Abstract
3D volume data has been increasingly used in many applications. The digital nature of the data allows easy creation, copying and distribution. However, it also allows ease of manipulation which can enable wilful or inadvertent misrepresentation of the content. For an application like medical imaging, this can have serious diagnostic and legal implications. Thus there is a strong need to establish the integrity of a particular volume data-set. We argue that the traditional data authentication mechanisms like digital signatures or cryptographic methods are not very useful in this context due to their extreme fragility. What is required is a method that can detect the integrity for allowable content preserving manipulations. We have developed a novel authentication procedure which is robust against benign content manipulation. The volume data can be robustly authenticated under normal operations such as scaling, resampling and additive Gaussian noise. On the other hand, it offers protection against any malefic or unintentional data manipulation which significantly changes the content of the volume data-set. Such manipulations include cropping, changing of voxel values etc. Our method uses segmentation, wavelet-based foveation, and encryption to achieve this. We have implemented the method and tested its robustness for several manipulations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J. Aloimonos, I. Weiss and A. Bandyopadhyay. Active Vision. 1st International Conference on Computer Vision London, England, 35–54, 1987.
A. Basu and K.J. Wiebe. Videoconferencing using spatially varying sensing with multiple and moving fovea. IEEE Trans. on Systems, Man and Cybernetics, 28(2):137–148, 1998.
P.J. Burt. Smart sensing within a pyramid vision machine. Proceedings of the IEEE, 76(8):1006–1015, 1988.
E-.C. Chang, S. Mallat, and C. Yap. Wavelet foveation. Journal of Applied and Computational Harmonic Analysis, 9(3):312–335, 2000.
P. Cignoni, C. Montani, E. Puppo, and R. Scopigno. Optimal Isosurface Extraction from Irregular Volume Data. Proceedings of IEEE Symposium on Volume Visualization. 1996, 31–38.
D.J. DeFatta, J.G. Lucas and W.S. Hodgkiss. Digital Signal Processing: A System Design Approach. John Wiley & Sons. New York, Second Edition, 1988.
A. Eleftheriadis and A. Jacquin. Automatic face location detection and tracking for model-assisted coding of video teleconferencing sequences at low bit rates. Signal Processing: Image Communication. Vol. 7, No. 3, 231–248, 1995.
G.L. Friedman. The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image. IEEE Transactions on Consumer Electronics. Vol. 39, No. 4, 905–910, November 1993.
X. Guan, Y. Wu, M.S. Kankanhalli, and Z. Huang. Invisible Watermarking of Volume Data Using Wavelet Transform. International Conference on Multimedia Modeling-MMM2000. November 2000, Japan, 153–166.
F. Hartung and M. Kutter. Multimedia Watermarking Techniques. Proceedings of the IEEE. vol. 87, no. 7, July 1999, 1079–1107.
A. Kaufman, D. Cohen and R. Yagel. Volume Graphics. IEEE Computer. vol. 26, no. 7, July 1993, 51–64.
M. Levoy and R. Whitaker Gaze-Directed Volume Rendering. Computer Graphics. Vol. 24, No. 2, 217–223, 1990.
E.T. Lin and E.J. Delp. A Review of Fragile Image Watermarks. Proc. Multimedia and Security Workshop (ACM MM’99). Orlando, 25–29, October 1999.
S. Mallat. A Wavelet Tour of Signal Processing. Academic Press. 1998.
E. Praun, H. Hoppe, A. Finkelstein. Robust Mesh Watermarking. Computer Graphics ACM SIGGRAPH ’99 Proceedings. 69–76, September 1999.
M. Schneider and S.-F. Chang. A robust content based digital signature for image authentication. Proceedings of ICIP. Volume: 3, pages: 227–230, 1996.
E.L. Schwartz. Topographical mapping in primate visual cortex: history, anatomy, and computation. In D.H. Kelly, editor, Visual Science and Engineering: models and applications, pages 293–360. Marcell Dekker, Inc, New York, 1994.
E.L. Schwartz, D.N. Greve and G. Bonmassar. Space-variant active vision: Definition, Overview and Examples Neural Networks. Vol. 8, No. 7–8, 1297–1308, 1995.
J.M. Shapiro. Embedded image coding using zerotrees of wavelet coefficients. IEEE Trans. on Signal Processing. vol. 41, no. 12, December 1993, 3445–3462.
W. Stallings. Cryptography and Network Security: Principles and Practice. Prentice-Hall Inc Second Edition, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Wien
About this paper
Cite this paper
Kankanhalli, M.S., Chang, EC., Guan, X., Huang, Z., Wu, Y. (2002). Authentication of Volume Data Using Wavelet-Based Foveation. In: Jorge, J., Correia, N., Jones, H., Kamegai, M.B. (eds) Multimedia 2001. Eurographics. Springer, Vienna. https://doi.org/10.1007/978-3-7091-6103-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-7091-6103-6_13
Publisher Name: Springer, Vienna
Print ISBN: 978-3-211-83769-6
Online ISBN: 978-3-7091-6103-6
eBook Packages: Springer Book Archive