About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Forensics in Telecommunications, Information and Multimedia. Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

Research Article

Authenticating Medical Images through Repetitive Index Modulation Based Watermarking

Download(Requires a free EAI acccount)
519 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-02312-5_17,
        author={Chang-Tsun Li and Yue Li},
        title={Authenticating Medical Images through Repetitive Index Modulation Based Watermarking},
        proceedings={Forensics in Telecommunications, Information and Multimedia. Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers},
        proceedings_a={E-FORENSICS},
        year={2012},
        month={5},
        keywords={Medical image authentication digital watermarking data hiding digital forensics integrity verification},
        doi={10.1007/978-3-642-02312-5_17}
    }
    
  • Chang-Tsun Li
    Yue Li
    Year: 2012
    Authenticating Medical Images through Repetitive Index Modulation Based Watermarking
    E-FORENSICS
    Springer
    DOI: 10.1007/978-3-642-02312-5_17
Chang-Tsun Li1,*, Yue Li1,*
  • 1: University of Warwick
*Contact email: ctli@dcs.warwick.ac.uk, yxl@dcs.warwick.ac.uk

Abstract

In this work we propose a Repetitive Index Modulation (RIM) based digital watermarking scheme for authentication and integrity verification of medical images. Exploiting the fact that many types of medical images have significant background areas and medically meaningful Regions Of Interest (ROI), which represent the actual contents of the images, the scheme uses the contents of the ROI to create a content-dependent watermark and embeds the watermark in the background areas. Therefore when any pixel of the ROI is attacked, the watermark embedded in the background areas will be different from the watermark calculated according to the attacked contents, making the authentication unsuccessful. Because the creation of the watermark is content-dependent and the watermark is only embedded in the background areas, the proposed scheme can actually protect the content without distorting it.

Keywords
Medical image authentication digital watermarking data hiding digital forensics integrity verification
Published
2012-05-11
http://dx.doi.org/10.1007/978-3-642-02312-5_17
Copyright © 2009–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL