z-logo
open-access-imgOpen Access
Inversion attack resilient zero‐watermarking scheme for medical image authentication
Author(s) -
Vellaisamy Seenivasagam,
Ramesh Velumani
Publication year - 2014
Publication title -
iet image processing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.401
H-Index - 45
eISSN - 1751-9667
pISSN - 1751-9659
DOI - 10.1049/iet-ipr.2013.0558
Subject(s) - digital watermarking , contourlet , computer science , robustness (evolution) , inversion (geology) , fidelity , computer vision , artificial intelligence , computer security , image (mathematics) , bitwise operation , watermark , paleontology , telecommunications , biochemistry , chemistry , wavelet transform , structural basin , biology , wavelet , gene , programming language
Medical images are watermarked with patient data to enforce patient authentication and identification in radiology practices. In addition to common threats such as signal processing and geometric attacks, medical image watermarking systems are susceptible to a new class of threats called ‘inversion attack’, leading to ambiguities in establishing rightful ownership. This study presents an ‘inversion attack’ resilient zero‐watermarking system, in the hybrid Contourlet transform – singular value decomposition domain for medical image authentication. This scheme preserves the fidelity of the host image without introducing any artefacts and employs triangular number generating function and Hu's image invariants to confront ‘inversion attacks’. The performance of the system is evaluated with medical images of different modalities and a quick response code watermark that contains patient data. The experimental results demonstrate the robustness of the system against ‘ambiguity attacks’ and signify its appropriateness for secured medical image exchange between remote radiologists.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here