Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images

The widespread distribution of medical images in smart healthcare systems will cause privacy concerns. The unauthorized sharing of decrypted medical images remains uncontrollable, though image encryption can discourage privacy disclosure. This research proposes a double-level security scheme for med...

Full description

Saved in:
Bibliographic Details
Main Authors: Conghuan Ye, Shenglong Tan, Jun Wang, Li Shi, Qiankun Zuo, Bing Xiong
Format: Article
Language:English
Published: MDPI AG 2025-01-01
Series:Mathematics
Subjects:
Online Access:https://www.mdpi.com/2227-7390/13/2/182
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The widespread distribution of medical images in smart healthcare systems will cause privacy concerns. The unauthorized sharing of decrypted medical images remains uncontrollable, though image encryption can discourage privacy disclosure. This research proposes a double-level security scheme for medical images to overcome this problem. The proposed joint encryption and watermarking scheme is based on singular-value decomposition (SVD) and chaotic maps. First, three different random sequences are used to encrypt the LL subband in the discrete wavelet transform (DWT) domain; then, HL and LH sub-bands are embedded with watermark information; in the end, we obtain the watermarked and encrypted image with the inverse DWT (IDWT) transform. In this study, SVD is used for watermarking and encryption in the DWT domain. The main originality is that decryption and watermark extraction can be performed separately. Experimental results demonstrate the superiority of the proposed method in key spaces (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>10</mn><mn>225</mn></msup></semantics></math></inline-formula>), PSNR (76.2543), and UACI (0.3329). In this implementation, the following key achievements are attained. First, our scheme can meet requests of different security levels. Second, encryption and watermarking can be performed separately. Third, the watermark can be detected in the encrypted domain. Thus, experiment results and security analysis demonstrate the effectiveness of the proposed scheme.
ISSN:2227-7390