Skip to main content

Medical Image Watermarking Based on SIFT-DCT Perceptual Hashing

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11066))

Abstract

Medical image containing patient information is often faced with various attacks in the transmission process. In order to enhance the medical information system security, and effectively solve the problem of medical data protection, a new algorithm of medical image watermarking based on SIFT-DCT perceptual hashing (scale invariant feature transform and discrete cosine transform) is proposed. Firstly, use SIFT-DCT perceptual hashing to extract features for the original medical images and quantize to generate hashing sequences. Then, use chaotic maps to encrypt the watermarking and embed it in the medical image. Finally, calculate the correlation coefficients of the embedded and extracted watermarking sequences to reflect the robustness of the algorithm. The results of experiment show that the proposed algorithm has good robustness against conventional attacks and geometric attacks, especially in terms of rotation, translation and clipping.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Giakoumaki, A., Pavlopoulos, S., Koutsouris, D.: Multiple image watermarking applied to health information management. IEEE Trans. Inf Technol. Biomed. 10(4), 722–732 (2006)

    Article  Google Scholar 

  2. Wu, J.H.K., Chang, R.F., Chen, C.J.: Tamper detection and recovery for medical images using near-lossless information hiding technique. J. Digital Imaging 21(1), 59–76 (2008)

    Article  Google Scholar 

  3. Tan, C.K., Ng, J.C., Xu, X.: Security protection of DICOM medical images using dual-Layer reversible watermarking with tamper detection capability. J. Digital Imaging 24(3), 528–540 (2011)

    Article  Google Scholar 

  4. Li, Q.L., Wang, G.Y., Liu, J.G.: Robust scale-invariant feature matching for remote sensing image registration. IEEE Geosci. Remote Sens. 6(2), 287–291 (2012)

    Google Scholar 

  5. Lei, Y., Wang, Y., Huang, J.: Robust image hash in radon transform domain for authentication. Signal Process.: Image Comm. 26(6), 280–288 (2011)

    Google Scholar 

  6. Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91–110 (2004)

    Article  MathSciNet  Google Scholar 

  7. Kim, H.-D., Lee, J.-W., Oh, T.-W.: Robust dt-cwt watermarking for dibr 3D images. IEEE Trans. 58(4), 533–543 (2012)

    Google Scholar 

  8. Sun, J.G., Lan, S.S.: Geometrical attack robust spatial digital watermarking based on improved SIFT. In: IEEE International Computer Society, pp. 98–101 (2010)

    Google Scholar 

  9. Priyatham, B., Nilkanta, S., Arijit, S.: SIFT based robust image watermarking resistant to resolution scaling. In: IEEE International Conference Image Processing (ICIP), pp. 5507–5510 (2014)

    Google Scholar 

  10. Han, L., Zhou, G.Y., Xu, L., Fang, L.: Beyond SIFT using binary features in loop closure detection. In: IEEE International Conference on Intelligent Robots and Systems, pp. 4057–4063 (2017)

    Google Scholar 

  11. Zhao, M., Jiang, J.G., Hong, R.C.: SIFT matching optimization based on RANSAC. In: Optoelectronic Engineering, pp. 62–69 (2014)

    Google Scholar 

  12. Vishal, M., Brian, L.E.: Perceptual image hashing via feature points performance evaluation and trade-offs. IEEE Trans. Image Process. 15(11), 3452–3455 (2006)

    Article  Google Scholar 

  13. Lv, X.D., Wang, J.: Perceptual image hashing based on shape contexts and local feature points. IEEE Trans. Inf. Forensics Secur. 7(3), 1081–1093 (2012)

    Article  Google Scholar 

  14. Liu, Z.Q., Li, Q., Liu, J.R.: SIFT based image hashing algorithm. Chin. J. Sci. Instrum. 32(9), 2024–2028 (2011)

    Google Scholar 

  15. Dai, S.S., Tian, Y.L.: Research on SIFT algorithm based on image texture features. In: Semiconductor Optoelectronics, pp. 107–110 (2014)

    Google Scholar 

  16. Monga, V., Mhcak, M.K.: Robust and secure image hashing via non-negative matrix factorizations. Proc. IEEE Trans. Inf. Forensics Secur. 2(3), 376–390 (2007)

    Article  Google Scholar 

  17. Kozat, S., Venkatesan, R., Mihcak, M.: Robust perceptual image hashing via matrix invariants. In: IEEE International Conference on Image Processing (ICIP), pp. 3443–3446 (2004)

    Google Scholar 

  18. Chen, Y., Li, B., Dong, R.: Contourlet-SIFT feature matching algorithm. J. Electron. Inf. Technol. 203–209 (2013)

    Google Scholar 

Download references

Acknowledgment

This work is supported by the Key Reach Project of Hainan Province (ZDYF2018129), the National Natural Science Foundation of China (61762033), and the National Natural Science Foundation of Hainan (617048, 2018CXTD333).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jingbing Li or Jing Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, J., Li, J., Chen, J., Zou, X., Cheng, J., Liu, J. (2018). Medical Image Watermarking Based on SIFT-DCT Perceptual Hashing. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11066. Springer, Cham. https://doi.org/10.1007/978-3-030-00015-8_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00015-8_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00014-1

  • Online ISBN: 978-3-030-00015-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics