Journal ArticleDOI
Multiple Image Watermarking Applied to Health Information Management
A. Giakoumaki,Sotiris Pavlopoulos,Dimitris Koutsouris +2 more
- Vol. 10, Iss: 4, pp 722-732
Reads0
Chats0
TLDR
Experimental results indicate the efficiency and transparency of the scheme, which conforms to the strict requirements that apply to regions of diagnostic significance.Abstract:
Information technology advances have brought forth new challenges in healthcare information management, due to the vast amount of medical data that needs to be efficiently stored, retrieved, and distributed, and the increased security threats that explicitly have to be addressed. The paper discusses the perspectives of digital watermarking in a range of medical data management and distribution issues, and proposes a complementary and/or alternative tool that simultaneously addresses medical data protection, archiving, and retrieval, as well as source and data authentication. The scheme imperceptibly embeds in medical images multiple watermarks conveying patient's personal and examination data, keywords for information retrieval, the physician's digital signature for authentication, and a reference message for data integrity control. Experimental results indicate the efficiency and transparency of the scheme, which conforms to the strict requirements that apply to regions of diagnostic significanceread more
Citations
More filters
Proceedings ArticleDOI
Watermarking: How secure is the DM-QIM embedding technique?
B.R. Matam,David Lowe +1 more
TL;DR: This paper challenges the security of the dither modulation (DM)-QIM based embedding method by examining feature space embeddings for time series and images, using a distribution-free algorithm to discover the primary key embedding parameters.
Book ChapterDOI
Medical Image Watermarking in Transform Domain
Harsh Vikram Singh,Ankur Rai +1 more
TL;DR: This paper incorporates the detailed study of watermarking as well as proposed a robust and secure model for data embedding in medical image and discussed several telemedicine applications.
Proceedings ArticleDOI
A review of secure medical image watermarking
TL;DR: This paper has given the review of several approaches for embedding the EPR information in the medical image to save storage space and transmission overheads and to guarantee security of the medical content which is to be shared over the network.
Journal ArticleDOI
Using Digital Watermarking to Enhance Security in Wireless Medical Image Transmission
A. Giakoumaki,Konstantinos Perakis,Konstantinos Banitsas,Konstantinos Giokas,Sapal Tachakra,Dimitris Koutsouris +5 more
TL;DR: This system can enhance security during the transmission of medical images through a wireless channel and present reasonable stability, and its performance was comparable to that of a fixed network.
Journal ArticleDOI
Protection of Health Imagery by Region Based Lossless Reversible Watermarking Scheme
R. Lakshmi Priya,V. Sadasivam +1 more
TL;DR: A new blind fragile region based lossless reversible watermarking technique to improve trustworthiness of medical images and its assessment reveals that ROI is extracted in an intact manner and PSNR values obtained lead to realization that the presented scheme offers greater protection for health imageries.
References
More filters
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Journal ArticleDOI
Information hiding-a survey
TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI
Multimedia watermarking techniques
Frank Hartung,Martin Kutter +1 more
TL;DR: The basic concepts of watermarking systems are outlined and illustrated with proposed water marking methods for images, video, audio, text documents, and other media.
Journal ArticleDOI
On the limits of steganography
TL;DR: It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography.
Journal ArticleDOI
Multimedia data-embedding and watermarking technologies
TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.