Using Statistical Texture Analysis for Medical Image Tamper Proofing

被引:0
作者
Boucherkha, Samia [1 ,2 ]
Benmohamed, Mohamed [1 ,3 ]
机构
[1] Mentouri Univ, Dept Comp Sci, Constantine, Algeria
[2] Lab Distributed Comp LIRE, Vis & Infog Grp, Constantine, Algeria
[3] LIRE Lab, Vis & Infog Grp, Constantine, Algeria
关键词
authentication; data hiding; digital signature; medical images; texture;
D O I
10.4018/jisp.2008070102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article discusses an approach for both authentication of medical images and confidentiality for the related textual data in an online medical application paradigm. The image authentication is achieved in a soft manner through a feature-based digital signature while the confidentiality of the related patient information is achieved through reversible data hiding. The selected features are robust towards geometric transformations, while fragile towards texture alterations that are characteristic of medical images. The processing scheme is done in a block by block basis to permit the localization of tampered image's regions. The effectiveness of the scheme, proven through experiments on a sample of medical images, enables us to argue that implementing mechanisms lying on this approach will help to maintain personal patient privacy and medical image integrity.
引用
收藏
页码:18 / 27
页数:10
相关论文
共 50 条
  • [31] Analysis of Texture of Image with Statistics Method
    Guan, Jishi
    Li, Xian
    Zhou, Yuguang
    Shi, Hongwei
    PROCEEDINGS OF THE 2015 INTERNATIONAL INDUSTRIAL INFORMATICS AND COMPUTER ENGINEERING CONFERENCE, 2015, : 567 - 572
  • [32] Contour and Texture Analysis for Image Segmentation
    Jitendra Malik
    Serge Belongie
    Thomas Leung
    Jianbo Shi
    International Journal of Computer Vision, 2001, 43 : 7 - 27
  • [33] Contour and texture analysis for image segmentation
    Malik, J
    Belongie, S
    Leung, T
    Shi, JB
    INTERNATIONAL JOURNAL OF COMPUTER VISION, 2001, 43 (01) : 7 - 27
  • [34] Evaluation of texture methods for image analysis
    Sharma, M
    Singh, S
    ANZIIS 2001: PROCEEDINGS OF THE SEVENTH AUSTRALIAN AND NEW ZEALAND INTELLIGENT INFORMATION SYSTEMS CONFERENCE, 2001, : 117 - 121
  • [35] ECDSA-based tamper detection in medical data using a watermarking technique
    Ch R.
    Vivek K N.
    Srivastava G.
    Reddy Gadekallu
    International Journal of Cognitive Computing in Engineering, 2024, 5 : 78 - 87
  • [36] Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image
    Pal, Pabitra
    Jana, Biswapati
    Bhaumik, Jaydeb
    SECURITY AND PRIVACY, 2019, 2 (02)
  • [37] Digital watermarking for image tamper detection using block-wise technique
    1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (07): : 115 - 124
  • [38] Improved image tamper localisation using chaotic maps and self-recovery
    Sreenivas, K.
    Kamakshiprasad, V.
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2017, 49 : 164 - 176
  • [39] Image tamper detection and correction using Merkle tree and remainder value differencing
    Kosuru, S. N. V. J. Devi
    Swain, Gandharba
    Kumar, Naween
    Pradhan, Anita
    OPTIK, 2022, 261
  • [40] Simultaneous cartoon and texture image inpainting using morphological component analysis (MCA)
    Elad, M
    Starck, JL
    Querre, P
    Donoho, DL
    APPLIED AND COMPUTATIONAL HARMONIC ANALYSIS, 2005, 19 (03) : 340 - 358