• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System

    2023-01-22 08:59:42SaimaKanwalFengTaoAhmadAlmogrenAteeqUrRehmanRizwanTajandAymanRadwan

    Saima Kanwal,Feng Tao,★,Ahmad Almogren,Ateeq Ur Rehman,Rizwan Taj and Ayman Radwan

    1School of Computer and Communication,Lanzhou University of Technology,Lanzhou,730050,China

    2Department of Computer Science,College of Computer and Information Sciences,King Saud University,Riyadh,11633,Saudi Arabia

    3Department of Electrical Engineering,Government College University,Lahore,54000,Pakistan

    4Instituto de Telecomunica??es and Universidade de Aveiro,Aveiro,3810-193,Portugal

    ABSTRACT The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection.A trade-offbetween robustness,imperceptibility,and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability.Keeping this purpose insight,an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern.A key is generated by a random path with minimum bit flipping is selected in the 4×4 block to gain access to the data embedding patterns.The random path’s complex structure ensures data security.Data of various sizes (8 KB,16 KB, 32 KB) are used to analyze image imperceptibility and evaluate quality factors.The proposed reversible watermarking methodology performance is tested under standard structures PSNR,SSIM,and MSE.The results revealed that the MRI watermarked images are imperceptible,like the cover image when LSB is 3 bits plane.Our proposed reversible watermarking methodology outperforms other related techniques in terms of average PSNR(49.29).Experiment results show that the suggested reversible watermarking method improves data embedding capacity and imperceptibility compared to existing state-of-the-art approaches.

    KEYWORDS Medical images security;data hiding;LSB matching;hiding capacity;imperceptibility

    1 Introduction

    Over the decades, the exponential growth of the internet, digital communication expanded the capacity of internet multimedia networks with the processing of a massive volume of videos and images [1].Many developments in the computing environment have threatened copyright security and material integrity, including hardware, software, and communication systems.In recent years,in the biomedical system, many changes and advancements have occurred regarding digital images of medical data, and it has become a significant field [2].Besides the fast speed and highly efficient digital communication, security risks must be resolved in Internet Apps, e.g., military images are associated with the security of the entire country.Information security of digital communication affects everyone’s peace of mind.Researchers have developed different techniques in digital image processing to authenticate the image information and identify image manipulation accurately and robustly.Medical images contain sensitive information about the patients, so security and privacy protections of the medical images become crucial while sending those images through the internet[3].Due to the rapid growth in the electronic health industry,remote health monitoring of the patients has become possible using sensors,resulting in better patient care[4].To ensure the privacy and security of information on the internet and avoid data leakage,data hiding technology(i.e.,embedding data)has emerged.Steganography and watermarking are the two major types of data hiding methodologies.Steganography is generally used for secret communication so that the confidential data concealed in the cover object would not catch the public’s attention.Steganography typically introduces a“peer-topeer”secret communication.The content of the hidden message is only accessible to the sender and recipient, and the recipient can accurately extract the secret message.Digital watermarking is used to ensure that digital media such as documents and videos are authentic and copyright protected by embedding secret data in them.It is significant to mention that watermarking has numerous resemblances to steganography in terms of embedding data.The purpose of watermarking is to make it extremely difficult to extract hidden information to avoid the unauthorized copying of the data.Digital watermarking technology is divided into two categories:frequency domain and spatial domain[5].The watermarking approach is implemented on the image’s coefficient values in the frequency domain.There are three main types of spatial domain images in digital image processing:one is binary, the other is grayscale,and the third is colour images.In binary images,there are only two possible values for each pixel,and it is most commonly used in black and white,but it can also be used for any two colours.Greyscales images only contain the intensity data using a single sample value for each pixel.It is usually called black and white,and these images contain the different shades of grey(0 to 255),in which the black color is at 0, and it represents the weak intensity, while the white color is at 255,and it represents the vigorous-intensity whereas color images consist of three primary sets of colors red,green and blue ranging color from 0–255[6].However,in the spatial domain watermarking,the modification of cover image pixel with watermark image is applied.An ideal watermarking algorithm focuses solely on high visibility of source image,minimum complexity,data security,imperceptibility,and high embedding capacity.However, it is challenging to provide a data hiding approach that contains these characteristics simultaneously in most situations.In recent decades, researchers have progressed on data hiding algorithms that need low or medium computational capacity with adequate visual quality at a higher embedding capacity.In steganography,two main embedding techniques are used, one is the PVD (Pixel Value Difference), and the other one is LSB (Least Significant Bit) [7].PVD technique has much better performance as compared to LSB because it provides stego images with high quality and hidden data with a high capacity [8].Implementation ofthe PVD scheme as a new paradigm, spatial domain algorithms are being used, through which the iris implicit images data would be, inserted instantly into the cover pixel images [9].The least significant bits (LSB[10–13], Exploiting Modification Direction (EMD) [14–16], and Pixel Value Difference (PVD) [17–21]are some of the most popular algorithms of watermarking in the spatial domain.Some researchers have combined two methodologies PVD,EMD with LSB substitutions,to obtain efficient results in data security,embedding capacity,and excellent visual quality[16,22–27].The secret bits are encoded pairwise and then embedded in the cover LSB bits with very little changes to the reference image[28].Wu et al.[29] proposed a methodology known as PDBD for low distortion in PVD and base decomposition.In the context of a pixel pair, the difference between pixels is determined first, and the corresponding degree is measured.Then certain bits of information are transformed by the base pair of the degree into two adjacent coefficients.Further, the pixel pair is formed by embedding coefficients.Traditionally,algorithms were commonly identified,and strategies in which information was directly encoded in the LSB planes of the host image were implemented.An acceptable extent of security and in contexts of data encoding, many of these algorithms have done reasonably well.Besides that, with the ever-growing computing capability of digital technologies, most strategies are noticed to be compromised.With this in perspective,algorithms for hiding data based on keys emerged into the field of research, and researchers also explored these using conventional digital signature attacks.In [30], the Hilbert curve methodology produces data embedding structures and a logistic map to encode a message signal to improve security with a high payload and better image quality.Some studies show higher security schemes were also implemented using the similarities of the pixel neighbourhood,redundancy,inherent features in the image,etc.[31–36].Chaotic system-based various schemes have provided enhanced security performance.Such systems focus on secret keys generated by the chaotic map parameters[37,38].The security of the data hiding algorithm relies greatly on the scale and accuracy of the secret keys used in the process.The histogram of watermarked images is well known to publicize the presence of hidden information,and this is especially true for algorithms that have a high data encoding capability.At the same point, imperceptibility is important for information security.Therefore,algorithms should also focus on significantly reducing the impact of encoding on histograms.We have proposed an efficient reversible watermarking system with improved patient records security and a high level of imperceptibility.An embedding pattern is implemented by generating the key using random paths in the pixel block to obtain maximum security.The patient record information is embedded in the cover image up to 3 bits plane without any indication of secret information for a third party.

    The following are our main contributions:

    · Implementation of the unique random path in blocks and rotation of pixels.

    · Different math operations have been implemented for data embedding up to 3 bits plane LSB.

    · Strategy for optimization to reduce bit flipping.

    · An approach is implemented with impactful improvements in terms of maximum payload capacity and imperceptibility.

    · Detailed evaluation and comparison with other similar state-of-the-art methodologies.

    The Breakdown structure of the paper is as follows:Section 2 represents different state-of-theart reversible algorithms.Section 3 delves into the proposed methodology in detail with embedding and extracting watermark steps.The experimental results of the study and discussion are found in Section 4.Finally,Section 5 presents the conclusion and future work.

    2 Preliminaries

    Different studies have used image steganography methodologies to conceal confidential information,the images’visual quality,and data embedding capacity.Gndu et al.[39–42]explained the reverse connection between MSE and PSNR.They depicted that higher values of PSNR represent the highquality image(better),and the PVD method stores a greater number of bits for the message than the LSB method.They showed a better quality result of LSB images after embedding as compared to PVD.However, the PVD method can store a larger number of data bits without losing the image quality,while an LSB can store a large number of data bits but degrades the image quality.Mansor et al.[6]proposed the technique of 2D discrete wavelet transforms in two levels for embedding patients’data in a cover medium.For cover images,they used colour images and grayscale images.They employed conventional procedures to encrypt the textual data before embedding it in the cover medium.To validate the cover medium imperceptibility, they applied different algorithms and statistical tests.They achieved better statistical scores for hidden textual material than similar existing techniques and proposed various state-of-the-art image stenographic methodologies.Among them, the LSB modification of[31]is one of the most common methods to modify the lower order bits of the pixel values that will be unnoticeable,even with multiple steganalysis methods[43,44].Several LSB-based information hiding techniques provide high data encoding with an acceptable level of imperceptibility.Even so,it can be noticed that many other spatial domain steganalysis techniques lack this primary objective, as histograms can easily decipher the appearance of concealed data.In [45], the authors proposed the inter-block coefficient dependency method for embedding purposes.The difference in the coefficients is calculated employing adjacent discrete transform cosine (DCT) blocks with identical locations.However,this technique is particularly for JPEG medical images to conceal patient data.The methodology of reversible data hiding based on histogram shifting is used to embed data via histogram modification [46].The original image histogram’s peak and zero/minimum points are employed,where the peak point has the maximum number of grayscale pixels and the zero/minimum point has the minimum pixel value.Each pixel with a peak point value is used to convey a bit of a hidden message.The histogram shifting approach has low computational requirements, minimal distortion in the original image and a high PSNR ratio between the original and watermarked images.However,this technique limits hiding capacity by the histogram’s peak points.Sahu et al.[47]described the image steganography approach,in which they employed distinct pixels from various sub-blocks to improve the Peak Signal to Noise Ratio (PSNR) and Embedding Capacity (EC) of the image.This method was divided into two sections,the first was OPVD(Overlapped Pixel Value Difference),and the second was OPVDMF (Overlapped Pixel Value Differencing with Module Function).It brings significant improvement in resist,security,and RS analysis test.In[48],the author proposed a highquality and straightforward reversible watermarking approach focused on difference expansion and using redundancy of digital content to obtain reversibility.The pixel value difference between pairs of the host image is expended by two in this technique.The least significant bits embed hidden messages as the even number is calculated from the expanded difference.After the least significant bits, a watermark bit is embedded to obtain the watermarked image.The compressed location map and payload are concatenated with actual least significant bit values for identical image retrieval.High embedding capacity is achieved by this method; however, because a location map is required,not much of the capacity is used to embed data.Furthermore,this approach introduces unfavorable distortion.In[49],the authors implemented a Hamiltonian path to minimize distortion between LSB pixels and embedded data.LSB equivalent encoding method is changed specifically rather than blindly to improve image steganography.However,several visual objects in the stego-images can be identified in the suggested model.Their methodology is robust against the soft margin SVM based on the secondorder SPAM.In [50], the authors suggested a new approach that divides the cover image into nonoverlapping blocks.Hamilton’s path for each block first modifies the structure of the block’s pixels.Next,they evaluate the pixels whose LSB is not equivalent to the hidden data.The path that results in minimal distortion is selected, and both its binary code and the mismatched pixels are counted.The pixels that should be changed during data embedding and a binary key containing codes of the best Hamiltonian path in all blocks are calculated by repeating this procedure.Then,with reference to the compressed key,the latest value of the second LSB of the modifiable pixels is computed using writing on the wet paper method.Finally,the value computed for the second LSB±1 is applied to each changeable pixel[13].Siddiqui et al.[2]proposed steganography techniques to hide the secreted data in the image,the N-rightmost bit is replaced,and its main objective is Peak Signal to Noise Ratio(PSNR),which improves the quality of the image.The EC(Embedding Capacity)benefit from transmitting a considerable quantity of data between the sender and the receiver,avoiding the FOBP(Fall Boundary Problem), which enhance the security in salt, resist pepper noise, and RS attack.Sahu et al.[51]describes another work in which two approaches were used for RDH (Reversible Data Hiding).In the first approach,to achieve reversibility,they extend the matching of LSB(Least Significant Bit)in dual images.In the second approach for the secret data embedding,they used the four identical cover images,and then the secret data of cover images were embedded in two phases.In the first phase,the N-RMB (NRightmost Bit replacement) techniques were used, and in the second phase, the MPVD(Modified Pixel Value Differencing)technique they used in[52],1D adaptive Bernoulli map,ideal for encryption, is suggested for correlation coefficients.The revolutionary image encryption technique was implemented focused on the recent chaotic map.The permutation process was understood by creating a randomly Hamiltonian path implemented over different bit planes.Then,in the diffusion process (XOR procedures were conducted on pixels), the concept of the random Hamiltonian path was applied to substitute for grey levels.

    3 Proposed Methodology

    The desired methodology takes the cover image and patient record information as inputs and generates the watermarked image by implementing numerous operations at the pixel level.The patient record has all the details about the individual,the patient’s details,the disease under which the patient suffers, and the physician who diagnoses the disease.The fundamental concept of the scheme is to maximize the imperceptibility and robustness against different attacks of the cover image.A cover image of 512×512 is divided into non-overlapping disjoint square pixel blocks of the same size.The patient record information is embedded in the LSB planes of the pixel blocks by pursuing a sequence created by the random path.Fig.1 provides an example of three random paths with minimum bit flipping described in a 4×4 block.Once the random path has been chosen,the embedding procedure is carried out by considering four ideal sequence directions and pixel rotation(0°;90°;180°;270°),and the path with minimum bit flipping is selected for the patient record embedding.The random path selected for data embedding is implemented on all blocks.The workflow of the proposed algorithm is defined in Fig.2.

    Figure 1:(Continued)

    Figure 1:(a)An example of a 4×4 block(b)Random path in 4×4 block(c)LSB Sequence according to the random path (d) The distortion caused by matching every sequence to the data sample(1000011001011101)2 and the distinct pixels (e) The distortion caused by matching every sequence to the complement of the data sample and the distinct pixels

    3.1 Random Path Generation

    We describe an explanation of finding the ideal random path in 4 × 4 non-overlapping blocks.Every pixel in the block will be accessed once starting from the top-left pixel.In the case of the proposed 4×4 blocks,one can choose a random path from a set of 20 possible paths using the combinatorics approach in 1.

    Assume the patient data is (1000011001011101)2.As seen in example Fig.1, there are three different random paths in a 4×4 block.As shown in Fig.1c from left to right,a matrix of the pixel’s LSB is generated by tracing each path.The pixels in which LSBs do not match the respective hidden data bit or sample data complement are depicted in Figs.1d and 1e,respectively.The block distortion is counted by the amount of non-matching pixels,as shown in these figures.The path with the least distortion is identified as the ideal random path in this block.

    Figure 2:Proposed reversible watermarking system block diagram

    3.2 Effective Embedding Capacity

    Block size determines the effective embedding capacity;besides rotation bits data as explained in the embedding process,the number of bits required for embedding data is bl2-2 for the block size ofl.where

    The effective embedding capacity will be

    bdenotes the number of bitplanes used for embedding,andlrepresents the block size.Data embedding is done using the three least significant bit planes in the proposed methodology.As explained in the data embedding process,two bits b1b2 will be placed at the upper left side of the selected block least significant bit concerning each block rotation.In the case of 4×4 block size,the total number of pixels available in the block is 16,so the maximum number of embedding bits available is 16×3=48 as the last three bits are used for embedding,46 Effective Embedding bits are available,and.958 is effective embedding.

    3.3 Embedding Phase

    3.3.1 Cover Image Block

    The first phase in embedding the patient data is determining the number of bytes available for modification in the cover image.The embedding phase will begin If the number of cover image bytes available for embedding is higher than or equal to the number of patient records;otherwise,an error message will appear.The cover image Cimageof size 512×512 is divided into 4×4 non-overlapping blocks to minimize the complexity of the location map.

    3.3.2 Cover Image Pixel Sequence

    After splitting the cover image into blocks,the preceding steps are performed for each block.The pixel sequence is defined by a unique random path in the block.[logl2]bits are required to display the final block sequence number leading tol2[logl2]bits to define each element unique in a block of sizelxl.These bits are part of the hidden key.The integrated data bits information for each block will be only accessible to the authorized receivers.b bitplanes can be used for embedding patient records in medical image pixels.This quantitybis based on the size of the concealed data,but to minimize the distortion of the medical image within an acceptable level,a maximum of four-bit planes are employed for the embedding procedure.The patient record information is transformed from text to bits,and The bit string is further equally grouped into the size of bl2-2 substrings data,Data strings D0;D1;D2;D3of four bits long bl2will be generated from each substring of data bl2-c bits.The data bit string will be modified as

    3.3.3 Cover Image Block Rotation

    After embedding b1b2 at the ideal location,keeping in mind the security perspective,every four rotations will be evaluated employing numerous objective functions, and the optimum performance will be preferred.Two bits b1b2 (00; 01; 10; 11) denotes the pixel rotation in each block with four angels (00; 900; 1800; 2700), respectively.These bits would be positioned in the concealed data string such that they embed in the least significant bits of two upper left corners pixel in the block.These bits b1b2 determine the efficient and effective embedding capacity based on the block size.When the data set of bits for the patient record and pixel sequence of the block are determined,we add±1 to each modifiable pixel to embed the patient record in the cover image.The value of a pixel’s LSB measured by the algorithm specifies the appropriate additive value for that pixel in the block.

    Algorithm 1:Data Embedding Process Input:Cover image,patient record,key Output:Watermarked image 1:Create a 4×4 block size of the cover image 2:Create chunks of patient record bl2-c,where b represent LSB bit planes,c=2 3:Create data string D0;D1;D2;D3 4:Locate ideal path in block(Continued)

    Algorithm 1:(Continued)5:Find pixelrotation in block(0°;90°;180°;270°)6:Calculate each pixel’s additive value(+1 or–1)7:Embed data

    3.4 Extraction Phase

    The data extraction process is much simpler than the data embedding process.As explained earlier,the maximum block size of an image 512×512 can have 256.As a result,the initial eight bits of the string indicate the pixel block size in the key.Therefore the very first eight bits are dissociated from the key.The preceding three bits indicate the count of bit planes selected during the embedding process and are thus dissociated from the key.The rest of the key bits determine the random path specified for the data embedding.We stated that the rotation bits(b1b2)are located in the top-left pixels of LSB in the block at the embedding phase.The block is rotated back in the extraction process by an angle defined by rotation bits.Pixels are then positioned in the exact order as the key dictates,and data from the LSB bit planes of every block can be recovered.

    Algorithm 2:Data Embedding Process Input:Watermarked image,key Output:Patient record information 1:Get key information 2:Find the random path of each block 3:Block rotation based on rotation bits 4:Pixel order indicated by the key 5:Extract data

    4 Results and Discussion

    This section discusses the proposed methodology performance analysis,comparing the detailed studies with numerous traditional algorithms to verify the efficiency of this proposed model.“MATLAB 2020a”is used in this research for the implementation of experiments.PC with Windows 10,3.5-GHz CPU,and 4 GB of RAM.

    4.1 Data Set

    We tested different sample images from a data archive1 to evaluate our methodology.Fig.3 represents patients’images for cancer from n1–n10 that are negative cases,whereas images from y1–y2 are positive cases.The sample images are medical images of an 8-bit depth grayscale.The patient record sizes are 8 KB,16 KB,and 32 KB.

    Figure 3:The collection of MRI grayscale BMP cover images for experiments.Cancer images with the normal condition are represented from n1–n10,and cancer images with the abnormal condition are represented from y1–y2

    4.2 Performance Metrics

    Peak signal-to-noise ratio (PSNR), mean square error (MSE), and structural similarity index metrics (SSIM) are used to assess perceptual invisibility.PSNR analyzes the cover image with the watermarked image in terms of the maximum possible value (power).An image with a PSNR of infinity is identical,whereas any PSNR higher than 35 dB is acceptable,and higher is preferred.

    MAX denotes the maximum pixel value of the image.The mean square error(MSE)is defined as follows:

    where m, n denotes the size of the pixels, and O and W denote the original and cover images,respectively.The Structural Similarity Index is defined as follows:

    The metric SSIM (Structural Similarity Index) extracts three main attributes from an image:Luminance, Contrast, and Structure.For the two images O and W, these are computed as follows:

    4.3 Results and Analysis

    We analyzed our methodology at the cover image’s maximum payload capacity to ensure that it is efficient.The numerical results of PSNR, SSIM, and MSE reveal that the watermark images are imperceptible and that human eyes are unable to discriminate between visual variations in the watermark images.The suggested methodology attains the average PSNR value of 44.22 dB on 512×512 dimensions with data embedding up to 32 KB and employing all three LSBs.Table 1 displays the cover image quality measures for 8 KB,16 KB,and 32 KB.Fig.4 displays a graphical representation of the proposed algorithm.The desired scheme performance is carefully analyzed by subjecting it to numerous attacks.Normalized correlation(NC)is used to assess the robustness of the implemented watermarking methodology under filtering,geometric,enhancement,compression,and noise attacks.This NC value should be greater than 0.9 to ensure that the method will resist attacks.Table 2 represents the proposed algorithm strength for various attacks—the SSIM values for geometric attacks and 0.19 for cropping attacks for y3 and y4 images.PSNR value for histogram equalization of no8 image is highest 49.30 dB, and y3 image has the lowest PSNR of 8.7 dB.The minimum NC value calculated from all attacks is 0.97.The watermarked image was exposed to various filtering attacks.The cover images were exposed to Gaussian(3 × 3), median (3 × 3), and wiener filter (3 × 3).The average NC value of filter attack is 0.99,y3 image has the highest PSNR value of 47.58 for Gaussian attack,whereas wiener attack has the lowest value of PSNR 21.16 for y3 cover image.

    Table 1:Results of having 8 KB, 16 KB, and 32 KB embedding data size watermarked images of 512×512 dimensions

    Table 1 (continued)8 KB 16 KB 32 KB Image PSNR SSIM MSE PSNR SSIM MSE PSNR SSIM MSE no5 54.37 0.999 0.37 54.37 0.999 0.37 52.1 0.98 0.3 no6 45.36 0.99 0.75 45.36 0.99 0.75 41.36 0.99 4.7 no7 52.37 0.999 0.37 51.37 0.999 0.37 50.1 0.97 0.6 no8 46.74 0.995 0.37 46.74 0.995 0.37 46.74 0.96 1.37 no9 50.5 0.999 0.57 50.5 0.999 0.57 46.74 0.99 1.37 no10 45.79 0.999 0.3 41.79 0.999 0.8 41.79 0.99 4.3 y1 50.5 0.999 0.57 48.5 0.999 0.57 48.5 0.98 0.57 y2 50.5 0.999 0.57 51.5 0.999 0.57 44.5 0.98 0.57 y3 50.5 0.999 0.57 47.5 0.999 0.57 43.5 0.98 0.56 y4 50.5 0.999 0.57 50.5 0.999 0.57 48.5 0.97 0.8 y5 50.54 0.999 0.57 48.54 0.99 0.57 41.61 0.97 4.84 y6 43.87 0.99 0.66 43.87 0.99 2.66 39.54 0.99 2.87 y7 50.5 0.99 0.57 47.5 0.99 0.57 45.1 0.99 0.4 y8 50.5 0.999 0.57 45.5 0.97 0.57 43.1 0.99 0.4 y9 50.5 0.999 0.57 48.5 0.91 0.57 41.36 0.99 4.7 y10 44.18 0.994 0.48 41.18 0.98 2.48 38.1 0.98 0.4 Average 49.355 0.9966 0.5615 47.755 0.98955 0.7865 44.2145 0.98 2.08

    Figure 4:Graphical representation of PSNR, SSIM, and MSE at 32 KB patient record after implementing the proposed algorithm

    Table 2:Robustness and imperceptibility analysis of watermark under different attacks

    4.4 Evaluation and Discussion

    The proposed method was compared with the state-of-the-art technique [2] to determine its performance on UCID dataset2 as seen in Fig.5, the collection of medical images were randomly chosen.Table 3 represents the calculated PSNR,SSIM values of selected images.The average PSNR and SSIM values of [2] are 43.23 and 0.92, respectively, whereas our methodology significantly improves PSNR of 45.00 and SSIM of 0.99.Table 4 represents the performance evaluation of the proposed methods with a standard dataset of images Barbara,Baboon,Cameraman,Lena,Peppers.The results of six different methodologies Bailey et al.[53],Jassim[54],Karim et al.[11],Muhammad et al.[55],Rehman et al.[56],and Siddiqui et al.[2],are displayed in Table 2.Since PSNR is always greater than 30 dB,human eyes cannot perceive distortion.The PSNR value of our proposed method as compared to[53–56]and Siddiqui et al.[2]shows better results on 857 bits.

    Figure 5:A set of 512×512 medical images randomly selected for comparison purposes

    Table 3:PSNR and SSIM performance analysis with the state-of-the-art technique on a collection of randomly selected medical images

    Table 4:PSNR result of the standard set images with 512x512 dimensions at 104,847 embedding bits

    We improved the effectiveness of the suggested approach with Rehman et al.[56] by increasing patient data to the maximum size of 235,929 bits since embedding a greater data size with a higher SNR indicates the performance of the watermarking strategy.The suggested scheme achieves the minimum PSNR value of 45.22 dB by hiding 235,929 and employing all three LSBs.Fig.6 represents a graphical comparison of the proposed algorithm with the state of art methodologies.

    Figure 6:Graphical representation of proposed algorithm with state of art methodologies

    4.5 Summary of Results

    Based on the above experimental analyses,we can draw the conclusion:

    · It is found that the suggested methodology performs better than other schemes.Compared to standard LSB and the other state-of-the-art watermarking systems based on reversible watermarking,the proposed method offers a higher PSNR.

    · Even if the embedding capacity is increased,the suggested methodology produces high-quality watermarked images.

    · It is noted that the visual quality of the watermarked image is undetectable.The human eye cannot differentiate between the cover image and watermarked image.

    5 Conclusions

    In this research paper, a novel reversible watermarking algorithm is proposed.The proposed algorithm is also evaluated under different attacks and shows better results,and it can be applied to medical images and standard images (Barbara, Baboon, Cameraman, Lena, Peppers) for reversible watermarking with better performance for medical images.The proposed algorithm generates an ideal random path among all paths for pixel blocks with minimum bit flipping to improve image imperceptibility.The embedding and extraction process is done by a key that contains information about the selected random path and pixel rotation in the blocks.The degradation of the image is proven by visual quality and structural similarity parameters PSNR,SSIM,and MSE.The calculated values of parameters always come in the acceptable range.In future research,we aim to develop a new framework of the reversible watermarking algorithm for color images.

    Funding Statement:This work is supported by the National Natural Science Foundation of China(Grant No.61762060), Educational Commission of Gansu Province, China (Grant No.2017C-05),Foundation for the Key Research and Development Program of Gansu Province, China (Grant No.20YF3GA016).This work was supported by King Saud University, Riyadh, Saudi Arabia,through Researchers Supporting Project No.RSP-2022/184.The work of author Ayman Radwan was supported by FCT/MEC through Programa Operacional Regional do Centro and by the European Union through the European Social Fund (ESF) under Investigator FCT Grant (5G-AHEAD IF/FCT-IF/01393/2015/CP1310/CT0002).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    人人妻人人爽人人添夜夜欢视频| 一区二区日韩欧美中文字幕| 一个人免费看片子| 波多野结衣av一区二区av| 丁香欧美五月| av在线播放免费不卡| 国产xxxxx性猛交| 欧美激情极品国产一区二区三区| 这个男人来自地球电影免费观看| 一级片'在线观看视频| 国产在视频线精品| 新久久久久国产一级毛片| 人人妻人人爽人人添夜夜欢视频| 波多野结衣一区麻豆| 久久影院123| 757午夜福利合集在线观看| 黄片播放在线免费| 999精品在线视频| 国产91精品成人一区二区三区 | 午夜免费鲁丝| 12—13女人毛片做爰片一| avwww免费| 精品免费久久久久久久清纯 | 精品国产国语对白av| 成人特级黄色片久久久久久久 | 成人国语在线视频| 女性被躁到高潮视频| 少妇粗大呻吟视频| 亚洲中文av在线| 男人操女人黄网站| 免费一级毛片在线播放高清视频 | 久久久久久亚洲精品国产蜜桃av| 亚洲专区字幕在线| 日韩 欧美 亚洲 中文字幕| 国产伦人伦偷精品视频| 午夜激情久久久久久久| 国产精品免费视频内射| 午夜福利一区二区在线看| 99国产精品一区二区蜜桃av | 欧美激情久久久久久爽电影 | 国产在线精品亚洲第一网站| 一边摸一边做爽爽视频免费| 蜜桃在线观看..| 最近最新免费中文字幕在线| 久久国产精品人妻蜜桃| 日韩中文字幕欧美一区二区| 老汉色av国产亚洲站长工具| 亚洲人成电影免费在线| 精品国内亚洲2022精品成人 | 欧美精品高潮呻吟av久久| 极品教师在线免费播放| 亚洲国产欧美在线一区| 侵犯人妻中文字幕一二三四区| 一区福利在线观看| 欧美日韩成人在线一区二区| 啦啦啦在线免费观看视频4| 欧美 日韩 精品 国产| 19禁男女啪啪无遮挡网站| 欧美日韩视频精品一区| 午夜福利视频精品| 精品亚洲成a人片在线观看| 国产一区二区三区在线臀色熟女 | 亚洲天堂av无毛| 亚洲欧美日韩高清在线视频 | 国产97色在线日韩免费| 欧美精品啪啪一区二区三区| 他把我摸到了高潮在线观看 | 99久久人妻综合| 久久国产精品大桥未久av| 无人区码免费观看不卡 | 国产成人精品久久二区二区91| 自拍欧美九色日韩亚洲蝌蚪91| 免费在线观看视频国产中文字幕亚洲| 一区福利在线观看| 国产精品偷伦视频观看了| 久久人人爽av亚洲精品天堂| 亚洲精品在线观看二区| 欧美在线一区亚洲| 欧美国产精品一级二级三级| 一级黄色大片毛片| 人人妻人人爽人人添夜夜欢视频| 亚洲国产av新网站| 亚洲午夜精品一区,二区,三区| 午夜福利欧美成人| 最新的欧美精品一区二区| 最新美女视频免费是黄的| 午夜两性在线视频| 免费在线观看完整版高清| 久久精品亚洲av国产电影网| 啦啦啦视频在线资源免费观看| 91字幕亚洲| 五月开心婷婷网| 久久久精品国产亚洲av高清涩受| 午夜91福利影院| 涩涩av久久男人的天堂| av网站免费在线观看视频| 午夜成年电影在线免费观看| 欧美日韩黄片免| 美女高潮喷水抽搐中文字幕| 菩萨蛮人人尽说江南好唐韦庄| 黑人操中国人逼视频| 男女午夜视频在线观看| 母亲3免费完整高清在线观看| 国产精品免费大片| 又紧又爽又黄一区二区| 另类亚洲欧美激情| 国产精品偷伦视频观看了| 50天的宝宝边吃奶边哭怎么回事| 纯流量卡能插随身wifi吗| 天堂动漫精品| 国产午夜精品久久久久久| 欧美人与性动交α欧美软件| 亚洲欧美精品综合一区二区三区| 国产深夜福利视频在线观看| 亚洲av美国av| 日韩三级视频一区二区三区| 国产免费福利视频在线观看| 久9热在线精品视频| 一本色道久久久久久精品综合| 国产一区二区 视频在线| 夜夜骑夜夜射夜夜干| 每晚都被弄得嗷嗷叫到高潮| 国产亚洲精品第一综合不卡| 十八禁网站免费在线| 国产福利在线免费观看视频| 别揉我奶头~嗯~啊~动态视频| 777米奇影视久久| 国产亚洲精品一区二区www | 亚洲专区中文字幕在线| 久久亚洲真实| 99国产精品99久久久久| 精品人妻在线不人妻| 两性夫妻黄色片| 国产av国产精品国产| 久久精品国产a三级三级三级| 免费观看人在逋| 国产激情久久老熟女| 老司机深夜福利视频在线观看| 精品人妻1区二区| 日本a在线网址| 国产精品 欧美亚洲| 一区二区三区激情视频| 久久国产精品大桥未久av| 精品午夜福利视频在线观看一区 | 亚洲av第一区精品v没综合| 午夜成年电影在线免费观看| 999久久久国产精品视频| 丝袜美腿诱惑在线| 国产亚洲欧美精品永久| 国产精品久久久久久精品古装| 91成年电影在线观看| av又黄又爽大尺度在线免费看| 久久国产精品影院| www.999成人在线观看| 日本vs欧美在线观看视频| 免费日韩欧美在线观看| 精品人妻熟女毛片av久久网站| 亚洲国产av新网站| 亚洲精品成人av观看孕妇| 啦啦啦 在线观看视频| 操美女的视频在线观看| 麻豆成人av在线观看| 一二三四社区在线视频社区8| 菩萨蛮人人尽说江南好唐韦庄| 欧美日韩av久久| 99re6热这里在线精品视频| 精品一区二区三区四区五区乱码| 在线十欧美十亚洲十日本专区| 久久久欧美国产精品| 国产熟女午夜一区二区三区| 国产精品国产高清国产av | 亚洲精华国产精华精| 精品国产乱子伦一区二区三区| av天堂在线播放| 国产精品久久久久久人妻精品电影 | 男男h啪啪无遮挡| 国产成人系列免费观看| 美女主播在线视频| 777久久人妻少妇嫩草av网站| 亚洲精品美女久久久久99蜜臀| 色婷婷av一区二区三区视频| 亚洲精品在线美女| 大型av网站在线播放| 亚洲情色 制服丝袜| 老熟女久久久| 欧美亚洲 丝袜 人妻 在线| 色综合婷婷激情| 日本欧美视频一区| 99热国产这里只有精品6| www日本在线高清视频| 久久久欧美国产精品| 日韩大码丰满熟妇| 啦啦啦视频在线资源免费观看| 欧美日韩亚洲高清精品| 999久久久精品免费观看国产| 亚洲自偷自拍图片 自拍| 精品亚洲成a人片在线观看| 国产免费福利视频在线观看| 法律面前人人平等表现在哪些方面| 97人妻天天添夜夜摸| 久热这里只有精品99| 国内毛片毛片毛片毛片毛片| 国产激情久久老熟女| 激情视频va一区二区三区| 黄片小视频在线播放| 欧美精品一区二区免费开放| 久久久久精品国产欧美久久久| 在线观看免费视频日本深夜| 天天影视国产精品| 精品国产一区二区三区久久久樱花| 69精品国产乱码久久久| 国产精品欧美亚洲77777| 99国产精品99久久久久| 精品国产亚洲在线| 1024香蕉在线观看| 51午夜福利影视在线观看| 免费不卡黄色视频| 男男h啪啪无遮挡| 悠悠久久av| 久久av网站| 一边摸一边抽搐一进一小说 | 国产成人免费观看mmmm| 国产亚洲av高清不卡| 黑丝袜美女国产一区| 最新美女视频免费是黄的| 亚洲成人免费av在线播放| 黄片大片在线免费观看| 国产老妇伦熟女老妇高清| 国产一区二区三区综合在线观看| 欧美精品av麻豆av| 久久国产精品男人的天堂亚洲| 欧美日韩视频精品一区| 国产精品亚洲一级av第二区| 最近最新中文字幕大全免费视频| 9191精品国产免费久久| 捣出白浆h1v1| av天堂久久9| 波多野结衣av一区二区av| 欧美日韩视频精品一区| 亚洲五月色婷婷综合| 亚洲性夜色夜夜综合| 久久久久久久久免费视频了| 少妇被粗大的猛进出69影院| 久久久国产一区二区| 久久人人97超碰香蕉20202| 电影成人av| 精品卡一卡二卡四卡免费| 亚洲视频免费观看视频| 亚洲综合色网址| 纯流量卡能插随身wifi吗| 1024视频免费在线观看| 亚洲自偷自拍图片 自拍| 成年人免费黄色播放视频| 国产精品免费大片| 天天影视国产精品| 欧美黄色淫秽网站| 妹子高潮喷水视频| 90打野战视频偷拍视频| 国产一区二区 视频在线| 亚洲精品在线观看二区| 欧美精品人与动牲交sv欧美| 午夜91福利影院| 亚洲精品美女久久久久99蜜臀| 美女扒开内裤让男人捅视频| 国产亚洲精品第一综合不卡| 亚洲人成伊人成综合网2020| 亚洲 国产 在线| 日韩大码丰满熟妇| 亚洲欧美精品综合一区二区三区| cao死你这个sao货| 欧美精品啪啪一区二区三区| 肉色欧美久久久久久久蜜桃| 精品卡一卡二卡四卡免费| 欧美黑人欧美精品刺激| 国产精品一区二区在线不卡| 少妇被粗大的猛进出69影院| 少妇的丰满在线观看| 日韩免费av在线播放| 久久精品91无色码中文字幕| 两性午夜刺激爽爽歪歪视频在线观看 | 国产视频一区二区在线看| 18禁美女被吸乳视频| 国产黄色免费在线视频| 超碰成人久久| 中文字幕人妻丝袜制服| 99久久99久久久精品蜜桃| 国产欧美日韩精品亚洲av| 免费av中文字幕在线| 午夜福利视频在线观看免费| 性少妇av在线| 久久久久久免费高清国产稀缺| 夜夜爽天天搞| 美女国产高潮福利片在线看| 一夜夜www| 丝袜美足系列| 国产免费现黄频在线看| 丁香六月欧美| 大香蕉久久网| 看免费av毛片| 1024香蕉在线观看| 成人影院久久| 久久天堂一区二区三区四区| 国产片内射在线| 国产又色又爽无遮挡免费看| 亚洲综合色网址| videos熟女内射| 99久久国产精品久久久| 久久久久久久国产电影| 久久久国产成人免费| 亚洲中文字幕日韩| 亚洲五月婷婷丁香| 欧美成人午夜精品| 中国美女看黄片| 一边摸一边抽搐一进一出视频| 亚洲性夜色夜夜综合| 国产成人免费无遮挡视频| 日韩欧美三级三区| 成人18禁高潮啪啪吃奶动态图| 美女午夜性视频免费| 成人国产av品久久久| 欧美日韩视频精品一区| 亚洲精品中文字幕在线视频| 嫁个100分男人电影在线观看| 老司机在亚洲福利影院| 久久亚洲真实| 亚洲精品一卡2卡三卡4卡5卡| 国产免费福利视频在线观看| 色老头精品视频在线观看| 少妇裸体淫交视频免费看高清 | 18禁裸乳无遮挡动漫免费视频| 欧美+亚洲+日韩+国产| 欧美日韩视频精品一区| 悠悠久久av| 成年人黄色毛片网站| 成人特级黄色片久久久久久久 | 在线十欧美十亚洲十日本专区| 国产精品av久久久久免费| 真人做人爱边吃奶动态| 女性生殖器流出的白浆| 亚洲av片天天在线观看| 亚洲九九香蕉| 成人永久免费在线观看视频 | 国产精品99久久99久久久不卡| 狠狠狠狠99中文字幕| 夜夜骑夜夜射夜夜干| 亚洲九九香蕉| 99国产精品一区二区三区| 91av网站免费观看| 欧美国产精品va在线观看不卡| 久久中文字幕人妻熟女| 免费在线观看视频国产中文字幕亚洲| 亚洲精品中文字幕一二三四区 | 在线观看免费日韩欧美大片| 不卡一级毛片| av福利片在线| 好男人电影高清在线观看| 99热国产这里只有精品6| 少妇粗大呻吟视频| 无人区码免费观看不卡 | 国产男女内射视频| 两个人免费观看高清视频| 高清av免费在线| 国产又爽黄色视频| 欧美中文综合在线视频| 80岁老熟妇乱子伦牲交| 最近最新中文字幕大全电影3 | 国产av精品麻豆| 亚洲国产欧美网| 老司机影院毛片| 精品国产国语对白av| 久久国产精品大桥未久av| 王馨瑶露胸无遮挡在线观看| 99精国产麻豆久久婷婷| 亚洲va日本ⅴa欧美va伊人久久| 天堂中文最新版在线下载| 日韩免费高清中文字幕av| 精品国产一区二区三区久久久樱花| 99九九在线精品视频| 一个人免费在线观看的高清视频| 王馨瑶露胸无遮挡在线观看| 免费女性裸体啪啪无遮挡网站| 国产精品久久久久成人av| 精品国产乱码久久久久久男人| 亚洲成人手机| 狠狠婷婷综合久久久久久88av| 香蕉久久夜色| 亚洲国产精品一区二区三区在线| 老司机在亚洲福利影院| 国产成人影院久久av| 中文亚洲av片在线观看爽 | 50天的宝宝边吃奶边哭怎么回事| 国产一区二区激情短视频| 午夜福利视频精品| 91av网站免费观看| 老熟妇乱子伦视频在线观看| 亚洲人成电影观看| 久久婷婷成人综合色麻豆| 免费观看a级毛片全部| 黄色 视频免费看| 99香蕉大伊视频| 纯流量卡能插随身wifi吗| 国产成人av教育| 女人高潮潮喷娇喘18禁视频| 久久久久国产一级毛片高清牌| 免费少妇av软件| 亚洲欧洲日产国产| 美女高潮喷水抽搐中文字幕| 在线观看免费高清a一片| 国产精品一区二区在线观看99| 亚洲欧美一区二区三区久久| 性色av乱码一区二区三区2| 久久精品亚洲熟妇少妇任你| a级毛片在线看网站| 麻豆乱淫一区二区| 国产av又大| 女人被躁到高潮嗷嗷叫费观| 操美女的视频在线观看| 精品视频人人做人人爽| 国产精品一区二区在线不卡| 日韩三级视频一区二区三区| 欧美乱码精品一区二区三区| 男女下面插进去视频免费观看| 成年版毛片免费区| 国产精品偷伦视频观看了| 黄色 视频免费看| 午夜老司机福利片| 丁香六月天网| 高清av免费在线| 欧美午夜高清在线| 久久青草综合色| 国产精品九九99| 欧美日韩国产mv在线观看视频| 18禁美女被吸乳视频| 777久久人妻少妇嫩草av网站| 欧美日韩成人在线一区二区| 欧美 日韩 精品 国产| 国产一区二区在线观看av| 亚洲国产毛片av蜜桃av| 日本av免费视频播放| 热99re8久久精品国产| 亚洲精品在线美女| 制服诱惑二区| 久久久精品区二区三区| 亚洲一区二区三区欧美精品| 色老头精品视频在线观看| 国产福利在线免费观看视频| 一本久久精品| 叶爱在线成人免费视频播放| 美女福利国产在线| 十八禁网站网址无遮挡| 人人妻人人爽人人添夜夜欢视频| av又黄又爽大尺度在线免费看| 日韩欧美国产一区二区入口| 99香蕉大伊视频| 黑人巨大精品欧美一区二区mp4| 国产伦人伦偷精品视频| 午夜91福利影院| 国产免费现黄频在线看| 在线播放国产精品三级| 日韩欧美一区二区三区在线观看 | 国产在线免费精品| 色视频在线一区二区三区| 精品人妻在线不人妻| 国产成人一区二区三区免费视频网站| 亚洲精品中文字幕在线视频| 男女边摸边吃奶| 国产精品久久久久久精品电影小说| 中文字幕人妻丝袜制服| netflix在线观看网站| 欧美日本中文国产一区发布| 青青草视频在线视频观看| 精品乱码久久久久久99久播| √禁漫天堂资源中文www| 日本欧美视频一区| 成人国语在线视频| 极品少妇高潮喷水抽搐| 久久久精品国产亚洲av高清涩受| 亚洲国产成人一精品久久久| 后天国语完整版免费观看| 亚洲熟女毛片儿| 18在线观看网站| 建设人人有责人人尽责人人享有的| 精品熟女少妇八av免费久了| 国产在线观看jvid| 国产在线精品亚洲第一网站| 精品国产一区二区三区久久久樱花| 97人妻天天添夜夜摸| tocl精华| 亚洲成人免费av在线播放| 高清在线国产一区| 亚洲中文av在线| 在线十欧美十亚洲十日本专区| 嫁个100分男人电影在线观看| 韩国精品一区二区三区| 午夜成年电影在线免费观看| av有码第一页| 五月天丁香电影| 久久午夜亚洲精品久久| 天天躁狠狠躁夜夜躁狠狠躁| 两个人看的免费小视频| 免费高清在线观看日韩| 午夜激情av网站| 久久久国产成人免费| 波多野结衣av一区二区av| 91大片在线观看| 天天添夜夜摸| 黑人巨大精品欧美一区二区mp4| 日本一区二区免费在线视频| 国产不卡一卡二| 人人妻人人添人人爽欧美一区卜| 国内毛片毛片毛片毛片毛片| 一区二区三区激情视频| 成人国产av品久久久| 午夜成年电影在线免费观看| 久久久水蜜桃国产精品网| av不卡在线播放| 日本av免费视频播放| 丝袜喷水一区| 50天的宝宝边吃奶边哭怎么回事| 国产伦人伦偷精品视频| 国产精品久久久久久精品古装| 一本—道久久a久久精品蜜桃钙片| 欧美午夜高清在线| 久久精品国产综合久久久| 久久免费观看电影| 欧美+亚洲+日韩+国产| 国产亚洲午夜精品一区二区久久| 欧美黑人欧美精品刺激| av不卡在线播放| 日本av免费视频播放| 国产精品麻豆人妻色哟哟久久| 最近最新中文字幕大全电影3 | 亚洲精品自拍成人| 99久久人妻综合| 高清在线国产一区| 国产精品自产拍在线观看55亚洲 | 国产精品久久久人人做人人爽| 免费一级毛片在线播放高清视频 | 午夜精品国产一区二区电影| 午夜成年电影在线免费观看| 90打野战视频偷拍视频| 女同久久另类99精品国产91| 国产97色在线日韩免费| 日本精品一区二区三区蜜桃| 在线十欧美十亚洲十日本专区| 国产熟女午夜一区二区三区| av在线播放免费不卡| 中文字幕av电影在线播放| 国产精品久久久久久人妻精品电影 | 交换朋友夫妻互换小说| 午夜视频精品福利| 国产亚洲午夜精品一区二区久久| 露出奶头的视频| 麻豆成人av在线观看| 色婷婷av一区二区三区视频| 午夜福利,免费看| av不卡在线播放| 亚洲一卡2卡3卡4卡5卡精品中文| 精品一品国产午夜福利视频| 午夜日韩欧美国产| 日韩大码丰满熟妇| 日韩成人在线观看一区二区三区| 50天的宝宝边吃奶边哭怎么回事| 高清黄色对白视频在线免费看| 欧美日韩亚洲高清精品| 国产精品 欧美亚洲| 日韩视频一区二区在线观看| 精品一区二区三区视频在线观看免费 | 国产不卡av网站在线观看| 一区二区三区乱码不卡18| 91国产中文字幕| 欧美在线黄色| 亚洲精品av麻豆狂野| 亚洲国产欧美一区二区综合| 亚洲少妇的诱惑av| 色视频在线一区二区三区| 国产成人精品无人区| 大型黄色视频在线免费观看| 成人影院久久| 一夜夜www| 狠狠精品人妻久久久久久综合| 多毛熟女@视频| 精品久久久久久久毛片微露脸| 天堂俺去俺来也www色官网| 91麻豆av在线| 久久精品人人爽人人爽视色| 成人特级黄色片久久久久久久 | av天堂在线播放| 青青草视频在线视频观看| 男女下面插进去视频免费观看| 国产深夜福利视频在线观看| 国产精品一区二区免费欧美| 久久久久久久精品吃奶| 大型黄色视频在线免费观看| 国产日韩一区二区三区精品不卡| 亚洲国产精品一区二区三区在线| 嫩草影视91久久| 国产在线精品亚洲第一网站| 交换朋友夫妻互换小说| 国产男靠女视频免费网站| 精品少妇久久久久久888优播| 母亲3免费完整高清在线观看| 国产日韩欧美亚洲二区| 啦啦啦中文免费视频观看日本| 亚洲精品自拍成人| 精品人妻1区二区| 久久青草综合色| 久久久久国内视频| 巨乳人妻的诱惑在线观看| 丝袜美足系列| 国产精品偷伦视频观看了| 波多野结衣av一区二区av| 国产1区2区3区精品| 黄片大片在线免费观看| 精品一品国产午夜福利视频|