A RONI Based Visible Watermarking Approach for Medical Image Authentication

被引:28
|
作者
Thanki, Rohit [1 ]
Borra, Surekha [2 ]
Dwivedi, Vedvyas [1 ]
Borisagar, Komal [3 ]
机构
[1] CU Shah Univ, Wadhwan, Gujarat, India
[2] KS Inst Technol, Dept ECE, Bangalore, Karnataka, India
[3] Atmiya Inst Technol & Sci, EC Dept, Rajkot, Gujarat, India
关键词
Authentication; Medical image; Region of Interest (ROI); Region of Non-Interest (RONI); Visible watermarking;
D O I
10.1007/s10916-017-0795-3
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Nowadays medical data in terms of image files are often exchanged between different hospitals for use in telemedicine and diagnosis. Visible watermarking being extensively used for Intellectual Property identification of such medical images, leads to serious issues if failed to identify proper regions for watermark insertion. In this paper, the Region of Non-Interest (RONI) based visible watermarking for medical image authentication is proposed. In this technique, to RONI of the cover medical image is first identified using Human Visual System (HVS) model. Later, watermark logo is visibly inserted into RONI of the cover medical image to get watermarked medical image. Finally, the watermarked medical image is compared with the original medical image for measurement of imperceptibility and authenticity of proposed scheme. The experimental results showed that this proposed scheme reduces the computational complexity and improves the PSNR when compared to many existing schemes.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Watermarking Approach of Embedding Patient Facial Information into RONI of Brain CT scan Image
    Moniruzzaman, Md.
    Hossain, Md. Foisal
    2015 18th International Conference on Computer and Information Technology (ICCIT), 2015, : 248 - 253
  • [22] A Fractional Fourier Based Medical Image Authentication Approach
    Alqahtani, Fayez
    Amoon, Mohammed
    El-Shafai, Walid
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 3133 - 3150
  • [23] Watermarking for image authentication
    Wu, M
    Liu, BD
    1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, 1998, : 437 - 441
  • [24] An Image Authentication Technology Based on Digital Watermarking
    Zhu, Yong
    Yu, Xiaohong
    Liu, Xiaohuan
    2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 179 - 183
  • [25] FEATURE BASED WATERMARKING SCHEME FOR IMAGE AUTHENTICATION
    Liu, Hongmei
    Rao, Junhui
    Yao, Xinzhi
    2008 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-4, 2008, : 229 - 232
  • [26] Content-based watermarking for image authentication
    Lamy, P
    Martinho, J
    Rosa, T
    Queluz, MP
    INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 187 - 198
  • [27] Binary Image Authentication Based on Watermarking Algorithm
    Masoodifar, Behrang
    Hashemi, S. Mojtaba
    Zarei, Omid
    THIRD INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2011), 2011, 8009
  • [28] A Fractal Based Image Watermarking For Authentication And Verification
    Kiani, Soheila
    Moghaddam, Mohsen Ebrahimi
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 15 - 19
  • [29] MEDICAL IMAGE WATERMARKING FOR AUTHENTICATION, CONFIDENTIALITY, TAMPER DETECTION AND RECOVERY
    Singh, Priyanka
    Pradhan, Ashok Kumar
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [30] Fragile and blind watermarking technique based on Weber's law for medical image authentication
    Walia, Ekta
    Suneja, Anu
    IET COMPUTER VISION, 2013, 7 (01) : 9 - 19