4.5 Article

A Robust Watermarking Scheme Based on ROI and IWT for Remote Consultation of COVID-19

期刊

CMC-COMPUTERS MATERIALS & CONTINUA
卷 64, 期 3, 页码 1435-1452

出版社

TECH SCIENCE PRESS
DOI: 10.32604/cmc.2020.011359

关键词

Digital watermarking; logistic; hash algorithm; ROI; IWT

资金

  1. National Nature Science Foundation of China [61502240, 61502096, 61304205, 61773219]
  2. Natural Science Foundation of Jiangsu Province [BK20191401]
  3. Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund

向作者/读者索取更多资源

In the current dire situation of the corona virus COVID-19, remote consultations were proposed to avoid cross-infection and regional differences in medical resources. However, the safety of digital medical imaging in remote consultations has also attracted more and more attention from the medical industry. To ensure the integrity and security of medical images, this paper proposes a robust watermarking algorithm to authenticate and recover from the distorted medical images based on regions of interest (ROI) and integer wavelet transform (IWT). First, the medical image is divided into two different parts, regions of interest and non-interest regions. Then the integrity of ROI is verified using the hash algorithm, and the recovery data of the ROI region is calculated at the same time. Also, binary images with the basic information of patients are processed by logistic chaotic map encryption, and then the synthetic watermark is embedded in the medical carrier image using IWT transform. The performance of the proposed algorithm is tested by the simulation experiments based on the MATLAB program in CT images of the lungs. Experimental results show that the algorithm can precisely locate the distorted areas of an image and recover the original ROI on the basis of verifying image reliability. The maximum peak signal to noise ratio (PSNR) value of 51.24 has been achieved, which proves that the watermark is invisible and has strong robustness against noise, compression, and filtering attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据