Ваш браузер устарел.

Для того, чтобы использовать все возможности сайта, загрузите и установите один из этих браузеров.

скрыть

Article

  • Title

    Reversible watermarking scheme for medical imagery verification.

  • Authors

    Marakova І. І.
    Kuznetsova L. A.
    Yakovenko O. O.

  • Subject

    COMPUTER AND INFORMATION NETWORKS AND SYSTEMS. MANUFACTURING AUTOMATION

  • Year 2011
    Issue 2(36)
    UDC 004.93:61
    DOI
    Pages 167-174
  • Abstract

    А reversible digital watermarking (DWM) technique based on the preliminary reversible image transform is proposed. The formed image vector is encoded loss-free. Its concatenation with an identifier of the image and a confidential part of the medical code forms the WM. The medical images with WM are stored in the distributed database, and as they are imperceptible, they could be used for medical practice. Embedding capacity depends on the WM imperceptibility, if the capacity gets bigger, the imperceptibility gets worse. To find a balance between those two factors, the estimation of the parameters of preliminary reversible treatment according to the image luminance histograms is used.
     

  • Keywords
  • Viewed: 546 Dowloaded: 1
  • Download Article
  • References

    1. Маракова, И.И. Алгоритмы цифровых водяных знаков с точным восстановлением основных покрывающих сообщений // Правове, нормативне та метрологічне забезпечення систем захисту інформації в Україні: Наук.-техн. зб.— К.: НДЦ “Тезіс” НТУУ “КПІ”, 2004. — Вип. 9. — С. 45 — 53.

    2. Computer Graphics: Principles and Practice / J.D. Foley, A. van Dam, S.K. Feiner, J. Hughes. — 2nd ed. — Addison-Wesley, 1995. — 1175 p.

    3. Menezes, A.J. Handbook of Applied Cryptography / A.J. Menezes, P.C. van Oorschot, S.A. Vanstone. — 5th ed. — N.Y.: CRC Press, 1996. — 816 p. — p.

    4. Fridirich, J. Reliable detection of LSB Steganography in Grayscale and Color Images/ J. Fridirich, M.Goljan, R.Du // Magazine of IEEE Multimedia Special Issue on Security. October — November, 2001. P. 22 — 28.

    5. Шнайер, Б. Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си / Б. Шнайер. — 2-е изд. — М.: Триумф, 2002. — 816 с.

    6. Fairhurst, G. MPEG-2 [Электронный ресурс] / G. Fairhurst. — http://www.erg.abdn.ac.uk/future-net/digital-video/mpeg2.html — 01.09.2011.

    7. Ell, T.A. Quaternion involutions and anti-involutions / T.A. Ell, S.J. Sangwine // Computers & Mathematics with Applications. — 2007. — Vol. 53 (1). — P. 137 — 143.

    8. Просиз, Д. Программирование для Microsoft.NET / Д. Просиз. — М.: Русская редакция, 2003. — 704 с.

    9. Witten, I.H. Arithmetic Coding for Data Compression / I.H. Witten, R.M. Neal, J.G. Cleary // Communications of the ACM. — 1987. — June. — Vol. 30(6). — P. 520 — 540. 

    References

    1. Marakova, I.I. Algoritmy tsifrovykh vodyanykh znakov s tochnym vosstanovleniem osnovnykh pokry-vayushchikh soobshcheniy [Algorythms of digital watermarks with exact reconstruction of basic cover-ing messages] // Pravove, normatyvne ta metrolohichne zabezpechennia system zakhystu informatsii v Ukraini: Nauk.-tekhn. zb. [Legal, normative and metrologic security of information protection systems in Ukraine: Collected sci.-tech. papers] — Kyiv, 2004. — Issue 9. — PP. 45 — 53.

    2. Computer Graphics: Principles and Practice / J.D. Foley, A. van Dam, S.K. Feiner, J. Hughes. — 2nd ed. — Addison-Wesley, 1995. — 1175 p.

    3. Menezes, A.J. Handbook of Applied Cryptography / A.J. Menezes, P.C. van Oorschot, S.A. Vanstone. — 5th ed. — N.Y.: CRC Press, 1996. — 816 p.

    4. Fridirich, J. Reliable detection of LSB Steganography in Grayscale and Color Images/ J. Fridirich, M.Goljan, R.Du // Magazine of IEEE Multimedia Special Issue on Security. October — November, 2001. PP. 22 — 28.

    5. Shnayer, B. Prikladnaya Kriptografiya. Protokoly, algoritmy, iskhodnye teksty na yazyke Si [Applied Cryptography. Protocols, algorythms, original texts in C] / B. Shnayer. — 2-e izd. [2-nd edition] — Moscow, 2002. — 816 p.

    6. Fairhurst, G. MPEG-2 [Elektronnyy resurs] / G. Fairhurst. — Available at: http://www.erg.abdn.ac.uk/ future-net/digital-video/mpeg2.html — 01.09.2011.

    7. Ell, T.A. Quaternion involutions and anti-involutions / T.A. Ell, S.J. Sangwine // Computers & Mathe-matics with Applications. — 2007. — Vol. 53 (1). — PP. 137 — 143.

    8. Prosiz, D. Programmirovanie dlya Microsoft.NET [Programming for Microsoft.NET] / D. Prosiz. — Moscow, 2003. — 704 p.
    9. Witten, I.H. Arithmetic Coding for Data Compression / I.H. Witten, R.M. Neal, J.G. Cleary // Commu-nications of the ACM. — 1987. — June. — Vol. 30(6). — PP. 520 — 540.

  • Creative Commons License by Author(s)