메뉴 건너뛰기




Volumn 17, Issue 6, 2013, Pages 1057-1067

A watermarking-based medical image integrity control system and an image moment signature for tampering characterization

Author keywords

Cryptographic hash; Image moment; Integrity control; Medical imaging; Watermarking

Indexed keywords

CRYPTOGRAPHY; DIGITAL WATERMARKING; IMAGE WATERMARKING; MAGNETIC RESONANCE IMAGING; PIXELS; PRINTING MACHINERY; WATERMARKING;

EID: 84888331097     PISSN: 21682194     EISSN: None     Source Type: Journal    
DOI: 10.1109/JBHI.2013.2263533     Document Type: Article
Times cited : (73)

References (47)
  • 2
    • 58849116906 scopus 로고    scopus 로고
    • Proposal for DICOM multiframe medical image integrity and authenticity
    • L. Kobayashi and S. Furuie, "Proposal for DICOM multiframe medical image integrity and authenticity," J. Digital Imag., vol. 22, no. 1, pp. 71-83, 2009.
    • (2009) J. Digital Imag. , vol.22 , Issue.1 , pp. 71-83
    • Kobayashi, L.1    Furuie, S.2
  • 3
    • 32644477867 scopus 로고    scopus 로고
    • A new software tool for removing, storing, and adding abnormalities to medical images for perception research studies
    • DOI 10.1016/j.acra.2005.11.041, PII S1076633205010196
    • M. T. Madsen, K. S. Berbaum, A. N. Ellingson, B. H. Thompson, B. F. Mullan, and R. T. Caldwell, "A new software tool for removing, storing, and adding abnormalities to medical images for perception research studies," Academic Radiol., vol. 13, no. 3, pp. 305-312, 2006. (Pubitemid 43247850)
    • (2006) Academic Radiology , vol.13 , Issue.3 , pp. 305-312
    • Madsen, M.T.1    Berbaum, K.S.2    Ellingson, A.N.3    Thompson, B.H.4    Mullan, B.F.5    Caldwell, R.T.6
  • 4
    • 0028495791 scopus 로고
    • Near-lossless compression of medical images through entropy coded DPCM
    • Sep
    • K. Chen and T. V. Ramabadran, "Near-lossless compression of medical images through entropy coded DPCM," IEEE Trans. Med. Imag., vol. 13, no. 3, pp. 538-548, Sep. 1994.
    • (1994) IEEE Trans. Med. Imag. , vol.13 , Issue.3 , pp. 538-548
    • Chen, K.1    Ramabadran, T.V.2
  • 5
    • 0032844530 scopus 로고    scopus 로고
    • Lossy compression should not be used in certain imaging applications such as chest radiography
    • DOI 10.1118/1.598783
    • E. R. Ritenour and A. D. A. Maidment, "Lossy compression should not be used in certain imaging applications such as chest radiography," Med. Phys., vol. 26, pp. 1773-1775, 1999. (Pubitemid 29442257)
    • (1999) Medical Physics , vol.26 , Issue.9 , pp. 1773-1775
    • Ritenour, E.R.1    Maidment, A.D.A.2    Hendee, W.R.3
  • 8
    • 0041632327 scopus 로고    scopus 로고
    • MACs and hash functions: State of the art
    • B. Preneel, "MACs and hash functions: State of the art," Inf. Security Tech. Report, vol. 2, no. 2, pp. 33-43, 1997. (Pubitemid 127412875)
    • (1997) Information Security Technical Report , vol.2 , Issue.2 , pp. 33-43
    • Preneel, B.1
  • 9
    • 72349096815 scopus 로고    scopus 로고
    • Lossless watermarking for verifying the integrity of medical images with tamper localization
    • X. Guo and T. Zhuang, "Lossless watermarking for verifying the integrity of medical images with tamper localization," J. Digital Imag., vol. 22, no. 6, pp. 620-628, 2009.
    • (2009) J. Digital Imag. , vol.22 , Issue.6 , pp. 620-628
    • Guo, X.1    Zhuang, T.2
  • 10
    • 85032768213 scopus 로고    scopus 로고
    • Image forgery detection
    • Mar
    • H. Farid, "Image forgery detection," IEEE Signal Process. Mag., vol. 26, no. 2, pp. 16-25, Mar. 2009.
    • (2009) IEEE Signal Process. Mag. , vol.26 , Issue.2 , pp. 16-25
    • Farid, H.1
  • 11
    • 51849136872 scopus 로고    scopus 로고
    • An image authentication scheme with localization and recovery
    • C. Li and L. Liu, "An image authentication scheme with localization and recovery," in Proc. Int. Conf. Image Signal Proc., 2008, vol. 5, pp. 669-673.
    • (2008) Proc. Int. Conf. Image Signal Proc. , vol.5 , pp. 669-673
    • Li, C.1    Liu, L.2
  • 12
    • 33947127547 scopus 로고    scopus 로고
    • Binary image authentication with tampering localization by embedding cryptographic signature and block identifier
    • DOI 10.1109/LSP.2006.879829
    • H. Yang and A. C. Kot, "Binary image authentication with tampering localization by embedding cryptographic signature and block identifier," IEEE Signal Process. Lett., vol. 13, no. 12, pp. 741-744, Dec. 2006. (Pubitemid 46405580)
    • (2006) IEEE Signal Processing Letters , vol.13 , Issue.12 , pp. 741-744
    • Yang, H.1    Kot, A.C.2
  • 14
    • 0035097432 scopus 로고    scopus 로고
    • Authentication of digital images and video: Generic models and a new contribution
    • DOI 10.1016/S0923-5965(00)00010-2, PII S0923596500000102
    • M. P. Queluz, "Authentication of digital images and video:Generic models and a new contribution," Signal Process.: Image Commun., vol. 16, no. 5, pp. 461-475, Jan. 2001. (Pubitemid 34771334)
    • (2001) Signal Processing: Image Communication , vol.16 , Issue.5 , pp. 461-475
    • Queluz, M.P.1
  • 15
    • 33847159278 scopus 로고    scopus 로고
    • A robust content-based digital image watermarking scheme
    • DOI 10.1016/j.sigpro.2006.11.002, PII S0165168406003926
    • X. Qi and J. Qi, "A robust content-based digital image watermarking scheme," Signal Process., vol. 87, no. 6, pp. 1264-1280, Jun. 2007. (Pubitemid 46282985)
    • (2007) Signal Processing , vol.87 , Issue.6 , pp. 1264-1280
    • Qi, X.1    Qi, J.2
  • 16
    • 58449136543 scopus 로고    scopus 로고
    • A geometric attack resistant image watermarking scheme based on invariant centroids
    • E. Mwangi, "A geometric attack resistant image watermarking scheme based on invariant centroids," in Proc. IEEE Int. Symp. Signal Proc. Inf. Tech., 2007, pp. 190-193.
    • (2007) Proc. IEEE Int. Symp. Signal Proc. Inf. Tech. , pp. 190-193
    • Mwangi, E.1
  • 18
    • 63349083498 scopus 로고    scopus 로고
    • Reversible watermarking for knowledge digest embedding and reliability control in medical images
    • Mar
    • G. Coatrieux, C. Le Guillou, J. M. Cauvin, and C. Roux, "Reversible watermarking for knowledge digest embedding and reliability control in medical images," IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 2, pp. 158-165, Mar. 2009.
    • (2009) IEEE Trans. Inf. Technol. Biomed. , vol.13 , Issue.2 , pp. 158-165
    • Coatrieux, G.1    Le Guillou, C.2    Cauvin, J.M.3    Roux, C.4
  • 19
    • 84948707475 scopus 로고    scopus 로고
    • Digital watermarking for ROI medical images by using compressed signature image
    • A. Wakatani, "Digital watermarking for ROI medical images by using compressed signature image," in Proc. IEEE Annu. Hawaii Int. Conf. Syst. Sci., 2002, pp. 2043-2048.
    • (2002) Proc. IEEE Annu. Hawaii Int. Conf. Syst. Sci. , pp. 2043-2048
    • Wakatani, A.1
  • 21
    • 40149104655 scopus 로고    scopus 로고
    • Tamper detection and restoring system for medical images using wavelet-based reversible data embedding
    • DOI 10.1007/s10278-007-9012-0
    • K-H. Chiang, K-C. Chang-Chien, R-F. Chang, and H-Y. Yen, "Tamper detection and restoring system for medical images using wavelet-based reversible data embedding," J. Digital Imag., vol. 21, no. 1, pp. 77-90, Mar. 2008. (Pubitemid 351326297)
    • (2008) Journal of Digital Imaging , vol.21 , Issue.1 , pp. 77-90
    • Chiang, K.-H.1    Chang-Chien, K.-C.2    Chang, R.-F.3    Yen, H.-Y.4
  • 23
    • 77950386219 scopus 로고    scopus 로고
    • Dual watermarking method for secure image authentication and recovery
    • R. Chamlawi, I. Usman, and A. Khan, "Dual watermarking method for secure image authentication and recovery," in Proc. IEEE 13th Int. Multitopic Conf., 2009, pp. 1-4.
    • (2009) Proc. IEEE 13th Int. Multitopic Conf. , pp. 1-4
    • Chamlawi, R.1    Usman, I.2    Khan, A.3
  • 24
    • 70350440468 scopus 로고    scopus 로고
    • Self-recovery fragile watermarking using block-neighborhood tampering characterization
    • H-J. He, J-S. Zhang, and H-M. Tai, "Self-recovery fragile watermarking using block-neighborhood tampering characterization," in Proc. Inf. Hiding, 2009, pp. 132-145.
    • (2009) Proc. Inf. Hiding , pp. 132-145
    • He, H.-J.1    Zhang, J.-S.2    Tai, H.-M.3
  • 25
    • 79751538597 scopus 로고    scopus 로고
    • Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images
    • O. M. Al-Qershi and B. E. Khoo, "Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images," J. Digit Imag., vol. 1, no. 24, pp. 114-25, 2011.
    • (2011) J. Digit Imag. , vol.1 , Issue.24 , pp. 114-125
    • Al-Qershi, O.M.1    Khoo, B.E.2
  • 26
    • 70350582578 scopus 로고    scopus 로고
    • Hash-based identification of sparse image tampering
    • Nov
    • M. Tagliasacchi, G. Valenzise, and S. Tubaro, "Hash-based identification of sparse image tampering," IEEE Trans. Imag. Process., vol. 18, no. 11, pp. 2491-2504, Nov. 2009.
    • (2009) IEEE Trans. Imag. Process. , vol.18 , Issue.11 , pp. 2491-2504
    • Tagliasacchi, M.1    Valenzise, G.2    Tubaro, S.3
  • 28
    • 84954462362 scopus 로고    scopus 로고
    • Higher-order wavelet statistics and their application to digital forensics
    • H. Farid and S. Lyu, "Higher-order wavelet statistics and their application to digital forensics," in Proc. Int. Conf. Comput. Vision Pattern Recognit., 2003, vol. 8, p. 94.
    • (2003) Proc. Int. Conf. Comput. Vision Pattern Recognit. , vol.8 , pp. 94
    • Farid, H.1    Lyu, S.2
  • 29
    • 33847671791 scopus 로고    scopus 로고
    • Image manipulation detection
    • 041102-1-041102-17 Oct
    • S. Bayram, I. Avcibas, B. Sankur, and N. Memon, "Image manipulation detection," J. Electron. Imag., vol. 15, no. 4, pp. 041102-1-041102-17, Oct. 2006.
    • (2006) J. Electron. Imag. , vol.15 , Issue.4
    • Bayram, S.1    Avcibas, I.2    Sankur, B.3    Memon, N.4
  • 37
    • 84937655864 scopus 로고
    • Visual pattern recognition by moment invariants
    • M-K. Hu, "Visual pattern recognition by moment invariants," IRE Trans. Inf. Theory, vol. 8, no. 2, pp. 179-187, 1962.
    • (1962) IRE Trans. Inf. Theory , vol.8 , Issue.2 , pp. 179-187
    • Hu, M.-K.1
  • 38
    • 0027091314 scopus 로고
    • A survey of moment-based techniques for unoccluded object representation and recognition
    • R. J. Prokop and A. P. Reeves, "A survey of moment-based techniques for unoccluded object representation and recognition," J. CVGIP: Graphical Models Imag. Process., vol. 54, no. 5, pp. 438-460, 1992. (Pubitemid 23379858)
    • (1992) CVGIP: Graphical Models & Image Processing , vol.54 , Issue.5 , pp. 438-460
    • Prokop, R.J.1    Reeves, A.P.2
  • 40
    • 0002229304 scopus 로고    scopus 로고
    • Pairwise classification and support vector machines
    • Cambridge, MA, USA: MIT Press
    • U. H. Kressel, "Pairwise classification and support vector machines," in Advances in Kernel Methods. Cambridge, MA, USA: MIT Press, 1999, pp. 255-268.
    • (1999) Advances in Kernel Methods , pp. 255-268
    • Kressel, U.H.1
  • 42
    • 38049089912 scopus 로고    scopus 로고
    • Passive steganalysis using image quality metrics andmulti-class support vectormachine
    • Los Alamitos, CA, USA
    • B. Xu, J. Wang, X. Liu, and Z. Zhang, "Passive steganalysis using image quality metrics andmulti-class support vectormachine," in Proc. Int.Conf. Natural Comput., vol. 3, Los Alamitos, CA, USA, 2007, pp. 215-220.
    • (2007) Proc. Int.Conf. Natural Comput. , vol.3 , pp. 215-220
    • Xu, B.1    Wang, J.2    Liu, X.3    Zhang, Z.4
  • 44
    • 0034323731 scopus 로고    scopus 로고
    • Support vector machine techniques for nonlinear equalization
    • DOI 10.1109/78.875477
    • D. J. Sebald and J. A. Bucklew, "Support vector machine techniques for nonlinear equalization," IEEE Trans. Signal Process., vol. 48, no. 11, pp. 3217-3226, Nov. 2000. (Pubitemid 32027347)
    • (2000) IEEE Transactions on Signal Processing , vol.48 , Issue.11 , pp. 3217-3226
    • Sebald, D.J.1    Bucklew, J.A.2
  • 45
    • 79551603135 scopus 로고    scopus 로고
    • Optimal filter framework for automated, instantaneous detection of lesions in retinal images
    • Feb
    • G. Quellec, S. R. Russell, andM. D. Abramoff, "Optimal filter framework for automated, instantaneous detection of lesions in retinal images," IEEE Trans. Med. Imag., vol. 30, no. 2, pp. 523-533, Feb. 2011.
    • (2011) IEEE Trans. Med. Imag. , vol.30 , Issue.2 , pp. 523-533
    • Quellec, G.1    Russell, S.R.2    Abramoff, M.D.3
  • 46
    • 4344675264 scopus 로고    scopus 로고
    • Region filling and object removal by exemplar-based image inpainting
    • Sep
    • A. Criminisi, P. Perez, and K. Toyama, "Region filling and object removal by exemplar-based image inpainting," IEEE Trans. Image Process., vol. 13, no. 9, pp. 1200-1212, Sep. 2004.
    • (2004) IEEE Trans. Image Process. , vol.13 , Issue.9 , pp. 1200-1212
    • Criminisi, A.1    Perez, P.2    Toyama, K.3
  • 47
    • 84859845768 scopus 로고
    • Topological completeness of function spaces arising in the Hausdorff approximation of functions
    • G. Beer, "Topological completeness of function spaces arising in the Hausdorff approximation of functions," Can. Math. Bull., vol. 35, pp. 439-448, 1992.
    • (1992) Can. Math. Bull. , vol.35 , pp. 439-448
    • Beer, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.