Multiple Image Watermarking Applied to Health Information Management

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Presented by Xinyu Chang
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
LOGO Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
C M S 2001 Darmstadt 1 Optimization of Watermarking Performances using Error Correcting Codes and Repetition S.Zinger, Z.Jin, B.Sankur*, H. Maître Ecole.
Error detection and concealment for Multimedia Communications Senior Design Fall 06 and Spring 07.
1 Outline  Introduction to JEPG2000  Why another image compression technique  Features  Discrete Wavelet Transform  Wavelet transform  Wavelet implementation.
Young Deok Chun, Nam Chul Kim, Member, IEEE, and Ick Hoon Jang, Member, IEEE IEEE TRANSACTIONS ON MULTIMEDIA,OCTOBER 2008.
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
Bit-Plane Watermarking for SPIHT-Coded Images 台北科技大學資工所 指導教授:楊士萱 學生:廖武傑 2003/07/29.
Losslessy Compression of Multimedia Data Hao Jiang Computer Science Department Sept. 25, 2007.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Software Research Image Compression Mohamed N. Ahmed, Ph.D.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
©2003/04 Alessandro Bogliolo Background Information theory Probability theory Algorithms.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Image compression using Hybrid DWT & DCT Presented by: Suchitra Shrestha Department of Electrical and Computer Engineering Date: 2008/10/09.
Reversible Color Image Watermarking in YCoCg-R Color Space Aniket Roy under the supervision of Dr. Rajat Subhra Chakraborty.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
Wavelet-based Coding And its application in JPEG2000 Monia Ghobadi CSC561 final project
BARCODE IDENTIFICATION BY USING WAVELET BASED ENERGY Soundararajan Ezekiel, Gary Greenwood, David Pazzaglia Computer Science Department Indiana University.
Outline Kinds of Coding Need for Compression Basic Types Taxonomy Performance Metrics.
ECE643 Course Project, Fall /21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi.
1 A HIGH-CAPACITY STEGANOGRAPHY SCHEME FOR JPEG2000 BASELINE SYSTEM Liang Zhang, Haili Wang, and Renbiao Wu, Senior Member, IEEE 1 IEEE TRANSACTIONS ON.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Integrity of multimedia data ● Techniques for digital watermarking ● An example in the Wavelet domain ● Experimental results: evaluation.
1 Marco Carli VPQM /01/2007 ON BETWEEN-COEFFICIENT CONTRAST MASKING OF DCT BASIS FUNCTIONS Nikolay Ponomarenko (*), Flavia Silvestri(**), Karen.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
12/12/2003EZW Image Coding Duarte and Haupt 1 Examining The Embedded Zerotree Wavelet (EZW) Image Coding Method Marco Duarte and Jarvis Haupt ECE 533 December.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Der-Chyuan Lou and Jiang-Lung Liu,
Watermarking for Image Authentication ( Fragile Watermarking )
Pei Qi ECE at UW-Madison
Increasing Watermarking Robustness using Turbo Codes
Presenter by : Mourad RAHALI
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Digital Watermarking for Image Authentication with Localization
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Mean quantization based image watermarking
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: Circuits and Systems for Video Technology,
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Presentation transcript:

Multiple Image Watermarking Applied to Health Information Management Reporter :黃阡廷

Outline Introduction Proposed Method Algorithm Selection of Embeddable Coefficients Results BCH encoding PSNR & wPSNR NHD Conclusions

introduction IEEE Transactions on Information Technology in Biomedicine, VOL. 10, NO. 4, October 2006 Author: Aggeliki Giakoumaki, Sotiris Pavlopoulos, Dimitris Koutsouri Research Motivation and Background: -huge and exponentially increasing amount of medical data -sensitive nature of patients’ personal data Research Purpose: -potentials of digital watermarking in medical data management issues -proposes a multiple watermarking scheme regarding health data handling

introduction Research Method: -quantization function -Haar wavelet transform -quantization function -multiple watermarks embedding procedure data watermarks: signature, index, caption watermark -energy of approximation -BCH encoding schemes S. Zinger, Z. Jin, H. Maitre, and B. Sankur, “Optimization of Watermarking performances using error correcting codes and repetition” -peak signal-to-noise ratio (PSNR) -weighted PSNR (wPSNR) -noise visibility function (NVF) -normalized hamming distance (NHD)

introduction regions of interest (ROI) Medical Data Management Issues: -Access Control -De-identification -Captioning -Origin Identification -Integrity Control -Indexing

Proposed Method dyadic scaling decomposition of the wavelet transform and the signal processing of the human visual system (HVS) signature watermark: source authentication by the recipient index watermark: image retrieval by database querying mechanisms caption watermark: additional data useful for the diagnosis reference watermark: data integrity control and tampering localization

Algorithm Haar wavelet transform produces coefficients that are dyadic rational numbers: 2l quantization function: -k is an integer -s is a user-defined offset for increased security -Δ, the quantization parameter, is a positive real number

Algorithm quantization parameter Δ is defined as: Δ = 2l , where l is the decomposition level.

Algorithm The multiple watermarks embedding procedure: Step 1: four-level Haar wavelet decomposition Step 2: watermark bit wi is embedded into the coefficient f according to the following: a) If Q (f ) = wi , the coefficient is not modified. b) following assignment: Q (f ) =wi Step 3: The watermarked image is produced by the corresponding four-level inverse wavelet transform.

Selection of Embeddable Coefficients signature watermark is embedded in the fourth decomposition level index watermark is embedded in the third decomposition level caption watermark is embedded in the second decomposition level the first decomposition level is used for fragile watermarking to allow data integrity control reference watermark is embedded in selected coefficients of the other three decomposition levels

Energy of Approximation and Detail Images of a Four-Level Wavelet Decomposition k denotes the approximation and the detail images at each of the decomposition levels Ik are the coefficients of the subband images Nk and Mk are their corresponding dimensions

Allocation of Watermarks According to Robustness and Capacity Criteria

Results test set consisted of 50 ultrasound images of size 256×320 pixels signature watermark containing the doctor’s identification key is a 128-b watermark reference watermark is a binary array index and caption watermarks are binary arrays produced by the ASCII codes of text files set of keywords consisted of six words and a total of 52 characters patient’s data comprised of 23 words, of 208 characters in total

BCH encoding In order to increase robustness of the embedded data (signature, index, caption), error correction coding was implemented. BCH encoding schemes: BCH(n, k, l ) n : codeword of length k : bits of the watermark array l : can correct bit errors

PSNR & wPSNR (a) Original image. (b) Resulting watermarked image.

PSNR & wPSNR I : original image I hat : watermarked image N I : the number of pixels in the image maxI (m, n): the maximum gray value of the original image

PSNR & wPSNR The weighted PSNR (wPSNR) is a quality metric that assigns different weights to the perceptually different image regions, based on the noise visibility function (NVF). For flat regions, the NVF value is close to 1, whereas for edge or textured regions, it is closer to 0.

PSNR & wPSNR

NHD w : the original watermark Normalized Hamming Distance (NHD) w hat : extracted fragile watermark Nw : the length of the watermark

Percentage of Error Bits in Extracted Watermarks

(a) Ultrasound image with a blurred region. (b) Tampering detection through the difference image of the 1st decomposition level reference watermark. method has been tested on other medical imaging modalities namely MRA, CT, MRI, and PET, and the results were also satisfactory

Conclusions Digital watermarking has the potential to provide complementary and alternative solutions in a range of issues of critical importance to health informatics. The experimental results demonstrate the efficiency of the scheme, which could be extended and integrated into healthcare information systems. Future work involves integration of the watermarking scheme with JPEG2000 compression.