已阅读5页,还剩23页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
外文文献资料Thedevelopmentofteleradiologybringstheconvenienceofglobalmedicalrecordaccessalongwiththeconcernsoverthesecurityofmedicalimagestransmittedovertheopennetwork.Withtheprevailingadoptionofthree-dimensional(3-D)imagingmodalities,itisvitaltodevelopasecuritymechanismtoprovidelargevolumesofmedicalimageswithprivacyandreliability.ThispaperpresentsthedevelopmentofanewandimprovedmethodofimplementingtamperdetectionandlocalizationbasedonafullyreversibledigitalwatermarkingschemefortheprotectionofvolumetricDICOMimages.Thistamperdetectionandlocalizationmethodutilizesthe3-Dpropertyofvolumetricdatatoachievemuchfasterprocessingtimeatbothsenderandreceiversideswithoutcompromisingtamperlocalizationaccuracy.TheperformanceoftheproposedschemewasevaluatedbyusingsamplevolumetricDICOMimages.Resultsshowthattheschemeachievedonaverageabout65%and72%reductioninwatermarkinganddewatermarkingprocessingtime,respectively.Forcaseswheretheimageshadbeentampered,itispossibletodetectandlocalizethetamperedareaswithimprovedlocalizationresolutionintheimagesusingthescheme.Keywords:Imageauthentication,Medicaldatasecurity,Tamperdetection,WatermarkingIntroductionDigitalmedicalimagehasgainedimportanceovertheyearsandhasbecometheprimarymediumformedicalimaginginthehealthcareindustry.Inparallelwiththeadventofdigitalmedicalimages,rapiddevelopmentofinformationandcommunicationtechnologyhasfacilitatedtheadvancementofteleradiologybyenablingfasterandwideraccesstoelectronicmedicalrecords,includingmedicalimages.Withincreasingdemandbymedicalexpertsatdifferentlocationstostudymedicalimagesfrompeopleallovertheglobeinteleradiology,anincreasingnumberofmedicalimagesarebeingtransmittedthroughtheopennetwork(e.g.,theInternet).Ingeneral,therehasbeenanincreasingdemandforfasterandgreateraccessibilityofmedicalimagesacrossthehealthcareindustry.Whenmedicalimageswhichcontainsensitivityinformationofpatientsaretransmittedovertheopennetwork,theybecomevulnerabletocorruptionbynoisytransmissionchannelsandattacksbyhackersorindividualswithmaliciousintends.Theseattacksmayincludeobtainingprivateinformationaboutthepatient,changingpatientinformationintheimageheader,andtamperingtheimagepixelcontent.Theseattackswillcausetheimagestoloseintegrity.Afterlosingintegrity,theuseofthesetamperedmedicalimagescouldpotentiallyleadtowrongdiagnosisofdiseases,whichcouldresultinadifferenttreatmentforthepatient.Intheworst-casesituation,itmightevenresultindeathofpatients.Consequently,securityofdigitalmedicalimagesbecomesanimportantproblemthatneedstobeaddressed.TheDigitalImagingandCommunicationinMedicine(DICOM)(thestandardformedicalimages)definesasetofsecurityprofilesthatapplicationentitiesshouldconformtoduringtheexchangeofmedicaldata.Theseprofilesincludesecureuseprofiles,securetransportconnectionprofiles,digitalsignatureprofiles,andmediastoragesecurityprofiles1.TheDICOMimagefileconsistsofaheaderthatstorespatientsinformationandimagedata.However,theauthenticityofDICOMmedicalimagescanbecompromisedasitispossibleforahackertochangetheheaderofanotherpersonsDICOMimagefiletohisownto,forexample,claimmonetarygainfrominsurancecompany.DICOMstandardproposestoverifytheauthenticityofmedicalimagesbyusingdigitalsignatureandembeddingthesignatureintheheader.However,digitalsignaturereliesonthestrengthofcryptographichashfunction.IthasbeendemonstratedthatitispossibletogeneratetwodatasetswithdifferentcontentbuthavingthesameMessage-Digestalgorithm5hash2.Moreimportantly,digitalsignaturedoesnotprovidetamperlocalizationcapability.Furthermore,imagepixeldataaloneisnotprotectedusingtheDICOMmechanismsifthepixeldataareseparatedfromtheDICOMheader.Digitalwatermarkingisaprotectiontechniquethathasthepotentialtoprotecttheintegrityofmedicalimages,providingtamperprotectionevenwhentheimagesleavethenetwork.Theadvantagesofusingwatermarkingincludeenablingauthenticationinformationsuchasthemetadatatobeembeddedintothemedicalimagesasvisuallyunperceivablewatermarkpayloadandprovidingcontinuousauthenticityandintegrityprotectionoftheimagesbeyondthepointofinternalnetwork.Anumberofdigitalwatermarkingtechniquesformedicalimageshavebeenreported215.Thesewatermarkingtechniquescanbebroadlycategorizedintonon-reversible3,4andreversiblewatermarking2,519intheliteraturewherereversiblewatermarkinghasbeenmorewidelyimplemented.Thisismainlybecauseoftheclinicalneedwhichrequiresoriginalmedicalimagestobestudiedduringdiagnosis.Asdigitalmedicalimagescanbeeasilymodified3,itisimportanttoidentifywhetherimageshavebeenalteredandbeabletolocalizeregionsthathavebeentampered.Tothisend,watermarkingtechniqueswithtamperdetectionandlocalizationcapabilitythatallowtherecipienttodetectwhethertamperingofthemedicalimagehasoccurredandtolocatethetamperedregionsintheimagehavebeenreported.ZainandFauzidevelopedatamper-detectionmethodwhichwasachievedthroughblock-basedinspectionofimageblockusingparitychecksinamulti-levelhierarchicalmanner5.GuoandZhuangreportedanewregion-basedlosslesswatermarkingschemewithatamperlocalizationcapability7.Intheirmethod,aregionofauthenticationwaspartitionedintosmallnon-overlappingregionsinamulti-levelhierarchicalmanner,andthedigitalsignaturesoftheseregionswerethenusedtorealizetamperlocalization.Toachievetamperdetection,Changetal.calculatedtheaveragepixelvalueofeachnon-overlappingblockandencodedthevaluebyusingasymmetrickeycryptosystem.Thisinformationwasthendecryptedattherecipientendtocheckfortampering15.Inadditiontodetectingtamperedregions,Wuetal.incorporatedimageinformationintheirtamperdetectionmethodtoenabletamperedregionstobepartiallyrecovered8.Ourearlierworkisadual-layerreversiblewatermarkingtechniqueinwhichtamper-detectionandlocalizationwasdevelopedbasedonverifyingcyclicredundancycheck(CRC)inablockbyblockmanner2.Overall,theseworksachievedverygoodtamper-detectionaccuracy.Ingeneral,tamper-detectionintheseworkswasachievedbycheckingintegrityinformationofsmallnon-overlappingblocksinanimage.Locatingblockswhichfailedinthecheckingwillgivethelocationsofthetamperedregions.Thesemethodsmainlydifferintheerrorcheckingcodes(e.g.,CRC,digitalsignatures,etc)thatwereusedtoverifytheintegrityoftheblock.Theaforementionedstudiesmainlyfocusedonimagesacquiredbytwo-dimensional(2-D)imagingmodalitiessuchasX-rayradiographyandultrasoundordirectlyapplyingthe2-Dtechniquesonindividualimageofthreedimensional(3-D)dataacquiredbyimagingmodalitiessuchascomputedtomography(CT)andmagneticresonanceimaging(MRI).However,withtheadventof3-Dmedicalimagingmodalitiesandbecause3-Dimagingmodalitiesoftenproducealargenumberofcross-sectionalimagesforavolumeofinterest(e.g.,over100imagesforakneeMRIdatasetinasinglestudy),directapplicationof2-Dtechniqueson3-Dvolumetricdatawouldbecomputationallyinefficientandtime-consuming.Thisrequiresthedevelopmentofnewtamper-detectionandlocalizationschemesforvolumetricmedicalimagestoimprovetheefficiencyoftheoverallwatermarkingtechnique.Thispaperpresentsanimprovedtamper-detectionandlocalizationmethodthatexploitsthe3-DpropertyofvolumetricDICOMimages.Thisnewtechniquewasdevelopedtosignificantlyreducetheprocessingtimeandtoimprovetamperlocalizationwithoutcompromisingitsabilitytoensureauthenticity.Tothisend,twotypesofwatermarks(i.e.,horizontalandverticalwatermarks)thatutilizethe3-Dpropertyofvolumetricimageswereintroduced.Theproposedtamper-detectionandlocalizationmethodwasdevelopedanddemonstratedusingthedual-layerreversiblewatermarkingschemethatwasdevelopedinourearlierstudy2.TheperformanceoftheproposedschemewasevaluatedbyusingsampleDICOMvolumetricimagesandcomparingtoourearlierdevelopedtamperdetectionandlocalizationscheme2whichwasconsideredasarepresentativeofadirect2-Dapplicationonvolumetricimages.MethodologyOneofthecomputationalintensivepartsofwatermarkingwithtamperdetectionandlocalizationcapabilityistheprocessing(calculation,embedding,andchecking)ofblock-basederror-detectingfunctions(e.g.,CRC,digitalsignatures,etc).Inthispaper,thetamper-detectionandlocalizationmethodproposedusestwodifferentmethodsforleadingimage(firstimageinastack)andnon-leadingimages(therestoftheimagesinastack),respectively.EachzonedblockoftheleadingimageinthevolumestackwasembeddedwithbothhorizontalCRCandverticalCRCwhereasthatofothernon-leadingimageswasembeddedwithonlyhorizontalCRC.Theaimistoachieveasignificantimprovementincomputationalefficiencyandabetterresolutionforexaminingthetamperedregionstoenabletheproposedschemetobeamorepracticalsolutiontoprotect3-Dvolumetricimages.Thereversiblewatermarkingalgorithmthatwasusedtoimplementthisnewtamperdetectionandlocalizationmethodisbasedonourearlierwork2.Althoughthemainfocusofthispaperisondevelopingaschemefortamperdetectionandlocalization,thereversiblewatermarkingmethodispresentedinthenextsectionforcompleteness.ReversibleWatermarkingAlgorithmInthissection,thereversiblewatermarkingalgorithmproposedinourearlierstudy2ispresented.Itconsistsoftwostages(i.e.,dataembeddinganddataextraction).Duringthedataembeddingstageatthesenderside,animageofWHpixelstobewatermarkedisfirstlydividedintonon-overlappingsquareblocksofsizeNN,where1Nmin(W,H).InthecasethatWorHisnotamultipleofN,theremainingpartattheendofeachblockroworblockcolumnwillbeappendedtotheblocktoitsleftorabove,respectively.Awatermarkingparameter,Q,isthendefinedtoensurethatenoughembeddingcapacityisavailable.EachNNimageblockissubsequentlyprocessedaccordingtotheflowchartillustratedinFig.1inarasterscanmanneruntiltheentirebitstreamisembedded.Fig.1ThewatermarkingflowchartDuringdataextractionstage(de-watermarking)atthereceiverdetectorside,thewatermarkedimageisfirstlydividedintonon-overlappingblocksinthesamewayasatthesenderside.EachblockissubsequentlyprocessedaccordingtotheflowchartshowninFig.2inarasterscanmanneruntiltheentireembeddedbitstreamisextracted.Inthisway,thewatermarkedimageisconvertedbacktotheoriginalimage.Fig.2ThedewatermarkingflowchartInourwatermarkingscheme,tamper-detectionandlocalizationinformationisembeddedasthesecondwatermarklayer(whichisthefocusofthispaper)aftermetadataisembeddedasthefirstwatermarklayer.IntegrityEmbeddingforTamper-DetectionandLocalizationIntegrityembeddingfortamper-detectionandlocalizationisachievedbyembeddingerror-detectiondataoneveryzonedimageregioninareversiblemanner.Toavoidtheneedtocheckeverysliceinavolumestackduringdewatermarkingandreducethesizeofthelocalizationregion(improvinglocalizationresolution),anewschemefortamper-detectionandlocalizationwasdeveloped.Theschemeconsidersthefirstimagesliceinavolumestackastheleadingimageandthesubsequentslicesthatfollowasthenon-leadingimages.Thetechniqueprocessestheleadingimageinadifferentmannerfromnon-leadingimages:Eachnon-leadingimageisembeddedonlywithhorizontalCRCwhereastheleadingimageisembeddedwithbothhorizontalCRCandverticalCRC.ThepurposeoftheverticalCRCistoenablerapidcheckingoftheoverallintegrityofthevolumestack(withouttheneedtocheckeverysingleslice)whilethehorizontalCRCistoallowcheckingoftheintegrityofisolatedregionswithineachimagewhenthecorrespondingverticalCRCcheckingfails.TheembeddingstructureisillustratedinFig.3.Thedetailsoftheembeddingprocessaredescribedinthefollowingsections.Fig.3TheintegrityembeddingstructureIntegrityEmbeddingforNon-leadingImageNon-leadingimageisembeddedonlywithhorizontalCRC.Atthesenderside,theimageisfirstlydividedintonon-overlappinglargeblocks(Inthispapertheterms“largeblock”and“smallblock”refertoablockofsize18by18andablockofsize9by9,respectively).AwatermarkingparameterQ2isthendefinedtoensuresufficientembeddingcapacityforthesecondwatermarklayer.OnenecessaryconditiontomaintainacomparableembeddingcapacitytothefirstwatermarklayeristhatQ22Q1,whereQ1isthewatermarkingparameterofthefirstwatermarklayerandalsothemaximumdifferencebetweenreferencepixelandalterablepixelthatcanbeextendedbytheembeddingalgorithminthefirstwatermarklayer.ThedefinitionsofbothQ1andQ2arealsorestrictedbytheunderflowandoverflowconditions,whichwilloccurrespectivelyinthecaseofDICOMimageswith16-bitdepthwhenthegraylevelofnisdecreasedbymorethannorthegraylevelof65535-nisincreasedbymorethann.Asaresult,true16-bitimageswouldnotbeappropriatefortheproposedalgorithm.However,currentmedicalimagingmodalitiesgenerallydonotproduceimagesthatutilizethefullrangeofgraylevels.Therefore,allthepixelvaluesoftheoriginalimageareincreasedbyQ,whereQ=Q1+Q2,toavoidoverflowandunderflowconditions,andallthepixelvalueswouldeventuallybedecreasedbyQtorestoretheoriginalimageatthereceiverdetectorside.AfterdefiningQ2,eachblockof18by18pixelsissubsequentlyprocessedinarasterscanmanneraccordingtothefollowingsteps.1.DeterminetheembeddingcapacityCofthecurrentblock.Here,theembeddingalgorithmofreversiblewatermarkingpresentedearlierwasmodifiedtodetermineCbyconsideringtheblockasinputimage,segmentingitintosquareblockswithN=3andselectingcentralpixelofthe3by3blockasreferencepixel.Pixelsarethenupdatedaccordingtothefollowingstep:If|R-A|Q,C=C+1.2.Decidetheappropriateerrordetectioncodetobeusedbasedontheavailableembeddingcapacitywhichcouldbeslightlylowerthan16insomeregionsoftheimage.1.IfC16,calculatetheCRC-16-CCITTcodeoftheblock.2,If12C16,calculatetheCRC-12codeoftheblock.HorizontalCRCcodecalculationisperformedinthisstep.Toreducethecomputationtimeandtomaintaintamperdetectioncapability,thealgorithmfirstgeneratesanewblockof9by9pixelsfromtheoriginal18by18pixelsblock.The9by9pixelsblockisobtainedbysummingthepixelvaluesofeverynon-overlapping2by2pixelsblockwithinthe18by18pixelsblock.Hence,eachpixelinthe9by9pixelsblockcorrespondstothesummationofa2by2pixelsblockinthe18by18pixelsblock.TheCRCcodeofthe9by9pixelsblockisthencalculated.3.Performthedataembeddingstageofthereversiblewatermarkingalgorithmpresentedinearliersectiononthecurrentblockbyconsideringtheblockasaninputimage(i.e.,W=H=18).SelectthesegmentedsquareblocksizeNtobe3.SelectthecentralpixelasreferencepixelforeveryblockanduseQ2asthewatermarkingparameterQ.4.Theembeddingprocesscontinuesuntil16bitshavebeenembeddedinthecaseofCRC-16-CCITToruntiltheCRCbitsarerepeatedlyembeddedtofullyoccupytheembeddingcapacityinthecaseofCRC-12.Oncestep4iscompleted,block-basederror-detectiondataaresuccessfullyembedded.IntegrityEmbeddingforLeadingImageWiththeaimtofurtherreducetheprocessingtimeatthereceiverdetectorside,thenewconceptofverticalwatermarkingwasintroduced.Throughtheuseoftheverticalwatermarks,thereceiverdetectorcanquicklydeterminewhethertamperinghasoccurredinaparticularnarrowvolume.Inthecasewhenthereisnotampering,nofurtherverificationisrequiredforeachsingleimageinthevolumestack;whileinthecasewhentamperinghasoccurred,verticalwatermarkingwouldhighlightthattamperinghasoccurredinthatnarrowvolumeandfurtherexaminationintothehorizontalCRCcodesthatcorrespondtotheverticalwatermarksforeachsingleimagecanlocatethetampermoreprecisely.Theleadingimageofthevolumestackisselectedtoaccommodatetheverticalwatermarks,inadditiontoitsownhorizontalCRCcodes.Usingsimilarembeddingtechniqueasthenon-leadingimage,theleadingimageisalsofirstlydividedintonon-overlappingblocksof18by18pixels.AthirdwatermarkingparameterQ3isthendefinedtobe8Q1toensuresufficientembeddingcapacityforthesecondwatermarklayer.Similarly,allthepixelvaluesofleadingimageareincreasedbyQ,whereQ=Q1+Q3,toavoidoverflowandunderflowconditions.AllthepixelvalueswilleventuallybedecreasedbyQtorestoretheoriginalimageatthereceiverdetectorside.AfterdefiningQ3,eachblockof18by18pixels(referredaslargeblock)issubsequentlyprocessedinarasterscanmanneraccordingtothefollowingsteps.1.CalculatetheCRC-16-CCITTcodeofthelargeblockusingthenewtechniqueasdescribedinthestep2forprocessingthenon-leadingimage.2.Dividethelargeblockintofournon-overlappingblocksof9by9pixels(referredassmallblock)andcalculatetheverticalCRC-8codeforeachofthefournarrowvolumeswherethefoursmallblocksreside,respectively.Eachnarrowvolumecomprisesa9by9pixelsblockfromtheleadingimageandaseriesof9by9pixelsblocksfromthesubsequentnon-leadingimagesatthesamehorizontalcoordinates(seeFig.3).TheverticalCRCcodeiscalculatedusingthevolumeblockofwhicheachpixelvalueisthesummationofallthepixelsatthesamehorizontalcoordinatesacrossthevolume.3.Obtainthedatabitstobeembeddedforeachsmallblock.Theentiredatabitsconsistoffourdatabitsofthe16-bithorizontalCRCcodeofthelargeblockaswellastheentireeight-bitverticalCRCcodeofthevolumewherethesmallblockresides.4.Performthedataembeddingstageofthereversiblewatermarkingalgorithmpresentedinearliersectiononeachsmallblockbyconsideringitasinputimage(i.e.,W=H=9).SelectthesegmentedsquareblocksizeNtobe3.SelectthecentralpixelasreferencepixelforeveryblockanduseQ3asthewatermarkingparameterQ.5.embeddingprocesscontinuesuntilall12bitshavebeenembeddedforeachsmallblock.IntegrityExtractionAtthereceiverdetectorside,thewatermarkedleadingimageisfirstlydividedintonon-overlappingblocksof18by18pixels.Eachblockissubsequentlyprocessedinarasterscanmanneraccordingtothefollowingsteps.1.Dividethelargeblockintofoursmallblocksinthesamewayasatthesenderside.2.Performthedataextractionstageofthereversiblewatermarkingalgorithmpresentedinearliersectiononeachsmallblockbyconsideringitasawatermarkedimage.Segmentitintoblocksofthesamesize(N=3)asatthesenderside.3.Theextractionprocesscontinuesuntil12bitshavebeenextractedforeachsmallblock.Basedontheextracteddatabits,obtainfourextractedeight-bitverticalCRCcodesforthefournarrowvolumeswherethesmallblocksbelongtoandoneextracted16-bithorizontalCRCcodefortheleadingimage.4.Foreachsmallblock,ifthenumberofbitsextractedislessthan12ortheextractedeight-bitverticalCRCcodedoesnotagreewiththenewlycalculatedverticalCRCcode,thenarrowvolumewherethatblockresidesisidentifiedasbeingtampered.Furtherexaminationonthelargeblockofeachnon-leadingimageinthesamevolumeasthelargeblockoftheleadingimageisrequiredtodeterminetheexactlocationofthetamperandiscarriedoutasfollows:Performthedataextractionstageofthereversiblewatermarkingalgorithmpresentedinearliersectiononthecurrentblockbyconsideringitasawatermarkedimage.Segmentitintoblocksofthesamesize(N=3)asatthesenderside.Theextractionprocesscontinuesuntil16bits,whicharedeemedtobetheextractedhorizontalCRCcode,oruntilalltheavailablebitshavebeenextracted.Ifthenumberofbitsextractedislargerthan11butsmallerthan16,thefirst12bitsaredeemedastheextractedhorizontalCRCcode.Ifthen
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 深度解析(2026)《GBT 33448-2016数字城市地理信息公共平台运行服务质量规范》
- (正式版)DB12∕T 879-2019 《仓储企业诚信评价规范》
- 任务4.2 创建移除订单
- 医疗数据安全治理:区块链数据要素市场
- 医疗数据安全攻防的区块链风险控制
- 胸痛科普课件
- 胸廓的课件教学课件
- 胫腓骨折课件
- 【9道第三次月考】安徽省六安市舒城县部分学校2025-2026学年九年级上学期12月联考道德与法治试题
- 【9语12月月考】合肥市瑶海区部分学校2025-2026学年九年级上学期12月考试语文试题
- 2024年广东省春季高考(学考)语文真题(试题+解析)
- 陕西省专业技术人员继续教育2025公需课《党的二十届三中全会精神解读与高质量发展》20学时题库及答案
- PFMEA模板完整版文档
- 《论法的精神》读书笔记思维导图PPT模板下载
- 《普通心理学课程论文3600字(论文)》
- GB/T 5209-1985色漆和清漆耐水性的测定浸水法
- 12YJ6 外装修标准图集
- 大三上学期-免疫学第11章
- 五年级下册数学课件-1.4 自然数丨沪教版 (共13张PPT)
- 关于绩效考核与绩效工资分配工作的通知模板
- OpenStack云计算平台实战课件(完整版)
评论
0/150
提交评论