access icon free Fragile and blind watermarking technique based on Weber's law for medical image authentication

In developing countries such as India, transmission of medical images over the network is essential for providing health services to rural/remote population. During this transmission, a small distortion in the medical image may lead to wrong conclusions. Thus, arises the need to embed some authentication information in medical images to authenticate transmitted image. In this study, a blind and fragile watermarking technique based on Weber's law is proposed. Here, fragile watermark is inserted by quantising intensity of selected pixels in a medical image. As the proposed technique is fragile, it detects even a small change made to watermarked image and locates blocks where distortion has been made. Besides being able to detect all malicious changes that affect the quality of watermarked image, it is tolerant to image compression, which is essential to transmit images over the network. The proposed technique is highly imperceptible as the watermark is inserted by modifying intensity of dark pixels selected using Weber's law. An extension of the proposed technique is also given to enhance its capacity. Experimental results on standard medical image database prove the efficacy of the proposed method over existing works.

Inspec keywords: medical image processing; image watermarking

Other keywords: Weber's law; medical image authentication; medical image transmission; health services; fragile technique; malicious detection; rural-remote population; India; dark pixels; blind watermarking technique

Subjects: Computer vision and image processing techniques; Image and video coding; Biomedical measurement and imaging; Patient diagnostic methods and instrumentation; Biology and medical computing; Medical and biomedical uses of fields, radiations, and radioactivity; health physics

References

    1. 1)
      • 33. Salwa, A.K.M., Naser, E.-s., Tolba, A.S., Abdelkader, F.M., Hisham, M.E.: ‘Wavelet packets based blind watermarking for medical image management’, Open Biomed. Eng. J., 2010, 4, pp. 9398.
    2. 2)
      • 38. http://www.ob-ultrasound.net/joewoo.
    3. 3)
      • 4. Barreto, P.S.L.M., Kim, H.Y., Rijmen, V.: ‘Towards secure public-key blockwise fragile authentication watermarking’, IEEE Proc. Vision Image Signal Process., 2002, 149, (2), pp. 5762.
    4. 4)
      • 37. Planitz, B., Maeder, A.: ‘Medical image watermarking: a study on image degradation’. Proc. the Australian Pattern Recognition, WDIC 2005, Brisbane, Australia, 2005, pp. 38.
    5. 5)
      • 36. Solachidis, V., Tefas, A., Nikolaidis, N., Tsekeridou, S., Nikolaidis, A., Pitas, I.: ‘A benchmarking protocol for watermarking methods’. IEEE Int. Conf. on Image Processing (ICIP'01), Thessaloniki, Greece, 2001, pp. 10231026.
    6. 6)
      • 19. Lin, C.Y., Chang, S.f.: ‘Semi fragile watermarking for authenticating JPEG visual content’. SPIE Int. Conf. on Security and Watermarking of Multimedia Contents II, San Jose, USA, 2000, Vol. 3971, no. 13, pp. 112.
    7. 7)
      • 15. Yeung, M., Mintzer, F.: ‘An invisible watermarking technique for image verification’. IEEE Proc. ICIP, Santa Barbara, 1997, pp. 446449.
    8. 8)
      • 13. Lin, E.T., Podilchuk, C.I., Delp, E.J.: ‘Detection of image alterations using semi-fragile watermarks’. Proc. SPIE Int. Conf. on Security and Watermarking of Multimedia Contents, 2000, pp. 152163.
    9. 9)
      • 27. Chen, J., Shan, S., He, C., Zhao, G., Pietikainen, M., Chen, X., Gao, W.: ‘WLD: a robust local image descriptor’, IEEE Trans. Pattern Anal. Mach. Intell., 2010, 32, (9), pp. 17051720.
    10. 10)
      • 29. Barre S.: ‘DICOM Medical image samples http://barre.nom.fr/medical/samples/.
    11. 11)
      • 17. Parmeswaran, L., Anbumani, K.: ‘Content based watermarking for image authentication using independent component analysis’, J. Inf., 2008, 32, (3), pp. 299306.
    12. 12)
      • 14. Bounkong, S., Toch, B., Saad, D., Lowe, D.: ‘ICA for watermarking digital images’, J. Mach. Learn. Res., 2003, 4, pp. 14711498.
    13. 13)
      • 34. Navas, K.A., Sasikumar, M., Sreevidya, S.: ‘A benchmark for medical image watermarking’. Workshop on Systems Signals and Image Processing and Sixth EURASIP Conf. on Speech and Image Processing, Multimedia Communication and ServicesMaribor, Slovenia, 2007, pp. 249252.
    14. 14)
      • 6. Xie, L., Arce, G.R.: ‘A class of authentication digital watermarks for secure multimedia communication’, IEEE Trans. Image Process., 2001, 10, (11), pp. 17541764.
    15. 15)
      • 26. Jain, A.K.: ‘Fundamentals of digital image processing’ (Prentice-Hall, U.S., 1989), p. 51.
    16. 16)
      • 32. Mohammad, S.N., Alireza, A., Mahammad, G., Reza, S.D., Karimi Fard, S.: ‘A novel blind watermarking of ECG signals on medical images using EZW algorithm’. Proc. 28th IEEE EMBS Annual Int. Conf., New York, 2006, pp. 32743277.
    17. 17)
      • 3. Alattar, A.M.: ‘Reversible watermark using the difference expansion of a generalized integer transform’, IEEE Trans. Image Process., 2004, 13, (8), pp. 11471156.
    18. 18)
      • 11. Christian, R., Jean-Luc, D.: ‘A survey of watermarking algorithms for image authentication’, EURASIP J. Appl. Signal Process., 2002, 6, pp. 613621.
    19. 19)
      • 31. http://www.brothersoft.com/paint-shop-pro-247267.html.
    20. 20)
      • 2. Moulin, P., Ivanovic, A.: ‘The zero rate spread spectrum watermarking game’, IEEE Trans. Signal Process., 2003, 51, (4), pp. 10981117.
    21. 21)
      • 20. Samia, B., Mohamed, B.: ‘Lossless watermarking based authentication system for medical images’, World Acad. Sci. Eng. Technol., 2007, 1, pp. 662665.
    22. 22)
      • 22. Aggalki, G., Sotiris, P., Dimitris, K: ‘Multiple image watermarking applied to health information management’, IEEE Trans. Inf. Technol. Biomed., 2006, 10, (4), pp. 722732.
    23. 23)
      • 28. Xina, Y., Liaob, S., Pawlak, M.: ‘Circularly orthogonal moments for geometrically robust image watermarking’, J. Pattern Recognit., 2007, 40, pp. 37403752.
    24. 24)
      • 7. Yang, M., Trifas, M., Chen, L., Song, L., Aires, D.B., Elston, J.: ‘Secure patient information and privacy in medical imaging’, J. Syst. Cybern. Inf., 2010, 8, (3), pp. 6366.
    25. 25)
      • 30. Springer Medical images database http://www.springerimages.com/ImagesMD/.
    26. 26)
      • 24. El-Gayyar, M.: ‘Watermarking techniques spatial domain digital rights seminar’ (Media Informatics, University of Bonn, Germany, 2006).
    27. 27)
      • 25. Ekta, W., Suneja, A.: ‘A robust watermark authentication technique based on Weber's descriptor’, J. Signal Image Video Process., 2012, 6, (1), pp. 114.
    28. 28)
      • 23. Jasni, Z., Malcolm, C.: ‘Security in telemedicine: issues in watermarking medical images’. Third Int. Conf.: Science of Electronics, Technologies of Information and Telecommunications, 2005, pp. 2731.
    29. 29)
      • 16. Wu, M., Liu, B.: ‘Watermarking for image authentication’. IEEE Proc. ICIP, Chicago, 1998, pp. 437441.
    30. 30)
      • 10. Radharani, S., Valarmathi, M.L.: ‘A study on watermarking schemes for image authentication’, Int. J. Comput. Appl., 2010, 2, (4), pp. 2432.
    31. 31)
      • 12. Wu, X., Liang, X., Liu, H., Huang, J., Qiu, G.: ‘Reversible semi fragile image authentication using zernike moments and integer wavelet transform’. IEEE Int. Conf. on Multimed. Expo, 2007, pp. 21222125.
    32. 32)
      • 21. Lim, Y., Xu, C., Feng, D.D.: ‘Web based image authentication using invisible fragile watermark’. Pan-Sydney Area Workshop on Visual Information Processing (VIP2001), Sydney, Australia, 2001, pp. 3134.
    33. 33)
      • 35. Pereira, S., Voloshynovskiy, S., Madueno, M., Marchand-Maillet, S., Pun, T.: ‘Second generation benchmarking and application oriented evaluation’. Information Hiding Workshop III, Pittsburgh, PA, USA, April 2001.
    34. 34)
      • 1. Barni, M., Bartolini, F., Piva, A.: ‘Multichannel watermarking of color images’, IEEE Trans. Circuits Syst. Video Technol., 2002, 12, (3), pp. 142156.
    35. 35)
      • 8. Coatrieux, G., Maitre, H., Sankur, B., Rolland, Y., Collorec, R.: ‘Relevance of watermarking in medical imaging’. IEEE Int. Conf. on Information Technology Applications in BioMedicine, 2000, pp. 250255.
    36. 36)
      • 5. Li, C.T., Yang, F.-M.: ‘One dimensional neighborhood forming strategy for fragile watermarking’, J. Electron. Imaging, 2003, 12, (2), pp. 284291.
    37. 37)
      • 9. Cox, I.J., Kilian, J., Thomson Leighton, F., Shamoon, T.: ‘Secure spread spectrum for multimedia’, IEEE Trans. Image Process., 1997, 6, (12), pp. 16731687.
    38. 38)
      • 18. Feng, B., Robert, H.D., Beng, C.O., Yangjiang, Y.: ‘Tailored reversible watermarking schemes for authentication of electronic clinical atlas’, IEEE Trans. Inf. Technol. Biomed., 2005, 9, (4), pp. 554563.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cvi.2012.0109
Loading

Related content

content/journals/10.1049/iet-cvi.2012.0109
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading