Skip to main content

Authenticating Medical Images through Repetitive Index Modulation Based Watermarking

  • Conference paper
  • 1076 Accesses

Abstract

In this work we propose a Repetitive Index Modulation (RIM) based digital watermarking scheme for authentication and integrity verification of medical images. Exploiting the fact that many types of medical images have significant background areas and medically meaningful Regions Of Interest (ROI), which represent the actual contents of the images, the scheme uses the contents of the ROI to create a content-dependent watermark and embeds the watermark in the background areas. Therefore when any pixel of the ROI is attacked, the watermark embedded in the background areas will be different from the watermark calculated according to the attacked contents, making the authentication unsuccessful. Because the creation of the watermark is content-dependent and the watermark is only embedded in the background areas, the proposed scheme can actually protect the content without distorting it.

The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-642-02312-5_25

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bao, F., Deng, R.H., Ooi, B.C., Yang, Y.: Tailored Reversible Watermarking Schemes for Authentication of Electronic Clinical Atlas. IEEE Transactions on Information Technology in Biomedicine 9(4), 554–563 (2005)

    Article  Google Scholar 

  2. Coatrieux, G., Maitre, H., Sankur, B.: Strict Integrity Control of Biomedical Images. In: Proc. Security and Watermarking of Multimedia Contents III, SPIE, vol. 4314, pp. 229–240 (2001)

    Google Scholar 

  3. Guo, X., Zhuang, T.G.: A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data. Journal of Digital Imaging (July 10, 2007), doi:10.1007/s10278-007-9043-6

    Google Scholar 

  4. Ker, A.D.: Locally Square Distortion and Batch Steganographic Capacity. International Journal of Digital Crime and Forensics 1(1), 29–44 (2009)

    Article  Google Scholar 

  5. Kim, H.Y., Pamboukian, S.V.G., Barreto, S.S.L.M.: Authentication Watermarking for Binary Images. In: Li, C.-T. (ed.) Multimedia Forensics and Security, IGI Global (2008)

    Google Scholar 

  6. Kong, X., Feng, R.: Watermarking Medical Signals for Telemedicine. IEEE Transactions on Information Technology in Biomedicine 5(3), 195–201 (2001)

    Article  Google Scholar 

  7. Li, C.-T.: Reversible Watermarking Scheme with Image-independent Embedding Capacity. IEE Proceedings - Vision, Image, and Signal Processing 152(6), 779–786 (2005)

    Article  Google Scholar 

  8. Li, C.-T., Yuan, Y.: Digital Watermarking Scheme Exploiting Non-deterministic Dependence for Image Authentication. Optical Engineering 45(12), 127001-1–127001-6 (2006)

    Google Scholar 

  9. Li, C.-T., Li, Y.: Protection of Digital Mammograms on PACSs Using Data Hiding Techniques. International Journal of Digital Crime and Forensics 1(1), 60–75 (2009)

    Article  MathSciNet  Google Scholar 

  10. Thodi, D.M., Rodriguez, J.J.: Expansion Embedding Techniques for Reversible Watermarking. IEEE Transactions on Image Processing 16(3), 721–730 (2007)

    Article  MathSciNet  Google Scholar 

  11. Tsai, W.H.: Moment-Preserving Thresholding: a New Approach. Computer Vision, Graphics, and Image Processing 29(3), 377–393 (1985)

    Article  Google Scholar 

  12. Zhou, X.Q., Huang, H.K., Lou, S.L.: Authenticity and integrity of digital mammography images. IEEE Transactions on Medical Imaging 20, 784–791 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Li, CT., Li, Y. (2009). Authenticating Medical Images through Repetitive Index Modulation Based Watermarking. In: Sorell, M. (eds) Forensics in Telecommunications, Information and Multimedia. e-Forensics 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 8. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02312-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02312-5_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02311-8

  • Online ISBN: 978-3-642-02312-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics