- About this Journal ·
- Abstracting and Indexing ·
- Advance Access ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents
Mathematical Problems in Engineering
Volume 2012 (2012), Article ID 757018, 17 pages
A Novel Fractional-Discrete-Cosine-Transform-Based Reversible Watermarking for Healthcare Information Management Systems
1Department of Electrical Engineering, National Central University, Chungli 320-01, Taiwan
2Department of Electronics Engineering, Chung Hua University, Hsinchu 300-12, Taiwan
3Department of Mathematics “Guido Castelnuovo”, Sapienza University of Rome, Piazzale Aldo Moro 2, 00185 Rome, Italy
Received 7 November 2011; Accepted 30 November 2011
Academic Editor: Ming Li
Copyright © 2012 Lu-Ting Ko et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Digital watermarking is a good tool for healthcare information management systems. The well-known quantization-index-modulation- (QIM-) based watermarking has its limitations as the host image will be destroyed; however, the recovery of medical image is essential to avoid misdiagnosis. A transparent yet reversible watermarking algorithm is required for medical image applications. In this paper, we propose a fractional-discrete-cosine-transform- (FDCT-) based watermarking to exactly reconstruct the host image. Experimental results show that the FDCT-based watermarking is preferable to the QIM-based watermarking for the medical image applications.
In the healthcare information systems nowadays, one of the major challenges is a lack of complete access to patients’ health information. Ideally, a comprehensive healthcare information system will provide the medical records including health insurance carriers, which are important for clinical decision making. There is sure to be a risk of misdiagnosis, delay of diagnosis, and improper treatments in case of insufficient medical information available .
Digital watermarking, which is a technique to embed imperceptible, important data called watermark into the host image, has been applied to the healthcare information management systems [2–6]. However, it might cause the distortion problem regarding the recovery of the original host image. In order to protect the host image from being distorted, digital watermarking with legal and ethical functionalities is desirable especially for the medical images applications [7–10]. Specifically, any confidential data such as patients’ diagnosis reports can be used as watermark and then embedded in the host image by using digital watermarking with an authorized utilization. Thus, digital watermarking can be used to facilitate healthcare information management systems.
Discrete cosine transform (DCT) has been adopted in various international standards, for example, JPEG, MPEG, and H.264 . The miscellaneous DCT algorithms and architectures have been proposed [12–15]. The fractional discrete cosine transform (FDCT) [16, 17], which is a generalized DCT, is yet more applicable in the digital signal processing applications. In this paper, we propose a novel algorithm called the fractional-discrete-cosine-transform (FDCT-) based watermarking for the healthcare information management applications. In addition, the advantage of FDCT is to take account of the phenomena of image processing [18, 19], which is fundamental in nonlinear time series [20, 21] and fractal time series [22–25]. The remainder of the paper proceeds as follows. In Section 2, the type I fractional discrete cosine transform is reviewed. Section 3 describes the half discrete cosine transform. The proposed FDCT-based watermarking and experimental results on various medical images are presented in Section 4. The architecture of the half-DCT-based watermarking processor implemented by using FPGA (field programmable gate array) is given in Section 5. The conclusion can be found in Section 4.
2. Review of Type I Fractional Discrete Cosine Transform
For the sake of simplicity, let us take the 8-point, type I forward DCT as an example. The corresponding matrix can be expressed as follows [16, 17] where It can be diagonalized by where U is an orthonormal matrix obtained from the eigenvectors of , which is given by
is a diagonal matrix composed of the corresponding eigenvalues, which is given by and is the transpose matrix of U. Based on (2.3), the square of the DCT matrix can be written as Similarly, we have where is a real fraction, , , and , is an element of generating sequence (GS) , and is an integer for .
3. Half Discrete Cosine Transform
The half-DCT, that is, the FDCT with is obtained by where The matrix , obtained by combining the 8-point half-DCT of and is defined as where is the orthonormal matrix given by Let be defined as we have It is noted that and can be rewritten as where According to (3.7), (3.9) and (3.10) we have From (3.11), we have Assume that Thus, and can be obtained from as follows:
4. The Proposed Fractional-Discrete-Cosine-Transform-Based Watermarking
Both transparency and recovery of the host image are required for the medical applications. As the conventional quantization-index-modulation- (QIM-)  based watermarking is irreversible, we propose a novel FDCT- based algorithm for reversible watermarking.
4.1. Quantization Index Modulation
Figure 1 depicts the conventional QIM-based watermarking . In which, , and denote the watermark, the secret key, the coded watermark, the host image, and the watermarked image, respectively. For the sake of simplicity, let us consider the monochromatic images with 256 grey levels, and the size of the watermark is one-fourth of that of the host image. The secret key is used to map the binary representation of the watermark onto the host image, for example, Figure 2 depicts the binary representation of a watermark pixel that is mapped onto a segment using a given secret key.
Figure 3 shows the operation of the QIM block, in which the grey levels of the host image, , ranging between and will be quantized into if the corresponding pixels of the coded watermark, , are bit 1; otherwise they are quantized into if the corresponding pixels are bit 0. For the grey levels of that are between and , they will be quantized into or depending on the corresponding pixels of being bit 1 or 0, respectively. Note that denotes the quantization step, , and is an integer number.
It is noted that the watermarked image, , can be written as where () denotes the position index of pixels, and the coded watermark, , can be obtained by as shown in Figure 4. Together with the secret key, , the watermark, , can be exactly extracted from the watermarked image, , as shown in Figure 5.
4.2. Proposed FDCT-Based Watermarking
According to (3.12), the half-DCT can be used to combine two real valued signals into a single, complex-valued signal. Let and in (3.12) be the host image and the watermark, respectively, and z the watermarked image. The watermark and host image can be extracted from z by using (3.14). Figure 6 depicts the proposed FDCT-based watermarking, where , and are the watermark, the host image, the secret key, the QIM watermarked image, and the watermarked images, and , respectively. According to (3.12), the half-DCT consists of two matrix multiplications as shown in Figure 7, where and are the half-DCT coefficient matrices for (3.9) and (3.10), respectively.
The original host image, , and watermark, , can be exactly reconstructed from the watermarked images: and as shown in Figures 8 and 9, where is the corresponding half-DCT matrix and is the inverse DCT matrix.
4.3. Experimental Results on Medical Images
The proposed FDCT-based watermarking algorithm has been evaluated on various medical images. Figure 10 shows the test images with 256 grey levels, namely, spine, chest, fetus and head obtained by magnetic resonance image (MRI), X-ray, ultrasound, and computed tomography (CT), respectively, which are used as host images. Figure 11 shows the Lena image used as watermark with 256 grey levels.
The peak signal-to-noise ratio (PSNR) is used to evaluate the image quality [4, 8, 26], which is defined as where denotes the mean square error. Figures 12, 13, 14, and 15 show the PSNR of the QIM watermarked image and FDCT watermarked images and of spine (MRI), chest (X-ray), fetus (ultrasonic), and head (CT) at various QIM quantization steps . Figure 16 shows the QIM watermarked images (first row), the FDCT watermarked images, (second row) and (third row), and two extracted watermarks from the and watermarked images (fourth row) with QIM quantization step . It is noted that the FDCT watermarked images are more transparent than conventional QIM watermarked images, and the block effect of the FDCT-based watermarking is eliminated. Table 1 shows the comparison between this work and the related watermarking algorithms [8, 26].
5. FPGA Implementation of Half-DCT-Based Watermarking Processor
According to the data flow of the half-DCT shown in Figure 7, the architecture of the proposed 8-point half-DCT processor is shown in Figure 17. In which, the matrix operation block performs the matrix-vector multiplications of , , and shown in Figure 18, and the latch and CLA perform the addition operations of and .
According to the data flow of the inverse half-DCT shown in Figure 9, the architecture of the proposed 8-point inverse half-DCT processor is shown in Figure 19. In which, the matrix operation block performs the matrix-vector multiplications of and . In the proposed 8-point inverse half-DCT processor as shown in Figure 19, the latch array storing data for matrix operation is shown in Figure 20.
The platform for architecture development and verification has been designed as well as implemented in order to evaluate the development cost. The architecture has been implemented on the Xilinx FPGA emulation board . The Xilinx Spartan-3 FPGA has been integrated with the microcontroller (MCU) and I/O interface circuit (USB 2.0) to form the architecture development and verification platform. Figure 21 depicts block diagram and circuit board of the architecture development and evaluation platform, which can perform the prototype of special processor for half-DCT-based watermarking. In the architecture development and evaluation platform, the microcontroller reads data and commands from PC and writes the results back to PC by USB 2.0; the Xilinx Spartan-3 FPGA implements the proposed half-DCT processor. The hardware code written in Verilog is for PC with the ModelSim simulation tool  and Xilinx ISE smart compiler . It is noted that the throughput can be improved by using the proposed architecture while the computation accuracy is the same as that obtained by using Matlab technical computing tool  with the same word length. Thus, the proposed programmable half-DCT architecture is able to improve the power consumption and computation speed significantly. Moreover, the reusable intellectual property (IP) half-DCT/IDCT core has also been implemented in Verilog hardware description language  for the hardware realization. All the control signals are internally generated on-chip. The proposed half-DCT processor provides both high throughput and low gate count.
In this paper, a novel algorithm called the FDCT-based reversible watermarking has been proposed for medical image watermarking. The transparency of the watermarked image can be increased by taking advantage of the proposed watermarking. As the host image can be exactly reconstructed, it is suitable especially for the medical image applications. In addition, the elimination of block effect avoids detecting QIM coded watermarked image. Thus, the FDCT-based reversible watermarking is preferable to facilitate data management in healthcare information management systems.
- H. M. Chao, C. M. Hsu, and S. G. Miaou, “A data-hiding technique with authentication, integration, and confidentiality for electronic patient records,” IEEE Transactions on Information Technology in Biomedicine, vol. 6, no. 1, pp. 46–53, 2002.
- U. R. Acharya, D. Anand, P. S. Bhat, and U. C. Niranjan, “Compact storage of medical images with patient information,” IEEE Transactions on Information Technology in Biomedicine, vol. 5, no. 4, pp. 320–323, 2001.
- X. Kong and R. Feng, “Watermarking medical signals for telemedicine,” IEEE Transactions on Information Technology in Biomedicine, vol. 5, no. 3, pp. 195–201, 2001.
- A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris, “Multiple image watermarking applied to health information management,” IEEE Transactions on Information Technology in Biomedicine, vol. 10, no. 4, pp. 722–732, 2006.
- S. Y. Chen and Q. Guan, “Parametric shape representation by a deformable NURBS model for cardiac functional measurements,” IEEE Transactions on Biomedical Engineering, vol. 58, no. 3, part 1, pp. 480–487, 2011.
- M. Li, “Four transformation patterns of two-dimensional function on wavelet basis,” Int. J. Engineering and Interdisciplinary Mathematics, vol. 1, no. 2, pp. 107–110, 2009.
- L. T. Ko, J. E. Chen, H. C. Hsin, Y. S. Shieh, and T. Y. Sung, “Haar-wavelet-based just noticeable distortion model for transparent watermark,” Mathematical Problems in Engineering, vol. 2012, Article ID 635738, 14 pages, 2012.
- L. T. Ko, J. E. Chen, Y. S. Shieh, H. C. Hsin, and T. Y. Sung, “Nested quantization index modulation for reversible watermarking and its application to healthcare information management systems,” Computational and Mathematical Methods in Medicine, vol. 2012, Article ID 839161, 8 pages, 2012.
- S. Y. Chen, H. Tong, Z. Wang, S. Liu, M. Li, and B. Zhang, “Improved generalized belief propagation for vision processing,” Mathematical Problems in Engineering, vol. 2011, Article ID 416963, 12 pages, 2011.
- S. Y. Chen, H. Tong, and C. Cattani, “Markov models for image labeling,” Mathematical Problems in Engineering, vol. 2012, Article ID 814356, 18 pages, 2012.
- K. R. Rao and P. Yip, Discrete Cosine Transform: Algorithms, Advantages, Applications, Academic Press, New York, NY, USA, 1990.
- L. T. Ko, J. E. Chen, H. C. Hsin, Y. S. Shieh, and T. Y. Sung, “A unified algorithm for subband-based discrete cosine transform,” Mathematical Problems in Engineering, vol. 2012, Article ID 912194, 31 pages, 2012.
- T. Y. Sung, Y. S. Shieh, and H. C. Hsin, “An efficient VLSI linear array for DCT/IDCT using subband decomposition algorithm,” Mathematical Problems in Engineering, vol. 2010, Article ID 185398, 21 pages, 2010.
- H. Huang, T. Y. Sung, and Y. S. Shieh, “A novel VLSI linear array for 2-D DCT/IDCT,” in Proceedings of the 3rd International Congress on Image and Signal Processing (CISP '10), vol. 8, pp. 3686–3690, Yantai, China, October 2010.
- T. Y. Sung, “Memory-efficient and high-performance 2-D DCT and IDCT processors based on CORDIC rotation,” WSEAS Transactions on Electronics, vol. 3, no. 12, pp. 565–574, 2006.
- S. C. Pei and M. H. Yeh, “The discrete fractional cosine and sine transforms,” IEEE Transactions on Signal Processing, vol. 49, no. 6, pp. 1198–1207, 2001.
- G. Cariolaro, T. Erseghe, and P. Kraniauskas, “The fractional discrete cosine transform,” IEEE Transactions on Signal Processing, vol. 50, no. 4, pp. 902–911, 2002.
- Z. Liao, S. Hu, M. Li, and W. Chen, “Noise estimation for single-slice sinogram of low-dose X-Ray computed tomography using homogenous patch,” Mathematical Problems in Engineering, vol. 2012, Article ID 696212, 16 pages, 2012.
- Z. Liao, S. Hu, D. Sun, and W. Chen, “Enclosed laplacian operator of nonlinear anisotropic diffusion to preserve singularities and delete isolated points in image smoothing,” Mathematical Problems in Engineering, vol. 2011, Article ID 749456, 15 pages, 2011.
- C. Cattani and A. Kudreyko, “Application of periodized harmonic wavelets towards solution of eigenvalue problems for integral equations,” Mathematical Problems in Engineering, vol. 2010, Article ID 570136, 8 pages, 2010.
- M. Li and W. Zhao, “Visiting power laws in cyber-physical networking systems,” Mathematical Problems in Engineering, vol. 2012, Article ID 302786, 13 pages, 2012.
- M. Li, “Fractal time series—a tutorial review,” Mathematical Problems in Engineering, vol. 2010, Article ID 157264, 26 pages, 2010.
- C. Cattani, “Harmonic wavelet approximation of random, fractal and high frequency signals,” Telecommunication Systems, vol. 43, no. 3-4, pp. 207–217, 2010.
- M. Li, S. C. Lim, and S. Chen, “Exact solution of impulse response to a class of fractional oscillators and its stability,” Mathematical Problems in Engineering, vol. 2011, Article ID 657839, 9 pages, 2011.
- E. G. Bakhoum and C. Toma, “Specific mathematical aspects of dynamics generated by coherence functions,” Mathematical Problems in Engineering, vol. 2011, Article ID 436198, 10 pages, 2011.
- B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1423–1443, 2001.
- SMIMS Technology Corp, http://www.smims.com.
- Cadence design systems, http://www.cadence.com/products/pages/default.aspx.
- Xilinx FPGA products, http://www.xilinx.com/products/.
- MATLAB—The language of technical computing, http://www.mathworks.com/products/matlab/index.html.
- D. E. Thomas and P. R. Moorby, The Verilog Hardware Description Language, Baker & Taylor Books, 5th edition, 2002.