Table of Contents Author Guidelines Submit a Manuscript
International Journal of Biomedical Imaging
Volume 2018, Article ID 2572431, 11 pages
https://doi.org/10.1155/2018/2572431
Research Article

Medical Image Blind Integrity Verification with Krawtchouk Moments

1Laboratory of Image Science and Technology, Southeast University, Nanjing 210096, China
2College of Data Science, Taiyuan University of Technology, Taiyuan 030024, China
3Centre de Recherche en Information Biomédicale Sino-Français, Nanjing 210096, China
4International Joint Research Laboratory of Information Display and Visualization, Southeast University, Ministry of Education, Nanjing 210096, China

Correspondence should be addressed to Huazhong Shu; nc.ude.ues@tsil.uhs

Received 15 August 2017; Revised 19 November 2017; Accepted 31 May 2018; Published 2 July 2018

Academic Editor: Lizhi Sun

Copyright © 2018 Xu Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Ghadi, L. Laouamer, and T. Moulahi, “Enhancing digital image integrity by exploiting JPEG bitstream attributes,” Journal of Innovation in Digital Ecosystems, vol. 2, no. 1-2, pp. 20–31, 2015. View at Publisher · View at Google Scholar
  2. A. P. Dhawan, Medical Image Analysis, IEEE Press, Hoboken, NJ, USA, 2nd edition, 2011. View at Publisher · View at Google Scholar
  3. D. Bouslimi, G. Coatrieux, M. Cozic, and C. Roux, “A telemedicine protocol based on watermarking evidence for identification of liabilities in case of litigation,” in Proceedings of the IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 506–509, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. L. O. M. Kobayashi and S. S. Furuie, “Proposal for DICOM multiframe medical image integrity and authenticity,” Journal of Digital Imaging, vol. 22, no. 1, pp. 71–83, 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. H. Huang, G. Coatrieux, H. Z. Shu, L. M. Luo, and C. Roux, “Medical image integrity control and forensics based on watermarking – approximating local local modifications and identifying global image alterations,” in Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 8062–8065, Boston, MA, USA, August 2011. View at Publisher · View at Google Scholar
  6. A. N. Azmi, D. Nasien, and F. S. Omar, “Biometric signature verification system based on freeman chain code and k-nearest neighbor,” Multimedia Tools and Applications, vol. 76, no. 14, pp. 15341–15355, 2017. View at Publisher · View at Google Scholar · View at Scopus
  7. G. Coatrieux, H. Maitre, and B. Sankur, “Strict integrity control of biomedical images,” in Proceedings of SPIE, vol. 4314, pp. 229–240, 2011.
  8. “Part 15: Security and System Management Profiles,” in Digital Imaging and Communications in Medicine, DICOM PS 3.15, 2004.
  9. C. Chen, J. Ni, Z. Shen, and Y. . Shi, “Blind forensics of successive geometric transformations in digital images using spectral method: theory and applications,” IEEE Transactions on Image Processing, vol. 26, no. 6, pp. 2811–2824, 2017. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. G. Cao, Y. Zhao, R. Ni, B. Ou, and Y. Wang, “Forensic detection of noise addition in digital images,” Journal of Electronic Imaging, vol. 23, no. 2, p. 023004, 2014. View at Publisher · View at Google Scholar
  11. Z. Shen, J. Ni, and C. Chen, “Blind detection of median filtering using linear and nonlinear descriptors,” Multimedia Tools and Applications, vol. 75, no. 4, pp. 2327–2346, 2016. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Jenadeleh and M. Ebrahimi Moghaddam, “Blind Detection of Region Duplication Forgery Using Fractal Coding and Feature Matching,” Journal of Forensic Sciences, vol. 61, no. 3, pp. 623–636, 2016. View at Publisher · View at Google Scholar · View at Scopus
  13. J.-C. Lee, C.-P. Chang, and W.-K. Chen, “Detection of copy-move image forgery using histogram of orientated gradients,” Information Sciences, vol. 321, pp. 250–262, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. Q. Wang and R. Zhang, “Double JPEG compression forensics based on a convolutional neural network,” EURASIP Journal on Information Security, vol. 2016, no. 1, 2016. View at Google Scholar · View at Scopus
  15. Y. Q. Shi, G. Xuan, D. Zou et al., “Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image,” in Proceedings of International Conference on Multimedia Expo, p. 1, 2005.
  16. S. K. Jena and G. V. V. Krishmna, “Blind steganalysis: estimation of hidden message length,” Journal of Computers, Communications, and Control, vol. 2, pp. 149–158.
  17. N. Provos and P. Honeyman, “Hide and seek: an introduction to steganography,” IEEE Security & Privacy, vol. 1, no. 3, pp. 32–44, 2003. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Sheng, Z. Xin, C. Jian-guo, X. Yong-liang, and L. Qiang, “A blind image detection method for information hiding with double random-phase encoding,” Optics & Laser Technology, vol. 41, no. 5, pp. 590–595, 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. H. Huang, G. Coatrieux, H. Shu, L. Luo, and C. Roux, “Blind integrity verification of medical images,” IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 6, pp. 1122–1126, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. P. T. Yap, R. Paramesran, and S. H. Ong, “Krawtchouk moments as a new set of discrete orthogonal moments for image reconstruction,” in International Joint Conference on Neural Networks, vol. 1, pp. 908–912, 2002.
  21. P.-T. Yap, R. Paramesran, and S.-H. Ong, “Image analysis by Krawtchouk moments,” IEEE Transactions on Image Processing, vol. 12, no. 11, pp. 1367–1377, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  22. B. Kaur and G. Joshi, “Lower Order Krawtchouk Moment-Based Feature-Set for Hand Gesture Recognition,” Advances in Human Computer Interaction, vol. 2016, 2016. View at Google Scholar · View at Scopus
  23. X. Liu, G. Han, J. Wu, Z. Shao, G. Coatrieux, and H. Shu, “Fractional Krawtchouk transform with an application to image watermarking,” IEEE Transactions on Signal Processing, vol. 65, no. 7, pp. 1894–1908, 2017. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. H.-H. Tsai and D.-W. Sun, “Color image watermark extraction based on support vector machines,” Information Sciences, vol. 177, no. 2, pp. 550–569, 2007. View at Publisher · View at Google Scholar · View at Scopus
  25. V. S. Verma, R. K. Jha, and A. Ojha, “Digital watermark extraction using support vector machine with principal component analysis based feature reduction,” Journal of Visual Communication and Image Representation, vol. 31, pp. 75–85, 2015. View at Publisher · View at Google Scholar · View at Scopus
  26. Y. Wang and P. Moulin, “Perfectly secure steganography: capacity, error exponents, and code constructions,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 54, no. 6, pp. 2706–2722, 2008. View at Publisher · View at Google Scholar · View at MathSciNet
  27. D. Zhao, W. Gao, and Y. K. Chan, “Morphological representation of DCT coefficients for image compression,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 12, no. 9, pp. 819–823, 2002. View at Publisher · View at Google Scholar · View at Scopus
  28. C. A. Cocosco, V. Kollokian, R. K.-S. Kwan, A. C. Evans, and BrainWeb, “Online interface to a 3D MRI simulated brain database,” in Proceedings of the Proceeding of 3rd International Conference on Functional Mapping of the Human Brain, vol. 5, p. 475, 1997.
  29. R.-S. Kwan, A. C. Evans, and G. B. Pike, “MRI simulation-based evaluation of image-processing and classification methods,” IEEE Transactions on Medical Imaging, vol. 18, no. 11, pp. 1085–1097, 1999. View at Publisher · View at Google Scholar · View at Scopus
  30. T.-F. Wu, C.-J. Lin, and R. C. Weng, “Probability estimates for multi-class classification by pairwise coupling,” Journal of Machine Learning Research (JMLR), vol. 5, pp. 975–1005, 2004. View at Google Scholar · View at MathSciNet