Skip to main content

Tamper Localization and Lossless Recovery Watermarking Scheme

  • Conference paper
Book cover Software Engineering and Computer Systems (ICSECS 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 179))

Included in the following conference series:

Abstract

Tamper localization and recovery watermarking scheme can be used to protect the integrity and authenticity of medical images. In this paper, a simple tamper localization and recovery scheme that uses lossless compression was proposed. Lossy compression may also be applied when necessary. The watermarked image has the PSNR of 47.4 dB and the results show that tampering was successfully localized and tampered area was exactly recovered.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cao, F., Huang, H.K., Zhou, X.Q.: Medical Image Security in a HIPAA Mandated PACS environment. Computerized Med. Imaging and Graphics. 27, 185–196 (2003)

    Article  Google Scholar 

  2. Wakatani, A.: Digital Watermarking for ROI Medical Images by Using Compressed Signature Image. In: 35th Annual Hawaii International Conference on System Sciences (HICSS-35 2002), pp. 2043–2048. IEEE Press, New York (2002)

    Google Scholar 

  3. Wu, J.H.K., Chang, R.-F., Chen, C.-J., Wang, C.-L., Kuo, T.-H., Moon, W.K., Che, D.-R.: Tamper Detection And Recovery for Medical Images Using Near-Lossless Information Hiding Technique. J. of Digit. Imaging 21(1), 59–76 (2008)

    Article  Google Scholar 

  4. Jasni, M., Zain, A.R.M.: Medical Image Watermarking with Tamper Detection and Recovery. In: 28th Annual International Conference of the IEEE EMBS, pp. 3270–3273. IEEE Press, New York (2006)

    Google Scholar 

  5. Liu, T., Qiu, Z.-d.: The Survey of Digital Watermarking-Based Image Authentication Techniques. In: 6th International Conference on Signal Processing, pp. 1556–1559. IEEE Press, New York (2002)

    Google Scholar 

  6. Chiang, K., Chang, K., Chang, R., Yen, H.: Tamper Detection and Restoring System for Medical Images Using Wavelet-Based Reversible Data Embedding. J. of Digit. Imaging 21(1), 77–90 (2008)

    Article  Google Scholar 

  7. Osamah, M., Khoo, B.E.: Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images. J. of Digit. Imaging 24(1), 114–125 (2011)

    Article  Google Scholar 

  8. Weng, Shaowei, Zhao, Pan, Y., Jeng-Shyang, Ni, R.: A Novel High-Capacity Reversible Watermarking Scheme. In: IEEE International Conference on Multimedia and Expo., pp. 631–634. IEEE Press, New York (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liew, SC., Mohd. Zain, J. (2011). Tamper Localization and Lossless Recovery Watermarking Scheme. In: Mohamad Zain, J., Wan Mohd, W.M.b., El-Qawasmeh, E. (eds) Software Engineering and Computer Systems. ICSECS 2011. Communications in Computer and Information Science, vol 179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22170-5_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22170-5_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22169-9

  • Online ISBN: 978-3-642-22170-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics