{"title":"NROI watermarking of medical images for content authentication","authors":"N. Memon, S. Gilani","doi":"10.1109/INMIC.2008.4777717","DOIUrl":null,"url":null,"abstract":"Medical image is usually comprised of region of interest (ROI) and non region of interest (NROI). ROI is the region that contains the important information from diagnosis point of view so it must be stored without any distortion. We have proposed a digital watermarking technique which avoids the distortion of image in ROI by embedding the watermark information in NROI. The watermark is comprised of patient information, hospital logo and message authentication code, computed using hash function. Earlier BCH encryption of watermark is performed to ensure inaccessibility of embedded data to the adversaries.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"55","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Multitopic Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INMIC.2008.4777717","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 55
Abstract
Medical image is usually comprised of region of interest (ROI) and non region of interest (NROI). ROI is the region that contains the important information from diagnosis point of view so it must be stored without any distortion. We have proposed a digital watermarking technique which avoids the distortion of image in ROI by embedding the watermark information in NROI. The watermark is comprised of patient information, hospital logo and message authentication code, computed using hash function. Earlier BCH encryption of watermark is performed to ensure inaccessibility of embedded data to the adversaries.