Improved security of medical images using DWT–SVD watermarking mechanisms based on firefly Photinus search algorithm

Waleed Alomoush, Osama A. Khashan, Ayat Alrosan, Rafat Damseh, Mohammad Alshinwan, Alaa Ali Abd-Alrazaq, Mohanad A. Deif

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

Security is the primary concern in the transmission of medical images, as it involves sensitive patient information. This study introduces an optimized watermarking approach, constructed using discrete wavelet transform and singular value decomposition. The Low- level frequency bands (LL3) sub-band singular values of the host image were embedded with the singular values of a binary watermark using multiple scaling factors. These MSFs were optimized using a recently proposed firefly Photinus algorithm to balance robustness and imperceptibility. The proposed method was applied to various images, including computed tomography images, where the visual quality of the signed and attacked images was evaluated by peak signal-to-noise ratio (PSNR) and normalized cross-correlation. The performance of the proposed algorithm demonstrates significant improvements in the embedding and extraction processes, showing an enhancement in the balance between robustness and imperceptibility, with a PSNR above 79.28 dB, compared to other related works.

Original languageEnglish
Article number366
JournalDiscover Applied Sciences
Volume6
Issue number7
DOIs
Publication statusPublished - Jul 2024

Keywords

  • Discrete wavelet transform
  • Firefly algorithm
  • Imperceptibility
  • Medical image security
  • Robustness
  • Singular value decomposition

ASJC Scopus subject areas

  • General Chemical Engineering
  • General Earth and Planetary Sciences
  • General Engineering
  • General Environmental Science
  • General Materials Science
  • General Physics and Astronomy

Fingerprint

Dive into the research topics of 'Improved security of medical images using DWT–SVD watermarking mechanisms based on firefly Photinus search algorithm'. Together they form a unique fingerprint.

Cite this