Transform Based Efficient and Robust Watermarking Technique for Medical Images Using Differential Evolution

Venugopal Reddy*, P. Siddaiah**
* Professor, Department of Electronics and Communication Engineering, Nalanda Institute of Engineering and Technology, Guntur, A.P, India.
** Professor and Dean, Department of Electronics and Communication Engineering, University College of Engineering and Technology, Acharya Nagarjuna University, Guntur, A.P, India.
Periodicity:July - September'2015


In this research work, a transform based medical image watermarking algorithm is used. Differential Evolution (DE) optimization technique is proposed to ensure that the watermark maintains its structural integrity along with robustness and imperceptibility. Differential Evolution (DE) optimization is employed to optimize the objective function to choose a correct type of wavelet and scaling factor. The water marking is proposed to be implemented using Discrete Wavelet Transforms (DWT), Lifted Wavelet Transform (LWT) and Singular Value Decomposition (SVD) techniques. The encryption is done using RSA and AES encryption algorithms. A Graphical User Interface (GUI) which enables the user to have ease of operation in loading the image, watermark it, encrypt it, and also retrieve the original image whenever necessary is also designed and presented in this paper. The robustness and the integrity of the watermark are tested by measuring different performance parameters and subjecting it to various attacks.


Medical Image, DWT, LWT, SVD, DE, GUI, RSA, AES.

How to Cite this Article?

Reddy, V., and Siddaiah, P. (2015). Transform Based Efficient and Robust Watermarking Technique for Medical Images Using Differential Evolution. i-manager’s Journal on Image Processing, 2(3), 1-13.


[1]. Deepthi Anand., U. C. Niranjan (1998). “Watermarking Medical Images with Patient Information”, Int. Conf. of IEEE Engineering in Medicine and Biology, Vol. 20, No. 2, pp. 703 – 706.
[2]. G. Coatrieux, L. Lecornu, B. Sankur, Ch. Roux ( 2006). “A Review of Image Watermarking Applications in Healthcare”, Proceedings of the 28th IEEE, pp. 4691- 4694.
[3]. C. S. Lu and H. Y. M. Liao (2001). “Multipurpose Watermarking For Image Authentication and Protection”, IEEE Trans. Image Processing, Vol. 10, No. 10, pp.1579- 1592.
[4]. G. Coatrieux, C. Le Guillou, J.M. Cauvin and C. Roux. (2009). “Reversible Watermarking For Knowledge Digest Embedding and Reliability Control In Medical Images”, IEEE Transactions on Information Technology, Vol. 13, No. 2, pp. 158-165.
[5]. JansiMohamadZain,(2010). “Strict Authentication Watermarking with JPEG Compression For Medical Images”, European Journal of Scientific Research, Vol. 42, No. 2, pp. 232-241.
[6]. C. D. Schou, J. Frost, W. V. (2004). Maconachy, "Information Assurance in Biomedical Informatics Systems", IEEE Engineering in Medicine and Biology Magazine, Vol. 23, No.1, pp. 110–118.
[7]. Pal, K., G. Ghosh and M. Bhattacharya. (2012). “Biomedical Image Watermarking in Wavelet Domain for Data Integrity Using Bit Majority Algorithm and Multiple Copies of Hidden Information”, American Journal of Biomedical Engineering, Vol.2, No.2, pp- 29-37.
[8]. X. Luo, Q. Chanag, J. Tun. (2003). "A Lossless Data Hiding Scheme for Medical Images in Application of ediagnosis", Proceedings of the 12th Annual International Conference of IEEE, EMBS, Cancum, Mexico, pp.17-21.
[9]. Y. Wang, J. F. Doherty and R. E. Van Dyck. (2000). “A Wavelet-Based Watermarking Algorithm for Ownership Verification of Digital Images”, IEEE Transactions on Image Processing, Vol.11, No. 2, pp.77-88.
[10]. C. C. Lai, C. C. Tsai, (2010). "Digital image watermarking using discrete wavelet transform and singular value decomposition", IEEE Trans . Instrumentation and Measurement, Vol. 59, No. 11, pp. 3060-3067.
[11]. M. Jiansheng, L. Sukang, and Tan Xiaomei, (2009). “A digital watermarking algorithm based on DCT and DWT”, Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA '09), Nanchang, PR China, pp. 104–107.
[12]. Li, Qiang, Chun Yuan, and Yu-ZhuoZhong., (2007). "Adaptive DWT-SVD domain image watermarking using human visual model", Advanced Communication Technology, The 9th International Conference, Vol. 3. IEEE.
[13]. W. Sweldens, (1995). "The Lifting Scheme: A New Philosophy in Biorthogonal Wavelet Constructions", Proceedings of SPIE, pp.68-79.
[14]. Daubechies and W. Sweldens, (1998). "Factoring Wavelet Transfroms into Lifting Schemes," The Journal of Fourier Analysis and Applications, Vol. 4, pp. 247-269.
[15]. N. Venkatram, L.S.S.Reddy, P.V.V.Kishore, (2014). ” Blind Medical Image Watermarking with LWT – SVD for Telemedicine Applications”, Wseas Transactions On Signal Processing, Vol.10, pp-288-300.
[16]. R.-S. Run, S.-J. Horng, J.-L. Lai, T.-W. Kao, R.-J. Chen, (2012). "An improved SVD-based watermarking technique for copyright protection", Expert Systems with Applications 39, pp. 673-689.
[17]. A. A. Mohammad, A. Alhaj, S. Shaltaf, (2008). "An improved SVD-based watermarking scheme for protecting rightful ownership", Signal Processing, Vol. 88, No. 9, pp. 2158-2180.
[18]. Liu, T. Tan, (2002). "An SVD-based watermarking scheme for protecting rightful ownership", IEEE Trans. Multimedia, Vol. 4, No. 1, pp. 121-128.
[19]. D. V. S. Chandra, (2002). "Digital Image Watermarking Using Singular Value Decomposition", Proceedings of 45th IEEE Midwest Symposium on Circuits and Systems, Tulsa, OK, pp. 264-267.
[20]. Yavuz, Erkan, and ZiyaTelatar. (2007). "Improved SVD-DWT based digital image watermarking against watermark ambiguity”, Proceedings of the 2007 ACM symposium on Applied computing, ACM.
[21]. E. Thambiraja, G. Ramesh, and R. Umarani, (2012). A survey on various most common encryption techniques, Int J Adv Res ComputSci Software Eng, Vol. 2, pp. 226–233.
[22]. R. L. Rivest, A. Shamir and L. Adleman, (1978). “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Vol. 21, No. 2, pp. 120-126.
[23]. Xin Zhou, Xiaofei Tang, (2011). “Research and Implementation of RSA Algorithm for Encryption and Decryption”, 6th International Forum on Strategic Technology, IEEE, pp.1118 – 1121.
[24]. PKCS #1 v2.2: RSA Cryptography Standard RSA Laboratories October 27, 2012.
[25]. Advanced Encryption Standard (AES), (2001). Federal Information Processing Standards Publication 197, November 26, 2001.
[26]. W. Puech, J.M. Rodrigues, (2004). “A new crypto watermarking method for medical images safe transfer”, Proceedings of the 12th European signal processing conference, Vienna, Austria, pp. 1481–1484.
[27]. V. Aslantas, (2009). "An optimal robust digital image watermarking based on SVD using differential evolution algorithm", Optics Communications 282, pp.769-777.
[28]. R. Storn, K. Price, (1997). "Differential evolution- A simple and efficient heuristic for global optimization over continuous spaces", J.of Global Optimization, Vol. 11, No. 4, pp.341-359.
[29]. V. Aslantas, L. A. Dog & abreve;n and S. Ozturk (2008). "DWT-SVD based image watermarking using particle swarm optimizer", Proc. IEEE Int. Conf. Multimedia Expo, pp.241 -244 .
[30]. SivavenkateswaraRao . V., Rajendra S. Shekhawat, V. K. Srivastava, (2012). “A DWT-DCT-SVD Based Digital Image Watermarking Scheme Using Particle Swarm Optimization”, IEEE Students' Conference on Electrical, Electronics and Computer Science.
[31]. Ganic E, Zubair N, Eskicioglu AM. (2003). “An optimum watermarking scheme based on singular value decomposition”, International Conference on Communication Network and Information Security, Uniondale, Ny, pp.85-90.
[32]. J. Kennedy and R. C. Eberhart (1995). "Particle Swarm Optimization", Proceedings of IEEE International Conference on Neural Networks, pp.1942 -8.
[33]. Matlab R 2012 - A Wavelet Tool Box Reference Manual.
[34]. Matlab R 2012 - An Optimization Tool Box Reference Manual.

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

If you have access to this article please login to view the article or kindly login to purchase the article
Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.