Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2012 Dec;25(6):751-63.
doi: 10.1007/s10278-012-9518-y.

An improved tamper detection and localization scheme for volumetric DICOM images

Affiliations

An improved tamper detection and localization scheme for volumetric DICOM images

Wenbo Dou et al. J Digit Imaging. 2012 Dec.

Abstract

The development of teleradiology brings the convenience of global medical record access along with the concerns over the security of medical images transmitted over the open network. With the prevailing adoption of three-dimensional (3-D) imaging modalities, it is vital to develop a security mechanism to provide large volumes of medical images with privacy and reliability. This paper presents the development of a new and improved method of implementing tamper detection and localization based on a fully reversible digital watermarking scheme for the protection of volumetric DICOM images. This tamper detection and localization method utilizes the 3-D property of volumetric data to achieve much faster processing time at both sender and receiver sides without compromising tamper localization accuracy. The performance of the proposed scheme was evaluated by using sample volumetric DICOM images. Results show that the scheme achieved on average about 65 % and 72 % reduction in watermarking and dewatermarking processing time, respectively. For cases where the images had been tampered, it is possible to detect and localize the tampered areas with improved localization resolution in the images using the scheme.

PubMed Disclaimer

Figures

Fig. 1
Fig. 1
The watermarking flowchart
Fig. 2
Fig. 2
The dewatermarking flowchart
Fig. 3
Fig. 3
The integrity embedding structure
Fig. 4
Fig. 4
Screenshots of example results of a successful watermarking using MRI heart dataset and b successful dewatermarking using the same dataset. The right image of (a) and the left image of (b) are the same
Fig. 5
Fig. 5
Screenshot of sample result of successful tamper detection and localization with the tampered slices 1, 2, 5, and 8 enlarged. Tampered regions are highlighted with the red boxes
Fig. 6
Fig. 6
Sample systematic testing results. Slices 1, 2, 5, and 8 of the MRI heart image set with tamper being localized using the new method. The red box in the image indicates where tamper has occurred
Fig. 7
Fig. 7
a Slice 1 of the MRI heart image set with tamper being localized using the 2-D method; each red box has the size of 18 by 18 pixels. b Slice 1 of the MRI heart image set with tamper being localized using the new method; each red box has the size of 9 by 9 pixels
Fig. 8
Fig. 8
Real case tamper localization results. a Watermarked slices 13 and 14 of the knee MR image set; b watermarked slices 13 and 14 of the same set with tamper present; c slices 13 and 14 with tamper being localized using the new method
Fig. 9
Fig. 9
a Slice 14 of the knee MR image set with tamper being localized using the 2-D method; each red box has the size of 18 by 18 pixels; b slice 14 of the knee MR image set with tamper being localized using the new method; each red box has the size of 9 by 9 pixels

Similar articles

Cited by

References

    1. Digital Imaging and Communications in Medicine (DICOM) Standard. Available at [Online]. Available: http://medical.nema.org/dicom/2006/2006
    1. Tan CK, Ng JC, Xu X, Poh CL, Guan YL, Sheah K. Security protection of dicom medical images using dual-layer reversible watermarking with tamper detection capability. Journal of Digital Imaging. 2011;24:528–540. doi: 10.1007/s10278-010-9295-4. - DOI - PMC - PubMed
    1. Zhou XQ, Huang HK, Lou SL. Authenticity and integrity of digital mammography images. IEEE Trans Medical Imaging. 2001;20:784–791. doi: 10.1109/42.938246. - DOI - PubMed
    1. Macq B, Dewey F. Trusted headers for medical images. Erlangen: DFG VIII-DII Watermarking Workshop; 1999.
    1. Zain JM, Fauzi ARM: Medical image watermarking with tamper detection and recovery. Proc. Engineering in Medicine and Biology Society, 2006 EMBS ‘06 28th Annual International Conference of the IEEE: City, Aug. 30 2006-Sept. 3 2006 Year - PubMed