期刊文献+

自适应高容量医学图像可逆数据隐藏算法 被引量:8

Adaptive high-capacity reversible data hiding algorithm for medical images
在线阅读 下载PDF
导出
摘要 提出了一种新的医学图像无损数据隐藏算法,根据医学图像特点,将隐秘信息分别嵌入在感兴趣区域和非感兴趣区域中。在非感兴趣区域中,采用自适应整数变换方法增大嵌入容量并控制失真;在感兴趣区域,采用最低有效位替换方法控制水印图像质量。实验结果表明,算法的嵌入容量在1.2 bpp到1.7 bpp之间,而峰值信噪比保持在43 dB左右。与现有相关算法相比,嵌入容量具有明显优势并保持较高的图像质量。另外,本方法计算复杂度低,能方便应用于实际的医学信息系统中。 A new reversible data hiding algorithm for medical images was proposed. The hidden information was embedded into Region Of Interest (ROI) and non-interest respectively. In ROI, an adaptive integer transform scheme was employed to enhance the embedding capacity and control distortions. And in Region of Non-Interest (RONI), the classical Least Significant Bit (LSB) method was used to keep the marked image' s quality. The experimental results show that, compared with previous works, the performance of the proposed method has been significantly improved in terms of capacity and image quality. The proposed method' s embedding capacity is between 1.2 bpp and 1.7 bpp, while the Peak Signal-to- Noise Ratio (PSNR) can maintain the 43 dB or so. Moreover, the proposed method with high run efficiency can be applied into the practical hospital information system.
出处 《计算机应用》 CSCD 北大核心 2012年第10期2779-2782,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61103202) 国家重点实验室2011年度开放基金资助项目(SKLST201113) 福建星火科技项目(2010S0017) 莆田市科技项目(2011G04-2)
关键词 可逆数据隐藏 医学图像 整数变换 最低有效位 感兴趣区域 reversible data hiding medical image integer transform Least Significant Bit (LSB) Region of Interest (ROI)
  • 相关文献

参考文献15

  • 1刘东彦,刘文波,张弓.图像内容可恢复的半脆弱水印技术研究[J].中国图象图形学报,2010,15(1):20-25. 被引量:10
  • 2曾骁,陈真勇,陈明,熊璋.基于零系数索引的可逆图像水印[J].计算机研究与发展,2010,47(7):1304-1312. 被引量:7
  • 3李立宗,顾巧论,高铁杠.基于公钥的可逆数字水印[J].计算机应用,2012,32(4):971-975. 被引量:2
  • 4YANG QUNTING, GAO TIGANG, LI FAN. Reversible robust data hiding scheme based on histogram shifting in multi - wavelet domain [ J]. International Journal of Advancements in Computing Technolo- gy, 2011,3(5): 185 -193.
  • 5PENG FEI, LEI YU-ZHOU, LONG MIN, et al. A reversible water- marking scheme for two-dimensional CAD engineering graphics based on improved difference expansion[ J]. Computer-Aided De- sign, 2011,43(8) : 1018 - 1024.
  • 6TIAN J. Reversible data embedding using a difference expansion [ J]. IEEE Transactions on Circuits and Systems for Video Technolo- gy, 2003, 13(8) : 890 - 896.
  • 7ALATFAR A M. Reversible watermark using the difference expan- sion of a generalized integer transform[ J]. IEEE Transactions on Im- age Processing, 2004, 13(8) : 1147 - 1156.
  • 8CHEN C C, TSAI Y H. Adaptive reversible image watermarking scheme[ J]. The Journal of Systems and Software, 2011,84:428 - 434.
  • 9TAN C K, NG J C, XU X T, et al. Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability [ J]. Journal of Digital Imaging, 2011, 24(3) : 528 - 540.
  • 10DENG X H, CHEN Z G, DENG XH, et al. A novel dual-layer re- versible watermarking for medical image authentication and EPR hid- ing[ J]. Advanced Science Letters, 2011,4(11) : 3678 - 3684.

二级参考文献45

共引文献14

同被引文献85

  • 1谢于明,程义民,汪云路,田源.基于整数线性变换的无损隐秘传输方法[J].中国图象图形学报,2007,12(9):1562-1567. 被引量:5
  • 2MART1NO F D, SESSA S. Fragile watermarking tamper detection with images compressed by fuzzy transform[ J]. lnfornmtion Sci- ences, 2012, 195(1): 62-90.
  • 3DENG X H, CHEN Z G, DENG X H, et al. A novel dual-layer re- versible watermarking for medical image authentication and EPR hid- ing[J]. Advanced Science Letters, 2011, 4(11) : 3678 -3684.
  • 4CHIANG K H, CHIEN K C C, CHANG R F, et al. Tamper detec- tion and restoring system for medical images using wavelel-based re- versible data embedding[ J]. Journal of Digital hnaging, 2008, 21 (1): 77-90.
  • 5GUO X T. ZHUANG T G. L.ossless watermarking for verifying the integrity of medical images with tamper localization[ J]. Jounlal of Digital hnaging, 2009, 22(6): 620-628.
  • 6PHADIKAR A. MALTY S P, MANDAL M. Novel wawelel - based QIM data hiding technique for tamper detection and correction of digital images[ J]. Journal of Visual Communication and Image Rep- resentation, 2012, 23(3): 454-466.
  • 7LI C L, WANG Y H, MA B, et al. Tamper detection and self-re- covery of biometric images using salient region-based authentication watermarking scheme [ J ]. Computer Standards and Interlaces, 2012, 34(4): 367-379.
  • 8ZHU Z I,, ZHANG W, WONG K W, et al. A chaos-based symmet- ric image encryption scheme using a bit-level permutation[ J]. Infor- mation Sciences, 2011, 181(6) : 1171 - 1186.
  • 9WANG Y, WONG K W, LIAO X F, et al. A new chaos-based fast image eneryption algorithm[ J]. Applied Soft Computing, 2011, 11 (1): 514-522.
  • 10RAWAT S, RAMAN B. A chaotic system based fragile watermark- ing scheme for image tamper detection[ J]. International Journal of Electronies and Communications, 2011, 65(10) : 840 -847.

引证文献8

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部