Survey on Reversible Watermarking Techniques of Echocardiography

In critical domains such as medical and military, reversible watermarking (RW) has been used. In the medical domain, different modalities are used to store patient information. *e current study focuses on the application of RW in echocardiography data. Mostly, RW is applied to protect patient data without affecting the quality of the decoded image. *e RW methods are benchmarked as per imperceptibility, robustness, and payload. *e survey presents a comparison of state-of-the-art RW techniques. *e imperceptibility and payload are balanced through a tradeoff. It has been observed in the literature that most of the RW methods lack robustness, and very small-scale robustness has been achieved in this domain of watermarking. Different types of RW, i.e., fragile, semifragile, and robust methods, are being compared and reviewed. Mostly, fragile methods are developed on the error-expansion techniques built on histogram shifting-based approach. In this study, several RW methods are compared and the results are presented.


Introduction
Medical imaging (such as echocardiography and ultrasonography) holds vital details about the patient. Echocardiography with its different flavors is eminent for rendering information regarding the size and shape of the heart, identification of cardiological risks, pumping capacity, and location and severity of tissue damage [1][2][3]. e information comprised by these modalities is outstandingly critical that makes it very challenging for video processing and image processing. It ultimately results in a strong urge for lossless and robust data hiding for such data processing [4,5].
Continuous advancements in technology have done a marvelous job transforming every facet of human life, and the quest for further improvement and technological advancement is perpetual. Computer technology, with all its power, has shrunk into palms with the advent of smartphones and other handheld devices.
is has completely revolutionized the communication and data processing domains with an ever-increasing data transfer volume. In the information technology jargon, this transfer could be broken into Store, Retrieve, and Transmit. One of the biggest beneficiaries of this transformation is the medical domain which has benefited tremendously over the years with the innovations in information technology. Health information technology (HIT) has gained popularity, and many health institutes are exploiting information technology for storing patient's information.
is electronic medical record (EMR) holds complete information about a patient's current and past ailments, laboratory test data, medical imaging results, diagnosis, and drug information, etc. All these data can be transformed into a single database that can be stored, accessed, and transmitted to other medical institutions as per requirement.
is encourages a paperless environment and enables different stakeholders to access complete information about the patient with a single mouse click.
is digitization of medical records potentially poses a threat to the data integrity from both intentional or unintentional changes and misuse which has increased the tendency of attacks on digital data [6]. Manipulation, unauthorized access, deletion, and distribution of medical data are increasing [7,8]. Patient data theft crimes are on the rise, and this can have a severely adverse effect on the efficacy of telemedicine and E-health applications [9,10].
Although techniques like DICOM (Digital Imaging and Communications in Medicine) mitigate many of these risks that arise during transmission of digitized medical data, the overhead of extra information makes it a lesser candidate if the same is to be transmitted over public networks or low bandwidth connections [10].
All the data protection techniques such as cryptography, steganography, and watermarking, etc., have their own advantages, but for authentication of medical data [11], watermarking has been the most popular and robust technique adopted [12]. A digital identification mark or message is embedded into the cover medium, i.e., the digital medical data like images, videos, text, etc.
is not only secures the data authenticity but also nullifies any ownership disputes [8,12,13]. When used in conjunction with cryptographic techniques, digital watermarking provides a highly resolute solution against data tampering [10]. Another perk is that it is a well-established research area and the application spans over various prominent areas such as broadcast monitoring. erefore, a lot of research onus has been towards the medical image and video watermarking to secure the communication of highly confidential patient data. Modern data hiding techniques and their application classification are shown in Figure 1. A general framework of the digital watermarking technique for medical images is presented in Figures 2(a) and 2(b). e data embedding process requires a cover image, digital watermark, and a noncompulsory secure key. e output of this embedding function will be a watermarked image that can be transmitted or stored as per requirement. When the watermark is extracted, the encoding process is generally performed in a reverse order to extract the embedded data. ese data are subsequently used to authenticate the original content and for tamper detection [15,16]. An efficient watermarking system must ensure certain attributes that are pivotal in ensuring data security. ese parameters or attributes are generally conflicting and require a certain degree of compromise made between them by the watermarking algorithm [9]. e four major characteristics are capacity, security, perceptibility, and robustness. In this paper, we aim to review reversible data hiding techniques which are being utilized for hiding information in echocardiography (ultrasound) for the security of healthcare systems.

Literature Review
In 2019, Kaw et al. [17] submitted an RDH scheme using optimal pixel repetition for securely hiding information. It results in a histogram invariant stego image. High robustness is achieved from statistical attacks due to histogram invariance. PSNR acquired after experiments is 42 dB for 1.25 bpp payload by applying the scheme for X-ray.
In 2018, Geetha and Geetha [18] proposed a scheme for hiding data utilizing expansion on prediction error on image points obtained by integer-integer wavelet transform (I-IWT). Subbands are used in this technique for employing I-IWT, and embedding of secret bits is done on subbands. 52.6 PSNR is obtained for 75285 bpp payload for an X-ray image.
In 2020, spatial domain-based method was proposed by Dutta et al. [19] for watermarking. By exploiting spatial redundancy of vastly correlated pixels, this technique achieved robustness and visual quality. Accurate reversibility is demonstrated even in error-prone transmission channels. Parah et al. [20] purposed a reversible and high capacity system that utilized the pixel repetition technique.
e proposed system has the capability of detecting tampering by using Block Checksum Embedding. Experiments were carried out on CT scans and witnessed an average of 46 dB PSNR as an output for a 1,96,608-bit payload.
Bhardwaj and Aggarwal [21] proposed an encrypted RDH algorithm based on hierarchal absolute moment block truncation coding. Hierarchical AMBTC is used to obtain a  table having a high mean, low mean table, and bitmap sequence table. Encryption is done at a first place through a homomorphic-based cryptosystem, and then, every grey pixel having a high mean table is utilized for data embedding. In addition to that, each pixel having tables with low mean and bitmap sequence (except zero (0) value) is utilized in the embedding process without any underflow or overflow issue. Investigational outcomes showed that the proposed method was performed possessing a peak embedding rate of 1.80 bits per pixel and 49.89 dB PSNR value. Geetha and Geetha presented the RDH technique with high embedding capacity without degrading the quality of the cover image [22].
Interpolated points of the cover image are predicted by employing the Rhombus Mean Interpolation technique. For the discovery of tampering and authenticity of the content, the patient's data as secret information along with checksum for the nonoverlapping of 2 × 2 pixel block are inserted. e results for the CT scan depicted that 42.398 dB PSNR achieved 1.5 bpp payload.
In 2014, Acharjee et al. [4] proffered the technique of watermarking for echocardiograph video. After computing the motion vector of two adjacent frames, the image is watermarked. Results showed SSIM between the original and restored frames (2)(3)(4)(5)(6) was between 0.9902 and 0.9943 whereas PSNR of the original and recovered frames for the same number of frames was between 163.95 dB and 165.23 dB.
Dey et al. proposed a DWT-DCT-SVD-based technique for watermarking intravascular ultrasound video [23]. Watermark embedding is achieved by splitting IVUS video into frames and with the employment of discrete wavelet transformation (DWT) along with discrete cosine transformation (DCT) followed by singular value decomposition (SVD). e extraction process involved the application of inverse of both DWT and DCT along with SVD. e assessment of the proffered technique is done through PSNR along with the correlation coefficient. 50.8122 PSNR achieved between the original IVUS video and watermarked video, and the correlation coefficient was 0.9990 between the original and watermarked video. e reversible watermarking technique was presented by Fadoua and Hamid [24] for the security of medical video. Patient identity is embedded into the host video, for that matter polynomial transform methods were utilized for the identification of optimal frames in each video shot. After experimentation average, PSNR and NC obtained are 61.4394 and 1.0000, respectively, for the frame size 120 × 120.

Methodologies
In this section, three types of watermarking techniques are discussed, i.e., spatial domain, frequency domain, and hybrid domain methods. ese methods are mostly classified into fragile, semifragile, and robust techniques. In Table 1

Security and Communication Networks
LSB modification for watermarking the medical images [25]. Liew's design-based technique [26] used in this paper in terms of original LSBs is embedded in the region of interest by utilizing run-length encoding. Jasni's scheme [27] for temper detection and watermark recovery is also the base of this technique. Synopsis of the technique is presented as follows.
(a) Image preparation: for experimentation, images of ultrasound (8 bit) with a resolution of 640 × 480 pixels are used.
e image is segregated into RONI and ROI. For temper detection and recovery, ROI is utilized for watermarking. RONI is utilized for embedding the original LSBs for the reversibility of the watermark. For generalizing, the static sizes of samples of ROI along with RONI are used as demonstrated.
e red rectangular region depicts the ROI in Figure 3. For achieving the best precision of temper localization and better quality of the recovered image, smaller block size of 6 × 6 is used instead of 8 × 8. A mapping (A ⟶ B ⟶ C ⟶ D ⟶ . . . ⟶ A) sequence prepared for subjecting ROI to embed watermark is one to one block mapping, and a specific block is denoted by each symbol. Information for the reconstruction of every previous block is injected in the adjacent next block [27].
where k denotes the prime number and N b is the representation of total blocks that exist in ROI. A distinct integer 1, 2, 3, . . . , N b as B is allocated to each ROI block. Raster scan {left-right top-bottom} is utilized for the allocation of a number to every block. After that, RONI is split into 6 × 1 pixel blocks. e compression of actual LSBs is done by applying RLE, and a block in the region RONI is then utilized for embedding the resultant package of RLE.
(b) Watermarking procedure in ROI: the watermarking technique is based on Jasni's scheme [27] with a block size of 6 × 6 pixels in ROI. Ahead of inserting the watermark, the native LSBs are removed and each one is set to zero. Each 6 × 6 block is segregated further into 3 × 3 pixel subblock. For every single subblock, a watermark of 3 × 3 bits consists of an authentication watermark of a 2-bit and recovery watermark having 7 bits (r).
Create a watermark v for every single subblock after calculating the average intensity of block (Avg_B) and its subblock (Avg_Bs) as v � 0, if AvgBs > Avg B , e watermark p is generated as v � 1, if Avg Bs is odd, e watermark (v, p, r) is then embedded for every single subblock in its LSBs as illustrated in Figure 4.
(c) Embedding in the RONI: the actual LSBs are stored in RONI after compression. ese stored values are then used for the image restoring process. Removed LSBs are depicted as a 640 × 480x1-bit binary LSB matrix. For achieving higher embedding capacity, an RLE-based compression is used. A matrix having LSBs is split into 3 × 3 bit LSB blocks first, and then, all the bits of the block are converted into decimal according to the demonstration mentioned in Figure 5. e decimal value range is 0-511(9 bits). An acquired collection of converted values of every single LSB block is then subjected to a raster scan, and obtained data run is then utilized as an input of RLE. e result of the RLE process will be a package containing the run value (RV) and run count (RC).
Each 12-bit RLE package of injected into 6 × 1 pixel block in the RONI. RV range is 511, so 9-bit storage is required whereas RC is limited to 7, for that matter only 3 bits are required. A complete scheme for the RLE package having 12 bits in RONI is depicted in Figure 6.
Established from the experiments, second LSB (LSB 2) needs to be used to avoid storage issues and embedding all the RLE packages in RONI.
(d) Identification of tamper and recovery: the presumed image is decomposed into RONI and ROI and ROI is split into 6 × 6 pixel block. Each block of ROI is then further Fragile e fragile methods are mostly used in application where content authentication is desired. Detection of forgeries/ tempers, unauthorized processing, and transmission is carried out using fragile methods of watermarking.

Semifragile
Application which has privacy constraints along with content authentication uses semifragile methods.
Robust e method of watermarking is used in situation where protection of copyright and digital rights management is desired. ese kinds of watermarks survive malicious/nonmalicious attacks on the marked media. divided into subblock of 3 × 3 pixels. As proposed in [27], for every subblock, parity bit p and authentication bit v will be extracted. After adjusting the block's LSBs to zero, calculate the average intensity of block (Avg_B) and its subblock (Avg_Bs). Populate the parity bit p ′ and authentication bit as v ′ and compare these bits with the extracted bits p and v for the authentication of the block whether it is tempered or not. Tempered blocks will be revived by spotting recovery blocks utilizing the continuous pattern of the mapping which is utilized in the preparation of the image. As illustrated in Figure 7, let A be a block that is tempered. For the recovery of the block, information embedded in the block B will be used. For every single subblock in A block, substitute 7-bit MSB containing recovery data acquired from its corresponding subblock in the block B.
(e) Restoring the actual LSBs: after splitting RONI into 6 × 1 pixel block, the block of RONI which is utilized for injecting each RLE package will be extracted and decoded as shown in Figure 6. A collection of decimal values in the range of 0-511 will be obtained after decoding RLE. Each decimal value will be transformed into a binary number of 3 × 3 × 1 bits. is whole procedure is opposite to the one illustrated in Figure 6. A matrix containing 3 × 3× 1 bits will be the 3 × 3 pixel block's LSBs. After dividing the image into 3 × 3 pixels block by using a raster scan, each 3 × 3 × 1 bit LSB is then restored to each block of the image. e second LSB used to embed RLE packages cannot be restored because that was not stored. Due to one of the qualities of ultrasound that nearly every pixel value of RONI is depicting black having value zero, the second LSB is set to zero for every pixel with a value less than 3 to boosting the PSNR of the recovered image. For the case of ROI, it can be claimed that every pixel is reversible. MATLAB is used for the implementation purpose to evaluate the watermark reversibility as well as to spot the tamper and repossession of the image. . Figure 6: Embedding of an RLE package into a RONI block [25].

Security and Communication Networks
Results illustrated the PSNR of the watermarked image is above 46 dB which means that the technique can originate watermarked images with lower deterioration and identical to the actual.
From the reversibility point of view, the results depicted in Figure 8 show that the technique is reversible for that region which comprises the ROI, but the RONI-acquired image is close to the original due to the inclusion of the second LSB. Temper detection results showed that the scheme performed 100% for temper localization whereas for sharpening attack it performed 99%, and for brightness and contrast adjustment attacks, the performance was between 60% and 98%. Recovery performance was 100% in terms of recovery and PSNR for the area <20%. For the manipulations containing sharpening adjustments, brightness adjustments, and contrast adjustments, the recovery rate was low (6%-48%). Further improvements are desired to make this scheme completely lossless for a wider range of attacks.

ROI-Based Tamper Detection and Recovery for Medical Images Using Reversible Watermarking Technique.
Al-Qershi and Khoo [28] coined a technique comprised of difference expansion for reversibly embedding watermark in ultrasound images. Embedding is done into changeable and expandable groups, and difference groups are distinguished by the location map.
is technique can be utilized for hiding information related to the patient, authentication of ROI, locating the area tempered inside the ROI, and recovery of the tempered regions. After splitting the original image into ROI, RONI, and border regions, RONI is used for embedding payload through 2D-DE. e location map is generated which is then used at the extraction phase. e payload is the combination of the following: (a) Patient's information (b) ROI's hash message for authentication (c) ROI pixels for locating tempering (d) Recovery along with the LSBs of pixels located border of the image (a) Embedding phase: (i) After decomposition of the image into ROI, RONI, and border (ii) By utilizing the MD5 algorithm a hash message "H" is computed for ROI after dividing it into 16 × 16 pixels (iii) Bits of ROI pixels "P" and LSBs of border pixels "L" are collected (iv) e patient's information "D" is appended in these collected bits "P" and "H" along with the hash message "H" (v) After the concatenation of bits in the previous step, the payload is formed by compressing string through Huffman coding (vi) RONI is utilized to embed payload in it using (vii) e location map generated is then appended with the coordinates of ROI and after compression embedded in border pixels LSBs e proposed technique is experimented using four DICOM images shown in Figure 7 having different sizes of the ROI and distinct data sizes of patients.
Reversibility can be assessed with the help of pixel-bypixel comparison of the original and recovered image whereas tempering can be located by the comparison of hash values collected at the embedding phase and extraction phase.
Temper detection and recovery were demonstrated by replacing some pixels from RONI with pixels in ROI. During extraction, the scheme successfully located the tempered region and recovered area which is shown in Figure 9.
e embedding results with variant sizes of ROI and patient's data sizes are illustrated in Table 2.
Results illustrated that technique performed well with regard to PSNR, increased capacity of embedding, and reversibility in case of no major tempering. e abovementioned technique performed very well in terms of higher hiding capacity as well as visual quality by utilizing hiding techniques that provide higher embedding roam to compensate for the issues of ROI size and image size. Further improvements in terms of multiple-ROI concept can also be incorporated for facilitating medical informatics.

Harris Corner Detection and Fuzzy C-Means.
In 2013, Debalina Biswas proposed a method that uses a clustering method for the recognition of the pattern known as fuzzy c-means (FCM) [30]. In this technique of clustering, one set of data can belong to two or even more than two clusters. It also permits the data when they belong to more than one class; then, its membership function degree will vary between 0 and 1.
ere is a rare advantage of the FCM that linguistic variables can be grading based on pro-rata data and after the accurate analysis fit easily in the domain of the discrete. FCM uses an iterative approach to reduce the function of the dissimilar and computes the centers of the cluster. After updating, the centroid within the pixels set will be shifted to the right location. e membership matrix, u ij is used for the membership degree for the points of data of x i cluster which starts from performance index (PI) which is used for the center of cluster and matrix of membership is provided as given below: Euclidian distance (d ij ) is between the data point and the center of the cluster. e weighting exponent is m which belongs to [1, infinity]. ere are two conditions which can be used to reduce the function of dissimilarity given below:  n/a n/a n/a n/a n/a n/a n/a n/a n/a 12% 190,912 0.622 38.10 n/a n/a n/a n/a n/a n/a second image source. Following is the execution of the alpha blending: pixel � alpha * (source pixel of first image) +(1 − alpha) * (source pixel of the second image).
For the blending of the images, the blending factor is taken from the first image that is why it is known as alpha blending [31,32]. e range which is used for the alpha in the algebraic is between 0.0 and 1.0. Using this technique, watermark is generated which is given as follows: where WII is the watermarked image, CI is the selected image, and WI is the selected equivalent image. e output of the process is shown in Figure 10.
(c) Embedding process of watermarking: in the embedding process of watermarking, the grey medical image segmentation is applied using fuzzy c-means. en, the binarization is employed on the image. From the image, which is binarized, an open binary area is used to clean the smaller objects. For the detection, Sobel edge is employed.
en, the algorithm of Harris corner detection [33,34] is practical. e maximum diameter is taken, and based on the points of Harris, the center is calculated. e boundary is marked between the region of the noninterest (RONI) and region of interest (ROI) based on the circle which is drawn on the diameter and the center point. Watermarked image size is used to select an area from the RONI. e alpha blending technique is used to embed the watermarking on the area which is selected.
(d) Discussion and results: for the study of the effect of watermark embedding on the medical images, results were compiled and shown in Figure 11.
Section of RONI is exploited for the insertion of the watermark using the alpha blending technique shown here.
(e) PSNR applied on the signal of watermark: PSNR between the watermarked MRI image and the original image is 28.8255, and PSNR between the watermarked IVUS image and the original image is 23.504.

Protection of Ultrasound Image Sequence: Employing
Motion Vector Reversible Watermarking. With the induction of new techniques for medical imaging, the diversity of imaging modalities has increased twofold. Every modality has its own requirements for a reversible watermarking strategy to be employed for data safety for HIS. In 2019, Habib and Al-Fayez [36] presented an approach for digital security of ultrasound imaging videos or image sequences using motion vectors. Motion vector prediction is a popular technique in video compression and utilizes a comparison between two images or frames for providing data compression at the encoder side.
is is a very promising and computationally inexpensive (when large blocks are used) method for videos and image sequences that have a low relative motion rate between frames such as ultrasound imaging. e proposed methodology, after a histogram preprocessing stage (to minimize overflow/underflow), subjected the image sequence to a full search block-matching algorithm (BMA) with a 16 × 16 block size. e magnitude of the calculated motion vector designated as MV i,j , where I is the i th frame and j is the j th motion vector of the frame, is used to define an embedding threshold value. ese horizontal and vertical magnitude values MV H and MV V of the motion vectors, selected on the basis of the threshold value, are used to calculate the phase angle using θ � tan − 1 (MV V /MV H ) which is subsequently used for data embedding.
e side information about the frames that were calculated during histogram modification and motion estimation is also embedded alongside the watermark. is ensures accurate data extraction at the decoder/extraction side and increases the robustness.
e authors have been able to achieve infinite PSNR between the sending and receiving side images, meaning both were identical after data extraction. PSNR value of the original versus the watermarked image was around 41 dB with an SSIM of about 0.92. e maximum embedding capacity achieved was 0.29 bits per block, and the ratio of side information to the watermark data was about 1.65% which is highly promising. e downside, as mentioned by the authors, is the applicability of the algorithm being limited to large block sizes only as reducing the block size not only increased the computational overhead but also involved adding large amounts of side information data mandatory accurate retrieval.

A New Approach to Fully Reversible Watermarking in Medical Imaging with Breakthrough Visibility Parameters.
Ale�sat et al. formulated a reversible scheme for watermarking of medical images based on the alloying advantages of different three conventional approaches-zero, reversible, and RONI watermarking [37]. e basic purpose of combining different approaches is to eradicate the disadvantages and exploit the strengths of the approaches. e input media is split into different two categories RONI and ROI; RONI is the zone of the image where minute variations do not affect the medical information as a whole. Area, other than RONI, falls under the umbrella of ROI. e identification of RONI is based on the pair's comparison of neighbor vectors where vectors consist of the pixel's values of rows along with columns. A comparison between neighbor vectors is made in each direction. A threshold is used to differentiate between the boundary of ROI and RONI. For experimentation for this technique, the defined threshold has 10% similarity based on the different tests [38]. e sample utilized for experimentation purposes in this study contained RONI of size 11%.
(a) Watermark concealment. 10 Security and Communication Networks (iii) Determine the arithmetic average of coefficients (∅ LL ). (iv) e random location of pixels comprising the same number of pixels as a watermark is identified in the LL coefficient region. Locations must not be too close to the edge of the image. (v) Let R i (x, y) be the i th random location, then neighboring region comprising 7 × 7 pixels is elected by placing R i (x, y) at the center. (vi) A feature image F equivalent to watermark size. e average of neighboring 7 × 7 block selected for the i th random location must be equal to the individual averages of feature image F. e following formula is utilized to create matrix B from feature image F: where ∅ LL is the arithmetic average of LL band coefficients. (vii) A secret share is generated which is used as a watermark to RONI by combining matrix B and a watermark as shown in Figure 12.
(i) Region of noninterest and region of interest of the image which is watermarked are isolated. (ii) LL subband of coefficients is selected after the DT-CWT transformation with RONI. (iii) e same seeding process would be repeated with the help of secret key S for the generation of the same random pixels within the LL region as in the embedding process. (iv) For each R i (x, y) location, by keeping R i (x, y) at the center and selecting the neighbor 7 × 7 pixels, the average is obtained. (v) is value is utilized at the time of feature image which must be of the size of the inserted watermark. (vi) e feature image is then used to create binary matrix B from the same formula used in the concealment process. e public share will be generated by the combination of the binary matrix B and Figure 13. (vii) For the extraction of watermark, logical OR operation is performed created in the present process with the undisclosed share and free share. (viii) e utilization of the process depicted in Figure 12.
Reduction of watermark than its actual size.
Reversible contrast mapping is utilized for the reversible watermarking. RCM utilization required segmentation of the image into a group of two pixels called pairs. For the transformation, pairs are utilized: However, (x, y) are the original and (x ′ , y ′ ) are the values that are transformed. To avoid the underflow overflow, put a limit on the transformation subdomain.
(c) Watermark embedding.  For examination purposes, experiments are performed using 6000 selected medical images from the database which contains 60,000 medical images [38]. Test images consist of 9 different modalities including ultrasound. e average PSNR obtained is 81 when the RONI size was 10% of the original image. e average SSIM obtained is 0.999974. For extensively testing the proposed technique, it can be tested on a larger medical database.

Detection of Accurate Tamper in Region of Interest.
In 2014, Eswaraiah proposed a watermarking technique for medical images [5,39,40]. In the medical images in the form of different shapes, there is an area of the region that is of no interest to the physician. In this work, those medical images are considered which contain a single ROI. e border of the image is the pixels outermost three lines. Pixels are divided into three respective sets: pixels of ROI, pixels of border, and pixels of RONI. For authentication purposes, SHA-1 technique is used to calculate the ROI hash code. Any kind of change in the code of hash will be quickly identified. Areas of medical images ROI are divided into 4 × 4 blocks and those of RONI are divided into 8 × 8 blocks, so they do not overlap. Now the ROI blocks are plotted to the RONI blocks. is is done to embed the information to be recovered. e following equation is used: Lastly, the ROI information and value of hash are implanted into the pixels of border LSBs.
(a) Algorithm for the embedding: medical images are divided into sections of 3 which contain pixels of region of interest, pixels of border, and pixels of region of noninterest. SHA-1 technique is used to calculate the ROI hash value. ROI area is divided into the blocks of 4 × 4. RONI is divided into the blocks of 8 × 8. Map each individual block of ROI on the area of RONI. In this way, the data to be recovered are embedded. Secret key ROI information and the value of the hash are used for encrypted. Pixels of the border are used for the bits of encryption to be embedded. Now the medical image can be sent to remote locations.
(b) Algorithm for the extraction: pixels of the border are used for the encryption bit extraction. Decryption is applied to get the ROI information and value of the hash. SHA-1 technique is used to calculate the value of the hash of ROI. Both values of the hash will be compared, and if the values get equaled, the process of extraction will be stopped. ROI is divided into the blocks of 4 × 4 and RONI into the blocks of 8 × 8. For each block of ROI, steps are repeated so that the block of ROI which is tampered will be identified. e value of variance and average for each block will be calculated. If both variance and the average value of the blocks are not equaled, it means it is tampered and replaced with the pixel bits.

A Novel Texture Quantization-Based Reversible Watermarking Scheme for Information Health Systems.
In 2017, Turuk and Dhande [41] presented a novel approach for making transactions of information via health information systems (HIS) more secure. An argument in the favor of digital watermarking is a promising solution aptly suited for securing HIS data from sniffing and snooping by unauthorized users. e proposed novel approach used a hybrid method that utilized a combination of image quantization and its texture treated as a feature to hide patient data segmented into multiple watermarks. e preliminary feature extraction was done using a discrete wavelet transform (DWT) with a "HAAR" mother wavelet, and further quantization approach for transform coefficients was presented by the authors which were the most noteworthy contribution. e proposed method first used a level 2 DWT to find the downsampled coefficients from the cover image, as depicted in Figure 14. As DWT is very effective in segregating the textured areas and edges, it provides a good basis for improving the imperceptibility of the watermark addition. Figure 15(a) shows an example of the level 2 DWT being applied to a CT modality image. To increase the robustness, the energy of each decomposed subband was calculated using the following equation: where k points to the approximation and subbands at a certain decomposition level while J k is the subband coefficient of dimension N k M k . A texture map was generated by obtaining a relationship between the spatial change and the energy variance by combining coefficients of the lowest matrix of the subband (LL) with the energy as given below: is texture map is used to calculate the threshold value to preserve the most prominent edge features and texture details. Based on this threshold value, all subbands apart from LL are used to embed the watermark data. As wavelet coefficients obtained are real numbers, their mapping to binary watermark data involved a quantization function Q(f ) and its variation was defined as follows: where Δ � 2L in which L is the decomposition level. As the same constant value is being added and subtracted, to ensure data integrity, a tracking key was used to signify the coefficient sign change and duplicate coefficients. Watermark data were created using the BCH errorcorrecting code which ensures data integrity. In the experiment, the watermarked data were performed which comprised of a caption, an ECG signal, the physician's electronic signature, and ICD-10 diagnostic data. e researchers were able to embed a maximum of 22,600 bits

Security and Communication Networks 13
with a PSNR of 53.60 along with encouraging numbers for both MSSIM and UIQI. is was a major improvement considering the contemporary methods and made this research a major contribution to reversible medical image watermarking.

A Hybrid Cryptography-Based Watermarking Technique for the Secure Transmission of Medical Data for Telehealth Applications.
akur et al. [43] presented an approach employing a hybrid cryptographic-watermarking methodology for the applications of telehealth. Logistic maps, which were initially employed for modeling animal populations, have been extensively studied as an effective cryptographic tool as they provide pseudorandomness and chaotic behavior. e researchers used two-dimensional logistic maps to encrypt the watermarked host image enabling secure transmission/communication.
In a bid to improve imperceptibility, the authors used a combination of three transform domain techniques, i.e., DCT, DWT, and SVD, on the host image. e watermark image was subjected to DCT and SVD only to get a singular matrix S1. In the first step, a 2 nd level "Haar" DWT is performed on the host image resulting in the approximate image (cA1) and the coefficient matrices. cA1 is further transformed using DCT and the resulting matrix is singularized using SVD (matrix S). SVD matrices are used for watermark embedding (based on gain factor α), and inverse DCT and DWT are performed to get the final watermarked image. e inverse resultant matrix of DCT was then obtained.
(a) e host image which is of size 512 × 512 read as Cw image and the image which is watermarked of size (256 × 256) read as WM image (b) Utilize the second level of DWT on the DWT cover (c) Utilize DCT which will provide B (d) Utilize the SVD on B which provides S (e) For the image of watermark, utilize DCT on WM image to provide D (f ) Utilize SVD on the D which will provide S1 (g) Using the gain factor, embed the watermark image in the cover; now utilize the inverse of DWT, the inverse of DCT, and the inverse of SVD to get watermark with the cover image (h) Using private key, encryption is applied to the Wd image e time of encryption and decryption of the proposed method and survival against different attacks were tested in the experiments, and all parameters and the results were highly promising for the proposed method. NC, SSIM, and PSNR were greater than 74.61, 0.998, and 0.900 dB, respectively, which proved that the proposed method is a highly secure and robust methodology for telemedicine applications. In the start, the MRI image of the brain having size 512 × 512 and the size of the part of the body between the neck and abdomen 256 × 256 is taken as cover and watermark image, respectively. e proposed algorithm is implemented using MATLAB R2013a on a 64-bit machine having a Core-i5 processor and 4 GB RAM.

A Novel Robust Reversible Watermarking Scheme for
Protecting Authenticity and Integrity of Medical Images. In 2019, Liu et al. [42] presented a technique for protecting medical imaging content from tampering. e methodology was based on an improved ROI-and RONI-based reversible watermarking technique that ensured the integrity of both regions and avoided the spatial segmentation of the image. e watermarking scheme consisted of four major proposals for improvement. e first was slantlet wavelet transform-(SWT-) and singular value decomposition-(SVD-) based reversible watermarking method which provided watermark robustness which ensured the lossless recovery of both ROI and RONI. e second generation of the watermark is based on a combination of integrity and authenticity data for increased image security.
is included the hash value of the hospital logo as the validity of data and the information of tamper detection for both the image and the ROI. irdly, a grouping of integer wavelet transform (IWT) and block truncation coding (BTC) was used for encoding tamper recovery data of ROI which offered a great compromise between the recovered visual quality and embedding capacity. Finally, there was no image segmentation in the domain of spatial and watermarks embedded in the whole image which mitigated any additional security risks.
Watermark generation consisted of a generation of authenticity data (SHA-1 hash of hospital logo), tamper detection (SHA-1 hash of image), tamper localization (CRC-16 based error-checking of ROI), and tamper recovery information. e watermark was embedded using SWT which offers better spatial and frequency localization as compared to DWT and hence better imperceptibility versus robustness results. An added layer of SVD, which was utilized for selecting the significant (from the generated singular matrix) values for watermarking, reinforced the watermark robustness.
e authors performed experiments on various image modalities that included 200 medical images and 40 each of X-ray, CT, ultrasound, and fundus images. All the experiments demonstrated high levels of imperceptibility with an average PSNR of 41.2995 and SSIM of 0.9607. e robustness of the scheme was also commendable as the average of the mean BERs of all experiments was 0.0476, and NCCs were 0.9624. e scheme also performed better than the spatialdomain methodologies when subjected to various attacks.

Spiral Order Technique Reversible Watermarking.
In 2018, S. Lakshmi and Ayyappan [44] proposed a method of data hiding which is reversible in nature in the medical images using spiral order. e order of traversal is depicted in Figure 16. It is suitable to use for images that are confidential in nature as the patient data are very important to hide the data in the medical images using this technique. In the grayscale image, there are no data present in the region of the background, and to hide the data, this region can be utilized. For the embedding of data modification, a histogram is utilized, and to hide the data, spiral order is applied.
(a) Using spiral order to hide data: the cover image is read first for the hiding of data and then spiral order is used to convert it into the form of a vector. To hide the information, positions are identified first. ere are four stages involved: take the first row from the rest of the rows, the last column from the rest of the column, the last row from the rest of the rows, and the first column from the rest of the columns.
e results of the technique are presented in Figure 17.
(b) Modification through histogram: the difference between the adjacent pixels is calculated. It will be close to zero as these are closely packed. e high point will be the most occurred value of difference. In three ways, pixels are altered depending on the difference value how much it is above or below the high point.
(c) Recover the information: the bit of text can be extracted using the following equation: e values of the pixels of the image were originally reconstructed using the following equation: (d) Experiments and results: PSNR and MSE are the performance metrics to be applied to the medical images. To check the similarity among the images, SSIM is used. Improvement in the results with the proposed method is shown as follows.

Hybrid Estimate Reversible
Watermarking. In 2018, Fatima proposed estimate-based hybrid reversible watermarking [44] in the domain of medical images. It is a fourstep process that contains cover image, processing of the images, encoding using watermarking, and lastly decoding using watermarking.
(a) Encoding using watermarking: break the original image which consists of four phases in encoding through watermarking. e image is taken as input and then it is further divided into subblocks of 8 × 8, and for each individual block, representation of four phases is used. A predictor of three different types is utilized for the expected value of the pixel. A window of 3 × 3 is used in both perpendicular and parallel directions so that the initial position of the pixel varies. Pixels in the neighboring are used for the variance calculation, and as a result, predicted values are found out. To improve the quality of the results, projected error is also calculated.
(b) Utilizing sliding window four-stage representation: taking two as the size of the step, the window glides through the image cover. e center value of the pixel is to be projected. e context of projection will include eight values of adjacent pixels. e projection will be accomplished by using eight values of adjacent pixels to calculate the variance. Projection values in the range are found out and replaced with the value of a pixel in the center.
(c) Division of the image using four stages: blocks are divided into 8 × 8 of the image which is taken as input, and on each individual phase, hybrid prediction is applied to find out the pixel projection value. 8 adjacent values of pixels are used to compute the variance which is used to find out the  Figure 16: Spiral order technique [8].  value of projection. e procedure is repeated for the rest of the blocks. Encoding and decoding are done on the phases. (d) Hybrid projection: the reason to use hybrid projection is to lessen the distortion in the image which occurs owing to reversible watermarking. Here, the position is found out to embed the watermark. According to the different adjacent ranges of the variance, three types of projection are used. e projection comes in the range of 0-10 considered as low range of variance, 10-40 as a medium range of variance, and greater than 40 as a high range of variance. Mean projection is utilized for a low range of variance, the trimmed mean projection is utilized for a medium range of variance, and MED projection is utilized for a high range of variance. For the computation of the variance, mean projection is used. For the calculation of the variance, trimmed mean projection uses the 8 adjacent pixel values. For finding the projection value, the mean of the values sorted is utilized. e window is slid over the image to calculate the variance. Change in the context of the projection means the order of sorting is changed in the encoding and decoding. Variance is computed using the following equation: where xi represent the adjacent pixel values and µ represents the mean. To define the projection pixel value of the center, the following equation is utilized: if σ x ≥ 0 and σ x < 10, if σ x ≥ 10 and σ x < 40, All four corners of the window are utilized for the MED projection. KM is the total count of the values when arranged in order of increasing.
(e) Error of prediction: the input image is used for finding the projection value of the image. Projection error is computed between the image original version and the projection image, and when the error is expanding, data will be embedded into the image. e value of the edge is set over the error of prediction and depends on how the edge of encoding and decoding is done.
(f ) Process of embedding: edge values lie in the range of the error of prediction. If the text fits within the range, then the edge values are utilized; otherwise, the values of error projection will be moved left.
(g) Message digest 5 algorithm: for the secure transfer of the data, MD5 has been used which generates a 128-bit value of hash. is value of the hash is represented in the hexadecimal number. Further, this value will be converted into the binary form using LSB embedding. For the secure data transmission, both hash values should be matched the one which is extracted and text bit.
(h) Extraction: a decoder is used to recover the original image and data which were embedded. For the full retrieval of the data, it is important to match the hash values of the extracted data and text bit. e original image is recovered by adding the error of the original projection and the value of projection.
(i) Experimental results: PSNR and the capacity of embedding performance metrics are used for reversible watermarking. Both are inversely proportional to each other. A higher value of PSNR means the quality of the image is good. A medical image of size 256 × 256 is used. Testing is important for the complete recovery of the image. e results are shown in Table 3.

Reversible Watermarking for Medical Video.
Faduao and Hamid proposed the reversible watermarking technique for medical videos by exploiting the polynomial transformation methods [24]. Polynomial transformation methods are used for the identification of suitable watermark regions. e cover video is initially fragmented into keyframes, and subsequently, these frames are shattered into substantial components for opting suitable regions for watermarking.
After selecting the keyframes of individual video shots, their location is persisted in key information K.
Polynomial transform is applied to the selected keyframes to obtain a textured region. After dividing the texture component into 8 * 8 blocks, the watermark w i bit is inserted in k blocks FB i (FB i , . . . , FB k ).
Watermark insertion is done by the following equation: where S is the strength of watermarking. Watermark blocks are used to construct the watermarked texture. Original structure parts and watermarked texture are combined to obtain a watermarked image I w. Similar action with inverse logic is applied for the extraction of the watermark. e watermarked video is divided into shots. Key information K (as provided before) is utilized to determine the keyframe from the individual shot with its location. Polynomial transform was applied to disintegrate the watermarked frame F w into the best regions: watermarked texture. e watermarked texture component is segmented into 8 * 8 blocks to get the altered frame's blocks FB * (FB * , FB * k ). w * i � FB * i /FB i is utilized to compute the new coefficients (w * 11 , w * 88 ). If w * i < 0, then watermark i � 0 bit; else, watermark i � 1 bit, and this way, watermark is constructed.
Two optimized frames as keyframes from individual video shots of echocardiography are used. 512 × 512 is frame size medical video whereas the watermark size is 120 × 120. e vital ingredient for these tests is opted experimentally and fastened on S � 0.1 for this particular technique. Figure 18 demonstrates the sample frame of the original medical video and two watermarks, which are utilized for visual illustration.
PSNR and NC are used for performance assessment of the abovementioned scheme. For shot 1 and shot 2 obtained, PSNR results are 60.1278 dB and 60.4540 dB, respectively, whereas for NC result obtained for the same both shots are 1.0. Hence, the performance of this technique was without exhibiting any apparent variance between actual and watermarked videos. Besides, it addressed the watermark capacity problem as well.
For the evaluation of the robustness of the technique, watermarked frames were subjected to 3 different attacks: JPEG compression, median filtering, and histogram equalization. e techniques illustrated above are compared in Table 4.

Conclusion
In today's era, the protection of the data is crucial to overcome the problems of tempering, integrity, and authentication of data and the rights of ownership. A comprehensive survey of reversible watermarking techniques of echocardiography was presented. e increasing spectrum of a threat to digital security demands consistent efforts for safeguarding data integrity. e intricacy of conflicting performance parameters in data hiding and reversible watermarking makes it difficult to put forth a comprehensive technique. is provides heaps of room for improvements in this field in the near and far future.
Data Availability e detailed results which cannot be included in this article due to the length of the article will be available on the authors' website after the acceptance/publication of the article.

Conflicts of Interest
e authors declare that there are no conflicts of interest regarding the publication of this paper.