M. A. M. Abadi, H. Danyali, Mazaher Nosoohi Dehnavi
{"title":"Medical image authentication based on fragile watermarking using hamming code","authors":"M. A. M. Abadi, H. Danyali, Mazaher Nosoohi Dehnavi","doi":"10.1109/ICBME.2010.5704947","DOIUrl":null,"url":null,"abstract":"In this paper we propose a novel fragile watermarking scheme that uses very little bit budget to detect tamper in medical images, based on hamming codes. Unlike other papers that used hamming codes in a robust watermarking context, we use this code to detect errors in received watermarked image. The host image is decomposed into blocks and verification is performed block-wise in a way that we can easily localize tampers. A pair of keys is used for security reasons and watermark bits are placed into the blocks in accordance with these keys. Experimental results show that this method can reach near perfect verification while having very high PSNR and thus making very little changes to the host image that is of crucial importance in medical images.","PeriodicalId":377764,"journal":{"name":"2010 17th Iranian Conference of Biomedical Engineering (ICBME)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 17th Iranian Conference of Biomedical Engineering (ICBME)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICBME.2010.5704947","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this paper we propose a novel fragile watermarking scheme that uses very little bit budget to detect tamper in medical images, based on hamming codes. Unlike other papers that used hamming codes in a robust watermarking context, we use this code to detect errors in received watermarked image. The host image is decomposed into blocks and verification is performed block-wise in a way that we can easily localize tampers. A pair of keys is used for security reasons and watermark bits are placed into the blocks in accordance with these keys. Experimental results show that this method can reach near perfect verification while having very high PSNR and thus making very little changes to the host image that is of crucial importance in medical images.