期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Zero Watermarking Algorithm for Medical Image Based on Resnet50-DCT 被引量:1
1
作者 mingshuai sheng Jingbing Li +3 位作者 Uzair Aslam Bhatti Jing Liu Mengxing Huang Yen-Wei Chen 《Computers, Materials & Continua》 SCIE EI 2023年第4期293-309,共17页
Medical images are used as a diagnostic tool, so protecting theirconfidentiality has long been a topic of study. From this, we propose aResnet50-DCT-based zero watermarking algorithm for use with medicalimages. To beg... Medical images are used as a diagnostic tool, so protecting theirconfidentiality has long been a topic of study. From this, we propose aResnet50-DCT-based zero watermarking algorithm for use with medicalimages. To begin, we use Resnet50, a pre-training network, to draw out thedeep features of medical images. Then the deep features are transformedby DCT transform and the perceptual hash function is used to generatethe feature vector. The original watermark is chaotic scrambled to get theencrypted watermark, and the watermark information is embedded into theoriginal medical image by XOR operation, and the logical key vector isobtained and saved at the same time. Similarly, the same feature extractionmethod is used to extract the deep features of the medical image to be testedand generate the feature vector. Later, the XOR operation is carried outbetween the feature vector and the logical key vector, and the encryptedwatermark is extracted and decrypted to get the restored watermark;thenormalized correlation coefficient (NC) of the original watermark and therestored watermark is calculated to determine the ownership and watermarkinformation of the medical image to be tested. After calculation, most ofthe NC values are greater than 0.50. The experimental results demonstratethe algorithm’s robustness, invisibility, and security, as well as its ability toaccurately extract watermark information. The algorithm also shows goodresistance to conventional attacks and geometric attacks. 展开更多
关键词 Medical images deep residual network resnet50-DCT privacy protection ROBUSTNESS security
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部