2020
DOI: 10.1109/access.2020.3019832
|View full text |Cite
|
Sign up to set email alerts
|

Effective Self-Recovery and Tampering Localization Fragile Watermarking for Medical Images

Abstract: It is increasingly important to achieve security and anti-counterfeiting for medical images. The integrity and verifiability of medical images before they are reviewed for potential medical diagnoses is imperative. This paper presents an effective self-embedding fragile watermarking scheme for medical images. Both self-recovery information and authentication code for each block are generated in advance and then embedded into other blocks separately with the help of the turtle shell and embedding table. In the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(20 citation statements)
references
References 40 publications
(112 reference statements)
0
10
0
Order By: Relevance
“…Finally, NCC (normal cross correlation) [33], as another method for measuring the similarity of two data sequences, is also measured in our experiments. It ranges from 0 to 1 and is defined by: NCCfalse(I,SIfalse)=iHfalse∑jWfalse(Ii,jμIfalse)false(SIi,jμSIfalse)false∑iHjW(Ii,jμI)2false∑iHjW(SIi,jμSI)2. If NCC = 1, it indicates two images are the same.…”
Section: Resultsmentioning
confidence: 99%
“…Finally, NCC (normal cross correlation) [33], as another method for measuring the similarity of two data sequences, is also measured in our experiments. It ranges from 0 to 1 and is defined by: NCCfalse(I,SIfalse)=iHfalse∑jWfalse(Ii,jμIfalse)false(SIi,jμSIfalse)false∑iHjW(Ii,jμI)2false∑iHjW(SIi,jμSI)2. If NCC = 1, it indicates two images are the same.…”
Section: Resultsmentioning
confidence: 99%
“…For this, in our approach, each morphed image can carry around log2(2 8 (2 8 +1)/2) ≈ 15 bits secret message, which is greater than the results provided by schemes in [28; 30]. Of course, when N is 2 15 , our approach can carry around log2(2 15 (2 15 +1)/2) ≈ 29 bits secret message, which are 14 bits higher than that of the scheme [3]. Also, we can observe that the hiding capacity of the proposed scheme is lower than that of schemes in [33; 36].…”
Section: Loss Functionmentioning
confidence: 87%
“…The spatial domainbased method is probably the most intuitive of data hiding options that straightly embed secret messages into pixel values of the original cover image. Some popular kinds of data hiding algorithms in the spatial domain are the least significant bit (LSB) [4; 9], prediction error [5], histogram-based approaches [7], modulo operation [10][11][12], and quantization-based methods [15]. Generally speaking, the spatial domain has a higher embedding capacity.…”
Section: Introductionmentioning
confidence: 99%
“…The dependability in CRF can be achieved with the private key [50] is given by the sender. The CRF will be implanted, such as fragile watermarks [51], within the packets. Fragile watermarks have the capability to detect any modification or tampering of data.…”
Section: Discussionmentioning
confidence: 99%