Detection and restoration of a tampered medical image

被引:0
|
作者
Chuang, JC [1 ]
Chang, CC [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Min Hsiung 621, Chaiyi, Taiwan
关键词
authentication; medical imaging; watermarking; confidentiality;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper presents a recoverable image tamper proofing technique using the symmetric key cryptosystem and vector quantization for detecting and restoring of a tampered medical image. Our scheme applies the one-way hashing function and the symmetric key cryptosystem to the host image to generate the verification data. To recover the tampered places, the host image is compressed by vector quantization to generate the recovery data. Once an intruder has modified the host image, our scheme can detect and recover the tampered places according to the embedded verification data and the recovery data. Besides, the proposed scheme can withstand the counterfeit attack.
引用
收藏
页码:78 / 85
页数:8
相关论文
共 50 条
  • [1] Tampered Image Detection using Image Matching
    Li, Zhenghao
    Nee, A. Y. C.
    Ong, S. K.
    Gong, Weiguo
    [J]. COMPUTER GRAPHICS, IMAGING AND VISUALISATION - MODERN TECHNIQUES AND APPLICATIONS, PROCEEDINGS, 2008, : 174 - +
  • [2] Detection and restoration of tampered JPEG compressed images
    Wu, HC
    Chang, CC
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 64 (02) : 151 - 161
  • [3] TAMPERED MEDICAL SPOON - RADIOGRAPHIC DETECTION
    BRODNY, ML
    [J]. JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 1972, 222 (03): : 360 - &
  • [4] Research on Image Tampered Feature Points Detection and Restoration Based on the Three Level Compression of Wavelet Transform
    Sun, Yan-Ru
    Shen, Yong-Liang
    Pang, Chong-Yan
    Tang, Li-Chao
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 31 - 37
  • [5] Perceptual Image Hashing Using Surf for Tampered Image Detection
    Swetha, Chavva Sri Lakshmi Rama
    Divya Sri, Chakravaram
    Bharathi, B.
    [J]. Lecture Notes in Electrical Engineering, 2021, 708 : 453 - 461
  • [6] A Comparative Study on the Detection of Image Forgery of Tampered Background or Foreground
    Elmaci, Mehmet
    Toprak, Ahmet Nusret
    Aslantas, Veysel
    [J]. 9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
  • [7] Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC
    Kim, Cheonshik
    Shin, Dongkyoo
    Yang, Ching-Nung
    [J]. Personal and Ubiquitous Computing, 2018, 22 (01): : 11 - 22
  • [8] Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC
    Cheonshik Kim
    Dongkyoo Shin
    Ching-Nung Yang
    [J]. Personal and Ubiquitous Computing, 2018, 22 : 11 - 22
  • [9] Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC
    Kim, Cheonshik
    Shin, Dongkyoo
    Yang, Ching-Nung
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (01) : 11 - 22
  • [10] Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes
    Wu-Chih Hu
    Wei-Hao Chen
    Deng-Yuan Huang
    Ching-Yu Yang
    [J]. Multimedia Tools and Applications, 2016, 75 : 3495 - 3516