309 research outputs found

    Digital watermarking : applicability for developing trust in medical imaging workflows state of the art review

    Get PDF
    Medical images can be intentionally or unintentionally manipulated both within the secure medical system environment and outside, as images are viewed, extracted and transmitted. Many organisations have invested heavily in Picture Archiving and Communication Systems (PACS), which are intended to facilitate data security. However, it is common for images, and records, to be extracted from these for a wide range of accepted practices, such as external second opinion, transmission to another care provider, patient data request, etc. Therefore, confirming trust within medical imaging workflows has become essential. Digital watermarking has been recognised as a promising approach for ensuring the authenticity and integrity of medical images. Authenticity refers to the ability to identify the information origin and prove that the data relates to the right patient. Integrity means the capacity to ensure that the information has not been altered without authorisation. This paper presents a survey of medical images watermarking and offers an evident scene for concerned researchers by analysing the robustness and limitations of various existing approaches. This includes studying the security levels of medical images within PACS system, clarifying the requirements of medical images watermarking and defining the purposes of watermarking approaches when applied to medical images

    A Framework for Multimedia Data Hiding (Security)

    Get PDF
    With the proliferation of multimedia data such as images, audio, and video, robust digital watermarking and data hiding techniques are needed for copyright protection, copy control, annotation, and authentication. While many techniques have been proposed for digital color and grayscale images, not all of them can be directly applied to binary document images. The difficulty lies in the fact that changing pixel values in a binary document could introduce Irregularities that is very visually noticeable. We have seen but limited number of papers proposing new techniques and ideas for document image watermarking and data hiding. In this paper, we present an overview and summary of recent developments on this important topic, and discuss important issues such as robustness and data hiding capacity of the different techniques

    Digital watermarking in medical images

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/12/2005.This thesis addresses authenticity and integrity of medical images using watermarking. Hospital Information Systems (HIS), Radiology Information Systems (RIS) and Picture Archiving and Communication Systems (P ACS) now form the information infrastructure for today's healthcare as these provide new ways to store, access and distribute medical data that also involve some security risk. Watermarking can be seen as an additional tool for security measures. As the medical tradition is very strict with the quality of biomedical images, the watermarking method must be reversible or if not, region of Interest (ROI) needs to be defined and left intact. Watermarking should also serve as an integrity control and should be able to authenticate the medical image. Three watermarking techniques were proposed. First, Strict Authentication Watermarking (SAW) embeds the digital signature of the image in the ROI and the image can be reverted back to its original value bit by bit if required. Second, Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) uses the same principal as SAW, but is able to survive some degree of JPEG compression. Third, Authentication Watermarking with Tamper Detection and Recovery (AW-TDR) is able to localise tampering, whilst simultaneously reconstructing the original image

    An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing

    Get PDF
                   في Ű§Ù„ŰąÙˆÙ†Ű© Ű§Ù„ŰŁŰźÙŠŰ±Ű©ŰŒ ŰŹŰčل Ű§Ù„Ű„Ù†ŰȘŰ±Ù†ŰȘ Ű§Ù„Ù…ŰłŰȘŰźŰŻÙ…ÙŠÙ† Ù‚Ű§ŰŻŰ±ÙŠÙ† Űčلى نقل Ű§Ù„ÙˆŰłŰ§ŰŠŰ· Ű§Ù„Ű±Ù‚Ù…ÙŠŰ© ŰšŰ·Ű±ÙŠÙ‚Ű© ŰŁŰłÙ‡Ù„. Űčلى Ű§Ù„Ű±Űșم من Ù‡Ű°Ù‡ Ű§Ù„ŰłÙ‡ÙˆÙ„Ű© Ù„Ù„Ű„Ù†ŰȘŰ±Ù†ŰȘی Ű„Ù„Ű§ ŰŁÙ†Ù‡ Ù‚ŰŻ ŰȘŰ€ŰŻÙŠ Ű„Ù„Ù‰ Ű§Ù„ŰčŰŻÙŠŰŻ من Ű§Ù„ŰȘÙ‡ŰŻÙŠŰŻŰ§ŰȘ Ű§Ù„ŰȘي ŰȘŰȘŰčلق ŰšŰłŰ±ÙŠŰ© Ù…Ű­ŰȘÙˆÙŠŰ§ŰȘ Ű§Ù„ÙˆŰłŰ§ŰŠŰ· Ű§Ù„Ù…Ù†Ù‚ÙˆÙ„Ű© Ù…Ű«Ù„ Ù…Ű”Ű§ŰŻÙ‚Ű© Ű§Ù„ÙˆŰłŰ§ŰŠŰ· ÙˆŰ§Ù„ŰȘŰ­Ù‚Ù‚ من ŰȘÙƒŰ§Ù…Ù„Ù‡Ű§. Ù„Ù‡Ű°Ù‡ Ű§Ù„ŰŁŰłŰšŰ§Űš ی يŰȘم ۧ۳ŰȘŰźŰŻŰ§Ù… ŰŁŰłŰ§Ù„ÙŠŰš Ű„ŰźÙŰ§ŰĄ Ű§Ù„ŰšÙŠŰ§Ù†Ű§ŰȘ ÙˆŰ§Ù„ŰȘŰŽÙÙŠŰ± Ù„Ű­Ù…Ű§ÙŠŰ© Ù…Ű­ŰȘÙˆÙŠŰ§ŰȘ Ű§Ù„ÙˆŰłŰ§ŰŠŰ· Ű§Ù„Ű±Ù‚Ù…ÙŠŰ©. في Ù‡Ű°Ù‡ Ű§Ù„ÙˆŰ±Ù‚Ű© Ű§Ù„ŰšŰ­Ű«ÙŠŰ© ی ŰȘم Ű§Ù‚ŰȘ۱ۭۧ Ű·Ű±ÙŠÙ‚Ű© مŰčŰČŰČŰ© Ù„Ű„ŰźÙŰ§ŰĄ Ű§Ù„Ù…ŰčÙ„ÙˆÙ…Ű§ŰȘ ŰšŰ§Ù„Ű”ÙˆŰ± مŰč Ű§Ù„ŰȘŰŽÙÙŠŰ± Ű§Ù„Ù…Ű±ŰŠÙŠ. يŰȘم ŰȘŰŽÙÙŠŰ± Ű§Ù„ŰŽŰčۧ۱ Ű§Ù„ŰłŰ±ÙŠ (Ű”ÙˆŰ±Ű© Ű«Ù†Ű§ŰŠÙŠŰ©) ŰšŰ§Ù„Ű­ŰŹÙ… (128 × 128) Űčن Ű·Ű±ÙŠÙ‚ ŰȘŰ·ŰšÙŠÙ‚ Ű§Ù„ŰȘŰŽÙÙŠŰ± Ű§Ù„ŰšŰ”Ű±ÙŠ (2 out 2 share) لŰȘÙˆÙ„ÙŠŰŻ Ù…ŰŽŰ§Ű±ÙƒŰȘين ŰłŰ±ÙŠŰȘين. ŰŁŰ«Ù†Ű§ŰĄ ŰčÙ…Ù„ÙŠŰ© Ű§Ù„ŰȘŰ¶Ù…ÙŠÙ† ی يŰȘم ŰȘÙ‚ŰłÙŠÙ… Ű§Ù„Ű”ÙˆŰ±Ű© Űș۷ۧۥ RGB ŰšŰ­ŰŹÙ… (512 × 512) Ű„Ù„Ù‰ Ű«Ù„Ű§Ű« Ű·ŰšÙ‚Ű§ŰȘ (Ű§Ù„ŰŁŰ­Ù…Ű± ÙˆŰ§Ù„ŰŁŰźŰ¶Ű± ÙˆŰ§Ù„ŰŁŰČŰ±Ù‚). يŰȘم ŰȘŰ­ÙˆÙŠÙ„ Ű§Ù„Ű·ŰšÙ‚Ű© Ű§Ù„ŰČŰ±Ù‚Ű§ŰĄ ۚۧ۳ŰȘŰźŰŻŰ§Ù… Ű§Ù„ŰȘŰ­ÙˆÙŠÙ„ Shearlet Ű§Ù„Ù…ŰȘÙ‚Ű·Űč Ù„Ù„Ű­Ű”ÙˆÙ„ Űčلى مŰčŰ§Ù…Ù„Ű§ŰȘÙ‡Ű§. يŰȘم ŰȘŰ¶Ù…ÙŠÙ† Ű§Ù„Ù…ŰŽŰ§Ű±ÙƒŰ© Ű§Ù„ŰłŰ±ÙŠŰ© Ű§Ù„ŰŁÙˆÙ„Ù‰ في مŰčŰ§Ù…Ù„Ű§ŰȘ Ű§Ù„Ű·ŰšÙ‚Ű© Ű§Ù„ŰČŰ±Ù‚Ű§ŰĄ Ű§Ù„Ù…Ű­ÙˆÙ„Ű© Ù„Ù„Ű­Ű”ÙˆÙ„ Űčلى Ű”ÙˆŰ±Ű© Ű§Ù„Ű§ŰźÙŰ§ŰĄ. في ŰčÙ…Ù„ÙŠŰ© Ű§Ù„Ű§ŰłŰȘ۟۱ۧۏ ی يŰȘم ۧ۳ŰȘ۟۱ۧۏ Ű§Ù„Ù…ŰŽŰ§Ű±ÙƒŰ© Ű§Ù„ŰłŰ±ÙŠŰ© Ű§Ù„ŰŁÙˆÙ„Ù‰ من مŰčŰ§Ù…Ù„Ű§ŰȘ Ű§Ù„Ű·ŰšÙ‚Ű© Ű§Ù„ŰČŰ±Ù‚Ű§ŰĄ Ù„Ű”ÙˆŰ±Ű© Ű§Ù„Ű§ŰźÙŰ§ŰĄ ÙˆŰ«Ù… يŰȘم ŰȘŰ·ŰšÙŠÙ‚ ŰčÙ…Ù„ÙŠŰ© XOR ŰčÙ„ÙŠÙ‡Ű§ مŰč Ű§Ù„Ù…ŰŽŰ§Ű±ÙƒŰ© Ű§Ù„ŰłŰ±ÙŠŰ© Ű§Ù„Ű«Ű§Ù†ÙŠŰ© Ù„Ű„Ù†ŰŽŰ§ŰĄ Ű§Ù„ŰŽŰčۧ۱ Ű§Ù„ŰłŰ±ÙŠ Ű§Ù„ŰŁŰ”Ù„ÙŠ. ÙˆÙÙ‚Ù‹Ű§ للنŰȘۧۊۏ Ű§Ù„ŰȘŰŹŰ±ÙŠŰšÙŠŰ© ی ÙŰ„Ù† Ű§Ù„Ű·Ű±ÙŠÙ‚Ű© Ű§Ù„Ù…Ù‚ŰȘ۱ۭ۩ Ù‚ŰŻ Ű­Ù‚Ù‚ŰȘ Ű§ÙŰ¶Ù„ Ù†ŰłŰšŰ© من ŰčŰŻÙ… Ű§Ù„ÙˆŰ¶ÙˆŰ­ Ù„Ű”ÙˆŰ±Ű© Ű§Ù„Ű§ŰźÙŰ§ŰĄ ŰšÙ‚ŰŻŰ±Ű© Ű§Ù„Ű­Ù…ÙˆÙ„Ű© Ű§Ù„Ű”Ű§ÙÙŠŰ© ŰȘŰłŰ§ÙˆÙŠ (1 bpp). ۣ۔ۭۚ Ű§Ù„ŰŽŰčۧ۱ Ű§Ù„ŰłŰ±ÙŠ ŰŁÙƒŰ«Ű± ŰŁÙ…Ű§Ù†Ù‹Ű§ ۚۧ۳ŰȘŰźŰŻŰ§Ù… Ű§Ù„ŰȘŰŽÙÙŠŰ± Ű§Ù„Ù…Ű±ŰŠÙŠ (2 out 2 share) Â ÙˆŰ§Ù„Ù…ŰŽŰ§Ű±ÙƒŰ© Ű§Ù„ŰłŰ±ÙŠŰ© Ű§Ù„Ű«Ű§Ù†ÙŠŰ© كمفŰȘۭۧ ۟ۧ۔ Ű§ÙŠŰ¶Ű§Ù‹.  Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims

    A Digital Watermarking Approach Based on DCT Domain Combining QR Code and Chaotic Theory

    Full text link
    This paper proposes a robust watermarking approach based on Discrete Cosine Transform domain that combines Quick Response Code and chaotic system.Comment: 7 pages, 6 figure

    Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication

    Get PDF
    Print-scan resilient watermarking has emerged as an attractive way for document security. This paper proposes an stroke direction modulation technique for watermarking in Chinese text images. The watermark produced by the idea offers robustness to print-photocopy-scan, yet provides relatively high embedding capacity without losing the transparency. During the embedding phase, the angle of rotatable strokes are quantized to embed the bits. This requires several stages of preprocessing, including stroke generation, junction searching, rotatable stroke decision and character partition. Moreover, shuffling is applied to equalize the uneven embedding capacity. For the data detection, denoising and deskewing mechanisms are used to compensate for the distortions induced by hardcopy. Experimental results show that our technique attains high detection accuracy against distortions resulting from print-scan operations, good quality photocopies and benign attacks in accord with the future goal of soft authentication

    Efficiency of LSB steganography on medical information

    Get PDF
    The development of the medical field had led to the transformation of communication from paper information into the digital form. Medical information security had become a great concern as the medical field is moving towards the digital world and hence patient information, disease diagnosis and so on are all being stored in the digital image. Therefore, to improve the medical information security, securing of patient information and the increasing requirements for communication to be transferred between patients, client, medical practitioners, and sponsors is essential to be secured. The core aim of this research is to make available a complete knowledge about the research trends on LSB Steganography Technique, which are applied to securing medical information such as text, image, audio, video and graphics and also discuss the efficiency of the LSB technique. The survey findings show that LSB steganography technique is efficient in securing medical information from intruder

    Robust watermarking for magnetic resonance images with automatic region of interest detection

    Get PDF
    Medical image watermarking requires special considerations compared to ordinary watermarking methods. The first issue is the detection of an important area of the image called the Region of Interest (ROI) prior to starting the watermarking process. Most existing ROI detection procedures use manual-based methods, while in automated methods the robustness against intentional or unintentional attacks has not been considered extensively. The second issue is the robustness of the embedded watermark against different attacks. A common drawback of existing watermarking methods is their weakness against salt and pepper noise. The research carried out in this thesis addresses these issues of having automatic ROI detection for magnetic resonance images that are robust against attacks particularly the salt and pepper noise and designing a new watermarking method that can withstand high density salt and pepper noise. In the ROI detection part, combinations of several algorithms such as morphological reconstruction, adaptive thresholding and labelling are utilized. The noise-filtering algorithm and window size correction block are then introduced for further enhancement. The performance of the proposed ROI detection is evaluated by computing the Comparative Accuracy (CA). In the watermarking part, a combination of spatial method, channel coding and noise filtering schemes are used to increase the robustness against salt and pepper noise. The quality of watermarked image is evaluated using Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM), and the accuracy of the extracted watermark is assessed in terms of Bit Error Rate (BER). Based on experiments, the CA under eight different attacks (speckle noise, average filter, median filter, Wiener filter, Gaussian filter, sharpening filter, motion, and salt and pepper noise) is between 97.8% and 100%. The CA under different densities of salt and pepper noise (10%-90%) is in the range of 75.13% to 98.99%. In the watermarking part, the performance of the proposed method under different densities of salt and pepper noise measured by total PSNR, ROI PSNR, total SSIM and ROI SSIM has improved in the ranges of 3.48-23.03 (dB), 3.5-23.05 (dB), 0-0.4620 and 0-0.5335 to 21.75-42.08 (dB), 20.55-40.83 (dB), 0.5775-0.8874 and 0.4104-0.9742 respectively. In addition, the BER is reduced to the range of 0.02% to 41.7%. To conclude, the proposed method has managed to significantly improve the performance of existing medical image watermarking methods
    • 

    corecore