Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30076
GPU Based High Speed Error Protection for Watermarked Medical Image Transmission

Authors: Md Shohidul Islam, Jongmyon Kim, Ui-pil Chong

Abstract:

Medical image is an integral part of e-health care and e-diagnosis system. Medical image watermarking is widely used to protect patients’ information from malicious alteration and manipulation. The watermarked medical images are transmitted over the internet among patients, primary and referred physicians. The images are highly prone to corruption in the wireless transmission medium due to various noises, deflection, and refractions. Distortion in the received images leads to faulty watermark detection and inappropriate disease diagnosis. To address the issue, this paper utilizes error correction code (ECC) with (8, 4) Hamming code in an existing watermarking system. In addition, we implement the high complex ECC on a graphics processing units (GPU) to accelerate and support real-time requirement. Experimental results show that GPU achieves considerable speedup over the sequential CPU implementation, while maintaining 100% ECC efficiency.

Keywords: Medical Image Watermarking (MIW), e-health system, error correction, Hamming code, GPU.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1091358

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1389

References:


[1] N. A. Memon, S. A. M. Gilani, S. Qayoom, "Multiple Watermarking of Medical Images for Content Authentication and Recovery," IEEE 13th International Multitopic Conference, 2009, pp.1-6, Dec. 14-15, 2009.
[2] A. Al-Gindy, "A Fragile Invertible Watermarking Technique for the Authentication of Medical Images," 2010 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp.191-195, Dec. 15-18, 2010.
[3] G. Coatrieux, Hui Huang, Huazhong Shu, Limin Luo, C. Roux, "A Watermarking-Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization," IEEE Journal of Biomedical and Health Informatics, vol.17, no.6, pp.1057-1067, Nov. 2013.
[4] K. Pushpala, R. Nigudkar, "A Novel Watermarking Technique for Medical Image Authentication," IEEE International Conference on Computers in Cardiology, pp.683-686, Sep. 25-28, 2005.
[5] B. W. R. Agung, Adiwijaya, F. P. Permana, "Medical Image Watermarking with Tamper Detection and Recovery Using Reversible Watermarking with LSB Modification and Run Length Encoding (RLE) Compression," 2012 IEEE International Conference on Communication, Networks and Satellite (ComNetSat), pp.167-171, Jul. 12-14, 2012.
[6] Adiwijaya, P. N. Faoziyah, F. P. Permana, T. A. B. Wirayuda, U. N. Wisesty, "Tamper Detection and Recovery of Medical Image Watermarking Using Modified LSB and Huffman Compression," 2013 Second International Conference onInformatics and Applications (ICIA), pp.129-132, Sep. 23-25 , 2013.
[7] Jingbing Li, Yaoli Liu, Wencai Du, Yen-Wei Chen, "The Medical Image Watermarking Algorithm Based On DFT and Logistic Map," 2012 7th International Conference on Computing and Convergence Technology (ICCCT), pp.1-6, Dec.3-5, 2012.
[8] G. Coatrieux, Hui Huang, Huazhong Shu, Limin Luo, C. Roux, "A Watermarking-Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization," IEEE Journal of Biomedical and Health Informatics, vol.17, no.6, pp.1057-1067, Nov. 2013.
[9] J. Sanders, and E. Kandrot. (2010, Jul. 29). CUDA by Example: An Introduction to General-Purpose GPU Programming. (1st edition). (Online). Available: http://www.amazon.com/CUDA-Example- Introduction-General-Purpose-Programming/dp/0131387685
[10] D. B. Kirk and W. W. Hwu. (2012, Dec. 28). Programming Massively Parallel Processors: A Hands-on Approach. (2ndedition). (Online). Available: http://www.amazon.com/Programming-Massively-Parallel- Processors-Edition/dp/0124159923/ref=dp_ob_title_bk
[11] R. W. Hamming, "Error Detecting and Error Correcting Codes,” The Bell System Technical Journal, vol. 26, no. 2, pp. 147–160, 1950.
[12] R.Ma, S. Cheng, "The Universality of Generalized Hamming Code for Multiple Sources," IEEE Transactions on Communications, vol.59, no.10, pp.2641-2647, Oct. 2011 .
[13] http://docs.nvidia.com/cuda/cuda-c-programming-guide/
[14] Y. Liu, L. Guo, J. Li, M. Ren, and K. Li, "Parallel Algorithms for Approximate String Matching with k Mismatches on CUDA," in Proc. 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), pp. 2414-2422, May 2012.
[15] http://docs.nvidia.com/cuda/cuda-c-programming-guide/