343
Views
30
CrossRef citations to date
0
Altmetric
Section A

Watermarking of chest CT scan medical images for content authentication

&
Pages 265-280 | Received 01 Apr 2009, Accepted 23 Dec 2009, Published online: 02 Dec 2010

References

  • Achariya , U. R. , Subhanna Bhat , P. , Kumar , S. and Choo Min , L. 2003 . Transmission and storage of medical images with patient information . J. Comput. Biol. Med. , 33 : 303 – 310 .
  • Bakhtiari , S. , Safavi-Naini , R. and Pieprzyk , J. Cryptographic Hash Functions: A Survey Available at http://eprints.kfupm.edu.sa/33106
  • Boucherkha , S. and Benmohamed , M. 2005 . A lossless watermarking based authentication system for medical images . Proc. World Acad. Sci. Eng. Technol. , 1 : 100 – 103 .
  • Chang-Ri , P. , Dong Min , W. , Dong-Chul , P. and Seung Soo , H. Medical image authentication using hash function and integer wavelet transform . IEEE 2008 Congress on Image and Signal Processing . May 27–30 , Snaya, Hainan, China. pp. 7 – 10 .
  • Coatrieux , G. , Lecornu , L. , Sankur , B. and Roux , Ch. A review of image watermarking applications in healthcare . Proceedings of IEEE-EMBC Conference . pp. 4691 – 4694 . New York
  • Coatrieux , G. , Montagner , J. , Huang , H. and Roux , Ch. Mixed reversible and RONI watermarking for medical image reliability protection . 29th IEEE International Conference of EMBS, Cite Internationale . August 23–26 , Lyon, France.
  • Cox , I. J. , Kilian , J. , Leighton , T. and Shamoon , T. 1997 . Secure spread spectrum watermarking for multimedia . Trans. Image Processing , 6 ( 12 ) : 1673 – 1687 .
  • Cox , I. J. , Millter , M. L. and Blom , J. A. 2004 . Digital Image Watermarking , San Francisco, CA : Morgan Kaufman Publishers .
  • Deepakumara , J. , Heys , H. M. and Venkateson , R. FPGA implementation of MD5 hash algorithms . Canadian Conference on Electrical and Computer Engineering . Vol. 2 , pp. 919 – 924 .
  • Fotopoulos , V. , Stavrinou , M. L. and Skodras , A. N. Medical image authentication and self-correcting through an adaptive reversible watermarking technique . Proceedings of 8th IEEE International Conference on Bio Informatics and Bio Engineering (BIBE2008) . October 8–10 . pp. 1 – 5 .
  • Lee , H. K. , Kim , H. J. , Kwon , K. R. and Lee , J. K. ROI medical image watermarking using DWT and bit-plane . IEEE 2005 Asia-Pacific Conference on Communications . October 3–5 , Perth, Western Australia.
  • Lin , C.-Y. and Chang , S.-F. Generating robust digital signature for image/video authentication . Proceedings of Multimedia and Security Workshop at ACM Multimedia ’98 . September , Bristol, UK.
  • Memon , N. A. and Gilani , S. A.M. NROI watermarking of medical images for content authentication . IEEE Conference . December 23–24 , Karachi, Pakistan.
  • Memon , N. A. , Mirza , A. M. and Gilani , S. A.M. Segmentation of lungs from CT scan images for early diagnosis of lung cancer . Proceedings of 2006 Enformatika, XIV International Conference Prague . August 25–27 , Czech Republic.
  • Navas , K. A. , Thampy , S. A. and Sasikumar , M. EPR hiding in medical images for telemedicine . Proc. of the World Academy of Science, Engineering and Technology . Rome. pp. 292 – 295 .
  • Nayak , J. , Subbanna Bhat , P. , Sathish Kuamr , M. and Achariya , U. R. Reliable and robust transmission and storage of medical images with patient information . International Conference on Signal Processing and Communication (SPCOM) . Lisbon, Portugal.
  • Rivest , R. 1992 . The MD5 Message Digest Algorithm , RFC 1321, MIT LCS & RSA, Data Security, Inc .
  • Rodriguez , C. R. , Uribe Claudia , F. and Trinidad Blas Gershom De , J. Data hiding scheme for medical images . IEEE 17th International Conference on Electronics, Communications and Computers (CONIELECOMP) . Cholula, Puebla, Mexico.
  • Schneider , M. and Chang , S.-F. A robust content based digital signature for image authentication . Proceedings of ICIP-96 . September . Vol. 3 , pp. 227 – 230 .
  • Smitha , B. and Navas , K. A. “Spatial domain-high capacity data hiding in ROI images . Proc. Int. Conf on Signal Processing, Communication and Networking IEEE-ICSCN-2007 . Feb 22–24 , Chennai, India. pp. 528 – 533 .
  • Walton , S. 1995 . Information authentication for a slippery new age . Dr Dobbs J. , 20 ( 4 ) : 18 – 26 .
  • Wong , P. A public key watermark for image verification and authentication . Proceedings of ICIP’98 . pp. 425 – 429 .
  • Xiaota , G. and Tian-ge , Z. 2009 . A Region-based lossless watermarking scheme for enhancing security of medical data . J. Digit. Imaging , 22 ( 1 ) : 53 – 64 .
  • Xiaoyun , W. , Junquan , H. , Zhixiong , C. and Jiwu , H. A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters . Proceedings of 2005 Australian Workshop on grid computing and e-research . Newcastle, New South Wales, Australia. Vol. 44 , pp. 75 – 80 .
  • Xuanwen , L. , Cheng , Q. and Tan , J. A lossless data embedding scheme for medical in application of e-diagnosis . Proceedings of the 25th Annual International Conference of the IEEE EMBS Cancun . September , Mexico. pp. 17 – 21 .
  • Zhou , X. Q. , Huang , H. K. and Lou , S. L. 2001 . Authenticity and integrity of digital mammography images . IEEE Trans. Med. Imag. , 20 ( 8 ) : 784 – 791 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.