2 n = l h l 2 k d j , l n d j + 1 , k 2 n + 1 = l g l 2 k d j , l n , k Z
Equation (4) gives the reconstruction algorithm of the wavelet packet:
d j , k n = m ( h k 2 m d j + 1 , m 2 n + g k 2 m d j + 1 , m 2 n + 1 ) , k Z

2.2. Wavelet Packet Decomposition of Images

The wavelet decomposition of the image can be transformed into the wavelet decomposition of the one-dimensional signal (row and column). For the two-dimensional image f of M × N , the following steps can be used for wavelet packet decomposition:
(1) Wavelet transform is performed on image f , then four subimages f ( H r , H c ) , f ( H r , G c ) , f ( G r , H c ) , and f ( G r , G c ) are obtained.
Among them, f ( H r , H c ) is a low-frequency image. f ( H r , G c ) , f ( G r , H c ) , and f ( G r , G c ) are the vertical, horizontal, and diagonal subimages, respectively, which are high-frequency images.
(2) Continue the operation in step (1) for the four subgraphs and then obtain the four subgraphs of each subimage. The cycle is carried out until n-level wavelet packet decomposition subgraphs are obtained.
Figure 1 shows the subgraphs of the image decomposed by the first- and second-level wavelet packets.

2.3. Theory of Energy Entropy

Information entropy is a concept used to measure the amount of information in information theory [10]. It was proposed by Shannon in 1948 and is defined as follows:
Suppose that the information source X is a discrete random variable and the value of X is X = { x 1 , x 2 , , x n } . If the probability of the occurrence of each message is P = { p 1 , p 2 , , p n } and i = 1 n p i = 1 , then the information entropy of X can be expressed as Formula (5):
H ( X ) = i = 1 n p i log p i
Suppose that a two-dimensional image f is decomposed by wavelet packet. The energy corresponding to the ith sub-image f i , j of the jth layer is denoted as E i , j , then
E i , j = k = 1 M l = 1 N | f i , j ( k , l ) | 2 ,   i = 0 , 1 , , 4 j 1
where M and N are the size of the subimage f i , j , and f i , j ( k , l ) represents the gray value of the subimage f i , j ( k , l ) at ( k , l ) . Then, the total energy of the jth layer is E j = i = 0 4 j 1 E i , j .
Let P i , j = E i , j E j = E i , j i = 0 4 j 1 E i , j , then i = 0 4 j 1 P i , j = 1 . According to information entropy theory, the energy entropy of the ith subimage f i , j is defined as follows:
E W P E E = i = 0 4 j 1 P i , j log P i , j

3. Authentication Scheme

3.1. Ownership Construction Phase

Multiresolution decomposition of medical images is carried out by the wavelet packet transform. In a time–frequency data distribution, a sliding window is used to measure the energy of the detailed information. Based on the energy weight, the local energy entropy is constructed. From the perspective of energy entropy, the local details of the data are mined. The local energy entropy is normalized and stored in a third-party certification center as authentication information. Figure 2 shows a schematic diagram of the copyright construction process. The detailed implementation process is shown below.
  • Step 1: Extraction of robust features.
When the robust areas of carrier information are fully used, the authentication method can better resist various attacks. The medical image R is multiscale-decomposed by the wavelet packet. After this operation, the low-frequency approximate wavelet coefficient f11 can be obtained. The low-frequency data f11 are decomposed into nonoverlapping blocks. The energy entropy of the segmented data can be calculated by Formulas (6) and (7) in Section 2.3.
[f11,f12,f21,f22] = DWT(R).
  • Step 2: Construct feature vector.
According to the energy entropy of each data block, the average energy entropy of the segmented data can be calculated. By using Equation (8), the relationship between the energy entropy of each segmented data and the mean energy entropy can be analyzed, and then the binary feature vector can be constructed.
F = { 0 ,   i f   E n i > = E n 1 ,   else
where i = 1 , 2 , , n × n , E n i is the energy entropy of each block, and E n is the mean energy entropy of all information blocks. The feature vector F is the original feature information extracted from the medical images by using wavelet packet energy entropy as the analysis tool.
  • Step 3: Form authentication information and store authentication results.
Perform the XOR operation between the copyright authentication information IM and the extracted feature vector F. The results are stored in a third-party center for authentication.
D W = X O R ( I M , F )
where IM is the copyright logo data.

3.2. Ownership Verification Phase

Assuming that R’ is the image to be authenticated after a series of attacks, Figure 3 shows the schematic diagram of the authentication process. The detailed authentication process is shown below.
  • Step1: Extraction of robust features.
The suspected medical image R′ is multiscale-decomposed by the wavelet packet. The low-frequency approximate wavelet coefficient f11 can be obtained. Then, the low-frequency data f11 are decomposed into nonoverlapping blocks. The energy entropy of the segmented data can be calculated by the Formulas (6) and (7) in Section 2.3.
[f11′,f12′,f21′,f22] = DWT(R′).
  • Step 2: Construct feature vector.
According to the energy entropy of each data block, the average energy entropy of the segmented data is calculated. By using Equation (10), the relationship between the energy entropy of each segmented data and the mean energy entropy is analyzed. The binary feature vector F′ can be constructed.
F = { 0 ,   i f   E n i > = E n 1 ,   else ,
where i = 1 , 2 , , n × n , E n i is the energy entropy of each block, and E n is the mean energy entropy of all the information blocks. The feature vector F′ is the feature information extracted from the suspected images.
Step3: Complete verification.
Perform the XOR operation between the feature information F′ and DW, which is stored in a third-party authentication center. The results are stored in matrix IM′ and IM′ is the recovered authentication information. The authentication is completed by judging the difference between IM and IM′.
I M = X O R ( D W , F )
where IM is the original logo data, and IM′ is the recovered logo data.

4. Analysis of Experimental Results

In order to verify the feasibility of this method, six different types of medical images were selected as the test images from the medical image platform at https://peir.path.uab.edu/library/We, accessed the platform, (accessed on 10 August 2021). The six images were from different parts of the human body, which better verified the robustness of the proposed method. Figure 4 gives the test images and a 32 × 32 logo image. The proposed method was tested in the six images. Due to the space limitations, we provide the test results on breast images and presents the averaged results for all six test images.
The peak signal-to-noise ratio (PSNR) of the original image and the attacked image is used to quantitatively describe the impact of various attacks on the original carrier information. The greater the PSNR value, the higher the similarity of the two images. When the PSNR value is less than 30 dB, the human eye can perceive the difference between the original image and the attacked image. The evaluation index is more consistent with the visual perception characteristics of the human eyes. The robustness of the authentication method is evaluated by the normalized similarity value (NC). The NC value is between zero and one. The larger the NC value, the higher the similarity between them. The robustness of the authentication method can be verified when the PSNR is very low and the NC value is very high.
P S N R = 10 log 10 255 2 M S E ( d B ) , M S E = 1 M × N i = 1 M j = 1 N ( H i j H i j ) 2 ,
where M and N are the width and height of the tested image; H i j , H i j are the pixel value of the carrier image before and after the attack, respectively.
N C = 1 b = 1 B w b w b B
where w b , w b are the original authentication information and the extracted copyright information, respectively; B is the size of the copyright information.

4.1. Correlation Test between Different Features

The features used for authentication should have strong autocorrelation with the carrier. The authentication features extracted from different images should have strong independence. The authentication features extracted from different images should be independent of each other. In order to verify the autocorrelation between the features, Table 1 is used to show the correlation values of the different features. The correlation between different features is evaluated by the normalized similarity value (NC). The NC value is between zero and one. The larger the NC value, the higher the similarity between them. It can be seen from Table 1 that most of the data are close to 0.7 and some are close to 0.3. The results indicate that the features extracted from different images were different.

4.2. Analysis of Experimental Results

Due to the interference of network noise and human factors, medical information may change in the process of network transmission. In order to intuitively verify the effectiveness of the proposed method, we use Figure 5, Figure 6, Figure 7, Figure 8, Figure 9, Figure 10, Figure 11, Figure 12, Figure 13, Figure 14 and Figure 15, which show the robustness results of a breast after a series of simulated attacks. The simulated attack types were image rotation (rotation 10 degrees), scaling attack (zoom to 200%), sharpening attack, JPEG compression attack (compression factor 10%), salt and pepper noise attack (parameter 0.001), Gaussian noise attack (Gaussian parameter 0.005), multiplicative noise attack (noise parameter 0.01), contrast enhancement attack, brightness enhancement attack, clipping attack (cutting out 1/5 of the original image), and median filtering attack (filtering parameter 5 × 5).
Figure 5, Figure 6, Figure 7, Figure 8, Figure 9, Figure 10, Figure 11, Figure 12, Figure 13, Figure 14 and Figure 15 show the robustness of the breast image after a series of simulated attacks. Table 2 presents the averaged results of the six test images.
Medical information is different from traditional data information. Even slight changes in medical information may cause medical disputes. From Figure 5, Figure 6, Figure 7, Figure 8, Figure 9, Figure 10, Figure 11, Figure 12, Figure 13, Figure 14 and Figure 15, it can be seen that the proposed method has good robustness against conventional attacks, especially against JPEG compression (compression factor 10%), rotation attack (rotation 10 degrees), scaling attack (zoom in 200%), multiplicative noise (noise parameter 0.01), brightness enhancement, etc. The NC value of the authentication image was one. The NC values of the other attack tests were also close to one. Especially for the clipping attack, the visual change was obvious after the attack (PSNR = 15.7723 after the attack). The NC value of the authentication information extracted from the attacked image was still close to one (NC = 0.9688). After Gaussian noise, contrast enhancement, and brightness enhancement attacks, the visual change in the original medical image was also obvious (PSNR value was less than 30). The NC value of the authentication information extracted from the attacked image was also close to one. It can be seen that the proposed method has good robustness against both conventional geometric and nongeometric attacks.

4.3. Algorithm Comparison Test

Figure 5, Figure 6, Figure 7, Figure 8, Figure 9, Figure 10, Figure 11, Figure 12, Figure 13, Figure 14 and Figure 15 and Table 2 verify the effectiveness of the method from both visual effects and numerical calculations. To further verify the robustness of the proposed method, Table 3, Table 4 and Table 5 and Figure 16 and Figure 17 show the comparison results between this method and other authentication methods.
Table 4 and Figure 16 describe the comparison results with reference methods [11,18,19,20] under various attacks such as brightness, median filtering, scaling change, noise, rotation, JPEG compression, clipping, etc. The results show that the proposed method has good robustness under various attacks. From Figure 16, compared with the reference methods [11,18,19,20], the proposed method shows good robustness in resisting Gaussian noise, median filtering, JPEG compression, rotation attack, etc. The robustness of the proposed method against cropping attack is slightly weaker than that of the reference methods [11,18,19,20]. The proposed method can meet security authentication requirements.
In comparison with reference methods [3,8,9], the proposed method shows good robustness against salt-and-pepper noise, Gaussian noise, multiplicative noise, rotation attack, JPEG compression, scaling, median filtering, etc. From Table 5 and Figure 17, the NC value of seven attack tests is equal to 1 and the other NC values are also close to 1.
Through comparative analysis with previously reported methods [3,8,9,11,18,19,20], by mining and analyzing the local features of wavelet packet energy entropy, the formed authentication information shows good robustness in resisting Gaussian noise, median filtering, JPEG compression, rotation attack, and so on. Limited by the aggregation of energy, the robustness of the proposed method against cropping attack is slightly weaker.

5. Conclusions

Without adding any noise or making any change to the original medical image, based on the wavelet packet energy entropy, the complexity of the information energy was quantitatively described. From the perspective of local energy, the features of the data were fully mined, and the local energy entropy was constructed. By using the energy measurement the feature vector was formed. A series of attack tests showed that the authentication method has good rotation invariance and scale invariance. The results showed strong robustness against common geometric deformation and various kinds of noise attacks. At the same time, this method has good universality and is especially useful for military images and medical images.

Author Contributions

Conceptualization, T.S. and X.W.; methodology, T.S.; software, T.S.; validation, K.Z. and D.J.; resources, W.Z.; data curation, B.D.; writing—original draft preparation, D.L.; writing—review and editing, X.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (no.: 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (no.: MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (no.: XLYC1802013), Key R&D Projects of Liaoning Province (no.: 2019020105-JH2/103), the Youth Foundation of Xuzhou Institute of Technology (No:XKY2017223), Xuzhou Science and Technology Plan Project (KC19197, KC17078, KC18011), Major Project of Natural Science Research of the Jiangsu Higher Education Institutions of China (18KJA520012), and Qinglan Project of Jiangsu Province under grant 2018.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The medical images selected as the test images were taken from the medical image platform at https://peir.path.uab.edu/library/ (accessed on 10 August 2021).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ashima, A.; Amitkumar, S. Watermarking techniques for medical data authentication: A survey. Multimed. Tools Appl. 2020, 13, 30165–30197. [Google Scholar]
  2. Singh, A.K.; Patna, N. Data Hiding: Current Trends, Innovation and Potential challenges. ACM Trans. Multimed. Comput. Commun. Appl. 2020, 16, 1–16. [Google Scholar] [CrossRef]
  3. Anand, A.; Singh, A.K. Joint Watermarking-Encryption-ECC for Patient Record Security in Wavelet Domain. IEEE Multimed. 2020, 3, 66–75. [Google Scholar] [CrossRef]
  4. Singh, A.K.; Thakur, A. Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents. ACM Trans. Internet Technol. 2021, 1, 1–20. [Google Scholar] [CrossRef]
  5. Singh, A.K.; Chandan, K. Encryption-then-Compression based Copyright Protection Scheme for E-Governance. IEEE IT Prof. 2020, 3, 45–52. [Google Scholar] [CrossRef]
  6. Daihong, J.; Sai, Z.; Lei, D.; Yueming, D. Multi-scale generative adversarial network for image super-resolution. Soft Comput. 2022, 26, 3631–3641. [Google Scholar] [CrossRef]
  7. Solihah, G.; Shabir, A.; Parah, K. Reversible data hiding exploiting Huffman encoding with dual images for IoMT based healthcare. Comput. Commun. 2020, 163, 134–149. [Google Scholar]
  8. Anand, A.; Singh, A.K. An improved DWT-SVD domain watermarking for medical information security. Comput. Commun. 2020, 152, 72–80. [Google Scholar] [CrossRef]
  9. Thakur, S.; Singh, B.; Kumar, B. Improved DWT-SVD Based Medical Image Watermarking Through Hamming Code and Chaotic Encryption. Commun. Signal Process. 2020, 587, 897–905. [Google Scholar]
  10. Jinhua, L.; Shan, W.; Xinye, X. A Logarithmic Quantization-Based Image Watermarking Using Information Entropy in the Wavelet Domain. Entropy 2018, 945. [Google Scholar]
  11. Hu, Y.; Zhu, S. Zero-watermark algorithm based on PCA and chaotic scrambling. J. Zhejiang Univ. Eng. Sci. 2008, 4, 593–597. [Google Scholar]
  12. Hsieh, S.; Huang, B. A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation. In Proceedings of the International Computer Symposium, Las Vegas, NV, USA, 16–18 June 2004; pp. 661–666. [Google Scholar]
  13. Borra, S.; Thanki, R. A FRT-SVD based blind medical watermarking technique for telemedicine applications. Int. J. Digit. Crime Forensics 2019, 11, 13–33. [Google Scholar] [CrossRef]
  14. Farhan, M.; Sanjeev, K. Generating Visually coherent encrypted images with reversible data hiding in wavelet domain by fusing chaos and pairing function. Comput. Commun. 2020, 162, 12–30. [Google Scholar]
  15. Qin, C.; He, Z.; Yao, H. Visible watermark removal scheme based on reversible data hiding and image inpainting. Signal Process. Image Commun. 2018, 60, 160–172. [Google Scholar] [CrossRef]
  16. Pirbhulal, S.; Samuel, O.W.; Wu, W. A joint resource-aware and medical data security framework for wearable healthcare systems. Future Gener. Comput. Syst. 2019, 95, 382–391. [Google Scholar] [CrossRef]
  17. Hsu, C.; Hou, Y. Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt. Eng. 2005, 44, 077003. [Google Scholar]
  18. Gao, S. An adaptive image zero-watermarking algorithm in DT-CWT domain. J. Sichuan Univ. Nat. Sci. Ed. 2008, 6, 493–497. [Google Scholar]
  19. Xiang, H.; Cao, H. A Zero-watermarking Algorithm Based on Chaotic Modulation. J. Image Graph. 2006, 5, 720–724. [Google Scholar]
  20. Tiankai, S.; Xingyuan, W.; Rong, B. A Hybrid Contourlet-Singular Value Decomposition Authentication Scheme Based on Chaos and Visual Cryptography for Medical Images. J. Comput. Theor. Nanosci. 2016, 13, 8885–8895. [Google Scholar]
  21. Andreas, P.; Andreas, U. Selective encryption of wavelet-packet encoded image data:efficiency and security. Multimed. Syst. 2003, 9, 279–287. [Google Scholar]
  22. Arcangelo, C.; Alfredo, D.S.; Vincenzo, L.; Francesco, P. On the Protection of fMRI Images in Multi-Domain Environments. In Proceedings of the IEEE 29th International Conference on Advanced Information Networking and Applicatins, Gwangju, Korea, 24–27 March 2015; Volume 224, pp. 476–481. [Google Scholar]
  23. Tiankai, S.; Xingyuan, W.; Da, L.; Daihong, J. Medical image security authentication method based on wavelet reconstruction and fractal dimension. Int. J. Distrib. Sens. Netw. 2021, 4, 1–9. [Google Scholar]
Figure 1. An example of two-level wavelet packet decomposition. (a) represents the original image, (b) represents the 4 subimages of the first-level wavelet packet decomposition, and (c) represents the 16 subimages of the second-level wavelet packet decomposition.
Figure 1. An example of two-level wavelet packet decomposition. (a) represents the original image, (b) represents the 4 subimages of the first-level wavelet packet decomposition, and (c) represents the 16 subimages of the second-level wavelet packet decomposition.
Entropy 24 00798 g001
Figure 2. Flow chart of the copyright construction.
Figure 2. Flow chart of the copyright construction.
Entropy 24 00798 g002
Figure 3. Flow chart of the ownership verification.
Figure 3. Flow chart of the ownership verification.
Entropy 24 00798 g003
Figure 4. The test images and copyright logo.
Figure 4. The test images and copyright logo.
Entropy 24 00798 g004
Figure 5. (a) JPEG compression attack PSNR = 34.4752; (b) recovered logo image from (a) (NC = 1).
Figure 5. (a) JPEG compression attack PSNR = 34.4752; (b) recovered logo image from (a) (NC = 1).
Entropy 24 00798 g005
Figure 6. (a) Salt and pepper noise attack PSNR = 35.1107; (b) recovered logo image from (a) (NC = 0.9980).
Figure 6. (a) Salt and pepper noise attack PSNR = 35.1107; (b) recovered logo image from (a) (NC = 0.9980).
Entropy 24 00798 g006
Figure 7. (a) Gaussian noise attack PSNR = 22.4612; (b) recovered logo image from (a) (NC = 0.9824).
Figure 7. (a) Gaussian noise attack PSNR = 22.4612; (b) recovered logo image from (a) (NC = 0.9824).
Entropy 24 00798 g007
Figure 8. (a) Rotation attack PSNR = 34.7317; (b) recovered logo image from (a) (NC = 1).
Figure 8. (a) Rotation attack PSNR = 34.7317; (b) recovered logo image from (a) (NC = 1).
Entropy 24 00798 g008
Figure 9. (a) Scaling attack PSNR = 56.0139; (b) recovered logo image from (a) (NC = 1).
Figure 9. (a) Scaling attack PSNR = 56.0139; (b) recovered logo image from (a) (NC = 1).
Entropy 24 00798 g009
Figure 10. (a) Sharpening attack PSNR = 30.6776; (b) recovered logo image from (a) (NC = 0.9990).
Figure 10. (a) Sharpening attack PSNR = 30.6776; (b) recovered logo image from (a) (NC = 0.9990).
Entropy 24 00798 g010
Figure 11. (a) Multiplicative noise attack PSNR = 28.4653; (b) recovered logo image from (a) (NC = 1).
Figure 11. (a) Multiplicative noise attack PSNR = 28.4653; (b) recovered logo image from (a) (NC = 1).
Entropy 24 00798 g011
Figure 12. (a) Clipping attack PSNR = 15.7723; (b) recovered logo image from (a) (NC = 0.9688).
Figure 12. (a) Clipping attack PSNR = 15.7723; (b) recovered logo image from (a) (NC = 0.9688).
Entropy 24 00798 g012
Figure 13. (a) Median filtering attack PSNR = 43.9290; (b) recovered logo image from (a) (NC= 0.9990).
Figure 13. (a) Median filtering attack PSNR = 43.9290; (b) recovered logo image from (a) (NC= 0.9990).
Entropy 24 00798 g013
Figure 14. (a) Contrast enhancement attack PSNR = 21.5881; (b) recovered logo image from (a) (NC = 0.9766).
Figure 14. (a) Contrast enhancement attack PSNR = 21.5881; (b) recovered logo image from (a) (NC = 0.9766).
Entropy 24 00798 g014
Figure 15. (a) Brightness enhancement attack PSNR = 28.2620; (b) recovered logo image from (a) (NC = 1).
Figure 15. (a) Brightness enhancement attack PSNR = 28.2620; (b) recovered logo image from (a) (NC = 1).
Entropy 24 00798 g015
Figure 16. Comparisons of the robustness between different schemes: (1) attacks type 1–12 are Gaussian noise, median filtering 5 × 5, median filtering 7 × 7, JPEG (70%), JPEG (50%), JPEG (20%), cropping (10%), cropping (20%), rotation attack (1 degree), rotation attack (2.5 degree), rotation attack (5 degrees), and rotation attack (10 degrees), respectively.
Figure 16. Comparisons of the robustness between different schemes: (1) attacks type 1–12 are Gaussian noise, median filtering 5 × 5, median filtering 7 × 7, JPEG (70%), JPEG (50%), JPEG (20%), cropping (10%), cropping (20%), rotation attack (1 degree), rotation attack (2.5 degree), rotation attack (5 degrees), and rotation attack (10 degrees), respectively.
Entropy 24 00798 g016
Figure 17. Comparisons of the robustness between different schemes: (2) attacks type 1–13 are salt and pepper noise (0.0001), salt and pepper noise (0.0005), salt and pepper noise (0.001), Gaussian noise (0.001), Gaussian noise (0.005), rotation (1 degree), JPEG (10%), JPEG (50%), JPEG (90%), speckle noise (0.001), speckle noise (0.005), image scaling (2×), and median filtering 1 × 1), respectively.
Figure 17. Comparisons of the robustness between different schemes: (2) attacks type 1–13 are salt and pepper noise (0.0001), salt and pepper noise (0.0005), salt and pepper noise (0.001), Gaussian noise (0.001), Gaussian noise (0.005), rotation (1 degree), JPEG (10%), JPEG (50%), JPEG (90%), speckle noise (0.001), speckle noise (0.005), image scaling (2×), and median filtering 1 × 1), respectively.
Entropy 24 00798 g017
Table 1. Similarity test of different features.
Table 1. Similarity test of different features.
Abdomen (b) Breast (c) Chest (d) HeadBreastAdrenalHeadHeartLung
Abdomen10.2793 0.73340.74900.67770.7188
Breast0.279310.15330.24120.28910.0156
Adrenal0.73340.153310.75780.74710.8467
Head0.74900.24120.757810.6748 0.7432
Heart0.67770.28910.74710.674810.7246
Lung0.71880.01560.84670.74320.72461
Table 2. Averaged results of six test images.
Table 2. Averaged results of six test images.
AttackBreastAveraged Results of Six Test Images
JPEG (10)10.9952
Salt-and-pepper noise (0.001)0.99800.9749
Gaussian noise (0.005)0.98240.9819
Rotation (10 degrees)1.00000.9968
Scale scaling (200%)10.9924
Sharpening 0.99900.9938
Multiplicative noise (0.01)10.9918
Clipping (20%)0.96880.9637
Median filtering 5 × 50.99900.9970
Contrast enhancement0.97660.9852
Brightness enhancement10.9853
Table 3. Comparison tests (1).
Table 3. Comparison tests (1).
AttacksHsieh and Huang’s
Scheme [12]
Hsu and Hou’s
Scheme [17]
Tiankai’s
Scheme [20]
Proposed Scheme
Sharpening0.7520.8190.95610.9990
Median filtering0.8430.9380.97750.9990
Resizing0.7330.8870.95211
Noise addition0.7230.7610.98540.9941
JPEG0.8450.9560.99120.9990
Table 4. Comparison tests (2).
Table 4. Comparison tests (2).
AttackRef. [11]Ref. [18]Ref. [19]Ref. [20]Proposed Scheme
Gaussian noise0.93000.85940.96000.98540.9941
Median filtering 5 × 50.99000.94530.98000.99120.9990
Median filtering 7 × 70.97000.90630.98000.97750.9990
JPEG (70)0.97001.00001.00000.99511
JPEG (50)0.9600-0.99000.99120.9990
JPEG (20)0.94000.95700.97000.98241
Cropping (10%)0.9900--0.97560.9463
Cropping (20%)0.9700--0.94630.9688
Rotation attack (1 degree)0.93000.8164-0.91020.9990
Rotation attack (2.5 degrees) 0.9700--0.93070.9746
Rotation attack (5 degrees) 0.9600-1.00000.94241
Rotation attack (10 degrees) 0.9500-0.95000.95801
Visibility NoNoNoYesYes
Table 5. Comparison test (3).
Table 5. Comparison test (3).
AttackNoise DensityRef. [3]Ref. [8]Ref. [9]Proposed Scheme
Salt-and-pepper noise0.00010.99950.98360.99751
Salt-and-pepper noise 0.00050.99770.97690.96300.9990
Salt-and-pepper noise 0.0010.99490.96870.87610.9980
Gaussian noise0.0010.99170.9398-0.9941
Gaussian noise 0.0050.95990.9315-0.9824
Rotation1 degree0.78060.92210.93080.9990
JPEG compression QF = 100.98350.89520.89941
JPEG compression QF = 500.99510.95100.96260.9990
JPEG compressionQF = 900.99940.9809-1
Speckle noise0.0010.99130.98000.99471
Speckle noise0.0050.97660.9014-1
Image scaling20.9614-0.82421
Median filter[11]0.97600.98190.99731
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Sun, T.; Wang, X.; Zhang, K.; Jiang, D.; Lin, D.; Jv, X.; Ding, B.; Zhu, W. Medical Image Authentication Method Based on the Wavelet Packet and Energy Entropy. Entropy 2022, 24, 798. https://doi.org/10.3390/e24060798

AMA Style

Sun T, Wang X, Zhang K, Jiang D, Lin D, Jv X, Ding B, Zhu W. Medical Image Authentication Method Based on the Wavelet Packet and Energy Entropy. Entropy. 2022; 24(6):798. https://doi.org/10.3390/e24060798

Chicago/Turabian Style

Sun, Tiankai, Xingyuan Wang, Kejun Zhang, Daihong Jiang, Da Lin, Xunguang Jv, Bin Ding, and Weidong Zhu. 2022. "Medical Image Authentication Method Based on the Wavelet Packet and Energy Entropy" Entropy 24, no. 6: 798. https://doi.org/10.3390/e24060798

APA Style

Sun, T., Wang, X., Zhang, K., Jiang, D., Lin, D., Jv, X., Ding, B., & Zhu, W. (2022). Medical Image Authentication Method Based on the Wavelet Packet and Energy Entropy. Entropy, 24(6), 798. https://doi.org/10.3390/e24060798

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop