Abstract
This paper proposes a method to authenticate and protect medical images, especially in the region of interest (ROI). The ROI of a medical image is an important area during diagnosis and must not be distorted during transmission and storage in the hospital information system. The rest of the ROI is used for embedding a watermark that contains the patients data and authentication information, and the authentication information is generated from the ROI by analyzing wavelet coefficients with singular value decomposition (SVD), before embedding the watermark into the discrete wavelet transform (DWT) sub-band. It is important that the ratio of ROI and non-ROI areas is consistent between different systems and doctors, and this ratio is analyzed in this paper. The ROI of watermarked medical image is fragile to any distortion, and patients data and authentication information can be easily extracted from non-ROI. The effectiveness of the new approach is demonstrated empirically.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sun, Q., Chang, S.F., Kurato, M., Suto, M.: A New Semi-Fragile Image Authentication Framework Combining ECC and PKI Infrastructures. In: IEEE International Symposium on Circuits and Systems, pp. 440–443. IEEE Press, Phoenix-Scottsdale (2002)
El-Din, S.N., Moniri, M.: Fragile and Semi-Fragile Image Authentication Based on Image Self-Similarity. In: IEEE International Conference on Image Processing, pp. 897–900. IEEE Press, Los Alamitos (2002)
Bao, P., Ma, X.: Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition. IEEE Trans. on Circuits and Systems for Video Technology 15, 96–102 (2005)
Lu, Z.M., Xu, D.G., Sun, S.H.: Multipurpose Image Watermarking Algorithm Based on Multistage Vector Quantization. IEEE Trans. on Image Processing 14, 822–831 (2005)
Chang, C.C., Lin, C.C., Hu, Y.S.: An SVD Oriented Watermark Embedding Scheme with High Qualities for the Restored Images. International Journal of Innovative Computing, Information and Control 3, 609–620 (2007)
Lu, Z.M., Liao, X.W.: Counterfeiting Attacks on two Robust Watermarking Schemes. International Journal of Innovative Computing, Information and Control 2, 841–848 (2006)
Lin, C.H., Hsieh, W.S.: Applying Projection and B-spline to Image Authentication and Remedy. IEEE Trans. on Consumer Electronics 49, 1234–1239 (2003)
Lin, C.H., Hsieh, W.S.: Image Authentication Scheme for Resisting JPEG, JPEG 2000 Compression and Scaling. IEICE Trans. on Information and Systems E90-D, 126–136 (2007)
Lin, C.H.: Multi-Purpose Digital Watermarking Method – Integrating Robust, Fragile and Semi-Fragile Watermarking. International Journal of Innovative Computing, Information and Control 6, 3023–3036 (2010)
Fallahpour, M., Megias, D., Ghanbari, M.: High capacity, reversible data hiding in medical images. In: 16th IEEE International Conference on Image Processing, pp. 4241–4244. IEEE Press, Cairo (2009)
Shih, F.Y., Wu, Y.-T.: Robust Watermarking and Compression for Medical Images based on Genetic Algorithms. Information Sciences 175, 200–216 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lin, CH., Yang, CY., Chang, CW. (2010). Authentication and Protection for Medical Image. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Computational Collective Intelligence. Technologies and Applications. ICCCI 2010. Lecture Notes in Computer Science(), vol 6422. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16732-4_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-16732-4_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16731-7
Online ISBN: 978-3-642-16732-4
eBook Packages: Computer ScienceComputer Science (R0)