Skip to main content

Labelling and Authentication for Medical Imaging Through Data Hiding

  • Conference paper
From Data and Information Analysis to Knowledge Engineering

Abstract

In this paper two potential applications of data hiding technology in a medical scenario are considered. In particular the first application refers to labelling and the watermarking algorithm provides the possibility of directly embed into a medical image the data of the patient; the second application regards authentication and integrity verification, and data hiding is applied for verifying whether and where the content has been modified or falsified since its distribution. Two algorithms developed for these specific purposes will be presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 159.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • BARNI, M., BARTOLINI, F., DE ROSA, A., PIVA, A. (2003): Optimum Decoding and Detection of Multiplicative Watermarks. IEEE Trans. on Signal Processing, Special Issue on Signal Processing for Data Hiding, 51,4, 1118–1123.

    Google Scholar 

  • CHEN, B. and WORNELL, G. W. (2001): Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory, 47,4, 1423–1443.

    Article  MathSciNet  Google Scholar 

  • DICOM (2001): Digital Imaging and Communications in Medicine. National Electrical Manufacturers Association, Rosslyn, Virginia USA.

    Google Scholar 

  • EGGERS, J. J., BAUML, R., TZSCHOPPE, R., GIROD, B. (2003): Scalar Costa Scheme for Information Embedding. IEEE Trans. on Signal Processing, Special Issue on Signal Processing for Data Hiding, 51,4, 1003–1019.

    MathSciNet  Google Scholar 

  • PIVA, A., BARTOLINI, F., COPPINI, I., DE ROSA, A., TAMBURINI, E. (2003): Analysis of data hiding technologies for medical images. In: Wong and Delp (Eds.): Security and Watermarking of Multimedia Contents V, SPIE. Santa Clara, CA, USA, 5020, 379–390.

    Google Scholar 

  • PIVA, A., BARTOLINI, F., CALDELLI, R. (2005): Self recovery authentication of images in the DWT domain. International Journal of Image and Graphics, 5,1, 149–165.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer Berlin · Heidelberg

About this paper

Cite this paper

De Rosa, A., Caldelli, R., Piva, A. (2006). Labelling and Authentication for Medical Imaging Through Data Hiding. In: Spiliopoulou, M., Kruse, R., Borgelt, C., Nürnberger, A., Gaul, W. (eds) From Data and Information Analysis to Knowledge Engineering. Studies in Classification, Data Analysis, and Knowledge Organization. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-31314-1_78

Download citation

Publish with us

Policies and ethics