Robust Zero-watermarking Algorithm for Medical Images Based on GFTT-KAZE and DCT
As medical technology advances, medical images are becoming increasingly important in diagnosis and therapy. However, due to the potential repercussions of leaking or tampering, which could jeopardize patient privacy and treatment, the protection and management of medical images has become a critica...
Saved in:
| Published in | 2023 26th ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter) pp. 290 - 297 |
|---|---|
| Main Authors | , , , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
05.07.2023
|
| Subjects | |
| Online Access | Get full text |
| DOI | 10.1109/SNPD-Winter57765.2023.10223753 |
Cover
| Summary: | As medical technology advances, medical images are becoming increasingly important in diagnosis and therapy. However, due to the potential repercussions of leaking or tampering, which could jeopardize patient privacy and treatment, the protection and management of medical images has become a critical concern. As a result, ensuring the encryption and confidentiality of medical images has become critical. Based on GFTT-KAZE-DCT, this research provides a strong digital watermarking system for medical photos. To begin, the GFTT (Good Features to Track) method is used to extract feature points from medical pictures. To describe the feature points, the KAZE method is used, resulting in a feature descriptor matrix. Perceptual hashing is used to further process the initial image. The feature matrix created by the KAZE descriptor is then subjected to DCT (Discrete Cosine Transform). The coefficient matrix generated by DCT is used to acquire the desired eigenvector. To better resist geometric and conventional attacks, the watermark is flexibly integrated with chaos encryption technology, hash function, and the "third-party concept." In conclusion, our algorithm provides an effective way for protecting the privacy and integrity of medical images. It incorporates advanced techniques such as GFTT-KAZE-DCT and perceptual hash, and it can withstand a variety of attacks. |
|---|---|
| DOI: | 10.1109/SNPD-Winter57765.2023.10223753 |