A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,

Slides:



Advertisements
Similar presentations
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Advertisements

多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
1 Integrating digital signatures with relational database: Issues and organizational implications By Randal Reid, Gurpreet Dhillon. Journal of Database.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung-Min Sun IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 4, APRIL 2012 Citation:42.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
A Novel Full-Search Vector Quantization Algorithm Based on the Law of Cosines Author:Jarno Mielikainen, Student Member, IEEE Source:IEEE SIGNAL.
Source: IEEE Signal Processing Letters (Accepted)2016
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
EXTRACTING SPREAD-SPECTRUM HIDDEN DATA FROM DIGITAL MEDIA
Source: IEEE Transactions on Multimedia, Vol. 5, No
Der-Chyuan Lou and Jiang-Lung Liu,
Reporter :Liang, Min-Chen Date :2003/04/15
Cryptography and Network Security
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
An Overview of Digital Watermarking & Data Hiding Techniques for Secure Transmission of Medical Images K. ANUSUDHA Assistant Professor Department of Electronics.
Watermarking for Image Authentication ( Fragile Watermarking )
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
QR Code Authentication with Embedded Message Authentication Code
Mean value based reversible data hiding in encrypted images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Separable and error-free reversible data hiding in encrypted images
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Color Image Hidden in a
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
DISSERTATION ON CRYPTOGRAPHY.
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Data Hiding Watermarking for Halftone Images
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Reporter :Liang, Min-Chen Date :2003/05/06
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Reporter :Liang, Min-Chen Date :2003/05/06
Reporter :Liang, Min-Chen Date :2003/05/06
A new chaotic algorithm for image encryption
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Source: Pattern Recognition Letters 29 (2008)
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
On SVD-based watermarking algorithm
Information Protection and Recovery with Reversible Data Hiding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Hidden Digital Watermarks in Images
Privacy Protection for E-Health Systems by
An Efficient Spatial Prediction-Based Image Compression Scheme
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Presentation transcript:

A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou, Shaou-Gang, IEEE Transactions on Information Technology in Bimedicine, VOL. 6, NO. 1, MARCH 2002, pp. 46-53 Adviser : Dr. Chang, Chin-Chen Reporter : Chi, Kang-Liang Date : 2003/04/08 2003/04/08

Outline Introduction Bipolar TER Multiple-Base Algorithm ( TER : Tolerant Error Range ) Data-Hiding Methods Experimental Results Conclusions 2003/04/08

Introduction 2003/04/08

Bipolar TER Multiple-Base Algorithm Multiple-base sequences are –3, 7, 8, -4, 5, … The number 500 Since |(-3)*7*8| 500 < |(-3)*7*8*(-4)|, then the four numbers –3, 7, 8, -4 would be used as the bases for 500 , and the number “4” is stored in the key chain . 2003/04/08

Bipolar TER Multiple-Base Algorithm 500 = 4*125+0 125 = 8*15+5 15 = 7*2+1 2 = 3*0+2 (2)*7*8*4+(1)*8*4+(5)*4+(0)=500 The temporary converted values would be 2150. 2003/04/08

Bipolar TER Multiple-Base Algorithm (-3, 7, 8, -4)+(2, 1, 5, 0)*sign(-3, 7, 8, -4) = (-1, 6, 3, -4) A new bipolar TER base (-1, 6, 3, -4) is obtained . 2003/04/08

Data-Hiding Methods (1) Hiding a Digital Signature : 2003/04/08

Data-Hiding Methods 2003/04/08

Data-Hiding Methods (2) Hiding a Diagnostic Report or a Segment of ECG signal . 2003/04/08

Data-Hiding Methods Hiding a Diagnostic Report : Ex : 216 = 13*16+8 |13| 13 < |13*10| 13 = 10*1+3 1 = 13*0+1 (1)*10+(3)=13 (13, 10)+(1, 3)*sign(13, 10) = (14, 13) Using (14, 13) to modify the bipolar TER base . 2003/04/08

Data-Hiding Methods Hiding a Segment of ECG Signal : Data of the most frequently appeared are assigned to be zeros as a base-line value . Using Bipolar TER Multiple-Base Algorithm to modify the bipolar TER base . 2003/04/08

Experimental Results Table I Performance of hidden and JPEG decompressed images in terms of PSNR in decibels Table II Performance of hidden and JPEG decompressed images terms of the variance of TER 2003/04/08

Experimental Results Table III Comparison of the conventional encryption/decryption method and the proposed method 2003/04/08

Conclusions Different sizes of key and mark images are generated when different data are encrypted . Less processing time is needed . The confidentiality can be achieved by decrypting the entire message not only with digital signatures, but also with the exact copy of the original mark image and hidden image . The authentication can be provided with several objects . 2003/04/08