哈尔滨工程大学学报
哈爾濱工程大學學報
합이빈공정대학학보
JOURNAL OF HARBIN ENGINEERING UNIVERSITY
2013年
7期
918-923
,共6页
李文娜%高立群%孔祥勇%崔兆华
李文娜%高立群%孔祥勇%崔兆華
리문나%고립군%공상용%최조화
盲水印算法%医学图像%数字水印%图像认证%轮廓波变换%活动轮廓模型
盲水印算法%醫學圖像%數字水印%圖像認證%輪廓波變換%活動輪廓模型
맹수인산법%의학도상%수자수인%도상인증%륜곽파변환%활동륜곽모형
blind watermark algorithm%medical image%digital watermark%image authentication%contourlet trans-form%active contour model
针对现有水印方法不能很好地实现信息隐藏和认证同时进行的不足,提出一种基于ROI和轮廓波变换域的DI?COM图像水印技术.该技术应用改进的可逆差分扩展方法在DICOM图像的背景区域嵌入水印w1,即患者的隐私信息和感兴趣区域的子块均值.水印w1嵌入后,在图像的轮廓波域中能量较大的高阶方向子带的位置上,采用轮廓波系数与8邻域均值比较的方法嵌入认证水印w 2.算法实现了水印图像的盲提取,同时具有对感兴趣区域的篡改进行定位并修复的能力,保障诊断时图像的真实性和完整性.仿真实验表明,该技术具有较强的数据信息隐藏能力和较好的抗攻击能力.
針對現有水印方法不能很好地實現信息隱藏和認證同時進行的不足,提齣一種基于ROI和輪廓波變換域的DI?COM圖像水印技術.該技術應用改進的可逆差分擴展方法在DICOM圖像的揹景區域嵌入水印w1,即患者的隱私信息和感興趣區域的子塊均值.水印w1嵌入後,在圖像的輪廓波域中能量較大的高階方嚮子帶的位置上,採用輪廓波繫數與8鄰域均值比較的方法嵌入認證水印w 2.算法實現瞭水印圖像的盲提取,同時具有對感興趣區域的篡改進行定位併脩複的能力,保障診斷時圖像的真實性和完整性.倣真實驗錶明,該技術具有較彊的數據信息隱藏能力和較好的抗攻擊能力.
침대현유수인방법불능흔호지실현신식은장화인증동시진행적불족,제출일충기우ROI화륜곽파변환역적DI?COM도상수인기술.해기술응용개진적가역차분확전방법재DICOM도상적배경구역감입수인w1,즉환자적은사신식화감흥취구역적자괴균치.수인w1감입후,재도상적륜곽파역중능량교대적고계방향자대적위치상,채용륜곽파계수여8린역균치비교적방법감입인증수인w 2.산법실현료수인도상적맹제취,동시구유대감흥취구역적찬개진행정위병수복적능력,보장진단시도상적진실성화완정성.방진실험표명,해기술구유교강적수거신식은장능력화교호적항공격능력.
A blind watermarking algorithm which combined region of interest (ROI) with Contourlet transform has been proposed in view of the existing watermark algorithms which can not realize simultaneously the information hid?ing and authentication for digital imaging and communications in medicine (DICOM) images. The watermark w1 consisted of patient's private information and the subblocks means of ROI was embedded into background (BG) of DICOM image using a reversible technique based on modified difference expansion. After that authentication water?mark w2 was embedded into the high?order greater energy directional subbands of the first watermarked image's cont?ourlet domain using the method of comparing the contourlet coefficient and its 8?neighborhood mean. The scheme is a blind watermarking algorithm, and is able to locate and recover tampered regions with a very good visual quality to ensure image authenticity and integrity for diagnosis. Theoretical analysis and numerical experiments show that the scheme has a high capacity of data hiding as well as anti?attack ability.