Effectual Reversible Watermarking Method for Hide the Patient Details in Brain Tumor Image
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32804
Effectual Reversible Watermarking Method for Hide the Patient Details in Brain Tumor Image

Authors: K. Amudha, C. Nelson Kennedy Babu, S. Balu

Abstract:

The security of the medical images and its related data is the major research area which is to be concentrated in today’s era. Security in the medical image indicates that the physician may hide patients’ related data in the medical image and transfer it safely to a defined location using reversible watermarking. Many reversible watermarking methods had proposed over the decade. This paper enhances the security level in brain tumor images to hide the patient’s detail, which has to be conferred with other physician’s suggestions. The details or the information will be hidden in Non-ROI area of the image by using the block cipher algorithm. The block cipher uses different keys to extract the details that are difficult for the intruder to detect all the keys and to spot the details, which are the key advantage of this method. The ROI is the tumor area and Non-ROI is the area rest of ROI. The Non-ROI should not be spoiled in any cause and the details in the Non-ROI should be extracted correctly. The reversible watermarking method proposed in this paper performs well when compared to existing methods in the process of extraction of an original image and providing information security.

Keywords: Brain tumor images, Block Cipher, Reversible watermarking, ROI.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1111638

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1293

References:


[1] D. Giakoumaki, S. Pavlopoulos and Koutsouris, “Multiple image watermarking applied to health information management,” in IEEE Trans. Inf. Technol. Biomed, pp. 722–732, 2006.
[2] J. Tian, “Reversible data embedding using a difference expansion,” in IEEE Trans. Circuits Syst. Video Technol, vol.13, pp.890–896, 2003.
[3] Z. Ni, Y Q. Shi, N. Ansari and W. Su, “Reversible data hiding,” in IEEE Trans. Circuits Syst. Video Technol, vol.16, pp. 354–362, 2006.
[4] H W. Tseng and C P. Hsieh, “Reversible data hiding based on image histogram modification,” in Imaging Sci. J, vol.56, pp. 271–278, 2008.
[5] C. Lin, W L. Tai and C. Chang, “Multilevel reversible data hiding based on histogram modification of difference images,” in IEEE Trans. Pattern Recogn, vol.41, pp.3582–359, 2008.
[6] H J. Kim, V. Sachnev, Y Q. Shi, J. Nam and H. G. Choo, “A novel difference expansion transform for reversible data embedding,” in IEEE Transactions on Information Forensics and Security, vol.3, pp. 456–465, 2008.
[7] D. Bouslimi, and C. Roux, “A joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echo graphic images,” in Compute Methods Programs Biomed, pp 47-54, 2012.
[8] S Boucherkha and M Benmohamed, “A lossless watermarking based authentication system for medical images,” in international journal of signal process, pp 278-81, 2004.
[9] W Pan, G Coatrieux, N Cuppens, F Cuppens and C Roux, “Reversible watermarking based on invariant image classification and dynamical error histogram shifting,” in Engineering in medicine and biology society, annual international conference of the IEEE, pp. 4477–80, 2011.
[10] Javier Franco-Contreras, Mem Gouenou Coatrieux, Fréderic Cuppens, Nora Cuppens Boulahia, and Christian Roux, “Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation,” IEEE transactions on information forensics and security, Vol.9, No.3, 2014.
[11] Rekha D. Patil and A. R. Nigavekar, “Reversible Image Watermarking Using Lifting Wavelet Transform and Arithmetic Coding,” International Journal of Engineering Research & Technology, Vol. 2, Issue 2, 2013.
[12] A. Gopi Krishna and A. Mallikarjuna Prasad, “Adaptive Histogram Modification Based Reversible Data Hiding Algorithm for Color Images,” International Journal of Research in Computer and Communication Technology, Vol. 2, Issue.8, 2013.