Journal ArticleDOI
Multiple Image Watermarking Applied to Health Information Management
A. Giakoumaki,Sotiris Pavlopoulos,Dimitris Koutsouris +2 more
- Vol. 10, Iss: 4, pp 722-732
Reads0
Chats0
TLDR
Experimental results indicate the efficiency and transparency of the scheme, which conforms to the strict requirements that apply to regions of diagnostic significance.Abstract:
Information technology advances have brought forth new challenges in healthcare information management, due to the vast amount of medical data that needs to be efficiently stored, retrieved, and distributed, and the increased security threats that explicitly have to be addressed. The paper discusses the perspectives of digital watermarking in a range of medical data management and distribution issues, and proposes a complementary and/or alternative tool that simultaneously addresses medical data protection, archiving, and retrieval, as well as source and data authentication. The scheme imperceptibly embeds in medical images multiple watermarks conveying patient's personal and examination data, keywords for information retrieval, the physician's digital signature for authentication, and a reference message for data integrity control. Experimental results indicate the efficiency and transparency of the scheme, which conforms to the strict requirements that apply to regions of diagnostic significanceread more
Citations
More filters
Journal ArticleDOI
Nested quantization index modulation for reversible watermarking and its application to healthcare information management systems
TL;DR: The algorithm and mathematical model of the nested QIM-based watermarking including forward and inverse model is presented and the capacity of the embedded watermark can be increased by taking advantage of the proposed nest structure.
Proceedings ArticleDOI
Utilizing Least Significant Bit-Planes of RONI Pixels for Medical Image Watermarking
TL;DR: In this paper, the border pixels of a medical image are considered as region of non-interest, since those pixels have no or little interest to doctors and medical professionals irrespective of the image modalities.
Journal ArticleDOI
Secure Spread-Spectrum Watermarking for Telemedicine Applications
TL;DR: This paper presents a secure spread-spectrum watermarking algorithm for digital images in discrete wavelet transform (DWT) domain that achieves higher security and robustness against various attacks.
Journal ArticleDOI
Towards adaptivity of image watermarking in polar harmonic transforms domain
TL;DR: Experimental results justify that the proposed image watermarking scheme clearly outperforms the compared methods in terms of robustness, capacity and complexity and promotes the traditional schemes to a next generation of moment-based imageWatermarking.
Medical Image Authentication through Watermarking Preserving ROI
Sonika C. Rathi,V. S. Inamdar +1 more
TL;DR: The proposed system separate the ROI from medical image by GUI based approach, which works for all types of medical images, and shows satisfactory performance of the system to authenticate the medical images preserving ROI.
References
More filters
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Journal ArticleDOI
Information hiding-a survey
TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI
Multimedia watermarking techniques
Frank Hartung,Martin Kutter +1 more
TL;DR: The basic concepts of watermarking systems are outlined and illustrated with proposed water marking methods for images, video, audio, text documents, and other media.
Journal ArticleDOI
On the limits of steganography
TL;DR: It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography.
Journal ArticleDOI
Multimedia data-embedding and watermarking technologies
TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.