A fragile watermarking scheme for medical image

被引:5
|
作者
Wang Gang [1 ]
Rao Ni-Ni [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Life Sci & Technol, Chengdu 610054, Peoples R China
关键词
fragile watermark; least significant bit; chaotic sequence; hash function; medical image;
D O I
10.1109/IEMBS.2005.1617209
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
The infrastructure to deploy security standards is often lacking during modern telemedicine. As a branch of watermarking technique, the fragile watermarking provides us a good solution to the authentication for telemedicine. A fragile watermarking algorithm based on least significant bit (LSB), hash function and chaotic sequence is presented in this paper. To resist counterfeiting attack, the watermark signal is extracted from the original image, so different image has different watermark signal. The watermark signal is then processed by exclusive-OR (XOR) operation with the chaotic sequence in order to increase the security of the watermarking algorithm. Finally, it is embedded in the LSB of the host image. The experimental results show that the watermark is invisible; the watermark algorithm has good ability to resist counterfeiting attacks. Furthermore, after the watermark is extracted from the watermarked image, it is exactly the same as the original one. This kind of watermarking algorithm can e used for real-time diagnosis.
引用
收藏
页码:3406 / 3409
页数:4
相关论文
共 50 条
  • [1] Fragile watermarking scheme for image authentication
    Lu, HT
    Shen, RM
    Chung, FL
    ELECTRONICS LETTERS, 2003, 39 (12) : 898 - 900
  • [2] Fragile Watermarking Scheme for Image Authentication
    Betancourth, Gerardo Pineda
    2012 5TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTIONS (HSI 2012), 2012, : 168 - 174
  • [3] Reversible Fragile Medical Image Watermarking Scheme Resistant to Malicious Tampering Attacks
    Fedoseev, Victor
    Denisova, Anna
    IMPROVE: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND VISION ENGINEERING, 2022, : 57 - 65
  • [4] Oblivious fragile watermarking scheme for image authentication
    Li, CT
    Yang, FM
    Lee, CS
    2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3445 - 3448
  • [5] Security of fragile watermarking scheme for image authentication
    Liao, K-C
    Lee, W-B
    Liao, C-W
    IMAGING SCIENCE JOURNAL, 2006, 54 (03): : 129 - 133
  • [6] Fragile watermarking scheme for accepting image compression
    Kim, MA
    Yoo, KS
    Lee, WH
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005, 2005, 3824 : 940 - 946
  • [7] On the security of a fragile digital image watermarking scheme
    Sang, Jun
    Alam, Mohammad S.
    Zhu, Xiaohong
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON GRAPHICS AND VISUALIZATION IN ENGINEERING, 2007, : 53 - +
  • [8] A Fragile Watermarking Scheme for Color Image Authentication
    Hassan, M. Hamad
    Gilani, S. A. M.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 312 - 316
  • [9] A secure fragile watermarking scheme for image authentication
    He, Hongjie
    Zhang, Jiashu
    Tai, Heng-Ming
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1180 - 1185
  • [10] HIERARCHICAL FRAGILE WATERMARKING SCHEME FOR IMAGE AUTHENTICATION
    Lin, Shinfeng D.
    Yang, Zong-Lin
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02): : 245 - 255