DOI QR코드

DOI QR Code

Medical Image Watermarking Based on Visual Secret Sharing and Cellular Automata Transform for Copyright Protection

  • Fan, Tzuo-Yau (Department of Electronic and Computer Engineering, National Taiwan University of Science and Technology) ;
  • Chao, Her-Chang (Department of Computer Science and Information Engineering, Ming Chuan University) ;
  • Chieu, Bin-Chang (Department of Electronic and Computer Engineering, National Taiwan University of Science and Technology)
  • Received : 2017.10.08
  • Accepted : 2018.08.08
  • Published : 2018.12.31

Abstract

In order to achieve the goal of protecting medical images, some existing watermark techniques for medical image protection mainly focus on improving the invisibility and robustness properties of the method, in order to prevent unnecessary medical disputes. This paper proposes a novel copyright method for medical image protection based on visual secret sharing (VSS) and cellular automata transform (CAT). This method uses the protected medical image feature as well as VSS and a watermark to produce the ownership share image (OSI). The OSI is used for medical image verification and must be registered to a certified authority. In the watermark extraction process, the suspected medical image is used to generate a master share image (MSI). The watermark can be extracted by combining the MSI and the OSI. Different from other traditional methods, the proposed method does not need to modify the medical image in order to protect the copyright of the image. Moreover, the registered OSI used to verify the ownership and its appearance display meaningful information, facilitating image management. Finally, the results of the final experiment can prove the effectiveness of our method.

Keywords

References

  1. M. Abo-Zahhad, S. M. Ahmed and O. Elnahas, "A wireless emergency telemedicine system for patients monitoring and diagnosis," International Journal of Telemedicine and Applications, vol. 2014, pp. 1-11, 2014.
  2. Y. C. Weng and S.L. Hsieh, "Design and implementation of a web-based medical drawing management system," Journal of Intelligent Information Systems, vol. 49, no. 3, pp. 391-405, 2017. https://doi.org/10.1007/s10844-017-0452-9
  3. T. Y. Fan, B. C. Chieu and H. C. Chao, "Robust copyright-protection scheme based on visual secret sharing and Bose-Chaudhuri-Hocquenghem code techniques," Journal of Electronic Imaging, vol. 21, no. 4, pp. 043018, 2012. https://doi.org/10.1117/1.JEI.21.4.043018
  4. M. P. Turuk and A. P. Dhande, "A novel reversible multiple medical image watermarking for health information system," Journal of Medical Systems, vol. 40, pp. 269, 2016. https://doi.org/10.1007/s10916-016-0608-0
  5. H. Nyeem, W. Boles and C. Boyd, "A review of medical image watermarking requirements for teleradiology," Journal of Digital Imaging, vol. 26, no. 2, pp. 326-343, 2013. https://doi.org/10.1007/s10278-012-9527-x
  6. S. A. Parah, F. Ahad, J. A. Sheikh and G. M. Bhat, "Hiding clinical information in medical images: a new high capacity and reversible data hiding technique," Journal of Biomedical Informatics, vol. 66, pp. 214-230, 2017. https://doi.org/10.1016/j.jbi.2017.01.006
  7. R. G. van Schyndel, A. Z. Tirkel and C. F. Osborne, "A digital watermark," in Proc. IEEE Int. Conf. Image Process., vol. 2, pp. 86-90, 1994.
  8. C. C. Chang and P. Y. Lin, "Adaptive watermark mechanism for rightful ownership protection," Journal of Systems and Software, vol. 81, no. 7, pp. 1118-1129, 2008. https://doi.org/10.1016/j.jss.2007.07.036
  9. V. Solachidis and I. Pitas, "Circularly symmetric watermark embedding in 2-D DFT domain," IEEE Transactions on Image Processing, vol. 10, no. 11, pp. 1741-1753, 2011.
  10. I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997. https://doi.org/10.1109/83.650120
  11. X. G. Xia, C. G. Boncelet and G. R. Arce, "A multiresolution watermark for digital images," in Proc. IEEE Int. Conf. Image Process., vol. 1, pp. 548-551, 1997.
  12. O. Lafe, Cellular Automata Transforms: Theory and Applications in Multimedia Compression, Encryption and Modeling, Kluwer Academic Publishers, Norwell, MA, 2000.
  13. R. J. Chen, C. F. Tai and J. L. Lai, "Novel CAT Wavelets-based image coding system," in Proc. IEEE Int. Symp. Consum. Electron., pp. 1-6, 2007.
  14. Z. Eslami, S. H. Razzaghi and J. Z. Ahmadabadi, "Secret image sharing based on cellular automata and steganography," Pattern Recognition, vol. 43, no. 1, pp. 397-404, 2010. https://doi.org/10.1016/j.patcog.2009.06.007
  15. R. Shiba, S. Kang and Y. Aoki, "An image watermarking technique using cellular automata transform," in TENCON 2004. 2004 IEEE Region 10 Conf., pp. 303-306, 2004.
  16. X. W. Li, S. J. Cho and S. T. Kim, "2-D CAT-based medical image watermarking algorithm," International Journal of Computer Theory and Engineering, vol. 4, no. 5, pp. 722-725, 2012.
  17. X. W. Li, S. T. Kim and I. K. Lee, "3D image copyright protection based on cellular automata transform and direct smart pixel mapping," Optics Communications, vol. 329, pp. 92-102, 2014. https://doi.org/10.1016/j.optcom.2014.05.006
  18. M. Sung, X. Li and I. K. Lee, "Visual perception based robust watermarking with integral imaging," Optik-International Journal for Light and Electron Optics, vol. 127, no. 24, pp. 11828-11839, 2016. https://doi.org/10.1016/j.ijleo.2016.09.098
  19. W. H. Lin, S. J. Horng, T. W. Kao, P. Fan, C. L. Lee and Y. Pan, "An efficient watermarking method based on significant difference of wavelet coefficient quantization," IEEE Transactions on Multimedia, vol. 10, no. 5, pp. 746-757, 2008. https://doi.org/10.1109/TMM.2008.922795
  20. S. A. Parah, J. A. Sheikh, N. A. Loan and G. M. Bhat, "Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing," Digital Signal Processing, vol. 53, pp. 11-24, 2016. https://doi.org/10.1016/j.dsp.2016.02.005
  21. C. Kavitha and S. Sakthivel, "An effective mechanism for medical images authentication using quick response code," Cluster Computing, pp. 1-8, 2018.
  22. F. Rahimi and H. Rabbani, "A dual adaptive watermarking scheme in contourlet domain for DICOM images," Biomedical Engineering Online, vol. 10, no. 1, pp. 53, 2011. https://doi.org/10.1186/1475-925X-10-53
  23. M. Cedillo-Hernandez, F. Garcia-Ugalde, M. Nakano-Miyatake and H. Perez-Meana, "Robust watermarking method in DFT domain for effective management of medical imaging," Signal, Image and Video Processing, vol. 9, no. 5, pp. 1163-1178, 2015. https://doi.org/10.1007/s11760-013-0555-x
  24. M. S. Wang and W. C. Chen, "Robust copyright protection scheme based on discrete cosine transform and secret sharing techniques," Journal of Electronic Imaging, vol. 17, no. 2, pp. 023006, 2008. https://doi.org/10.1117/1.2912065
  25. S. Rawat and B. Raman, "A blind watermarking algorithm based on fractional Fourier transform and visual cryptography," Signal Processing, vol. 92, no. 6, pp. 1480-1491, 2012. https://doi.org/10.1016/j.sigpro.2011.12.006
  26. T. M. Thanh and K. Tanaka, "An image zero-watermarking algorithm based on the encryption of visual map feature with watermark information," Multimedia Tools and Applications, vol. 76, no. 11, pp. 13455-13471, 2017. https://doi.org/10.1007/s11042-016-3750-2
  27. T. Amiri and M. E. Moghaddam, "A new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover images," Multimedia Tools and Applications, vol. 75, no. 14, pp. 8527-8543, 2016. https://doi.org/10.1007/s11042-015-2770-7
  28. J. Dong and J. Li, "A robust zero-watermarking algorithm for encrypted medical images in the DWT-DFT encrypted domain," in Innov. in Med. Healthc., pp. 197-208, 2016.
  29. Z. Shao, Y. Shang, R. Zeng, H. Shu, G. Coatrieux and J. Wu, "Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography," Signal Processing: Image Communication, vol. 48, pp. 12-21, 2016. https://doi.org/10.1016/j.image.2016.09.001
  30. X. Wu and W. Sun, "Robust copyright protection scheme for digital images using overlapping DCT and SVD," Applied Soft Computing, vol. 13, no. 2, pp. 1170-1182, 2013. https://doi.org/10.1016/j.asoc.2012.09.028
  31. M. Naor and A. Shamir, "Visual cryptography," in Advances in Cryptology-EuroCrypt94, Lect. Notes in Comput. Sci., vol. 950, pp. 1-12, 1995.
  32. H. C. Chao and T. Y. Fan, "XOR-based progressive visual secret sharing using generalized random grids," Displays, vol. 49, pp. 6-15, 2017. https://doi.org/10.1016/j.displa.2017.05.004
  33. G. Voyatzis and I. Pitas, "Digital image watermarking using mixing systems," Computer & Graphics, vol. 22, no. 4, pp. 405-416, 1998. https://doi.org/10.1016/S0097-8493(98)00030-2