A robust watermarking algorithm for encrypted 3D medical images based on 3D-DCT

被引:0
作者
Xu L. [1 ]
Li J.-B. [1 ]
机构
[1] College of Information Science and Technology, Hainan University, Haikou, 570228, Hainan
来源
International Journal of Simulation: Systems, Science and Technology | 2016年 / 17卷 / 43期
基金
中国国家自然科学基金;
关键词
3D medical image; Feature vector; Image encryption; Robustness; Zero watermarking;
D O I
10.5013/IJSSST.a.17.43.33
中图分类号
学科分类号
摘要
This work proposes a novel scheme for robust watermarking in encrypted 3D medical images. In the first phase, the owner of the 3D medical image encrypts the 3D medical image in the DCT domain using Logistic Map. Then the third party embeds or extracts the watermark in the encrypted 3D medical image. The watermarking embedding phase does not affect the image data of the encrypted 3D medical image for exploiting the zero-watermarking method. The watermark is calculated with the feature vector of the 3D medical image using exclusive OR, thus generating a watermark embedding key which will be used in the watermark extraction phase. The experimental results show that the proposed watermarking scheme has good robustness to some normal and geometric attacks. © 2016, UK Simulation Society. All rights reserved.
引用
收藏
页码:33.1 / 33.6
相关论文
共 12 条
[1]  
Zhang X., Reversible Data Hiding in Encrypted Image, IEEE Signal Processing Letters, 18, 4, pp. 255-258, (2011)
[2]  
Lavanya A., Watermarking Patient Data in Encrypted Medical Images, Indian Academy of Science, 37, pp. 723-729, (2012)
[3]  
Zhang X., Separable Reversible Data Hiding in Encrypted Image, IEEE Transactions Information Forensics and Security, 7, 2, pp. 826-832, (2012)
[4]  
Hong W., An Improved Reversible Data Hiding in Encrypted Images Using Side Match, IEEE Signal Processing Letters, 19, 4, pp. 199-202, (2012)
[5]  
Ma K., Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption, IEEE Transactions Information Forensics and Security, 8, 3, pp. 553-562, (2013)
[6]  
Bianchi T., Piva A., Barni M., On the Implementation of the Discrete Fourier Transform in the Encrypted Domain, IEEE Transactions Information Forensics and Security, 4, 1, pp. 86-97, (2009)
[7]  
Zheng P., Huang J., Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain, IEEE Transactions on Image Processing, 22, 6, pp. 2455-2468, (2013)
[8]  
Hsu C., Lu C., Pei S., Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT, IEEE Transactions on Image Processing, 21, 11, pp. 4593-4607, (2012)
[9]  
Zhao B., Kou W., Li H., Et al., Effective Watermarking Scheme in the Encrypted Domain for Buyer-seller Watermarking Protocol, Information Sciences, 180, pp. 4672-4684, (2010)
[10]  
Zheng P., Huang J., Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking, Information Hiding, Springer, pp. 7692240-7692254, (2013)