Abstract

Digital medical system not only facilitates the storage and transmission of medical information but also brings information security problems. Aiming at the security of medical images, a robust zero watermarking algorithm for medical images based on Zernike-DCT is proposed. The algorithm first uses a chaotic logic sequence to preprocess and encrypt the watermark, then performs edge detection and Zernike moment processing on the original medical image to get the accurate edge points, and then performs discrete cosine transform (DCT) on them to get the feature vector. Finally, it combines perceptual Hash and zero watermark technology to generate the key to complete the watermark embedding and extraction. The algorithm has good robustness to conventional and geometric attacks, strong antinoise ability, high positioning accuracy, and processing efficiency and is superior to the classical edge detection algorithm in extraction effect. It is a stable and reliable image edge detection algorithm.

Highlights

  • In the past two decades, the advent of the era of big data has allowed the explosive development of computer science technology and multimedia communication technology, which has accelerated the digital development process of the healthcare system [1]

  • Medical digital watermarking images are often subject to both conventional attacks and geometric attacks [26]. erefore, to improve the security of medical information, this paper proposes a zero watermarking algorithm of medical images based on Zernike-discrete cosine transform (DCT)

  • Edge detection and Zernike moment processing are performed on the medical image, discrete cosine transform is performed, and the 32-bit coefficient matrix is selected as the feature vector of the medical image to embed and extract the watermark. e watermark is encrypted by chaos, and zero watermark [27] and blind extraction are realized by using Perceptual Hashing technology [28] and cryptography principle. e algorithm solves the contradiction between invisibility and robustness, and can well resist conventional attacks and geometric attacks, especially rotation attacks. e robustness of the algorithm is very good, and the security of the watermark is improved

Read more

Summary

Introduction

In the past two decades, the advent of the era of big data has allowed the explosive development of computer science technology and multimedia communication technology, which has accelerated the digital development process of the healthcare system [1]. Erefore, to improve the security of medical information, this paper proposes a zero watermarking algorithm of medical images based on Zernike-DCT. In this scheme, edge detection and Zernike moment processing are performed on the medical image, discrete cosine transform is performed, and the 32-bit coefficient matrix is selected as the feature vector of the medical image to embed and extract the watermark. E first section mainly introduces the development background of medical images in the era of big data, the importance of security and privacy, and the in-depth research on digital watermarking algorithms by experts in recent years. Is paper consists of five sections: Introduction, Fundamental eory, Watermarking Algorithm, Results and Discussion, and Conclusion. e first section mainly introduces the development background of medical images in the era of big data, the importance of security and privacy, and the in-depth research on digital watermarking algorithms by experts in recent years. e second section mainly introduces the fundamental theory of the algorithm proposed in this paper, including Canny edge detection, Zernike moment, and Logistic mapping. e third section mainly introduces the specific implementation process of the algorithm proposed in this paper, including watermark encryption, watermark embedding, watermark extraction and decryption, and watermark evaluation methods. e fourth section mainly introduces the results and discussion, including the experimental platform and materials, display of the data and images, and analysis of the experimental results. e fifth section mainly summarizes the main ideas and advantages of this algorithm, which has good robustness, imperceptibility, stability, and reliability

The Fundamental Theory
Watermarking Algorithm
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call