Analysis of healthcare data security with DWT-HD-SVD based-algorithm invisible watermarking against multi-size watermarks

In the modern day, multimedia and digital resources play a crucial role in demystifying complex topics and improving communication. Additionally, images, videos, and documents speed data administration, fostering both individual and organizational efficiency. Healthcare providers use tools like X-rays, MRIs, and CT scans to improve diagnostic and therapeutic capacities, highlighting the importance of these tools in contemporary communication, data processing, and healthcare. Protecting medical data becomes essential for maintaining patient confidentiality and service dependability in a time when digital assets are crucial to the healthcare industry. In order to overcome this issue, this study analyses the DWT-HD-SVD algorithm-based invisible watermarking in medical data. The main goal is to verify medical data by looking at a DWT-based hybrid technique used on X-ray images with various watermark sizes (256*256, 128*128, 64*64). The algorithm’s imperceptibility and robustness are examined using metrics like Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM) and are analyzed using Normalized Connection (NC), Bit Error Rate (BER), and Bit Error Rate (BCR) in order to evaluate its resistance to various attacks. The results show that the method works better with smaller watermark sizes than it does with larger ones.

www.nature.com/scientificreports/origin, ownership, or usage rights.These watermarks are invisible to the human eye but may be identified and extracted using specialised software to verify digital content's validity and ownership.From preventing cash counterfeiting to protecting digital creative works, digital watermarking has had a fascinating history.This technology is driven by computer science, cryptography, and signal processing advances.Each step has made digital watermarks more robust and versatile, adapting to different media types and solving a growing number of problems.This research study examines digital watermarks' methods, applications, problems, and potential future.
By analysing this technology, we want to show how digital watermarks improve data security, copyright protection, and digital media.We want to help artists, researchers, and industries achieve safe and trustworthy digital interactions by deepening our understanding of its history, methods, and ramifications.Digital watermarks are essential for improving data integrity, patient privacy, and research credibility in the field of medical imaging, where accuracy is of the utmost importance.Digital watermarks protect medical images from manipulation and unauthorised changes by incorporating barely noticeable markers inside them.By securely inserting encrypted IDs, this technology not only prevents data intrusions but also protects patient confidentiality.Digital watermarks make traceability easier in longitudinal studies, upholding the validity of study findings.They also make it possible for healthcare professionals to collaborate and share protected images, which is essential for remote consultations and interdisciplinary conversations.Digital watermarks, which are compliant with regulatory requirements, serve as a crucial instrument to support confidence and accountability in medical imaging, ultimately supporting the basis of precise diagnoses and efficient treatments.
This research focuses on a detailed quantitative assessment of important measures that evaluate the security of healthcare data.This paper includes five cover images, each of size 512 × 512 pixels, as illustrated in Fig. 1. 3 different sizes of watermark are used, as shown in Fig. 3.The Figs. 4, 5, 6, 7, 8 displays the entire quantitative analysis conducted on all cover photos with different watermark sizes.The methodology utilizes the DWT-HD-SVD strategy for all watermarking.This technique is specifically selected for its effectiveness in guaranteeing both resilience and invisibility in healthcare data applications.The succeeding sections elaborate on the intricate quantitative results, offering a detailed comprehension of the algorithm's performance.In addition, to emphasize the algorithm's effectiveness in various situations, the research includes a total of 12 different attacks.This comprehensive analysis aims to emphasize the algorithm's robustness and imperceptibility in real-world situations when healthcare data security encounters any breach.This study provides a thorough quantitative analysis of both robustness and imperceptibility, utilizing the DWT-HD-SVD method.The results, along with a thorough analysis and examination of different attacks, enhance algorithm's effectiveness in safeguarding healthcare data in current digital era.

Related work
Invisible watermarking is crucial in today's medical world 12 .Critical medical data, including patient records and photographs, are protected against tampering in order to maintain confidence.It protects patient privacy and improves data security by incorporating authentication and access information.This technology is essential for reliable medical imaging, the validity of clinical research, and the fight against fake medications.Additionally, it is essential for telemedicine 13 , HIPAA compliance, and monitoring data flow within healthcare organizations.Invisible watermarking continues to be a crucial tool for secure and reliable data management in the medical industry as healthcare relies more and more on digital solutions.Transformations 14,15 are used to embed watermark depending on the type of media and the specific requirements of the application.Frequency domain and time domain approaches can be used to transform data 16 .Data can be hidden within frequency coefficients or sub-bands using frequency domain transformations, such as the Discrete Cosine Transform (DCT) and the Discrete Wavelet Transform (DWT) 17 , which are frequently used for image and audio watermarking.The watermark information is dispersed across the time domain of the signal using time domain transformations 18,19 , such as Spread Spectrum Techniques and the Discrete Fourier Transform (DFT) for audio.Spatial and temporal approaches are combined in video watermarking, and some techniques even adjust to the type of content.The application's specific aims, whether copyright protection, content authentication, or data concealing, should be carefully considered when selecting the transformation method.These factors include watermark robustness, imperceptibility, and robustness.The selection of the best transformation and embedding techniques may be influenced by various media applications' priorities on certain characteristics. 20

Watermarking scheme
To conduct the analysis of the DWT-HD-SVD-based experiment, we utilized five input images 27 shown in Fig. 1, all of which were grayscale lung images showing COVID infection.The experiment involved the different sizes of black and white watermarks, as depicted in Fig. 3.This watermark was employed in three sizes: 256x256, 128x128, and 64x64 pixels.Subsequently, all the input images were watermarked using each of these three watermark sizes.The analysis was carried out by assessing various parameters, including PSNR (Peak Signal-to-Noise Ratio), NC (Normalized Correlation), BER (Bit Error Rate), SSIM (Structural Similarity Index), and BCR (Bit Correct Rate).These parameters' mathematical expressions and descriptions are provided in Table 1.These metrics were evaluated under two conditions: without any attack and with additional attacks, as described in Table 2.The subsequent sections present a detailed analysis.

Proposed methodology
In this experiment, 5 input images are considered taken from data base 27 .All of these input images are applied algorithm DWT-HD-SVD 28 .The algorithm is shown in Fig. 2.This algorithm is implemented using Matlab R2021a and the results are produced using MS office 365.The images taken were 512*512 input images and each image is watermarked with three different size of black and white watermarks shown in Fig. 3.The algorithm used is explained Table 3 and pseudocode 29 is defined in Table 4. DWT is used as a mathematical methodology employed to partition an image into numerous scales or levels.This process enables the extraction of pertinent insights into the image's intricate features and structures across varying resolutions.This technique enables effective image compression, denoising, and analysis by capturing both high-frequency and low-frequency components of the image.The application of Hessenberg decomposition following the DWT on images results Table 1.Description and mathematical expressions of metrics.

BER
The ratio of erroneous bits to the total number of bits in the image BER = Number of Bit Errors Total Bits in the Image

SSIM
Taking luminance, contrast, and structure into account, the SSIM (Structural Similarity Index) calculates the structural similarity between two images (I and K) Where: µI and µK are the average pixel values of images I and K σ2 I and σK2 are the variances of images I and K σIK is the covariance between images I and K C1 and C2 are constants to stabilize the division

BCR
The ratio of correctly transmitted bits to the total number of bits BCR =

Results and discussion
This section presents an analysis of five lung images affected by COVID-19, which are used as cover images shown in Fig. 1.These images are subjected to watermarking with three different sizes, as outlined in Fig. 3.The analysis aims to assess the watermarking process's robustness by evaluating metrics like PSNR, SSIM.Additionally, imperceptibility is examined through metrics such as NC, BER, BCR.The watermarking algorithm employed is a hybrid approach based on DWT-HD-SVD, previously introduced in a research paper 28 .Subsequently, the extraction process is detailed, and the algorithm's workflow is depicted in Fig. 2. To evaluate each metric, all attacks discussed in Table 2 are practised.The following section presents a comparative analysis of these performance metrics.

Robustness and imperceptibility
The term "robustness" pertains to the capacity of an image watermarking or processing approach to endure diverse challenges or attacks while retaining the encoded information.Consider a scenario where a picture has been embedded with significant data through watermarking and subsequently undergoes compression, noise interference, or other modifications.A resilient watermarking system guarantees the preservation and recoverability of the watermark, even in the face of various obstacles.The act of fortifying one's information with a robust shield serves to safeguard it against potential attacks.The importance of robustness cannot be

Pseudocode
Step 1. Load or create images Step 2. Display cover_image and watermark_logo Step 3. Set method to 'DWT-HD-SVD' Step 4. Set alpha = 0.08 Step 5. Define attacks = ['No Attack' , 'Gaussian low-pass filter' , …] Step 6. Define params = [0, 3, 3, 0.001, …] Step 7.For each attack in attacks Step 8. Get param for the current attack Step 9. Apply watermarking, calculate NC, PSNR, SSIM, BER, and BCR Step 10.End For overstated in applications such as data authentication and tamper detection.It is imperative to guarantee the integrity of embedded information, irrespective of external influences.In contrast, imperceptibility pertains to the preservation of the visual integrity and attractiveness of a picture.Consider the following scenario: you have applied a watermark or made certain modifications to an image, and you desire to ensure that these alterations are not overtly conspicuous to observers.The concept of imperceptibility is relevant in this context as it guarantees that these alterations are sufficiently subtle to evade detection by the human visual system.The act of effortlessly integrating a concealed message within a painting while preserving its inherent aesthetic appeal might be likened to an artistic endeavour.The attribute of imperceptibility holds significant importance in situations where the preservation of visual aesthetics and user experience is paramount, as observed in domains like art, photography, and medical imaging.The following metrics are frequently utilized: 1.The Normalized Connection (NC) Metric: The NC metric quantifies the degree of linear connection existing between the original image and the watermarked image.A rating in proximity to 1 signifies a significant level of resemblance and indistinguishably.

The Structural Similarity Index (SSIM):
The SSIM is a metric used to assess the degree of structural similarity between two images, specifically the original image and the watermarked image.SSIM considers various factors such as luminance, contrast, and structure in its evaluation.A rating in proximity to 1 indicates a heightened level of imperceptibility.

The Peak Signal-to-Noise Ratio (PSNR):
The PSNR is a metric used to quantify the relationship between the highest signal level and the noise level that arises because of the watermarking procedure.Greater PSNR readings are indicative of enhanced imperceptibility.

The Bit Error Rate (BER):
The BER is a metric used to measure the number of bits that have been communicated or modified wrongly in the watermarked image in comparison to the original image.Lower bit error rate (BER) values are indicative of increased imperceptibility.

The Bit Change Rate (BCR):
The BCR is a metric used to quantify the rate at which bits inside a watermarked image have been modified in relation to the original image.A reduced bit conversion rate (BCR) is indicative of enhanced imperceptibility.
In the following section, results are discussed.

Comparison of Normalized Correlation
In this section, the results of the Normalized Correlation (NC) evaluation will be presented.These evaluations were conducted on cover images shown in Fig. 1 that underwent watermarking using three different sizes of watermarks shown in Fig. 3.The NC metric plays a crucial role in assessing the imperceptibility and robustness of the watermark against several potential attacks.This paper provides a thorough analysis of the resilience of watermarked photos against various attacks mentioned in Table 2, while also examining their ability to preserve a strong association with the original content.The findings will be succinctly presented in Fig. 4, presenting the values as well as a graphical presentation.The results shown in Fig. 4 clearly demonstrate the algorithm's remarkable imperceptibility, as indicated by the graphs.In all the attack scenarios, the Normalized Correlation (NC) values continuously reach or close to the desired threshold of 1, indicating a significant level of imperceptibility.This level of imperceptibility is highly desirable in these circumstances.It is important to acknowledge, however, that there is an opportunity for www.nature.com/scientificreports/enhancement, specifically in addressing the unfavourable outcomes discovered in the context of the Histogram Equalization attack.Results can be stated as follows: Results can be stated as follows: • ∀Attacks ∈ {Table 3} : NC ≈ 1 • ∃Attack : Attack = Histogram equalizations.t.NC is not close to 1

Comparison of PSNR
This section will explore the results obtained from Peak Signal-to-Noise Ratio (PSNR) assessments.The evaluations were conducted on the cover photos, as depicted in Fig. 1, after applying three different watermark sizes, as described in Table 2.The Peak Signal-to-Noise Ratio (PSNR) is a crucial statistic utilized in the field of image processing.It plays a significant role in evaluating the quality of watermarked images, specifically in terms of their accuracy to the original content.This study undertakes a thorough analysis of the resilience of watermarked photos against several types of attacks, as outlined in Table 1.Additionally, it evaluates their ability to maintain a high degree of similarity with the original source material.The results will be concisely displayed in Fig. 5, which will not only exhibit the numerical values but also offer a graphical depiction of the outcomes, providing a comprehensive perspective of the PSNR evaluations.Upon conducting an analysis of the outcomes obtained from the five input photos, it becomes apparent that there is a consistent upward trend in the PSNR (Peak Signal-to-Noise Ratio) value as the dimensions of the watermark decrease.This phenomenon remains consistent across different types of attacks, although it is important to note that histogram equalization stands out as a prominent exception.The general mathematical representation is as follows:

Comparison of SSIM
In this section, we shift our focus towards the examination of outcomes pertaining to the Structural Similarity Index (SSIM) study.The evaluations were conducted on the cover images, as shown in Fig. 1, after applying three different watermark sizes as described in Fig. 3.The Structural Similarity Index (SSIM), a fundamental metric for assessing picture quality, plays a significant role in measuring the similarity between watermarked images and their original content.This study conducts a thorough evaluation to determine the resilience of watermarked images against several potential attacks, as outlined in a comprehensive manner in Table 1.Furthermore, we examine their capacity to maintain a robust connection with the primary content.The results will be given in a Fig. 6, which will effectively encapsulate both numerical values and a graphical depiction of the Structural Similarity Index Measure (SSIM) evaluations.This will provide a full summary of the findings.
Upon conducting an analysis of the outcomes obtained from the five input photos, it becomes apparent that there is a consistent effect on SSIM value as the dimensions of the watermark decrease.This phenomenon remains consistent across different types of attacks, although it is important to note that Gaussian noise, Speckle noise, and histogram equalization stand out as exceptions.The general mathematical representation is as follows:

Comparison of BCR
This section will now direct our attention towards the analysis of Bit Change Rate (BCR) findings.The evaluations were conducted on the cover photos, as depicted in Fig. 1, following the implementation of three different watermark sizes, as specified in Fig. 3.The Bit Correct Rate (BCR), a crucial parameter in the analysis of watermarking techniques, plays a significant role in assessing the degree to which watermarked images have been modified in relation to the original content.This study does a comprehensive assessment to measure the resilience of watermarked photos against different types of attacks, as outlined in Table 1, with careful precision.In addition, we investigate their ability to reduce modifications and maintain the authenticity of the original content.The findings of these evaluations will be concisely displayed in a Fig. 7, which will include both numerical values and a graphical representation of the BCR outcomes.This figure will offer a thorough depiction of the influence of the watermarking procedure on image alteration.
After conducting an examination of the results acquired from the five input images, it becomes seen that there is a consistent value close to 1 on BCR value.This effect becomes more pronounced as the dimensions of  the watermark become smaller.This phenomenon is present across a wide variety of attacks; nonetheless, it is essential to point out that histogram equalization stands out as an exception to the rule.
The general mathematical representation can be written like this:

Comparison of BER
In this part, our focus shifts towards the analysis of Bit Error Rate (BER) outcomes.The evaluations were performed on the cover photos, as illustrated in Fig. 1, after applying three different watermark sizes described in Fig. 3.The Bit Error Rate (BER), a fundamental measure in the evaluation of watermarking techniques, serves a critical function in evaluating the fidelity of watermarked images in preserving the embedded data relative to the original content.This study thoroughly examines the efficacy of watermarked photos in withstanding a range of potential attacks, as outlined in Table 1.Furthermore, we thoroughly examine their capacity to reduce flaws and guarantee the accurate portrayal of the original content.The results will be concisely displayed in Fig. 8, which will include both numerical data and a graphical depiction of the Bit Error Rate (BER) assessments.This figure will provide a full overview of the watermarking process's effectiveness in maintaining the accuracy of the preserved information.
After conducting an examination of the results acquired from the five input images, it becomes clear that there is a consistent value close to 0 on the BER value.This effect becomes more pronounced as the dimensions of the watermark become smaller.This phenomenon is present across a wide variety of attacks; nonetheless, it is essential to point out that histogram equalization stands out as a prominent exception to the rule.The general mathematical representation can be written like this:

Conclusion
Watermarking has long been a tried-and-true method in the realm of data security.In our current digital era, data exchange has witnessed exponential growth year by year across all fields.The medical domain, in particular, is of paramount importance, where various reports are often in image formats.The preservation of the integrity of such data is vital due to its susceptibility to unauthorized alterations and unethical misuse.Over the years, numerous watermarking algorithms have emerged to address this challenge.Evaluating each algorithm's imperceptibility and robustness is crucial.This paper comprehensively analyses DWT-HD SVD-based watermarking algorithms applied to medical images.Our analysis clearly identifies vulnerabilities that require attention and further refinement.Each algorithm is mathematically examined in detail within its respective section.

Peak
Signal-to-Noise Ratio, or SNR, compare the mean squared error (MSE) between an original image (I) and a watermarked image (K) to determine the highest pixel value that can be obtained (often 255 for an 8-bit image) in order to determine the quality of the image PSNR = 10 • log 10 255 2 MSE NC By calculating and normalizing the cross-correlation of two images (I and K), NC (Normalized Correlation) calculates how similar the two images are NC = (I(x)•K(x))

Figure 4 .
Figure 4. NC values are represented against each attack, values are also shown against all the mentioned attacks and no attack where (a) Image 1, (b) Image 2, (c) Image 3, (d) Image 4, (e) Image 5

Figure 5 .
Figure 5. PSNR values are represented against each attack, values are also shown against all the mentioned attacks and no attack where (a) Image 1, (b) Image 2, (c) Image 3, (d) Image 4, (e) Image 5.

Figure 6 .
Figure 6.SSIM values are represented against each attack, values are also shown against all the mentioned attacks and no attack where (a) Image 1, (b) Image 2, (c) Image 3, (d) Image 4, (e) Image 5.

Figure 7 .
Figure 7. BCR values are represented against each attack, values are also shown against all the mentioned attacks and no attack where a(a) Image 1, (b) Image 2, (c) Image 3, (d) Image 4, (e) Image 5.

Figure 8 .
Figure 8. BER values are represented against each attack, values are also shown against all the mentioned attacks and no attack where (a) Image 1, (b) Image 2, (c) Image 3, (d) Image 4, (e) Image 5.

Table 2 .
Description and types of attacks.Average filterThe average filter attack smooths a watermarked image by averaging neighbourhood pixel values, which might damage its quality or make it less perceptibleGaussian low-pass filtersGaussian low-pass filters convolve images with Gaussian kernels.This method smooths the image and reduces noise and fine-grained characteristics.It is called "low-pass" because it passes low-frequency components like smooth gradients and huge structures while attenuating high-frequency components like sharp edges and noiseGaussian noisePixel values vary randomly according to a Gaussian (normal) distribution in Gaussian noise.It causes random brightness and colour changes in images and degrades quality.Gaussian noise can affect a watermarked image in numerous ways, such as noise interference, reduced visibility, and quality degradation Number of Correctly Transmitted Bits Total Number of Bits in the Image Vol:.(1234567890) Scientific Reports | (2024) 14:10769 | https://doi.org/10.1038/s41598-024-61479-4www.nature.com/scientificreports/Salt and pepper attacks add random bright and dark pixels or noise to watermarked photos.Greyscale "salt" pixels have 255 intensity values, while "pepper" pixels have 0. The attack distorts images, making watermark identification and extraction difficult.Salt and pepper noise can blur details, degrade image quality, and disguise watermarks.Watermarking methods are resistant to image degradation, including salt and pepper noise, for accurate recognition and extraction Sharpening attack While a sharpening assault on a watermarked image brings out more details, it also increases visual artifacts and has the potential to alter the watermark Speckle noise Adding random, grainy pixels or noise to an image is known as a "speckle noise attack, " and it can be used to obfuscate watermarks and lower image quality

Table 3 .
Algorithm for embedding and attacking watermarks.