1. Introduction
Rapid development in image processing techniques has significantly increased the importance of digital images because of their enhanced usage in various applications, ranging from computer-aided diagnostic (CAD) systems to biometric recognition systems [
1,
2,
3,
4]. At the same time, due to the availability of sophisticated tools, images can be tampered with easily and are facing the problems of content authentication and copyright protection.
Unlike authentication systems, tampering with medical images may prove to be life-threatening [
5,
6]. If a medical image is tampered with, then the CAD system may lead to a false diagnosis. Ultimately, a healthy person may face mental disturbance and spend money and time to follow up on the misdiagnosed condition. If a patient is suffering from a disease, then the delay due to a false diagnosis will make his or her condition severe to the point that it cannot be cured. Therefore, authenticating medical images before diagnosis using CAD systems is crucial.
In addition to data tampering, the privacy of patients becomes highly vulnerable when the data are stored offline in their original form or transmitted through wireless communication for centralised processing or expert opinions using cloud-based environments and edge or fog computing [
7,
8]. The protection of patients’ particulars, such as names and social security and medical numbers, should be the top priority of health care providers [
9,
10,
11]; otherwise, they may face consequences in the form of regulatory fines, legal fees and a bad reputation in the market. To avoid such situations, digital watermarking is one of the potential solutions for privacy protection and data integrity.
Digital watermarking embeds patients’ information (watermark) into medical signals to ensure privacy, and only authorised health care staff with a relevant secret key can disclose patients’ identities. One of the common approaches in watermarking is the insertion of patients’ information in the region of noninterest (RONI). This region is unaffected by the lesion, and the insertion of the watermark will not have any negative impact on the decision of CAD systems. However, the detection of RONI becomes challenging when an image contains more than one region of interest (ROI) [
2], and an erroneously detected RONI may lead to a false diagnosis [
12,
13]. Another difficult situation is if ROI annotations are unavailable in images. Therefore, approaches based on RONI and ROI are unsuitable for privacy protection and data integrity.
Similarly, conventional digital watermarking distorts the characteristics of the host image after inserting the watermark and may lead to a false diagnosis [
14,
15,
16,
17]. Nevertheless, in the reversible watermark, the watermark is extracted before the diagnosis; hence, it does not affect the diagnosis. However, the major drawback of this approach is that medical images become vulnerable after identity extraction [
18,
19,
20,
21].
To avoid the limitations of such types of watermarking, various algorithms for zero watermarking have been proposed in the literature [
22,
23,
24]. Zero watermarking does not degrade the host image after inserting the watermark. Therefore, the diagnosis results are unaffected.
Image encryption is also a prime concern for protecting data from illegal usage. In a recent study [
25], mammograms are encrypted through visual cryptography. Multiple secret shares are generated from the original mammograms to protect them from unauthorised access. Mammograms can be decrypted only when all secret shares are available simultaneously.
Finally, image authentication is extremely critical for the accurate detection of lesions. In the case of a malicious attack, an image of a normal person may exhibit irregular patterns and look like a patient’s image due to the complex and transient behaviour introduced by the attack. In [
26], the effect of a noise attack is discussed by adding the noise of different signal-to-noise (SNR) ratios to the medical signals. Different performance measures are computed to compare the original and extracted watermarks (retrieved from attacked host signals). The results indicate that the recovered identity becomes more distorted as the SNR increases. As a result, the diagnosis system fails to detect the disease correctly. This suggests that patients’ identities and mammograms should be authenticated before diagnosis.
Therefore, watermarking should not only provide privacy protection but also authenticate the medical image content. This scenario leads to fragile watermarking, as any change in an image distorts the watermark [
27], and the health care staff will be alarmed over its authenticity.
Normally, watermarking and authenticity fall under two different categories of image forensics [
28]. Fragile watermarking is one of the examples of active forensics [
29], and authenticity detection is categorised as passive forensics [
30]. In this study, we propose a hybrid solution to protect privacy and content authentication. A watermark can be public or secret. As patients’ identities should not be revealed, watermarking will not be visible in the proposed solution. Most importantly, the proposed solution inserts the watermark in a secret key instead of the host medical image to avoid any distortion. Therefore, zero watermarking is considered. The main contribution of this study is to provide a hybrid solution containing new embedding and extraction processes with the following capabilities:
Content authentication using fragile watermarking;
Privacy protection using zero watermarking;
Dual protection for privacy through visual cryptography;
Intractable chaotic randomness.
Although various components of the proposed solution such as Shamir’s secret sharing scheme, logistic maps and local binary patterns (LBPs) have been explored in the domain of watermarking and other scientific areas, these components are used in an entirely different way in embedding and extraction processes, which makes the proposed fragile zero-watermarking algorithm a novel approach. A patient’s identity is encrypted using one of the visual cryptography schemes (i.e., Shamir’s secret sharing scheme). Then, the embedding and extraction processes of the proposed algorithm are used to insert and recover the watermark, respectively. To enhance the reliability of protection, a logistic map is implemented. The proposed algorithm is evaluated using two datasets of digitised mammograms. The baseline results for the detection of breast cancer in these datasets are obtained by developing a system using a convolutional neural network (CNN). These results help in determining any negative impact of the proposed algorithm on the detection of breast cancer.
The rest of the paper is organised in the following manner.
Section 2 describes the main components of the proposed algorithm.
Section 3 illustrates the core processes of the newly proposed algorithm: watermark embedding and extraction.
Section 4 evaluates the algorithm and provides its analysis using experimental results and discussion. This section also highlights the comparisons with existing works. Finally,
Section 5 draws some conclusions.
2. Components of the Proposed Algorithm
In this study, the digitised mammograms were taken from the Digital Database for Screening Mammography (DDSM) [
31] and the Mini Mammographic Image Analysis Society (Mini-MIAS) database [
32]. The necessary components of the proposed fragile zero-watermarking algorithm are briefly described in this section.
As zero watermarking does not embed the watermark in a host image, the image characteristics or features are still crucial to observe. Without these characteristics, the secret key carrying the watermark cannot be generated.
Figure 1 shows that mammograms have a consistent black background, which is an unwanted area for feature extraction. Therefore, it is removed by applying an automatic method.
Moreover, the process to generate the secret shares of the watermark and the use of chaotic randomness are illustrated in the following subsections.
2.1. Removal of Background from Mammograms
Region 2 represents the breast in the mammogram, and an appropriate edge detection algorithm is required to determine its outer edges (i.e., the borders between the three regions). In
Figure 1, the breast contains various types of vessels, and the algorithm must avoid them when detecting the outer edges. To perform this task, the Sobel operator was implemented, which has been a widely used edge detection algorithm. Its overall performance is better than other contemporaneous operators, such as the Prewitt operator [
33].
The Sobel operator comprises two convolutional kernels,
Ox and
Oy, as given by Equation (1). They are applied on the mammogram for the gradient approximation of each pixel in the horizontal and vertical directions [
34]. This operator enhances the edges, where the gradients are usually larger than the homogeneous regions in the mammogram:
For each pixel, the gradient approximations are combined using the following relation to obtain the gradient magnitude:
The operator was first applied on the original grey scale image (illustrated in
Figure 1). The resultant image is depicted in
Figure 2a, showing that the vessels (edges) inside the breast were also detected but were undesired. To solve this issue, the original image was first converted to a black and white image, and then the operator was applied. The obtained image is displayed in
Figure 2b, clearly highlighting the borders between the three regions. Then, the features of this region are computed and analysed.
2.2. Feature Extraction for the Insertion Process
In this study, the features were extracted using the local binary pattern (LBP) from the extracted region of the mammograms (only the breast without the background). The LBP is a simple yet efficient texture operator [
35]. To compute the LBP, the extracted area is divided into 3 × 3 blocks. Then, the centre element is compared with its eight neighbours. If the centre element is equal to or greater than a neighbour, the neighbour is replaced by 1; otherwise, it is 0. Similarly, the centre element is compared with all eight neighbours, and an eight-bit binary number is generated. The range of these binary numbers in equivalent decimal numbers is from 0 to 255. This process is repeated for each 3 × 3 block of region 2. Hence, every pixel in the selected regions is represented by equivalent decimal numbers, which are also referred to as LBP codes.
The generated LBP codes were grouped as uniform and nonuniform patterns based on the number of 1-to-0 and 0-to-1 transitions in a binary number. The codes with two or fewer transitions were designated to be uniform, and all other codes with three or more transitions were referred to as nonuniform. For instance, 10101011 with 6 1-to-0 and 0-to-1 transitions represents a nonuniform code, whereas 00001100 is a uniform code with two transitions. In the range from 0 to 255, 58 uniform and 198 nonuniform codes were recorded. Each uniform code was represented by a unique bin in a histogram. However, all nonuniform codes were grouped in the last bin (i.e., the 59th bin). This part explains why nonuniform codes were chosen for the watermark insertion process, as they would be good in the context of randomness.
The distribution of LBP codes for region 2 of a mammogram is illustrated in
Figure 3. The total number of nonuniform codes was around 55,000, and they were sufficient to accommodate the watermark. The same number of nonuniform codes was observed in all mammograms of both datasets.
After removing the unwanted background from the mammograms and the computation process of the LBP, the next important component was the generation of secret shares of the watermark and the creation of random numbers for the insertion and extraction processes.
2.3. Generation of Secrete Shares of Patients’ Identities
The watermarks in this study are patients’ identities, which are six-character-long alphanumeric strings and represented by
I. They are converted into black and white images that are 20 × 108. The image of one of the patient’s identities is depicted in
Figure 4a.
One of the objectives of the proposed algorithm is to protect patients’ particulars, which should not be transmitted to the recipients or stored in their original form to avoid a breach of privacy. To provide double the security, two secret shares of
I (say
S1 and
S2) were created using Shamir’s secret sharing scheme as shown in
Figure 4b,c, respectively. These generated shares were used in the embedding process of the proposed algorithm and embedded into the watermark key.
The method to generate secret shares is as follows. Every pixel of
I is replaced by one of the 2 × 2 matrices given in
Figure 5. If the pixel is white, then it is replaced by the same matrix (say
V2) in both shares
S1 and
S2. In the case of a black pixel, if it is replaced by
V3 in
S1, and then its complement (
V6) replaces the corresponding pixel in
S2. The matrices
V1–
V6, are selected randomly for each pixel using the random numbers in the range [1–6].
As each pixel of I is replaced by a 2 × 2 matrix, the dimensions of each generated share are doubled (i.e., 40 × 216). Thus, the total number of bits required to insert these shares was 17,280 (8640 + 8640). Every pixel of S1 and S2 was embedded randomly in the secret key using the computed features of the selected region.
The simplicity in retrieving the identity (
I) using the generated shares (
S1 and
S2) was a prime reason to use Shamir’s scheme. The overlapping of shares printed on the transparencies or bitwise AND operation between them would reveal
I as shown in
Figure 4d. This step is described in the extraction process of the proposed algorithm.
Before explaining the proposed algorithm, the process of creating deterministic randomness is discussed in the following section.
2.4. Deterministic Randomness
Random numbers can be generated in different ways. Normally, the length of a sequence of random numbers is equivalent to the watermark. Sometimes, it also needs to be transmitted to the recipient with the host image for the watermark extraction. Depending on the watermark, the length of the sequence can be very long. However, this can be avoided by using chaotic systems due to their deterministic nature of randomness. The same sequence of random numbers can be regenerated using the initial conditions received from the sender, and the recipient does not need the sequence.
One of the simplest chaotic systems, known as the logistic map, was implemented to generate random sequences in the proposed algorithm. It was introduced by P. F. Verhulst and belongs to the family of first-order difference equations, which can be represented mathematically using Equation (3):
where
μ ∈ [0,4] is a system parameter and
L0 ∈ (0, 1) is the initial condition. The behaviour of the logistic map is chaotic when
μ ∈ (3.5699456,4), except for a narrow window near 3.8284 [
36]. For every value of the system parameters in this range, the generated chaotic sequences (
Lx;
x = 1, 2, 3, …) are unique. The logistic map is highly sensitive to
μ. A small variation in the value of μ generates an entirely different sequence, and it is uncorrelated statistically. The values of
μ ∈ (3.8284, 3.8510) will not be used in this study due to oscillation among the specific values in this range.
The random numbers were generated for the creation of a watermark key during the embedding process of the proposed algorithm, which is discussed in the following section.
4. Experimental Results of the Proposed Algorithm and Discussion
Two datasets were used to investigate the key aspects of the proposed algorithm. Obtaining their baseline results was important. These results helped in analysing any negative impact on the detection of breast cancer caused by the proposed algorithm.
The first dataset was the Curated Breast Imaging Subset of DDSM (CBIS-DDSM) [
37], which is the latest version of DDSM [
31]. CBIS-DDMIS was converted into the standard DICOM format, whereas the format of digitised film mammograms in DDMIS is a lossless JPEG, which is obsolete. CBIS-DDMIS contains 2478 mammography images of 1249 women, and most of the cases include both views (i.e., mediolateral and craniocaudal). The baseline results of this dataset for the classification of malignant and benign images were obtained using the same set-up that was used in [
2]. Two structures, a deep neural network 16 layers deep (VGG16) and a residual neural network 50 layers deep (ResNET50), were implemented. The CNN was trained in two steps. First, a patch classifier was trained. Second, the whole image classifier converted from the patch classifier was trained. An average accuracy of 91% with a sensitivity and specificity of 86.1% and 81%, respectively, was achieved.
The second dataset was mini-MIAS, which comprises 322 digitised mammograms collected from 161 women. The baseline results for mini-MIAS were also obtained with VGG16 and ResNet50 for the classification of malignant and benign images. The obtained accuracies were 73.47% and 68.76%, the sensitivity was 76.42% and 74.46%, and the specificity was 68.78% and 61.29%, respectively. In both datasets, the dimensions of all the mammograms were 1024 × 1024.
Different metrics were used to evaluate the performance of the proposed algorithm for privacy protection and data integrity: the mean square error (
MSE), peak signal-to-noise ratio (
PSNR) and structural similarity index (
SSIM). The formulae for the
MSE,
PSNR and
SSIM are given by Equations (14)–(16), respectively. Using these measures, the quality of the identities when retrieved using a relevant secret key, a nonrelevant secret key and in the case of an attacked mammogram was determined by comparing them with the original identities:
where
d1 ×
d2 represents the image’s dimensions,
NBP stands for the number of bits per pixel and
μim1,
μim2, σ
im1, σ
im2 and σ
im1im2 indicate the local means, standard deviations and cross-covariances for images
im1 and
im2. In addition,
c1 and
c2 are regularisation constants given by
c1 = (0.01 ×
u)
2 and
c2 = (0.03
× u)
2, where
u = 2
NBP − 1.
All experiments for the embedding and insertion processes were performed with MATLAB (version R2021b), whereas Python (version 3.8.10) was used for the CNN-based CAD system and installed on a computer with an Intel Core i7-45000U CPU @ 1.80 GHz processor, 16 GB of memory, a 1-TB hard disk, and a Windows 10 Pro operating system. With these specifications, the average time taken by the embedding and extraction processes to secure and retrieve an identity was 1.81 s and 2.42 s, respectively.
4.1. Insertion and Extraction Reliability of the Proposed Algorithm
The first step in the evaluation of the proposed algorithm was to observe the performance of its embedding and extraction processes. By following the steps of the embedding process, the secret shares
S1 and
S2 with dimensions of 40 × 216 each (
Figure 4a,b) were generated, and the indices
A were determined after removing the background of the mammogram of dimensions 1024 × 1024. Two offsets (
f1 = 100 and
f2 = 200) were randomly generated. Then, a chaotic sequence with initial conditions
μ = 3.6 and
L0 = 0.1 was produced to yield subsequences
Y and
Z for the random selection of blocks with nonuniform LBP codes. Only 1080 (out of 55,000) LBP codes were used in this process. Finally, the intermediate patterns
P1 and
P2 were computed, and the secret shares
S1 and
S2 were embedded into them to obtain the secret keys
WS1 and
WS2. The secret keys were in fact embedded secret shares, and they are shown in
Figure 8. To measure the difference between the original shares (
S1 and
S2) and the embedded shares (
WS1 and
WS2) the
MSE,
PSNR and
SSIM were computed, and they are given in
Figure 8.
The computed
MSE of 0.42 for share 1 indicates that the original and embedded shares were significantly different from each other. The low values for the
PSNR and
SSIM also suggest the same. A similar trend was exhibited in the case of share 2; patients’ identities remained unknown even after combining these embedded secret shares. This factor could be verified by performing the bitwise AND operation between the embedded shares (
WS1 and
WS2), and the retrieved identity is displayed in
Figure 9b.
Another example is provided in
Figure 10 for explaining the functionality and reliability of the embedding and extraction processes of the proposed algorithm.
Figure 9 and
Figure 10 strengthen the fact that the identity could not be revealed once inserted using the proposed algorithm. In
Figure 10, the embedded shares
WS1 and
WS2 could not reveal the identity without retrieving the shares
rS1 and
rS2, and then their overlapping would disclose the identity
rI.
The identities of all patients in the mini-MIAS dataset were embedded using the same setting (offsets and initial conditions), and the computed performance measures are shown in
Figure 11.
Evidently,
Figure 11 displays that the embedded shares were significantly different from the original shares for all patients. The
MSE and
PSNR exhibited the same behaviour for the CBIS-DDMIS dataset, with very high values for the
MSE and low values for the
PSNR.
The only method for disclosing I is to follow the extraction process of the proposed algorithm. Each health care staff member receives one of the secret keys, host mammogram, initial conditions and offsets. Using this transmitted information, each member can extract one of the secret shares rS1 and rS2. They will be absolutely the same as the original secret shares S1 and S2. Therefore, the MSE will be zero for the corresponding original and retrieved secret shares. Consequently, the identity of the patient will be revealed successfully. Now, whether the proposed algorithm will affect the mammogram during the embedding and extraction processes will be observed.
4.2. Imperceptibility
One of the positive aspects of the proposed algorithm is keeping the host image in its original state. The algorithm does not introduce any change due to the insertion of a watermark because the patient’s identity I is embedded into a secret key instead of the mammogram. Therefore, imperceptibility is naturally achieved, as no clue exists for the presence of a watermark in the host image.
Imperceptibility is one of the important phenomena in the evaluation of a watermark algorithm. In medical applications, this phenomenon becomes critical, as the degradation of a medical image may lead to false diagnosis. The privacy of patients is a prime concern but not at the cost of an accurate diagnosis.
Due to the use of the zero-watermarking approach in the proposed algorithm, the MSE values of the host mammograms before and after inserting I were zero. Ultimately, the achieved PSNR was large (i.e., infinity). All these measures—MSE, PSNR and SSIM—were optimal and concluded that the proposed algorithm did not affect the accuracy of the breast detection system. Hence, the proposed algorithm achieved the goal of protecting the patients’ privacy without leading to a false diagnosis.
In the following section, we show the reliability of the proposed algorithm to make sure that identities cannot be disclosed using nonrelevant secret keys.
4.3. Detection Reliability of the Watermark
An authorised health care staff must possess the relevant transmitted secret keys to retrieve patient identities. However, what will happen if an unauthorised individual tries to reveal one identity with a nonrelevant secret key? The proposed algorithm was investigated to determine whether the identity of a patient could be retrieved using any nonrelevant secret key.
For this purpose, we first determined what would be a reasonable change in an initial condition such that the proposed algorithm should not disclose any identity using the condition of other. An attempt was made to retrieve an identity by altering the initial value from
μ = 3.6 to 3.6005. The obtained the values of the
MSE, PSNR and
SSIM were 0.38, 4.24 and 0.06, respectively. The retrieved identity is depicted in
Figure 12.
The computed measures indicate that the retrieved identity with the false initial condition was significantly different from the original identity. It concluded that the identity had no chance to be disclosed even with such a small variation in the initial condition. The difference between the corresponding values of sequences using
μ = 3.6 and
μ = 3.6005 was more than 75%. Moreover, the sequence generated with
μ = 3.6 was compared with 200 other sequences (produced using different values of
μ). The difference was always greater than 75%, as illustrated in
Figure 13. That is tosay, the randomness using the logistic map was intractable when the initial conditions were unknown.
In addition, another illicit attempt was made to reveal the identity of patient mdb014 using the initial conditions (
L0,
µ) of patient mdb045, as depicted in
Figure 14. Two things were concluded. First, the identity of patient mdb014 was not disclosed, because the relevant information of the patient was not used. Secondly, the identity of any other patient was also not revealed as each patient had unique initial conditions, and it was impossible to retrieve the identity without them.
The next point was if an unauthorised person attempted different combinations of μ and L0 to guess the relevant secret keys and how many combinations of μ and L0 were possible in the range from [3.6, 4] to [3.8284, 3.8510] and (0, 1), respectively. With the increment of 0.0005, the possible combinations of μ were 755, and those of L0 were 1999. Hence, the total number of options would be more than 1.5 × 106. Furthermore, the offsets were random integers between 0 and 1000. As both offsets could be distinct, the overall number of significantly different random sequences would exceed 1.5 × 1012. In addition, the number of nonuniform LBP codes was 198. That is to say, an unauthorised person attempted 198 × 1.5 × 1012 options to determine the relevant secret key. The experimental results show that the proposed algorithm was reliable for inserting and recovering patients’ identities. Its robustness to authenticate data originality will be explored in the following section.
4.4. Data Authentication
For reliable detection of breast cancer using a CAD system, transmitted or stored mammograms must be authenticated. In the case of a malicious attack, a normal mammogram exhibits an irregular pattern and may behave similar to a malignant mammogram, as shown in
Figure 15. The mammogram was attacked with Gaussian white noise. When such a mammogram was tested for breast cancer using the CNN-based detection system, the diagnosis was false. Therefore, the system accuracy decreased to 52% for both datasets.
Due to the fragile nature of the proposed zero-watermarking algorithm, it had the ability to authenticate the contents of a mammogram. In the case of Gaussian white noise, the retrieved identity was distorted even when using relevant information. The malicious attack changed the characteristics of the mammogram, and as a result, the locations of the nonuniform LBP codes would be affected. Therefore, chaotic sequences Y and Z could not locate the required blocks of the nonuniform LBP codes. Hence, the retrieved identity was distorted, indicating that the mammogram was not genuine and was tampered with or attacked.
Although the proposed algorithm could detect the attack in the case of Gaussian noise, tampering in the mammogram was visible with the naked eye. Therefore, the question is if the attack is not visible, how will the proposed algorithm detect it? To answer such a question, the mammogram was attacked by altering some pixels in region 2. This region was approximately one fourth of the whole mammogram.
To avoid visibility, the pixels were altered in such a way that they should be replaced by a number having the same number of 1-to-0 and 0-to-1 transitions with a one-bit difference. For example, 148 was replaced by 150. Then, when the recipient would determine nonuniform codes after the attack, some uniform codes would become nonuniform, and vice versa. Therefore, the indices of the nonuniform LBP codes in NUP would be changed. In addition, if the type of the code was not changed, it might have been replaced by another code of the same type. Then, the intermediate patterns P1 and P2 would be distorted during the extraction process. Consequently, the disturbance in NUP, P1 and P2 would lead to retrieving the distorted identity, indicating that the mammogram is not in the original form and may lead to a false diagnosis.
It can be observed from
Figure 16 that when a mammogram was attacked by altering 0.01% and 0.02% of its pixels, the tampering was not visible. However, the retrieved identities (
rI and
wI) in both cases were significantly distorted, which was also highlighted by the performance measures (high
MSE and very low
PSNR and
SSIM). Moreover, the increase in the values of the
MSE and decrease in the
PSNR and
SSIM for the increasing number of attacked pixels shows that the retrieved identity became more distorted.
The accuracy of the CAD system should also be observed with the increasing number of attacked pixels. The baseline results of the CAD system did not change when 0.01% and 0.02% of the pixels of the mammograms were attacked. For 0.1% and 1% attacked pixels, the mammograms should not be used for diagnosis by the healthcare staff as tampering becomes visible. However, to observe the effect of tampering on the diagnosis, the experimental result for the mini-MIAS dataset is listed in
Table 1.
The sensitivity decreased when the number of attacked pixels increased because the benign mammograms exhibited unusual changes which made them similar to malignant mammograms. Ultimately, the accuracy significantly dropped and was equal to 54.3% for 1% tampered pixels. A similar trend was found for the CBIS-DDMIS dataset, and the accuracy decreased to 52.5%.
Furthermore, another criterion was implemented to authenticate the mammogram, which is given by Equation (17). According to this criterion, a mammogram was in its original form if there was no difference in the frequency of the LBP codes in the histograms computed during the insertion and extraction processes:
In Equation (17), HM and HX represent the histograms of the embedding and extracting processes, respectively, and i indicates the bin number. In case of a malicious attack, the change in pixels with respect to its neighbours will produce a new LBP code of the same type or a different type. In either case, the frequency of LBP codes will be changed in the histogram. The values of check for 0.01%, 0.02%, 0.1% and 1% attacked pixels were nonzero and equal to 112, 228, 520 and 5276, respectively.
This criterion, along with the retrieved identities, makes the proposed algorithm robust in the authentication of mammograms so that they can be used reliably for the detection of breast cancer. To highlight the performance and positive aspects of the proposed algorithm, it is compared with existing works.
4.5. Comparisons
The proposed algorithm was compared with existing fragile zero-watermarking methods. To the best of our knowledge, only the following four kinds of fragile zero-watermarking schemes are available in the literature. In [
38], fragile zero watermarking for images was proposed with all the important steps, including image encryption, watermark embedding, watermark extraction and image decryption. However, the algorithm neither discusses the randomness nor investigates the chances to extract the watermark with nonrelevant secret keys. In another study [
39], a fragile zero-watermarking scheme is presented to detect malicious modifications in database relationships, but this scheme cannot be used for images. Moreover, watermark encryption and decryption are not performed in this scheme. Similarly, in [
40], lightweight elliptic curve cryptography using fragile zero watermarking is implemented to authenticate the users of the Internet of Things. This approach is also not viable for images. Likewise, a semi-fragile zero-watermarking approach is proposed in [
41] for audio. In comparison with these schemes, the proposed algorithm encrypts patients’ identities and embeds their encrypted shares by using fragile zero watermarking reliably, because chaotic randomness prevents unauthorised access to patients’ identities. Furthermore, identity extraction and decryption only need the initial conditions of the chaotic system to regenerate the random sequence. Transmitting the complete random sequence to the staff is no longer necessary, which is another positive aspect of the proposed algorithm.