期刊文献+

A Robust Zero-Watermarking Based on SIFT-DCT for Medical Images in the Encrypted Domain 被引量:3

下载PDF
导出
摘要 Remote medical diagnosis can be realized by using the Internet,but when transmitting medical images of patients through the Internet,personal information of patients may be leaked.Aim at the security of medical information system and the protection of medical images,a novel robust zero-watermarking based on SIFT-DCT(Scale Invariant Feature Transform-Discrete Cosine Transform)for medical images in the encrypted domain is proposed.Firstly,the original medical image is encrypted in transform domain based on Logistic chaotic sequence to enhance the concealment of original medical images.Then,the SIFT-DCT is used to extract the feature sequences of encrypted medical images.Next,zero-watermarking technology is used to ensure that the region of interest of medical images are not changed.Finally,the robust of the algorithm is evaluated by the correlation coefficient between the original watermark and the attacked watermark.A series of attack experiments are carried out on this method,and the results show that the algorithm is not only secure,but also robust to both traditional and geometric attacks,especially in clipping attacks.
出处 《Computers, Materials & Continua》 SCIE EI 2019年第7期363-378,共16页 计算机、材料和连续体(英文)
基金 This work is supported by the Key Reach Project of Hainan Province[ZDYF2018129] the National Natural Science Foundation of China[61762033] the National Natural Science Foundation of Hainan[2018CXTD333] the Key Innovation and Entrepreneurship Project of Hainan University[Hdcxcyxm201711] the Higher Education Research Project of Hainan Province(Hnky2019-73) the Key Research Project of Haikou College of Economics[HJKZ18-01].
  • 相关文献

参考文献4

二级参考文献50

  • 1章宜林,王敏.结合小波和颜色信息的SIFT图像配准方法[J].华中科技大学学报(自然科学版),2011,39(S2):127-130. 被引量:7
  • 2钱诚,范影乐,庞全.基于排列组合熵和灰度特征的纹理分割[J].计算机应用,2006,26(3):586-588. 被引量:5
  • 3易文娟,郁梅,蒋刚毅.Contourlet:一种有效的方向多尺度变换分析方法[J].计算机应用研究,2006,23(9):18-22. 被引量:32
  • 4SWAMINATHAN A, MAO Y, WU M. Robust and secure image hashing[ J ]. IEEE Trans. on Information Foren- sics and Security, 2006,1 ( 2 ) : 215-230.
  • 5FRIDRICH J. Robust bit extraction from images [ C ]. IEEE International Conference on Multimedia Computing and Systems, 1999,2:536-540.
  • 6ROY S, ZHU X, YUAN J. On preserving robustness false alarm tradeoff in media hashing [ C ]. Visual Communica- tions and Image Processing,2007,6508, part 1:65051C.
  • 7ROY S, SUN Q B. Robust hash for detecting and locali- zing image tampering[ C ]. IEEE International Conference on Image Processing,2007,6 : 117-120.
  • 8MONGA V, MIHCAK M K. Robust image bashing via non-negative matrix factorizations [ C ]. IEEE Internation- al Conference on Acoustics, Speech and Signal Process- ing,2006 ,2 :225-228.
  • 9VENKATESAN R, KOON S M, JAKUBOWSKI M H. Robust image hashing [ C ]. International Conference on Image Processing,2000, :664-666.
  • 10LOWED G. Distinctive image features from scale invari- ant keypoints [ J ]. International Journal of Computer Vi- sion,2004,60(2) :91-110.

共引文献77

同被引文献18

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部