Next Article in Journal
Transfer-Learning-Based Intrusion Detection Framework in IoT Networks
Previous Article in Journal
A Novel Deep-Learning Model Compression Based on Filter-Stripe Group Pruning and Its IoT Application
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust Zero-Watermarking of Color Medical Images Using Multi-Channel Gaussian-Hermite Moments and 1D Chebyshev Chaotic Map

by
Doaa Sami Khafaga
1,
Faten Khalid Karim
1,*,
Mohamed M. Darwish
2 and
Khalid M. Hosny
3
1
Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
2
Department of Computer Science, Assiut University, Assiut 71516, Egypt
3
Department of Information Technology, Zagazig University, Zagazig 44519, Egypt
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(15), 5612; https://doi.org/10.3390/s22155612
Submission received: 20 June 2022 / Revised: 22 July 2022 / Accepted: 23 July 2022 / Published: 27 July 2022
(This article belongs to the Section Sensing and Imaging)

Abstract

:
Copyright protection of medical images is a vital goal in the era of smart healthcare systems. In recent telemedicine applications, medical images are sensed using medical imaging devices and transmitted to remote places for screening by physicians and specialists. During their transmission, the medical images could be tampered with by intruders. Traditional watermarking methods embed the information in the host images to protect the copyright of medical images. The embedding destroys the original image and cannot be applied efficiently to images used in medicine that require high integrity. Robust zero-watermarking methods are preferable over other watermarking algorithms in medical image security due to their outstanding performance. Most existing methods are presented based on moments and moment invariants, which have become a prominent method for zero-watermarking due to their favorable image description capabilities and geometric invariance. Although moment-based zero-watermarking can be an effective approach to image copyright protection, several present approaches cannot effectively resist geometric attacks, and others have a low resistance to large-scale attacks. Besides these issues, most of these algorithms rely on traditional moment computation, which suffers from numerical error accumulation, leading to numerical instabilities, and time consumption and affecting the performance of these moment-based zero-watermarking techniques. In this paper, we derived multi-channel Gaussian–Hermite moments of fractional-order (MFrGHMs) to solve the problems. Then we used a kernel-based method for the highly accurate computation of MFrGHMs to solve the computation issue. Then, we constructed image features that are accurate and robust. Finally, we presented a new zero-watermarking scheme for color medical images using accurate MFrGHMs and 1D Chebyshev chaotic features to achieve lossless copyright protection of the color medical images. We performed experiments where their outcomes ensure the robustness of the proposed zero-watermarking algorithms against various attacks. The proposed zero-watermarking algorithm achieves a good balance between robustness and imperceptibility. Compared with similar existing algorithms, the proposed algorithm has superior robustness, security, and time computation.

1. Introduction

Multimedia tools, imaging technology, and digital image processing are widely used in modern smart healthcare systems. As a result, many medical images and data are transmitted between locations via healthcare networks and the internet. Medical images are used to help clinicians in diagnosis. Most of these medical images contain personal privacy details, which may be maliciously intercepted and tampered with by illegal elements during transmission, leading to patient privacy leakage [1,2]. Digital watermarking technology represents a reliable tool to overcome this challenge [3]. Digital watermarking technology addresses the essential requirements of copyright protection, authentication, integrity verification, and unique identification of medical images during transmission over insecure networks and storage in very large distributed databases. In the medical field, digital watermarking algorithms were applied to protect patients’ privacy, prevent tampering with medical data, and ensure the copyright of medical images [4,5,6,7]. Traditional embedding watermarking algorithms [8,9,10,11] embed digital information that identifies the ownership into the host image/carrier and then ensures the copyright or protects the copyright through extracting the embedded information. Extraction of the embedded information could destroy the information integrity of the host image, especially the fine data, which can lead to an inaccurate diagnosis.
Moreover, for transparency, the amount of embedded information is limited. The host images are distorted in those abovementioned traditional watermarking algorithms. In specific applications such as medical computer-aided diagnosis systems, scanning of artwork, and the military, distortion of images is unacceptable. Therefore, these traditional algorithms are less efficient and not suitable for copyright protection of medical images [12].
For medical image watermarking algorithms, imperceptibility and robustness are particularly important. Consequently, lossless copyright protection is imperative. Wen et al. [13] presented a zero-watermarking (lossless watermarking) concept to overcome the integrity challenge in conventional watermarking algorithms. In this approach, the original image features are extracted without any modifications even after attacks, which shows its reliability for the authentication of medical images. The zero-watermarks are invisible. In addition, it can address the noticeable conflict between imperceptibility and robustness in the traditional watermarking methods [13,14,15]. The zero-watermarking algorithms for digital images could be applied either in the spatial domain [16] or the frequency domain [17,18,19].
Based on the remarkable characteristics of orthogonal moments and their invariants in extracting the features of a medical digital image, moment-based zero-watermarking algorithms have received much attention from researchers. Here, we review the existing moments-based zero-watermarking algorithms, focusing on techniques. We discuss their effectiveness, limitations, and drawbacks. Wang et al. [20] extended the GOFMMs, defined the QGOFMMs, and then extracted the 4D features of the carrier medical image. The extracted images were applied to the zero-watermarking of medical images.
The authors [21] used invariant QPHTs of the color medical images and presented a robust zero-watermarking algorithm. In [22], they utilized QPHFTs in zero-watermarking of three medical CT images. Again, in [23], they applied a geometrically invariant QPHFMs-based null-watermarking to medical images for copyright protection.
Ma et al. [24] protected two similar medical images using a zero-watermarking algorithm based on TPCET and chaotic mapping. Xia et al. [25] applied multiple zero-watermarking of color medical images using QPHFMs. In [26], Niu et al. designed a fast QLPRHFMs-based zero-watermarking for color medical/non-medical images.
Recently [27,28,29], scientists have demonstrated that orthogonal moments with fractional orders outperform their corresponding ones with integer orders. The authors in [30] designed multiple zero-watermarking using the MFrGMs. In [31], the authors designed FoRHFMs-based lossless copyright protection for medical grayscale images. In [32], Wang and his co-authors derived QFPJFMs for color images and then applied these moments in a zero-watermarking algorithm.
Despite the considerable progress in the moment-based zero-watermarking approaches, the moment-based image zero-watermarking systems have several major drawbacks that limit the system’s performance. Through analysis of each zero-watermarking technique, we can easily summarize the limitations and drawbacks as follows:
(1)
Most of the abovementioned moment-based zero-watermarking techniques fail to achieve an acceptable trade-off between imperceptibility and robustness performance.
(2)
Most of them utilized the inaccurate zeroth-approximation method to compute the continuous orthogonal moments of integer orders, which results in a group of inaccurate features.
(3)
Most of them show low robustness against geometric and noise attacks.
(4)
Most of them are limited to the standard gray and color images and are not used in the medical field.
(5)
Due to the inaccurate direct computation method used in these algorithms, zero-watermarking algorithms are time-consuming and unsuitable for telemedicine applications.
These drawbacks have a major influence on the moments-based watermarking system.
Three relevant and interesting research questions that have been designed are given below:
RQ1. What is the influence of using a new accurate image descriptor, MFrGHMs, on the robustness of zero-watermarking?
RQ2. What is the influence of MFrGHMs on the imperceptibility of zero-watermarking?
RQ3. What is the influence of MFrGHMs on the computation time of zero-watermarking?
Motivated by considering the above limitations, this paper aims to develop a new color medical image zero-watermarking algorithm by integrating a new multi-channel fractional-order orthogonal moment with a chaotic map.
Firstly, we derived a new set of MFrGHMs for color medical images. We then used these new moments in designing a new zero-watermarking algorithm. We utilized a kernel-based for highly accurate computation of the MFrGHMs for the carrier medical image. Then, the carrier image was represented by extracting the robust and accurate features of MFrGHMs. Next, the features were transformed into a robust binary feature matrix.
Meanwhile, a 1D Chebyshev map was used in scrambling the watermark to provide a high level of security. Finally, we applied a bitwise exclusive-or operation to generate the zero-watermark for ownership verification. Based on the performed experiments, the proposed algorithm outperformed the existing zero-watermarking algorithms in terms of robustness against various attacks and execution times.
The overall contributions of this paper can be summarized as follows:
  • We present a new image descriptor called multi-channel Gaussian–Hermite moments of fractional orders (MFrGHMs).
  • We utilize a fast and highly accurate kernel-based method to compute (MFrGHMs).
  • We propose a zero-watermarking scheme via accurate features of MFrGHMs, then apply it to protect the color medical image.
  • We apply a new 1D Chebyshev chaotic map to enhance the security levels of the proposed algorithm.
  • The utilization of multi-channel moments significantly reduces the computational complexity.
  • Results from numerous experiments indicate that the proposed algorithm has superiority in robustness, security, and time computation.
This paper is organized into five sections. We describe the MFrGHMs in the second section. A detailed description of the proposed zero-watermarking algorithms is presented in the third section. Experiments and results are discussed in the fourth section. The conclusion is drawn in the fifth section.

2. Gaussian–Hermite Moments

This section briefly describes the conventional Gaussian–Hermite moments of integer and fractional orders for gray images. Then, we present the new multi-channel Gaussian–Hermite moments of fractional order for color images. Finally, we describe a highly accurate method to calculate the MFrGHMs coefficients for color medical images.

2.1. Traditional Gaussian-Hermite Moments of Gray Images

Hermite polynomials with integer order are defined over the domain ( , ) ; the Hermite polynomial of the p-th degree is [33]:
H p ( x ) = ( 1 ) p e x 2 d p d x p ( e x 2 ) ,           ( p 0 )
In explicit form,
H p ( x ) = p ! m = 0 p 2   ( 1   ) m 1 m ! ( p 2 m ) ! ( 2 x ) p 2 m
The recurrence relation of Hermite polynomials is:
H p + 1 ( x ) = 2 x H p ( x ) 2 ( p 1 ) H p 1 ( x ) ,   for   p 1 ,
where the first two polynomials are H 0 ( x ) = 1 and H 1 ( x ) = 2 x . With a Gaussian weight function, e x 2 , Hermite polynomials are orthogonal as follows:
  H p ( x ) H q ( x ) e x 2 d x = 2 p p ! π δ p q
where δ p q is the Kronecker symbol. With the help of Equation (4), the Gaussian–Hermite Polynomials are:
H ^ p ( x ) = 1 2 p p ! π e ( x 2 2 ) H p ( x )
where
  H ^ p ( x ) H ^ q ( x ) d x = δ p q  
Replacing x by x σ , yields:
H ^ p ( x σ ) = 1 2 p p ! σ π e ( x 2 2 σ 2 ) H p ( x σ )
Hence, the Gaussian–Hermite moment (GHM) G p q of image intensity function, f ( x ,   y ) is defined as follows [34]:
G p q ( f   ) =     f   ( x , y ) H ^ p ( x σ ) H ^ q ( y σ ) d x d y
The approximated Gaussian–Hermite moments, G ˜ p q , a digital image of size M × N is calculated using the formula below.
G ˜ p q ( f   ) = i = 0 M j = 0 N   f   ( x i , y j ) H ^ p ( x i σ ) H ^ q ( y j σ ) Δ x Δ y

2.2. Fractional-Order Gaussian–Hermite Moments of Gray Images

According to the remarkable work [35], the FrGHPs of degree p are obtained by replacing x = 2 t α 1 in Equation (7):
F H p ( α ) ( t ; σ ) = 2 α t α 1 H ^ p ( 2 t α 1 ; σ )
As proved in [35], FrGHPs are orthogonal in [0,1]:
0 1   F H p ( α ) ( t ; σ ) F H q ( α ) ( t ; σ ) d t = δ p q  
where the fractional parameter, α ϵ R + and t [ 0 ,   1 ] . The functions, F H p ( α ) ( t ; σ ) , defined as in explicit form:
F H p ( α ) ( t ; σ ) = 1 2 p p ! σ π e ( ( 2 t α 1 ) 2 2 σ 2 ) p ! m = 0 p 2   ( 1   ) m 1 m ! ( p 2 m ) ! ( 2 t α 1 σ ) p 2 m
The recurrence formula of F H p ( α ) ( t ; σ ) is:
F H p + 1 ( α )   ( t ; σ ) = 2 ( 2 t α 1 ) F H p 1 ( α ) ( t ; σ ) 2 ( p 1 ) F H p 1 ( α )   ( t ; σ ) ,   for   p 1
For p 1 .
With:
F H 0 ( α ) ( t ; σ ) = 1 σ π e ( ( 2 t α 1 ) 2 2 σ 2 ) 2 α t α 1 , F H 1 ( α ) ( t ; σ ) = 2 1 2   σ π e ( ( 2 t α 1 ) 2 2 σ 2 ) 2 α t α 1 ( 2 t α 1 ) .
Based on FrGHPs, the Fractional-order Gaussian–Hermite moment (FrGHM) of image intensity function, f ( x ,   y ) , is defined as:
F G p q ( f   ) = 0 1   0 1   f   ( x , y ) F H p ( α ) ( x ; σ ) F H q ( α ) ( y ; σ ) d x d y
where f   ( x , y ) is defined in [ 0 ,   1 ] × [ 0 ,   1 ] .

2.3. Accurate Computation of New Multi-Channel Gaussian-Hermite Moments of Color Images

Representing the input color images,   g C ( x , y ) by using the approaches of multi-channel [36,37], where C { R , G , B } and g C ( x , y ) = { g R ( x , y ) ,   g G ( x , y ) , g B ( x , y ) } . We generalized FrGHM of image intensity function, f ( x , y ) , in Equation (15) to be suitable for the RGB color image, g C ( x , y ) and produced the MFrGHMs for g C ( x , y ) , which are defined as:
M F G p q ( g C ) = 0 1   0 1   g C   ( x , y ) F H p ( α ) ( x ; σ ) F H q ( α ) ( y ; σ ) d x d y
where p , q , refer to non-negative integers’ indices.
Accurate computation of the MFrGHMs is the most effective process in a robust zero-watermarking algorithm. An accurate method [38] is used to compute MFrGHMs to achieve this goal. For the original color image, g C ( x , y ) , we defined a discrete image g C ( i , j ) in a domain ( x i   ,   y j )   [ 0 ,   1 ] 2 , where i , j = 1 ,   2 ,   3 , ,   N . Therefore, the points ( x i   ,   y j ) defined as:
x i = i N + Δ x 2
y j = j N + Δ y 2
With Δ x = 1 N and Δ y = 1 N .
Equation (16) can be reformulated:
M F G p q ( g C ) = i = 1 N   j = 1 N     T p q ( x i , y j ) g C ( x i , y j )
where:
T p q ( x i , y j ) = x i Δ x 2 x i + Δ x 2   y j Δ y 2 y j + Δ y 2   F H p ( α ) ( x ; σ ) F H q ( α ) ( y ; σ ) d x d y
Because the double integral in Equation (20) is separable; Equation (19) can be written as follows:
M F G p q ( g C ) = i = 1 N   j = 1 N     I X p ( x i ) I Y q ( y j ) g C ( x i , y j )
where:
I X p ( x i ) = x i Δ x 2 x i + Δ x 2   F H p ( α ) ( x ; σ ) d x
I Y q ( y j ) = y j Δ y 2 y j + Δ y 2   F H q ( α ) ( y ; σ ) d y
The definite integrals’ limits are:
U i + 1 = x i + Δ x 2 ,     U i = x i Δ x 2
V j + 1 = y j + Δ y 2 ,   V j = y j Δ y 2
By substitutions of the Equations (24) and (25) in (22) and (23), we get:
I X p ( x i ) = U i U i + 1   F H p ( α ) ( x ; σ )   d x
I Y q ( y j ) = V j V j + 1   F H q ( α ) ( y ; σ ) d y
Due to the impossibility of solving the integration in Equations (26) and (27) analytically, we use the accurate Gaussian quadrature method to compute the kernels, I X p ( x i ) and I Y q ( y j ) . The definite integral, a b   h ( z ) d z , could be computed as:
a b   h ( z ) d z ( b a ) 2 l = 0 c 1   w l h ( a + b 2 , b a 2 t l )
Substituting Equations (28) into (26) yields:
I X p ( x i ) = U i U i + 1   F H p ( α ) ( x ; σ )   d x ( U i + 1 U i ) 2 l = 0 c 1   w l F H p ( α ) ( U i + 1 + U i 2 + U i + 1 U i 2 t l )
Similarly:
I Y q ( y j ) = V j V j + 1   F H q ( α ) ( y ; σ ) d y ( V j + 1 V j ) 2 l = 0 c 1   w l F H q ( α ) ( V j + 1 + V j 2 + V j + 1 V j 2 t l )
As we can see from Equations (29) and (30), the calculation of I X p ( x i ) & I Y q ( y j ) is mainly based on F H p ( α ) ( x ; σ ) and F H q ( α ) ( y ; σ ) , respectively. Therefore, we use the recurrence form of fractional-order Gaussian-Hermit polynomials to effectively, accurately, and quickly compute I X p ( x i ) & I Y q ( y j ) . Through overcoming the limitations of the explicit form of fractional-order Gaussian-Hermit polynomials, containing many factorial terms that produce numerical errors and instability.

3. Proposed Zero-Watermarking Algorithm

The proposed MFrGHMs-based zero-watermarking algorithm aimed to protect the copyright of color medical images. The proposed algorithm is divided into zero-watermarking generation and verification phases, as illustrated in Figure 1 and Figure 2, respectively.

3.1. Watermark Generation

Supposing the carrier’s medical image is g C , the size is N × N , and the binary watermark image is W, W = { w ( i , j ) { 0 , 1 } , 0 i < P ,   0 j < Q } , and the size is P × Q . The specific steps of the zero-watermark generation phase are:
  • Step 1: Computing the coefficients of MFrGHMs.
We compute the maximum order n m a x MFrGHMs of the host image using Equation (19). We have a totally L = ( n m a x + 1 ) 2 features, where a L- length vector of the amplitudes is created.
  • Step2: Selected Features
Based on the standard selection criteria in [39] and by employing a secret key, K 1   , P × Q coefficient, which is the watermark image size, the precise and accurate MFrGHMs coefficient set, S should be S = { | M F G p q | , q   4 m ,   m   Z } .
  • Step 3: Construction of feature vector
The P × Q of MFrGHMs coefficients generated in Step 2 is used for the feature image construction. A P × Q number MFrGHMs moments is randomly selected from the calculated MFrGHMs moments (set S), where we calculate the amplitudes and produce the vector A = { a ( i ) ,   0 i < P × Q } .
  • Step 4: Binary Feature Vector
The binary feature sequence B = { b ( i ) ,   0 i < P × Q } is obtained from the feature vector/sequence A , where:
B i = { 1 ,             i f     A i T                         0 ,             i f       A i < T                 ,     i = 1 , 2 , P × Q    
where T is the threshold based on the mean value of A.
The binarized vector/sequence B is rearranged into a two-dimensional binary feature image, L F , with the size of P × Q .
  • Step 5: Watermark Scrambling
We scrambled the watermark image W using a 1D Chebyshev map to increase the security and broke the pixels-spatial relationship in the watermark image. The outstanding wide range of control parameters and pseudo-randomness has made the Chebyshev map suitable for image scrambling.
Therefore, the scrambling parameters of the 1D Chebyshev map are used to create the security key.
We transformed the watermark image, W , into a one-dimensional sequence, O W   = { o w   ( i )   : 0 i < P × Q } . Next, a 1D Chebyshev map with controlling parameter r and initial value x 0   (key K 1 ) used in generating the chaotic sequence, C = { c ( i )   : 0 i < P × Q } . The chaotic Chebyshev map is defined as:
x n + 1 = cos ( r cos 1 x n ) ,   x n [ 1 ,   1 ]
where the control parameter r ≥ 2.
A chaotic sequence, C is binarized to obtain a chaotic binary sequence, C ^ as follows:
C ^ ( i ) = { 1 ,             i f     c ^ ( i ) T                         0 ,           i f       c ^ ( i ) < T                     , ( 0 i < P × Q )
where T is the threshold.
Then, we performed an XOR operation between O W and C ^ to get the chaotic scrambled watermark sequence, O W ^ . Finally, O W ^ is converted to the 2D matrix to generate the scrambled watermark W ^   = { w ^   ( i , j ) { 0 , 1 } , 0 i < P ,   0 j < Q } .
  • Step 6: Generation of the Watermark Image
The performed XOR operation is used in scrambling the watermark image, W ^ and the image’s feature, L F to generate the zero-watermark, W z e r o : W z e r o = L F W ^   .

3.2. Detection of the Watermark

We mainly detect the image’s watermark information in the detection phase, independent of the original images.
  • Step 1: Computation of the coefficients of MFrGHMs
We compute the maximum order n m a x , of MFrGHMs for the verified original image,   g c * using Equation (19).
  • Step 2: Selection of the precise coefficients
Similar to Step 2 in the Zero-watermark generation, the precise and accurate MFrGHMs coefficient set, S * are obtained.
  • Step 3: Construction of feature vector
A P × Q number MFrGHMs coefficients are randomly selected from accurate MFrGHMs coefficients set S * and their amplitudes are calculated, producing feature sequences A * = { a * ( i ) ,   0 i < P × Q } .
  • Step 4: Binary Feature Vector
We binarized the feature vector/sequence A * using Equation (31) to produce B * = { b * ( i ) ,   0 i < P × Q } . Then, the binarized feature vector/sequence B * is transformed into the 2D binary feature image, L F * of the size P × Q .
  • Step 5: Generation of the scrambled watermark image
An XOR operation is utilized on the zero-watermark, W z e r o , and the image’s features, L F * to generate the scrambled version of the retrieved watermark,   W * : W * = L F * W z e r o   .
  • Step 6: Extraction of watermark image.
The reverse process of scrambling can extract and visually check out the watermark. W * is reversely scrambled using the key, K 2 of 1D-Chebyshev map to obtain the retrieved watermark, W * denoted as W * = { w * ( i , j ) { 0 , 1 } , 0 i < P ,   0 j < Q } .

4. Experimental Results

Experiments were conducted to evaluate the proposed algorithm. We selected 18 color MRI medical images (256 × 256) from the ‘The Whole-Brain Atlas’ [40], as displayed in Figure 3. Watermarks are binary images (32 × 32), shown in Figure 4, where the fractional parameter is set to t = 1.9.

4.1. Evaluation Metrics

The PSNR is used to evaluate the distortion of attacked images, where lower PSNR values reflect a high degree of distortion and vice versa. The PSNR is defined as [41]:
P S N R (   g c   ,   g c w ) = 10 l o g 10 255 2 M S E
where:
M S E = 1 M 2 ( ι = 1 M κ = 1 M [   g c w ( ι , κ ) g c   ( ι , κ ) ] 2 )
where g c w and g c   refer to attacked and original images, respectively.
The robustness of the algorithm can be determined by comparing the BER and the NC of the extracted watermark image w * , with that of the original image w . BER and NC are defined as:
BER = 1 P × Q ( i = 1 P   j = 1 Q   [ w ( i , j ) w * ( i , j ) ] 2 )
NC = i = 1 P j = 1 Q [ w ( i , j ) × w * ( i , j ) ] i = 1 P j = 1 Q [ w ( i , j ) ]   2
The optimum values of BER and NC values are 0 and 1, respectively.

4.2. Robustness

Three experiments were conducted to test the robustness of the proposed scheme. In the two experiments, we used the color medical image, “ IMAGE1”, of size 256 × 256, as a carrier image and the binary image, “TREE”, of size 32 × 32, as a watermark. For the third experiment, we selected 18 color medical images of size 256 × 256 as carrier images and the binary image, “horse”, of size 32 × 32 as a watermark. In this experiment, we tested the robustness of the proposed zero-watermarking algorithms against various attacks.

4.2.1. Common Signal Processing Attacks

Noise, filtering, JPEG compression, etc., are common signal processing attacks. These attacks change the energy of the image pixels. We performed a few experiments. First, we applied the JPEG compression with various compression ratios, 10, 30, 50, 70 and 90. After the JPEG-compression attack, the attacked images and their corresponding PSNR are shown in Figure 5. Second, we contaminated color medical images with Gaussian noise with variances of 0.005 and 0.02, and also, the “salt and pepper” noise with density 0.005 and 0.02. The noisy images with their PSNR are shown in Figure 6. Finally, the selected color medical images were subjected to different filtering using a small window (3 × 3); median-filtering, Gaussian-filtering, and average-filtering. The filtered images with their PSNR are shown in Figure 7. For simplicity, we summarize these attacks in Table 1.
The proposed algorithm shows a high degree of robustness to various attacks. The retrieved binary watermarks and the calculated values of BER and NC are summarized in Table 2. Table 2 shows that almost all values of BER and NC approach the optimum values, and the rest of the values of BER and NC are equal to 0 and 1, respectively. The retrieved watermarks using the proposed algorithm are very close to the original due to the high accuracy and stability of the MFrGHMs amplitude against various attacks. Therefore, this algorithm resists the different image processing attacks.

4.2.2. Geometric Attacks

Here, the robustness of the proposed zero-watermarking algorithm is evaluated against common geometric attacks. First, we rotated the medical test image by 5°, 15°, 25°, and 45° (Figure 8). Next, we scaled the color medical image with a scaling factor of 0.5, 0.75, 1.5, and 2 (Figure 9). Then, we applied length–width ratio (LWR) changes to the tested images with factors of (1.0, 0.75) and (0.5, 1.0) (Figure 10). Finally, the medical test image was flipped vertically and horizontally (Figure 11). We summarize the common geometric attacks and their parameters in Table 3 for simplicity.
The results concerning the images subjected to geometric attacks are shown in Table 4. Table 4 shows that the retrieved watermarks from the attacked images are almost identical to the original watermarks. The values of BER and NC have approached or are equal to the optimum values of BER and NC, “0 and 1”, respectively. These results ensure the robustness of the proposed algorithm to the geometric attacks.

4.3. Robustness Comparison with Similar Algorithms

We computed the average values of BER of 18 images shown in Figure 3. Then compared the obtained results with the latest zero-watermarking algorithms [20,22,23,26,30,32], where the comparison results are reported in Table 5. We notice that the proposed algorithm achieved the lowest BER and exhibits higher-robustness than the existing zero-watermarking algorithms [20,22,23,26,30,32].

4.4. Computational Time

The proposed scheme mainly consists of two phases. The first is the generation, while the second is the verification. We calculate the execution time for the 18 carrier images (512 × 512) and the watermarks (32 × 32) using the proposed and the existing methods [20,22,23,26,30,32]. The average computation times are reported in Table 6.
The proposed zero watermark algorithm requires much less time than the existing algorithms [20,22,23,26,30,32].
From all the numerical experiments, the proposed algorithm achieved the best values for the BER, the NC, and the computation time compared with the existing algorithms. The proposed algorithm has advantages over the existing algorithms due to the new descriptor with intrinsic features, the fast and accurate computation method of MFrGHMs, and the effective 1D Chebyshev chaotic map combined in the proposed algorithm.

5. Conclusions

In this paper, we have proposed a robust medical color image zero-watermarking algorithm using a new descriptor of medical images and a chaotic map to answer the research questions, RQ1, RQ2, and RQ3, through different numerical experiments. We derived a new set of multi-channel Gaussian–Hermite moments of fractional orders. These new descriptors are used to design an MFrGHMs-based watermarking algorithm for color medical images. The fractional-order orthogonal descriptors enable the extraction of coarse and fine features from the medical images. We used a highly accurate and numerically stable method to compute the MFrGHMs, minimizing common numerical errors. A 1D Chebyshev chaotic map is used to scramble the watermark and break the correlation between the adjacent pixels, improving the watermark’s security. Using multi-channel moments significantly reduces the computational complexity and speeds up the proposed algorithm. Experimental results ensure the robustness and resistance to various kinds of attacks. Furthermore, compared to several existing algorithms, the proposed algorithm achieves a good trade-off between imperceptibility and robustness and has certain superiority in terms of robustness, time complexity, security, and capacity.
For future works, there are some research studies planned. Firstly, the proposed method will be extended to deal with stereoscopic medical images. Secondly, we will utilize a computational method using a fast Fourier transform to improve the computation time and the accuracy of the feature extraction method of medical images. Then, we will improve the security levels by using a new chaotic map. Finally, we will extend the proposed to other real-life applications such as IoT medical systems.

Author Contributions

All authors contributed to different sections of the work equally. Conceptualization, D.S.K., F.K.K., K.M.H. and M.M.D.; methodology, D.S.K., F.K.K., K.M.H. and M.M.D.; validation, D.S.K., F.K.K., K.M.H. and M.M.D.; analysis, D.S.K., F.K.K., K.M.H. and M.M.D.; writing—original draft preparation, D.S.K., F.K.K., K.M.H. and M.M.D.; writing—review and editing, D.S.K., F.K.K., K.M.H. and M.M.D.; visualization, D.S.K., F.K.K., K.M.H. and M.M.D.; supervision, D.S.K., F.K.K., K.M.H. and M.M.D. All authors have read and agreed to the published version of the manuscript.

Funding

This project is funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R300), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R300), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

GOFMMsGeneralized Orthogonal Fourier–Mellin Moments
QGOFMMsQuaternion Generalized Orthogonal Fourier–Mellin Moments
QPHTsQuaternion Polar Harmonic Transforms
QPHFTsQuaternion Polar Harmonic Fourier Transforms
QPHFMsQuaternion Polar Harmonic Fourier Moments
TPCETTernary Polar Cosine Exponent Transform
MFrGMsFractional Genenbauer Moments of Fractional Orders
FoRHFMsRadial Harmonic Fourier Moment of Fractional Orders
QFPJFMsQuaternion Orthogonal Pseudo-Jacobi–Fourier Moments of Fractional Order
MFrGHMsMulti-channel Gaussian–Hermite Moments of Fractional Orders
QLPRHFMsQuaternion Log-polar Radial Harmonic Fourier Moments
FrGHPsFractional-order Gaussian–Hermite Polynomials
2DTwo Dimensional
1DOne Dimensional
PSNRPeak Signal-to-noise Ratio

References

  1. Aparna, P.; Kishore, P.V.V. A blind medical image watermarking for secure E-healthcare application using crypto-watermarking system. J. Intell. Syst. 2020, 29, 1558–1575. [Google Scholar] [CrossRef]
  2. Magdy, M.; Ghali, N.I.; Ghoniemy, S.; Hosny, K.M. Multiple Zero-Watermarking of Medical Images for Internet of Medical Things. IEEE Access 2022, 10, 38821–38831. [Google Scholar] [CrossRef]
  3. Castiglione, A.; Pizzolante, R.; Palmieri, F.; Masucci, B.; Carpentieri, B.; Santis, A.D.; Castiglione, A. On-board format-independent security of functional magnetic resonance images. ACM Trans. Embedded Comput. Syst. 2017, 16, 1–15. [Google Scholar] [CrossRef]
  4. Hosny, K.M.; Darwish, M.M.; Li, K.; Salah, A. Parallel Multi-core CPU and GPU for Fast and Robust Medical Image Watermarking. IEEE Access 2018, 6, 77212–77225. [Google Scholar] [CrossRef]
  5. Haddad, S.; Coatrieux, G.; Moreau-Gaudry, A.; Cozic, M. Joint Watermarking-Encryption-JPEG-LS for Medical Image Reliability Control in Encrypted and Compressed Domains. IEEE Trans. Inf. Forensic Secur. 2020, 15, 2556–2569. [Google Scholar] [CrossRef]
  6. Abdel-Aziz, M.M.; Hosny, K.M.; Lashin, N.A.; Fouda, M.M. Blind Watermarking of Color Medical Images Using Hadamard Transform and Fractional-Order Moments. Sensors 2021, 21, 7845. [Google Scholar] [CrossRef]
  7. Zhou, X.; Ma, Y.; Zhang, Q.; Mohammed, M.A.; Damaševičius, R. A Reversible Watermarking System for Medical Color Images: Balancing Capacity, Imperceptibility, and Robustness. Electronics 2021, 10, 1024. [Google Scholar] [CrossRef]
  8. Hosny, K.M.; Darwish, M.M. Invariant image watermarking using accurate polar harmonic transforms. Comput. Electr. Eng. 2017, 62, 429–447. [Google Scholar] [CrossRef]
  9. Cedillo-Hernandez, M.; Cedillo-Hernandez, A.; Nakano-Miyatake, M.; Perez-Meana, H. Improving the management of medical imaging by using robust and secure dual watermarking. Biomed. Signal Process. Control 2020, 56, 101695. [Google Scholar] [CrossRef]
  10. Kumar, M.; Aggarwal, J.; Rani, A.; Stephan, T.; Shankar, A.; Mirjalili, S. Secure video communication using firefly optimization and visual cryptography. Artif. Intell. Rev. 2021, 55, 2997–3017. [Google Scholar] [CrossRef]
  11. Juarez-Sandoval, O.U.; Garcia-Ugalde, F.J.; Cedillo-Hernandez, M.; Ramirez-Hernandez, J.; Hernandez-Gonzalez, L. Imperceptible–Visible Watermarking to Information Security Tasks in Color Imaging. Mathematics 2021, 9, 2374. [Google Scholar] [CrossRef]
  12. Magdy, M.; Hosny, K.M.; Ghali, N.I.; Ghoniemy, S. Security of medical images for telemedicine: A systematic review. Multimed. Tools Appl. 2022, 81, 25101–25145. [Google Scholar] [CrossRef]
  13. Wen, Q.T.; Sun, F.; Wang, S.X. Concept and application of zero-watermark. Acta Electron. Sin. 2003, 31, 214–216. [Google Scholar]
  14. Ren, N.; Zhao, Y.; Zhu, C.; Zhou, Q.; Xu, D. Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps. ISPRS Int. J. Geo-Inf. 2021, 10, 294. [Google Scholar] [CrossRef]
  15. Zhou, Q.; Zhu, C.; Ren, N.; Chen, W.; Gong, W. Zero Watermarking Algorithm for Vector Geographic Data Based on the Number of Neighboring Features. Symmetry 2021, 13, 208. [Google Scholar] [CrossRef]
  16. Chang, C.C.; Lin, P.Y. Adaptive watermark mechanism for rightful ownership protection. J. Syst. Softw. 2008, 81, 1118–1129. [Google Scholar] [CrossRef]
  17. Zou, B.; Du, J.; Liu, X.; Wang, Y. Distinguishable zero-watermarking scheme with similarity-based retrieval for digital rights Management of Fundus Image. Multimed. Tools Appl. 2018, 77, 28685–28708. [Google Scholar] [CrossRef]
  18. Liu, J.; Li, J.; Zhang, K.; Bhatti, U.A.; Ai, Y. Zero-watermarking algorithm for medical images based on dual-tree complex wavelet transform and discrete cosine transform. J. Med. Imaging Health Inform. 2019, 9, 188–194. [Google Scholar] [CrossRef]
  19. Wu, X.; Li, J.; Tu, R.; Cheng, J.; Bhatti, U.A.; Ma, J. Contourlet-DCT based multiple robust watermarking for medical images. Multimed. Tools Appl. 2019, 78, 8463–8480. [Google Scholar] [CrossRef]
  20. Wang, X.Y.; Wang, L.; Tian, J.L.; Niu, P.P.; Yang, H.Y. Color image zero-watermarking using accurate quaternion generalized orthogonal Fourier–Mellin moments. J. Math. Imaging Vis. 2021, 63, 708–734. [Google Scholar] [CrossRef]
  21. Xia, Z.; Wang, X.; Zhou, W.; Li, R.; Wang, C.; Zhang, C. Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms. Signal Process. 2019, 157, 108–118. [Google Scholar] [CrossRef]
  22. Xia, Z.; Wang, X.; Li, X.; Wang, C.; Unar, S.; Wang, M.; Zhao, T. Efficient copyright protection for three CT images based on quaternion polar harmonic Fourier moments. Signal Process. 2019, 164, 368–379. [Google Scholar] [CrossRef]
  23. Xia, Z.; Wang, X.; Wang, M.; Unar, S.; Wang, C.; Liu, Y.; Li, X. Geometrically invariant color medical image null-watermarking based on precise quaternion polar harmonic Fourier moments. IEEE Access 2019, 7, 122544–122560. [Google Scholar] [CrossRef]
  24. Ma, B.; Chang, L.; Wang, C.; Li, J.; Li, G.; Xia, Z.; Wang, X. Double medical images zero-watermarking algorithm based on the chaotic system and ternary accurate polar complex exponential transform. J. Math. Imaging Vis. 2021, 63, 1160–1178. [Google Scholar] [CrossRef]
  25. Xia, Z.; Wang, X.; Wang, C.; Ma, B.; Wang, M.; Shi, Y.Q. Local quaternion polar harmonic Fourier moments-based multiple zero-watermarking scheme for color medical images. Knowl.-Based Syst. 2021, 216, 106568. [Google Scholar] [CrossRef]
  26. Niu, P.P.; Wang, L.; Wang, F.; Yang, H.Y.; Wang, X.Y. Fast Quaternion Log-Polar Radial Harmonic Fourier Moments for Color Image Zero-Watermarking. J. Math. Imaging Vis. 2022, 64, 537–568. [Google Scholar] [CrossRef]
  27. Hosny, K.M.; Darwish, M.M.; Aboelenen, T. New Fractional-order Legendre-Fourier Moments for Pattern Recognition Applications. Pattern Recognit. 2020, 103, 107324. [Google Scholar] [CrossRef]
  28. Hosny, K.M.; Darwish, M.M.; Aboelenen, T. Novel Fractional-Order Generic Jacobi-Fourier Moments for Image Analysis. Signal Process. 2020, 172, 107545. [Google Scholar] [CrossRef]
  29. Hosny, K.M.; Darwish, M.M.; Aboelenen, T. Novel Fractional-Order Polar Harmonic Transforms for Gray-scale and Color Image Analysis. J. Frankl. Inst. 2020, 357, 2533–2560. [Google Scholar] [CrossRef]
  30. Hosny, K.M.; Darwish, M.M. New geometrically invariant multiple zero-watermarking algorithm for color medical images. Biomed. Signal Process. Control 2021, 70, 103007. [Google Scholar] [CrossRef]
  31. Xia, Z.; Wang, X.; Wang, C.; Wang, C.; Ma, B.; Li, Q.; Wang, M.; Zhao, T. A robust zero-watermarking algorithm for lossless copyright protection of medical images. Appl. Intell. 2021, 52, 607–621. [Google Scholar] [CrossRef]
  32. Wang, X.; Zhang, Y.; Tian, J.; Niu, P.; Yang, H. Accurate quaternion fractional-order pseudo-Jacobi–Fourier moments. Pattern Anal. Appl. 2022, 1–25. [Google Scholar] [CrossRef]
  33. Abramowitz, M.; Stegun, I.A. (Eds.) Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables; Applied Mathematics Series; National Bureau of Standards: Washington, DC, USA, 1964; Reprinted by Dover Publications: New York, NY, USA, 1965.
  34. Yang, B.; Dai, M. Image analysis by Gaussian–Hermite moments. Signal Process. 2011, 91, 2290–2303. [Google Scholar] [CrossRef]
  35. Yang, B.; Shi, X.; Chen, X. Image Analysis by Fractional-Order Gaussian-Hermite Moments. IEEE Trans. Image Process. 2022, 31, 2488–2502. [Google Scholar] [CrossRef]
  36. Chandan, S.; Jaspreet, S. Multi-channel versus quaternion orthogonal rotation invariant moments for color image representation. Digit. Signal Prog. 2018, 78, 376–392. [Google Scholar]
  37. Hosny, K.M.; Darwish, M.M. New set of multi-channel orthogonal moments for color image representation and recognition. Pattern Recognit. 2019, 88, 153–173. [Google Scholar] [CrossRef]
  38. Faires, J.D.; Burden, R.L. Numerical Methods, 3rd ed.; Brooks Cole Publication: Boston, MA, USA, 2002. [Google Scholar]
  39. Xin, Y.; Liao, S.; Pawlak, M. Circularly orthogonal moments for geometrically robust image watermarking. Pattern Recognit. 2007, 40, 3740–3752. [Google Scholar] [CrossRef]
  40. Johnson, K.A.; Becker, J.A. The Whole Brain Atlas. Available online: http://www.med.harvard.edu/AANLIB/home.html (accessed on 19 April 2022).
  41. Erkan, U.; Toktas, A.; Toktas, F.; Alenezi, F. 2D eπ-map for image encryption. Inf. Sci. 2022, 589, 770–789. [Google Scholar] [CrossRef]
Figure 1. Generation of zero-watermark.
Figure 1. Generation of zero-watermark.
Sensors 22 05612 g001
Figure 2. Zero-watermarking verification framework.
Figure 2. Zero-watermarking verification framework.
Sensors 22 05612 g002
Figure 3. Original MRI color medical images.
Figure 3. Original MRI color medical images.
Sensors 22 05612 g003
Figure 4. Binary watermarks images.
Figure 4. Binary watermarks images.
Sensors 22 05612 g004
Figure 5. Image after JPEG compression attack: (a) JPEG 30, PSNR = 32.1397; (b) JPEG 50; PSNR = 34.1217; (c) JPEG 70; PSNR = 36.4392; (d) JPEG 90; PSNR = 46.7826.
Figure 5. Image after JPEG compression attack: (a) JPEG 30, PSNR = 32.1397; (b) JPEG 50; PSNR = 34.1217; (c) JPEG 70; PSNR = 36.4392; (d) JPEG 90; PSNR = 46.7826.
Sensors 22 05612 g005
Figure 6. Image after adding noise attack: (a) Gaussian-noise 0.005, PSNR = 21.4300; (b) Gaussian-noise 0.02, PSNR = 20.8392; (c) salt and pepper noise 0.005, PSNR = 27.0980; (d) salt and pepper noise 0.02, PSNR = 22.9251.
Figure 6. Image after adding noise attack: (a) Gaussian-noise 0.005, PSNR = 21.4300; (b) Gaussian-noise 0.02, PSNR = 20.8392; (c) salt and pepper noise 0.005, PSNR = 27.0980; (d) salt and pepper noise 0.02, PSNR = 22.9251.
Sensors 22 05612 g006
Figure 7. Images after filtering attack: (a) median-filtering 3 × 3; PSNR = 24.2301; (b) Gaussian-filtering 3 × 3; PSNR = 18.7036; (c) average-filtering 3 × 3 PSNR = 19.2364.
Figure 7. Images after filtering attack: (a) median-filtering 3 × 3; PSNR = 24.2301; (b) Gaussian-filtering 3 × 3; PSNR = 18.7036; (c) average-filtering 3 × 3 PSNR = 19.2364.
Sensors 22 05612 g007
Figure 8. Rotated Images: (a) 5°; PSNR = 16.5233; (b) 15°; PSNR = 15.1828; (c) 25°; PSNR = 14.3906; (d) 45°; PSNR = 13.6059.
Figure 8. Rotated Images: (a) 5°; PSNR = 16.5233; (b) 15°; PSNR = 15.1828; (c) 25°; PSNR = 14.3906; (d) 45°; PSNR = 13.6059.
Sensors 22 05612 g008
Figure 9. Scaled images: (a) 0.5, (b) 0.75, (c) 1. 5, (d) 2.0.
Figure 9. Scaled images: (a) 0.5, (b) 0.75, (c) 1. 5, (d) 2.0.
Sensors 22 05612 g009
Figure 10. Image after under LWR changing: (a) (1.0, 0.75), (b) (0.5, 1.0).
Figure 10. Image after under LWR changing: (a) (1.0, 0.75), (b) (0.5, 1.0).
Sensors 22 05612 g010
Figure 11. Image after flipping attacks: (a) Horizontal-flipping, PSNR = 8.9862, (b) Vertical-flipping, PSNR = 12.5725.
Figure 11. Image after flipping attacks: (a) Horizontal-flipping, PSNR = 8.9862, (b) Vertical-flipping, PSNR = 12.5725.
Sensors 22 05612 g011
Table 1. Common image processing attacks and their parameterization.
Table 1. Common image processing attacks and their parameterization.
AttackParameter
JPEG-CompressionCompression-Ratio: 30%, 50%, 70%, 90%
Gaussian-noiseNoise-variance: 0.005, 0.02
“Salt and pepper”-noiseNoise-density: 0.005, 0.02
Median-filteringWindow-size: 3 × 3
Gaussian-filteringWindow-size: 3 × 3
Average-filteringWindow-size: 3 × 3
Table 2. The extracted watermarks and the corresponding BER and NC values under common image processing attacks.
Table 2. The extracted watermarks and the corresponding BER and NC values under common image processing attacks.
Applied-AttackJPEG-(10)JPEG-(30)JPEG-(10)JPEG-(70)
Extracted watermark Sensors 22 05612 i001 Sensors 22 05612 i002 Sensors 22 05612 i003 Sensors 22 05612 i004
BER0.00680.00390.00290
NC0.98490.99140.99361.0000
Applied-AttackJPEG-(90)“Gaussian-
Noise”
(0.005)
“Gaussian-
Noise”
(0.02)
“Salt and pepper”
noise (0.005)
Extracted watermark Sensors 22 05612 i005 Sensors 22 05612 i006 Sensors 22 05612 i007 Sensors 22 05612 i008
BER000.00390
NC1.00001.00000.99141.0000
Applied-Attack“Salt and pepper”
noise (0.02)
“Median-Filtering”
(3 × 3)
“Gaussian-filtering”
(3 × 3)
“Average-Filtering”
(3 × 3)
Extracted watermark Sensors 22 05612 i009 Sensors 22 05612 i010 Sensors 22 05612 i011 Sensors 22 05612 i012
BER0.00200.00290.00290.0039
NC0.99570.99360.99360.9914
Table 3. Geometric attacks and their parameterization.
Table 3. Geometric attacks and their parameterization.
AttackParameter
Image rotationRotation angles: 50, 150, 250, 450
Image scalingScaling factors: 0.5, 0.75, 1.25, 1.5
Length–width ratio changingFactor (1.0, 0.75) and (0.5, 1.0).
Note: The parameters refer to vertically and horizontally scaling.
Image flippingVertical and horizontal
Table 4. The watermarks and corresponding BER and NC values were extracted under common geometric attacks.
Table 4. The watermarks and corresponding BER and NC values were extracted under common geometric attacks.
Applied
Attack
Rotation# 5°Rotation# 15°Rotation# 25°Rotation# 45°
Extracted watermark Sensors 22 05612 i013 Sensors 22 05612 i014 Sensors 22 05612 i015 Sensors 22 05612 i016
BER000.00390.0010
NC1.00001.00000.99140.9979
Applied
Attack
Scaling# 0.5Scaling# 0.75Scaling# 1.5Scaling# 2.0
Extracted watermark Sensors 22 05612 i017 Sensors 22 05612 i018 Sensors 22 05612 i019 Sensors 22 05612 i020
BER0.00290.00200.00100
NC0.99360.99570.99791.0000
Applied
Attack
LWR
(1.0, 0.75)
LWR
(0.5, 1.0)
Horizontal-flippingVertical-
Flipping
Extracted watermark Sensors 22 05612 i021 Sensors 22 05612 i022 Sensors 22 05612 i023 Sensors 22 05612 i024
BER0.00490.00680.00100.0010
NC0.98920.98490.99790.9979
Table 5. Average BER comparison with [20,22,23,26,30,32].
Table 5. Average BER comparison with [20,22,23,26,30,32].
AttacksScheme
[20]
Scheme
[22]
Scheme
[23]
Scheme
[26]
Scheme
[30]
Scheme
[32]
Proposed
Rotation50.00000.00370.00150.00000.00110.00000.0000
450.00000.00420.00440.00000.00150.00000.0000
Scaling0.250.00020.02740.04100.00480.00540.00000.0001
4.00.00010.00200.00010.00000.00000.00000.0000
FlippingH0.00000.00350.00270.00000.00010.00000.0000
V0.00000.00480.00360.00000.00020.00000.0000
Upper left corner cropping1/160.00020.00000.00000.00000.00000.00000.0000
1/80.00500.00000.00000.00000.00000.00000.0000
JPEG compression300.00070.00540.00790.00000.00340.00000.0002
700.00090.00370.00300.00000.00200.00110.0000
Median filtering3 × 30.00390.00980.03420.00480.00350.00380.0013
Gaussian filtering3 × 30.00010.00240.00150.00000.00150.00000.0000
Salt and pepper noise0.010.00090.02600.02490.00480.00270.00110.0005
Gaussian-noise0.010.00770.02000.02730.00480.00390.01060.0029
Table 6. Computation time for the proposed and the existing algorithms [20,22,23,26,30,32].
Table 6. Computation time for the proposed and the existing algorithms [20,22,23,26,30,32].
Scheme
[20]
Scheme
[22]
Scheme
[23]
Scheme
[26]
Scheme [30]Scheme
[32]
Proposed
Generation time (s)40.633445.95233.85025.73113.85116.86311.769
Verification time (s)41.784046.23834.13726.14815.01717.20812.493
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Khafaga, D.S.; Karim, F.K.; Darwish, M.M.; Hosny, K.M. Robust Zero-Watermarking of Color Medical Images Using Multi-Channel Gaussian-Hermite Moments and 1D Chebyshev Chaotic Map. Sensors 2022, 22, 5612. https://doi.org/10.3390/s22155612

AMA Style

Khafaga DS, Karim FK, Darwish MM, Hosny KM. Robust Zero-Watermarking of Color Medical Images Using Multi-Channel Gaussian-Hermite Moments and 1D Chebyshev Chaotic Map. Sensors. 2022; 22(15):5612. https://doi.org/10.3390/s22155612

Chicago/Turabian Style

Khafaga, Doaa Sami, Faten Khalid Karim, Mohamed M. Darwish, and Khalid M. Hosny. 2022. "Robust Zero-Watermarking of Color Medical Images Using Multi-Channel Gaussian-Hermite Moments and 1D Chebyshev Chaotic Map" Sensors 22, no. 15: 5612. https://doi.org/10.3390/s22155612

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop