A RONI Based Visible Watermarking Approach for Medical Image Authentication

被引:28
|
作者
Thanki, Rohit [1 ]
Borra, Surekha [2 ]
Dwivedi, Vedvyas [1 ]
Borisagar, Komal [3 ]
机构
[1] CU Shah Univ, Wadhwan, Gujarat, India
[2] KS Inst Technol, Dept ECE, Bangalore, Karnataka, India
[3] Atmiya Inst Technol & Sci, EC Dept, Rajkot, Gujarat, India
关键词
Authentication; Medical image; Region of Interest (ROI); Region of Non-Interest (RONI); Visible watermarking;
D O I
10.1007/s10916-017-0795-3
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Nowadays medical data in terms of image files are often exchanged between different hospitals for use in telemedicine and diagnosis. Visible watermarking being extensively used for Intellectual Property identification of such medical images, leads to serious issues if failed to identify proper regions for watermark insertion. In this paper, the Region of Non-Interest (RONI) based visible watermarking for medical image authentication is proposed. In this technique, to RONI of the cover medical image is first identified using Human Visual System (HVS) model. Later, watermark logo is visibly inserted into RONI of the cover medical image to get watermarked medical image. Finally, the watermarked medical image is compared with the original medical image for measurement of imperceptibility and authenticity of proposed scheme. The experimental results showed that this proposed scheme reduces the computational complexity and improves the PSNR when compared to many existing schemes.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] A Lossless Watermarking Based Authentication System For Medical Images
    Boucherkha, Samia
    Bemnohamed, Mohamed
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 1, 2007, 1 : 100 - 103
  • [42] Watermarking based image authentication using feature amplification
    Ye, SM
    Chang, EC
    Sun, QB
    2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2, 2005, : 610 - 613
  • [43] Content-based watermarking scheme for image authentication
    Yu, SS
    Hu, YP
    Zhou, JL
    2004 8TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1-3, 2004, : 1083 - 1087
  • [44] A DCT-Based watermarking technique for image authentication
    Al Baloshi, Mohamed
    Al-Mualla, Mohammed E.
    2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 754 - +
  • [45] Wavelet transform based digital watermarking for image authentication
    Tsai, MJ
    Hung, HY
    FOURTH ANNUAL ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2005, : 408 - 411
  • [46] Binomial transform based fragile watermarking for image authentication
    Ghosal, S. K.
    Mandal, J. K.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (4-5) : 272 - 281
  • [47] Image authentication and recovery scheme based on watermarking technique
    Sumitomo, Kenji
    Nakano, Mariko
    Perez, Hector
    PROCEEDINGS OF THE 2ND WSEAS INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS: MODERN TOPICS OF COMPUTER SCIENCE, 2008, : 94 - +
  • [48] Digital Image Authentication System Based on Digital Watermarking
    Bhargava, Neeraj
    Sharma, M. M.
    Garhwal, Abhimanyu Singh
    Mathuria, Manish
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 185 - 189
  • [49] Image authentication scheme research based on fragile watermarking
    School of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China
    Tien Tzu Hsueh Pao, 2007, 1 (34-39):
  • [50] A New Image Authentication Based on Reversible Watermarking Algorithm
    Gu, Qiaolun
    Gao, Tiegang
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 2727 - +