Skip to main content
Erschienen in: Journal of Digital Imaging 2/2013

01.04.2013

A Review of Medical Image Watermarking Requirements for Teleradiology

verfasst von: Hussain Nyeem, Wageeh Boles, Colin Boyd

Erschienen in: Journal of Imaging Informatics in Medicine | Ausgabe 2/2013

Einloggen, um Zugang zu erhalten

Abstract

Teleradiology allows medical images to be transmitted over electronic networks for clinical interpretation and for improved healthcare access, delivery, and standards. Although such remote transmission of the images is raising various new and complex legal and ethical issues, including image retention and fraud, privacy, malpractice liability, etc., considerations of the security measures used in teleradiology remain unchanged. Addressing this problem naturally warrants investigations on the security measures for their relative functional limitations and for the scope of considering them further. In this paper, starting with various security and privacy standards, the security requirements of medical images as well as expected threats in teleradiology are reviewed. This will make it possible to determine the limitations of the conventional measures used against the expected threats. Furthermore, we thoroughly study the utilization of digital watermarking for teleradiology. Following the key attributes and roles of various watermarking parameters, justification for watermarking over conventional security measures is made in terms of their various objectives, properties, and requirements. We also outline the main objectives of medical image watermarking for teleradiology and provide recommendations on suitable watermarking techniques and their characterization. Finally, concluding remarks and directions for future research are presented.
Literatur
1.
Zurück zum Zitat Hyung-Kyo L, Hee-Jung K, Ki-Ryong K, Jong-Keuk L: Digital watermarking of medical image using ROI information. In: Enterprise networking and computing in healthcare industry, 2005. HEALTHCOM 2005. Proceedings of 7th International Workshop on, 2005, pp. 404–407 Hyung-Kyo L, Hee-Jung K, Ki-Ryong K, Jong-Keuk L: Digital watermarking of medical image using ROI information. In: Enterprise networking and computing in healthcare industry, 2005. HEALTHCOM 2005. Proceedings of 7th International Workshop on, 2005, pp. 404–407
3.
Zurück zum Zitat Ruotsalainen P: Privacy and security in teleradiology. European Journal of Radiology 73:31–35, 2010PubMedCrossRef Ruotsalainen P: Privacy and security in teleradiology. European Journal of Radiology 73:31–35, 2010PubMedCrossRef
4.
Zurück zum Zitat Prior F, Ingeholm ML, Levine BA, Tarbox L: Potential impact of HITECH security regulations on medical imaging. In: 2009 31st Annual International Conference of the IEEE Engineering in Medicine and Biology Society. EMBC 2009, 3–6 Sept. 2009, Piscataway, NJ, USA, 2009, pp. 2157–60 Prior F, Ingeholm ML, Levine BA, Tarbox L: Potential impact of HITECH security regulations on medical imaging. In: 2009 31st Annual International Conference of the IEEE Engineering in Medicine and Biology Society. EMBC 2009, 3–6 Sept. 2009, Piscataway, NJ, USA, 2009, pp. 2157–60
5.
Zurück zum Zitat Kobayashi LOM, Furuie SS: Proposal for DICOM multiframe medical image integrity and authenticity. Journal of Digital Imaging 22:71–83, 2009PubMedCrossRef Kobayashi LOM, Furuie SS: Proposal for DICOM multiframe medical image integrity and authenticity. Journal of Digital Imaging 22:71–83, 2009PubMedCrossRef
6.
Zurück zum Zitat Cao F, Huang HK, Zhou XQ: Medical image security in a HIPAA mandated PACS environment. Computerized Medical Imaging and Graphics 27:185–196, 2003PubMedCrossRef Cao F, Huang HK, Zhou XQ: Medical image security in a HIPAA mandated PACS environment. Computerized Medical Imaging and Graphics 27:185–196, 2003PubMedCrossRef
7.
Zurück zum Zitat Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R: Relevance of watermarking in medical imaging. In: Information Technology Applications in Biomedicine, 2000. Proceedings. 2000 IEEE EMBS International Conference on, 2000, pp. 250–255 Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R: Relevance of watermarking in medical imaging. In: Information Technology Applications in Biomedicine, 2000. Proceedings. 2000 IEEE EMBS International Conference on, 2000, pp. 250–255
8.
Zurück zum Zitat Tan C, Ng J, Xu X, Poh C, Guan Y, Sheah K: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. Journal of Digital Imaging 24:528–540, 2011PubMedCrossRef Tan C, Ng J, Xu X, Poh C, Guan Y, Sheah K: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. Journal of Digital Imaging 24:528–540, 2011PubMedCrossRef
9.
Zurück zum Zitat Memon NA, Chaudhry A, Ahmad M, Keerio ZA: Hybrid watermarking of medical images for ROI authentication and recovery. International Journal of Computer Mathematics 88:2057–2071, 2011CrossRef Memon NA, Chaudhry A, Ahmad M, Keerio ZA: Hybrid watermarking of medical images for ROI authentication and recovery. International Journal of Computer Mathematics 88:2057–2071, 2011CrossRef
10.
Zurück zum Zitat Lin PL, Hsieh C-K, Huang P-W: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38:2519–2529, 2005CrossRef Lin PL, Hsieh C-K, Huang P-W: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38:2519–2529, 2005CrossRef
11.
Zurück zum Zitat Chang C-C, Fan Y-H, Tai W-L: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41:654–661, 2008CrossRef Chang C-C, Fan Y-H, Tai W-L: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41:654–661, 2008CrossRef
12.
Zurück zum Zitat Al-Qershi OM, Khoo BE: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. Journal of Digital Imaging 24:114–125, 2011PubMedCrossRef Al-Qershi OM, Khoo BE: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. Journal of Digital Imaging 24:114–125, 2011PubMedCrossRef
13.
Zurück zum Zitat Memon NA, Gilani SAM, Ali A: Watermarking of chest CT scan medical images for content authentication. In: Information and Communication Technologies, 2009. ICICT '09. International Conference on, 2009, pp. 175–180 Memon NA, Gilani SAM, Ali A: Watermarking of chest CT scan medical images for content authentication. In: Information and Communication Technologies, 2009. ICICT '09. International Conference on, 2009, pp. 175–180
14.
Zurück zum Zitat Liew SC, Zain JM: Reversible medical image watermarking for tamper detection and recovery. In: Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, 2010, pp. 417–420 Liew SC, Zain JM: Reversible medical image watermarking for tamper detection and recovery. In: Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, 2010, pp. 417–420
15.
Zurück zum Zitat Kundu MK, Das S: Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding. in Pattern Recognition (ICPR), 2010 20th International Conference on, 2010, pp. 1457–1460 Kundu MK, Das S: Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding. in Pattern Recognition (ICPR), 2010 20th International Conference on, 2010, pp. 1457–1460
16.
Zurück zum Zitat Coatrieux G, Lecornu L, Sankur B, Roux C: A Review of Image Watermarking Applications in Healthcare. In: Engineering in Medicine and Biology Society, 2006. EMBS '06. 28th Annual International Conference of the IEEE, 2006, pp. 4691–4694 Coatrieux G, Lecornu L, Sankur B, Roux C: A Review of Image Watermarking Applications in Healthcare. In: Engineering in Medicine and Biology Society, 2006. EMBS '06. 28th Annual International Conference of the IEEE, 2006, pp. 4691–4694
17.
Zurück zum Zitat Cox I, Miller M, Bloom J, Fridrich J, Kalker T: Digital watermarking and steganography, 2nd edition. Elsevier, Burlington, 2007 Cox I, Miller M, Bloom J, Fridrich J, Kalker T: Digital watermarking and steganography, 2nd edition. Elsevier, Burlington, 2007
18.
Zurück zum Zitat Coatrieux G, Maitre H, Sankur B: Strict integrity control of biomedical images. In: Security and watermarking of multimedia contents III, January 22, 2001–January 25, 2001, San Jose, CA, United states, 2001, pp. 229–240 Coatrieux G, Maitre H, Sankur B: Strict integrity control of biomedical images. In: Security and watermarking of multimedia contents III, January 22, 2001–January 25, 2001, San Jose, CA, United states, 2001, pp. 229–240
26.
Zurück zum Zitat Turner JE, Bhacchu DS et al. (May 2002): Beginners guide to PACS. In: MDA Evaluation Report, ed London: PACSnet, Bence-Jones Offices, St. Georges’s Hospital Turner JE, Bhacchu DS et al. (May 2002): Beginners guide to PACS. In: MDA Evaluation Report, ed London: PACSnet, Bence-Jones Offices, St. Georges’s Hospital
27.
Zurück zum Zitat Baur HJ, Engelmann U, Saurbier F, Schroter A, Baur U, Meinzer HP: How to deal with security issues in teleradiology. Computer Methods and Programs in Biomedicine 53:1–8, 1997PubMedCrossRef Baur HJ, Engelmann U, Saurbier F, Schroter A, Baur U, Meinzer HP: How to deal with security issues in teleradiology. Computer Methods and Programs in Biomedicine 53:1–8, 1997PubMedCrossRef
28.
Zurück zum Zitat Epstein MA, Pasieka MS, Lord WP, Wong STC, Mankovich NJ: Security for the digital information age of medicine: issues, applications, and implementation. Journal of Digital Imaging 11:[d]33–44, 1998CrossRef Epstein MA, Pasieka MS, Lord WP, Wong STC, Mankovich NJ: Security for the digital information age of medicine: issues, applications, and implementation. Journal of Digital Imaging 11:[d]33–44, 1998CrossRef
31.
Zurück zum Zitat Kalker T: Issues with digital watermarking and perceptual hashing. Proc. SPIE 4518:189, 2001CrossRef Kalker T: Issues with digital watermarking and perceptual hashing. Proc. SPIE 4518:189, 2001CrossRef
32.
Zurück zum Zitat Paar C, Pelzl J: Hash functions: understanding cryptography. ed: Springer Berlin Heidelberg, 2010, pp. 293–317 Paar C, Pelzl J: Hash functions: understanding cryptography. ed: Springer Berlin Heidelberg, 2010, pp. 293–317
33.
Zurück zum Zitat Zhou XQ, Huang HK, Lou SL: Secure method for sectional image archiving and transmission. In: Medical imaging 2000: PACS Design and Evaluation: Engineering and Clinical Issues, 15–17 Feb. 2000, USA, 2000, pp. 390–9 Zhou XQ, Huang HK, Lou SL: Secure method for sectional image archiving and transmission. In: Medical imaging 2000: PACS Design and Evaluation: Engineering and Clinical Issues, 15–17 Feb. 2000, USA, 2000, pp. 390–9
35.
Zurück zum Zitat Canavan JE: Chapter 12: firewalls. In: Fundamentals of network security, ed Boston, London: Library of Congress Cataloging-in-Publication Data, Artech House Canavan JE: Chapter 12: firewalls. In: Fundamentals of network security, ed Boston, London: Library of Congress Cataloging-in-Publication Data, Artech House
36.
Zurück zum Zitat Canavan, J. E. Chapter 11: virtual private networks. In: Fundamentals of network security, ed Boston, London: Library of Congress Cataloging-in-Publication Data, Artech House. Canavan, J. E. Chapter 11: virtual private networks. In: Fundamentals of network security, ed Boston, London: Library of Congress Cataloging-in-Publication Data, Artech House.
37.
Zurück zum Zitat Stine K, Dang Q: Encryption Basics. Journal of AHIMA 82:44–47, 2011PubMed Stine K, Dang Q: Encryption Basics. Journal of AHIMA 82:44–47, 2011PubMed
39.
Zurück zum Zitat Canavan JE: Chapter 3: encryption, digital signatures, and certification authorities. In: Fundamentals of network security, ed Boston, London: Library of Congress Cataloging-in-Publication Data, Artech House Canavan JE: Chapter 3: encryption, digital signatures, and certification authorities. In: Fundamentals of network security, ed Boston, London: Library of Congress Cataloging-in-Publication Data, Artech House
41.
Zurück zum Zitat Wong MLD, Goh AWT, Chua HS: Medical image authentication using DPT watermarking: a preliminary attempt. Forensics in Telecommunications, Information and Multimedia 8:42–53, 2009CrossRef Wong MLD, Goh AWT, Chua HS: Medical image authentication using DPT watermarking: a preliminary attempt. Forensics in Telecommunications, Information and Multimedia 8:42–53, 2009CrossRef
46.
Zurück zum Zitat Voloshynovskiy S, Koval O, Beekhof F, Pun T: Conception and limits of robust perceptual hashing: towards side information assisted hash functions. In: Media forensics and security, January 19, 2009–January 21, 2009, San Jose, CA, United states, 2009, p. The Society for Imaging Science and Technology (IS and T); The International Society for Optical Engineering (SPIE) Voloshynovskiy S, Koval O, Beekhof F, Pun T: Conception and limits of robust perceptual hashing: towards side information assisted hash functions. In: Media forensics and security, January 19, 2009–January 21, 2009, San Jose, CA, United states, 2009, p. The Society for Imaging Science and Technology (IS and T); The International Society for Optical Engineering (SPIE)
49.
Zurück zum Zitat Liew SC, Zain JM: Experiment of tamper detection and recovery watermarking in PACS. In: Computer Research and Development, 2010 Second International Conference on, 2010, pp. 387–390 Liew SC, Zain JM: Experiment of tamper detection and recovery watermarking in PACS. In: Computer Research and Development, 2010 Second International Conference on, 2010, pp. 387–390
50.
Zurück zum Zitat Que D, Wen X, Chen B: PACS model based on digital watermarking and its core algorithms. In: MIPPR 2009-Medical Imaging, Parallel Processing of Images, and Optimization Techniques: 6th International Symposium on Multispectral Image Processing and Pattern Recognition, October 30, 2009–November 1, 2009, Yichang, China, 2009, pp. Natl. Lab. Multi-spectral Inf. Process. Technol.; Huazhong University of Science and Technology; National Natural Science Foundation of China; China Three Gorges University Que D, Wen X, Chen B: PACS model based on digital watermarking and its core algorithms. In: MIPPR 2009-Medical Imaging, Parallel Processing of Images, and Optimization Techniques: 6th International Symposium on Multispectral Image Processing and Pattern Recognition, October 30, 2009–November 1, 2009, Yichang, China, 2009, pp. Natl. Lab. Multi-spectral Inf. Process. Technol.; Huazhong University of Science and Technology; National Natural Science Foundation of China; China Three Gorges University
51.
Zurück zum Zitat Li Q, Memon N: Security models of digital watermarking. In: Sebe N, Liu Y, Zhuang Y, Huang T Eds. Multimedia content analysis and mining. vol. 4577, ed: Springer Berlin/Heidelberg, 2007, pp. 60–64 Li Q, Memon N: Security models of digital watermarking. In: Sebe N, Liu Y, Zhuang Y, Huang T Eds. Multimedia content analysis and mining. vol. 4577, ed: Springer Berlin/Heidelberg, 2007, pp. 60–64
52.
Zurück zum Zitat Lim SJ, Moon H-M, Chae S-H, Chung Y, Pan SB: JPEG 2000 and digital watermarking technique using in medical image. In 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009, July 8, 2009 - July 10, 2009, Shanghai, China, 2009, pp. 413–416 Lim SJ, Moon H-M, Chae S-H, Chung Y, Pan SB: JPEG 2000 and digital watermarking technique using in medical image. In 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009, July 8, 2009 - July 10, 2009, Shanghai, China, 2009, pp. 413–416
53.
Zurück zum Zitat Das S, Kundu M: Effective management of medical information through a novel blind watermarking technique. Journal of Medical Systems, pp. 1–13 Das S, Kundu M: Effective management of medical information through a novel blind watermarking technique. Journal of Medical Systems, pp. 1–13
54.
Zurück zum Zitat Navas KA, Sasikumar M: Survey of medical image watermarking algorithms. Presented at the 4rth International Conference: Sciences of Electronic, Technologies of Information and Telecommunications (SETIT), TUNISIA, 2007 Navas KA, Sasikumar M: Survey of medical image watermarking algorithms. Presented at the 4rth International Conference: Sciences of Electronic, Technologies of Information and Telecommunications (SETIT), TUNISIA, 2007
55.
Zurück zum Zitat Chao H-M, Hsu C-M, Miaou S-G: A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Transactions on Information Technology in Biomedicine 6:46–53, 2002PubMedCrossRef Chao H-M, Hsu C-M, Miaou S-G: A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Transactions on Information Technology in Biomedicine 6:46–53, 2002PubMedCrossRef
56.
Zurück zum Zitat Fallahpour M, Megias D, Ghanbari M: High capacity, reversible data hiding in medical images. In: Image processing (ICIP), 2009 16th IEEE International Conference on, 2009, pp. 4241–4244 Fallahpour M, Megias D, Ghanbari M: High capacity, reversible data hiding in medical images. In: Image processing (ICIP), 2009 16th IEEE International Conference on, 2009, pp. 4241–4244
57.
Zurück zum Zitat Ulutas M, Ulutas G, Nabiyev VV: Medical image security and EPR hiding using Shamir’s secret sharing scheme. Journal of Systems and Software, vol. (in press), Corrected Proof, 2012 Ulutas M, Ulutas G, Nabiyev VV: Medical image security and EPR hiding using Shamir’s secret sharing scheme. Journal of Systems and Software, vol. (in press), Corrected Proof, 2012
58.
Zurück zum Zitat Luo H, Yu F-X, Chen H, Huang Z-L, Li H, Wang P-H: Reversible data hiding based on block median preservation. Information Sciences 181:308–328, 2011CrossRef Luo H, Yu F-X, Chen H, Huang Z-L, Li H, Wang P-H: Reversible data hiding based on block median preservation. Information Sciences 181:308–328, 2011CrossRef
59.
Zurück zum Zitat Wu JHK, Chang R-F, Chen C-J, Wang C-L, Kuo T-H, Moon WK, Chen D-R: Tamper detection and recovery for medical images using near-lossless information hiding technique. Journal of Digital Imaging 21:59–76, 2008PubMedCrossRef Wu JHK, Chang R-F, Chen C-J, Wang C-L, Kuo T-H, Moon WK, Chen D-R: Tamper detection and recovery for medical images using near-lossless information hiding technique. Journal of Digital Imaging 21:59–76, 2008PubMedCrossRef
60.
Zurück zum Zitat Jianguo Z, Jianyong S, Yuanyuan Y, Chenwen L, Yihong Y, Jin J, Weihua C, Kun S, Guozhen Z: Image-based electronic patient records for secured collaborative medical applications. In: 2005 27th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 31 Aug.-3 Sept. 2005, Piscataway, NJ, USA, 2006, p. 3pp Jianguo Z, Jianyong S, Yuanyuan Y, Chenwen L, Yihong Y, Jin J, Weihua C, Kun S, Guozhen Z: Image-based electronic patient records for secured collaborative medical applications. In: 2005 27th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 31 Aug.-3 Sept. 2005, Piscataway, NJ, USA, 2006, p. 3pp
61.
Zurück zum Zitat Münch H, Engelmann U, Schröter A, Meinzer HP: The integration of medical images with the electronic patient record and their web-based distribution1. Academic Radiology 11:661–668, 2004PubMedCrossRef Münch H, Engelmann U, Schröter A, Meinzer HP: The integration of medical images with the electronic patient record and their web-based distribution1. Academic Radiology 11:661–668, 2004PubMedCrossRef
62.
Zurück zum Zitat Cheung S-C, Chiu DKW, Ho C: The use of digital watermarking for intelligence multimedia document distribution. Journal of Theoretical and Applied Electronic Commerce Research 3:103–118, 2008CrossRef Cheung S-C, Chiu DKW, Ho C: The use of digital watermarking for intelligence multimedia document distribution. Journal of Theoretical and Applied Electronic Commerce Research 3:103–118, 2008CrossRef
63.
Zurück zum Zitat Zhou W, Rockwood T, Sagetong P: Non-repudiation oblivious watermarking schema for secure digital video distribution. In: Multimedia Signal Processing, 2002 IEEE Workshop on, 2002, pp. 343–346 Zhou W, Rockwood T, Sagetong P: Non-repudiation oblivious watermarking schema for secure digital video distribution. In: Multimedia Signal Processing, 2002 IEEE Workshop on, 2002, pp. 343–346
64.
Zurück zum Zitat Fridrich J: Applications of data hiding in digital images. In: Proceedings of Fifth International Symposium on Signal Processing and its Applications, 22–25 Aug. 1999, Brisbane, Qld., Australia, 1999, p. 9 vol.1 Fridrich J: Applications of data hiding in digital images. In: Proceedings of Fifth International Symposium on Signal Processing and its Applications, 22–25 Aug. 1999, Brisbane, Qld., Australia, 1999, p. 9 vol.1
65.
Zurück zum Zitat Navas KA, Archana Thampy S, Sasikumar M: EPR hiding in medical images for telemedicine. In: Proceedings of World Academy of Science and Engineering and Technology, 2008 Navas KA, Archana Thampy S, Sasikumar M: EPR hiding in medical images for telemedicine. In: Proceedings of World Academy of Science and Engineering and Technology, 2008
66.
Zurück zum Zitat Nyeem H, Boles W, Boyd C: Developing a digital image watermarking model. In: Digital Image Computing Techniques and Applications (DICTA), 2011 International Conference on, Noosa, Queensland, Australia, 2011, pp. 468–473 Nyeem H, Boles W, Boyd C: Developing a digital image watermarking model. In: Digital Image Computing Techniques and Applications (DICTA), 2011 International Conference on, Noosa, Queensland, Australia, 2011, pp. 468–473
67.
Zurück zum Zitat Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T: Models of watermarking. In: Digital watermarking and steganography (second edition), ed Burlington: Morgan Kaufmann, 2008, pp. 61–103 Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T: Models of watermarking. In: Digital watermarking and steganography (second edition), ed Burlington: Morgan Kaufmann, 2008, pp. 61–103
68.
Zurück zum Zitat Deng C, Gao X, Li X, Tao D: A local Tchebichef moments-based robust image watermarking. Signal Processing 89:1531–1539, 2009CrossRef Deng C, Gao X, Li X, Tao D: A local Tchebichef moments-based robust image watermarking. Signal Processing 89:1531–1539, 2009CrossRef
69.
Zurück zum Zitat Ganic E, Eskicioglu AM: Robust DWT-SVD domain image watermarking: embedding data in all frequencies. presented at the Proceedings of the 2004 workshop on Multimedia and security, Magdeburg, Germany, 2004 Ganic E, Eskicioglu AM: Robust DWT-SVD domain image watermarking: embedding data in all frequencies. presented at the Proceedings of the 2004 workshop on Multimedia and security, Magdeburg, Germany, 2004
70.
Zurück zum Zitat Liu J-L, Lou D-C, Chang M-C, Tso H-K: A robust watermarking scheme using self-reference image. Computer Standards & Interfaces 28:356–367, 2006CrossRef Liu J-L, Lou D-C, Chang M-C, Tso H-K: A robust watermarking scheme using self-reference image. Computer Standards & Interfaces 28:356–367, 2006CrossRef
71.
Zurück zum Zitat Nikolaidis N, Pitas I: Robust image watermarking in the spatial domain. Signal Processing 66:385–403, 1998CrossRef Nikolaidis N, Pitas I: Robust image watermarking in the spatial domain. Signal Processing 66:385–403, 1998CrossRef
72.
Zurück zum Zitat Pan W, Coatrieux G, Cuppens N, Cuppens F, Roux C: An additive and lossless watermarking method based on invariant image approximation and Haar wavelet transform. In: 2010 32nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2010), 31 Aug.-4 Sept. 2010, Piscataway, NJ, USA, 2010, pp. 4740–3 Pan W, Coatrieux G, Cuppens N, Cuppens F, Roux C: An additive and lossless watermarking method based on invariant image approximation and Haar wavelet transform. In: 2010 32nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2010), 31 Aug.-4 Sept. 2010, Piscataway, NJ, USA, 2010, pp. 4740–3
73.
Zurück zum Zitat Qi X, Qi J: A robust content-based digital image watermarking scheme. Signal Processing 87:1264–1280, 2007CrossRef Qi X, Qi J: A robust content-based digital image watermarking scheme. Signal Processing 87:1264–1280, 2007CrossRef
74.
Zurück zum Zitat Rey C, Dugelay JL: Blind detection of malicious alterations on still images using robust watermarks. In: Secure Images and Image Authentication (Ref. No. 2000/039), IEE Seminar on, 2000, pp. 7/1–7/6 Rey C, Dugelay JL: Blind detection of malicious alterations on still images using robust watermarks. In: Secure Images and Image Authentication (Ref. No. 2000/039), IEE Seminar on, 2000, pp. 7/1–7/6
75.
Zurück zum Zitat Simitopoulos D, Koutsonanos DE, Strintzis MG: Robust image watermarking based on generalized radon transformations. Circuits and Systems for Video Technology, IEEE Transactions on 13:732–745, 2003CrossRef Simitopoulos D, Koutsonanos DE, Strintzis MG: Robust image watermarking based on generalized radon transformations. Circuits and Systems for Video Technology, IEEE Transactions on 13:732–745, 2003CrossRef
76.
Zurück zum Zitat Wong PW, Memon N: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10:1593–1601, 2001PubMedCrossRef Wong PW, Memon N: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10:1593–1601, 2001PubMedCrossRef
77.
Zurück zum Zitat Badran EF, Sharkas MA, Attallah OA: Multiple watermark embedding scheme in wavelet-spatial domains based on ROI of medical images. In: 2009 National Radio Science Conference, NRSC 2009, March 17, 2009 - March 19, 2009, New Cairo, Egypt, 2009 Badran EF, Sharkas MA, Attallah OA: Multiple watermark embedding scheme in wavelet-spatial domains based on ROI of medical images. In: 2009 National Radio Science Conference, NRSC 2009, March 17, 2009 - March 19, 2009, New Cairo, Egypt, 2009
78.
Zurück zum Zitat Guo X, Zhuang T-G: A region-based lossless watermarking scheme for enhancing security of medical data. Journal of Digital Imaging 22:53–64, 2009PubMedCrossRef Guo X, Zhuang T-G: A region-based lossless watermarking scheme for enhancing security of medical data. Journal of Digital Imaging 22:53–64, 2009PubMedCrossRef
79.
Zurück zum Zitat Shih FY, Wu Y-T: Robust watermarking and compression for medical images based on genetic algorithms. Information Sciences 175:200–216, 2005CrossRef Shih FY, Wu Y-T: Robust watermarking and compression for medical images based on genetic algorithms. Information Sciences 175:200–216, 2005CrossRef
80.
Zurück zum Zitat Nyeem H, Boles W, Boyd C: On the robustness and security of digital image watermarking. In: IEEE/IAPR International Conference on Informatics, Electronics & Vision (ICIEV) 2012 (accepted) Nyeem H, Boles W, Boyd C: On the robustness and security of digital image watermarking. In: IEEE/IAPR International Conference on Informatics, Electronics & Vision (ICIEV) 2012 (accepted)
81.
Zurück zum Zitat Tefas A, Nikolaidis N, Pitas I: Chapter 22—image watermarking: techniques and applications. In: Al B Ed. The Essential Guide to Image Processing, Secondth edition. Academic, Boston, 2009, pp 597–648CrossRef Tefas A, Nikolaidis N, Pitas I: Chapter 22—image watermarking: techniques and applications. In: Al B Ed. The Essential Guide to Image Processing, Secondth edition. Academic, Boston, 2009, pp 597–648CrossRef
82.
Zurück zum Zitat Nezhadarya E, Wang ZJ, Ward RK: Robust image watermarking based on multiscale gradient direction quantization. IEEE Transactions on Information Forensics and Security 6:1200–1213, 2011CrossRef Nezhadarya E, Wang ZJ, Ward RK: Robust image watermarking based on multiscale gradient direction quantization. IEEE Transactions on Information Forensics and Security 6:1200–1213, 2011CrossRef
83.
Zurück zum Zitat Lie WN, Chang LC: Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification. IEEE Transactions on Multimedia 8:46–59, 2006CrossRef Lie WN, Chang LC: Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification. IEEE Transactions on Multimedia 8:46–59, 2006CrossRef
84.
Zurück zum Zitat Jen-Sheng T, Win-Bin H, Yau-Hwang K: On the selection of optimal feature region set for robust digital image watermarking. Image Processing, IEEE Transactions on 20:735–743, 2011CrossRef Jen-Sheng T, Win-Bin H, Yau-Hwang K: On the selection of optimal feature region set for robust digital image watermarking. Image Processing, IEEE Transactions on 20:735–743, 2011CrossRef
85.
Zurück zum Zitat Bi N, Sun Q, Huang D, Yang Z, Huang J: Robust image watermarking based on multiband wavelets and empirical mode decomposition. IEEE Transactions on Image Processing 16:1956–1966, 2007PubMedCrossRef Bi N, Sun Q, Huang D, Yang Z, Huang J: Robust image watermarking based on multiband wavelets and empirical mode decomposition. IEEE Transactions on Image Processing 16:1956–1966, 2007PubMedCrossRef
86.
Zurück zum Zitat Agarwal P, Prabhakaran B: Robust blind watermarking of point-sampled geometry. Information Forensics and Security, IEEE Transactions on 4:36–48, 2009CrossRef Agarwal P, Prabhakaran B: Robust blind watermarking of point-sampled geometry. Information Forensics and Security, IEEE Transactions on 4:36–48, 2009CrossRef
87.
Zurück zum Zitat Shan H, Kirovski D, Min W: High-fidelity data embedding for image annotation. Image Processing, IEEE Transactions on 18:429–435, 2009CrossRef Shan H, Kirovski D, Min W: High-fidelity data embedding for image annotation. Image Processing, IEEE Transactions on 18:429–435, 2009CrossRef
88.
Zurück zum Zitat Hasan YMY, Hassan AM: Tamper detection with self-correction hybrid spatial-DCT domains image authentication technique. In: 2007 IEEE International Symposium on Signal Processing and Information Technology, 15–18 Dec. 2007, Piscataway, NJ, USA, 2007, pp. 369–74 Hasan YMY, Hassan AM: Tamper detection with self-correction hybrid spatial-DCT domains image authentication technique. In: 2007 IEEE International Symposium on Signal Processing and Information Technology, 15–18 Dec. 2007, Piscataway, NJ, USA, 2007, pp. 369–74
89.
Zurück zum Zitat Lee T-Y, Lin SD: Dual watermark for image tamper detection and recovery. Pattern Recognition 41:3497–3506, 2008CrossRef Lee T-Y, Lin SD: Dual watermark for image tamper detection and recovery. Pattern Recognition 41:3497–3506, 2008CrossRef
90.
Zurück zum Zitat Zain JM, Fauzi ARM: Medical image watermarking with tamper detection and recovery. In: Engineering in Medicine and Biology Society, 2006. EMBS '06. 28th Annual International Conference of the IEEE, 2006, pp. 3270–3273 Zain JM, Fauzi ARM: Medical image watermarking with tamper detection and recovery. In: Engineering in Medicine and Biology Society, 2006. EMBS '06. 28th Annual International Conference of the IEEE, 2006, pp. 3270–3273
91.
Zurück zum Zitat Holliman M, Memon N: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 9:432–441, 2000PubMedCrossRef Holliman M, Memon N: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 9:432–441, 2000PubMedCrossRef
92.
Zurück zum Zitat Al-Qershi OM, Khoo BE: High capacity data hiding schemes for medical images based on difference expansion. Journal of Systems and Software 84:105–112, 2011CrossRef Al-Qershi OM, Khoo BE: High capacity data hiding schemes for medical images based on difference expansion. Journal of Systems and Software 84:105–112, 2011CrossRef
93.
Zurück zum Zitat Fan Z, Hongbin Z: Digital watermarking capacity and reliability. In: e-Commerce Technology, 2004. CEC 2004. Proceedings. IEEE International Conference on, 2004, pp. 295–298 Fan Z, Hongbin Z: Digital watermarking capacity and reliability. In: e-Commerce Technology, 2004. CEC 2004. Proceedings. IEEE International Conference on, 2004, pp. 295–298
94.
Zurück zum Zitat Yu N, Cao l, Fang W, Li X: Practical analysis of watermarking capacity. In: Communication Technology Proceedings, 2003. ICCT 2003. International Conference on, 2003, pp. 1872–1877 vol.2 Yu N, Cao l, Fang W, Li X: Practical analysis of watermarking capacity. In: Communication Technology Proceedings, 2003. ICCT 2003. International Conference on, 2003, pp. 1872–1877 vol.2
95.
Zurück zum Zitat Smitha B, Navas KA: Spatial domain—high capacity data hiding in ROI images. In: Signal Processing, Communications and Networking, 2007. ICSCN '07. International Conference on, 2007, pp. 528–533 Smitha B, Navas KA: Spatial domain—high capacity data hiding in ROI images. In: Signal Processing, Communications and Networking, 2007. ICSCN '07. International Conference on, 2007, pp. 528–533
96.
Zurück zum Zitat Uttridge I, Bazzana G, Gemma D, Heiler J, Giuchi M, Geyres S: Evaluation of the security of distributed IT systems through ITSEC/ITSEM: experiences and findings. In: Information systems security, ed: Chapman & Hall, Ltd., 1996, pp. 405–416 Uttridge I, Bazzana G, Gemma D, Heiler J, Giuchi M, Geyres S: Evaluation of the security of distributed IT systems through ITSEC/ITSEM: experiences and findings. In: Information systems security, ed: Chapman & Hall, Ltd., 1996, pp. 405–416
98.
Zurück zum Zitat Zain JM, Baldwin LP, Clarke M: Reversible watermarking for authentication of DICOM images. In: Conference Proceedings—26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2004, September 1, 2004 - September 5, 2004, San Francisco, CA, United states, 2004, pp. 3237–3240 Zain JM, Baldwin LP, Clarke M: Reversible watermarking for authentication of DICOM images. In: Conference Proceedings—26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2004, September 1, 2004 - September 5, 2004, San Francisco, CA, United states, 2004, pp. 3237–3240
99.
Zurück zum Zitat Coatrieux G, Montagner J, Huang H, Roux C: Mixed reversible and RONI watermarking for medical image reliability protection. In: Engineering in Medicine and Biology Society, 2007. EMBS 2007. 29th Annual International Conference of the IEEE, 2007, pp. 5653–5656 Coatrieux G, Montagner J, Huang H, Roux C: Mixed reversible and RONI watermarking for medical image reliability protection. In: Engineering in Medicine and Biology Society, 2007. EMBS 2007. 29th Annual International Conference of the IEEE, 2007, pp. 5653–5656
100.
Zurück zum Zitat Piva A, Barni M, Bartolini F, De Rosa A: Data hiding technologies for digital radiography. Vision, Image and Signal Processing, IEE Proceedings 152:604–610, 2005CrossRef Piva A, Barni M, Bartolini F, De Rosa A: Data hiding technologies for digital radiography. Vision, Image and Signal Processing, IEE Proceedings 152:604–610, 2005CrossRef
101.
Zurück zum Zitat Raul RC, Claudia FU, Trinidad-Bias GJ: Data hiding scheme for medical images. In: Electronics, Communications and Computers, 2007. CONIELECOMP '07. 17th International Conference on, 2007, pp. 32–32 Raul RC, Claudia FU, Trinidad-Bias GJ: Data hiding scheme for medical images. In: Electronics, Communications and Computers, 2007. CONIELECOMP '07. 17th International Conference on, 2007, pp. 32–32
102.
Zurück zum Zitat Zain JM, Fauzi ARM, Aziz AA: Clinical assessment of watermarked medical images. Journal of Computer Science 5:857–863, 2009CrossRef Zain JM, Fauzi ARM, Aziz AA: Clinical assessment of watermarked medical images. Journal of Computer Science 5:857–863, 2009CrossRef
103.
Zurück zum Zitat Guo X, Zhuang T-G: A lossless watermarking scheme for enhancing security of medical data in PACS. In: Medical Imaging 2003: PACS and Integrated Medical Information Systems: Design and Evaluation, February 18, 2003–February 20, 2003, San Diego, CA, United States, 2003, pp. 350–359 Guo X, Zhuang T-G: A lossless watermarking scheme for enhancing security of medical data in PACS. In: Medical Imaging 2003: PACS and Integrated Medical Information Systems: Design and Evaluation, February 18, 2003–February 20, 2003, San Diego, CA, United States, 2003, pp. 350–359
104.
Zurück zum Zitat Coatrieux G, Lamard M, Daccache W, Puentes W, Roux C: A low distortion and reversible watermark: application to angiographic images of the retina. In: Engineering in Medicine and Biology Society, 2005. IEEE-EMBS 2005. 27th Annual International Conference of the, 2005, pp. 2224–2227 Coatrieux G, Lamard M, Daccache W, Puentes W, Roux C: A low distortion and reversible watermark: application to angiographic images of the retina. In: Engineering in Medicine and Biology Society, 2005. IEEE-EMBS 2005. 27th Annual International Conference of the, 2005, pp. 2224–2227
105.
Zurück zum Zitat Giakoumaki A, Pavlopoulos S, Koutsouris D: Multiple image watermarking applied to health information management. Information Technology in Biomedicine, IEEE Transactions on 10:722–732, 2006CrossRef Giakoumaki A, Pavlopoulos S, Koutsouris D: Multiple image watermarking applied to health information management. Information Technology in Biomedicine, IEEE Transactions on 10:722–732, 2006CrossRef
106.
Zurück zum Zitat Osborne D, Abbott D, Sorell M, Rogers D: Multiple embedding using robust watermarks for wireless medical images. In: 3rd International Conference on Mobile and Ubiquitous Multimedia, MUM 2004, October 27, 2004 - October 29, 2004, College Park, MD, United States, 2004, pp. 245–250 Osborne D, Abbott D, Sorell M, Rogers D: Multiple embedding using robust watermarks for wireless medical images. In: 3rd International Conference on Mobile and Ubiquitous Multimedia, MUM 2004, October 27, 2004 - October 29, 2004, College Park, MD, United States, 2004, pp. 245–250
107.
Zurück zum Zitat Memon NA, Gilani SAM, Qayoom S: Multiple watermarking of medical images for content authentication and recovery. In: 2009 IEEE 13th International Multitopic Conference, INMIC 2009, December 14, 2009–December 15, 2009, Islamabad, Pakistan, 2009, p. Muhammad Ali Jinnah University; University of Engineering and Technology; Institute of Electrical and Electronics Engineers; Pakistan Science Foundation; Nayatel (Micronet Broadband Group of Companies) Memon NA, Gilani SAM, Qayoom S: Multiple watermarking of medical images for content authentication and recovery. In: 2009 IEEE 13th International Multitopic Conference, INMIC 2009, December 14, 2009–December 15, 2009, Islamabad, Pakistan, 2009, p. Muhammad Ali Jinnah University; University of Engineering and Technology; Institute of Electrical and Electronics Engineers; Pakistan Science Foundation; Nayatel (Micronet Broadband Group of Companies)
108.
Zurück zum Zitat Pan W, Coatrieux G, Cuppens-Boulahia N; Cuppens F, Roux C: Medical image integrity control combining digital signature and lossless watermarking. In: Data privacy management and autonomous spontaneous security. vol. 5939, J. Garcia-Alfaro, G. Navarro-Arribas, N. Cuppens-Boulahia, and Y. Roudier, Eds., ed: Springer Berlin/Heidelberg, 2010, pp. 153–162 Pan W, Coatrieux G, Cuppens-Boulahia N; Cuppens F, Roux C: Medical image integrity control combining digital signature and lossless watermarking. In: Data privacy management and autonomous spontaneous security. vol. 5939, J. Garcia-Alfaro, G. Navarro-Arribas, N. Cuppens-Boulahia, and Y. Roudier, Eds., ed: Springer Berlin/Heidelberg, 2010, pp. 153–162
109.
Zurück zum Zitat Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C: Medical image integrity control combining digital signature and lossless watermarking. In: 4th International Workshop on Data Privacy Management, DPM 2009, and 2nd International Workshop on Autonomous and Spontaneous Security, SETOP 2009, September 24, 2009 - September 25, 2009, St. Malo, France, 2010, pp. 153–162 Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C: Medical image integrity control combining digital signature and lossless watermarking. In: 4th International Workshop on Data Privacy Management, DPM 2009, and 2nd International Workshop on Autonomous and Spontaneous Security, SETOP 2009, September 24, 2009 - September 25, 2009, St. Malo, France, 2010, pp. 153–162
110.
Zurück zum Zitat Li-Qun K, Yuan Z, Xie H: A Medical image authentication system based on reversible digital watermarking. In: Information Science and Engineering (ICISE), 2009 1st International Conference on, 2009, pp. 1047–1050 Li-Qun K, Yuan Z, Xie H: A Medical image authentication system based on reversible digital watermarking. In: Information Science and Engineering (ICISE), 2009 1st International Conference on, 2009, pp. 1047–1050
111.
Zurück zum Zitat Li-Qun K, Yuan Z, Xie H: Watermarking image authentication in hospital information system. In: Information Engineering and Computer Science, 2009. ICIECS 2009. International Conference on, 2009, pp. 1–4 Li-Qun K, Yuan Z, Xie H: Watermarking image authentication in hospital information system. In: Information Engineering and Computer Science, 2009. ICIECS 2009. International Conference on, 2009, pp. 1–4
112.
Zurück zum Zitat Nambakhsh MS, Ahmadian A, Ghavami M, Dilmaghani RS, Karimi-Fard S: A novel blind watermarking of ECG signals on medical images using EZW algorithm. In: Engineering in Medicine and Biology Society, 2006. EMBS '06. 28th Annual International Conference of the IEEE, 2006, pp. 3274–3277 Nambakhsh MS, Ahmadian A, Ghavami M, Dilmaghani RS, Karimi-Fard S: A novel blind watermarking of ECG signals on medical images using EZW algorithm. In: Engineering in Medicine and Biology Society, 2006. EMBS '06. 28th Annual International Conference of the IEEE, 2006, pp. 3274–3277
113.
Zurück zum Zitat Smith JP: Authentication of digital medical images with digital signature technology. Radiology 194:771–4, 1995PubMed Smith JP: Authentication of digital medical images with digital signature technology. Radiology 194:771–4, 1995PubMed
114.
Zurück zum Zitat Viswanathan P, Venkata Krishna P: Text fusion watermarking in medical image with semi-reversible for secure transfer and authentication. In: Advances in Recent Technologies in Communication and Computing, 2009. ARTCom '09. International Conference on, 2009, pp. 585–589 Viswanathan P, Venkata Krishna P: Text fusion watermarking in medical image with semi-reversible for secure transfer and authentication. In: Advances in Recent Technologies in Communication and Computing, 2009. ARTCom '09. International Conference on, 2009, pp. 585–589
115.
Zurück zum Zitat Pushpala K, Nigudkar R: A novel watermarking technique for medical image authentication. Computers in Cardiology 2005:683–686, 2005 Pushpala K, Nigudkar R: A novel watermarking technique for medical image authentication. Computers in Cardiology 2005:683–686, 2005
116.
Zurück zum Zitat Lin C-H, Yang C-Y, Chang C-W: Authentication and protection for medical image. In: 2nd International Conference on Computational Collective Intelligence - Technologies and Applications, ICCCI 2010, November 10, 2010 - November 12, 2010, Kaohsiung, Taiwan, 2010, pp. 278–287 Lin C-H, Yang C-Y, Chang C-W: Authentication and protection for medical image. In: 2nd International Conference on Computational Collective Intelligence - Technologies and Applications, ICCCI 2010, November 10, 2010 - November 12, 2010, Kaohsiung, Taiwan, 2010, pp. 278–287
117.
Zurück zum Zitat Lim YS, Feng DD: Multiple block based authentication watermarking for distribution of medical images. In: 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, ISIMP 2004, October 20, 2004 - October 22, 2004, Hong Kong, China, Hong kong, 2004, pp. 631–634 Lim YS, Feng DD: Multiple block based authentication watermarking for distribution of medical images. In: 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, ISIMP 2004, October 20, 2004 - October 22, 2004, Hong Kong, China, Hong kong, 2004, pp. 631–634
118.
Zurück zum Zitat Fotopoulos V, Stavrinou ML, Skodras AN: Medical image authentication and self-correction through an adaptive reversible watermarking technique. In: BioInformatics and BioEngineering, 2008. BIBE 2008. 8th IEEE International Conference on, 2008, pp. 1–5 Fotopoulos V, Stavrinou ML, Skodras AN: Medical image authentication and self-correction through an adaptive reversible watermarking technique. In: BioInformatics and BioEngineering, 2008. BIBE 2008. 8th IEEE International Conference on, 2008, pp. 1–5
119.
Zurück zum Zitat Ahmed F, Moskowitz IS: A semi-reversible watermark for medical image authentication. In: Distributed Diagnosis and Home Healthcare, 2006. D2H2. 1st Transdisciplinary Conference on, 2006, pp. 59–62 Ahmed F, Moskowitz IS: A semi-reversible watermark for medical image authentication. In: Distributed Diagnosis and Home Healthcare, 2006. D2H2. 1st Transdisciplinary Conference on, 2006, pp. 59–62
120.
Zurück zum Zitat Guoxia S, Huiqiang S, Xinghua S, Shuzhong B, Ju L: Combination independent content feature with watermarking annotation for medical image retrieval. In: Innovative Computing, Information and Control, 2007. ICICIC '07. Second International Conference on, 2007, pp. 607–607 Guoxia S, Huiqiang S, Xinghua S, Shuzhong B, Ju L: Combination independent content feature with watermarking annotation for medical image retrieval. In: Innovative Computing, Information and Control, 2007. ICICIC '07. Second International Conference on, 2007, pp. 607–607
121.
Zurück zum Zitat Navas KA, Thampy A, Sasikumar M: A novel technique for EPR hiding in medical images for telemedicine. In: 4th Kuala Lumpur International Conference on Biomedical Engineering 2008, Biomed 2008, June 25, 2008–June 28, 2008, Kuala Lumpur, Malaysia, 2008, pp. 703–706 Navas KA, Thampy A, Sasikumar M: A novel technique for EPR hiding in medical images for telemedicine. In: 4th Kuala Lumpur International Conference on Biomedical Engineering 2008, Biomed 2008, June 25, 2008–June 28, 2008, Kuala Lumpur, Malaysia, 2008, pp. 703–706
122.
Zurück zum Zitat Wu M, Liu B: Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia 6:528–538, 2004CrossRef Wu M, Liu B: Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia 6:528–538, 2004CrossRef
123.
Zurück zum Zitat Huang H, Coatrieux G, Shu HZ, Luo LM, Roux C: Medical image tamper approximation based on an image moment signature. In: 2010 12th IEEE International Conference on e-Health Networking, Applications and Services (Healthcom 2010), 1–3 July 2010, Piscataway, NJ, USA, 2010, pp. 254–9 Huang H, Coatrieux G, Shu HZ, Luo LM, Roux C: Medical image tamper approximation based on an image moment signature. In: 2010 12th IEEE International Conference on e-Health Networking, Applications and Services (Healthcom 2010), 1–3 July 2010, Piscataway, NJ, USA, 2010, pp. 254–9
124.
Zurück zum Zitat Jun-Chou C, Chin-Chen C: Detection and restoration of a tampered medical image. In: Medical Imaging and Augmented Reality. Second International Workshop, MIAR 2004. Proceedings, 19–20 Aug. 2004, Berlin, Germany, 2004, pp. 78–85 Jun-Chou C, Chin-Chen C: Detection and restoration of a tampered medical image. In: Medical Imaging and Augmented Reality. Second International Workshop, MIAR 2004. Proceedings, 19–20 Aug. 2004, Berlin, Germany, 2004, pp. 78–85
125.
Zurück zum Zitat Navas KA, Nithya VS, Rakhi R, Sasikumar M: Lossless watermarking in JPEG2000 for EPR data hiding. In: 2007 IEEE International Conference on Electro/Information Technology, 17–20 May 2007, Piscataway, NJ, USA, 2007, pp. 697–702 Navas KA, Nithya VS, Rakhi R, Sasikumar M: Lossless watermarking in JPEG2000 for EPR data hiding. In: 2007 IEEE International Conference on Electro/Information Technology, 17–20 May 2007, Piscataway, NJ, USA, 2007, pp. 697–702
126.
Zurück zum Zitat Zinger S, Jin Z, Sankur B: Optimization of watermarking performances using error correcting codes and repetition. Presented at the CMS’2001: Communications and Multimedia Security, 2001 Zinger S, Jin Z, Sankur B: Optimization of watermarking performances using error correcting codes and repetition. Presented at the CMS’2001: Communications and Multimedia Security, 2001
127.
Zurück zum Zitat Nayak J, Bhat PS, Kumar MS, Rajendra Acharya U: Reliable transmission and storage of medical images with patient information using error control codes. In: IEEE INDICON 2004 - 1st India Annual Conference, December 20, 2004 - December 22, 2004, Kharagpur, India, 2004, pp. 147–150 Nayak J, Bhat PS, Kumar MS, Rajendra Acharya U: Reliable transmission and storage of medical images with patient information using error control codes. In: IEEE INDICON 2004 - 1st India Annual Conference, December 20, 2004 - December 22, 2004, Kharagpur, India, 2004, pp. 147–150
128.
Zurück zum Zitat Machkour M, Khamlichi YI, Afdel K: Data security in medical information system. In: Multimedia Computing and Systems, 2009. ICMCS '09. International Conference on, 2009, pp. 391–394 Machkour M, Khamlichi YI, Afdel K: Data security in medical information system. In: Multimedia Computing and Systems, 2009. ICMCS '09. International Conference on, 2009, pp. 391–394
129.
Zurück zum Zitat Huang H, Coatrieux G, Montagner J, Shu HZ, Luo LM, Roux C: Medical image integrity control seeking into the detail of the tampering. In: Engineering in Medicine and Biology Society, 2008. EMBS 2008. 30th Annual International Conference of the IEEE, 2008, pp. 414–417 Huang H, Coatrieux G, Montagner J, Shu HZ, Luo LM, Roux C: Medical image integrity control seeking into the detail of the tampering. In: Engineering in Medicine and Biology Society, 2008. EMBS 2008. 30th Annual International Conference of the IEEE, 2008, pp. 414–417
130.
Zurück zum Zitat Dickson KWC, Patrick CKH, Vivying SYC, Eleanna K: Protecting the Exchange of Medical Images in Healthcare Process Integration with Web Services. In: System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference, 2007, pp. 131–131 Dickson KWC, Patrick CKH, Vivying SYC, Eleanna K: Protecting the Exchange of Medical Images in Healthcare Process Integration with Web Services. In: System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference, 2007, pp. 131–131
131.
Zurück zum Zitat Fridrich J, Goljan M, Du R: Invertible authentication. San Jose, CA, USA, 2001, pp. 197–208 Fridrich J, Goljan M, Du R: Invertible authentication. San Jose, CA, USA, 2001, pp. 197–208
132.
Zurück zum Zitat Cox I, Doërr G, Furon T: Watermarking is not cryptography. In: Digital Watermarking. vol. 4283, Y. Shi and B. Jeon, Eds., ed: Springer Berlin/Heidelberg, 2006, pp. 1–15 Cox I, Doërr G, Furon T: Watermarking is not cryptography. In: Digital Watermarking. vol. 4283, Y. Shi and B. Jeon, Eds., ed: Springer Berlin/Heidelberg, 2006, pp. 1–15
Metadaten
Titel
A Review of Medical Image Watermarking Requirements for Teleradiology
verfasst von
Hussain Nyeem
Wageeh Boles
Colin Boyd
Publikationsdatum
01.04.2013
Verlag
Springer-Verlag
Erschienen in
Journal of Imaging Informatics in Medicine / Ausgabe 2/2013
Print ISSN: 2948-2925
Elektronische ISSN: 2948-2933
DOI
https://doi.org/10.1007/s10278-012-9527-x

Weitere Artikel der Ausgabe 2/2013

Journal of Digital Imaging 2/2013 Zur Ausgabe

Screening-Mammografie offenbart erhöhtes Herz-Kreislauf-Risiko

26.04.2024 Mammografie Nachrichten

Routinemäßige Mammografien helfen, Brustkrebs frühzeitig zu erkennen. Anhand der Röntgenuntersuchung lassen sich aber auch kardiovaskuläre Risikopatientinnen identifizieren. Als zuverlässiger Anhaltspunkt gilt die Verkalkung der Brustarterien.

S3-Leitlinie zu Pankreaskrebs aktualisiert

23.04.2024 Pankreaskarzinom Nachrichten

Die Empfehlungen zur Therapie des Pankreaskarzinoms wurden um zwei Off-Label-Anwendungen erweitert. Und auch im Bereich der Früherkennung gibt es Aktualisierungen.

Fünf Dinge, die im Kindernotfall besser zu unterlassen sind

18.04.2024 Pädiatrische Notfallmedizin Nachrichten

Im Choosing-Wisely-Programm, das für die deutsche Initiative „Klug entscheiden“ Pate gestanden hat, sind erstmals Empfehlungen zum Umgang mit Notfällen von Kindern erschienen. Fünf Dinge gilt es demnach zu vermeiden.

„Nur wer sich gut aufgehoben fühlt, kann auch für Patientensicherheit sorgen“

13.04.2024 Klinik aktuell Kongressbericht

Die Teilnehmer eines Forums beim DGIM-Kongress waren sich einig: Fehler in der Medizin sind häufig in ungeeigneten Prozessen und mangelnder Kommunikation begründet. Gespräche mit Patienten und im Team können helfen.

Update Radiologie

Bestellen Sie unseren Fach-Newsletter und bleiben Sie gut informiert.