309 research outputs found
Digital watermarking : applicability for developing trust in medical imaging workflows state of the art review
Medical images can be intentionally or unintentionally manipulated both within the secure medical system environment and outside, as images are viewed, extracted and transmitted. Many organisations have invested heavily in Picture Archiving and Communication Systems (PACS), which are intended to facilitate data security. However, it is common for images, and records, to be extracted from these for a wide range of accepted practices, such as external second opinion, transmission to another care provider, patient data request, etc. Therefore, confirming trust within medical imaging workflows has become essential. Digital watermarking has been recognised as a promising approach for ensuring the authenticity and integrity of medical images. Authenticity refers to the ability to identify the information origin and prove that the data relates to the right patient. Integrity means the capacity to ensure that the information has not been altered without authorisation.
This paper presents a survey of medical images watermarking and offers an evident scene for concerned researchers by analysing the robustness and limitations of various existing approaches. This includes studying the security levels of medical images within PACS system, clarifying the requirements of medical images watermarking and defining the purposes of watermarking approaches when applied to medical images
A Framework for Multimedia Data Hiding (Security)
With the proliferation of multimedia data such as images, audio, and video, robust digital watermarking and data hiding techniques are needed for copyright protection, copy control, annotation, and authentication. While many techniques have been proposed for digital color and grayscale images, not all of them can be directly applied to binary document images. The difficulty lies in the fact that changing pixel values in a binary document could introduce Irregularities that is very visually noticeable. We have seen but limited number of papers proposing new techniques and ideas for document image watermarking and data hiding. In this paper, we present an overview and summary of recent developments on this important topic, and discuss important issues such as robustness and data hiding capacity of the different techniques
Digital watermarking in medical images
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/12/2005.This thesis addresses authenticity and integrity of medical images using watermarking. Hospital Information Systems (HIS), Radiology Information Systems (RIS) and Picture Archiving and Communication Systems (P ACS) now form the information infrastructure for today's healthcare as these provide new ways to store, access and distribute medical data that also involve some security risk. Watermarking can be seen as an additional tool for security measures. As the medical tradition is very strict with the quality of biomedical images, the watermarking method must be reversible or if not, region of Interest (ROI) needs to be defined and left intact. Watermarking should also serve as an integrity control and should be able to authenticate the medical image. Three watermarking techniques were proposed. First, Strict Authentication Watermarking (SAW) embeds the digital signature of the image in the ROI and the image can be reverted back to its original value bit by bit if required. Second, Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) uses the same principal as SAW, but is able to survive some degree of JPEG compression. Third, Authentication Watermarking with Tamper Detection and Recovery (AW-TDR) is able to localise tampering, whilst simultaneously reconstructing the original image
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
              ÙÙ Ű§ÙŰąÙÙŰ© ۧÙŰŁŰźÙŰ±Ű©Ű ŰŹŰčÙ Ű§ÙŰ„ÙŰȘ۱ÙŰȘ ۧÙÙ
ŰłŰȘ۟ۯÙ
ÙÙ Ùۧۯ۱ÙÙ ŰčÙÙ ÙÙÙ Ű§ÙÙ۳ۧۊ۷ ۧÙ۱ÙÙ
ÙŰ© ۚ۷۱ÙÙŰ© ŰŁŰłÙÙ. ŰčÙÙ Ű§Ù۱ŰșÙ
Ù
Ù ÙŰ°Ù Ű§ÙŰłÙÙÙŰ© ÙÙŰ„ÙŰȘ۱ÙŰȘŰ Ű„Ùۧ ŰŁÙÙ ÙŰŻ ŰȘŰ€ŰŻÙ Ű„ÙÙ Ű§ÙŰčŰŻÙŰŻ Ù
Ù Ű§ÙŰȘÙŰŻÙۯۧŰȘ ۧÙŰȘÙ ŰȘŰȘŰčÙÙ ŰšŰłŰ±ÙŰ© Ù
ŰŰȘÙÙۧŰȘ ۧÙÙ۳ۧۊ۷ ۧÙÙ
ÙÙÙÙŰ© Ù
Ű«Ù Ù
۔ۧۯÙŰ© ۧÙÙ۳ۧۊ۷ ÙۧÙŰȘŰÙÙ Ù
Ù ŰȘÙۧÙ
ÙÙۧ. ÙÙŰ°Ù Ű§Ùۣ۳ۚۧۚ Ű ÙŰȘÙ
ۧ۳ŰȘ۟ۯۧÙ
ۣ۳ۧÙÙŰš Ű„ŰźÙۧۥ ۧÙŰšÙۧÙۧŰȘ ÙۧÙŰȘŰŽÙÙ۱ ÙŰÙ
ۧÙŰ© Ù
ŰŰȘÙÙۧŰȘ ۧÙÙ۳ۧۊ۷ ۧÙ۱ÙÙ
ÙŰ©. ÙÙ ÙŰ°Ù Ű§ÙÙ۱ÙŰ© ۧÙŰšŰŰ«ÙŰ© Ű ŰȘÙ
ۧÙŰȘŰ±Ű§Ű Ű·Ű±ÙÙŰ© Ù
ŰčŰČŰČŰ© ÙŰ„ŰźÙۧۥ ۧÙÙ
ŰčÙÙÙ
ۧŰȘ ۚۧÙŰ”Ù۱ Ù
Űč ۧÙŰȘŰŽÙÙ۱ ۧÙÙ
۱ۊÙ. ÙŰȘÙ
ŰȘŰŽÙÙ۱ ۧÙŰŽŰčۧ۱ ۧÙŰłŰ±Ù (Ű”Ù۱۩ Ű«ÙۧۊÙŰ©) ۚۧÙŰŰŹÙ
(128 Ă 128) ŰčÙ Ű·Ű±ÙÙ ŰȘŰ·ŰšÙÙ Ű§ÙŰȘŰŽÙÙ۱ ۧÙŰšŰ”Ű±Ù (2 out 2 share) ÙŰȘÙÙÙŰŻ Ù
ێۧ۱ÙŰȘÙÙ ŰłŰ±ÙŰȘÙÙ. ŰŁŰ«Ùۧۥ ŰčÙ
ÙÙŰ© ۧÙŰȘ۶Ù
ÙÙ Ű ÙŰȘÙ
ŰȘÙŰłÙÙ
ۧÙŰ”Ù۱۩ Űș۷ۧۥ RGB ŰšŰŰŹÙ
(512 Ă 512) Ű„ÙÙ Ű«Ùۧ۫ Ű·ŰšÙۧŰȘ (ۧÙŰŁŰÙ
۱ ÙۧÙۣ۟۶۱ ÙۧÙŰŁŰČ۱Ù). ÙŰȘÙ
ŰȘŰÙÙÙ Ű§ÙŰ·ŰšÙŰ© ۧÙŰČ۱Ùۧۥ ۚۧ۳ŰȘ۟ۯۧÙ
ۧÙŰȘŰÙÙÙ Shearlet ۧÙÙ
ŰȘÙŰ·Űč ÙÙŰŰ”ÙÙ ŰčÙÙ Ù
ŰčۧÙ
ÙۧŰȘÙۧ. ÙŰȘÙ
ŰȘ۶Ù
ÙÙ Ű§ÙÙ
ێۧ۱ÙŰ© ۧÙ۳۱ÙŰ© ۧÙŰŁÙÙÙ ÙÙ Ù
ŰčۧÙ
ÙۧŰȘ ۧÙŰ·ŰšÙŰ© ۧÙŰČ۱Ùۧۥ ۧÙÙ
ŰÙÙŰ© ÙÙŰŰ”ÙÙ ŰčÙÙ Ű”Ù۱۩ ۧÙۧ۟Ùۧۥ. ÙÙ ŰčÙ
ÙÙŰ© ۧÙۧ۳ŰȘ۟۱ۧۏ Ű ÙŰȘÙ
ۧ۳ŰȘ۟۱ۧۏ ۧÙÙ
ێۧ۱ÙŰ© ۧÙ۳۱ÙŰ© ۧÙŰŁÙÙÙ Ù
Ù Ù
ŰčۧÙ
ÙۧŰȘ ۧÙŰ·ŰšÙŰ© ۧÙŰČ۱Ùۧۥ ÙŰ”Ù۱۩ ۧÙۧ۟Ùۧۥ ÙŰ«Ù
ÙŰȘÙ
ŰȘŰ·ŰšÙÙ ŰčÙ
ÙÙŰ© XOR ŰčÙÙÙۧ Ù
Űč ۧÙÙ
ێۧ۱ÙŰ© ۧÙ۳۱ÙŰ© ۧÙ۫ۧÙÙŰ© ÙŰ„Ùێۧۥ ۧÙŰŽŰčۧ۱ ۧÙŰłŰ±Ù Ű§ÙŰŁŰ”ÙÙ. ÙÙÙÙۧ ÙÙÙŰȘۧۊۏ ۧÙŰȘۏ۱ÙŰšÙŰ© Ű ÙŰ„Ù Ű§Ù۷۱ÙÙŰ© ۧÙÙ
ÙŰȘ۱ŰŰ© ÙŰŻ ŰÙÙŰȘ ۧÙŰ¶Ù Ù۳ۚ۩ Ù
Ù ŰčŰŻÙ
ۧÙÙ۶ÙŰ ÙŰ”Ù۱۩ ۧÙۧ۟Ùۧۥ ŰšÙۯ۱۩ ۧÙŰÙ
ÙÙŰ© ۧÙ۔ۧÙÙŰ© ŰȘ۳ۧÙÙ (1 bpp). ŰŁŰ”ŰšŰ Ű§ÙŰŽŰčۧ۱ ۧÙŰłŰ±Ù ŰŁÙ۫۱ ŰŁÙ
ۧÙÙۧ ۚۧ۳ŰȘ۟ۯۧÙ
ۧÙŰȘŰŽÙÙ۱ ۧÙÙ
Ű±ŰŠÙ (2 out 2 share)  ÙۧÙÙ
ێۧ۱ÙŰ© ۧÙ۳۱ÙŰ© ۧÙ۫ۧÙÙŰ© ÙÙ
ÙŰȘŰ§Ű ŰźŰ§Ű” ۧÙ۶ۧÙ.
 Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key
Multibiometric security in wireless communication systems
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and
WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition.
First is the enrolment phase by which the database of watermarked fingerprints with
memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel.
Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present oneâs fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user.
The following three steps then involve speaker recognition including the user
responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user.
In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint
image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and
sliding neighborhood) have been followed with further two steps for embedding, and
extracting the watermark into the enhanced fingerprint image utilising Discrete
Wavelet Transform (DWT).
In the speaker recognition stage, the limitations of this technique in wireless
communication have been addressed by sending voice feature (cepstral coefficients)
instead of raw sample. This scheme is to reap the advantages of reducing the
transmission time and dependency of the data on communication channel, together
with no loss of packet. Finally, the obtained results have verified the claims
A Digital Watermarking Approach Based on DCT Domain Combining QR Code and Chaotic Theory
This paper proposes a robust watermarking approach based on Discrete Cosine
Transform domain that combines Quick Response Code and chaotic system.Comment: 7 pages, 6 figure
Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication
Print-scan resilient watermarking has emerged as an attractive way for document security. This paper proposes an stroke direction modulation technique for watermarking in Chinese text images. The watermark produced by the idea offers robustness to print-photocopy-scan, yet provides relatively high embedding capacity without losing the transparency. During the embedding phase, the angle of rotatable strokes are quantized to embed the bits. This requires several stages of preprocessing, including stroke generation, junction searching, rotatable stroke decision and character partition. Moreover, shuffling is applied to equalize the uneven embedding capacity. For the data detection, denoising and deskewing mechanisms are used to compensate for the distortions induced by hardcopy. Experimental results show that our technique attains high detection accuracy against distortions resulting from print-scan operations, good quality photocopies and benign attacks in accord with the future goal of soft authentication
Efficiency of LSB steganography on medical information
The development of the medical field had led to the transformation of communication from paper information into the digital form. Medical information security had become a great concern as the medical field is moving towards the digital world and hence patient information, disease diagnosis and so on are all being stored in the digital image. Therefore, to improve the medical information security, securing of patient information and the increasing requirements for communication to be transferred between patients, client, medical practitioners, and sponsors is essential to be secured. The core aim of this research is to make available a complete knowledge about the research trends on LSB Steganography Technique, which are applied to securing medical information such as text, image, audio, video and graphics and also discuss the efficiency of the LSB technique. The survey findings show that LSB steganography technique is efficient in securing medical information from intruder
Robust watermarking for magnetic resonance images with automatic region of interest detection
Medical image watermarking requires special considerations compared to ordinary watermarking methods. The first issue is the detection of an important area of the image called the Region of Interest (ROI) prior to starting the watermarking process. Most existing ROI detection procedures use manual-based methods, while in automated methods the robustness against intentional or unintentional attacks has not been considered extensively. The second issue is the robustness of the embedded watermark against different attacks. A common drawback of existing watermarking methods is their weakness against salt and pepper noise. The research carried out in this thesis addresses these issues of having automatic ROI detection for magnetic resonance images that are robust against attacks particularly the salt and pepper noise and designing a new watermarking method that can withstand high density salt and pepper noise. In the ROI detection part, combinations of several algorithms such as morphological reconstruction, adaptive thresholding and labelling are utilized. The noise-filtering algorithm and window size correction block are then introduced for further enhancement. The performance of the proposed ROI detection is evaluated by computing the Comparative Accuracy (CA). In the watermarking part, a combination of spatial method, channel coding and noise filtering schemes are used to increase the robustness against salt and pepper noise. The quality of watermarked image is evaluated using Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM), and the accuracy of the extracted watermark is assessed in terms of Bit Error Rate (BER). Based on experiments, the CA under eight different attacks (speckle noise, average filter, median filter, Wiener filter, Gaussian filter, sharpening filter, motion, and salt and pepper noise) is between 97.8% and 100%. The CA under different densities of salt and pepper noise (10%-90%) is in the range of 75.13% to 98.99%. In the watermarking part, the performance of the proposed method under different densities of salt and pepper noise measured by total PSNR, ROI PSNR, total SSIM and ROI SSIM has improved in the ranges of 3.48-23.03 (dB), 3.5-23.05 (dB), 0-0.4620 and 0-0.5335 to 21.75-42.08 (dB), 20.55-40.83 (dB), 0.5775-0.8874 and 0.4104-0.9742 respectively. In addition, the BER is reduced to the range of 0.02% to 41.7%. To conclude, the proposed method has managed to significantly improve the performance of existing medical image watermarking methods
- âŠ