Professional Documents
Culture Documents
https://doi.org/10.1007/s12652-020-02135-3
ORIGINAL RESEARCH
Abstract
Data security has become a major concern of present time. Digital image watermarking is seen as a viable solution to ensure
the integrity of image data. Watermarking algorithms can detect the presence of various attacks on images. In this work, a
secure and efficient fragile image watermarking technique is proposed. The proposed watermarking algorithm aims to find
image tampering and its location. The proposed approch is a spatial domain, block-based embedding technique. It introduces
a unique key based embedding using SHA-1 (Secure Hashing Algorithm) hashing. The watermarked images have high PSNR
and SSIM. The algorithm can handle various size of tampering, from very small to large. The proposed technique has been
tested for a wide variety of tampering attacks like copy-paste, copy-move, constant average, and general tampering. It can
efficiently detect tampering in the presence of these attacks.
Keywords Image watermarking · Tamper detection · Tamper localization · Copy-paste attack · Copy-move forgery ·
Constant average attack
13
Vol.:(0123456789)
S. Bhalerao et al.
motives like copyright protection, content authentication, a message-digest was used as watermark. The digest was
tamper detection, etc. (Potdar et al. 2005). Apart from it, generated from the image itself. Before embedding, encryp-
watermarking is also used to identify the image tampering tion was used to secure the watermark. During extraction,
and sometimes to recover the lost information (Wang et al. embedded data was separated from the LSB bit plane. The
2018). Various ways may tamper the images, like noise, digest was again generated from the received image. When
unauthorized access, and illegal activity. embedded digest and generated digest were found to be
In watermarking, a signal (called as the watermark) is equal, it indicated no tampering was there.
embedded into a host signal, which is an image in the case Another spatial domain method for medical image secu-
of digital image watermarking. The resultant image is called rity was proposed by (Tan et al. 2011). It was a dual-layer
a watermarked image. When the requirement is copyright watermarking scheme with tamper localization ability. Simi-
protection, it is expected that embedded watermark remains lar to the above work, this method was also based on cryp-
secured even in the presence of attacks on the image. Thus, tography, and it was implemented for DICOM images. The
watermark can be extracted from the attacked image too and medical image was firstly fragmented in blocks of 16 × 16
ownership can be established. Such watermarking is called pixels and CRC (cyclic redundancy check) was calculated
robust watermarking (Mohanarathinam et al. 2019; Singh for each block. The computed CRC was embedded in the
and Bhatnagar 2019). In fragile watermarking, the main block itself. The process was repeated during extraction, the
purpose is identification of image tampering (Di Martino mismatch in CRC indicated tampering. This method was
and Sessa 2019). Thus, when the image gets tampered, the a reversible scheme with tamper localization ability. How-
watermark should also gets damaged, indicating image tam- ever, embedding CRC of a block in the same block itself
pering. Watermarking is a useful tool in the telemedicine was a drawback of this method. Spatial domain techniques
industry, which is used to ensure the integrity of medical are mostly used to implement fragile watermarking. To
data (Giakoumaki et al. 2006). In the telemedicine industry increase the robustness of watermarking algorithms trans-
patient data is stored electronically in the form of the elec- form domain techniques were implemented.
tronic patient record (EPR). The major portions of EPR con- Qi and Xin (2015) proposed a transform domain tech-
tains medical images like X-rays, CT scans, MRI, etc. (Rao nique using singular value decomposition (SVD). It was
and Kumari 2011). These images are of sensitive nature and a semi-fragile technique using the wavelet transform. To
watermarking is a necessity to identify tampering (Zain and enhance security, the watermark was generated using a
Clarke 2005). private key. At the time of extraction, the watermark was
Watermarking can be performed in the spatial domain regenerated. An error map was created after comparing the
or transform domain (Mousavi et al. 2014). Although there regenerated watermark with the embedded watermark. This
is no such rule, but transform domain is mostly used, when scheme outperformed many of its contemporary schemes,
robustness is the required characteristic. When it is possible but its embedding capacity was less.
to extract (from the watermarked image) the host image in The security of watermark can be increased using source
its original (100%) form, then such watermarking is called coding techniques. A technique using such codes was pro-
reversible watermarking (Arsalan et al. 2012). Watermark- posed by Singh et al. (2015). It was a secure and robust
ing can also be classified as blind and non-blind (Rey and watermarking technique for medical images. It used BCH
Dugelay 2002). When watermarking is non-blind, both host codes (Bose, Chaudhuri, and Hocquenghem) to encode the
image and watermark are required during data extraction. watermark before embedding it. BCH codes are known for
A discussion of the earlier developed techniques related to their error-correcting capabilities. This method was a trans-
digital image watermarking is present in the next section. form domain approach and DWT (discrete wavelet trans-
form) was used. Watermark was first converted into ASCII
code and then BCH was applied to it, to increase the robust-
2 Related work ness. Three separate watermarks were embedded in selected
sub-band of a three level wavelet decomposition of medical
Different techniques have been reported in the past for digi- image. Their method performed well against a variety of
tal image watermarking. Each technique has its specialty. attacks, providing high imperceptibility and PSNR (peak
In spatial domain, the bit substitution is one of the simplest signal to noise ratio). However, low payload capacity was
methods of watermarking (Potdar et al. 2005). Khamli- the drawback of this scheme.
chi (Khamlichi et al. 2006) has proposed a watermarking A blind watermarking technique for medical images
method based on LSB substitution. It was a medical image was proposed in Thakkar and Srivastava (2017). It too was
watermarking technique to preserve the integrity of medical based on error-correcting codes. It embeds two watermarks
images. In their technique patient’s confidential data and to increase the robustness of the scheme, one of which was
13
A secure image watermarking for tamper detection and localization
a logo and the other one was text data. Patient data act as LSBs of the image. Another method, with a large scale tam-
text watermark, which was secured through error-correcting per detection ability, was proposed by Sarkar et al. (2020). In
codes. It was again a DWT based transform domain method. their method, two different watermarking schemes were pro-
SVD was applied to the chosen sub-band after decomposi- posed. The first scheme was spatial domain method and the
tion. They proved that the performance of their method was other one was the transform domain technique. The schemes
better than other methods, but only ROI (region of interest) were able to recover the tampered image up to 75% and 50%
was considered for data embedding. This resulted in low tampering. In (Di Martino and Sessa 2019), a fuzzy logic
embedding capacity. based solution was proposed for image tampering detection.
Sharma et al. (2017) proposed a DCT (discrete cosine It was a non-blind technique. Another multipurpose water-
transform) and DWT based multiple watermarking scheme. marking technique was proposed in (Tiwari et al. 2017). It
Similar to the previous approach, it used an image and text was a vector quantization based approach and two different
watermarks. But in this scheme, both ROI and RONI (region watermarks were embedded in the image.
of non-interest) were utilized for embedding the water- Recently a spatial domain method with high PSNR was
mark. It used RSA (Rivest, Shamir, and Adleman) encryp- proposed by Gull et al. (2018). It was a tamper detection and
tion scheme to secure text watermark and the MD5 hashing localization technique, implemented for medical images. To
algorithm was used for image watermark. To ensure the start, the image was first divided into non-overlapping blocks
robustness of their scheme Hamming error correction codes of 4 × 4. Each block consists of 16 pixels and 16 bits were
were used. Given its complex nature, this method resulted in embedded in each block. The embedded bits were combina-
high computational complexity. There are many techniques tion of watermark and block mean. The method was based
where SVD is an important ingredient. A method proposed on bit substitution. It was a simple technique that was able
by Shehab et al. (2018) was also based on SVD. It was a to detect and localize tampering in case of general tamper-
robust-fragile technique that was able to locate the tamper ing. However, their technique failed against specific cases of
and recover the original image. Experiments show that their copy-paste attack, copy-move attack, and constant average
technique was effective against various attacks. attack. A detailed security analysis of their method is pre-
Another technique based on IWT was proposed by Sel- sented in the next section. Then after, a solution of the same
vam et al. (2017). It was a hybrid and blind watermarking is proposed in this work. Different image tampering attacks
technique implemented using DGT (discrete Gould trans- and their effects are also discussed in next section.
form). The host image was first decomposed using IWT
and high-frequency components were selected for water-
mark embedding. The selected sub-band was fragmented in 3 Image tampering attacks
blocks and DGT was applied on all blocks. Inverse DGT was
performed after embedding watermark bits. In this method In this section, different image tampering attacks has been
two transform were used. Results showed that such hybrid discussed. The performance of Gull et al. (2018) has also
methods worked better than single transforms. The downside examined for these attacks. The watermarking technique of
of this approach was that it exhibits high distortion with low (Gull et al. 2018) is explained in Fig. 1 and their perfor-
payload capacity. mance to these attack are present in Fig. 2.
A reversible watermarking scheme with high capacity A general tampering attack on an image could be a text or
was proposed by Parah et al. (2017). In their work, they an object addition. For example, a signature could be added
have applied pixel-to-block (PTB) conversion method which to the image, or a face could be replaced by another face.
guarantees reversibility. Watermark consists of EPR, and All these attacks are general tampering attacks. The image
its checksum calculated over each block. By using check- present in Fig. 2a is an example of a text addition attack.
sum, tamper detection and localization was made possible. Another basic image tampering attack, is crop-attack. In
Although reversibility was guaranteed, and high capacity crop attack, a portion of the image is removed from it. An
was achieved, the resultant images were distorted in com- example of the crop-attack is present in Fig. 2b. The copy-
parison to previous methods. paste attack is another well-known image tampering attack.
A real-time tampering detection algorithm was proposed In copy-paste attack, a part of a different watermarked
by Azeroual and Afdel (2017). It was a transform domain image, generated from the same watermarking algorithm
fragile watermarking algorithm for tamper localization. is copied on the other image. A watermarking algorithm is
Watermark was generated by the combination of a logo and expected to detect such forgery.
wavelet coefficients. In their method, Faber–Schauder dis- Another attack similar to the copy-paste attack is called
crete wavelet transform (FSDWT), was used to get the wave- a copy-move attack. This attack is sometimes called a copy-
let coefficients. The watermark was embedded in selected move forgery. In a copy-move attack, a portion from the
13
S. Bhalerao et al.
Watermark and
Fragmentation Block Mean Image
Host Image Mean
4x4 blocks Calculation Repackaging
Embedding
Watermark
XOR
same watermarked image is pasted on that image itself. In attack and copy-paste attack. Similarly, it is susceptible to
many methods, image mean is used as the watermark; such the constant-average attack.
methods are susceptible to constant average attack. In the In the copy-paste attack, their method fails to identify
constant-average attack, firstly an object is added or removed tampering. This happens when the part copied from the dif-
from image. Then, the average of the tampered region is ferent image has all 4 × 4 blocks intact i.e. no 4 × 4 block
computed and embedded in the tampered region itself. boundary gets violated. While pasting this block on the tam-
The watermarking technique proposed by Gull et al. pered image, the same is taken care of, that no 4 × 4 block
(2018) was a spatial domain technique. They were using an boundary gets violated on the image. For example, 32 blocks
8-bit grayscale image of size 256 × 256 as a host image. The arranged in 8 × 4 fashion in one image, will go on 32 blocks
watermark was also an 8-bit grayscale image of size 64 × 64. of the same arrangement anywhere on the second image. It
Their embedding scheme is discussed first, followed by the does not need to be at the same location. The output for the
details of the extraction mechanism. The inherent problems copy-paste attack by Gull et al. (2018) is shown in Fig. 2c.
with this method are also discussed. Similarly, their method fails, when the copy-move attack
During the embedding phase, the host image was initially is done by preserving the boundaries of each 4 × 4 block.
divided into non-overlapping blocks of size 4 × 4. As the size The reason behind the faulty behavior of this method for
of the host image is 256 × 256; 4096 unique blocks were both attacks is the self-authentication of blocks. The aver-
created. Given the size of the watermark, the total number age value of each block is computed and is embedded in the
of pixel present in it were 4096, therefore each gray value of block itself. Thus, when the tampered region is copied from
watermark was embedded in one block. Mean (M) of each the same image (copy-move) or the different watermarked
block was calculated after replacing the LSB with zeros. image (copy-paste). The tampered-blocks self-authenticate
The calculated mean was converted into an 8-bit binary themselves and the method fails to detect tampering. But,
sequence; ceiling operation was performed, if required. Now, this happens only when attack is done by preserving block
the block was divided into two halves called the upper half boundaries. The output for the copy-move attack by Gull
block (UHB) and the lower half block (LHB). An eight-bit et al. (2018) is shown in Fig. 2d.
code was generated by XOR-ing mean (M) and 8 bits of the In the technique proposed by Gull et al. (2018) a block
watermark. After replacing LSB of every pixel the code was average can be calculated from LSBs of UHB. The constant-
embedded in LHB itself. The mean (M) was itself embedded average attack could be performed by changing the block
in UHB, by substituting LSB of every pixel of UHB. and keeping the average value of block equal to the value
In the extraction phase, a similar process was used as extracted from UHB. Alternatively, LSBs of UHB could
performed during embedding phase. The received water- be changed according to the tampered block. In both cases,
marked image was first divided into non-overlapping their method was found unable to detect image tampering. In
blocks of size 4 × 4. The last two bits of every pixel were Fig. 2e performance of their method against constant average
replaced with zeros. The block average or mean was calcu- attack is tested.
lated (ext-M). Next, the block was divided into two halves To overcome the weakness of above method an improved
UHB and LHB. The mean embedded during embedding method is proposed in this work. In the next section, the
(M) was extracted from UHB. The binary code is extracted proposed method is discussed.
from LHB and XOR-ed with the mean (M) to get the water-
mark. When ext-M was found to be same as M, no tam-
pering has been marked. The different values indicated 4 Proposed method
otherwise. Figure 2a and b shows the performance of this
method against general tampering. The method by Gull In this section, the proposed method, which is an improved
et al. (2018) is prone to the specific case of copy-move strategy against the above-mentioned attacks, is discussed.
13
A secure image watermarking for tamper detection and localization
Fig. 2 Performance of watermarking algorithm of Gull et al. (2018) against different attacks. a Text addition attack. b Crop attack. c Copy-paste
attack. d Copy move attack. e Constant average attack
In the proposed method, a key-based authentication image was 256 × 256; thus, 4096 unique blocks were cre-
scheme is implemented for image tampering detection. The ated. The key generated for every block must be same during
key-based authentication eradicates the problem present embedding and extraction, which is an important condition
in the self-authentication method. Initially, the host image for correct extraction. Therefore, block-keys were generated
was fragmented in non-overlapping blocks of 4 × 4. A 16-bit using the same seed at both ends. The complete process of
block-key was generated for each block. The watermark the watermark embedding is explained through detailed
for the block was generated using a unique block-key, that steps in the following sub-section.
helped in tamper detection of the block. The size of the host
13
S. Bhalerao et al.
(d) The hash value was computed for each stripped block,
using the SHA-1 algorithm. The first 16 bits were
extracted from the hash value. The extracted bits are
named hash-code.
(e) The hash-code was XOR-ed with 16-bit block-key and
a hash-key code was generated.
(f) The generated hash-key code was embedded in the
block itself using LSB substitution.
(g) The block generated after embedding was the water-
marked block.
4.2 Extraction steps
Fig. 3 Example of block embedding (a) During extraction, the fragmentation on the image was
performed again.
(b) Block-key was generated for each block with the same
4.1 Embedding steps seed used during embedding. As the seed was same for
embedding and extraction, the same key was generated
(a) The image was first divided into non-overlapping for every block as generated during embedding.
blocks of size 4 × 4. (c) The LSB’s from all 16 pixels of the blocks were
(b) A 16-bit block-key was generated for each block. As extracted, and replaced with 0. The extracted bits was
the numbers of 16-bit combinations are greater than the hash-key code embedded during the embedding phase.
total number of blocks, a unique key gets assigned to (d) The hash computation was done for each block after
each block. setting LSBs to zero.
(c) The LSB of every pixel of the block was replaced with
zero.
13
A secure image watermarking for tamper detection and localization
Hash-key code
(a)
16 bit block-key
16 bit hash
Generate block-
key for every block XOR
Hash-key code
No
Is embedded code equal Tampering
to generated code? Detected
Yes
No Tampering
Detected
(b)
(e) The hash-key code was generated for watermarked In Fig. 5, the complete embedding and extraction process
image blocks by XOR-ing block hash codes with block- is summarized through block diagrams. Figures 3, 4, and 5
keys. gives the comprehensive idea of proposed work. The pres-
(f) When generated code and embedded code was found to ence of 16-bit block keys makes this implementation resist-
be same, then it was markred as non- tampered block. ant to attacks discussed in the previous section. The block
keys are generated by a seed that is common during embed-
The output (embedded blocks) of Fig. 3 acts as the input ding and extraction. Until and unless this seed is known the
during extraction. Figure 4 shows the validation and veri- block-keys cannot be calculated. This makes the proposed
fication of blocks during the extraction process. Initially, improvement to perform well against attacks.
the LSBs are extracted from the block and compared with
regenerated hash-key code. It can be seen from Fig. 4 that
extracted and computed codes are equal, this implies the
absence of tampering.
13
S. Bhalerao et al.
Fig. 6 Performance of proposed method against different attacks. a Copy-move and crop attack, b copy-paste and constant-average attack
13
A secure image watermarking for tamper detection and localization
13
S. Bhalerao et al.
25
Random Tampering
Copy Move
Copy Paste
20
15
False Positive Rate
10
0
0 5 10 15 20 25 30 35 40 45 50
Tampering Percentage
Fig. 8 Average (50 images) false positive rate for different tampering percentage
Table 2 Average (50 images) Tampering per- Random tampering Copy move Copy paste
FPR, FNR and TDR for centage (%)
different tampering attacks FPR FNR TDR FPR FNR TDR FPR FNR TDR
technique for image tamper detection was proposed. The tampering attacks that were copy-paste, copy-move, and
proposed technique was a block-based watermarking tech- constant average attacks. The watermarked images showed
nique using the SHA-1 hashing algorithm. Proposed tech- high quality, which was evident from their high PSNR and
nique aimed to detect and locate tamper in grayscale images. SSIM. In the future, the algorithm will be extended to incor-
The technique was able to detect tampering of all shapes porate features like robustness and self-recovery.
and sizes. The algorithm was resistant to different image
13
A secure image watermarking for tamper detection and localization
Qi and Xin (2015) Spatial domain and singular PSNR 41.39 – Complex algorithm, it was
value decomposition weak towards grometric
(SVD) attacks
Tiwari et al. (2017) Vector quantization PSNR 42 – Output (watermarked image)
PSNR was low
Azeroual and Afdel (2017) Transform domain, Faber– MSE, PSNR, FPR, FNR 51.07 – Number of false positive
Schauder DWT pixels were high
Gull et al. (2018) Spatial domain embedding PSNR, SSIM 51.14 0.9948 It was weak towards copy-
paste, copy-move and
constant average attacks
Sarkar et al. (2020) Spatial domain, quad MSE, PSNR, SSIM 44.5 0.9993 Output (watermarked image)
method PSNR was low
Proposed Spatial domain, hash-based PSNR, SSIM 51.12 0.9959 Detects copy-paste, copy-
embedding move and constant average
attacks
References Khamlichi YI, Zaz Y, Afdel K (2006) Authentication system for medi-
cal watermarked content based image. Wseas Trans Signal Pro-
cess 5:826–830
Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steg-
Khan F, Gutub AA-A (2007) Message concealment techniques using
anography using truth table based and determinate array on RGB
image based steganography. In: 4th IEEE GCC Conf Exhib 5
indicator. Int J Signal Image Process 1:9
Mohanarathinam A, Kamalraj S, Prasanna Venkatesan GKD et al
Arsalan M, Malik SA, Khan A (2012) Intelligent reversible water-
(2019) Digital watermarking techniques for image security: a
marking in integer wavelet domain for medical images. J Syst
review. J Amb Intell Humaniz Comput. https://doi.org/10.1007/
Softw 85:883–894
s12652-019-01500-1
Azeroual A, Afdel K (2017) Real-time image tamper localization
Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking
based on fragile watermarking and Faber-Schauder wave-
techniques used in medical images: a survey. J Digit Imaging
let. AEU Int J Electron Commun 79:207–218. https: //doi.
27:714–729
org/10.1016/j.aeue.2017.06.001
Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical infor-
Di Martino F, Sessa S (2019) Fragile watermarking tamper
mation in medical images: a new high capacity and reversible data
detection via bilinear fuzzy relation equations. J Amb Intell
hiding technique. J Biomed Inform 66:214–230
Humaniz Comput 10:2041–2061. https://doi.org/10.1007/s1265
Parvez MT, Gutub AAA (2008) RGB intensity based variable-bits
2-018-0806-3
image steganography. In: Proc 3rd IEEE Asia-Pacific Serv Com-
Giakoumaki A, Perakis K, Tagaris A, Koutsouris D (2006) Digital
put Conf APSCC 2008, pp 1322–1327. https://doi.org/10.1109/
watermarking in telemedicine applications-towards enhanced
APSCC.2008.105
data security and accessibility. In: 2006 International confer-
Parvez MT, Gutub AA-A (2011) Vibrant color image steganography
ence of the IEEE engineering in medicine and biology society.
using channel differences and secret data distribution. Kuwait J
pp 6328–6331
Sci Eng 38:127–142
Gull S, Loan NA, Parah SA et al (2018) An efficient watermarking
Potdar VM, Han S, Chang E (2005) A survey of digital image water-
technique for tamper detection and localization of medical images.
marking techniques. In: INDIN’05. 2005 3rd IEEE international
J Amb Intell Humaniz Comput 1–10
conference on industrial informatics, 2005. pp 709–716
Gutub AA-A (2010) Pixel indicator technique for RGB image steg-
Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking
anography. J Emerg Technol Web Intell 2:56–64
scheme for image content authentication with tamper localization.
Gutub A, Al-Qahtani A (2009) Triple-A: secure RGB image steganog-
J Vis Commun Image Represent 30:312–327
raphy based on randomization. IEEE/ACS Int Conf Comput Syst
Rao NV, Kumari VM (2011) Watermarking in medical imaging for
Appl AICCSA 2009:400–403. https://doi.org/10.1109/AICCS
security and authentication. Inf Secur J Glob Perspect 20:148–155
A.2009.5069356
Rey C, Dugelay J-L (2002) A survey of watermarking algorithms
Gutub A, Al-juaid N (2018) Multi-bits stego-system for hiding text
for image authentication. EURASIP J Adv Signal Process
in multimedia images based on user security priority. J Comput
2002:218932
Hardw Eng 1:1–9. https://doi.org/10.63019/jche.v1i2.513
Sarkar D, Palit S, Som S, Dey KN (2020) Large scale image tam-
Gutub A, Ankeer M, Abu-Ghalioun M, et al (2008) Pixel indicator high
per detection and restoration. Multimed Tools Appl. https://doi.
capacity technique for RGB image based steganography
org/10.1007/s11042-020-08669-0
Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing
Selvam P, Balachandran S, Iyer SP, Jayabal R (2017) Hybrid transform
technique for multimedia applications. Multimed Tools Appl
based reversible watermarking technique for medical images in
78:5591–5619. https://doi.org/10.1007/s11042-017-5293-6
telemedicine applications. Optik 145:655–671
13
S. Bhalerao et al.
Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multi- Tiwari A, Sharma M, Tamrakar RK (2017) Watermarking based image
ple watermarking for medical images. Wirel Pers Commun authentication and tamper detection algorithm using vector quan-
92:1611–1624 tization approach. AEU Int J Electron Commun 78:114–123. https
Shehab A, Elhoseny M, Muhammad K et al (2018) Secure and robust ://doi.org/10.1016/j.aeue.2017.05.027
fragile watermarking scheme for medical images. IEEE Access Wang C, Zhang H, Zhou X (2018) A self-recovery fragile image water-
6:10269–10278 marking with variable watermark capacity. Appl Sci 8:548
Singh SP, Bhatnagar G (2019) A robust blind watermarking framework Zain J, Clarke M (2005) Security in telemedicine: issues in watermark-
based on Dn structure. J Amb Intell Humaniz Comput 11:1869– ing medical images. In: Sci Electron Technol Inf Telecommun
1887. https://doi.org/10.1007/s12652-019-01296-0 Tunis
Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and impercepti-
ble spread-spectrum watermarking for telemedicine applications. Publisher’s Note Springer Nature remains neutral with regard to
Proc Natl Acad Sci India Sect A Phys Sci 85:295–301 jurisdictional claims in published maps and institutional affiliations.
Tan CK, Ng JC, Xu X et al (2011) Security protection of DICOM medi-
cal images using dual-layer reversible watermarking with tamper
detection capability. J Digit Imaging 24:528–540
Thakkar FN, Srivastava VK (2017) A blind medical image watermark-
ing: DWT-SVD based robust and secure approach for telemedi-
cine applications. Multimed Tools Appl 76:3669–3697. https://
doi.org/10.1007/s11042-016-3928-7
13