39
Views
7
CrossRef citations to date
0
Altmetric
Innovations

Efficient high capacity technique to embed EPR information and to detect tampering in medical images

&
Pages 55-68 | Received 19 Nov 2018, Accepted 14 Jan 2020, Published online: 21 Feb 2020

References

  • Subbiah G, Sindhu S, Kamaraj N. Detection of stego anomalies in images exploiting the content independent statistical footprints of the steganograms. Informatica (Slovenia). 2009;33:25–40.
  • Geethaa S, Sivatha SS, Kamaraj SN. Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system. Computers & Security. 2009;28(7):683–697. DOI:10.1016/j.cose.2009.03.006
  • Cox I, Miller M, Bloom J, et al. Digital water-marking and steganography. San Mateo (CA): Morgan Kaufmann; 2007.
  • Fridrich J. Steganography in digital media: principles, algorithms, and applications. Cambridge (UK): Cambridge Univ. Press; 2009.
  • Shi YQ, Ni Z, Zou D, et al. Lossless data hiding: fundamentals, algorithms and applications. Proceedings of the IEEE International Symposium on Circuits and Systems. Vol. 2; 2004. p. 33–36.
  • Shi YQ. Reversible data hiding. Proceedings of the International Workshop on Digital Watermarking; 2004. p. 1–12.
  • Caldelli R, Filippini F, Becarelli R. Reversible watermarking techniques: an overview and a classification. EURASIP J Inform Secur. 2010;2010:134546.
  • Barton JM. Method and apparatus for embedding authentication information within digital data. United States patent US 5,646,997. 1997 Jul 8.
  • Honsinger CW, Jones PW, Rabbani M, et al. Lossless recovery of an original image containing embedded data. United States patent US 6,278,791. 2001 Aug 21.
  • Bao F, Deng R-H, Ooi B-C, et al. Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Trans Inform Technol Biomed. 2005;9(4):554–563.
  • Coatrieux G, Guillou CL, Cauvin J-M, et al. Reversible watermarking for knowledge digest embedding an reliability control in medical images. IEEE Trans Inform Technol Biomed. 2009;13(2):158–165.
  • Coltuc D, Caciula I. Stereo embedding by reversible watermarking: further results. Proceedings of the International Symposium on Signals, Circuits and Systems; 2009. p. 1–4.
  • Tong X, Shen G, Xuan G, et al. Stereo image coding with histogram-pair based reversible data hiding. Proceedings of the International Workshop on Digital-Forensics Watermarking; 2014. p. 201–214.
  • Wang X, Shao C, Xu X, et al. Reversible data-hiding scheme for 2-D vector maps based on difference expansion. IEEE Trans Inform Forensic Secur. 2007;2(3):311–320.
  • Peng F, Lei Y-Z, Long M, et al. A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput Aided Des. 2011;43(8):1018–1024.
  • Hwang K, Li D. Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput. 2010;14(5):14–22.
  • Goljan M, Fridrich JJ, Du R. Distortion-free data embedding for images. Proceedings of the 4th Information Hiding Workshop; 2001. p. 27–41.
  • Xuan G, Zhu J, Chen J, et al. Distortionless data hiding based on integer wavelet transform. Electron Lett. 2002;38(25):1646–1648.
  • Tian J. Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst. 2003;13(8):890–896.
  • Alattar AM. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process. 2004;13(8):1147–1156.
  • Wang X, Li X, Yang B, et al. Efficient generalized integer transform for reversible watermarking. IEEE Signal Process Lett. 2010;17(6):567–570.
  • Qiu Y, Qian Z, Yu L. Adaptive reversible data hiding by extending the generalized integer transformation. IEEE Signal Process Lett. 2016;23(1):130–134.
  • Coltuc D. Low distortion transform for reversible watermarking. IEEE Trans Image Process. 2012;21(1):412–417.
  • Thodi DM, Rodriguez JJ. Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process. 2007;16(3):721–730.
  • Sachnev V, Kim HJ, Nam J, et al. Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol. 2009;19(7):989–999.
  • Coltuc D. Improved embedding for prediction-based reversible watermarking. IEEE Trans Inform Forensic Secur. 2011;6(3):873–882.
  • Li X, Yang B, Zeng T. Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process. 2011;20(12):3524–3533.
  • Coatrieux G, Pan W, Cuppens-Boulahia N, et al. Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inform Forensic Secur. 2013;8(1):111–120.
  • Qin C, Chang C-C, Huang Y-H, et al. An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol. 2013;23(7):1109–1118.
  • Xuan G, Shi YQ, Teng J, et al. Double-threshold reversible data hiding. Proceedings of the IEEE International Symposium on Circuits and Systems; 2010. p. 1129–1132.
  • Geetha R, Geetha S. 2018. Improved reversible data embedding in medical images using I-IWT and pairwise pixel difference expansion. DOI:10.1007/978-981-10-8660-1-45
  • Ni Z, Shi Y-Q, Ansari N, et al. Reversible data hiding. Proceedings of the IEEE International Symposium on Circuits and Systems; 2003 May. p. II-912–II-915.
  • Fallahpour M, Sedaaghi MH. High capacity lossless data hiding based on histogram modification. IEICE Electron Express. 2007;4(7):205–210.
  • Xuan G, Shi YQ, Chai P, et al. Optimum histogram pair based image lossless data embedding. Proceedings of the International Workshop on Digital Watermarking; 2007. p. 264–278.
  • Lian S, Liu Z, Ren Z, et al. Commutative encryption and watermarking in video compression. IEEE Trans Circuits Syst Video Technol. 2007;17(6):774–778.
  • Cancellaro M, Battisti F, Carli M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain. Signal Process Image Commun. 2011;26(1):1–12.
  • Schmitz R, Li S, Grecos C, et al. A new approach to commutative watermarking-encryption. Proceedings of the 13th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security; 2012. p. 117–130.
  • Jung K, Yoo K. Data hiding method using image interpolation. Comput Stand Interfaces. 2009;31(2):465–470.
  • Luo L, Chen Z, Chen M, et al. Reversible image watermarking using interpolation technique. IEEE Trans Inform Forensic Secur. 2010;5(1):187–193.
  • Abadi MAM, Danyali H, Helfroush MS. Reversible watermarking based on interpolation error histogram shifting. 5th International Symposium on Telecommunications (IST); Kish Island, Iran; 2010. p. 840–845.
  • Lee CF, Huang YL. An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl. 2012;39(8):6712–6719.
  • Geetha R, Geetha S. Multilevel RDH scheme using image interpolation. International Conference on Advances in Computing, Communications and Informatics (ICACCI); Jaipur; 2016. p. 1952–1956.
  • Arsalan M, Sana AM, Asifullah K. Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw. 2012;85(4):883–894.
  • Hirak KM, Santi PM. Joint robust and reversible watermarking for medical images. 2nd International Conference on Communication, Computing & Security [ICCCS-2012]. Vol. 6. Elsevier, Procedia Technology; 2012. p. 275–282.
  • Tsai P, Hu YC, Yeh HL. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process. 2009;89(6):1129–1143.
  • Shabir AP, Javaid AS, Bhat GM. Data hiding in ISB planes: a high capacity blind stenographic technique. Proceedings of the IEEE Sponsored International Conference on INCOSET; Tiruchirapalli, Tamilnadu, India; 2012. p. 192–197.
  • Parah SA, Ahad F, Sheikh JA, et al. Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform. 2017;66:214–230.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.