A robust NIfTI image authentication framework to ensure reliable and safe diagnosis

被引:1
|
作者
Basheer, Shakila [1 ]
Singh, Kamred Udham [2 ,3 ]
Sharma, Vandana [4 ]
Bhatia, Surbhi [5 ,8 ]
Pande, Nilesh [6 ]
Kumar, Ankit [7 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh, Saudi Arabia
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[3] Graph Era Hill Univ, Sch Comp, Dehra Dun, India
[4] Amity Univ, Noida, India
[5] King Faisal Univ, Al Hasa, Saudi Arabia
[6] Sch Technol Pandit Deendayal Energy Univ Gandhinag, Gandhinagar, India
[7] GLA Univ, Mathura, India
[8] Univ Salford, Dept Data Sci, Manchester, England
关键词
Watermarking; NIfTI medical image; Affine transform; LWT; Hessenberg matrix decomposition; BLIND WATERMARKING SCHEME; WAVELET TRANSFORM; DCT; HYBRID; SVD;
D O I
10.7717/peerj-cs.1323
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Advancements in digital medical imaging technologies have significantly impacted the healthcare system. It enables the diagnosis of various diseases through the interpretation of medical images. In addition, telemedicine, including teleradiology, has been a crucial impact on remote medical consultation, especially during the COVID-19 pandemic. However, with the increasing reliance on digital medical images comes the risk of digital media attacks that can compromise the authenticity and ownership of these images. Therefore, it is crucial to develop reliable and secure methods to authenticate these images that are in NIfTI image format. The proposed method in this research involves meticulously integrating a watermark into the slice of the NIfTI image. The Slantlet transform allows modification during insertion, while the Hessenberg matrix decomposition is applied to the LL subband, which retains the most energy of the image. The Affine transform scrambles the watermark before embedding it in the slice. The hybrid combination of these functions has outperformed previous methods, with good trade-offs between security, imperceptibility, and robustness. The performance measures used, such as NC, PSNR, SNR, and SSIM, indicate good results, with PSNR ranging from 60 to 61 dB, image quality index, and NC all close to one. Furthermore, the simulation results have been tested against image processing threats, demonstrating the effectiveness of this method in ensuring the authenticity and ownership of NIfTI images. Thus, the proposed method in this research provides a reliable and secure solution for the authentication of NIfTI images, which can have significant implications in the healthcare industry.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] A Robust NIfTI Image Authentication Framework Based on DST and Multi-Scale Otsu Thresholding
    Singh, Kamred Udham
    Bhatia, Surbhi
    Kumar, Ankit
    Kautish, Sandeep
    Kumar, Adarsh
    Basheer, Shakila
    Hameed, Alaa Ali
    IEEE ACCESS, 2022, 10 : 132608 - 132620
  • [2] Secure NIfTI Image Authentication Scheme for Modern Healthcare System
    Singh, Kamred Udham
    Aljrees, Turki
    Kumar, Ankit
    Singh, Teekam
    APPLIED SCIENCES-BASEL, 2023, 13 (09):
  • [3] Robust document image authentication
    Jiang, Ming
    Wong, Edward K.
    Memon, Nasir
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 1131 - 1134
  • [4] Image-based decision making for reliable and proper diagnosing in NIFTI format using watermarking
    Singh, Kamred Udham
    Kumar, Akshay
    Singh, Teekam
    Ram, Mangey
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (27) : 39577 - 39603
  • [5] A framework for image based authentication
    Perra, C
    Giusto, DD
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 521 - 524
  • [6] Image-based decision making for reliable and proper diagnosing in NIFTI format using watermarking
    Kamred Udham Singh
    Akshay Kumar
    Teekam Singh
    Mangey Ram
    Multimedia Tools and Applications, 2022, 81 : 39577 - 39603
  • [7] SAFE: Software-defined Authentication FramEwork
    Kamath, Aditya V.
    Sudarshan, S.
    Kataoka, Kotaro
    Vijayvergiya, Nishant
    Reddy, G. Bhargav
    Phatale, Samrat
    ASIAN INTERNET ENGINEERING CONFERENCE (AINTEC 2016), 2016, : 57 - 63
  • [8] Implementation of Image Based Authentication to Ensure the Security of Mail Server
    Rahim, Abdul M.
    Anandhavalli, D.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 555 - 558
  • [9] Robust Invisible Watermarking for Image Authentication
    Kulkarni, Priyanka R.
    Mulani, Altaaf O.
    Mane, P. B.
    EMERGING TRENDS IN ELECTRICAL, COMMUNICATIONS AND INFORMATION TECHNOLOGIES, 2017, 394 : 193 - 200
  • [10] On (in)security of "a robust image authentication method"
    Uehara, T
    Safavi-Naini, R
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2002, PROCEEDING, 2002, 2532 : 1025 - 1032