CFP last date
20 May 2024
Reseach Article

Analysis of Medical Images by Data Hiding Techniques

by Kriti, Shalvi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 76 - Number 12
Year of Publication: 2013
Authors: Kriti, Shalvi
10.5120/13303-0853

Kriti, Shalvi . Analysis of Medical Images by Data Hiding Techniques. International Journal of Computer Applications. 76, 12 ( August 2013), 36-40. DOI=10.5120/13303-0853

@article{ 10.5120/13303-0853,
author = { Kriti, Shalvi },
title = { Analysis of Medical Images by Data Hiding Techniques },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 76 },
number = { 12 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 36-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume76/number12/13303-0853/ },
doi = { 10.5120/13303-0853 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:45:45.080874+05:30
%A Kriti
%A Shalvi
%T Analysis of Medical Images by Data Hiding Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 76
%N 12
%P 36-40
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A fragile watermarking system is designed for the authentication of medical images. The proposed system authenticates the computed tomography (CT) scan medical images of the effected organs against different distortions. The system enhances the embedding capacity of a CT scan image by isolating the region of interest (ROI) based on higher gray values which need to be unaffected for medical diagnosis and hide character watermark only in region of non interest (RONI) and border areas, thus not compromising the diagnostic value of medical imaging. The method utilizes the spatial domain overlapping and least signi?cant bit (LSB) replacement method (in case of overflow or no data matched) for embedding the watermark. Experimental results reveal that the proposed system detects both legitimate and illegitimate distortions and outperforms the existing reversible data hiding schemes in terms of embedded capacity and PSNR.

References
  1. Pushpala, K. and Nigudkar, R. , 2005. "A novel watermarking technique for medical image authentication", IEEE, pp. 683-686.
  2. Lee, H. K. , Kim, . H. J. , Kwon K. R. and Lee . J. K. , 2005. "Digital watermarking of medical image using ROI information'', IEEE, pp. 404 -407.
  3. Raul, C. R. and Claudia, U. F, 2007. "Data Hiding Scheme for Medical Images", IEEE, pp. 32-36.
  4. Weng, S. , Zhao, Y. , Pan, J. S. , and Ni, R. , 2007. "A novel high capacity reversible watermarking scheme," IEEE International Conference on Multimedia and Expo (ICME 07), vol. 3, pp. 723 – 730.
  5. Huang, A. H. V. C. , Fang, B. W. C. and Chen, S. C. , 2009. "Privacy Protection and Authentication for Medical Images with Record-Based Watermarking", IEEE, pp. 190 – 193.
  6. Khurshid, K. , Faure, C. and Vincent, N. , 2009. "Fusion of word spotting and spatial information for figure caption retrieval in historical document image'', IEEE, pp. 266-270.
  7. Sun, X. and Bo, S. , 2010. "A Blind Digital Watermarking for Color Medical Images Based on PCA", IEEE, pp. 421 – 427.
  8. Saravanan, P. and Nagarajan, S. , 2010. "An Adaptive Learning Approach for Tracking Data using Visual and Features", IEEE, pp. 192 – 196.
  9. Poonkuntran, S. and Rajesh, R. S. , 2011. "A Messy Watermarking for Medical Image Authentication", IEEE, pp. 418 – 422.
Index Terms

Computer Science
Information Sciences

Keywords

Digital watermarking ROI RONI Data authentication CT scan image Embedding Patient report