M. A. M. Abadi, H. Danyali, Mazaher Nosoohi Dehnavi
{"title":"基于汉明码脆弱水印的医学图像认证","authors":"M. A. M. Abadi, H. Danyali, Mazaher Nosoohi Dehnavi","doi":"10.1109/ICBME.2010.5704947","DOIUrl":null,"url":null,"abstract":"In this paper we propose a novel fragile watermarking scheme that uses very little bit budget to detect tamper in medical images, based on hamming codes. Unlike other papers that used hamming codes in a robust watermarking context, we use this code to detect errors in received watermarked image. The host image is decomposed into blocks and verification is performed block-wise in a way that we can easily localize tampers. A pair of keys is used for security reasons and watermark bits are placed into the blocks in accordance with these keys. Experimental results show that this method can reach near perfect verification while having very high PSNR and thus making very little changes to the host image that is of crucial importance in medical images.","PeriodicalId":377764,"journal":{"name":"2010 17th Iranian Conference of Biomedical Engineering (ICBME)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Medical image authentication based on fragile watermarking using hamming code\",\"authors\":\"M. A. M. Abadi, H. Danyali, Mazaher Nosoohi Dehnavi\",\"doi\":\"10.1109/ICBME.2010.5704947\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we propose a novel fragile watermarking scheme that uses very little bit budget to detect tamper in medical images, based on hamming codes. Unlike other papers that used hamming codes in a robust watermarking context, we use this code to detect errors in received watermarked image. The host image is decomposed into blocks and verification is performed block-wise in a way that we can easily localize tampers. A pair of keys is used for security reasons and watermark bits are placed into the blocks in accordance with these keys. Experimental results show that this method can reach near perfect verification while having very high PSNR and thus making very little changes to the host image that is of crucial importance in medical images.\",\"PeriodicalId\":377764,\"journal\":{\"name\":\"2010 17th Iranian Conference of Biomedical Engineering (ICBME)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 17th Iranian Conference of Biomedical Engineering (ICBME)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICBME.2010.5704947\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 17th Iranian Conference of Biomedical Engineering (ICBME)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICBME.2010.5704947","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Medical image authentication based on fragile watermarking using hamming code
In this paper we propose a novel fragile watermarking scheme that uses very little bit budget to detect tamper in medical images, based on hamming codes. Unlike other papers that used hamming codes in a robust watermarking context, we use this code to detect errors in received watermarked image. The host image is decomposed into blocks and verification is performed block-wise in a way that we can easily localize tampers. A pair of keys is used for security reasons and watermark bits are placed into the blocks in accordance with these keys. Experimental results show that this method can reach near perfect verification while having very high PSNR and thus making very little changes to the host image that is of crucial importance in medical images.