Abstract
In this work we propose a Repetitive Index Modulation (RIM) based digital watermarking scheme for authentication and integrity verification of medical images. Exploiting the fact that many types of medical images have significant background areas and medically meaningful Regions Of Interest (ROI), which represent the actual contents of the images, the scheme uses the contents of the ROI to create a content-dependent watermark and embeds the watermark in the background areas. Therefore when any pixel of the ROI is attacked, the watermark embedded in the background areas will be different from the watermark calculated according to the attacked contents, making the authentication unsuccessful. Because the creation of the watermark is content-dependent and the watermark is only embedded in the background areas, the proposed scheme can actually protect the content without distorting it.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-642-02312-5_25
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Bao, F., Deng, R.H., Ooi, B.C., Yang, Y.: Tailored Reversible Watermarking Schemes for Authentication of Electronic Clinical Atlas. IEEE Transactions on Information Technology in Biomedicine 9(4), 554–563 (2005)
Coatrieux, G., Maitre, H., Sankur, B.: Strict Integrity Control of Biomedical Images. In: Proc. Security and Watermarking of Multimedia Contents III, SPIE, vol. 4314, pp. 229–240 (2001)
Guo, X., Zhuang, T.G.: A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data. Journal of Digital Imaging (July 10, 2007), doi:10.1007/s10278-007-9043-6
Ker, A.D.: Locally Square Distortion and Batch Steganographic Capacity. International Journal of Digital Crime and Forensics 1(1), 29–44 (2009)
Kim, H.Y., Pamboukian, S.V.G., Barreto, S.S.L.M.: Authentication Watermarking for Binary Images. In: Li, C.-T. (ed.) Multimedia Forensics and Security, IGI Global (2008)
Kong, X., Feng, R.: Watermarking Medical Signals for Telemedicine. IEEE Transactions on Information Technology in Biomedicine 5(3), 195–201 (2001)
Li, C.-T.: Reversible Watermarking Scheme with Image-independent Embedding Capacity. IEE Proceedings - Vision, Image, and Signal Processing 152(6), 779–786 (2005)
Li, C.-T., Yuan, Y.: Digital Watermarking Scheme Exploiting Non-deterministic Dependence for Image Authentication. Optical Engineering 45(12), 127001-1–127001-6 (2006)
Li, C.-T., Li, Y.: Protection of Digital Mammograms on PACSs Using Data Hiding Techniques. International Journal of Digital Crime and Forensics 1(1), 60–75 (2009)
Thodi, D.M., Rodriguez, J.J.: Expansion Embedding Techniques for Reversible Watermarking. IEEE Transactions on Image Processing 16(3), 721–730 (2007)
Tsai, W.H.: Moment-Preserving Thresholding: a New Approach. Computer Vision, Graphics, and Image Processing 29(3), 377–393 (1985)
Zhou, X.Q., Huang, H.K., Lou, S.L.: Authenticity and integrity of digital mammography images. IEEE Transactions on Medical Imaging 20, 784–791 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Li, CT., Li, Y. (2009). Authenticating Medical Images through Repetitive Index Modulation Based Watermarking. In: Sorell, M. (eds) Forensics in Telecommunications, Information and Multimedia. e-Forensics 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 8. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02312-5_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-02312-5_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02311-8
Online ISBN: 978-3-642-02312-5
eBook Packages: Computer ScienceComputer Science (R0)