322
Views
58
CrossRef citations to date
0
Altmetric
Section A

Hybrid watermarking of medical images for ROI authentication and recovery

, , &
Pages 2057-2071 | Received 05 Apr 2010, Accepted 24 Nov 2010, Published online: 26 Apr 2011

References

  • Alomari , R. S. and Al-Jber , A. 2004 . A fragile watermarking algorithm for content authetication . Int. J. Comput. Inform. Sci. , 2 ( 1 ) : 27 – 37 .
  • Barni , M. , Bartolini , F. and Furon , T. 2003 . A general framework for robust watermarking security . Signal Process. , 83 : 2069 – 2084 .
  • Boucherkha , S. and Benmohamed , M. A lossless watermarking based authentication system for medical images . Proceedings of World Academy of Science and Engineering (WASET) . Vol. 1 , pp. 100 – 103 .
  • Chen , B. and Wornell , G. W. 2001 . Quantization index modulation: A class probably good methods for digital watermarking and informatin embedding . IEEE Trans. Image Inform. Theory , 47 ( 4 ) : 1423 – 1443 .
  • Chang , Y. J. , Wang , R. Z. and Lin , J. C. 2008 . A sharing-based fragile watermarking method for authentication and self recovery of image tampering . EURASIP J. Adv. Signal Process. , 2008 : 17 doi: 10.1155/2008/846967
  • Chang-Ri , P. , Dong Min , W. , Dong-Chul , P. and Seung Soo , H. Medical image authentication using hash function and integer wavelet transform . IEEE 2008 Congress on Image and Signal Processing . Sanya, Hainan, China. pp. 7 – 10 .
  • Calderbank , A. R. , Daubechies , I. , Sweldens , W. and Yeo , B.-L. 1998 . Wavelet transform that maps integers to integers . Appl. Comput. Harmon. Anal. , 5 ( 3 ) : 332 – 369 .
  • Coatrieux , G. , Lecornu , L. , Sankur , B. and Roux , Ch. A review of image watermarking applications in health care, . 28th IEEE Annual International Conference on Engineering in Medicine and Biology Society (EMBS’06) . pp. 4691 – 4694 . New York, NY
  • Coatrieux , G. , Montagner , J. , Huang , H. and Roux , Ch. Mixed reversible and RONI watermarking for medical image reliability protection . 29th IEEE International Conference of EMBS, Cite Internationale . Lyon, France.
  • Delong , C. A semi-fragile watermarking for ROI image authentication, MMIT . International Conference on Multimedia and Information Technology . pp. 302 – 305 .
  • Eggers , J. J. , Bauml , R. , Tzschoppe , R. and Girod , B. 2003 . Scalar SOSTA scheme for information hiding . IEEE Trans. Signal Process. , 151 ( 4 ) : 1003 – 1019 .
  • Fotopoulos , V. , Stavrinou , M. L. and Skodras , A. N. Medical image authentication and self-correction through adaptive reversible watermarking technique . Proceedings of 8th IEEE International Conference on Bio-Informatics and Bio-Engineeing (BIBE2008) . Athens, Greece. pp. 1 – 5 .
  • Fridrich , J. , Goljan , M. and Du , R. Invertible authentication . Proceedings SPIE, Security and Watermarking of Multimedia Contents-III . San Jose, CA. Vol. 4314 , pp. 197 – 208 .
  • Giakoumaki , A. , Pavlopulos , S. and Koutouris , D. 2006 . Multiple image watermaking applied to health information management . IEEE Trans. Inform. Technol. Biomed. , 10 ( 4 ) : 722 – 732 .
  • Gupta , G. and Pieprzyk , I. 2009 . Reversible and blind database watermarking using difference expansion . Int. J. Digital Crime Forensics , 1 ( 2 ) : 42 – 54 .
  • Hai-mei , S. , Tian-can , M. and Qian-ging , Q. 2004 . Spread spectrum watermak based on wavelet transform for still digital image . Wuhan Univ. J. Nat. Sci. , 9 ( 2 ) : 203 – 208 .
  • Ho , C. K. and Li , C. T. Semi-fragile watermarking scheme for authentication of JPEG images . International Confernce on Information Technolgy Coding and Computing (ITCC’04) . Los Vegas, NV. Vol. 1 , pp. 7
  • Huang , J.-F. 2005 . Semi-fragile watermarking for copyright protection and image authentication . Wuhan Univ. J. Nat. Sci. , 10 ( 1 ) : 284 – 288 .
  • Karras , D. A. 2005 . A second order spread spectrum modulation scheme for wavelet based low error probability digital image watermarking . ICGST Int. J. Graphics Vision Image Process. (GVIP) , 3 ( 5 ) : 19 – 28 .
  • Lai , B. L. and Chang , L. W. 2006 . “ Adaptive data hiding for images based on haar discrete wavelet transform ” . In PSIVT 2006, Hsinchu, Taiwan , Lecture Notes in Computer Science, Vol. 4319 Edited by: Chang , L. W. , Lei , W. N. and Chiang , R. 1085 – 1093 . Berlin, Heidelberg : Springer-Verlag .
  • Li , C. T. , Li , Y. and Wei , C. H. 2009 . Protection of digital mammograms on PACS using data hiding techniques . Int. J. Digital Crime Forensics , 1 ( 10 ) : 75 – 88 .
  • Li , C. T. and Li , Y. 2009 . Medical images authentication through repetitive index modulation based watermaking . Int. J. Digital Crime Forensics , 1 ( 4 ) : 32 – 39 .
  • Li , C. T. and Si , H. 2007 . Wavelet-based fragile watermarking scheme for image authentication . J. Electron. Imaging , 16 ( 1 ) : 013009-1 – 013009-9 .
  • Makur , A. and Sethu Selvi , S. 2001 . Variable dimension vector quantization based image watermarking . J. Signal Process. , 81 ( 4 ) : 889 – 893 .
  • Memon , N. A. and Gilani , S. A.M. NROI watermarking of medical images for content authentication . Proceedings of 12th IEEE International Mutitopic Conference (INMIC’08) . Karachi, Pakistan. pp. 106 – 110 .
  • Memon , N. A. , Gilani , S. A.M. and Ali , A. Watermarking of chest CT scan medical images for content authentication . IEEE 3rd International Conference on Information and Communication Technologies (ICICT’2009) . pp. 175 – 180 .
  • Navas , K. A. , Archana Thampy , S. and Sasikumar , M. EPR hiding in medical images for telemedicine . Proceedings of World Academy of Science, Engineering and Technology . Vol. 28 ,
  • Rodriguez , C. R. , Uribe Claudia , F. and Blas Gershom De , J. T. Data hiding scheme for medical images . IEEE 17th International Conference on Electronics, communications and computers (CONIELECOMP) .
  • Shaomin , Z. and Jianming , L. 2009 . An optimal adaptive quantization index modulation watermarking algorithm . Chinese Opt. Lett. , 7 ( 7 ) : 580 – 584 .
  • Wakatani , A. Digital watermarking for ROI medical images by using compressed signature image . Proceedings of the Annual Hawaii International Conference on System Sciences (HICSS) . pp. 2043 – 2048 .
  • Woo , C. S. , Du , J. and Pham , B. Multiple watermarking method for privacy control and tamper detection in medical images . Proceedings APRS Workshop on Digital Image Computing (WDIC2005), Australia, Brisbane, South Bank . Edited by: Lovell Brian , C. and Maeder Anthony , J. pp. 59 – 64 . Brisbane, , Australia : Queensland University of Technology .
  • Wu , J. H.K. , Chang , R. F. , Chen , C. J. , Wang , C. L. , Kuo , T. H. , Moon , W. K. and Chen , D. R. 2008 . Tamper detection and recovery for medical images using near-lossless information hiding technique . J. Digital Imaging , 21 ( 1 ) : 59 – 76 .
  • Xuan , G. , Zhu , J. , Chon , J. , Shi , Y. Q. , Ni , Z. and Su , W. 2002 . Distorotion less data hiding based on integer wavelet transform . IEEE Electron. Lett. , 38 ( 5 ) : 1646 – 1648 .
  • Yuehua , Z. , Guixian , C. and Yunhai , D. A image watermarking algorithm based on discrete cosine transform block classifying . Proceedings of 3rd International Conference on Information Security . Shanghai. Vol. 85 , pp. 234 – 235 .
  • Zhou , X. Q. , Huang , H. K. and Lou , S. L. 2001 . Authenticity and integrity of digital mamography images . IEEE Trans. Med. Imaging , 20 ( 8 ) : 784 – 791 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.