Skip to main content

Assuring Authenticity of Digital Mammograms by Image Watermarking

  • Conference paper
Book cover Digital Mammography (IWDM 2008)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 5116))

Included in the following conference series:

Abstract

Wide availability of medical images in digital form introduces risk of changes to the image data, whether by deliberate or accidental means. Some level of protection is afforded by use of encapsulating software such as PACS and other image storage systems, and by making use of file format information (e.g. DICOM header fields). However a greater degree of assurance can be obtained by embedding a subtle hidden pattern within the actual image data, an approach termed image watermarking. The effect of adding the watermark must be below the perceptual threshold of a skilled observer, and must not measurably affect the performance of readers. This paper uses an approach developed specifically for medical image watermarking, and describes efforts to validate its effects on digital mammograms according to the above criteria. The operating region based on embedding strength values for two watermarking methods (DCT and DWT) in the vicinity of the perceptual threshold was characterized using two established perceptual quality metrics (PSNR and SVDP Sum). Subjective testing was then undertaken to compare these metric values with actual observer perception in a 2AFC experiment, and a clear perceptual threshold effect was found.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chiang, K., Chang-Chien, K., Chang, R., Yen, H.: Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. Journal of Digital Imaging 21(1), 77–90 (2008)

    Article  Google Scholar 

  2. Coatrieux, G., Maitre, H., Sankur, B., Rolland, Y., Collorec, R.: Relevance of watermarking in medical imaging. In: Proc. IEEE EMBS Int. Conf. on Information Technology Applications in Biomedicine (ITAB-ITIS 2000), pp. 250–255 (2000)

    Google Scholar 

  3. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Academic Press, London (2002)

    Google Scholar 

  4. Daly, S.: The Visible Differences Predictor: an algorithm for the assessment of image fidelity. In: Watson, A.B. (ed.) Digital Images and Human Vision, pp. 179–206. MIT Press, Cambridge (1993)

    Google Scholar 

  5. Dowling, J.A., Planitz, B.M., Maeder, A.J., Du, J., Pham, B., Boyd, C., Chen, S., Bradley, A.P., Crozier, S.: Visual quality assessment of watermarked medical images. In: Proc. SPIE Conf. on Medical Imaging, vol. 6515, pp. 65151L1-65151L12 (2007)

    Google Scholar 

  6. Dowling, J., Planitz, B., Maeder, A., Du, J., Pham, B., Boyd, C., Chen, S., Bradley, A., Crozier, S.: A comparison of DCT and DWT block based watermarking on medical image quality. In: Proc. 6th Int. Workshop on Digital Watermarking (IWDW 2007). LNCS, vol. 5041. Springer, Heidelberg (2007)

    Google Scholar 

  7. Eckert, M.P., Bradley, A.P.: Perceptual quality metrics applied to still image compression. Signal Processing 70(3), 177–200 (1998)

    Article  MATH  Google Scholar 

  8. Engan, K., Gulsrud, T.O., Josefsen, K.R.: Watermarking of digital mammograms without interfering with automatic detection of microcalcifications. In: Proc. Int. Conf. on Image Processing ( ICIP 2003), I-489-492 (2003)

    Google Scholar 

  9. Giakoumaki, A., Pavlopoulos, S., Koutsouris, D.: A medical image watermarking scheme based on wavelet transform. In: Proc. 25th Ann. Conf. of the IEEE EMBS, pp. 856–859 (2003)

    Google Scholar 

  10. Li, Y., Li, C., Wei, C.: Protection of mammograms using blind steganography and watermarking. In: Proc. Third Int. Symp. on Information Assurance and Security, pp. 496–500 (2007)

    Google Scholar 

  11. Madsen, M.T., Berbaum, K.S., Ellingson, A., Thompson, B.H., Mullan, B.F.: Lesion removal and lesion addition algorithms in lung volumetric data sets for perception studies. In: Proc. SPIE Conf. on Medical Imaging, vol. 6146, pp.61460T1-61460T10 (2006)

    Google Scholar 

  12. Maeder, A., Deriche, M.: Establishing perceptual limits for medical image compression. In: Proc. SPIE Conf. on Medical Imaging, vol. 4324, pp. 204–210 (2001)

    Google Scholar 

  13. Petitcolas, F.A.: Watermarking schemes evaluation. IEEE Signal Processing 17(5), 58–64 (2000)

    Article  Google Scholar 

  14. Wu, J.H.K., Chang, R., Chen, C., Wang, C., Kuo, T., Moon, W.K., Chen, D.: Tamper detection and recovery for medical images using near-lossless information hiding technique. Journal of Digital Imaging 21(1), 59–76 (2008)

    Article  Google Scholar 

  15. Zhou, X., Zhou, X., Huang, H., Lou, S.: Authenticity and integrity of digital mammography images. IEEE Transactions on Medical Engineering 20(8), 784–791 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Elizabeth A. Krupinski

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Maeder, A., Dowling, J., Nguyen, A., Brunton, E., Nguyen, P. (2008). Assuring Authenticity of Digital Mammograms by Image Watermarking. In: Krupinski, E.A. (eds) Digital Mammography. IWDM 2008. Lecture Notes in Computer Science, vol 5116. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70538-3_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-70538-3_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-70537-6

  • Online ISBN: 978-3-540-70538-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics