scispace - formally typeset
Journal ArticleDOI

Multiple Image Watermarking Applied to Health Information Management

Reads0
Chats0
TLDR
Experimental results indicate the efficiency and transparency of the scheme, which conforms to the strict requirements that apply to regions of diagnostic significance.
Abstract
Information technology advances have brought forth new challenges in healthcare information management, due to the vast amount of medical data that needs to be efficiently stored, retrieved, and distributed, and the increased security threats that explicitly have to be addressed. The paper discusses the perspectives of digital watermarking in a range of medical data management and distribution issues, and proposes a complementary and/or alternative tool that simultaneously addresses medical data protection, archiving, and retrieval, as well as source and data authentication. The scheme imperceptibly embeds in medical images multiple watermarks conveying patient's personal and examination data, keywords for information retrieval, the physician's digital signature for authentication, and a reference message for data integrity control. Experimental results indicate the efficiency and transparency of the scheme, which conforms to the strict requirements that apply to regions of diagnostic significance

read more

Citations
More filters

Robust Embedding of Patient ID in Medical Images for Telemedicine Applications

TL;DR: A new robust image barcode watermarking scheme for medical images that embeds human readable bar-coded watermark image which is generated from corresponding unique patient identification number (PID).
Book ChapterDOI

Implementation of a Reversible Watermarking Technique for Medical Images

TL;DR: In this article , a reversible data hiding algorithm is proposed which also is capable of holding a large chunk of data without affecting the cover media, where the main cover image is first reconstructed and hidden behind a bigger media and then the extra pixels are used to hide encrypted forms of EHR data along with an authentication signature.
Proceedings ArticleDOI

Multipurpose and intelligent watermarking scheme for medical data

TL;DR: The achieved fragileness and robustness confirmed that the proposed scheme has capability of rightful ownership protection and authentication simultaneously, and validated the effectiveness and efficiency of the proposed algorithm.
Book ChapterDOI

An Enhanced Robust and Protected Image Steganographic System

TL;DR: The experimental results show the ability of the new algorithm, namely IRSS, to overcome the problem of losing data even with JPEG compression or Gaussian noise.
Journal ArticleDOI

Reversible image watermarking technique using LCWT and DGT

TL;DR: This proposed work LCWT and DGT decomposition gives an effective technique to protect hypertensive related information based on reversible watermarking to protect confidential data against some unknown person.
References
More filters
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Journal ArticleDOI

Information hiding-a survey

TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI

Multimedia watermarking techniques

TL;DR: The basic concepts of watermarking systems are outlined and illustrated with proposed water marking methods for images, video, audio, text documents, and other media.
Journal ArticleDOI

On the limits of steganography

TL;DR: It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography.
Journal ArticleDOI

Multimedia data-embedding and watermarking technologies

TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Related Papers (5)