On the Implementation of a Fragile Medical Image Watermarking Technique Using Saliency and Phase Congruency

On the Implementation of a Fragile Medical Image Watermarking Technique Using Saliency and Phase Congruency

Abhishek Basu, Soumadeb Dutta
ISBN13: 9781522571070|ISBN10: 1522571078|ISBN13 Softcover: 9781522587835|EISBN13: 9781522571087
DOI: 10.4018/978-1-5225-7107-0.ch003
Cite Chapter Cite Chapter

MLA

Basu, Abhishek, and Soumadeb Dutta. "On the Implementation of a Fragile Medical Image Watermarking Technique Using Saliency and Phase Congruency." Intelligent Innovations in Multimedia Data Engineering and Management, edited by Siddhartha Bhattacharyya, IGI Global, 2019, pp. 52-87. https://doi.org/10.4018/978-1-5225-7107-0.ch003

APA

Basu, A. & Dutta, S. (2019). On the Implementation of a Fragile Medical Image Watermarking Technique Using Saliency and Phase Congruency. In S. Bhattacharyya (Ed.), Intelligent Innovations in Multimedia Data Engineering and Management (pp. 52-87). IGI Global. https://doi.org/10.4018/978-1-5225-7107-0.ch003

Chicago

Basu, Abhishek, and Soumadeb Dutta. "On the Implementation of a Fragile Medical Image Watermarking Technique Using Saliency and Phase Congruency." In Intelligent Innovations in Multimedia Data Engineering and Management, edited by Siddhartha Bhattacharyya, 52-87. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7107-0.ch003

Export Reference

Mendeley
Favorite

Abstract

The recent developments of enormous computer networks have invoked insecurities related to copyright theft of digital media. To be precise, the virtual sharing of medical images over networks with a novel desire of improved medical diagnosis has led to the tampering of sensitive patient identity information. In this chapter, the authors have exemplified the need of watermarking with fragile medical image watermarking using saliency and phase congruency. Initially, the saliency and phase congruency methodologies are applied on the original medical image to highlight the object features. Based on the feature map, a mask is generated which segregates the area of interest from the portions containing visual medical information. An encrypted text, containing identity of the patient, is embedded into the area of interest of the image. The results of imperceptibility and fragility criteria are satisfactory towards the implementation of a fragile watermark as the extracted watermark is found to be corrupted upon unfaithful image processing modifications.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.