A robust NIfTI image authentication framework to ensure reliable and safe diagnosis

被引:1
|
作者
Basheer, Shakila [1 ]
Singh, Kamred Udham [2 ,3 ]
Sharma, Vandana [4 ]
Bhatia, Surbhi [5 ,8 ]
Pande, Nilesh [6 ]
Kumar, Ankit [7 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh, Saudi Arabia
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[3] Graph Era Hill Univ, Sch Comp, Dehra Dun, India
[4] Amity Univ, Noida, India
[5] King Faisal Univ, Al Hasa, Saudi Arabia
[6] Sch Technol Pandit Deendayal Energy Univ Gandhinag, Gandhinagar, India
[7] GLA Univ, Mathura, India
[8] Univ Salford, Dept Data Sci, Manchester, England
关键词
Watermarking; NIfTI medical image; Affine transform; LWT; Hessenberg matrix decomposition; BLIND WATERMARKING SCHEME; WAVELET TRANSFORM; DCT; HYBRID; SVD;
D O I
10.7717/peerj-cs.1323
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Advancements in digital medical imaging technologies have significantly impacted the healthcare system. It enables the diagnosis of various diseases through the interpretation of medical images. In addition, telemedicine, including teleradiology, has been a crucial impact on remote medical consultation, especially during the COVID-19 pandemic. However, with the increasing reliance on digital medical images comes the risk of digital media attacks that can compromise the authenticity and ownership of these images. Therefore, it is crucial to develop reliable and secure methods to authenticate these images that are in NIfTI image format. The proposed method in this research involves meticulously integrating a watermark into the slice of the NIfTI image. The Slantlet transform allows modification during insertion, while the Hessenberg matrix decomposition is applied to the LL subband, which retains the most energy of the image. The Affine transform scrambles the watermark before embedding it in the slice. The hybrid combination of these functions has outperformed previous methods, with good trade-offs between security, imperceptibility, and robustness. The performance measures used, such as NC, PSNR, SNR, and SSIM, indicate good results, with PSNR ranging from 60 to 61 dB, image quality index, and NC all close to one. Furthermore, the simulation results have been tested against image processing threats, demonstrating the effectiveness of this method in ensuring the authenticity and ownership of NIfTI images. Thus, the proposed method in this research provides a reliable and secure solution for the authentication of NIfTI images, which can have significant implications in the healthcare industry.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] Invertible chaotic fragile watermarking for robust image authentication
    Sidiropoulos, Panagiotis
    Nikolaidis, Nikos
    Pitas, Ioannis
    CHAOS SOLITONS & FRACTALS, 2009, 42 (05) : 2667 - 2674
  • [32] Secure and Robust Two-Phase Image Authentication
    Tabatabaei, Seyed Amir Hossein
    Ur-Rehman, Obaid
    Zivic, Natasa
    Ruland, Christoph
    IEEE TRANSACTIONS ON MULTIMEDIA, 2015, 17 (07) : 945 - 956
  • [33] Robust image authentication using content based compression
    Chang, EC
    Kankanhalli, MS
    Guan, X
    Huang, ZY
    Wu, YH
    MULTIMEDIA SYSTEMS, 2003, 9 (02) : 121 - 130
  • [34] A robust approach to authentication of binary image for multimedia communication
    Wu, J
    Xia, BB
    Liu, J
    Tian, JW
    DCABES 2004, PROCEEDINGS, VOLS, 1 AND 2, 2004, : 1035 - 1039
  • [35] Robust Image Authentication Based on HMM and SVM Classifiers
    Hashmi, Mohammad F.
    Hambarde, Aaditya R.
    Keskar, Avinash G.
    ENGINEERING LETTERS, 2014, 22 (04) : 183 - 193
  • [36] A Novel Robust Data Hiding Scheme for Image Authentication
    Hsu, You-Hsiang
    Anistyasari, Yeni
    Chen, Yi-Hui
    Hua, Kai-Lung
    2015 ASIA PACIFIC CONFERENCE ON MULTIMEDIA AND BROADCASTING, 2015, : 27 - 32
  • [37] A Robust Watermarking and Image Authentication Technique on Block Property
    Kung, C. M.
    Juan, K. Y.
    Tu, Y. C.
    Kung, C. H.
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 173 - +
  • [38] A Hybrid Image Authentication Method Robust To Jpeg Attacks
    Gencturk, Beste
    Nabiyev, Vasif
    Ulutas, Guzin
    Ulutas, Mustafa
    2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 1596 - 1599
  • [39] Towards distortion-free robust image authentication
    Coltuc, Dinu
    ANTI-COUNTERFEIT IMAGE ANALYSIS METHODS (A SPECIAL SESSION OF ICSXII), 2007, 77
  • [40] A robust image authentication method surviving acceptable modifications
    Kim, MA
    Song, GS
    Lee, WH
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 722 - 727