A secure lossless recovery for medical images based on image encoding and data self-embedding

被引:8
作者
Gao, Hang [1 ]
Gao, Tiegang [2 ]
机构
[1] Nankai Univ, Coll Comp Sci, Tianjin 300381, Peoples R China
[2] Nankai Univ, Coll Software, Tianjin 300381, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2022年 / 25卷 / 01期
关键词
Image encoding; JPEG-LS; Permutation ordered binary; Tampers detection and recovery; FRAGILE WATERMARKING SCHEME; POB NUMBER SYSTEM; TAMPERING DETECTION; LOCALIZATION; AUTHENTICATION; COMPRESSION;
D O I
10.1007/s10586-021-03446-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To protect the security of data outsourced to the cloud, the tampers detection and recovery for outsourced image have aroused the concern of people. A secure tampering detection and lossless recovery for medical images (MI) using permutation ordered binary (POB) number system is proposed. In the proposed scheme, the region of interest (ROI) of MI is first extracted, and then, ROI is divided into some no-overlapping blocks, and image encoding is conducted on these blocks based on the better compression performance of JPEG-LS for medical image. After that, the generated compression data by all the blocks are divided into high 4-bit and low 4-bit planes, and shuffling and combination are used to generate two plane images. Owing to the substantial redundancies space in the compressed data, the data of each plane are spread to the size of the original image. Lastly, authentication data of two bits is obtained for every pixel and inserted into the pixel itself within the each plane, and the corresponding 10-bit data is transformed into the POB value of 8-bit. Furthermore, encryption is implemented on the above image to produce two shares which can be outsourced to the cloud server. The users can detect tampered part and recover original image when they down load the shares from the cloud. Extensive experiments on some ordinary medical image and COVID-19 image datasets show that the proposed approach can locate the tampered parts within the MI, and the original MI can be recovered without any loss even if one of the shares are totally destroyed, or two shares are tampered at the ration not more than 50%. Some comparisons and analysis are given to show the better performance of the scheme.
引用
收藏
页码:707 / 725
页数:19
相关论文
共 32 条
[1]   SVD based fragile watermarking scheme for tamper localization and self-recovery [J].
Ansari, Irshad Ahmad ;
Pant, Millie ;
Ahn, Chang Wook .
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2016, 7 (06) :1225-1239
[2]  
Bhimani D, 2016, 2016 CONFERENCE ON ADVANCES IN SIGNAL PROCESSING (CASP), P223
[3]   Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities [J].
Bravo-Solorio, Sergio ;
Nandi, Asoke K. .
SIGNAL PROCESSING, 2011, 91 (04) :728-739
[4]   Joint near-lossless compression and watermarking of still images for authentication and tamper localization [J].
Caldelli, Roberto ;
Filippini, Francesco ;
Barni, Mauro .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2006, 21 (10) :890-903
[5]  
Deepika MP., 2016, INT J APPL ENG RES, V11, P2049
[6]   Reversible data hiding with contrast enhancement and tamper localization for medical images [J].
Gao, Guangyong ;
Wan, Xiangdong ;
Yao, Shimao ;
Cui, Zongmin ;
Zhou, Caixue ;
Sung, Xingming .
INFORMATION SCIENCES, 2017, 385 :250-265
[7]   Double verifiable image encryption based on chaos and reversible watermarking algorithm [J].
Gao, Hang ;
Gao, Tiegang .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (06) :7267-7288
[8]   Digital image self-recovery algorithm based on improved joint source-channel coding optimizer [J].
Gu, Yuying ;
Yang, Hongmei ;
Yan, Bin ;
Wang, Xiaodong ;
Zhao, Zhongying .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (15) :21041-21064
[9]   Joint Watermarking and Lossless JPEG-LS Compression for Medical Image Security [J].
Haddad, S. ;
Coatrieux, G. ;
Cozic, M. ;
Bouslimi, D. .
IRBM, 2017, 38 (04) :198-206
[10]   TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique [J].
Haghighi, Behrouz Bolourian ;
Taherinia, Amir Hossein ;
Harati, Ahad .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 50 :49-64