ABSTRACT
Within the expanding paradigm of medical imaging and wireless communications there is increasing demand for transmitting diagnostic medical imagery over error-prone wireless communication channels such as those encountered in cellular phone technology. Medical images must be compressed with minimal file size to minimize transmission time and robustly coded to withstand these wireless environments. It has been reinforced through extensive research that the most crucial regions of medical images must not be degraded and compressed by a lossless or near lossless algorithm. This type of area is called the Region of Interest (ROI). Conversely, the Region of Backgrounds (ROB) may be compressed with some loss of information to achieve a higher compression level. This type of hybrid coding scheme is most useful for wireless communication where the 'bit-budget' is devoted to the ROI. This paper also develops a way for this system to operate externally to the Joint Picture Experts Group (JPEG) still image compression standard without the use of hybrid coding. A multiple watermarking technique is developed to verify the integrity of the ROI after transmission and in the situation where there may be incidental degradation that is hard to perceive or unexpected levels of compression that may degrade ROI content beyond an acceptable level. The most useful contribution in this work is assurance of ROI image content integrity after image files are subject to incidental degradation in these environments. This is made possible with extraction of DCT signature coefficients from the ROI and embedding multiply in the ROB. Strong focus is placed on the robustness to JPEG compression and the mobile channel as well as minimizing the image file size while maintaining its integrity with the use of semi-fragile, robust watermarking.
- Agrafiotis, D., Bull, D. R., and Canagarajah, N. 2003. Region of interest coding of volumetric medical images. In IEEE International Conference on Image Processing (ICIP), vol. 2, 217--220.Google Scholar
- Ahmed, N., Natarajan, T., and Rao, K. R. 1974. Discrete cosine transform. IEEE Transactions on Computer Theory C-23 (January), 90--94.Google ScholarDigital Library
- Anastassopoulos, G. K., and Skodras, A. 2002. JPEG2000 ROI coding in medical imaging applications. In Proceedings of the 2nd IASTED International Conference on visualisation, imaging and image processing (VIIP2002).Google Scholar
- Clunie, D., 2000. Lossless compression of greyscale medical images - effectivness of traditional and state of the art approaches.Google Scholar
- Cox, I. J., Miller, M. L., and Bloom, J. A. 2002. Digital Watermarking, 1 ed. The Morgan Kaufmann Series in Multimedia Information and Systems. Morgan Kauffman Publishers, 340 Pine St, Sixth Floor, San Fransisco, CA 94104-3205, USA. Google ScholarDigital Library
- Foos, D. H., Muka, E., Slone, R. M., Erikson, B. J., Flynn, M. J., Clunie, D. A., Hildebrand, L., Kohm, K., and Young, S. 2000. JPEG2000 compression of medical imagery. 85--96.Google Scholar
- Huffman, D. A. 1962. A method for the construction of minimum redundancy codes. Proceedings of the IEEE 40, 1098--1101.Google Scholar
- Lie, W.-N., Hsu, T.-L., and Lin, G.-S. 2003. Verification of image content integrity by using dual watermarking on wavelets domain. In IEEE International Conference on Image Processing (ICIP), vol. 2, 487--490.Google Scholar
- Lin, C. Y., and Chang, S. F. 2001. A robust image authentication method distinguishing JPEG compression from malicious manipulations. IEEE Transactions on Circuits and Systems of Video Technology 11, 2, 153--168. Google ScholarDigital Library
- Osborne, D., Abbott, D., Coutts, R., and Rogers, D. 2002. An overview of wavelets for image processing for wireless communications. In SPIE Smart Structures, Devices and Systems, vol. 4935, 427--435.Google ScholarCross Ref
- Osborne, D., Abbott, D., Sorrell, M., and Rogers, D. 2003. Embedded importance watermarking for image verification in radiology. In SPIE BioMEMS and Nanotechnology, vol. 5275, 383--390.Google ScholarCross Ref
- Penedo, M., Peraman, W. A., Tahoces, P. G., Souto, M., and Vidal, J. J. 2003. Embedded wavelet region-based coding methods applied to digital mammography. In IEEE International Conference on Image Processing (ICIP), vol. 2, 197--200.Google Scholar
- Strom, J., and Cosman, P. 1997. Medical image compression with lossless regions of interest. Signal Processing 3, 155--171. Google ScholarDigital Library
- Viterbi, A. J. 1967. Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Transactions on Information Theory IT-13 (April), 260--269.Google ScholarDigital Library
- Wakatani, A. 2002. Digital watermarking for ROI medical images by using compressed signature image. In Proceedings of the 35th Hawaii International Conference on System Sciences. IEEE Computer Society, vol. 6, 157--163. Google ScholarDigital Library
- Wallace, G. K. 1991. The JPEG still picture compression standard. Communications of the ACM 34, 4 (April), 30--45. Google ScholarDigital Library
Recommendations
Wavelet Based Multipurpose Color Image Watermarking by Using Dual Watermarks with Human Vision System Models
In this study, we propose a complete architecture based on digital watermarking techniques to solve the issue of copyright protection and authentication for digital contents. We apply visible and semi-fragile watermarks as dual watermarks where visible ...
Embedding information reversibly in medical images for e-health
Special section: Recent trends, Challenges and Applications in Cognitive Computing for Intelligent SystemsEmbedding information in medical images is considered as one of the significant methods for safeguarding the integrity and authenticity of medical images besides providing security to electronic patient records (EPR). The conventional embedding methods ...
Image authentication and tamper detection using two complementary watermarks
ICIP'09: Proceedings of the 16th IEEE international conference on Image processingThis paper presents a novel semi-fragile watermarking scheme for image authentication and tamper detection. The proposed scheme extracts content-based image features from the approximation subband in the wavelet domain to generate two complementary ...
Comments