A novel robust zero-watermarking algorithm for medical images

被引:24
作者
Hu, Kun [1 ]
Wang, Xiaochao [2 ]
Hu, Jianping [3 ]
Wang, Hongfei [4 ]
Qin, Hong [5 ]
机构
[1] Chinese Acad Sci, Beijing 100049, Peoples R China
[2] Tiangong Univ, Sch Math Sci, Tianjin 300387, Peoples R China
[3] Northeast Elect Power Univ, Sch Sci, Jilin 132012, Jilin, Peoples R China
[4] Chinese Acad Sci, Technol & Engn Ctr Space Utilizat, Key Lab Space Utilizat, Beijing 100094, Peoples R China
[5] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY 11794 USA
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Medical images; Zero-watermarking; Bi-dimensional empirical mode decomposition; Singular value decomposition; Tampering detection; EMPIRICAL MODE DECOMPOSITION; MULTI-WATERMARKING; HILBERT SPECTRUM; EMD; COMPUTATION; TRANSFORM; DCT;
D O I
10.1007/s00371-021-02168-5
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A novel robust zero-watermarking algorithm for medical images is presented in this paper. The multi-scale decomposition of bi-dimensional empirical mode decomposition (BEMD) has exhibited many attractive properties that enable the proposed algorithm to robustly detect the tampering regions and protect the copyright of medical images simultaneously. Given a medical image, we first decompose a medical image adaptively into a finite number of intrinsic mode functions (IMFs) and a residue, by taking a full advantage of BEMD. The first IMF starts with the finest scale retaining fragile information and is best suitable for tampering detection, while the residue includes robust information at the coarser scale and is applied to the protection of intellectual property rights of medical images. Next, the feature matrices are extracted from the first IMF and the residue via singular value decomposition, which achieves robust performance subject to most attacks. For a given watermark image, it is encrypted by Arnold transform to enhance the security of the watermark. Then, the feature images are constructed by performing the exclusive-or operation between the encrypted watermark image and the extracted feature matrices. Finally, the feature images are securely stored in the copyright authentication database to be further used for copyright authentication and tampering detection. A large number of experimental results and comparisons with existing watermarking algorithms confirm that the newly proposed watermarking algorithm not only has strong ability on tampering detection, but also has better performance in combating various attacks, including cropping, Gaussian noise, median filtering, image enhancement attacks, etc. The newly developed algorithm also shows great promise in processing natural images.
引用
收藏
页码:2841 / 2853
页数:13
相关论文
共 41 条
[1]   Facial emotion recognition using empirical mode decomposition [J].
Ali, Hasimah ;
Hariharan, Muthusamy ;
Yaacob, Sazali ;
Adom, Abdul Hamid .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (03) :1261-1277
[2]   Medical image watermarking for ownership & tamper detection [J].
Alshanbari, Hanan S. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (11) :16549-16564
[3]  
[Anonymous], 2000, DIGITAL WATERMARKING
[4]   Improving the management of medical imaging by using robust and secure dual watermarking [J].
Cedillo-Hernandez, M. ;
Cedillo-Hernandez, A. ;
Nakano-Miyatake, M. ;
Perez-Meana, H. .
BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2020, 56
[5]   Improved complete ensemble EMD: A suitable tool for biomedical signal processing [J].
Colominas, Marcelo A. ;
Schlotthauer, Gaston ;
Torres, Maria E. .
BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2014, 14 :19-29
[6]   A Four-Stage Hybrid Model for Hydrological Time Series Forecasting [J].
Di, Chongli ;
Yang, Xiaohua ;
Wang, Xiaochao .
PLOS ONE, 2014, 9 (08)
[7]   Protecting patient privacy from unauthorized release of medical images using a bio-inspired wavelet-based watermarking approach [J].
Fakhari, Pegah ;
Vahedi, Ehsan ;
Lucas, Caro .
DIGITAL SIGNAL PROCESSING, 2011, 21 (03) :433-446
[8]  
Fengming Qin, 2020, Artificial Intelligence and Security. 6th International Conference (ICAIS 2020). Proceedings. Lecture Notes in Computer Science (LNCS 12240), P179, DOI 10.1007/978-3-030-57881-7_16
[9]   Robust and imperceptible watermarking scheme based on Canny edge detection and SVD in the contourlet domain [J].
Gong, Li-Hua ;
Tian, Cheng ;
Zou, Wei-Ping ;
Zhou, Nan-Run .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (01) :439-461
[10]   Novel and efficient computation of Hilbert-Huang transform on surfaces [J].
Hu, Jianping ;
Wang, Xiaochao ;
Qin, Hong .
COMPUTER AIDED GEOMETRIC DESIGN, 2016, 43 :95-108