skip to main content
10.1145/1052380.1052414acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmumConference Proceedingsconference-collections
Article

Multiple embedding using robust watermarks for wireless medical images

Published:27 October 2004Publication History

ABSTRACT

Within the expanding paradigm of medical imaging and wireless communications there is increasing demand for transmitting diagnostic medical imagery over error-prone wireless communication channels such as those encountered in cellular phone technology. Medical images must be compressed with minimal file size to minimize transmission time and robustly coded to withstand these wireless environments. It has been reinforced through extensive research that the most crucial regions of medical images must not be degraded and compressed by a lossless or near lossless algorithm. This type of area is called the Region of Interest (ROI). Conversely, the Region of Backgrounds (ROB) may be compressed with some loss of information to achieve a higher compression level. This type of hybrid coding scheme is most useful for wireless communication where the 'bit-budget' is devoted to the ROI. This paper also develops a way for this system to operate externally to the Joint Picture Experts Group (JPEG) still image compression standard without the use of hybrid coding. A multiple watermarking technique is developed to verify the integrity of the ROI after transmission and in the situation where there may be incidental degradation that is hard to perceive or unexpected levels of compression that may degrade ROI content beyond an acceptable level. The most useful contribution in this work is assurance of ROI image content integrity after image files are subject to incidental degradation in these environments. This is made possible with extraction of DCT signature coefficients from the ROI and embedding multiply in the ROB. Strong focus is placed on the robustness to JPEG compression and the mobile channel as well as minimizing the image file size while maintaining its integrity with the use of semi-fragile, robust watermarking.

References

  1. Agrafiotis, D., Bull, D. R., and Canagarajah, N. 2003. Region of interest coding of volumetric medical images. In IEEE International Conference on Image Processing (ICIP), vol. 2, 217--220.Google ScholarGoogle Scholar
  2. Ahmed, N., Natarajan, T., and Rao, K. R. 1974. Discrete cosine transform. IEEE Transactions on Computer Theory C-23 (January), 90--94.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Anastassopoulos, G. K., and Skodras, A. 2002. JPEG2000 ROI coding in medical imaging applications. In Proceedings of the 2nd IASTED International Conference on visualisation, imaging and image processing (VIIP2002).Google ScholarGoogle Scholar
  4. Clunie, D., 2000. Lossless compression of greyscale medical images - effectivness of traditional and state of the art approaches.Google ScholarGoogle Scholar
  5. Cox, I. J., Miller, M. L., and Bloom, J. A. 2002. Digital Watermarking, 1 ed. The Morgan Kaufmann Series in Multimedia Information and Systems. Morgan Kauffman Publishers, 340 Pine St, Sixth Floor, San Fransisco, CA 94104-3205, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Foos, D. H., Muka, E., Slone, R. M., Erikson, B. J., Flynn, M. J., Clunie, D. A., Hildebrand, L., Kohm, K., and Young, S. 2000. JPEG2000 compression of medical imagery. 85--96.Google ScholarGoogle Scholar
  7. Huffman, D. A. 1962. A method for the construction of minimum redundancy codes. Proceedings of the IEEE 40, 1098--1101.Google ScholarGoogle Scholar
  8. Lie, W.-N., Hsu, T.-L., and Lin, G.-S. 2003. Verification of image content integrity by using dual watermarking on wavelets domain. In IEEE International Conference on Image Processing (ICIP), vol. 2, 487--490.Google ScholarGoogle Scholar
  9. Lin, C. Y., and Chang, S. F. 2001. A robust image authentication method distinguishing JPEG compression from malicious manipulations. IEEE Transactions on Circuits and Systems of Video Technology 11, 2, 153--168. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Osborne, D., Abbott, D., Coutts, R., and Rogers, D. 2002. An overview of wavelets for image processing for wireless communications. In SPIE Smart Structures, Devices and Systems, vol. 4935, 427--435.Google ScholarGoogle ScholarCross RefCross Ref
  11. Osborne, D., Abbott, D., Sorrell, M., and Rogers, D. 2003. Embedded importance watermarking for image verification in radiology. In SPIE BioMEMS and Nanotechnology, vol. 5275, 383--390.Google ScholarGoogle ScholarCross RefCross Ref
  12. Penedo, M., Peraman, W. A., Tahoces, P. G., Souto, M., and Vidal, J. J. 2003. Embedded wavelet region-based coding methods applied to digital mammography. In IEEE International Conference on Image Processing (ICIP), vol. 2, 197--200.Google ScholarGoogle Scholar
  13. Strom, J., and Cosman, P. 1997. Medical image compression with lossless regions of interest. Signal Processing 3, 155--171. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Viterbi, A. J. 1967. Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Transactions on Information Theory IT-13 (April), 260--269.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Wakatani, A. 2002. Digital watermarking for ROI medical images by using compressed signature image. In Proceedings of the 35th Hawaii International Conference on System Sciences. IEEE Computer Society, vol. 6, 157--163. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Wallace, G. K. 1991. The JPEG still picture compression standard. Communications of the ACM 34, 4 (April), 30--45. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    MUM '04: Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia
    October 2004
    273 pages
    ISBN:1581139810
    DOI:10.1145/1052380

    Copyright © 2004 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 27 October 2004

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate190of465submissions,41%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader