Table of Contents Author Guidelines Submit a Manuscript
Computational and Mathematical Methods in Medicine
Volume 2012 (2012), Article ID 839161, 8 pages
http://dx.doi.org/10.1155/2012/839161
Research Article

Nested Quantization Index Modulation for Reversible Watermarking and Its Application to Healthcare Information Management Systems

1Department of Electrical Engineering, National Central University, Chungli 320-01, Taiwan
2Department of Electronics Engineering, Chung Hua University, Hsinchu 300-12, Taiwan
3Department of Computer Science and Information Engineering, National United University, Miaoli 360-03, Taiwan

Received 25 August 2011; Accepted 15 September 2011

Academic Editor: Shengyong Chen

Copyright © 2012 Lu-Ting Ko et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997. View at Google Scholar · View at Scopus
  2. M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia data-embedding and watermarking technologies,” Proceedings of the IEEE, vol. 86, no. 6, pp. 1064–1087, 1998. View at Google Scholar · View at Scopus
  3. M. Barni, F. Bartolini, and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Transactions on Image Processing, vol. 10, no. 5, pp. 783–791, 2001. View at Publisher · View at Google Scholar · View at Scopus
  4. G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking digital image and video data,” IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20–46, 2000. View at Publisher · View at Google Scholar · View at Scopus
  5. C. I. Podilchuk and E. J. Delp, “Digital watermarking: algorithm and application,” IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 33–46, 2001. View at Publisher · View at Google Scholar · View at Scopus
  6. C. S. Lu and H. Y. M. Liao, “Multipurpose watermarking for image authentication and protection,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1579–1592, 2001. View at Publisher · View at Google Scholar · View at Scopus
  7. S. Erküçük, S. Krishnan, and M. Zeytinoǧlu, “A robust audio watermark representation based on linear chirps,” IEEE Transactions on Multimedia, vol. 8, no. 5, Article ID 1703507, pp. 925–936, 2006. View at Publisher · View at Google Scholar · View at Scopus
  8. F. Chuhong, D. Kundur, and R. H. Kwong, “Analysis and design of secure watermark-based authentication systems,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 43–55, 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. Y. Feng, N. H. Ling, G. Lin, W. Zhe, and W. J. Zhang, “Transmitter identification with watermark signal in DVB-H signal frequency network,” IEEE Transactions on Broadcasting, vol. 55, no. 3, Article ID 5170023, pp. 663–667, 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. A. Wakatani, “Digital watermarking for ROI medical images by using compressed signature image,” in Proceedings of the 35th Annual Hawaii International Conference on System Sciences, (HICSS '02), pp. 2043–2048, Big Island, Hawaii, USA, January 2002.
  11. L. T. Ko, J. E. Chen, H. C. Hsin, Y. S. Shieh, and T. Y. Sung, “Haar wavelet based just noticeable distortion model for transparent watermark,” Mathematical Problems in Engineering, vol. 2012, Article ID 635738, 14 pages, 2012. View at Google Scholar
  12. S. Y. Chen and Q. Guan, “Parametric shape representation by a deformable NURBS model for cardiac functional measurements,” IEEE Transactions on Biomedical Engineering, vol. 58, no. 3, pp. 480–487, 2011. View at Publisher · View at Google Scholar
  13. G. Coatrieux, H. Maître, B. Sankur, Y. Rolland, and R. Collorec, “Relevance of watermarking in medical imaging,” in Proceedings of the EEE/EMBS Region 8th International Conference on Information Technology Applications in Biomedicine, (ITAB-ITIS '00), pp. 250–255, Arlington, Va, USA, November 2000. View at Scopus
  14. A. Bruckmann and A. Uhl, “Selective medical image compression using wavelet techniques,” Journal of Computing and Information Technology, vol. 6, no. 2, pp. 203–213, 1998. View at Google Scholar
  15. H. M. Chao, C. M. Hsu, and S. G. Miaou, “A data-hiding technique with authentication, integration, and confidentiality for electronic patient records,” IEEE Transactions on Information Technology in Biomedicine, vol. 6, no. 1, pp. 46–53, 2002. View at Publisher · View at Google Scholar · View at Scopus
  16. U. R. Acharya, D. Anand, P. S. Bhat, and U. C. Niranjan, “Compact storage of medical images with patient information,” IEEE Transactions on Information Technology in Biomedicine, vol. 5, no. 4, pp. 320–323, 2001. View at Publisher · View at Google Scholar · View at Scopus
  17. X. Kong and R. Feng, “Watermarking medical signals for telemedicine,” IEEE Transactions on Information Technology in Biomedicine, vol. 5, no. 3, pp. 195–201, 2001. View at Publisher · View at Google Scholar · View at Scopus
  18. A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris, “Multiple image watermarking applied to health information management,” IEEE Transactions on Information Technology in Biomedicine, vol. 10, no. 4, pp. 722–732, 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. H. M. Chao, C. M. Hsu, and S. G. Miaou, “A data-hiding technique with authentication, integration, and confidentiality for electronic patient records,” IEEE Transactions on Information Technology in Biomedicine, vol. 6, no. 1, pp. 46–53, 2002. View at Publisher · View at Google Scholar · View at Scopus
  20. S. G. Miaou, C. M. Hsu, Y. S. Tsai, and H. M. Chao, “A secure data hiding technique with heterogeneous data-combining capability for electronic patient records,” in Proceedings of the 22nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, vol. 1, pp. 280–283, Chicago, Ill, USA, July 2000. View at Scopus
  21. L. T. Ko, J. E. Chen, Y. S. Shieh, M. Scalia, and T. Y. Sung, “A novel fractional discrete cosine transform based reversible watermarking for healthcare information management systems,” Mathematical Problems in Engineering, vol. 2012, Article ID 757018, 2012. View at Google Scholar
  22. F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1079–1107, 1999. View at Publisher · View at Google Scholar · View at Scopus
  23. R. J. Anderson and F. A. P. Petitcolas, “On the limits of steganography,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 474–481, 1998. View at Google Scholar · View at Scopus
  24. E. T. Lin and E. J. Delp, “A review of fragile image watermarks,” in Proceedings of the ACM Multimedia Security Workshop, pp. 47–51, Orlando, Fla, USA, 1999.
  25. S. Y. Chen, H. Tong, and C. Cattani, “Markov models for image labeling,” Mathematical Problems in Engineering, vol. 2012, Article ID 814356, 18 pages, 2012. View at Google Scholar
  26. S. Y. Chen, H. Tong, Z. Wang, S. Liu, M. Li, and B. Zhang, “Improved generalized belief propagation for vision processing,” Mathematical Problems in Engineering, vol. 2011, Article ID 416963, 12 pages, 2011. View at Publisher · View at Google Scholar
  27. E. G. Bakhoum and C. Toma, “Specific mathematical aspects of dynamics generated by coherence functions,” Mathematical Problems in Engineering, vol. 2011, Article ID 436198, 10 pages, 2011. View at Publisher · View at Google Scholar
  28. E. G. Bakhoum and C. Toma, “Dynamical aspects of macroscopic and quantum transitions due to coherence function and time series events,” Mathematical Problems in Engineering, vol. 2010, Article ID 428903, 13 pages, 2010. View at Publisher · View at Google Scholar
  29. M. Li, C. Cattani, and S. Y. Chen, “Viewing sea level by a one-dimensional random function with long memory,” Mathematical Problems in Engineering, vol. 2011, Article ID 654284, 13 pages, 2011. View at Publisher · View at Google Scholar
  30. M. Li, “Four transformation patterns of two-dimensional function on wavelet basis,” International Journal Engineering and Interdisciplinary Mathematics, vol. 1, no. 2, pp. 107–110, 2009. View at Google Scholar
  31. B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1423–1443, 2001. View at Publisher · View at Google Scholar · View at Scopus