A RONI Based Visible Watermarking Approach for Medical Image Authentication

被引:28
|
作者
Thanki, Rohit [1 ]
Borra, Surekha [2 ]
Dwivedi, Vedvyas [1 ]
Borisagar, Komal [3 ]
机构
[1] CU Shah Univ, Wadhwan, Gujarat, India
[2] KS Inst Technol, Dept ECE, Bangalore, Karnataka, India
[3] Atmiya Inst Technol & Sci, EC Dept, Rajkot, Gujarat, India
关键词
Authentication; Medical image; Region of Interest (ROI); Region of Non-Interest (RONI); Visible watermarking;
D O I
10.1007/s10916-017-0795-3
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Nowadays medical data in terms of image files are often exchanged between different hospitals for use in telemedicine and diagnosis. Visible watermarking being extensively used for Intellectual Property identification of such medical images, leads to serious issues if failed to identify proper regions for watermark insertion. In this paper, the Region of Non-Interest (RONI) based visible watermarking for medical image authentication is proposed. In this technique, to RONI of the cover medical image is first identified using Human Visual System (HVS) model. Later, watermark logo is visibly inserted into RONI of the cover medical image to get watermarked medical image. Finally, the watermarked medical image is compared with the original medical image for measurement of imperceptibility and authenticity of proposed scheme. The experimental results showed that this proposed scheme reduces the computational complexity and improves the PSNR when compared to many existing schemes.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt
    Wong, M. L. Dennis
    Goh, Antionette W. -T.
    Chua, Hong Siang
    FORENSICS IN TELECOMMUNICATIONS, INFORMATION AND MULTIMEDIA, 2009, 8 : 42 - 53
  • [32] Reversible Region of Non-Interest (RONI) Watermarking for Authentication of DICOM Images
    Zain, Jasni Mohamad
    Clarke, Malcolm
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (09): : 19 - +
  • [33] Digital image ownership authentication via camouflaged unseen-visible watermarking
    Oswaldo Ulises Juarez-Sandoval
    Manuel Cedillo-Hernandez
    Mariko Nakano-Miyatake
    Antonio Cedillo-Hernandez
    Hector Perez-Meana
    Multimedia Tools and Applications, 2018, 77 : 26601 - 26634
  • [34] Watermarking based image authentication and tamper detection algorithm using vector quantization approach
    Tiwari, Archana
    Sharma, Manisha
    Tamrakar, Raunak Kumar
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2017, 78 : 114 - 123
  • [35] Digital image ownership authentication via camouflaged unseen-visible watermarking
    Ulises Juarez-Sandoval, Oswaldo
    Cedillo-Hernandez, Manuel
    Nakano-Miyatake, Mariko
    Cedillo-Hernandez, Antonio
    Perez-Meana, Hector
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (20) : 26601 - 26634
  • [36] An image fusion based visible watermarking algorithm
    Hu, YJ
    Kwong, S
    PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III: GENERAL & NONLINEAR CIRCUITS AND SYSTEMS, 2003, : 794 - 797
  • [37] The Overview of Binary Document Image Authentication Based On Watermarking
    Li, Xiao
    Gao, B. J.
    Wang, C. F.
    Han, Y. J.
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 2, 2008, : 188 - 194
  • [38] A wavelet transform based digital image watermarking and authentication
    Nallaperumal, Krishnan
    Selvakumar, R. K.
    Rajapandian, S.
    ArulMozhi, K.
    Babu, C. Nelson Kennedy
    2006 ANNUAL IEEE INDIA CONFERENCE, 2006, : 546 - +
  • [39] Wavelet-based digital watermarking for image authentication
    Paquet, AH
    Ward, RK
    IEEE CCEC 2002: CANADIAN CONFERENCE ON ELECTRCIAL AND COMPUTER ENGINEERING, VOLS 1-3, CONFERENCE PROCEEDINGS, 2002, : 879 - 884
  • [40] A survey on fragile watermarking based image authentication schemes
    Raj, N. R. Neena
    Shreelekshmi, R.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (13) : 19307 - 19333