A lossless self-recovery watermarking scheme with JPEG-LS compression

被引:9
作者
You Zhaoning [1 ]
Liu Yan [1 ]
Gao Tiegang [1 ]
机构
[1] Nankai Univ, Coll Software, Tianjin 300350, Peoples R China
关键词
Watermarking; JPEG-LS; Self-recovery; Lossless; IMAGE WATERMARKING; ROBUST WATERMARKING; ALGORITHM; MAP;
D O I
10.1016/j.jisa.2020.102733
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid development of application for medical images in recent years, the security of medical images becomes more vital. In this paper, a fragile watermarking scheme for medical images is proposed. The proposed scheme first divides the whole medical image into ROI (Regions of Interest) and RONI (Regions of Non-interest). Then the JPEG-LS algorithm is applied to ROI to get the compressed data which will be embedded into the whole medical image. And then, image encryption methods are used to assure the invisibility of the medical image. At last, a POB number system enhances the security of the scheme. With the use of the scheme in this paper, we can judge whether the medical image is tampered or not, and can also recover the original medical images in specific conditions without any loss. Moreover, if the medical image is tampered, we can also localize the tampered regions. Experimental results show that the suggested scheme achieves a better performance on security, invisibility and robustness in comparison to the state-of-the-art methods for medical images.
引用
收藏
页数:12
相关论文
共 37 条
  • [1] [Anonymous], 2009, Hack
  • [2] AVenkata Subramanyam, 2010, 2010 IEEE INT C MULT
  • [3] Banani Patra, 2012, 2012 INT S INT SIGN
  • [4] Image encoder architecture design using dual scan based DWT with vector quantization
    Chandraraju, Thirumaraiselvi
    Radhakrishnan, Sudhakar
    [J]. MATERIALS TODAY-PROCEEDINGS, 2018, 5 (01) : 572 - 577
  • [5] A robust DIBR 3D image watermarking algorithm based on histogram shape
    Cui, Chen
    Niu, Xia-Mu
    [J]. MEASUREMENT, 2016, 92 : 130 - 143
  • [6] Dhole Vinayak S, 2015, 2015 INT C COMP COMM
  • [7] Dimpal Bhimani, 2016, 2016 C ADV SIGN PROC
  • [8] Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain
    El'arbi, Maher
    Ben Amar, Chokri
    [J]. IET IMAGE PROCESSING, 2014, 8 (11) : 619 - 626
  • [9] Feng J.B., 2006, IJ Network Security, V2, P161
  • [10] Gouenou Coatrieux, 2001, STRICT INTEGRITY CON, P4314