Fragile Watermarking of Medical Image for Content Authentication and Security

Boujemaa, Nassiri and Abdelaziz, El aissaoui and Yousef, EL mourabit and Rachid, Latif and Aziz, Bsiss Mohammed Fragile Watermarking of Medical Image for Content Authentication and Security. IJCSN - International Journal of Computer Science and Network, 2016, vol. 5, n. 5. [Journal article (Unpaginated)]

[img] Text

Download (244kB)

English abstract

Currently in the health environment, medical images are a very crucial and important part of the medical information because of the large amount of information and their disposal two-dimensional. Medical images are stored, transmitted and recovered on the network. The images users await efficient solutions to preserve the quality and protect the integrity of images exchanged. In this context, watermarking medical image has been widely recognized as an appropriate technique to enhance the security, authenticity and content verification. Watermarking image may bring elements of complementary research methods of classical cryptography. The objective of this paper is to develop a method to authenticate medical images to grayscale, detect falsified on these image zones and retrieve the original image using a blind fragile watermarking technique. We propose a method based on the discrete wavelet transform (DWT) for the application of content authentication. In our algorithm, the watermark is embedded into the sub-bands detail coefficient. The subbands coefficients are marked by adding a watermark of the same size as three sub-bands and a comparison of embedding a watermark at vertical (LH), horizontal (HL) and diagonal (HH) details. We tested the proposed algorithm after applying some standard types of attacks and more interesting. The results have been analyzed in terms of imperceptibility and fragility. Tests were conducted on the medical images to grayscale and color size 512 × 512.

Item type: Journal article (Unpaginated)
Keywords: Watermarking, DWT, Imperceptibility, Authenticity, Fragility, Normalized Hamming Distance, Medical Image
Subjects: I. Information treatment for information services > IH. Image systems.
Depositing user: IJCSN Journal
Date deposited: 29 Oct 2016 02:32
Last modified: 29 Oct 2016 02:32


"SEEK" links will first look for possible matches inside E-LIS and query Google Scholar if no results are found.

[1] J.L. Dugelay and S. Roche, 1999 , “Introduction au tatouage d’image,” in Ann. Télécommunication, vol. 54, pp. 427–437. [2] P. Bas, 2000, ‘‘Méthodes de tatouages d’images fondées sur le contenu’’. Thèse de Doctorat, Institut National Polytechnique de Grenoble. [3] S. Katzenbeisser and F. A. Petitcolas, 2000, ‘‘Information Hiding, Techniques for Steganography and Digital Watermarking’’, Artech House. [4] Nikolaidis and I. Pitas, 1999, “Digital Image Watermarking : An Overview’’. In ICMCS, volume 1, pages 1_6. [5] B. Mathon, 2011, ‘‘Développement de méthodes de tatouage sûres pour le traçage de contenus multimédia’’, thèse en cotutelle internationale, université de Grenoble et catholique de Louvain. [6] G .Coatrieux, , H. Maitre, B .Sankur, Y .Rolland, and Collorec, R., 2000 “Relevance of watermarking in medical imaging’’. Proceedings of International Conference on Information , Technology Applications in Biomedicine, IEEE-EMBS, pp. 250–255. [7] I. J .Cox, M. L .Miller and J. A. Bloom, 2002 ,‘‘ Digital watermarking’’.San Francisco, CA: Morgan Kauffman. [8] G. Coatrieux, L. Lecornu, and B .Sankur, 2006, ‘‘A review of image watermarking applications in healthcare’’, Proceedings of the 28th IEEE. [9] H. Yuan, X.-P. Zhang, 2004, "A Multiscale Fragile Watermark Based on the Guassian Mix-ture Model in Wavelet Domain", Proceedings of IEEE ICASSP Confernce, Vol. 3, pp.17-21, May. [10] N.F. Johnson, Z. Duric, S. Jajodia, 2000, "Information Hiding: Stegnography and Watermarking Attacks and Counterattacks", Kluwer Academic Publishers, Dordrechet. [11] S.Mallat, 1989, “Multiresolution Approximation and Wavelet Orthonormal Bases of L2 (R)”, Trans. Amer. Math. Soc, pp. 69-87. [12] Z. Dezhong, C. Fayi, 2008, “Face Recognition based on Wavelet Transform and Image Comparison”,International Symposium on Computational Intelligence and Design. [13] S.Chikhi, 2008 ,‘‘Contribution to the supple authentication by digital techniques watermarkings digital image: application to medical image'', PhD thesis, Univesity of Constantine Algeria . [14] N. V. Rao & V. Meena Kumari, 2011, “Watermarking in Medical Imaging for Security and Authentication’’, Information Security Journal: A Global Perspective, 20:3, 148-155. [15] C.Shien Lu, 2005, “Multimedia security : steganography and digital watermarking techniques for protection of intellectual property” ,Institue of Information Science Academie Sinica,Taiwan. [16] C.R. Rodriguez, F. Uribe Claudia, T. Blas Gershom, 2007, “Data Hiding Scheme for Medical Images”, Proceedings of IEEE 17thInternational Conference on Electronics, Communications and Computers (CONIELECOMP). [17] F. Autrusseau, 2002, ‘‘Watermarking based on modeling the human visual system and the transformation Mojette’’, Doctoral thesis, University of Nantes. [18] H.Y. Leung, L.M. Cheng, and L.L. Cheng, 2009, “Digital Watermarking Schemes Using Multiresolution Curvelet and HVS Model” Proceedings of Springer , 8th International Workshop, IWDW, Guildford, UK, , August 24-26.


Downloads per month over past year

Actions (login required)

View Item View Item