Watermarking Techniques used in Medical Images: a Survey

被引:124
作者
Mousavi, Seyed Mojtaba [1 ]
Naghsh, Alireza [2 ]
Abu-Bakar, S. A. R. [1 ]
机构
[1] Univ Teknol Malaysia, Dept Elect & Comp Engn, Comp Vis Video & Image Proc CvviP Res Lab, Fac Elect Engn, Skudai 81310, Johor, Malaysia
[2] Islamic Azad Univ, Najafabad Branch, Dept Elect Engn, Esfahan, Iran
关键词
Medical image watermarking; Fragile watermarking; Robust watermarking; Reversible watermarking; Medical confidentiality; Authentication; REVERSIBLE WATERMARKING; DIGITAL IMAGE; DIFFERENTIAL EVOLUTION; SCHEME; SVD; AUTHENTICATION; TRANSFORM; PROTECTION; REGION; DOMAIN;
D O I
10.1007/s10278-014-9700-5
中图分类号
R8 [特种医学]; R445 [影像诊断学];
学科分类号
1002 ; 100207 ; 1009 ;
摘要
The ever-growing numbers of medical digital images and the need to share them among specialists and hospitals for better and more accurate diagnosis require that patients' privacy be protected. As a result of this, there is a need for medical image watermarking (MIW). However, MIW needs to be performed with special care for two reasons. Firstly, the watermarking procedure cannot compromise the quality of the image. Secondly, confidential patient information embedded within the image should be flawlessly retrievable without risk of error after image decompressing. Despite extensive research undertaken in this area, there is still no method available to fulfill all the requirements of MIW. This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods.
引用
收藏
页码:714 / 729
页数:16
相关论文
共 96 条
[1]  
Adnan WAW, 2003, IEEE ST CONF RES DEV, P381
[2]   Wavelet-based watermarking algorithms: theory, applications and critical aspects [J].
Agreste, S. ;
Puccio, L. .
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 88 (09) :1885-1895
[3]  
Agung B. W. R., 2012, 2012 IEEE International Conference on Communication, Networks and Satellite (ComNetSat 2012), P167, DOI 10.1109/ComNetSat.2012.6380799
[4]  
Ahonen T, 2004, LECT NOTES COMPUT SC, V3021, P469
[5]   An SVD audio watermarking approach using chaotic encrypted images [J].
Al-Nuaimy, Waleed ;
El-Bendary, Mohsen A. M. ;
Shafik, Amira ;
Shawki, Farid ;
Abou-El-azm, A. E. ;
El-Fishawy, N. A. ;
Elhalafawy, Said M. ;
Diab, Salaheldin M. ;
Sallam, Bassiouny M. ;
Abd El-Samie, Fathi E. ;
Kazemian, H. B. .
DIGITAL SIGNAL PROCESSING, 2011, 21 (06) :764-779
[6]   Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images [J].
Al-Qershi, Osamah M. ;
Khoo, Bee Ee .
JOURNAL OF DIGITAL IMAGING, 2011, 24 (01) :114-125
[7]   High capacity data hiding schemes for medical images based on difference expansion [J].
Al-Qershi, Osamah M. ;
Khoo, Bee Ee .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (01) :105-112
[8]   A robust image watermarking technique using SVD and differential evolution in DCT domain [J].
Ali, Musrrat ;
Ahn, Chang Wook ;
Pant, Millie .
OPTIK, 2014, 125 (01) :428-434
[9]   An optimized watermarking technique based on self-adaptive DE in DWT-SVD transform domain [J].
Ali, Musrrat ;
Ahn, Chang Wook .
SIGNAL PROCESSING, 2014, 94 :545-556
[10]  
[Anonymous], 2012, INT J COMPUT COMMUN, DOI 10.5281/zenodo.1331913