Medical Image Watermarking with Tamper Detection and Recovery

This paper discussed security of medical images and reviewed some work done regarding them. A fragile watermarking scheme was then proposed that could detect tamper and subsequently recover the image. Our scheme required a secret key and a public chaotic mixing algorithm to embed and recover a tampered image. The scheme was also resilient to VQ attack. The purposes were to verify the integrity and authenticity of medical images. We used 800times600times8 bits ultrasound (US) greyscale images in our experiment. We tested our algorithm for up to 50% tampered block and obtained 100% recovery for spread-tampered block

[1]  Abraham Lempel,et al.  Compression of two-dimensional data , 1986, IEEE Trans. Inf. Theory.

[2]  Ingemar J. Cox,et al.  A Review of of Watermarking Principles and Practices , 1999 .

[3]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[4]  Chin-Ming Hsu,et al.  A secure data hiding technique with heterogeneous data-combining capability for electronic patient records , 2000, Proceedings of the 22nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (Cat. No.00CH37143).

[5]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[6]  Nasir D. Memon,et al.  Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.

[7]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[8]  U. C. Niranjan,et al.  Watermarking medical images with patient information , 1998, Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. Vol.20 Biomedical Engineering Towards the Year 2000 and Beyond (Cat. No.98CH36286).

[9]  Der-Chyuan Lou,et al.  Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..

[10]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[11]  Bülent Sankur,et al.  Strict integrity control of biomedical images , 2001, IS&T/SPIE Electronic Imaging.

[12]  Ioannis Pitas,et al.  Applications of toral automorphisms in image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[13]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).