




已阅读5页,还剩23页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
外文文献资料Thedevelopmentofteleradiologybringstheconvenienceofglobalmedicalrecordaccessalongwiththeconcernsoverthesecurityofmedicalimagestransmittedovertheopennetwork.Withtheprevailingadoptionofthree-dimensional(3-D)imagingmodalities,itisvitaltodevelopasecuritymechanismtoprovidelargevolumesofmedicalimageswithprivacyandreliability.ThispaperpresentsthedevelopmentofanewandimprovedmethodofimplementingtamperdetectionandlocalizationbasedonafullyreversibledigitalwatermarkingschemefortheprotectionofvolumetricDICOMimages.Thistamperdetectionandlocalizationmethodutilizesthe3-Dpropertyofvolumetricdatatoachievemuchfasterprocessingtimeatbothsenderandreceiversideswithoutcompromisingtamperlocalizationaccuracy.TheperformanceoftheproposedschemewasevaluatedbyusingsamplevolumetricDICOMimages.Resultsshowthattheschemeachievedonaverageabout65%and72%reductioninwatermarkinganddewatermarkingprocessingtime,respectively.Forcaseswheretheimageshadbeentampered,itispossibletodetectandlocalizethetamperedareaswithimprovedlocalizationresolutionintheimagesusingthescheme.Keywords:Imageauthentication,Medicaldatasecurity,Tamperdetection,WatermarkingIntroductionDigitalmedicalimagehasgainedimportanceovertheyearsandhasbecometheprimarymediumformedicalimaginginthehealthcareindustry.Inparallelwiththeadventofdigitalmedicalimages,rapiddevelopmentofinformationandcommunicationtechnologyhasfacilitatedtheadvancementofteleradiologybyenablingfasterandwideraccesstoelectronicmedicalrecords,includingmedicalimages.Withincreasingdemandbymedicalexpertsatdifferentlocationstostudymedicalimagesfrompeopleallovertheglobeinteleradiology,anincreasingnumberofmedicalimagesarebeingtransmittedthroughtheopennetwork(e.g.,theInternet).Ingeneral,therehasbeenanincreasingdemandforfasterandgreateraccessibilityofmedicalimagesacrossthehealthcareindustry.Whenmedicalimageswhichcontainsensitivityinformationofpatientsaretransmittedovertheopennetwork,theybecomevulnerabletocorruptionbynoisytransmissionchannelsandattacksbyhackersorindividualswithmaliciousintends.Theseattacksmayincludeobtainingprivateinformationaboutthepatient,changingpatientinformationintheimageheader,andtamperingtheimagepixelcontent.Theseattackswillcausetheimagestoloseintegrity.Afterlosingintegrity,theuseofthesetamperedmedicalimagescouldpotentiallyleadtowrongdiagnosisofdiseases,whichcouldresultinadifferenttreatmentforthepatient.Intheworst-casesituation,itmightevenresultindeathofpatients.Consequently,securityofdigitalmedicalimagesbecomesanimportantproblemthatneedstobeaddressed.TheDigitalImagingandCommunicationinMedicine(DICOM)(thestandardformedicalimages)definesasetofsecurityprofilesthatapplicationentitiesshouldconformtoduringtheexchangeofmedicaldata.Theseprofilesincludesecureuseprofiles,securetransportconnectionprofiles,digitalsignatureprofiles,andmediastoragesecurityprofiles1.TheDICOMimagefileconsistsofaheaderthatstorespatientsinformationandimagedata.However,theauthenticityofDICOMmedicalimagescanbecompromisedasitispossibleforahackertochangetheheaderofanotherpersonsDICOMimagefiletohisownto,forexample,claimmonetarygainfrominsurancecompany.DICOMstandardproposestoverifytheauthenticityofmedicalimagesbyusingdigitalsignatureandembeddingthesignatureintheheader.However,digitalsignaturereliesonthestrengthofcryptographichashfunction.IthasbeendemonstratedthatitispossibletogeneratetwodatasetswithdifferentcontentbuthavingthesameMessage-Digestalgorithm5hash2.Moreimportantly,digitalsignaturedoesnotprovidetamperlocalizationcapability.Furthermore,imagepixeldataaloneisnotprotectedusingtheDICOMmechanismsifthepixeldataareseparatedfromtheDICOMheader.Digitalwatermarkingisaprotectiontechniquethathasthepotentialtoprotecttheintegrityofmedicalimages,providingtamperprotectionevenwhentheimagesleavethenetwork.Theadvantagesofusingwatermarkingincludeenablingauthenticationinformationsuchasthemetadatatobeembeddedintothemedicalimagesasvisuallyunperceivablewatermarkpayloadandprovidingcontinuousauthenticityandintegrityprotectionoftheimagesbeyondthepointofinternalnetwork.Anumberofdigitalwatermarkingtechniquesformedicalimageshavebeenreported215.Thesewatermarkingtechniquescanbebroadlycategorizedintonon-reversible3,4andreversiblewatermarking2,519intheliteraturewherereversiblewatermarkinghasbeenmorewidelyimplemented.Thisismainlybecauseoftheclinicalneedwhichrequiresoriginalmedicalimagestobestudiedduringdiagnosis.Asdigitalmedicalimagescanbeeasilymodified3,itisimportanttoidentifywhetherimageshavebeenalteredandbeabletolocalizeregionsthathavebeentampered.Tothisend,watermarkingtechniqueswithtamperdetectionandlocalizationcapabilitythatallowtherecipienttodetectwhethertamperingofthemedicalimagehasoccurredandtolocatethetamperedregionsintheimagehavebeenreported.ZainandFauzidevelopedatamper-detectionmethodwhichwasachievedthroughblock-basedinspectionofimageblockusingparitychecksinamulti-levelhierarchicalmanner5.GuoandZhuangreportedanewregion-basedlosslesswatermarkingschemewithatamperlocalizationcapability7.Intheirmethod,aregionofauthenticationwaspartitionedintosmallnon-overlappingregionsinamulti-levelhierarchicalmanner,andthedigitalsignaturesoftheseregionswerethenusedtorealizetamperlocalization.Toachievetamperdetection,Changetal.calculatedtheaveragepixelvalueofeachnon-overlappingblockandencodedthevaluebyusingasymmetrickeycryptosystem.Thisinformationwasthendecryptedattherecipientendtocheckfortampering15.Inadditiontodetectingtamperedregions,Wuetal.incorporatedimageinformationintheirtamperdetectionmethodtoenabletamperedregionstobepartiallyrecovered8.Ourearlierworkisadual-layerreversiblewatermarkingtechniqueinwhichtamper-detectionandlocalizationwasdevelopedbasedonverifyingcyclicredundancycheck(CRC)inablockbyblockmanner2.Overall,theseworksachievedverygoodtamper-detectionaccuracy.Ingeneral,tamper-detectionintheseworkswasachievedbycheckingintegrityinformationofsmallnon-overlappingblocksinanimage.Locatingblockswhichfailedinthecheckingwillgivethelocationsofthetamperedregions.Thesemethodsmainlydifferintheerrorcheckingcodes(e.g.,CRC,digitalsignatures,etc)thatwereusedtoverifytheintegrityoftheblock.Theaforementionedstudiesmainlyfocusedonimagesacquiredbytwo-dimensional(2-D)imagingmodalitiessuchasX-rayradiographyandultrasoundordirectlyapplyingthe2-Dtechniquesonindividualimageofthreedimensional(3-D)dataacquiredbyimagingmodalitiessuchascomputedtomography(CT)andmagneticresonanceimaging(MRI).However,withtheadventof3-Dmedicalimagingmodalitiesandbecause3-Dimagingmodalitiesoftenproducealargenumberofcross-sectionalimagesforavolumeofinterest(e.g.,over100imagesforakneeMRIdatasetinasinglestudy),directapplicationof2-Dtechniqueson3-Dvolumetricdatawouldbecomputationallyinefficientandtime-consuming.Thisrequiresthedevelopmentofnewtamper-detectionandlocalizationschemesforvolumetricmedicalimagestoimprovetheefficiencyoftheoverallwatermarkingtechnique.Thispaperpresentsanimprovedtamper-detectionandlocalizationmethodthatexploitsthe3-DpropertyofvolumetricDICOMimages.Thisnewtechniquewasdevelopedtosignificantlyreducetheprocessingtimeandtoimprovetamperlocalizationwithoutcompromisingitsabilitytoensureauthenticity.Tothisend,twotypesofwatermarks(i.e.,horizontalandverticalwatermarks)thatutilizethe3-Dpropertyofvolumetricimageswereintroduced.Theproposedtamper-detectionandlocalizationmethodwasdevelopedanddemonstratedusingthedual-layerreversiblewatermarkingschemethatwasdevelopedinourearlierstudy2.TheperformanceoftheproposedschemewasevaluatedbyusingsampleDICOMvolumetricimagesandcomparingtoourearlierdevelopedtamperdetectionandlocalizationscheme2whichwasconsideredasarepresentativeofadirect2-Dapplicationonvolumetricimages.MethodologyOneofthecomputationalintensivepartsofwatermarkingwithtamperdetectionandlocalizationcapabilityistheprocessing(calculation,embedding,andchecking)ofblock-basederror-detectingfunctions(e.g.,CRC,digitalsignatures,etc).Inthispaper,thetamper-detectionandlocalizationmethodproposedusestwodifferentmethodsforleadingimage(firstimageinastack)andnon-leadingimages(therestoftheimagesinastack),respectively.EachzonedblockoftheleadingimageinthevolumestackwasembeddedwithbothhorizontalCRCandverticalCRCwhereasthatofothernon-leadingimageswasembeddedwithonlyhorizontalCRC.Theaimistoachieveasignificantimprovementincomputationalefficiencyandabetterresolutionforexaminingthetamperedregionstoenabletheproposedschemetobeamorepracticalsolutiontoprotect3-Dvolumetricimages.Thereversiblewatermarkingalgorithmthatwasusedtoimplementthisnewtamperdetectionandlocalizationmethodisbasedonourearlierwork2.Althoughthemainfocusofthispaperisondevelopingaschemefortamperdetectionandlocalization,thereversiblewatermarkingmethodispresentedinthenextsectionforcompleteness.ReversibleWatermarkingAlgorithmInthissection,thereversiblewatermarkingalgorithmproposedinourearlierstudy2ispresented.Itconsistsoftwostages(i.e.,dataembeddinganddataextraction).Duringthedataembeddingstageatthesenderside,animageofWHpixelstobewatermarkedisfirstlydividedintonon-overlappingsquareblocksofsizeNN,where1Nmin(W,H).InthecasethatWorHisnotamultipleofN,theremainingpartattheendofeachblockroworblockcolumnwillbeappendedtotheblocktoitsleftorabove,respectively.Awatermarkingparameter,Q,isthendefinedtoensurethatenoughembeddingcapacityisavailable.EachNNimageblockissubsequentlyprocessedaccordingtotheflowchartillustratedinFig.1inarasterscanmanneruntiltheentirebitstreamisembedded.Fig.1ThewatermarkingflowchartDuringdataextractionstage(de-watermarking)atthereceiverdetectorside,thewatermarkedimageisfirstlydividedintonon-overlappingblocksinthesamewayasatthesenderside.EachblockissubsequentlyprocessedaccordingtotheflowchartshowninFig.2inarasterscanmanneruntiltheentireembeddedbitstreamisextracted.Inthisway,thewatermarkedimageisconvertedbacktotheoriginalimage.Fig.2ThedewatermarkingflowchartInourwatermarkingscheme,tamper-detectionandlocalizationinformationisembeddedasthesecondwatermarklayer(whichisthefocusofthispaper)aftermetadataisembeddedasthefirstwatermarklayer.IntegrityEmbeddingforTamper-DetectionandLocalizationIntegrityembeddingfortamper-detectionandlocalizationisachievedbyembeddingerror-detectiondataoneveryzonedimageregioninareversiblemanner.Toavoidtheneedtocheckeverysliceinavolumestackduringdewatermarkingandreducethesizeofthelocalizationregion(improvinglocalizationresolution),anewschemefortamper-detectionandlocalizationwasdeveloped.Theschemeconsidersthefirstimagesliceinavolumestackastheleadingimageandthesubsequentslicesthatfollowasthenon-leadingimages.Thetechniqueprocessestheleadingimageinadifferentmannerfromnon-leadingimages:Eachnon-leadingimageisembeddedonlywithhorizontalCRCwhereastheleadingimageisembeddedwithbothhorizontalCRCandverticalCRC.ThepurposeoftheverticalCRCistoenablerapidcheckingoftheoverallintegrityofthevolumestack(withouttheneedtocheckeverysingleslice)whilethehorizontalCRCistoallowcheckingoftheintegrityofisolatedregionswithineachimagewhenthecorrespondingverticalCRCcheckingfails.TheembeddingstructureisillustratedinFig.3.Thedetailsoftheembeddingprocessaredescribedinthefollowingsections.Fig.3TheintegrityembeddingstructureIntegrityEmbeddingforNon-leadingImageNon-leadingimageisembeddedonlywithhorizontalCRC.Atthesenderside,theimageisfirstlydividedintonon-overlappinglargeblocks(Inthispapertheterms“largeblock”and“smallblock”refertoablockofsize18by18andablockofsize9by9,respectively).AwatermarkingparameterQ2isthendefinedtoensuresufficientembeddingcapacityforthesecondwatermarklayer.OnenecessaryconditiontomaintainacomparableembeddingcapacitytothefirstwatermarklayeristhatQ22Q1,whereQ1isthewatermarkingparameterofthefirstwatermarklayerandalsothemaximumdifferencebetweenreferencepixelandalterablepixelthatcanbeextendedbytheembeddingalgorithminthefirstwatermarklayer.ThedefinitionsofbothQ1andQ2arealsorestrictedbytheunderflowandoverflowconditions,whichwilloccurrespectivelyinthecaseofDICOMimageswith16-bitdepthwhenthegraylevelofnisdecreasedbymorethannorthegraylevelof65535-nisincreasedbymorethann.Asaresult,true16-bitimageswouldnotbeappropriatefortheproposedalgorithm.However,currentmedicalimagingmodalitiesgenerallydonotproduceimagesthatutilizethefullrangeofgraylevels.Therefore,allthepixelvaluesoftheoriginalimageareincreasedbyQ,whereQ=Q1+Q2,toavoidoverflowandunderflowconditions,andallthepixelvalueswouldeventuallybedecreasedbyQtorestoretheoriginalimageatthereceiverdetectorside.AfterdefiningQ2,eachblockof18by18pixelsissubsequentlyprocessedinarasterscanmanneraccordingtothefollowingsteps.1.DeterminetheembeddingcapacityCofthecurrentblock.Here,theembeddingalgorithmofreversiblewatermarkingpresentedearlierwasmodifiedtodetermineCbyconsideringtheblockasinputimage,segmentingitintosquareblockswithN=3andselectingcentralpixelofthe3by3blockasreferencepixel.Pixelsarethenupdatedaccordingtothefollowingstep:If|R-A|Q,C=C+1.2.Decidetheappropriateerrordetectioncodetobeusedbasedontheavailableembeddingcapacitywhichcouldbeslightlylowerthan16insomeregionsoftheimage.1.IfC16,calculatetheCRC-16-CCITTcodeoftheblock.2,If12C16,calculatetheCRC-12codeoftheblock.HorizontalCRCcodecalculationisperformedinthisstep.Toreducethecomputationtimeandtomaintaintamperdetectioncapability,thealgorithmfirstgeneratesanewblockof9by9pixelsfromtheoriginal18by18pixelsblock.The9by9pixelsblockisobtainedbysummingthepixelvaluesofeverynon-overlapping2by2pixelsblockwithinthe18by18pixelsblock.Hence,eachpixelinthe9by9pixelsblockcorrespondstothesummationofa2by2pixelsblockinthe18by18pixelsblock.TheCRCcodeofthe9by9pixelsblockisthencalculated.3.Performthedataembeddingstageofthereversiblewatermarkingalgorithmpresentedinearliersectiononthecurrentblockbyconsideringtheblockasaninputimage(i.e.,W=H=18).SelectthesegmentedsquareblocksizeNtobe3.SelectthecentralpixelasreferencepixelforeveryblockanduseQ2asthewatermarkingparameterQ.4.Theembeddingprocesscontinuesuntil16bitshavebeenembeddedinthecaseofCRC-16-CCITToruntiltheCRCbitsarerepeatedlyembeddedtofullyoccupytheembeddingcapacityinthecaseofCRC-12.Oncestep4iscompleted,block-basederror-detectiondataaresuccessfullyembedded.IntegrityEmbeddingforLeadingImageWiththeaimtofurtherreducetheprocessingtimeatthereceiverdetectorside,thenewconceptofverticalwatermarkingwasintroduced.Throughtheuseoftheverticalwatermarks,thereceiverdetectorcanquicklydeterminewhethertamperinghasoccurredinaparticularnarrowvolume.Inthecasewhenthereisnotampering,nofurtherverificationisrequiredforeachsingleimageinthevolumestack;whileinthecasewhentamperinghasoccurred,verticalwatermarkingwouldhighlightthattamperinghasoccurredinthatnarrowvolumeandfurtherexaminationintothehorizontalCRCcodesthatcorrespondtotheverticalwatermarksforeachsingleimagecanlocatethetampermoreprecisely.Theleadingimageofthevolumestackisselectedtoaccommodatetheverticalwatermarks,inadditiontoitsownhorizontalCRCcodes.Usingsimilarembeddingtechniqueasthenon-leadingimage,theleadingimageisalsofirstlydividedintonon-overlappingblocksof18by18pixels.AthirdwatermarkingparameterQ3isthendefinedtobe8Q1toensuresufficientembeddingcapacityforthesecondwatermarklayer.Similarly,allthepixelvaluesofleadingimageareincreasedbyQ,whereQ=Q1+Q3,toavoidoverflowandunderflowconditions.AllthepixelvalueswilleventuallybedecreasedbyQtorestoretheoriginalimageatthereceiverdetectorside.AfterdefiningQ3,eachblockof18by18pixels(referredaslargeblock)issubsequentlyprocessedinarasterscanmanneraccordingtothefollowingsteps.1.CalculatetheCRC-16-CCITTcodeofthelargeblockusingthenewtechniqueasdescribedinthestep2forprocessingthenon-leadingimage.2.Dividethelargeblockintofournon-overlappingblocksof9by9pixels(referredassmallblock)andcalculatetheverticalCRC-8codeforeachofthefournarrowvolumeswherethefoursmallblocksreside,respectively.Eachnarrowvolumecomprisesa9by9pixelsblockfromtheleadingimageandaseriesof9by9pixelsblocksfromthesubsequentnon-leadingimagesatthesamehorizontalcoordinates(seeFig.3).TheverticalCRCcodeiscalculatedusingthevolumeblockofwhicheachpixelvalueisthesummationofallthepixelsatthesamehorizontalcoordinatesacrossthevolume.3.Obtainthedatabitstobeembeddedforeachsmallblock.Theentiredatabitsconsistoffourdatabitsofthe16-bithorizontalCRCcodeofthelargeblockaswellastheentireeight-bitverticalCRCcodeofthevolumewherethesmallblockresides.4.Performthedataembeddingstageofthereversiblewatermarkingalgorithmpresentedinearliersectiononeachsmallblockbyconsideringitasinputimage(i.e.,W=H=9).SelectthesegmentedsquareblocksizeNtobe3.SelectthecentralpixelasreferencepixelforeveryblockanduseQ3asthewatermarkingparameterQ.5.embeddingprocesscontinuesuntilall12bitshavebeenembeddedforeachsmallblock.IntegrityExtractionAtthereceiverdetectorside,thewatermarkedleadingimageisfirstlydividedintonon-overlappingblocksof18by18pixels.Eachblockissubsequentlyprocessedinarasterscanmanneraccordingtothefollowingsteps.1.Dividethelargeblockintofoursmallblocksinthesamewayasatthesenderside.2.Performthedataextractionstageofthereversiblewatermarkingalgorithmpresentedinearliersectiononeachsmallblockbyconsideringitasawatermarkedimage.Segmentitintoblocksofthesamesize(N=3)asatthesenderside.3.Theextractionprocesscontinuesuntil12bitshavebeenextractedforeachsmallblock.Basedontheextracteddatabits,obtainfourextractedeight-bitverticalCRCcodesforthefournarrowvolumeswherethesmallblocksbelongtoandoneextracted16-bithorizontalCRCcodefortheleadingimage.4.Foreachsmallblock,ifthenumberofbitsextractedislessthan12ortheextractedeight-bitverticalCRCcodedoesnotagreewiththenewlycalculatedverticalCRCcode,thenarrowvolumewherethatblockresidesisidentifiedasbeingtampered.Furtherexaminationonthelargeblockofeachnon-leadingimageinthesamevolumeasthelargeblockoftheleadingimageisrequiredtodeterminetheexactlocationofthetamperandiscarriedoutasfollows:Performthedataextractionstageofthereversiblewatermarkingalgorithmpresentedinearliersectiononthecurrentblockbyconsideringitasawatermarkedimage.Segmentitintoblocksofthesamesize(N=3)asatthesenderside.Theextractionprocesscontinuesuntil16bits,whicharedeemedtobetheextractedhorizontalCRCcode,oruntilalltheavailablebitshavebeenextracted.Ifthenumberofbitsextractedislargerthan11butsmallerthan16,thefirst12bitsaredeemedastheextractedhorizontalCRCcode.Ifthen
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 新解读《HG-T 3089-2001燃油用O形橡胶密封圈材料》新解读
- 级配碎石底基层施工方案
- 专题梳理 动词不规则变化自测表 课件
- 低能负离子在锥形玻璃管中的传输行为研究
- 合作股份公司管理制度
- 物理中考一轮复习教案 第二十九讲 电功、电功率
- 仓储店线下活动策划方案
- 仓库拍卖活动方案
- 仓鼠食品活动方案
- 代理记账推广活动方案
- 【MOOC】政府审计学-南京审计大学 中国大学慕课MOOC答案
- 《基督教概论》课件
- 虚拟现实技术导论 习题答案或解题思路 梁晓辉
- 计算机应用技术专业调研报告(高职)
- 2024NEA水性气硅涂膏隔热保温墙体构造
- 山西省太原市(2024年-2025年小学四年级语文)部编版期末考试((上下)学期)试卷及答案
- BPC10完整版本.0技术培训V1.0
- 2024年新高考II卷高考历史试卷(真题+答案)
- 2024年黑龙江医疗卫生事业单位招聘(药学)备考试题库(含答案)
- 2024年新高考1卷数学真题试卷及答案
- 湖北省武汉市洪山区2023-2024学年七年级下学期期末考试语文试卷
评论
0/150
提交评论