[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3286606.3286823acmotherconferencesArticle/Chapter ViewAbstractPublication PagessmartcityappConference Proceedingsconference-collections
research-article

Usage of watermarking techniques in medical imaging

Published: 10 October 2018 Publication History

Abstract

In this paper, we present the usage of watermarking techniques in medical imaging, and especially for security goals, the watermarking is considered a great solution to protect the personal data of patients during the medical images and telemedicine data exchange. This paper is devised in two parts. The first one is reserved for an overview on image watermarking with a presentation of the most important requirements of watermarking (robustness, imperceptibility and capacity). We offer also the general scheme of watermarking with the two essential phases and different types of attacks. Furthermore, we present a classification of watermarking techniques based on various parameters such as: insertion domain, human perception and detection methods, in the end of the section we display some metrics and benchmarks for analysis the performance of the watermarking technique. The second part is reserved for the usage of watermarking techniques in medical imaging especially for integrity verification, authentication and data hiding, we also discuss a literature review on watermarking techniques for medical image. In addition, we present the concept of telemedicine and telehealth fields and the importance of watermarking in the modern health care.

References

[1]
H. V. Desai, P. Beri, and D. J. Raj, 'Steganography, Cryptography, Watermarking: A Comparative Study', p. 3, 2010.
[2]
J. Fridrich, 'Applications of data hiding in digital images', Tutorial for the ISSPA, Conference in Melbourne, Australia,. Nov-1998.
[3]
H. Tao, L. Chongmin, M. Z. Jasni, and N. A. Ahmed, 'Robust Image Watermarking Theories and Techniques: A Review'.
[4]
P. Mitesh and C. Alpesh, 'The study of various attacks on Digital watermarking technique', International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), May-2014.
[5]
M. Boreiry and M.-R. Keyvanpour, 'Classification of watermarking methods based on watermarking approaches', 2017, pp. 73--76.
[6]
G. Chawla, R. Saini, and R. Yadav, 'Classification of Watermarking Based upon Various Parameters', Int. J. Comput. Appl., p. 4, 2012.
[7]
C. Song, S. Sudirman, and M. Merabti, 'Recent Advances and Classification of Watermarking Techniques in Digital Images', p. 6.
[8]
A. Naveed, Y. Saleem, N. Ahmed, and A. Rafiq, 'PERFORMANCE EVALUATION AND WATERMARK SECURITY ASSESSMENT OF DIGITAL WATERMARKING TECHNIQUES', p. 6, 2015.
[9]
M. Kuttera and F. A. P. Petitcolasb, 'A fair benchmark for image watermarking systems', p. 14.
[10]
S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, 'Attack modelling: towards a second generation watermarking benchmark', Signal Processing 81(6), pp. 1177--1214, 2001.
[11]
N. Nikolaidis and I. Pitas, 'Robust image watermarking in the spatial domain', Signal Process., vol. 66, no. 3, pp. 385--403, May 1998.
[12]
R. S. Weinstein et al., 'Telemedicine, Telehealth, and Mobile Health Applications That Work: Opportunities and Barriers', Am. J. Med., pp. 183--187, Mar. 2014.
[13]
M. Z. Karen, 'Telemedicine: history, applications, and impact on librarianship'. US National Library of Medicine National Institutes of Health, 1996.
[14]
S. Abhinav and S. Chandan, 'Medical Image Authentication Through Watermarking', International Journal of Advanced Research in Computer Science & Technology, Jun-2014.
[15]
N. A. Memon, C. Asmatullah, A. Mushtaq, and K. Zulfiqar Ali, 'Hybrid watermarking of medical images for ROI authentication and recovery', International Journal of Computer Mathematics, pp. 2057--2071, Jul-2011.
[16]
B. L. Gunjal and S. N. Mali, 'ROI Based Embedded Watermarking of Medical Images for Secured Communication in Telemedicine', vol. 6, no. 8, p. 6, 2012.
[17]
O. M. Al-Qershi and B. E. Khoo, 'Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images', J. Digit. Imaging, vol. 24, no. 1, pp. 114--125, Feb. 2011.
[18]
M. A. Hajjaji, H. Ridha, M. Abdellatif, and B. El-Bey, 'Tatouage des Images Médicales en Vue d'Intégrité et de Confidentialité des Données', p. 7.
[19]
V. Boris, 'Technique multicouches pour le tatouage d'images et adaptation aux flux vidéo MPEG-2 et MPEG-4', Grenoble INPG, 2003.
[20]
B. Vassaux, P. Bas, and J. M. Chassery, 'Tatouage d'images par étalement de spectre?: Apport de la technique CDMA en mode multicouche', p. 8, 2000.

Cited By

View all
  • (2023)A robust watermarking approach against high‐density salt and pepper noise (RWSPN) to enhance medical image securityIET Image Processing10.1049/ipr2.1293718:1(116-128)Online publication date: 26-Sep-2023
  • (2023)Medical image watermarking: a survey on applications, approach and performance requirement complianceInternational Journal of Multimedia Information Retrieval10.1007/s13735-023-00290-912:2Online publication date: 12-Sep-2023
  • (2021)Discrete Cosine Transform Method for Watermarking in Digital Image Processing2021 IEEE 7th International Conference on Computing, Engineering and Design (ICCED)10.1109/ICCED53389.2021.9664853(1-6)Online publication date: 5-Aug-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SCA '18: Proceedings of the 3rd International Conference on Smart City Applications
October 2018
580 pages
ISBN:9781450365628
DOI:10.1145/3286606
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 October 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Watermarking
  2. e-health
  3. medical image watermarking (MIW)
  4. medical imaging
  5. telemedicine

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

SCA '18

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A robust watermarking approach against high‐density salt and pepper noise (RWSPN) to enhance medical image securityIET Image Processing10.1049/ipr2.1293718:1(116-128)Online publication date: 26-Sep-2023
  • (2023)Medical image watermarking: a survey on applications, approach and performance requirement complianceInternational Journal of Multimedia Information Retrieval10.1007/s13735-023-00290-912:2Online publication date: 12-Sep-2023
  • (2021)Discrete Cosine Transform Method for Watermarking in Digital Image Processing2021 IEEE 7th International Conference on Computing, Engineering and Design (ICCED)10.1109/ICCED53389.2021.9664853(1-6)Online publication date: 5-Aug-2021
  • (2021)Comparative Analysis of Watermarking Methods on CFRP Sample Thermal ImagesComputer Communication, Networking and IoT10.1007/978-981-16-0980-0_42(455-462)Online publication date: 19-Jun-2021
  • (2020)Watermarking Image Scheme Based on Image Content and Corners Decomposition MethodInnovations in Smart Cities Applications Edition 310.1007/978-3-030-37629-1_50(693-703)Online publication date: 1-Feb-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media