Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

Selection of Digital Watermarking Techniques for Medical Image Security by Using the Fuzzy Analytical Hierarchy Process

Author(s): Masood Ahmad*, Mohd Nadeem, Mohd Islam, Saquib Ali, Alka Agrawal and Raees Ahmad Khan

Volume 16, Issue 7, 2023

Published on: 22 May, 2023

Article ID: e020523216404 Pages: 7

DOI: 10.2174/2666255816666230502100729

Price: $65

Abstract

Background: The watermarking technique is a security algorithm for medical images and the patient's information. Watermarking is used for maintaining the robustness, integrity, confidentiality, authentication, and complexity of medical images.

Objective: The selection of medical image watermarking technique is multi-criteria decisionmaking and an automatic way of algorithm selection for security and privacy. However, it is difficult to select a better watermarking technique through traditional selection techniques.

Methods: To deal with this problem, a multicriteria-based fuzzy analytic hierarchy process (FAHP) was proposed. This method is applied for algorithm selection for the security of medical images in healthcare. In this method, we first determined the list of criteria and alternatives, which directly affect the decision of the medical image security algorithm. Then, the proposed method was applied to the criteria and alternatives.

Results: We provided the rank according to the obtained weights of the algorithm. Furthermore, the overall results and ranking of the algorithms were also presented in this article.

Conclusion: Integrity was found to have the highest weight (0.509) compared to the other criteria. The weight of the other criteria, namely authentication, was 0.165, robustness was 0.151, confidentiality was 0.135, and complexity was 0.038. Thus, in terms of ranking, integrity was reported to be of the highest priority among the five criteria attributes.

Graphical Abstract

[1]
A.H. Allaf, and M. Ait Kbir, A Review of Digital Watermarking Applications for Medical Image Exchange Security., 2nd ed Innovations in Smart Cities Applications, 2018, pp. 472-480.
[2]
L.K. Saini, and V. Shrivastava, "A survey of digital watermarking techniques and its applications", ArXiv abs/1407.4735, vol. 2, no. 3, pp. 70-73, 2014.
[http://dx.doi.org/10.48550/arXiv.1407.4735]
[3]
H. Nyeem, W. Boles, and C. Boyd, "A review of medical image watermarking requirements for teleradiology", J. Digit. Imaging, vol. 26, no. 2, pp. 326-343, 2013.
[http://dx.doi.org/10.1007/s10278-012-9527-x] [PMID: 22975883]
[4]
U. Verma, and D.N. Sharma, "Hybrid mode of medical image watermarking to enhance robustness and imperceptibility", Int. J. Innov. Technol. Explor. Eng., vol. 9, no. 1, pp. 351-359, 2019.
[http://dx.doi.org/10.35940/ijitee.A4126.119119]
[5]
A. Sivaprakash, S.N.E. Rajan, and S. Selvaperumal, "Privacy protection of patient medical images using digital watermarking technique for e-healthcare system", Curr. Med. Imaging Rev., vol. 15, no. 8, pp. 802-809, 2019.
[http://dx.doi.org/10.2174/1573405615666190408115158] [PMID: 32008548]
[6]
A. Kumar, A. Shelar, J. Etheredge, S. Prakash, S. Sharma, and M. Mp, "Analytical hierarchical process based system for image fusion", Signal Image Process, vol. 6, no. 5, pp. 01-14, 2015.
[http://dx.doi.org/10.5121/sipij.2015.6501]
[7]
S.M. Mousavi, A. Naghsh, and S.A.R. Abu-Bakar, "Watermarking techniques used in medical images: A survey", J. Digit. Imaging, vol. 27, no. 6, pp. 714-729, 2014.
[http://dx.doi.org/10.1007/s10278-014-9700-5] [PMID: 24871349]
[8]
F. Benedetto, G. Giunta, and A. Neri, "QoS assessment of 3G video-phone calls by tracing watermarking exploiting the new colour space ‘YST’", IET Commun., vol. 1, no. 4, pp. 696-704, 2007.
[http://dx.doi.org/10.1049/iet-com:20060331]
[9]
G. Francesco Benedetto, and A. Neri, "A new color space domain for digital watermarking in multimedia applications", Proceedings- IEEE International Conference on Image Processing, Genova, Italy, 2005, pp. 1-249.
[http://dx.doi.org/10.1109/ICIP.2005.1529734]
[10]
M. Moayeri, A. Shahvarani, M.H. Behzadi, and F. Hosseinzadeh-Lotfi, "Comparison of fuzzy ahp and fuzzy topsis methods for math teachers selection", Indian J. Sci. Technol., vol. 8, no. 13, pp. 1-10, 2015.
[http://dx.doi.org/10.17485/ijst/2015/v8i13/54100]
[11]
L.A. Zadeh, "Fuzzy sets", Inf. Control, vol. 8, no. 3, pp. 338-353, 1965.
[http://dx.doi.org/10.1016/S0019-9958(65)90241-X]
[12]
A. Masood, J.F. Al-Amri, A.F. Subahi, S. Khatri, A.H. She, M. Nadeem, and A. Agrawal, "Healthcare device security assessment through computational methodology", Comput. Syst. Sci. Eng., vol. 41, no. 2, pp. 811-828, 2022.
[http://dx.doi.org/10.32604/csse.2022.020097]
[13]
L.A. Zadeh, "The concept of a linguistic variable and its application to approximate reasoning", Inf. Sci., vol. 8, pp. 199-249, 1975.
[http://dx.doi.org/10.1016/0020-0255(75)90036-5]
[14]
A. Attaallah, M. Ahmad, J.A.M. Tarique, P.A. Kumar, R. Kumar, and K.R. Ahmad, "Device security assessment of internet of healthcare things", Intell. Autom. Soft Comput., vol. 27, no. 2, pp. 593-603, 2021.
[http://dx.doi.org/10.32604/iasc.2021.015092]
[15]
H.J. Zimmermann, Fuzzy set theory and its applications. Academic Publishers., Kluwer: Boston, 1985.
[16]
T.C. Wang, and Y.H. Chen, "Applying consistent fuzzy preference relations to partnership selection", Omega, vol. 35, no. 4, pp. 384-388, 2007.
[http://dx.doi.org/10.1016/j.omega.2005.07.007]
[17]
F.T.S. Chan, and N. Kumar, "Global supplier development considering risk factors using fuzzy extended AHP-based approach", Omega, vol. 35, no. 4, pp. 417-431, 2007.
[http://dx.doi.org/10.1016/j.omega.2005.08.004]
[18]
C. Kahraman, G. Büyüközkan, and N.Y. Ateş, "A two phase multiattribute decision-making approach for new product introduction", Inf. Sci., vol. 177, no. 7, pp. 1567-1582, 2007.
[http://dx.doi.org/10.1016/j.ins.2006.09.008]
[19]
O.S. Vaidya, and S. Kumar, "Analytic hierarchy process: An overview of applications", Eur. J. Oper. Res., vol. 169, no. 1, pp. 1-29, 2006.
[http://dx.doi.org/10.1016/j.ejor.2004.04.028]
[20]
"O. Kulak, M.B. Durmuşoğlu, and C. Kahraman, Fuzzy multiattribute equipment selection based on information axiom", J. Mater. Process. Technol., vol. 169, no. 3, pp. 337-345, 2005.
[http://dx.doi.org/10.1016/j.jmatprotec.2005.03.030]
[21]
E. Khanmohammadi, M. Zandieh, and T. Tayebi, "Drawing a Strategy Canvas Using the Fuzzy Best–Worst Method", Global J. Flex. Syst. Manag., vol. 20, no. 1, pp. 57-75, 2019.
[http://dx.doi.org/10.1007/s40171-018-0202-z]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy