Author
Listed:
- Conghuan Ye
(School of Information Engineering, Hubei University of Economics, Wuhan 430205, China
Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan 430205, China)
- Shenglong Tan
(School of Information Engineering, Hubei University of Economics, Wuhan 430205, China
Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan 430205, China)
- Jun Wang
(School of Information Engineering, Hubei University of Economics, Wuhan 430205, China
Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan 430205, China)
- Li Shi
(School of Information Engineering, Hubei University of Economics, Wuhan 430205, China
Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan 430205, China)
- Qiankun Zuo
(School of Information Engineering, Hubei University of Economics, Wuhan 430205, China
Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan 430205, China)
- Bing Xiong
(School of Computer and Communication Engineering, Changsha University of Science & Technology, Changsha 410114, China)
Abstract
The widespread distribution of medical images in smart healthcare systems will cause privacy concerns. The unauthorized sharing of decrypted medical images remains uncontrollable, though image encryption can discourage privacy disclosure. This research proposes a double-level security scheme for medical images to overcome this problem. The proposed joint encryption and watermarking scheme is based on singular-value decomposition (SVD) and chaotic maps. First, three different random sequences are used to encrypt the LL subband in the discrete wavelet transform (DWT) domain; then, HL and LH sub-bands are embedded with watermark information; in the end, we obtain the watermarked and encrypted image with the inverse DWT (IDWT) transform. In this study, SVD is used for watermarking and encryption in the DWT domain. The main originality is that decryption and watermark extraction can be performed separately. Experimental results demonstrate the superiority of the proposed method in key spaces ( 10 225 ), PSNR (76.2543), and UACI (0.3329). In this implementation, the following key achievements are attained. First, our scheme can meet requests of different security levels. Second, encryption and watermarking can be performed separately. Third, the watermark can be detected in the encrypted domain. Thus, experiment results and security analysis demonstrate the effectiveness of the proposed scheme.
Suggested Citation
Conghuan Ye & Shenglong Tan & Jun Wang & Li Shi & Qiankun Zuo & Bing Xiong, 2025.
"Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images,"
Mathematics, MDPI, vol. 13(2), pages 1-24, January.
Handle:
RePEc:gam:jmathe:v:13:y:2025:i:2:p:182-:d:1562378
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:13:y:2025:i:2:p:182-:d:1562378. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.