{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T02:42:39Z","timestamp":1722912159686},"reference-count":38,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Computer Vision"],"published-print":{"date-parts":[[2013,2]]},"abstract":"In developing countries such as India, transmission of medical images over the network is essential for providing health services to rural\/remote population. During this transmission, a small distortion in the medical image may lead to wrong conclusions. Thus, arises the need to embed some authentication information in medical images to authenticate transmitted image. In this study, a blind and fragile watermarking technique based on Weber's law is proposed. Here, fragile watermark is inserted by quantising intensity of selected pixels in a medical image. As the proposed technique is fragile, it detects even a small change made to watermarked image and locates blocks where distortion has been made. Besides being able to detect all malicious changes that affect the quality of watermarked image, it is tolerant to image compression, which is essential to transmit images over the network. The proposed technique is highly imperceptible as the watermark is inserted by modifying intensity of dark pixels selected using Weber's law. An extension of the proposed technique is also given to enhance its capacity. Experimental results on standard medical image database prove the efficacy of the proposed method over existing works.<\/jats:p>","DOI":"10.1049\/iet-cvi.2012.0109","type":"journal-article","created":{"date-parts":[[2013,5,15]],"date-time":"2013-05-15T00:02:53Z","timestamp":1368576173000},"page":"9-19","source":"Crossref","is-referenced-by-count":37,"title":["Fragile and blind watermarking technique based on Weber's law for medical image authentication"],"prefix":"10.1049","volume":"7","author":[{"given":"Ekta","family":"Walia","sequence":"first","affiliation":[{"name":"Department of Computer Science South Asian University New Delhi India"}]},{"given":"Anu","family":"Suneja","sequence":"additional","affiliation":[{"name":"MMICT & BM (MCA) Department M.M. University Mullana Ambala India"}]}],"member":"265","published-online":{"date-parts":[[2013,2]]},"reference":[{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/76.993436"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809370"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.828418"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1049\/ip\u2010vis:20020168"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1117\/1.1557156"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/83.967402"},{"issue":"3","key":"e_1_2_9_8_2","first-page":"63","article-title":"Secure patient information and privacy in medical imaging","volume":"8","author":"Yang M.","year":"2010","journal-title":"J. Syst. Cybern. Inf."},{"key":"e_1_2_9_9_2","unstructured":"Coatrieux G. Maitre H. Sankur B. Rolland Y. Collorec R.: \u2018Relevance of watermarking in medical imaging\u2019.IEEE Int. Conf. on Information Technology Applications in BioMedicine 2000 pp.250\u2013255"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"issue":"4","key":"e_1_2_9_11_2","first-page":"24","article-title":"A study on watermarking schemes for image authentication","volume":"2","author":"Radharani S.","year":"2010","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_2_9_12_2","first-page":"613","article-title":"A survey of watermarking algorithms for image authentication","volume":"6","author":"Christian R.","year":"2002","journal-title":"EURASIP J. Appl. Signal Process."},{"key":"e_1_2_9_13_2","doi-asserted-by":"crossref","unstructured":"Wu X. Liang X. Liu H. Huang J. Qiu G.: \u2018Reversible semi fragile image authentication using zernike moments and integer wavelet transform\u2019.IEEE Int. Conf. on Multimed. Expo 2007 pp.2122\u20132125","DOI":"10.1007\/11787952_11"},{"key":"e_1_2_9_14_2","doi-asserted-by":"crossref","unstructured":"Lin E.T. Podilchuk C.I. Delp E.J.: \u2018Detection of image alterations using semi\u2010fragile watermarks\u2019.Proc. SPIE Int. Conf. on Security and Watermarking of Multimedia Contents 2000 pp.152\u2013163","DOI":"10.1117\/12.384969"},{"key":"e_1_2_9_15_2","first-page":"1471","article-title":"ICA for watermarking digital images","volume":"4","author":"Bounkong S.","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.638587"},{"key":"e_1_2_9_17_2","first-page":"437","volume-title":"IEEE Proc. ICIP","author":"Wu M.","year":"1998"},{"issue":"3","key":"e_1_2_9_18_2","first-page":"299","article-title":"Content based watermarking for image authentication using independent component analysis","volume":"32","author":"Parmeswaran L.","year":"2008","journal-title":"J. Inf."},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2005.855556"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.384968"},{"key":"e_1_2_9_21_2","first-page":"662","article-title":"Lossless watermarking based authentication system for medical images","volume":"1","author":"Samia B.","year":"2007","journal-title":"World Acad. Sci. Eng. Technol."},{"key":"e_1_2_9_22_2","first-page":"31","volume-title":"Pan\u2010Sydney Area Workshop on Visual Information Processing (VIP2001)","author":"Lim Y.","year":"2001"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2006.875655"},{"key":"e_1_2_9_24_2","unstructured":"Jasni Z. Malcolm C.: \u2018Security in telemedicine: issues in watermarking medical images\u2019.Third Int. Conf.: Science of Electronics Technologies of Information and Telecommunications 2005 pp.27\u201331"},{"key":"e_1_2_9_25_2","volume-title":"Watermarking techniques spatial domain digital rights seminar","author":"El\u2010Gayyar M.","year":"2006"},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11760\u2010010\u20100167\u20107"},{"key":"e_1_2_9_27_2","first-page":"51","volume-title":"Fundamentals of digital image processing","author":"Jain A.K.","year":"1989"},{"key":"e_1_2_9_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.155"},{"key":"e_1_2_9_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.05.004"},{"key":"e_1_2_9_30_2","unstructured":"Barre S.: \u2018DICOM Medicalimage sampleshttp:\/\/barre.nom.fr\/medical\/samples\/"},{"key":"e_1_2_9_31_2","unstructured":"Springer Medical images databasehttp:\/\/www.springerimages.com\/ImagesMD\/"},{"key":"e_1_2_9_32_2","unstructured":"http:\/\/www.brothersoft.com\/paint\u2010shop\u2010pro\u2010247267.html"},{"key":"e_1_2_9_33_2","first-page":"3274","volume-title":"Proc. 28th IEEE EMBS Annual Int. Conf.","author":"Mohammad S.N.","year":"2006"},{"key":"e_1_2_9_34_2","doi-asserted-by":"publisher","DOI":"10.2174\/1874120701004010093"},{"key":"e_1_2_9_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP.2007.4381197"},{"key":"e_1_2_9_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_25"},{"key":"e_1_2_9_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958300"},{"key":"e_1_2_9_38_2","first-page":"3","volume-title":"Proc. the Australian Pattern Recognition, WDIC 2005","author":"Planitz B.","year":"2005"},{"key":"e_1_2_9_39_2","unstructured":"http:\/\/www.ob\u2010ultrasound.net\/joewoo"}],"container-title":["IET Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-cvi.2012.0109","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-cvi.2012.0109","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-cvi.2012.0109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T17:16:51Z","timestamp":1694711811000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/iet-cvi.2012.0109"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,2]]}},"alternative-id":["10.1049\/iet-cvi.2012.0109"],"URL":"https:\/\/doi.org\/10.1049\/iet-cvi.2012.0109","archive":["Portico"],"relation":{},"ISSN":["1751-9632","1751-9640"],"issn-type":[{"value":"1751-9632","type":"print"},{"value":"1751-9640","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2]]}}}