Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication

Medical images are widely used in telemedicine, sharing and electronic transmission between hospitals. While enjoying convenience, medical images also face privacy disclosure, illegal copy and malicious tamper, etc. It is highly important to ensure privacy and integrity of medical images. Cogitating...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2021-07, Vol.80 (16), p.24631-24667
Hauptverfasser: Shi, Hui, Wang, Ying, Li, Yanni, Ren, Yonggong, Guo, Cheng
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 24667
container_issue 16
container_start_page 24631
container_title Multimedia tools and applications
container_volume 80
creator Shi, Hui
Wang, Ying
Li, Yanni
Ren, Yonggong
Guo, Cheng
description Medical images are widely used in telemedicine, sharing and electronic transmission between hospitals. While enjoying convenience, medical images also face privacy disclosure, illegal copy and malicious tamper, etc. It is highly important to ensure privacy and integrity of medical images. Cogitating the above needs, a reversible medical image watermarking algorithm for privacy protection and integrity authentication is proposed. Firstly, the medical image is divided into the ROI (Region of Interest) and RONI (Region of Non-Interest) based on active contour model. Then, the proposed “Three-Dimensional Watermarks” are generated, including authentication watermark, restoration watermark and privacy watermark, which are produced by the novel Parallel Lattice Hash Function, the proposed Neighborhood Difference Method, and the proposed encryption algorithm, respectively. Moreover, “Double-Layer Reversible Embedding Strategy Based on Difference Expansion” is modified in ROI to improve embedding capacity, and “Histogram Modification Reversible Embedding Strategy of Difference Image” is modified to adaptively acquire four or more peak points, which is more flexible than common algorithms. Experimental results confirm the efficient of the proposed scheme, and demonstrate it not only realizes privacy protection, integrity authentication, reversibility, but also holds the characteristics of higher security, larger capacity and better restoration quality.
doi_str_mv 10.1007/s11042-021-10853-9
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2548389097</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2548389097</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-5b25e3e85e5403eda45738ef7f7055a53d3575f2dc189e139618fe439d3be2123</originalsourceid><addsrcrecordid>eNp9UE1LAzEUDKJgrf4BTwHP0XxsmuQoxS8oCKLnkN19u03dj5qklf57oyt48zQP3sy8N4PQJaPXjFJ1ExmjBSeUM8KoloKYIzRjUgmiFGfHeRaaEiUpO0VnMW4oZQvJixnavkDrx4GULkKNA-whRF92gHuofeU67HvXAv50CULvwrsfWuy6dgw-rXvcjAFvg9-76pBxTFClbIbdUGM_JGgz64DdLq1hSNnte3mOThrXRbj4xTl6u797XT6S1fPD0_J2RSrBTCKy5BIEaAmyoAJqV-QwGhrVKCqlk6IWUsmG1xXTBpgwC6YbKISpRQmccTFHV5Nv_utjBzHZzbgLQz5puSy00IYalVl8YlVhjDFAY3OcnPNgGbXfzdqpWZubtT_NWpNFYhLFTB5aCH_W_6i-APtjfcc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2548389097</pqid></control><display><type>article</type><title>Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication</title><source>SpringerNature Journals</source><creator>Shi, Hui ; Wang, Ying ; Li, Yanni ; Ren, Yonggong ; Guo, Cheng</creator><creatorcontrib>Shi, Hui ; Wang, Ying ; Li, Yanni ; Ren, Yonggong ; Guo, Cheng</creatorcontrib><description>Medical images are widely used in telemedicine, sharing and electronic transmission between hospitals. While enjoying convenience, medical images also face privacy disclosure, illegal copy and malicious tamper, etc. It is highly important to ensure privacy and integrity of medical images. Cogitating the above needs, a reversible medical image watermarking algorithm for privacy protection and integrity authentication is proposed. Firstly, the medical image is divided into the ROI (Region of Interest) and RONI (Region of Non-Interest) based on active contour model. Then, the proposed “Three-Dimensional Watermarks” are generated, including authentication watermark, restoration watermark and privacy watermark, which are produced by the novel Parallel Lattice Hash Function, the proposed Neighborhood Difference Method, and the proposed encryption algorithm, respectively. Moreover, “Double-Layer Reversible Embedding Strategy Based on Difference Expansion” is modified in ROI to improve embedding capacity, and “Histogram Modification Reversible Embedding Strategy of Difference Image” is modified to adaptively acquire four or more peak points, which is more flexible than common algorithms. Experimental results confirm the efficient of the proposed scheme, and demonstrate it not only realizes privacy protection, integrity authentication, reversibility, but also holds the characteristics of higher security, larger capacity and better restoration quality.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-021-10853-9</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Authentication ; Computer Communication Networks ; Computer Science ; Data Structures and Information Theory ; Embedding ; Hash based algorithms ; Histograms ; Image acquisition ; Image transmission ; Integrity ; Medical imaging ; Multimedia Information Systems ; Privacy ; Restoration ; Special Purpose and Application-Based Systems ; Telemedicine ; Watermarking</subject><ispartof>Multimedia tools and applications, 2021-07, Vol.80 (16), p.24631-24667</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-5b25e3e85e5403eda45738ef7f7055a53d3575f2dc189e139618fe439d3be2123</citedby><cites>FETCH-LOGICAL-c319t-5b25e3e85e5403eda45738ef7f7055a53d3575f2dc189e139618fe439d3be2123</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-021-10853-9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-021-10853-9$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Shi, Hui</creatorcontrib><creatorcontrib>Wang, Ying</creatorcontrib><creatorcontrib>Li, Yanni</creatorcontrib><creatorcontrib>Ren, Yonggong</creatorcontrib><creatorcontrib>Guo, Cheng</creatorcontrib><title>Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Medical images are widely used in telemedicine, sharing and electronic transmission between hospitals. While enjoying convenience, medical images also face privacy disclosure, illegal copy and malicious tamper, etc. It is highly important to ensure privacy and integrity of medical images. Cogitating the above needs, a reversible medical image watermarking algorithm for privacy protection and integrity authentication is proposed. Firstly, the medical image is divided into the ROI (Region of Interest) and RONI (Region of Non-Interest) based on active contour model. Then, the proposed “Three-Dimensional Watermarks” are generated, including authentication watermark, restoration watermark and privacy watermark, which are produced by the novel Parallel Lattice Hash Function, the proposed Neighborhood Difference Method, and the proposed encryption algorithm, respectively. Moreover, “Double-Layer Reversible Embedding Strategy Based on Difference Expansion” is modified in ROI to improve embedding capacity, and “Histogram Modification Reversible Embedding Strategy of Difference Image” is modified to adaptively acquire four or more peak points, which is more flexible than common algorithms. Experimental results confirm the efficient of the proposed scheme, and demonstrate it not only realizes privacy protection, integrity authentication, reversibility, but also holds the characteristics of higher security, larger capacity and better restoration quality.</description><subject>Algorithms</subject><subject>Authentication</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data Structures and Information Theory</subject><subject>Embedding</subject><subject>Hash based algorithms</subject><subject>Histograms</subject><subject>Image acquisition</subject><subject>Image transmission</subject><subject>Integrity</subject><subject>Medical imaging</subject><subject>Multimedia Information Systems</subject><subject>Privacy</subject><subject>Restoration</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Telemedicine</subject><subject>Watermarking</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9UE1LAzEUDKJgrf4BTwHP0XxsmuQoxS8oCKLnkN19u03dj5qklf57oyt48zQP3sy8N4PQJaPXjFJ1ExmjBSeUM8KoloKYIzRjUgmiFGfHeRaaEiUpO0VnMW4oZQvJixnavkDrx4GULkKNA-whRF92gHuofeU67HvXAv50CULvwrsfWuy6dgw-rXvcjAFvg9-76pBxTFClbIbdUGM_JGgz64DdLq1hSNnte3mOThrXRbj4xTl6u797XT6S1fPD0_J2RSrBTCKy5BIEaAmyoAJqV-QwGhrVKCqlk6IWUsmG1xXTBpgwC6YbKISpRQmccTFHV5Nv_utjBzHZzbgLQz5puSy00IYalVl8YlVhjDFAY3OcnPNgGbXfzdqpWZubtT_NWpNFYhLFTB5aCH_W_6i-APtjfcc</recordid><startdate>20210701</startdate><enddate>20210701</enddate><creator>Shi, Hui</creator><creator>Wang, Ying</creator><creator>Li, Yanni</creator><creator>Ren, Yonggong</creator><creator>Guo, Cheng</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20210701</creationdate><title>Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication</title><author>Shi, Hui ; Wang, Ying ; Li, Yanni ; Ren, Yonggong ; Guo, Cheng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-5b25e3e85e5403eda45738ef7f7055a53d3575f2dc189e139618fe439d3be2123</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Authentication</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data Structures and Information Theory</topic><topic>Embedding</topic><topic>Hash based algorithms</topic><topic>Histograms</topic><topic>Image acquisition</topic><topic>Image transmission</topic><topic>Integrity</topic><topic>Medical imaging</topic><topic>Multimedia Information Systems</topic><topic>Privacy</topic><topic>Restoration</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Telemedicine</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shi, Hui</creatorcontrib><creatorcontrib>Wang, Ying</creatorcontrib><creatorcontrib>Li, Yanni</creatorcontrib><creatorcontrib>Ren, Yonggong</creatorcontrib><creatorcontrib>Guo, Cheng</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shi, Hui</au><au>Wang, Ying</au><au>Li, Yanni</au><au>Ren, Yonggong</au><au>Guo, Cheng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2021-07-01</date><risdate>2021</risdate><volume>80</volume><issue>16</issue><spage>24631</spage><epage>24667</epage><pages>24631-24667</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Medical images are widely used in telemedicine, sharing and electronic transmission between hospitals. While enjoying convenience, medical images also face privacy disclosure, illegal copy and malicious tamper, etc. It is highly important to ensure privacy and integrity of medical images. Cogitating the above needs, a reversible medical image watermarking algorithm for privacy protection and integrity authentication is proposed. Firstly, the medical image is divided into the ROI (Region of Interest) and RONI (Region of Non-Interest) based on active contour model. Then, the proposed “Three-Dimensional Watermarks” are generated, including authentication watermark, restoration watermark and privacy watermark, which are produced by the novel Parallel Lattice Hash Function, the proposed Neighborhood Difference Method, and the proposed encryption algorithm, respectively. Moreover, “Double-Layer Reversible Embedding Strategy Based on Difference Expansion” is modified in ROI to improve embedding capacity, and “Histogram Modification Reversible Embedding Strategy of Difference Image” is modified to adaptively acquire four or more peak points, which is more flexible than common algorithms. Experimental results confirm the efficient of the proposed scheme, and demonstrate it not only realizes privacy protection, integrity authentication, reversibility, but also holds the characteristics of higher security, larger capacity and better restoration quality.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-021-10853-9</doi><tpages>37</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2021-07, Vol.80 (16), p.24631-24667
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2548389097
source SpringerNature Journals
subjects Algorithms
Authentication
Computer Communication Networks
Computer Science
Data Structures and Information Theory
Embedding
Hash based algorithms
Histograms
Image acquisition
Image transmission
Integrity
Medical imaging
Multimedia Information Systems
Privacy
Restoration
Special Purpose and Application-Based Systems
Telemedicine
Watermarking
title Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T08%3A51%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Region-based%20reversible%20medical%20image%20watermarking%20algorithm%20for%20privacy%20protection%20and%20integrity%20authentication&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Shi,%20Hui&rft.date=2021-07-01&rft.volume=80&rft.issue=16&rft.spage=24631&rft.epage=24667&rft.pages=24631-24667&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-021-10853-9&rft_dat=%3Cproquest_cross%3E2548389097%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2548389097&rft_id=info:pmid/&rfr_iscdi=true