A Quick Glance at Digital Watermarking in Medical Images Technique Classification, Requirements, Attacks and Application of Tamper Localization
A Quick Glance at Digital Watermarking in Medical Images Technique Classification, Requirements, Attacks and Application of Tamper Localization
net/publication/282567134
CITATIONS READS
3 277
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Siau-Chuin Liew on 06 October 2015.
Syifak Izhar Hisham*, Siau-C huin Liew, & Jasni Mohd Zain
Faculty of Computer Systems and Software Engineering,
Universiti Malaysia Pahang, Pahang, Malaysia
*Corresponding Author: penawar85@gmail.com , +6019-3551106 (Phone)
Abstract
Digital watermarking is seen as a necessary and important field 2.1 Spatial Domain
to be developed since the attacks and manipulations of digital
documents and media are actively done. This paper surveys and
reviews some basic theory about digital watermarking, such as
One of the earliest and most simple techniques is to
the technique classification, requirements and possible attacks embed the watermark information into the LSBs of the image
nowadays. Since all data in medical images are significantly [3, 4]. The watermarks are embedded in the last bit of
important, the demand for the authentication is high. Therefore, selected pixels of an image. Since a change in LSB
this paper also focuses on a specific application of digital image corresponds a change in one unit of image gray value, its
watermarking for medical images which is tamper localization. modification is not perceivable by human eyes [5]. This
technique does not produce serious distortion to the original
Key words: Watermarking, Tamper Localization, Medical image; however, not as robust as transform domain
Image, Tampering Detection, Review techniques and rarely survives various attacks.
Nowadays it is a trend to create, store and distribute Most of the transform domain techniques embed the
data in digital multimedia data format. In general, multimedia watermark information into the transform coefficients of the
brought many benefits to society. For instance, the good cover image. The transform domain techniques produces
quality of the image and voice as well, easily send or receive spectral domains where watermarking can be applied. The
messages and important documents, which make our life most popular techniques in this category are Discrete Cosine
easier and convenience. However, this revolution helps the Transform (DCT), Discrete Wavelet Transform (DWT) and
pirates to exploit these features for their own intended Discrete Fourier Transform (DFT). The advantage of these
purpose illegally [1]. techniques is they can overcome possible compression and
more robust against geometric transformation such as
Therefore, the demand for the authentication methods of rotation, scaling, translation and cropping; but, the
digital media becomes significant issue in order to ensure that disadvantage is they need a certain amount of computation
work have not been tampered with, especially for some cases which take longer time to produce [2].
like national security, medical safety, internet banking and
transfer of military information and forensic investigations. A 3. REQUIREMENTS FOR IMAGE
digital watermarking system considered as a solution for WATERMARKING METHODS
preserve the integrity, confidentiality and the authenticity of
digital media. This paper surveys the classification,
requirements, attacks and the need of the watermarking, Most image watermarking schemes try to meet the
specifically on medical images. following requirements [6, 7, 8]: