JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms
Benyoussef, Meryem; Mabtoul, Samira; El Marraki, Mohamed; Aboutajdine, Driss;
  PDF(new window)
 Abstract
In this paper, a novel robust medical images watermarking scheme is proposed. In traditional methods, the added watermark may alter the host medical image in an irreversible manner and may mask subtle details. Consequently, we propose a method for medical image copyright protection that may remedy this problem by embedding the watermark without modifying the original host image. The proposed method is based on the visual cryptography concept and the dominant blocks of wavelet coefficients. The logic in using the blocks dominants map is that local features, such as contours or edges, are unique to each image. The experimental results show that the proposed method can withstand several image processing attacks such as cropping, filtering, compression, etc.
 Keywords
Copyright Protection;Mammograms;Medical Image;Robust Watermarking;Visual Cryptography;
 Language
English
 Cited by
 References
1.
G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland, and R. Collorec, "Relevance of watermarking in medical imaging," in Proceedings of 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine, Arlington, VA, 2000, pp. 250-255.

2.
J. H. Wu, R. F. Chang, C. J. Chen, C. L. Wang, T. H. Kuo, W. K. Moon, and D. R. Chen, "Tamper detection and recovery for medical images using near-lossless information hiding technique," Journal of Digital Imaging, vol. 21, no. 1, pp. 59-76, 2008.

3.
G. Coatrieux, J. Montagner, H. Huang, and C. Roux, "Mixed reversible and RONI watermarking for medical image reliability protection," in Proceedings of 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS2007), Lyon, France, 2007, pp. 5653-5656.

4.
B. Macq and F. Dewey, "Trusted headers for medical images," in Proceedings of DFG VIII-D II Watermarking Workshop, Erlangen, Germany, 1999.

5.
D. Anan and U. C. Niranjan, "Watermarking medical images with patient information," in Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Hong Kong, 1998, pp. 703-706.

6.
X. Q. Zhou, H. K. Huang, and S. L. Lou, "Authenticity and integrity of digital mammography images," IEEE Transactions on Medical Imaging, vol. 20, no. 8, pp. 784-791, 2001. crossref(new window)

7.
M. Li, R. Poovendran, and S. Narayanan, "Protecting patient privacy against unauthorized release of medical images in a group communication environment," Computerized Medical Imaging and Graphics, vol. 29, no. 5, pp. 367-383, 2005. crossref(new window)

8.
M. Naor and A. Shamir, "Visual cryptography," in Advances in Cryptology: EUROCRYPT'94. Heidelberg: Springer, 1995, pp. 1-12.

9.
R. J. Hwang, "A digital image copyright protection scheme based on visual cryptography," Tamkang Journal of Science and Engineering, vol. 3, no. 2, pp. 97-106, 2000.

10.
C. C. Wang, S. C. Tai, and C. S. Yu, "Repeating image watermarking technique by the visual cryptography," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 83, no. 8, pp. 1589-1598, 2000.

11.
B. Surekha and G. N. Swamy, "Sensitive digital image watermarking for copyright protection," International Journal of Network Security, vol. 15, no. 2, pp. 113-121, 2013.

12.
M. Benyoussef, S. Mabtoul, M. El Marraki, and D. Aboutajdine, "Blind invisible watermarking technique in DT-CWT domain using visual cryptography," in Image Analysis and Processing: ICIAP 2013. Heidelberg: Springer, 2013, pp. 813-822.

13.
A. Sleit and A. Abusitta, "A visual cryptography based watermark technology for individual and group images," Systemics, Cybernetics and Informatics, vol. 5, no. 2, pp. 24-32, 2008.

14.
S. Radharani and M. L. Valarmathi, "Multiple watermarking scheme for image authentication and copyright protection using wavelet based texture properties and visual cryptography," International Journal of Computer Applications, vol. 23, no. 3, pp. 29-36, 2011.

15.
H. Douzi, D. Mammass, and F. Nouboud, "Faber-Schauder wavelet transformation application to edge detection and image characterization," Journal of Mathematical Imaging and Vision, vol. 14, no. 2, pp. 91-102, 2001. crossref(new window)

16.
D. N. Ponraj, M. E. Jenifer, P. Poongodi, and J. S. Manoharan, "A survey on the preprocessing techniques of mammogram for the detection of breast cancer," Journal of Emerging Trends in Computing and Information Sciences, vol. 2, no. 12, pp. 656-664, 2011.

17.
W. R. Silva and D. Menotti, "Classification of mammograms by the breast composition," in Proceedings of International Conference on Image Processing, Computer Vision, and Pattern Recognition, Las Vegas, NV, 2012, pp. 1-6.

18.
H. Douzi and R. Harba, "Watermarking based on the density coefficients of Faber-Schauder wavelets," in Image and Signal Processing. Heidelberg: Springer, 2008, pp. 455-462.

19.
H. Sarukhanyan, S. Agaian, K. Egiazarian, and J. Astola, "Reversible Hadamard transforms," FactaUniversitatis - Series: Electronics and Energetics, vol. 20, no. 3, pp. 309-330, 2007.