Watermarking in Medical Image

被引:0
作者
Ali, Nashwan Alsalam [1 ]
Hamid, Iman I. [1 ]
机构
[1] Univ Baghdad, Coll Educ women, Comp Sci Dept, Baghdad, Iraq
关键词
watermarking; medical image; DICOM; Arnold cat map; STEGANOGRAPHY; AUTHENTICITY; INFORMATION; INTEGRITY; HEADER;
D O I
10.3991/ijoe.v19i06.37591
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible water-marking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in the slices with the highest saturation for embedding a secret message in the NROI because the ROI contains the infor-mation of the ill, so it cannot be modified. The evaluation of the proposed method using PSNR and MSE shows good results according to both requirements of the watermark system, the invisibility and quality of the watermarked medical image where the PSNR value is up to 43.3936 and MSE is up to 0.000041.
引用
收藏
页码:114 / 126
页数:13
相关论文
共 32 条
[1]   Image encryption based on Independent Component Analysis and Arnold's Cat Map [J].
Abbas, Nidaa AbdulMohsin .
EGYPTIAN INFORMATICS JOURNAL, 2016, 17 (01) :139-146
[2]   DR-LL Gan: Diabetic Retinopathy Lesions Synthesis using Generative Adversarial Network [J].
Abbood, Saif Hameed ;
Hamed, Haza Nuzly Abdull ;
Rahim, Mohd Shafry Mohd ;
Alaidi, Abdul Hadi M. ;
ALRikabi, Haider Th Salim .
INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2022, 18 (03) :151-163
[3]   Evaluation of the Interference's Impact of Cooperative Surveillance Systems Signals Processing for Healthcare [J].
Abdul-Hussein, Mohammad K. ;
Strelnytskyi, Oleksii ;
Obod, Ivan ;
Svyd, Iryna ;
Alrikabi, Haider Th Salim .
INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2022, 18 (03) :43-59
[4]   A safe and secured iris template using steganography and cryptography [J].
Abikoye, Oluwakemi Christiana ;
Ojo, Umar Abdulraheem ;
Awotunde, Joseph Bamidele ;
Ogundokun, Roseline Oluwaseun .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (31-32) :23483-23506
[5]   A Dynamic Round Triple Data Encryption Standard Cryptographic Technique for Data Security [J].
Akande, Oluwatobi Noah ;
Abikoye, Oluwakemi Christiana ;
Kayode, Aderonke Anthonia ;
Aro, Oladele Taye ;
Ogundokun, Oluwaseun Roseline .
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2020, PT VI, 2020, 12254 :487-499
[6]   Providing Integrity, Authenticity, and Confidentiality for Header and Pixel Data of DICOM Images [J].
Al-Haj, Ali .
JOURNAL OF DIGITAL IMAGING, 2015, 28 (02) :179-187
[7]  
Al-zubidi A., 2021, INT J INTERACTIVE MO, V15, P34, DOI [10.3991/ijim.v15i16.24195, DOI 10.3991/IJIM.V15I16.24195]
[8]  
Ali N. A., 2019, IRAQ J SCI, V60, P2490, DOI [10.24996/ijs.2019.60.11.21, DOI 10.24996/IJS.2019.60.11.21]
[9]   Encryption of Color Image Based on DNA Strand and Exponential Factor [J].
Aljazaery, Ibtisam A. ;
ALRikabi, Haider Th Salim ;
Alaidi, Abdul Hadi M. .
INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2022, 18 (03) :101-113
[10]   Secure Chaos of 5G Wireless Communication System Based on IOT Applications [J].
ALRikabi, Haider TH. Salim ;
Hazim, Hussein Tuama .
INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2022, 18 (12) :89-105