Skip to main content

Authentication and Protection for Medical Image

  • Conference paper
Computational Collective Intelligence. Technologies and Applications (ICCCI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6422))

Included in the following conference series:

Abstract

This paper proposes a method to authenticate and protect medical images, especially in the region of interest (ROI). The ROI of a medical image is an important area during diagnosis and must not be distorted during transmission and storage in the hospital information system. The rest of the ROI is used for embedding a watermark that contains the patients data and authentication information, and the authentication information is generated from the ROI by analyzing wavelet coefficients with singular value decomposition (SVD), before embedding the watermark into the discrete wavelet transform (DWT) sub-band. It is important that the ratio of ROI and non-ROI areas is consistent between different systems and doctors, and this ratio is analyzed in this paper. The ROI of watermarked medical image is fragile to any distortion, and patients data and authentication information can be easily extracted from non-ROI. The effectiveness of the new approach is demonstrated empirically.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sun, Q., Chang, S.F., Kurato, M., Suto, M.: A New Semi-Fragile Image Authentication Framework Combining ECC and PKI Infrastructures. In: IEEE International Symposium on Circuits and Systems, pp. 440–443. IEEE Press, Phoenix-Scottsdale (2002)

    Google Scholar 

  2. El-Din, S.N., Moniri, M.: Fragile and Semi-Fragile Image Authentication Based on Image Self-Similarity. In: IEEE International Conference on Image Processing, pp. 897–900. IEEE Press, Los Alamitos (2002)

    Google Scholar 

  3. Bao, P., Ma, X.: Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition. IEEE Trans. on Circuits and Systems for Video Technology 15, 96–102 (2005)

    Article  Google Scholar 

  4. Lu, Z.M., Xu, D.G., Sun, S.H.: Multipurpose Image Watermarking Algorithm Based on Multistage Vector Quantization. IEEE Trans. on Image Processing 14, 822–831 (2005)

    Article  Google Scholar 

  5. Chang, C.C., Lin, C.C., Hu, Y.S.: An SVD Oriented Watermark Embedding Scheme with High Qualities for the Restored Images. International Journal of Innovative Computing, Information and Control 3, 609–620 (2007)

    Google Scholar 

  6. Lu, Z.M., Liao, X.W.: Counterfeiting Attacks on two Robust Watermarking Schemes. International Journal of Innovative Computing, Information and Control 2, 841–848 (2006)

    Google Scholar 

  7. Lin, C.H., Hsieh, W.S.: Applying Projection and B-spline to Image Authentication and Remedy. IEEE Trans. on Consumer Electronics 49, 1234–1239 (2003)

    Article  Google Scholar 

  8. Lin, C.H., Hsieh, W.S.: Image Authentication Scheme for Resisting JPEG, JPEG 2000 Compression and Scaling. IEICE Trans. on Information and Systems E90-D, 126–136 (2007)

    Article  Google Scholar 

  9. Lin, C.H.: Multi-Purpose Digital Watermarking Method – Integrating Robust, Fragile and Semi-Fragile Watermarking. International Journal of Innovative Computing, Information and Control 6, 3023–3036 (2010)

    Google Scholar 

  10. Fallahpour, M., Megias, D., Ghanbari, M.: High capacity, reversible data hiding in medical images. In: 16th IEEE International Conference on Image Processing, pp. 4241–4244. IEEE Press, Cairo (2009)

    Google Scholar 

  11. Shih, F.Y., Wu, Y.-T.: Robust Watermarking and Compression for Medical Images based on Genetic Algorithms. Information Sciences 175, 200–216 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lin, CH., Yang, CY., Chang, CW. (2010). Authentication and Protection for Medical Image. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Computational Collective Intelligence. Technologies and Applications. ICCCI 2010. Lecture Notes in Computer Science(), vol 6422. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16732-4_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16732-4_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16731-7

  • Online ISBN: 978-3-642-16732-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics