Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities |
Badshah, Gran
(Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang)
Liew, Siau-Chuin (Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang) Zain, Jasni Mohamad (Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang) Ali, Mushtaq (Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang) |
1 | J. X. Chen, Z. L. Zhu, and H. Yu, "A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme," Optik - International Journal for Light and Electron Optics, vol. 125, no. 11, pp. 2472-2478, 2014. DOI |
2 | A. Cheddad, J. Condell, K. Curran, and P. McKevitt, "Digital image steganography: survey and analysis of current methods," Signal Processing, vol. 90, no. 3, pp. 727-752, 2010. DOI |
3 | J. Pan, J. Zheng, and G. Zhao, "Blind watermarking of NURBS curves and surfaces," Computer-Aided Design, vol. 45, no. 2, pp. 144-153, 2013. DOI |
4 | F. Y. Shih and Y. T. Wu, "Robust watermarking and compression for medical images based on genetic algorithms," Information Sciences, vol. 175, no. 3, pp. 200-216, 2005. DOI |
5 | N. Wang and C. Men, "Reversible fragile watermarking for 2-D vector map authentication with localization," Computer-Aided Design, vol. 44, no. 4, pp. 320-330, 2012. DOI |
6 | J. C. Garcia-Alvarez, H. Fuhr, and G. Castellanos-Dominguez, "Evaluation of region-of-interest coders using perceptual image quality assessments," Journal of Visual Communication and Image Representation, vol. 24, no. 8, pp. 1316-1327, 2013. DOI |
7 | M. M. Abd-Eldayem, "A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine," Egyptian Informatics Journal, vol. 14, no. 1, pp. 1-13, 2013. DOI |
8 | B. Davie, V. Florance, A. Friede, J. Sheehan, and J. E. Sisk, "Bringing health-care applications to the internet," IEEE Internet Computing, vol. 5, no. 3, pp. 42-48, 2001. DOI |
9 | F. J. McEvoy and E. Svalastoga, "Security of patient and study data associated with DICOM images when transferred using compact disc media," Journal of Digital Imaging, vol. 22, no. 1, pp. 65-70, 2009. DOI |
10 | R. Norcen, M. Podesser, A. Pommer, H. P. Schmidt, and A. Uhl, "Confidential storage and transmission of medical image data," Computers in Biology and Medicine, vol. 33, no. 3, pp. 277-292, 2003. DOI |
11 | L. O. M. Kobayashi, S. S. Furuie, and P. S. Barreto, "Providing integrity and authenticity in DICOM images: a novel approach," IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 4, pp. 582-589, 2009. DOI |
12 | G. Badshah, S. C. Liew, J. M. Zain, and M. Ali, "Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique," Journal of Digital Imaging, 01 October 2015. http://dx.doi.org/10.1007/s10278-015-9822-4. DOI |
13 | O. M. Al-Qershi and B. E. Khoo, "ROI-based tamper detection and recovery for medical images using reversible watermarking technique," in Proceedings of IEEE International Conference on Information Theory and Information Security (ICITIS), Beijing, China, 2010, pp. 151-155. |
14 | S. Das and M. K. Kundu, "Effective management of medical information through ROI-lossless fragile image watermarking technique," Computer Methods and Programs in Biomedicine, vol. 111, no. 3, pp. 662-675, 2013. DOI |
15 | G. Badshah, S. C. Liew, J. M. Zain, S. I. Hisham, and A. Zehra, "Importance of watermark lossless compression in digital medical image watermarking," Research Journal of Recent Sciences, vol. 4, no. 3, pp. 75-79, 2015. |
16 | D. Coppersmith, F. C. Mintzer, C. P. Tresser, C. W. Wu, and M. N. Yeung, "Fragile imperceptible digital watermark with privacy control," in Proceedings of SPIE 3657: Security and Watermaking of Multimedia Contents. Bellingham, WA: Interntional Society for Optics and Photonics, 1999. |
17 | S. C. Liew, S. W. Liew, and J. M. Zain, "Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication," Journal of Digital Imaging, vol. 26, no. 2, pp. 316-325, 2013. DOI |
18 | A. Al-Haj and A. Amer, "Secured telemedicine using region-based watermarking with tamper localization," Journal of Digital Imaging, vol. 27, no. 6, pp. 737-750, 2014. DOI |
19 | G. Badshah, S. C. Liew, M. Z. Jasni, and T. Herawan, "Tamper localization and recovery medical image watermarking," in Proceedings of International Conference on Computational Science and Information Management (ICoCSIM-2012), Medan, Indonesia, 2012, pp. 266-270. |