Inversion attack resilient zero-watermarking scheme for medical image authentication

被引:28
作者
Vellaisamy, Seenivasagam [1 ]
Ramesh, Velumani [2 ]
机构
[1] Natl Engn Coll, Dept Comp Sci & Engn, Kovilpatti 628503, India
[2] Sethu Inst Technol, Dept Informat Technol, Pulloor 626115, Kariapatti, India
关键词
TRANSFORM;
D O I
10.1049/iet-ipr.2013.0558
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Medical images are watermarked with patient data to enforce patient authentication and identification in radiology practices. In addition to common threats such as signal processing and geometric attacks, medical image watermarking systems are susceptible to a new class of threats called 'inversion attack', leading to ambiguities in establishing rightful ownership. This study presents an 'inversion attack' resilient zero-watermarking system, in the hybrid Contourlet transform singular value decomposition domain for medical image authentication. This scheme preserves the fidelity of the host image without introducing any artefacts and employs triangular number generating function and Hu's image invariants to confront 'inversion attacks'. The performance of the system is evaluated with medical images of different modalities and a quick response code watermark that contains patient data. The experimental results demonstrate the robustness of the system against 'ambiguity attacks' and signify its appropriateness for secured medical image exchange between remote radiologists.
引用
收藏
页码:718 / 727
页数:10
相关论文
共 42 条
  • [1] Geometric invariance in image watermarking
    Alghoniemy, M
    Tewfik, AH
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (02) : 145 - 153
  • [2] Image watermarking by moment invariants
    Alghoniemy, M
    Tewfik, AH
    [J]. 2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, 2000, : 73 - 76
  • [3] [Anonymous], P INT C IM SCI SYST
  • [4] [Anonymous], 2012, COMPUTER INFORM CYBE
  • [5] A robust zero-watermarking algorithm for audio
    Chen, Ning
    Zhu, Jie
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008, 2008 (1)
  • [6] Chin-Chen Chang, 1999, Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference. APCC/OECC'99. Proceedings. Conference - Vitality to the New Century (IEEE Cat. No.99EX379), P977, DOI 10.1109/APCC.1999.820427
  • [7] Chunhua Dong, 2011, Proceedings of the 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2011), P900
  • [8] Chunhua Dong, 2012, Proceedings of the 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE 2012), P22, DOI 10.1109/CSAE.2012.6272540
  • [9] Ciptasari R. W., 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, P336, DOI 10.1109/IIHMSP.2011.63
  • [10] Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
    Craver, S
    Memon, N
    Yeo, BL
    Yeung, MM
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) : 573 - 586