An effective mechanism for medical images authentication using quick response code

被引:26
作者
Kavitha, C. [1 ]
Sakthivel, S. [2 ]
机构
[1] Erode Sengunthar Engn Coll, Dept Comp Sci & Engn, Thudupathi, India
[2] Sona Coll Technol, Dept Comp Sci & Engn, Salem, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2019年 / 22卷 / 02期
关键词
SVD; CT; QR; HL7; ADT; TNG; CONTOURLET TRANSFORM;
D O I
10.1007/s10586-018-1905-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional watermarking algorithms suffer from degradations in watermarked image during embedding phase and also bound by differing necessities like embedding capacity, robustness and transparency, these issues can be eliminated using zero watermarking. Zero watermarking facilitates reverse and blind watermark extraction features as it guarantees the integrity of the host image after embedding the watermark image. In this work two methods of zero watermarking algorithms for medical image authentication is proposed, discussions on the two methods one involving singular-value decomposition and the other using composite CT-SVD domain were presented. Experimentations were carried out using medical images. The proposed model best suits for healthcare institutions, as such the proposed scheme is highly resilient and robust against various attacks and facilitates in authenticating the medical images and also present additional information regarding clinical results to the radiologist remotely located. The comparison results show that the proposed method is more robust than further zero watermarking schemes.
引用
收藏
页码:S4375 / S4382
页数:8
相关论文
共 18 条
[1]   Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images [J].
Al-Qershi, Osamah M. ;
Khoo, Bee Ee .
JOURNAL OF DIGITAL IMAGING, 2011, 24 (01) :114-125
[2]  
[Anonymous], 2012, ZXING
[3]  
[Anonymous], 2004, P 2004 WORKSHOP MULT, DOI DOI 10.1145/1022431.1022461
[4]  
[Anonymous], 2012, HL7 PID PATIENT IDEN
[5]  
Chunhua Dong, 2011, Proceedings of the 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2011), P900
[6]   The contourlet transform: An efficient directional multiresolution image representation [J].
Do, MN ;
Vetterli, M .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (12) :2091-2106
[7]   Robust copyright-protection scheme based on visual secret sharing and Bose-Chaudhuri-Hocquenghem code techniques [J].
Fan, Tzuo-Yau ;
Chieu, Bin-Chang ;
Chao, Her-Chang .
JOURNAL OF ELECTRONIC IMAGING, 2012, 21 (04)
[8]  
Garcia-Betances Rebeca I, 2012, Online J Public Health Inform, V4, DOI 10.5210/ojphi.v4i1.4011
[9]   VISUAL-PATTERN RECOGNITION BY MOMENT INVARIANTS [J].
HU, M .
IRE TRANSACTIONS ON INFORMATION THEORY, 1962, 8 (02) :179-&
[10]  
Liu D, 2011, INT J BUSINESS SOC S, V2, P9