328 research outputs found

    Discriminative and robust zero-watermarking scheme based on completed local binary pattern for authentication and copyright identification of medical images

    Get PDF
    Authentication and copyright identification are two critical security issues for medical images. Although zerowatermarking schemes can provide durable, reliable and distortion-free protection for medical images, the existing zerowatermarking schemes for medical images still face two problems. On one hand, they rarely considered the distinguishability for medical images, which is critical because different medical images are sometimes similar to each other. On the other hand, their robustness against geometric attacks, such as cropping, rotation and flipping, is insufficient. In this study, a novel discriminative and robust zero-watermarking (DRZW) is proposed to address these two problems. In DRZW, content-based features of medical images are first extracted based on completed local binary pattern (CLBP) operator to ensure the distinguishability and robustness, especially against geometric attacks. Then, master shares and ownership shares are generated from the content-based features and watermark according to (2,2) visual cryptography. Finally, the ownership shares are stored for authentication and copyright identification. For queried medical images, their content-based features are extracted and master shares are generated. Their watermarks for authentication and copyright identification are recovered by stacking the generated master shares and stored ownership shares. 200 different medical images of 5 types are collected as the testing data and our experimental results demonstrate that DRZW ensures both the accuracy and reliability of authentication and copyright identification. When fixing the false positive rate to 1.00%, the average value of false negative rates by using DRZW is only 1.75% under 20 common attacks with different parameters

    Digital watermarking in medical images

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/12/2005.This thesis addresses authenticity and integrity of medical images using watermarking. Hospital Information Systems (HIS), Radiology Information Systems (RIS) and Picture Archiving and Communication Systems (P ACS) now form the information infrastructure for today's healthcare as these provide new ways to store, access and distribute medical data that also involve some security risk. Watermarking can be seen as an additional tool for security measures. As the medical tradition is very strict with the quality of biomedical images, the watermarking method must be reversible or if not, region of Interest (ROI) needs to be defined and left intact. Watermarking should also serve as an integrity control and should be able to authenticate the medical image. Three watermarking techniques were proposed. First, Strict Authentication Watermarking (SAW) embeds the digital signature of the image in the ROI and the image can be reverted back to its original value bit by bit if required. Second, Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) uses the same principal as SAW, but is able to survive some degree of JPEG compression. Third, Authentication Watermarking with Tamper Detection and Recovery (AW-TDR) is able to localise tampering, whilst simultaneously reconstructing the original image

    Fusion of Steganography Digital Watermarking Data Hidden In Patient Medical Image using PPC Approach

    Get PDF
    Privacy is a critical issue when the patient message storage or processing to the medical services. Digital Image processing is the quick emerging area of medical science. The improvement of image processing was given by the technology improvement like digital visualizing, computer processor and large storage devices. Image processing allowed to compute the image in multidimensional within the system. First, the real problem becomes many severe due to the decrease of visual proofs in telehealth applications. A watermark is a protect message that message hidden into a mask message. Digital image watermarks are used for check the approval of the carrier signal for confirmation of the owners. In order to give information honesty, confidentiality and authentication various approaches are accessible like networking side cryptography, image processing side steganography and digital watermarking. To protect the patient message in telehealth, hidden into a mask message is recently used. Patient details are watermark within the cover medical image. The public and personal key cryptography (PPC) is insufficient for providing the trust a patient may attain during a face-to-face service

    Secured Lossless Share Watermarking

    Get PDF
    Security has gained a lot of importance as information technology is widely used. The main issue in visual cryptography is quality of reconstructed image. This problem is overcome by using “Secured Lossless share Watermarking ”. In this method the quality of reconstructed image is higher and the security of share is high compare with conventional visual cryptographic scheme. The secret image is converted into. Each share is embedded to different carrier images. Invisible watermarking method is used for embedding carrier image and shares. For security, the invisible watermarked shares are then encrypted, AES modified encryption method is used. The encrypted shares are send to other participants. At the receiver end receiving the shares and decrypt the shares, then combining these shares together reveal the secret. The quality of rejoined shares and original secret shares are almost same. DOI: 10.17762/ijritcc2321-8169.15038

    A Visual Cryptography Scheme for User Authentication

    Get PDF
    A new scheme for user authentication is proposed using visual cryptography and invisible digital watermarking. Visual cryptography which allows visual information to be encrypted in such a way that decryption becomes the job of the person to decrypt via a sight reading. In the proposed work, user signature will be embedded within the cover media. It may be text, images, audio, video etc. Here we used cover image for embedding data by using a single bit LSB watermark insertion algorithm. After that the image will be split into two shares. Shares will be later encrypted by using a Column Shift Permutation algorithm. Receiver will decrypt the shares using Column Shift Permutation algorithm. Shares are collected and stamp together by receiver to get cover image. Then signature will be de-embedded from the cover image. Data will be transfer using communication media. Image will be passed in more secure manner without any distortion. This method is very efficient and effective .The method can be implemented with minimum processing. This application used in customer identification in bank and in online voting

    Improved method for image security based on chaotic-shuffle and chaotic-diffusion algorithms

    Get PDF
    In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm
    corecore