Skip to main content
Top
Published in: Journal of Digital Imaging 6/2009

01-12-2009

Lossless Watermarking for Verifying the Integrity of Medical Images with Tamper Localization

Authors: Xiaotao Guo, Tian-ge Zhuang

Published in: Journal of Imaging Informatics in Medicine | Issue 6/2009

Login to get access

Abstract

Given the ease of alteration of digital data, integrity verification and tamper detection for medical images are becoming ever more important. In this paper, instead of using the conventional irreversible block-based watermarking approach to achieve tamper localization, we propose to incorporate such functionality into the region-based lossless watermarking scheme. This is achieved by partitioning an image into certain non-overlapping regions and appending the associated local authentication information directly into the watermark payload. A region of authentication, which can be flexibly specified by the user, is partitioned into small regions in a multilevel hierarchical manner. Such hierarchical structure allows the user to easily adjust the localization accuracy, and makes the tamper detection efficient. Experimental results demonstrate the effectiveness of tamper localization.
Literature
1.
go back to reference McEvoy FJ, Svalastoga E: Security of patient and study data associated with DICOM images when transferred using compact disc media. J Digit Imaging 2007 Aug 21. DOI 10.1007/s10278-007-9068-x McEvoy FJ, Svalastoga E: Security of patient and study data associated with DICOM images when transferred using compact disc media. J Digit Imaging 2007 Aug 21. DOI 10.​1007/​s10278-007-9068-x
2.
go back to reference Cao F, Huang HK, Zhou XQ: Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27:185–196, 2003CrossRefPubMed Cao F, Huang HK, Zhou XQ: Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27:185–196, 2003CrossRefPubMed
3.
go back to reference Zhou XQ, Huang HK, Lou SL: Authenticity and integrity of digital mammography images. IEEE Trans Med Imag 20:784–791, 2001CrossRef Zhou XQ, Huang HK, Lou SL: Authenticity and integrity of digital mammography images. IEEE Trans Med Imag 20:784–791, 2001CrossRef
4.
go back to reference Wong PW, Memon N: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593–1601, 2001CrossRefPubMed Wong PW, Memon N: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593–1601, 2001CrossRefPubMed
5.
go back to reference Celik MU, Sharma G, Saber E, Tekalp AM: Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11:585–595, 2002CrossRef Celik MU, Sharma G, Saber E, Tekalp AM: Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11:585–595, 2002CrossRef
6.
go back to reference Coatrieux G, Maitre H, et al: Relevance of watermarking in medical imaging. Proc IEEE EMBS Information Technology Applications in Biomedicine:250–255, 2000 Coatrieux G, Maitre H, et al: Relevance of watermarking in medical imaging. Proc IEEE EMBS Information Technology Applications in Biomedicine:250–255, 2000
7.
go back to reference Goljan M, Fridrich J, Du R: Distortion-free data embedding for images. Proceedings of the 4th Information Hiding Workshop, vol. 2137:27–41, 2001 Goljan M, Fridrich J, Du R: Distortion-free data embedding for images. Proceedings of the 4th Information Hiding Workshop, vol. 2137:27–41, 2001
8.
go back to reference De Vleeschouwer C, Delaigle JF, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5:97–105, 2003CrossRef De Vleeschouwer C, Delaigle JF, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5:97–105, 2003CrossRef
9.
go back to reference Tian J: Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13:890–896, 2003CrossRef Tian J: Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13:890–896, 2003CrossRef
10.
go back to reference Alattar AM: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13:1147–1156, 2004CrossRefPubMed Alattar AM: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13:1147–1156, 2004CrossRefPubMed
11.
go back to reference Celik MU, Sharma G, Tekalp AM, Saber E: Lossless generalized-LSB data embedding. IEEE Trans Image Process 14:253–266, 2005CrossRefPubMed Celik MU, Sharma G, Tekalp AM, Saber E: Lossless generalized-LSB data embedding. IEEE Trans Image Process 14:253–266, 2005CrossRefPubMed
12.
go back to reference Zhou Z, Huang HK, Liu BJ: Digital signature embedding (DSE) for medical image integrity in a data grid off-site backup archive. Proc SPIE 5748:306–317, 2005CrossRef Zhou Z, Huang HK, Liu BJ: Digital signature embedding (DSE) for medical image integrity in a data grid off-site backup archive. Proc SPIE 5748:306–317, 2005CrossRef
13.
go back to reference Thodi DM, Rodríguez JJ: Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16:721–30, 2007CrossRefPubMed Thodi DM, Rodríguez JJ: Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16:721–30, 2007CrossRefPubMed
14.
go back to reference Celik MU, Sharma G, Tekalp AM: Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Process 15:1042–1049, 2006CrossRefPubMed Celik MU, Sharma G, Tekalp AM: Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Process 15:1042–1049, 2006CrossRefPubMed
16.
go back to reference Rivest RL: The MD5 Message-Digest Algorithm. RFC 1321, 1992 Rivest RL: The MD5 Message-Digest Algorithm. RFC 1321, 1992
17.
go back to reference Krawczyk H, Bellare M, Canetti R: HMAC: Keyed Hashing for Message Authentication. RFC 2104, 1997 Krawczyk H, Bellare M, Canetti R: HMAC: Keyed Hashing for Message Authentication. RFC 2104, 1997
18.
go back to reference Chiang KH, Chang KC, Chang RF, Yen HY: Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J Digit Imaging 2007 Mar 1. DOI 10.1007/s10278-007-9012-0 Chiang KH, Chang KC, Chang RF, Yen HY: Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J Digit Imaging 2007 Mar 1. DOI 10.​1007/​s10278-007-9012-0
Metadata
Title
Lossless Watermarking for Verifying the Integrity of Medical Images with Tamper Localization
Authors
Xiaotao Guo
Tian-ge Zhuang
Publication date
01-12-2009
Publisher
Springer-Verlag
Published in
Journal of Imaging Informatics in Medicine / Issue 6/2009
Print ISSN: 2948-2925
Electronic ISSN: 2948-2933
DOI
https://doi.org/10.1007/s10278-008-9120-5

Other articles of this Issue 6/2009

Journal of Digital Imaging 6/2009 Go to the issue