当前位置:首页 期刊杂志

A Novel Robust Watermarking Algorithm for Encrypted Medical Image Based on DTCWT

时间:2024-07-28

Jing Liu,Jingbing Li,Jieren ChengJixin Ma,Naveed Sadiq,Baoru Han,Qiang Geng and Yang Ai

Abstract:In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected,a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform (DTCWT-DCT)and chaotic map is proposed in this paper.First,DTCWT-DCT transformation was performed on medical images,and dot product was per-formed in relation to the transformation matrix and logistic map.Inverse transformation was undertaken to obtain encrypted medical images.Then,in the low-frequency part of the DTCWT-DCT transformation coefficient of the encrypted medical image,a set of 32 bits visual feature vectors that can effectively resist geometric attacks are found to be the feature vector of the encrypted medical image by using perceptual hashing.After that,different logistic initial values and growth parameters were set to encrypt the watermark,and zero-watermark technology was used to embed and extract the encrypted medical images by combining cryptography and third-party concepts.The proposed watermarking algorithm does not change the region of interest of medical images thus it does not affect the judgment of doctors.Additionally,the security of the algorithm is enhanced by using chaotic mapping,which is sensitive to the initial value in order to encrypt the medical image and the watermark.The simulation results show that the pro-posed algorithm has good homomorphism,which can not only protect the original medical image and the watermark information,but can also embed and extract the watermark directly in the encrypted image,eliminating the potential risk of decrypting the embedded watermark and extracting watermark.Compared with the recent related research,the proposed algorithm solves the contradiction between robustness and invisibility of the watermarking algorithm for encrypted medical images,and it has good results against both conventional attacks and geometric attacks.Under geometric attacks in particular,the proposed algorithm performs much better than existing algorithms.

Keywords:Encrypted medical images,zero-watermarking,DTCWT,perceptual hash,chaotic map.

1 Introduction

Nowdays,with the promotion of big data and cloud platforms,the use of modern diagnostic tools such as medical images to diagnose and predict diseases is more and more widely in the medical industry.However,the medical image is a special kind of digital image,which contains personal information like the patient's name,gender,age et al.and the medical information carried by themselves that reflect the patients’ health.When they are transmitted over the internet,there exists a security risk of information leakage [Vengadapurvaja,Nisha,Aarthy et al.(2017);Mothi and Karthikeyan (2019);Qasim,Meziane and Aspin (2018)],especially for some patients with special identities.It is urgent to properly handle this problem as soon as possible in order to ensure the security of information transmission and processing [Elhoseny,Ramirez-Gonzalez,Abu-Elnasr et al.(2018)].

Digital watermarking technology is an effective technique of multimedia copyright protection and has been widely explored by researchers since its appearance.However,most digital watermarking algorithms remain in the plaintext domain [Fan,Chao and Chieu (2019);Bamal and Kasana (2018);Thanh and Tanaka (2017);Kavitha,Palanisamy and Sureshkumar (2018);Soualmi,Alti and Laouamer (2018);Rai and Singh (2017)].That is to say,the embedding and extraction of the watermark are done in unencrypted carrier images.As a result,on one hand,the embedding of the watermark must be carried out by the owner of the watermark at the same time to ensure data protection [Thanki,Borra,Dwivedi et al.(2017)].And the embedding and extraction of the watermark cannot be handled by a third party,otherwise,the watermark information could be leaked.On the other hand,since the related operation is performed in the plaintext domain,if the plaintext medical image is intercepted during the transmission process,it is easy to expose the information of the carrier image itself.Therefore,the robust digital watermarking technology of the plaintext medical image can only guarantee the security of the watermark information,ignoring the consideration of the carrier medical images.A medical image is a special type of image that contains a large amount of important information of patients.When applying digital watermarking technology in medical images,the safety of the carrier medical image itself should also be seriously considered[Lakshmi,Thenmozhi,Rayappan et al.(2018)].Performing the above operations in the encryption domain is a feasible solution.

In order to satisfy the requirements of security,integrity and robustness of both watermark and carrier images,the ciphertext domain robust zero-watermark technique can be used.First,encrypt the patient’s plaintext medical image,and invest the obtained encrypted medical image as the carrier image for watermark embedding.After use the privacy information such as the patient’s ID,age,gender et al.as the watermark to encrypt,apply zero-watermark technology to embed into the encrypted medical image.In the process of information transmission,as the watermark and the image itself are ciphertext,on the one hand,the probability of occurrence of the information leakage event can be minimized,on the other hand,the embedding and extraction of the watermark can be handled by a third party.Unlike the digital watermarking scheme in the plaintext domain which embedding and extraction of the watermark needs to be done by the owner of the watermark [Chen,Yin,He et al.(2018)],with the homomorphism of encryption algorithm,watermark and carrier image in ciphertext state can be delivered to a trusted third party [Dai,Wang,Zhou et al.(2016)].The embedding and extraction of the watermark can be realized by utilizing the resource advantages of the third party (such as a powerful cloud server).Compared with the previous plaintext watermarking method,the encryption domain digital watermarking scheme has obvious security advantages.

To implement digital watermarking in ciphertext domain,the image must be encrypted first.In the aspect of image encryption algorithm,more research results have been obtained.Such as Lavanya et al.[Lavanya and Natarajan (2012)] utilized standard stream cipher for image encryption and selecting non-region of interest tile to embed patient data.Xiong et al.[Xiong,Xu and Shi (2018)] used integer wavelet transform to encrypt image.Liu et al.[Liu,Qu and Xin (2016)] divided the medical image into regions of interest(ROI)and regions of non-interest (RONI).After encrypting the image with the secret key,she connected the least significant bit of the encrypted ROI with Electronic Patient Record (EPR)and embedded the data with the LSB replacement algorithm.Bouslimi et al.[Bouslimi,Bellafqira and Coatrieux (2016)] combined Paillier cryptography with quantitative modulation (QIM),inserted pre-watermark into the image before adding it,and used the modified QIM to encrypt the image.Nematzadeh et al.[Nematzadeh,Enayatifar,Motameni et al.(2018)] proposed a hybrid model of medical image encryption method.It takes the number of secure cryptographic images generated by the coupled mapping lattice as the initial population of the improved genetic algorithm.Laiphrakpam et al.[Laiphrakpam and Khumanthem (2017)] coded pure information as elliptic curvilinear coordinates to eliminate the calculation and improved ElGamal encryption scheme for medical image encryption.Avudaiappan et al.[Avudaiappan,Balasubramanian,Pandiyan et al.(2018)] used double encryption method.First verified puffer fish encryption with signature encryption algorithm,then upgraded the private key and public key by the Opposition based Flower Pollination (OFP).Cao et al.[Cao,Zhou,Chen et al.(2017)] proposed a medical image encryption algorithm with large key space and strong key sensitivity of source image edge mapping.Ismail et al.[Ismail,Said,Radwan et al.(2018)] designed an image encryption algorithm based on pseudo-random sequence generation and realized the safe transmission of medical MRI and X-ray images by using generalized DH mapping.

However,the image encryption algorithms that can be used for robust digital watermarking at this stage are not very mature [Laiphrakpam and Khumanthem (2017;Ismail,Said,Radwan et al.(2018)].It mainly has the following problems:Firstly,not all image encryption algorithms can guarantee the robustness of digital watermarks in the encrypted domain.For some image encryption algorithms,the watermark can be extracted after being embedded [Liu,Qu and Xin (2016);Xiong,Xu and Shi (2018);Bouslimi,Bellafqira and Coatrieux (2016)].But under the interference of various watermark attacks such as Gaussian noise,JPEG compression,median filtering,rotation,scaling and translation,the watermark quality is poor,and the watermark robustness cannot be guaranteed.Secondly,in the plaintext domain,although many robust digital watermarking algorithms have been proposed,due to the limitations of encryption algorithms,it will be quite a complex task to transplant these robust digital watermarking methods directly into the encrypted domain,especially in medical images with special requirements for images.

Based on the above reasons,we proposed a robust digital watermarking algorithm for encrypted medical images.It adopts zero-watermark technology,and uses the dual-tree complex wavelet transform and Logistic chaotic map in the encryption domain.A reliable visual vector feature is selected in the encryption domain to embed and extract the encrypted domain watermark.This algorithm enhances the security of the medical image and the watermark.Without any changes to the original image and without decryption,the extraction of the watermark can be completed.With the help of the homomorphic characteristics of the encryption algorithm,the watermark and the carrier image in the encrypted state can be handed in a trusted third party.It not only solves the contradiction between the robustness and the invisibility of common algorithms,but also performs well in resisting conventional attacks and geometric attacks.

2 The fundamental theory

2.1 Dual-tree complex wavelet transform (DTCWT)

2D DWT uses the separation and filtering of image rows and columns,and its twoextraction process brings the defects of translation sensitivity and lack of direction selection,which seriously affects the effect of feature extraction.Therefore,dual-tree complex wavelet transform (DTCWT)is born.Fig.1 and Fig.2 respectively showed the critical sampling of two-dimensional wavelet and the two-dimensional dual-tree complex wavelet and their two-dimensional edge representation.DTCWT adopted the DWT of binary tree structure and used two trees to represent the generated real and imaginary Numbers respectively [Selvakumar,Jerome and Rajamani (2016)].The formula is shown as follows:

Figure1:Critical sampling of two-dimensional images:(a)DWT,(b)DTCWT

Figure2:Edge representation of a two-dimensional image:(a)DTCWT,(b)DWT

When transforming,two trees are carried out side-by-side with fixed sampling interval,as shown in Fig.3.The two-dimensional DTCWT will produce six direction (±15°,±45°,±75°)for high frequency sub images [Zebbiche,Khelifi and Loukhaoukha (2018)].It can effectively overcome the defects of DWT.Combined with other advantages,it has become the preferred transformation for the extraction of medical image features in this paper.

Figure3:The dual-tree complex wavelet transform

2.2 Logistic map

The Logistic map is a typical chaotic model,which uses the following equation for repeated iteration:

where,xk∈(0,1)represents the system variable,0≤µ≤4is the growth parameter,andk∈(0,1,2,...,n)is the number of iterations [Li,Liu and Liu (2019)].The performance of the system varies with the value ofµ.When 2.8<µ≤4,the obtained graph is shown in Fig.4.Starting fromµ=3,the system has two cycles and four cycles.When 3.569945672<µ≤4,the system enters achaotic state.And the chaotic state of the Logistic map is extremely sensitive to the initial value which can be used as an ideal sequence of the secret key.This chaos is used in the chaotic encryption of the medical images and the watermark,and their initial values are set to 0.135 and 0.2,respectively.

Figure4:The bifurcation diagram of Logistic map

2.3 Homomorphic encryption

Encryption technology plays an important role in the processing of encrypted domain signals.However,not all encryption methods are suitable for signal processing in the encryption domain.Most encryption methods,such as DES and AES,fail to maintain algebraic correspondence between plaintext and ciphertext after encryption.To solve this problem,in 1978,Rivest et al.first proposed the concept of homomorphic encryption[Naqvi,Abbasi,Hussain et al.(2018)].That is,after performing some operation on the ciphertext encrypted by homomorphism and then decrypting it can obtained the same result by directly performing the same operation on the plain text without encryption.In this way,direct manipulation of ciphertext data can be achieved without initial decryptionwhich provides a feasible approach to secure signal processing.Homomorphic encryption is divided into full homomorphic encryption and partial homomorphic encryption.Due to its high computational complexity and time cost,the full homomorphic encryption algorithm is not ideal in practical application.Therefore,this paper uses the Paillier cipher system to design the encryption scheme.Paillier cryptosystem is a public key cryptosystem with homomorphic and probabilistic properties,and its security has been proved.

3 The proposed algorithm

We propose a robust zero-watermarking scheme for encrypted medical images,which mainly uses DTCWT-DCT transform and Logistic chaotic mapping as shown in Fig.5.It is divided into the main stages of original medical image encryption,feature extraction and watermark encryption,watermark embedding and extraction.By using the homomorphism of the encryption system,the outputs are watermarked encrypted images after embedding the watermark.

Figure5:The proposed algorithm scheme

Due to the watermark image and the original medical image are both encrypted,the embedding and extraction of the watermark can be safely performed by a third-party cloud server.Furthermore,after the users decrypted,the decryption images that meet the application requirements can be obtained.

3.1 Medical image encryption

In order to protect the original medical image,we carry out our watermark algorithm in the encryption domain.Fig.6.shows the encryption scheme for original medical images.The describtion is as follows:

1)Apply two-level DTCWT transform on the original medical images to obtain the six wavelet coefficients high-frequency sub-bands in each layer of the double-tree and two low-frequency coefficients;

2)Apply DCT transform to each wavelet sub-band coefficient to get the DCT coefficient matrix of the subband coefficientD(i,j);

3)Obtain the encryption matrixC(i.j)by using Logistic chaotic mapping structure chaotic sequenceX(i.j),via the symbolic functionSgn(x)andreshape(X(i,j));

4)For binary encryption matrixC(i.j)and dtcwt-dct coefficient matrixD(i.j),use the dot multiplication operation to obtain the encryption coefficient matrixED'(i,j);

5)IDCT transformation is performed on the encryption coefficient matrixED'(i,j)to obtain the reconstructed encrypted sub-band wavelet coefficient matrixED(i,j);

Figure6:Encryption of original medical images

6)IDTCWT transformation is performed on the matrixED(i,j)to obtain the encrypted medical imageE(i,j).

As shown below,Fig.7 is the original medical image that was randomly selected,while Fig.8 is the corresponding medical image encrypted by DTCWT-DCT.

Figure7:The original medical images:(a)Brain,(b)Arm,(c)Coronary artery,(d)Foot,(e)Knee,(f)Multi-phase pancreas,(g)Neck,(h)Shoulder,(i)Wrist

Figure8:The encrypted medical images:(a)Encrypted Brain,(b)Encrypted Arm,(c)

Encrypted Coronary artery,(d)Encrypted Foot,(e)Encrypted Knee,(f)Encrypted Multiphase pancreas,(g)En-crypted Neck,(h)Encrypted Shoulder,(i)Encrypted Wrist

3.2 Feature extraction and watermark encryption

To find a visual feature vector suitable for all encrypted medical images,we randomly selected a normal human brain image of 128 pixels by 128 pixels for encryption,performed DTCWT-DCT transformation on the encrypted image,and carried out various attacks as shown in Tab.1.By observing the low frequency coefficients of the encrypted images after transformation,we found that although the values of the low frequency coefficients of encrypted brain images after DTCWT-DCT transformation varies greatly under various attacks,their symbols remain basically unchanged.In this paper,32 bit low-frequency data is selected for symbol transformation,and all coefficient values greater than zero or equal to zero are replaced by ‘1’,and those less than zero are replaced by ‘0’.For convenience of explanation,the first nine bits of the data are listed in Tab.1.Their units are all 1.0e+04.In this way,we get a sequence of low-frequency coefficient symbols ‘101000000’ of the encrypted brain iamge.And the symbol sequence of all the images being attacked is consistent with the original image which is equal to 1.00.

Table1:Changes of DTCWT-DCT coefficients under different attacks for the encrypted original image

Based on the above conclusions,we performed the same experiments on a large number of CT images and MRI images and calculated the normalized correlation coefficient values between them using their respective 32 bits symbol vectors.Tab.2 lists the test results of the encrypted medical images which are shown in Fig.8.It is apparent from the results that the NC values are both less than 0.5 compared with others,and their own NC values are all 1.0.Hence,the low-frequency coefficients of the encrypted medical images transformed by DTCWT-DCT can be used as the effective visual feature vectors.

Table2:Values of the correlation coefficients between different images (32 bits)

3.3 Watermark embedding and extraction

Figure9:Watermark embedding process

A medical image is a special type of image,which has strict requirements regarding image data integrity.Therefore,we use zero-watermark technology to complete the embedding of the watermark.In the embedding process,the watermark embedding is completed by associating the feature vector of the encrypted image with the watermark sequenceEW(j),which is described as follows:

1)Extract the feature vectorEVF(j)from the encrypted medical imageE(i,j);

2)Obtain the encrypted watermark sequenceEW(j)via encrypting the original watermark;

3)Perform a XOR operation on symbol sequenceEVF(j)and encrypted watermark sequenceEW(j)to obtain a secret keyKey(j),and the embedding of watermark is completed.

The steps to extract the watermark in ciphertext domain are as follows:

1)Extract the feature vectorEVF' (j)of the medical image to be testedE'(i,j);

2)Perform a XOR operation on the feature vectorEVF' (j)and key sequenceKey(j)to obtain the extracted watermarkEW'(j);

3)The extracted encrypted watermark is decrypted to obtain the restored watermark.

Figure10:Watermark extraction process

4 Simulation and analysis

Based on matlab 2016,all the encrypted medical images in randomly selected in Fig.8 were simulated.The sizes of the selected encrypted medical images are 128 pixels×128 pixels,and the watermark image is 32 pixels×32 pixels which is selected as a meaningful image.Taking the image of Fig.7(a)as an example,the proposed algorithm is used to encrypt the image and the watermark,generating the encrypted image embedded with watermark and their decryption effect images.As is apparent from Fig.11,the encrypted image and the watermark are identical to the original image without being attacked,NC=1.0.After chaotic encryption,the medical image and the watermark can no longer distinguish the initial shape and the content.Different initial values enhance the security of the encryption algorithm.

Figure11:The medical image and watermark in the encrypted domain:(a)Original medical image (b)Encrypted medical image;(c)Encrypted watermarked medical image;(d)Decrypted watermarked medical image;(e)Original watermark;(f)Chaotic encryption watermark;(g)Extracted watermark;(h)Decrypted watermark

Then,we attacked all the encrypted medical images in Fig.8 and measured the extracted watermarks with PSNR values and NC values to verify the robustness of the algorithm.The results of their attacks are as follows.Although we have tested all the images,for the sake of illustration,the attacked results are analyzed with Fig.ss 8 (a)as an example.

4.1 Conventional attacks

The performance of the tested encrypted medical image under conventional attacks are shown in Tab.3.Observing the data of Tab.3,with Gaussian noise,JPEG compression and median filtering attacks intensity increasing,the PSNR values and the NC values of the watermarked encrypted medical images showed a decreasing trend.Even when the Gaussian noise intensity reached 25%,JPEG compression reached as low as 4%,and the median filtering size reached 11 x 11,in the case of 10 filtering times,although the encrypted medical images have undergone great changes,their average NC value is still as high as 0.85,which demonstrates good robustness.

Table3:The PSNR and NC values under conventional attacks

PSNR=11.44 dB NC=0.90 25%4% images/BZ_454_1142_705_1354_918.png images/BZ_454_1546_706_1758_918.png JPEG compression 6%PSNR=23.63 dB images/BZ_454_1142_996_1354_1208.png NC=0.84 images/BZ_454_1546_996_1758_1208.png 15%[33] images/BZ_454_882_1691_909_1744.png PSNR=26.09 dB images/BZ_454_1142_1286_1354_1499.png PSNR=29.78 dB images/BZ_454_1142_1578_1354_1791.png NC=0.90 images/BZ_454_1546_1286_1758_1499.png NC=1.00 images/BZ_454_1546_1578_1758_1791.png Median filter(10 times)[77] images/BZ_454_882_1981_909_2034.png [1111] images/BZ_454_882_2271_909_2324.png PSNR=28.85 dB images/BZ_454_1142_1869_1354_2081.png PSNR=21.99 dB images/BZ_454_1142_2159_1354_2371.png NC=0.94 images/BZ_454_1546_1869_1758_2081.png NC=0.88 images/BZ_454_1546_2159_1758_2372.png PSNR=19.21 dB NC=0.84 images/BZ_454_1142_413_1354_626.png PSNR=9.01 dB images/BZ_454_1546_413_1758_626.png NC=0.86

4.2 Geometrical attacks

Tab.4 shows the PSNR and NC values of watermarked encrypted medical images under geometric attacks and their corresponding images.When the watermarked encrypted medical image was translated down by 17%,nearly one-fifth of the image watermark was lost.The watermark can still be accurately extracted,and NC=0.61.When it is attacked counterclockwise,rotated by 20 degrees and cut by 1/3 on the Y-axis,the watermark can still be clearly extracted.In addition,almost 100% of the watermark of encrypted medical images can be extracted,which means almost no loss at all under the scaling attacks.These data results show that the proposed algorithm is robust to geometric attacks,and it has a wide range of variabilities and high NC values.

Table4:The PSNR and NC values under geometrical attacks

7° images/BZ_456_1174_346_1386_558.png PSNR =15.37 dB images/BZ_456_1528_372_1740_585.png NC=0.65 Rotation(counterclockwis e)14° images/BZ_456_1174_689_1386_901.png PSNR =13.33 dB images/BZ_456_1528_715_1740_927.png NC=0.61 20°5% images/BZ_456_1174_1031_1386_1244.png PSNR =12.36 dB images/BZ_456_1174_1381_1386_1585.png images/BZ_456_1528_1058_1740_1270.png NC=0.53 images/BZ_456_1526_1376_1742_1589.png /NC=0.90 Cropping(Y direction)24% images/BZ_456_1173_1693_1386_1852.png / images/BZ_456_1528_1666_1740_1879.png NC=0.83 30% images/BZ_456_1174_1988_1386_2137.png / images/BZ_456_1528_1956_1740_2169.png NC=0.67

To verify the homomorphism of the proposed algorithm,we compared the quality of the image after the attacks and the extracted NC values of both the watermarked unencrypted medical image and the watermarked encrypted image in Tab.5.The experimental data results are basically consistent in the encrypted and unencrypted domains,indicating that the encryption algorithm we use has good homomorphism.

Table5:The PSNR and NC values in DTCWT-DCT plaintext and encrypted domain

4.3 Algorithm comparison

In order to further verify the robustness of the proposed algorithm,especially under geometric attacks,we replaced the encrypted medical image with a ‘Luna’ image to mask the difference between the results of selecting different samples.Then,the proposed algorithm is compared with the existing algorithm [Zear,Singh and Kumar (2018);Thanki,Borra,Dwivedi et al.(2017);Nematzadeh,Enayatifar,Motameni et al.(2018);Laiphrakpam and Khumanthem (2017)].Their comparison results are shown in Tab.6-Tab.7 and Figs.12-18,respectively.Observing this comparative data,we can find that although the proposed algorithm performs slightly inferiorly to the algorithm proposed by Nematzadeh et al.[Nematzadeh,Enayatifar,Motameni et al.(2018)] under the scaling attacks,it is clearly superior to the existing algorithm in both conventional attacks and geometric attacks in general.Besides,the proposed algorithm encrypted the medical image itself,which enhanced the security of the algorithm.

Figure12:The NC data of different algorithms under Gaussian Noise attacks

Figure13:The NC data of different under JPEG attacks

Figure14:The NC data of different algorithms under Median Filter (10 times)attacks

Figure15:The NC curves of different algorithms under Scaling attacks

Figure16:The NC curves of different algorithms under Down Translation attacks

Figure17:The NC curves of different algorithms under Right Translation attacks

Figure18:The NC curves of different algorithms under Cropping attacks

Table6:Comparison values of different algorithms under conventional attacks

Table7:Comparison values of different algorithms under geometrical attacks

Therefore,the algorithm presented in this paper is outstanding in all kinds of attacks,in particular solving the problem that existing algorithms cannot balance geometric attacks and security robustness.It has strong resistance to geometric attacks and exhibits good robustness.

5 Conclusions

This paper proposed a new robust watermarking algorithm for encrypted medical images based on DTCWT-DCT.The security of medical image transmission is enhanced by encrypting the medical image itself and setting different initial values of chaos.It used the low-frequency coefficient of the DTCWT-DCT transform domain of the encrypted medical image as its feature vector,performed logical operations with the chaotic encrypted watermark to generate the secret key to realize the embedding and extraction of the encrypted medical image.Using the homomorphism of the encryption algorithm,the watermark can be extracted easily without the original image or decryption.The simulation results show that the proposed algorithm can solve the contradiction between robustness and invisibility well,and is robust to both conventional attacks and geometric attacks.

Acknowledgement:This work is supported by the Key Research Project of Hainan Province [ZDYF2018129],the Higher Education Research Project of Hainan Province(Hnky2019-73),the National Natural Science Foundation of China [61762033],the Natural Science Foundation of Hainan [617175],the Special Scientific Research Project of Philosophy and Social Sciences of Chongqing Medical University [201703] and the Key Research Project of Haikou College of Economics [HJKZ18-01].

免责声明

我们致力于保护作者版权,注重分享,被刊用文章因无法核实真实出处,未能及时与作者取得联系,或有版权异议的,请联系管理员,我们会立即处理! 部分文章是来自各大过期杂志,内容仅供学习参考,不准确地方联系删除处理!