[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique

  • Published:
Journal of Digital Imaging Aims and scope Submit manuscript

Abstract

Digital medical images are very easy to be modified for illegal purposes. For example, microcalcification in mammography is an important diagnostic clue, and it can be wiped off intentionally for insurance purposes or added intentionally into a normal mammography. In this paper, we proposed two methods to tamper detection and recovery for a medical image. A 1024 × 1024 x-ray mammogram was chosen to test the ability of tamper detection and recovery. At first, a medical image is divided into several blocks. For each block, an adaptive robust digital watermarking method combined with the modulo operation is used to hide both the authentication message and the recovery information. In the first method, each block is embedded with the authentication message and the recovery information of other blocks. Because the recovered block is too small and excessively compressed, the concept of region of interest (ROI) is introduced into the second method. If there are no tampered blocks, the original image can be obtained with only the stego image. When the ROI, such as microcalcification in mammography, is tampered with, an approximate image will be obtained from other blocks. From the experimental results, the proposed near-lossless method is proven to effectively detect a tampered medical image and recover the original ROI image. In this study, an adaptive robust digital watermarking method combined with the operation of modulo 256 was chosen to achieve information hiding and image authentication. With the proposal method, any random changes on the stego image will be detected in high probability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Hsu C-T, Wu J-L: Multiresolution watermarking for digital images. IEEE Trans Circuit Syst–II 45:1097–1101, 1998

    Article  Google Scholar 

  2. Podilchuk CI, Zeng W: Image-adaptive watermarking using visual models. IEEE J Sel Areas Commun 16:525–539, 1998

    Article  Google Scholar 

  3. Pitas I: A method for watermark casting on digital images. IEEE Trans Circuits Syst Video Technol 8:775–780, 1998

    Article  Google Scholar 

  4. Wei ZH, Qin P, Fu YQ: Perceptual digital watermark of images using wavelet transform. IEEE Trans Consum Electron 44:1267–1272, 1998

    Article  Google Scholar 

  5. Hsu C-T, Wu J-L: Hidden digital watermarks in images. IEEE Trans Image Process 8:58–68, 1999

    Article  PubMed  CAS  Google Scholar 

  6. Lee C-H, Lee Y-K: An adaptive digital image watermarking technique for copyright protection. IEEE Trans Consum Electron 45:1005–1015, 1999

    Article  Google Scholar 

  7. Ng KS, Cheng LM, Cheng LL, Wang MK: Adaptive watermarking by using pixel position shifting technique. IEEE Trans Consum Electron 45:1057–1064, 1999

    Article  Google Scholar 

  8. Hwang M-S, Chang C-C, Hwang K-F: A watermarking technique based on one-way hash functions. IEEE Trans Consum Electron 45:286–294, 1999

    Article  Google Scholar 

  9. Fridrich J, Goljan M, Du R: Invertible authentication. In: Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Content III. San Jose, CA, 2001, pp 197–208

  10. Celik MU, Sharma G, Tekalp AM, Saber E: Reversible data hiding. In: IEEE International Conference on Image Processing. Rochester, NY, 2002, pp 157–160

  11. Goljan M, Fridrich J, Du R: Distortion-free data embedding. In: The 4th Information Hiding Workshop. Pittsburgh, Pennsylvania, 2001, pp 27-41

  12. Fridrich J, Goljan M, Du R: Invertible authentication watermark for JPEG images. In: Information Technology: Coding and Computing. Las Vegas, Nevada, 2001, pp 223–227

  13. Vleeschouwer CD, Delaigle J-F, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5:97–105, 2003

    Article  Google Scholar 

  14. Gokturk SB, Tomasi C, Girod B, Beaulieu C: Medical image compression based on region of interest, with application to colon CT images. In: Annual Reports of the Research Reactor Institute, Kyoto University. Istanbul, Turkey, 2001, pp 2453–2356

  15. Fridrich J, Goljan M, Du R: Lossless data embedding—new paradigm in digital watermarking. J Appl Signal Process 185–196, 2002

  16. Fridrich J, Goljan M, Du R: Lossless data embedding for all image formats. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents. San Jose, CA, 2002, pp 572–583

  17. Du R, Fridrich J: Lossless authentication of MPEG-2 video. In: IEEE International Conference on Image Processing. Rochester, NY, 2002, pp 889–892

  18. Welch TA: A technique for high-performance data-compression. IEEE Comput 17:8–19, 1984

    Google Scholar 

  19. Weinberger MJ, Rissanen JJ, Arps B: Applications of universal context modeling to lossless compression of gray-scale images. IEEE Trans Image Process 5:575–586, 1996

    Article  PubMed  CAS  Google Scholar 

  20. Shen L, Rangayyan RM: Lossless compression of continuous-tone images by combined inter-bit-plane decorrelation and JBIG coding. J Electron Imaging 6:198–207, 1997

    Article  Google Scholar 

  21. Fridrich J: Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8:1259–1284, 1998

    Article  Google Scholar 

  22. Herrigel A, Ruanidh JO, Petersen H, Pereira S, Pun T: Secure copyright protection techniques for digital images. In: Information Hiding Workshop. Portland, Oregon, 1998, pp 169–190

  23. Friedman GL: The trustworthy digital camera—restoring credibility to the photographic image. IEEE Trans Consum Electron 39:905–910, 1993

    Article  Google Scholar 

  24. Schneider M, Chang S-F: A robust content based digital signature for image authentication. In: IEEE International Conference on Image Processing. Lausanne, Switzerland, 1996, pp 227–230

  25. Queluz MP: Towards robust, content based techniques for image authentication. In: IEEE Workshop on Multimedia Signal Processing. Los Angeles, CA, 1998, pp 297–302

  26. Wong PW, Memon N: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10:1593–1601, 2001

    Article  PubMed  CAS  Google Scholar 

  27. Bhattacharjee S, Kutter M: Compression tolerant image authentication. In: IEEE International Conference on Image Processing. Chicago, IL, 1998, pp 435–439

  28. Lu C-S, Liao H-YM: Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 10:1579–1592, 2001

    Article  PubMed  CAS  Google Scholar 

  29. Yu G-J, Lu C-S, Laio H-YM: Mean-quantization-based fragile watermarking for image authentication. Opt Eng 40:1396–1408, 2001

    Article  Google Scholar 

  30. Kundur D, Hatzinakos D: Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87:1167–1180, 1999

    Article  Google Scholar 

  31. Podilchuk CI, Delp EJ: Digital watermarking: algorithms and applications. IEEE Signal Process Mag 18:33–46, 2001

    Article  Google Scholar 

  32. Lin ET, Podilchuk CI, Delp EJ: Detection of image alterations using semi-fragile watermarks. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents. San Jose, CA, 2000, pp 152–163

  33. Tefas A, Pitas I: Image authentication and tamper proofing using mathematical morphology. In: Proceedings of European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland, 2000, vol 3, pp 1681–1684

  34. Lee YL, Kim HC, Park HW: Blocking effect reduction of JPEG images by signal adaptive filtering. IEEE Trans Image Process 7:229–234, 1998

    Article  PubMed  CAS  Google Scholar 

  35. Han Y-H, Leou J-J: Detection and correction of transmission errors in JPEG images. IEEE Trans Circuits Syst Video Technol 8:221–231, 1998

    Article  Google Scholar 

  36. Konstantinides K, Bhaskaran V, Beretta G: Image sharpening in the JPEG domain. IEEE Trans Image Process 8:874–878, 1999

    Article  PubMed  CAS  Google Scholar 

  37. In J, Shirani S, Kossentini F: On RD optimized progressive image coding using JPEG. IEEE Trans Image Process 8:1630–1638, 1999

    Article  PubMed  CAS  Google Scholar 

  38. Cheng H-D, Lui YM, Freimanis RI: A novel approach to microcalcification detection using fuzzy logic technique. IEEE Trans Med Imag 17:442–450, 1998

    Article  CAS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dar-Ren Chen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wu, J.H.K., Chang, RF., Chen, CJ. et al. Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique. J Digit Imaging 21, 59–76 (2008). https://doi.org/10.1007/s10278-007-9011-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10278-007-9011-1

Key words

Navigation