Abstract
Digital medical images are very easy to be modified for illegal purposes. For example, microcalcification in mammography is an important diagnostic clue, and it can be wiped off intentionally for insurance purposes or added intentionally into a normal mammography. In this paper, we proposed two methods to tamper detection and recovery for a medical image. A 1024 × 1024 x-ray mammogram was chosen to test the ability of tamper detection and recovery. At first, a medical image is divided into several blocks. For each block, an adaptive robust digital watermarking method combined with the modulo operation is used to hide both the authentication message and the recovery information. In the first method, each block is embedded with the authentication message and the recovery information of other blocks. Because the recovered block is too small and excessively compressed, the concept of region of interest (ROI) is introduced into the second method. If there are no tampered blocks, the original image can be obtained with only the stego image. When the ROI, such as microcalcification in mammography, is tampered with, an approximate image will be obtained from other blocks. From the experimental results, the proposed near-lossless method is proven to effectively detect a tampered medical image and recover the original ROI image. In this study, an adaptive robust digital watermarking method combined with the operation of modulo 256 was chosen to achieve information hiding and image authentication. With the proposal method, any random changes on the stego image will be detected in high probability.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Hsu C-T, Wu J-L: Multiresolution watermarking for digital images. IEEE Trans Circuit Syst–II 45:1097–1101, 1998
Podilchuk CI, Zeng W: Image-adaptive watermarking using visual models. IEEE J Sel Areas Commun 16:525–539, 1998
Pitas I: A method for watermark casting on digital images. IEEE Trans Circuits Syst Video Technol 8:775–780, 1998
Wei ZH, Qin P, Fu YQ: Perceptual digital watermark of images using wavelet transform. IEEE Trans Consum Electron 44:1267–1272, 1998
Hsu C-T, Wu J-L: Hidden digital watermarks in images. IEEE Trans Image Process 8:58–68, 1999
Lee C-H, Lee Y-K: An adaptive digital image watermarking technique for copyright protection. IEEE Trans Consum Electron 45:1005–1015, 1999
Ng KS, Cheng LM, Cheng LL, Wang MK: Adaptive watermarking by using pixel position shifting technique. IEEE Trans Consum Electron 45:1057–1064, 1999
Hwang M-S, Chang C-C, Hwang K-F: A watermarking technique based on one-way hash functions. IEEE Trans Consum Electron 45:286–294, 1999
Fridrich J, Goljan M, Du R: Invertible authentication. In: Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Content III. San Jose, CA, 2001, pp 197–208
Celik MU, Sharma G, Tekalp AM, Saber E: Reversible data hiding. In: IEEE International Conference on Image Processing. Rochester, NY, 2002, pp 157–160
Goljan M, Fridrich J, Du R: Distortion-free data embedding. In: The 4th Information Hiding Workshop. Pittsburgh, Pennsylvania, 2001, pp 27-41
Fridrich J, Goljan M, Du R: Invertible authentication watermark for JPEG images. In: Information Technology: Coding and Computing. Las Vegas, Nevada, 2001, pp 223–227
Vleeschouwer CD, Delaigle J-F, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5:97–105, 2003
Gokturk SB, Tomasi C, Girod B, Beaulieu C: Medical image compression based on region of interest, with application to colon CT images. In: Annual Reports of the Research Reactor Institute, Kyoto University. Istanbul, Turkey, 2001, pp 2453–2356
Fridrich J, Goljan M, Du R: Lossless data embedding—new paradigm in digital watermarking. J Appl Signal Process 185–196, 2002
Fridrich J, Goljan M, Du R: Lossless data embedding for all image formats. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents. San Jose, CA, 2002, pp 572–583
Du R, Fridrich J: Lossless authentication of MPEG-2 video. In: IEEE International Conference on Image Processing. Rochester, NY, 2002, pp 889–892
Welch TA: A technique for high-performance data-compression. IEEE Comput 17:8–19, 1984
Weinberger MJ, Rissanen JJ, Arps B: Applications of universal context modeling to lossless compression of gray-scale images. IEEE Trans Image Process 5:575–586, 1996
Shen L, Rangayyan RM: Lossless compression of continuous-tone images by combined inter-bit-plane decorrelation and JBIG coding. J Electron Imaging 6:198–207, 1997
Fridrich J: Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8:1259–1284, 1998
Herrigel A, Ruanidh JO, Petersen H, Pereira S, Pun T: Secure copyright protection techniques for digital images. In: Information Hiding Workshop. Portland, Oregon, 1998, pp 169–190
Friedman GL: The trustworthy digital camera—restoring credibility to the photographic image. IEEE Trans Consum Electron 39:905–910, 1993
Schneider M, Chang S-F: A robust content based digital signature for image authentication. In: IEEE International Conference on Image Processing. Lausanne, Switzerland, 1996, pp 227–230
Queluz MP: Towards robust, content based techniques for image authentication. In: IEEE Workshop on Multimedia Signal Processing. Los Angeles, CA, 1998, pp 297–302
Wong PW, Memon N: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593–1601, 2001
Bhattacharjee S, Kutter M: Compression tolerant image authentication. In: IEEE International Conference on Image Processing. Chicago, IL, 1998, pp 435–439
Lu C-S, Liao H-YM: Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 10:1579–1592, 2001
Yu G-J, Lu C-S, Laio H-YM: Mean-quantization-based fragile watermarking for image authentication. Opt Eng 40:1396–1408, 2001
Kundur D, Hatzinakos D: Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87:1167–1180, 1999
Podilchuk CI, Delp EJ: Digital watermarking: algorithms and applications. IEEE Signal Process Mag 18:33–46, 2001
Lin ET, Podilchuk CI, Delp EJ: Detection of image alterations using semi-fragile watermarks. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents. San Jose, CA, 2000, pp 152–163
Tefas A, Pitas I: Image authentication and tamper proofing using mathematical morphology. In: Proceedings of European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland, 2000, vol 3, pp 1681–1684
Lee YL, Kim HC, Park HW: Blocking effect reduction of JPEG images by signal adaptive filtering. IEEE Trans Image Process 7:229–234, 1998
Han Y-H, Leou J-J: Detection and correction of transmission errors in JPEG images. IEEE Trans Circuits Syst Video Technol 8:221–231, 1998
Konstantinides K, Bhaskaran V, Beretta G: Image sharpening in the JPEG domain. IEEE Trans Image Process 8:874–878, 1999
In J, Shirani S, Kossentini F: On RD optimized progressive image coding using JPEG. IEEE Trans Image Process 8:1630–1638, 1999
Cheng H-D, Lui YM, Freimanis RI: A novel approach to microcalcification detection using fuzzy logic technique. IEEE Trans Med Imag 17:442–450, 1998
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wu, J.H.K., Chang, RF., Chen, CJ. et al. Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique. J Digit Imaging 21, 59–76 (2008). https://doi.org/10.1007/s10278-007-9011-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10278-007-9011-1