Skip to main content
Top
Published in: Journal of Digital Imaging 1/2008

01-03-2008

Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique

Authors: Jeffery H. K. Wu, Ruey-Feng Chang, Chii-Jen Chen, Ching-Lin Wang, Ta-Hsun Kuo, Woo Kyung Moon, Dar-Ren Chen

Published in: Journal of Imaging Informatics in Medicine | Issue 1/2008

Login to get access

Abstract

Digital medical images are very easy to be modified for illegal purposes. For example, microcalcification in mammography is an important diagnostic clue, and it can be wiped off intentionally for insurance purposes or added intentionally into a normal mammography. In this paper, we proposed two methods to tamper detection and recovery for a medical image. A 1024 × 1024 x-ray mammogram was chosen to test the ability of tamper detection and recovery. At first, a medical image is divided into several blocks. For each block, an adaptive robust digital watermarking method combined with the modulo operation is used to hide both the authentication message and the recovery information. In the first method, each block is embedded with the authentication message and the recovery information of other blocks. Because the recovered block is too small and excessively compressed, the concept of region of interest (ROI) is introduced into the second method. If there are no tampered blocks, the original image can be obtained with only the stego image. When the ROI, such as microcalcification in mammography, is tampered with, an approximate image will be obtained from other blocks. From the experimental results, the proposed near-lossless method is proven to effectively detect a tampered medical image and recover the original ROI image. In this study, an adaptive robust digital watermarking method combined with the operation of modulo 256 was chosen to achieve information hiding and image authentication. With the proposal method, any random changes on the stego image will be detected in high probability.
Literature
1.
go back to reference Hsu C-T, Wu J-L: Multiresolution watermarking for digital images. IEEE Trans Circuit Syst–II 45:1097–1101, 1998CrossRef Hsu C-T, Wu J-L: Multiresolution watermarking for digital images. IEEE Trans Circuit Syst–II 45:1097–1101, 1998CrossRef
2.
go back to reference Podilchuk CI, Zeng W: Image-adaptive watermarking using visual models. IEEE J Sel Areas Commun 16:525–539, 1998CrossRef Podilchuk CI, Zeng W: Image-adaptive watermarking using visual models. IEEE J Sel Areas Commun 16:525–539, 1998CrossRef
3.
go back to reference Pitas I: A method for watermark casting on digital images. IEEE Trans Circuits Syst Video Technol 8:775–780, 1998CrossRef Pitas I: A method for watermark casting on digital images. IEEE Trans Circuits Syst Video Technol 8:775–780, 1998CrossRef
4.
go back to reference Wei ZH, Qin P, Fu YQ: Perceptual digital watermark of images using wavelet transform. IEEE Trans Consum Electron 44:1267–1272, 1998CrossRef Wei ZH, Qin P, Fu YQ: Perceptual digital watermark of images using wavelet transform. IEEE Trans Consum Electron 44:1267–1272, 1998CrossRef
5.
6.
go back to reference Lee C-H, Lee Y-K: An adaptive digital image watermarking technique for copyright protection. IEEE Trans Consum Electron 45:1005–1015, 1999CrossRef Lee C-H, Lee Y-K: An adaptive digital image watermarking technique for copyright protection. IEEE Trans Consum Electron 45:1005–1015, 1999CrossRef
7.
go back to reference Ng KS, Cheng LM, Cheng LL, Wang MK: Adaptive watermarking by using pixel position shifting technique. IEEE Trans Consum Electron 45:1057–1064, 1999CrossRef Ng KS, Cheng LM, Cheng LL, Wang MK: Adaptive watermarking by using pixel position shifting technique. IEEE Trans Consum Electron 45:1057–1064, 1999CrossRef
8.
go back to reference Hwang M-S, Chang C-C, Hwang K-F: A watermarking technique based on one-way hash functions. IEEE Trans Consum Electron 45:286–294, 1999CrossRef Hwang M-S, Chang C-C, Hwang K-F: A watermarking technique based on one-way hash functions. IEEE Trans Consum Electron 45:286–294, 1999CrossRef
9.
go back to reference Fridrich J, Goljan M, Du R: Invertible authentication. In: Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Content III. San Jose, CA, 2001, pp 197–208 Fridrich J, Goljan M, Du R: Invertible authentication. In: Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Content III. San Jose, CA, 2001, pp 197–208
10.
go back to reference Celik MU, Sharma G, Tekalp AM, Saber E: Reversible data hiding. In: IEEE International Conference on Image Processing. Rochester, NY, 2002, pp 157–160 Celik MU, Sharma G, Tekalp AM, Saber E: Reversible data hiding. In: IEEE International Conference on Image Processing. Rochester, NY, 2002, pp 157–160
11.
go back to reference Goljan M, Fridrich J, Du R: Distortion-free data embedding. In: The 4th Information Hiding Workshop. Pittsburgh, Pennsylvania, 2001, pp 27-41 Goljan M, Fridrich J, Du R: Distortion-free data embedding. In: The 4th Information Hiding Workshop. Pittsburgh, Pennsylvania, 2001, pp 27-41
12.
go back to reference Fridrich J, Goljan M, Du R: Invertible authentication watermark for JPEG images. In: Information Technology: Coding and Computing. Las Vegas, Nevada, 2001, pp 223–227 Fridrich J, Goljan M, Du R: Invertible authentication watermark for JPEG images. In: Information Technology: Coding and Computing. Las Vegas, Nevada, 2001, pp 223–227
13.
go back to reference Vleeschouwer CD, Delaigle J-F, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5:97–105, 2003CrossRef Vleeschouwer CD, Delaigle J-F, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5:97–105, 2003CrossRef
14.
go back to reference Gokturk SB, Tomasi C, Girod B, Beaulieu C: Medical image compression based on region of interest, with application to colon CT images. In: Annual Reports of the Research Reactor Institute, Kyoto University. Istanbul, Turkey, 2001, pp 2453–2356 Gokturk SB, Tomasi C, Girod B, Beaulieu C: Medical image compression based on region of interest, with application to colon CT images. In: Annual Reports of the Research Reactor Institute, Kyoto University. Istanbul, Turkey, 2001, pp 2453–2356
15.
go back to reference Fridrich J, Goljan M, Du R: Lossless data embedding—new paradigm in digital watermarking. J Appl Signal Process 185–196, 2002 Fridrich J, Goljan M, Du R: Lossless data embedding—new paradigm in digital watermarking. J Appl Signal Process 185–196, 2002
16.
go back to reference Fridrich J, Goljan M, Du R: Lossless data embedding for all image formats. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents. San Jose, CA, 2002, pp 572–583 Fridrich J, Goljan M, Du R: Lossless data embedding for all image formats. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents. San Jose, CA, 2002, pp 572–583
17.
go back to reference Du R, Fridrich J: Lossless authentication of MPEG-2 video. In: IEEE International Conference on Image Processing. Rochester, NY, 2002, pp 889–892 Du R, Fridrich J: Lossless authentication of MPEG-2 video. In: IEEE International Conference on Image Processing. Rochester, NY, 2002, pp 889–892
18.
go back to reference Welch TA: A technique for high-performance data-compression. IEEE Comput 17:8–19, 1984 Welch TA: A technique for high-performance data-compression. IEEE Comput 17:8–19, 1984
19.
go back to reference Weinberger MJ, Rissanen JJ, Arps B: Applications of universal context modeling to lossless compression of gray-scale images. IEEE Trans Image Process 5:575–586, 1996PubMedCrossRef Weinberger MJ, Rissanen JJ, Arps B: Applications of universal context modeling to lossless compression of gray-scale images. IEEE Trans Image Process 5:575–586, 1996PubMedCrossRef
20.
go back to reference Shen L, Rangayyan RM: Lossless compression of continuous-tone images by combined inter-bit-plane decorrelation and JBIG coding. J Electron Imaging 6:198–207, 1997CrossRef Shen L, Rangayyan RM: Lossless compression of continuous-tone images by combined inter-bit-plane decorrelation and JBIG coding. J Electron Imaging 6:198–207, 1997CrossRef
21.
go back to reference Fridrich J: Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8:1259–1284, 1998CrossRef Fridrich J: Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8:1259–1284, 1998CrossRef
22.
go back to reference Herrigel A, Ruanidh JO, Petersen H, Pereira S, Pun T: Secure copyright protection techniques for digital images. In: Information Hiding Workshop. Portland, Oregon, 1998, pp 169–190 Herrigel A, Ruanidh JO, Petersen H, Pereira S, Pun T: Secure copyright protection techniques for digital images. In: Information Hiding Workshop. Portland, Oregon, 1998, pp 169–190
23.
go back to reference Friedman GL: The trustworthy digital camera—restoring credibility to the photographic image. IEEE Trans Consum Electron 39:905–910, 1993CrossRef Friedman GL: The trustworthy digital camera—restoring credibility to the photographic image. IEEE Trans Consum Electron 39:905–910, 1993CrossRef
24.
go back to reference Schneider M, Chang S-F: A robust content based digital signature for image authentication. In: IEEE International Conference on Image Processing. Lausanne, Switzerland, 1996, pp 227–230 Schneider M, Chang S-F: A robust content based digital signature for image authentication. In: IEEE International Conference on Image Processing. Lausanne, Switzerland, 1996, pp 227–230
25.
go back to reference Queluz MP: Towards robust, content based techniques for image authentication. In: IEEE Workshop on Multimedia Signal Processing. Los Angeles, CA, 1998, pp 297–302 Queluz MP: Towards robust, content based techniques for image authentication. In: IEEE Workshop on Multimedia Signal Processing. Los Angeles, CA, 1998, pp 297–302
26.
go back to reference Wong PW, Memon N: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593–1601, 2001PubMedCrossRef Wong PW, Memon N: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593–1601, 2001PubMedCrossRef
27.
go back to reference Bhattacharjee S, Kutter M: Compression tolerant image authentication. In: IEEE International Conference on Image Processing. Chicago, IL, 1998, pp 435–439 Bhattacharjee S, Kutter M: Compression tolerant image authentication. In: IEEE International Conference on Image Processing. Chicago, IL, 1998, pp 435–439
28.
go back to reference Lu C-S, Liao H-YM: Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 10:1579–1592, 2001PubMedCrossRef Lu C-S, Liao H-YM: Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 10:1579–1592, 2001PubMedCrossRef
29.
go back to reference Yu G-J, Lu C-S, Laio H-YM: Mean-quantization-based fragile watermarking for image authentication. Opt Eng 40:1396–1408, 2001CrossRef Yu G-J, Lu C-S, Laio H-YM: Mean-quantization-based fragile watermarking for image authentication. Opt Eng 40:1396–1408, 2001CrossRef
30.
go back to reference Kundur D, Hatzinakos D: Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87:1167–1180, 1999CrossRef Kundur D, Hatzinakos D: Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87:1167–1180, 1999CrossRef
31.
go back to reference Podilchuk CI, Delp EJ: Digital watermarking: algorithms and applications. IEEE Signal Process Mag 18:33–46, 2001CrossRef Podilchuk CI, Delp EJ: Digital watermarking: algorithms and applications. IEEE Signal Process Mag 18:33–46, 2001CrossRef
32.
go back to reference Lin ET, Podilchuk CI, Delp EJ: Detection of image alterations using semi-fragile watermarks. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents. San Jose, CA, 2000, pp 152–163 Lin ET, Podilchuk CI, Delp EJ: Detection of image alterations using semi-fragile watermarks. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents. San Jose, CA, 2000, pp 152–163
33.
go back to reference Tefas A, Pitas I: Image authentication and tamper proofing using mathematical morphology. In: Proceedings of European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland, 2000, vol 3, pp 1681–1684 Tefas A, Pitas I: Image authentication and tamper proofing using mathematical morphology. In: Proceedings of European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland, 2000, vol 3, pp 1681–1684
34.
go back to reference Lee YL, Kim HC, Park HW: Blocking effect reduction of JPEG images by signal adaptive filtering. IEEE Trans Image Process 7:229–234, 1998PubMedCrossRef Lee YL, Kim HC, Park HW: Blocking effect reduction of JPEG images by signal adaptive filtering. IEEE Trans Image Process 7:229–234, 1998PubMedCrossRef
35.
go back to reference Han Y-H, Leou J-J: Detection and correction of transmission errors in JPEG images. IEEE Trans Circuits Syst Video Technol 8:221–231, 1998CrossRef Han Y-H, Leou J-J: Detection and correction of transmission errors in JPEG images. IEEE Trans Circuits Syst Video Technol 8:221–231, 1998CrossRef
36.
go back to reference Konstantinides K, Bhaskaran V, Beretta G: Image sharpening in the JPEG domain. IEEE Trans Image Process 8:874–878, 1999PubMedCrossRef Konstantinides K, Bhaskaran V, Beretta G: Image sharpening in the JPEG domain. IEEE Trans Image Process 8:874–878, 1999PubMedCrossRef
37.
go back to reference In J, Shirani S, Kossentini F: On RD optimized progressive image coding using JPEG. IEEE Trans Image Process 8:1630–1638, 1999PubMedCrossRef In J, Shirani S, Kossentini F: On RD optimized progressive image coding using JPEG. IEEE Trans Image Process 8:1630–1638, 1999PubMedCrossRef
38.
go back to reference Cheng H-D, Lui YM, Freimanis RI: A novel approach to microcalcification detection using fuzzy logic technique. IEEE Trans Med Imag 17:442–450, 1998CrossRef Cheng H-D, Lui YM, Freimanis RI: A novel approach to microcalcification detection using fuzzy logic technique. IEEE Trans Med Imag 17:442–450, 1998CrossRef
Metadata
Title
Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique
Authors
Jeffery H. K. Wu
Ruey-Feng Chang
Chii-Jen Chen
Ching-Lin Wang
Ta-Hsun Kuo
Woo Kyung Moon
Dar-Ren Chen
Publication date
01-03-2008
Publisher
Springer-Verlag
Published in
Journal of Imaging Informatics in Medicine / Issue 1/2008
Print ISSN: 2948-2925
Electronic ISSN: 2948-2933
DOI
https://doi.org/10.1007/s10278-007-9011-1

Other articles of this Issue 1/2008

Journal of Digital Imaging 1/2008 Go to the issue