Bibliographic Details
| Title: |
A zero-watermarking approach for DICOM images authentication based on Jacobian model. |
| Authors: |
Tayachi, Mayssa, Nana, Laurent, Pascu, Anca, Benzarti, Faouzi |
| Source: |
Information Security Journal: A Global Perspective; 2024, Vol. 33 Issue 5, p508-527, 20p |
| Subject Terms: |
JACOBIAN matrices, MEDICAL communication, DIGITAL communications, DIAGNOSTIC imaging, DIGITAL image processing |
| Abstract: |
With recent development of tele-diagnosis and tele-medicine, the amount of medical images transferred through the network has been tremendously increased. These medical images are usually in DICOM (Digital Imaging and Communications in Medicine) format. The need of solutions for authentication and confidentiality of such data is critical. This paper proposes a zero-watermarking approach of DICOM images authentication and identification. The novelty of the proposed approach relies on two main points. The first one is the selection approach of image features, called pertinent features, which are used for identification. These features are selected from a large set of image characteristics, using a statistical analysis approach that aims to select the minimal discriminant set of features with the highest resistance against existing attacks. The second one is the key building process based on the combination of information extracted from the header of the DICOM images, pertinent features and a Jacobian model. This key is the one sent to the receiver for the authentication of the medical image. The experiment results show that the proposed approach has very good performance in terms of authentication and identification of medical images and satisfies timing-constraints of medical applications such as telemedicine. [ABSTRACT FROM AUTHOR] |
|
Copyright of Information Security Journal: A Global Perspective is the property of Taylor & Francis Ltd and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) |
| Database: |
Complementary Index |