A robust NIfTI image authentication framework to ensure reliable and safe diagnosis

被引:1
|
作者
Basheer, Shakila [1 ]
Singh, Kamred Udham [2 ,3 ]
Sharma, Vandana [4 ]
Bhatia, Surbhi [5 ,8 ]
Pande, Nilesh [6 ]
Kumar, Ankit [7 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh, Saudi Arabia
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[3] Graph Era Hill Univ, Sch Comp, Dehra Dun, India
[4] Amity Univ, Noida, India
[5] King Faisal Univ, Al Hasa, Saudi Arabia
[6] Sch Technol Pandit Deendayal Energy Univ Gandhinag, Gandhinagar, India
[7] GLA Univ, Mathura, India
[8] Univ Salford, Dept Data Sci, Manchester, England
关键词
Watermarking; NIfTI medical image; Affine transform; LWT; Hessenberg matrix decomposition; BLIND WATERMARKING SCHEME; WAVELET TRANSFORM; DCT; HYBRID; SVD;
D O I
10.7717/peerj-cs.1323
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Advancements in digital medical imaging technologies have significantly impacted the healthcare system. It enables the diagnosis of various diseases through the interpretation of medical images. In addition, telemedicine, including teleradiology, has been a crucial impact on remote medical consultation, especially during the COVID-19 pandemic. However, with the increasing reliance on digital medical images comes the risk of digital media attacks that can compromise the authenticity and ownership of these images. Therefore, it is crucial to develop reliable and secure methods to authenticate these images that are in NIfTI image format. The proposed method in this research involves meticulously integrating a watermark into the slice of the NIfTI image. The Slantlet transform allows modification during insertion, while the Hessenberg matrix decomposition is applied to the LL subband, which retains the most energy of the image. The Affine transform scrambles the watermark before embedding it in the slice. The hybrid combination of these functions has outperformed previous methods, with good trade-offs between security, imperceptibility, and robustness. The performance measures used, such as NC, PSNR, SNR, and SSIM, indicate good results, with PSNR ranging from 60 to 61 dB, image quality index, and NC all close to one. Furthermore, the simulation results have been tested against image processing threats, demonstrating the effectiveness of this method in ensuring the authenticity and ownership of NIfTI images. Thus, the proposed method in this research provides a reliable and secure solution for the authentication of NIfTI images, which can have significant implications in the healthcare industry.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] Biometric authentication and image encryption for image security in cloud framework
    Kakkad, Vishruti
    Patel, Meshwa
    Shah, Manan
    MULTISCALE AND MULTIDISCIPLINARY MODELING EXPERIMENTS AND DESIGN, 2019, 2 (04) : 233 - 248
  • [22] Biometric authentication and image encryption for image security in cloud framework
    Vishruti Kakkad
    Meshwa Patel
    Manan Shah
    Multiscale and Multidisciplinary Modeling, Experiments and Design, 2019, 2 : 233 - 248
  • [23] A Framework for Block based Image Authentication (FBIA)
    Ghoshal, Nabin
    Mandal, J. K.
    Khamrui, A.
    2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS, 2009, : 343 - +
  • [24] A Usable and Robust Continuous Authentication Framework Using Wearables
    Acar, Abbas
    Aksu, Hidayet
    Uluagac, A. Selcuk
    Akkaya, Kemal
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (06) : 2140 - 2153
  • [25] Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment
    Sumitra, Binu
    Raj, Pethuru
    Misbahuddin, M.
    ADVANCED COMPUTING AND SYSTEMS FOR SECURITY, VOL 1, 2016, 395 : 183 - 202
  • [26] Robust image authentication using content based compression
    Ee-Chien Chang
    Mohan S. Kankanhalli
    Xin Guan
    Zhiyong Huang
    Yinghui Wu
    Multimedia Systems, 2003, 9 : 121 - 130
  • [27] A robust and recoverable tamper proofing technique for image authentication
    Hung, KL
    Chang, CC
    WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET-RELATED SOCIAL ISSUES - HSI 2003, 2003, 2713 : 44 - 53
  • [28] Robust image hash in Radon transform domain for authentication
    Lei, Yanqiang
    Wang, Yuangen
    Huang, Jiwu
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2011, 26 (06) : 280 - 288
  • [29] A robust content based digital signature for image authentication
    Schneider, M
    Chang, SF
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, 1996, : 227 - 230
  • [30] Towards robust, content based techniques for image authentication
    Queluz, MP
    1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, : 297 - 302