High Capacity and Reversible Fragile Watermarking Method for Medical Image Authentication and Patient Data Hiding

Tang Y, Li K, Wang C, Bian S, Huang Q (2024) A two-stage robust reversible watermarking using polar harmonic transform for high robustness and capacity. Information Sciences 654:119786. https://doi.org/10.1016/j.ins.2023.119786

Article  Google Scholar 

Thanki R, Borra S, Dwivedi V, Borisagar K (2017) A RONI Based Visible Watermarking Approach for Medical Image Authentication. J Med Syst 41:143. https://doi.org/10.1007/s10916-017-0795-3

Article  PubMed  Google Scholar 

Wei X, Zhang W, Yang B, Wang J, Xia Z (2021) Fragile Watermark in Medical Image Based on Prime Number Distribution Theory. J Digit Imaging 34:1447–1462. https://doi.org/10.1007/s10278-021-00524-4

Article  PubMed  PubMed Central  Google Scholar 

Liu Y, Qu X, Xin G (2016) A ROI-based reversible data hiding scheme in encrypted medical images. Journal of Visual Communication and Image Representation 39:51-57. https://doi.org/10.1016/j.jvcir.2016.05.008

Article  Google Scholar 

Shehab A, Elhoseny M, Muhammad K, et al (2018) Secure and Robust Fragile Watermarking Scheme for Medical Images. IEEE Access 6:10269-10278. https://doi.org/10.1109/ACCESS.2018.2799240

Article  Google Scholar 

Huang Z, Feng B, Xiang S (2023) Robust reversible image watermarking scheme based on spread spectrum. Journal of Visual Communication and Image Representation 93:103808. https://doi.org/10.1016/j.jvcir.2023.103808

Article  Google Scholar 

Eltoukhy MM, Khedr AE, Abdel-Aziz MM, Hosny KM (2023) Robust watermarking method for securing color medical images using Slant-SVD-QFT transforms and OTP encryption. Alexandria Engineering Journal 78:517-529. https://doi.org/10.1016/j.aej.2023.07.068

Article  Google Scholar 

Bouarroudj R, Souami F, Belalla FZ (2023) Reversible Fragile Watermarking for Medical Image Authentication in the Frequency Domain, 2023 2nd International Conference on Electronics, Energy and Measurement (IC2EM), Medea, Algeria, 2023, pp. 1–6. https://doi.org/10.1109/IC2EM59347.2023.10419699

Senol A, Elbasi E, Topcu AE, Mostafa M (2023) A Semi-Fragile, Inner-Outer Block-Based Watermarking Method Using Scrambling and Frequency Domain Algorithms. Electronics 12:1065. https://doi.org/10.3390/electronics12041065

Article  Google Scholar 

Nguyen TS, Chang CC, Yang XQ (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU - International Journal of Electronics and Communications 70(8):1055-1061. https://doi.org/10.1016/j.aeue.2016.05.003

Article  Google Scholar 

Begum M, Ferdush J, Uddin MS (2022) A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition. Journal of King Saud University - Computer and Information Sciences 34(8-B):5856-5867. https://doi.org/10.1016/j.jksuci.2021.07.012

Article  Google Scholar 

Akhtarkavan E, Majidi B, Mandegari A (2023) Secure Medical Image Communication Using Fragile Data Hiding Based on Discrete Wavelet Transform and A₅ Lattice Vector Quantization. IEEE Access 11:9701-9715. https://doi.org/10.1109/ACCESS.2023.3238575

Article  Google Scholar 

Bouarroudj R, Souami F, Bellala FZ, Zerrouki N (2024) A reversible fragile watermarking technique using fourier transform and Fibonacci Q-matrix for medical image authentication. Biomedical Signal Processing and Control 92:105967. https://doi.org/10.1016/j.bspc.2024.105967

Article  Google Scholar 

Bhalerao S, Ansari IA, Kumar A (2023) A Reversible Medical Image Watermarking for ROI Tamper Detection and Recovery. Circuits Syst Signal Process 42:6701–6725. https://doi.org/10.1007/s00034-023-02416-0

Article  Google Scholar 

Pakdaman Z, Nezamabadi-pour H, Saryazdi S (2021) A new reversible data hiding in transform domain. Multimed Tools Appl 80:8931–8955. https://doi.org/10.1007/s11042-020-10058-6

Article  Google Scholar 

Pal P, Jana B, Bhaumik J (2021) An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error Correcting Code. Wireless Pers Commun 121:939– 961. https://doi.org/10.1007/s11277-021-08666-y

Article  Google Scholar 

Turuk MP, Dhande AP (2016) A Novel Reversible Multiple Medical Image Watermarking for Health Information System. J Med Syst 40:269. https://doi.org/10.1007/s10916-016-0608-0

Article  PubMed  CAS  Google Scholar 

Thanki R, Borra S (2019) Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing. Multimed Tools Appl 78:13905–13924. https://doi.org/10.1007/s11042-018-6746-2

Article  Google Scholar 

Bouarroudj R, Souami F, Bellala FZ (2023) Fragile watermarking for medical image authentication based on DCT technique. 2023 5th International Conference on Pattern Analysis and Intelligent Systems (PAIS), Sétif, Algeria 1–6. https://doi.org/10.1109/PAIS60821.2023.10322029

Singh D, Udmale SS, Singh SK (2023) Integer wavelet transform based an effective fragile watermarking scheme for exact authentication and restoration. J Ambient Intell Human Comput 14:4841–4852. https://doi.org/10.1007/s12652-022-04369-9

Article  Google Scholar 

Wu HC, Fan WL, Tsai CS, Ying JJC (2022) An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks. Multimed Tools Appl 81:19351–19375. https://doi.org/10.1007/s11042-021-11018-4

Article  Google Scholar 

Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. Journal of Visual Communication and Image Representation 30:312-327. https://doi.org/10.1016/j.jvcir.2015.05.006

Article  Google Scholar 

Sivasubramanian N, Konganathan G (2020) A novel semi fragile watermarking technique for tamper detection and recovery using IWT and DCT. Computing 102:1365–1384. https://doi.org/10.1007/s00607-020-00797-7

Article  Google Scholar 

Roček A, Slavíček K, Dostál O, Javorník M (2016) A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters. Biomedical Signal Processing and Control 29:44-52. https://doi.org/10.1016/j.bspc.2016.05.005

Article  Google Scholar 

Mantos PLK, Maglogiannis I (2016) Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images. J Med Syst 40:156. https://doi.org/10.1007/s10916-016-0514-5

Article  PubMed  Google Scholar 

Qasim AF, Meziane F, Aspin R (2017) Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review. Computer Science Review 27:45-60. https://doi.org/10.1016/j.cosrev.2017.11.003

Article  Google Scholar 

Mohsin AH, Zaidan AA, Zaidan BB et al (2018) Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review. J Med Syst 42:245. https://doi.org/10.1007/s10916-018-1103-6

Article  PubMed  CAS  Google Scholar 

Anand A, Singh AK (2021) Watermarking techniques for medical data authentication: a survey. Multimed Tools Appl 80: 30165–30197. https://doi.org/10.1007/s11042-020-08801-0

Article  Google Scholar 

Li Z, Zhang H, Liu X, Wang C, Wang X (2021) Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT. Digital Signal Processing 15:103062. https://doi.org/10.1016/j.dsp.2021.103062

Article  Google Scholar 

Xia Z, Wang C, Ma B, et al (2023) Geometric attacks resistant double zero-watermarking using discrete Fourier transform and fractional-order Exponent-Fourier moments. Digital Signal Processing 140:104097. https://doi.org/10.1016/j.dsp.2023.104097

Article  Google Scholar 

Cao H, Hu F, Sun Y, Chen S, Su Q (2022) Robust and reversible color image watermarking based on DFT in the spatial domain. Optik 262:169319. https://doi.org/10.1016/j.ijleo.2022.169319

Article  Google Scholar 

Li C, Chen G (2004) Chaos in the fractional order Chen system and its control. Chaos, Solitons & Fractals 22(3):549-554. https://doi.org/10.1016/j.chaos.2004.02.035

Article  Google Scholar 

Huang X, Liu L, Li X, Yu M, Wu Z (2019) A New Pseudorandom Bit Generator Based on Mixing Three-Dimensional Chen Chaotic System with a Chaotic Tactics. Complexity 9:6567198. https://doi.org/10.1155/2019/6567198

Article  Google Scholar 

Albertina B, Watson M, Holback C, et al (2016) Radiology Data from The Cancer Genome Atlas Lung Adenocarcinoma [TCGA-LUAD] collection. The Cancer Imaging Archive. https://doi.org/10.7937/K9/TCIA.2016.JGNIHEP5

Article  Google Scholar 

Hany M (2020) Chest CT-Scan images Dataset, Kaggle. https://www.kaggle.com/datasets/mohamedhanyyy/chest-ctscan-images

Nickparvar M (2021) Brain Tumor MRI Dataset, Kaggle. https://doi.org/10.34740/kaggle/dsv/2645886

Chowdhury M, Rahman T, Khandakar A, et al (2020) Can AI Help in Screening Viral and COVID-19 Pneumonia?. IEEE Access 8:132665-132676. https://doi.org/10.1109/ACCESS.2020.3010287

Article  Google Scholar 

Zukal M, Benes R, Cika P, Riha K (2012) Ultrasound image database, Signal processing laboratory. http://splab.cz/en/download/databaze/ultrasound

Linde Y, Buzo A, Gray R (1980) An Algorithm for Vector Quantizer Design. IEEE Transactions on Communications, 28(1):84-95. https://doi.org/10.1109/TCOM.1980.1094577

Article  Google Scholar 

Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the yeung-mintzer fragile watermarking technique. Journal of Electronic Imaging 11(2):262–275. https://doi.org/10.1117/1.1459449

Article 

留言 (0)

沒有登入
gif