BEST- LOCATION TECHNIQUE FOR MAMMOGRAM AUTHENTICATION BY LSB BASED WATERMARKING

advertisement
BEST- LOCATION TECHNIQUE FOR MAMMOGRAM
AUTHENTICATION BY LSB BASED WATERMARKING
CIK FERESA BINTI MOHD FOOZY
UNIVERSITI TEKNOLOGI MALAYSIA
BEST- LOCATION TECHNIQUE FOR MAMMOGRAM AUTHENTICATION
BY LSB BASED WATERMARKING
CIK FERESA BINTI MOHD FOOZY
A thesis submitted in fulfilment of the
requirements for the award of the degree of
Master of Computer Science (Information Security)
Faculty of Computer Science and Information System
Universiti Teknologi Malaysia
OCTOBER 2009
iii
Special Dedicated to My Beloved Parents,
Mohd Foozy Bin Ghazali and Noraity Binti Nordin
My Brothers and Sisters,
Cik Farah Hani, Cik Fazleen, Mohd Farith and Fazly
My Supportive Friends,
Batch 9 Infosec, Shamala, ChaiWen, Sha, Zana, Huda, Ain, Ruby, Yus and Roslan.
iv
ACKNOWLEDGEMENT
IN THE NAME OF ALLAH, MOST GRACIOUS, MOST COMPASSIONATE
Alhamdullilah, thank you to Allah for giving me the blessing for health,
strength and earestness to accomplish and fulfill this project report.
I would like to take this opportunity to say the highest appreciation to Prof.
Dr. Azizah Abdul Manaf as my supervisor who always gives full sopport and
faithfulness in all guidance, advice and commitment upon on the effort for this
project. To Dr. Akram M. Zeki, who also gives full support and help me in this
project.
This appreciation also goes to my beloved family, lectures and all my friends
who always encourage and give me full support to finish this project. Indeed, the
courage and support is highly appreciated. Finally to Ministry of Higher Education,
University Tun Hussein Onn Malaysia (UTHM) and the family of Faculty of
Information Technology and Multimedia (FTMM) for both morale and financial
support for this course. May Allah Bless all of you.
Thank you.
v
ABSTRACT
This project has been developed to embed the patient information into 25
samples of mammogram images in a grayscale format. MATLAB Software has been
used as a tool to develop the algorithm where the algorithm has a capability to embed
and extract the hidden data. Since the algorithm will identify the breast area before
embedding process, the patient’s information will be embedded at the best location
which is at the background area without interrupting the breast area. Little distortion
at the background images are seen when embedding is using LSB 1 and LSB 2.
Meanwhile, few images are distorted when using LSB 3. However, there is no
distortion identified at all samples when using LSB 4 until LSB 8. Finally, based on
the PSNR result, it shows that the quality of watermarked mammogram images is in
high value and the watermarked mammogram images are in a good quality.
vi
ABSTRAK
Projek ini telah dibangunkan untuk memasukkan maklumat pesakit di dalam
25 jenis sampel imej mammogram yang berformat grayscale. Algoritma ini
dibangunkan dengan menggunakan perisian MATLAB untuk memasukkan
maklumat di dalam imej dan membaca kembali maklumat yang telah disembunyikan.
Oleh kerana, algoritma ini akan mengenalpasti kawasan dada sebelum prosess
memasukkan maklumat pesakit dilakukan, maka maklumat tersebut akan
dimasukkan di kawasan yang terbaik iaitu di kawasan latar belakang mammogram di
mana proses ini tidak meganggu kawasan dada pada imej mammogram. Sedikit
kerosakkan pada bahagian latar belakang imej boleh dilihat jika menggunakan LSB 1
dan LSB 2. Manakala beberapa imej mammogram akan mengalami kerosakkan jika
menggunakan LSB 3. Tetapi tiada kerosakkan dikenal pasti pada sampel apabila
menggunakan LSB 4 sehingga LSB 8. Akhir sekali, berdasarkan keputusan PSNR
yang diperolehi, ia menunjukkan bahawa kualiti imej mammogram yang telah
dimasukkan maklumat pesakit adalah tinggi dan kualiti mammogram tersebut adalah
baik.
vii
TABLE OF CONTENTS
CHAPTER
1
TITLE
PAGE
DECLARATION
ii
DEDICATION
iii
ACKNOWLEDGEMENT
iv
ABSTRACT
v
ABSTRAK
vi
TABLE OF CONTENTS
vii
LIST OF TABLES
x
LIST OF FIGURES
xi
LIST OF ABBREVIATIONS
xiii
LIST OF APPENDICES
xiv
INTRODUCTION
1
1.1
Introduction
1
1.2
Background of the Problem
6
1.3
Problem Statements
8
1.4
Project Aim
8
1.5
Project Objectives
9
1.6
Project Scope
9
1.7
Summary
10
viii
2
LITERATURE REVIEW
11
2.1
Introduction
11
2.2
Medical Image
11
2.3
Authentication of Medical
13
Image
2.4
Medical Image Watermarking
15
2.5
Medical Imaging Authentication
17
Application by Using Watermarking
Technique
3
4
2.6
Peak Signal to Noise Ratio (PSNR)
26
2.7
Issues in Typical mammogram
27
2.8
Summary
28
RESEARCH METHODOLOGY
30
3.1
Introduction
30
3.2
Project Methodology
30
3.3
Embedding Process
33
3.4
Extracting Process
34
3.5
Summary
35
PROJECT DESIGN AND TESTING
36
4.1
Introduction
36
4.2
Project Design
36
4.3
Activity Flow Diagram
38
4.3.1
Prototype Design
40
4.3.2
Browse Mammogram Module
40
4.3.3
Insert Data Module
41
4.3.4
Watermarked Module
41
4.3.5
Extracting Module
43
4.4
Algorithm Flow Chart
43
4.5
Best- Location Technique Algorithm for
48
Mammogram Authentication by LSB
Based Watermarking
4.6
Summary
49
ix
5
RESULT AND DISCUSSION
50
5.1
Introduction
50
5.2
Result in Identifying Breast Area
50
5.3
Result in Embedding Process
51
5.4
Result in Extracting Process
51
5.5
Result in PSNR Testing
51
5.5.1
60
Result in Attacking the
Watermarked of Mammogram
Image
5.6
6
Summary
60
CONCLUSION AND FUTURE WORK
61
6.1
Introduction
61
6.2
Contribution of the Project
61
6.3
Future Work
62
6.4
Summary
62
REFERENCES
APPENDICES A-B
64
70-75
x
LIST OF TABLES
TABLE NO.
TITLE
PAGE
2.1
Experiment Result of A.M et al. (2009).
24
2.2
Literature Review Table
25
5.1
Result of A Watermarked Mammogram Image of
52
LSB 1 until LSB 8 (Breast Area at Left side).
5.2
Result of A Watermarked Mammogram Image of
LSB 1 until LSB 8 (Breast Area at Right Side).
56
xi
LIST OF FIGURES
FIGURE NO.
TITLE
PAGE
1.1
Cranio-Caudal (CC) View
2
1.2
Mediolateral Oblique (MLO) Mammographic View
2
1.3
Medio Lateral (ML) Mammographic View
2
1.4
Radiology Department
4
2.1
Mammogram Medical Image
12
2.2
Symmetrical Organs (Molson Informatics Project,
13
McGill Faculty of Medicine Website)
2.3
MSE Formula
26
2.4
PSNR Formula
27
2.5
Radiograph Process for Medical Image
28
3.1
Project Methodology: Best- Location Technique For
32
Mammogram Authentication By Lsb Based
Watermarking
xii
3.2
Embedding Process: Best- Location Technique For
33
Mammogram Authentication By LSB Based
Watermarking
3.3
Extracting Process: Best- Location Technique For
34
Mammogram Authentication By LSB Based
Watermarking
4.1
Basic Watermarking Design
37
4.2
Best- Location Technique For Mammogram
38
Authentication By LSB Based Watermarking
Design
4.3
Activity Flow Diagram for the Prototype Design
39
4.4
Prototype Design
40
4.5
Patient Information
41
4.6
Watermarked
42
4.7
Extract Data
43
4.8
Algorithm Flow Chart
47
4.9
Categorize the Mammogram into Part A and Part B
44
4.10
LSB Bit Plane
45
4.11
Bit Plane that Represent Images
45
4.12
‘G’ in Binary
46
4.13
After Watermarked
46
xiii
LIST OF ABBREVIATIONS
NAME
DESCRIPTION
BMP
-
Bitmap
DWT
-
Wavelet Transform
DCT
-
Cosine Transform
JPEG
-
Joint Photographic Experts Group
LSB
-
Least Significant Bit
MSE
-
Mean Squared Error
PSNR
-
Peak Signal to Noise Ratio
xiv
LIST OF APPENDICES
APPENDIX
TITLE
PAGE
A
Summary Of PSNR Result
70
B
Watermarked Images
75
CHAPTER 1
INTRODUCTION
1.1
Introduction
As the technology drastically change especially in the medical environment,
the medical imaging technology such as mammogram, Magnetic Resonance Imaging
(MRI) and others are widely used in the medical domain for clinical purpose such as
medical procedure to diagnosis the patients’ internal problem without having the
surgery operation. For example, mammogram is used to identify the breast cancer
and it helps to detect the breast abnormality. Based on Pam Stephan (2007), all
women are recommended to have a baseline mammogram at the age of 40 and then
continued by a mammogram every couple of years until 50. Then after 50, a woman
should have a mammogram every year. Below are several types of mammogram
views that will be taken for screening:
i. Cranio-caudal (CC) is taken from above a horizontally compressed breast.
ii. Medio Lateral Oblique (MLO) is taken from the side and at an angle of a
diagonally compressed breast.
iii. Latero Medial (LM) is taken from the side towards the center of the chest.
iv. Mediolateral (ML) is taken from the center of the chest out. Spot
compression is compression on only a small area this is to get more detail
of the breast structure.
v. Cleavage view is a view from both breast compressed. This is to see the
tissue nearest center of chest.
vi. Magnification is to see borders of structures and calcifications.
2
Figure 1.1: Cranio-Caudal (CC) View
Figure 1.2: Mediolateral Oblique (MLO) Mammographic View
Figure 1.3: Medio Lateral (ML) Mammographic View
Since there are many advantages of medical images are discovered and it is
frequently used in the medical domain, most hospitals are facing with issues to
manage large amount of data storage such as administrative document, patient’s
information and medical images. Therefore, it is important to handle those data
accurately to avoid problem of lost, tampering and mishandling record at the hospital
(J. Nayak et al., 2008).
3
There are few ways to manage the patient’s information and the medical
images and one of them is using the watermarking technique in medical images. The
purpose of watermarking is to hide a message into the host of document or
multimedia format. As one to many communications technique, when sending the
watermarking image, only authorized user can read the hidden message. Thus, by
inserting watermarking in the medical image, it will help to authenticate the owner of
medical image. This is to ensure the medical image is issued from the right source
and to solve the missing medical document problem (G.Coatrieux et al.2008).
Moreover, there are many researches of medical watermarking images that
has been done such as C.S.Woo et al. (2006) proposed a multiple watermarking
method to store the medical images in a digital form and in a secure way in order to
avoid the data from being exposed to the unauthorized person. A. Giakoumaki et al.
(2006) proposed a wavelet based multiple watermarking schemes in the medical
images for secure and efficient health data management. D.C. Lou et al. (2009),
embedded large amount of data, maintained the quality of medical image and
restored the original image after extracted by using multiple layer data hiding in
spatial domain and Least Significant Bits (LSBs) technique.
Additionally, several advantages of watermarking in the medical image have
identified by S. Boucherkha and M. Benmohamed (2005) such as:
i. By embedding watermarking in medical image, the patient can protect
their information such as diagnosis result or personal details from being
viewed by unauthorized person.
ii. Medical image watermarking can help to authenticate the patient, if the
connection between the image and patient is lost.
iii. In addition, medical image watermarking will help the staff to identify or
search the old medical image in the Hospital Information System (HIS)
collection because there are some cases that medical images and patient’s
records need to be verified the integrity before use.
4
iv. Images may help to discover new findings in medical case. Thus, it is
needed to protect the copyright and integrity of the medical image by
digital watermarking.
v. Embedding the authentication code in the image will make it less
sensitive to attack than appending the information on medical image.
To get a clear scenario of medical imaging processes see Figure 1.4 for the
radiology department work flow. First of all, a patient will do a medical checkup
with the doctor or the medical assistant. If a patient has problem that needs to do a
medical imaging, the doctor will refer the patient to the consultant by writing a
request to him. Then, the consultant will accept the request and the patient can make
an appointment. If the consultant feels that patient needs to do medical imaging, the
patient will be referred to the physician by sending a request form to apply imaging
examination. The examination will be done by hospital personnel (nurse) under the
supervision of the radiologist. The result of the imaging examination is a set of films
that will be viewed by the radiologist. The radiologist will state his findings in a
written format and sent it to the referring physician. Finally, the referring physician
will perform the overall diagnosis and discuss the diagnosis treatment with the
patient (G.Muller, 2008).
Figure 1.4: Radiology Department (G.Muller, 2008).
5
As we know, hospitals are the place for the patients to get treatment and all
the medical records, patients’ information and others need to be managed properly.
Because of that, there are many systems are developed for the above purpose such as:
i.
Picture Archiving & Communications Systems (PACS)
ii.
Clinical Information Systems (CIS)
iii.
Radiology Information Systems (RIS)
iv.
Cardiology Information Systems (CIS)
v.
Radiation Therapy Systems
vi.
Patient Monitoring Systems
Picture Archiving and Communication Systems or PACS is a system for
storage, retrieval, distribution and presentation of images. PACS uses Digital
Imaging and Communication in Medicine (DICOM) format. The main purpose of
PACS is to manage hard copy of medical images like film archives. Next purpose is
to remote access for viewing and reporting or accessing the information from the
difference physical location. However, the medical images that stored on PACS have
been accessed every year thus the security and privacy of patients still in doubt.
Clinical Information system (CIS) is a system that built by IBM for patient’s
data management which is based on the patient’s information age. The system was
developed to replace the Medical Records Department of a medical institution, to
supporting the storage, manipulation, and distribution of clinical information
throughout the organization.
Moreover, Radiology Information Systems (RIS) is a solution which has
function of radiology billing services, comprehensive financial tracking and audit
trail, appointment scheduling, patient’s managed care data, powerful reporting and
patient’s database storage. Cardiology Information system (CIS) is a multi-modality
system that can be accessed by patients to access echo and nuclear cardiology, wave
forms, report and patient’s information. Radiation Therapy Systems is for radiation
treatment such as breast conservation therapy. Finally, for Patient Monitoring
6
system, the purpose of this system is to monitor the critical patient. The example of
the patient monitoring system is the heart monitor.
Most the applications that mention above are already implemented in some of
the hospitals and clinics. For authentication of medical image, watermarking
technique is proposed since there are few advantages that have been identified.
1.2
Background of the Problem
Currently, PACS has been used to handle the medical images and this system
integrates with several systems in the hospital but the result of diagnosis is written in
a piece of paper and the possibilities to lose the medical image or to be tampered by
unauthorized users that enter into the system may occur.
Since, the growing trends in the maintenance of medical records give an
impact to the security issues in the management of medical information. It creates the
interest among the researchers to explore the authentication of medical images.
Mohamed Kallelet et al. (2007) developed an algorithm for embedding multi
signatures using a multiple watermarking scheme to preserve the image history in the
medical field by using hash function and LSB technique to embed only the patient
diagnosis in medical images. Y.Li et al. (2007) did watermarking method using the
Discrete Cosine Transform Technique (DCT) to hide the information into the
mammogram background.
For patient authentication, A.W.T. Goh et al. (2008) studied about an
authentication of altering the image data and Rongrong Ni (2008) proposed new
algorithm to locate the tampered regions. Experiments show the result of watermark
medical image is PSNR=51.21dB. S.Boucherkha and M. Benmohamed, (2005),
examine 3 medical images of ultrasound in difference sizes and the result shows the
difference in PSNR (Peak Signal to Noise Ratio). G.Coatrieux et al. (2008), proposed
7
a method to ensure the authenticity and maintainability of data. From the findings
this method allows medical image managers to gather only the data of the same
patient without knowing the true identity of that patient. Since, patient identification
methods are different from country to country in Europe, the data that has been
embedded in medical images are the combination national health numbers and pivot
Id such as a family based identifier referring to family medical records.
In the research community, the watermarking technology is recognized by
them because of the medical confidentiality protection, origin and data authentication
that potentiality contributes to the medical information management systems (A.
Giakoumaki et al., 2006). Since, the medical data is stored in the system, the access
control to the system will be given only to the authorized user and when the access is
given, there is possibility that the patient’s information does not remain in one place.
Modification and lost can also be happen (G.Coatrieux et al., 2008). Thus, by
inserting the watermark in the medical image, the problem of lost, untraceable,
unintentional distortion and malicious modifications on the quality of medical
images can be prevented. Along with that, the medical image watermarking will be
able to trace the source or the owner of medical image (authenticate) and can detect
the changes that have been made in medical image (integrity). However, by
embedding the watermark on the medical image there will be possibilities that the
image will be affected when extracting the watermark is done. When the quality of
medical images is interrupted it can influence the diagnosis result.
There are few types of watermarking techniques such as Least Significant Bit
Hiding (LSB), Direct Cosine Transformation (DCT) and Wavelet Transformation.
LSB is the simplest method and S-Tools 4, HideBSeek, Steganos and StegoDos are
based on the LSB replacement (S. Huliiv et al., 2004). Implementation random LSB
technique hiddes the data in the least and second to least bits without being noticed
easily. A study on the LSB embedding technique by D.Neeta and K.Snehal (2005),
stated the result that LSB can hide the images in 24-bit, 8-bit or gray scale format of
a .png file and a .bmp file. Moreover, this paper mentions that the data can be hidden
in the least significant bits of the cover image and the human eyes would not be able
to notice the hidden image in the cover file. D.C. Lou et al. P (2009) also used the
8
LSB technique to embed a large amount of data and maintained the quality of
medical image.
1.3
Problem Statements
Based on the reviews on journals and papers that have done, it shows that the
authentication is one of the relevant elements that needs to be implemented in
watermarking of medical image application (G. Coatrieux et al., 2002) and the
quality of medical images are really important when embedding and extracting the
watermark. Below are the problem statements:
i.
Embedding the watermarking randomly will affect the quality of
mammogram image thus it will affect the diagnosis.
ii.
The breast area which contains important medical information should not
be modified during the watermarking.
iii.
Embedding the patient’s information in the best location would not affect
the critical areas or potion of mammogram.
1.4
Project Aim
The project aim for this research is to identify the best location on the
mammogram to embed the patient’s information without affecting the quality of the
image and to develop an authentication technique of watermarking mammogram
using the LSB technique.
9
1.5
Project Objectives
Below are the objectives of the project:
i.
To study and analyze the current technology of medical image
authentication.
ii.
To investigate the issues and problems in authentication technique in
mammogram.
iii.
To develop an authentication technique of watermarking mammogram
using the LSB technique.
iv.
To identify the best location on the mammogram to embed the
patient’s information without affecting the quality of the image.
1.6
Project Scope
Below are the project scopes of authentication medical image watermarking
project:
i. Twenty five (25) samples of mammogram images will be used to test the
algorithm for quality and authentication testing purpose at the extraction
process. The mammogram images samples are taken from Breast Cancer
Cases Molson Informatics Project, McGill Faculty of Medicine website.
ii. The mammogram images will be in grayscale format.
10
1.7
Summary
The advances in multimedia and communication technology nowadays have
provided new ways to store, access and distribute medical data in a digital format.
Hence, by identifying best location on the mammogram to embed the patient’s
information without affecting the quality of the image will be studied. The
development of authentication techniques for mammogram watermarking can be as
one of the alternatives to overcome the weaknesses of losing and mishandling of
medical images that will risk the patients. Moreover, comparison with old
mammograms is very important for breast cancer diagnosis (Diagnostic and
Interventional Radiology, 2008) and by embedding watermarking in medical image
will be easier to identify the medical image by authenticating the patient to prove that
the medical images belong to the correct person and the medical image is issued
from the trusted source.
CHAPTER 2
LITERATURE REVIEW
2.1
Introduction
In this chapter, the analysis will be done on medical image, authentication of
medical images, medical image watermarking and applications using several types of
watermarking technique. Other than that, review on current watermarking techniques
such as LSB, DWT and DCT, Peak Signal to Noise Ratio (PSNR) will be analyzed.
2.2
Medical Image
Medical imaging is one of the evaluations of the enhancement in health
industry where it gives many advantages to detect the disease earlier. There are many
types of medical imaging and one of them has their own purpose. For example MRI
is a medical imaging that scans inside human body and later it can show a tumor or
other problem in the brain where it can be viewed on a monitor or by hardcopy. A
special color can also be injected to show differences in the tissues of the brain.
Another example is CT scan that takes the picture of head and the function is to show
the tumors in the brain. This technology can also use special colors to inject the
picture to get the clear view of the tumor (Medindia.net, 2005)
.
12
Mammogram is one of the medical images that currently being used for
cancer diagnosis to detect symptoms such as lump, pain or nipple discharge. Based
on the medicinenet.com definition, mammogram is an image of the inner breast
tissues which visualizes on the film. Another definition of mammogram by Woman
to Woman website is an irregular or jagged white shape which is also called a mass
or a nodule that can be seen in the armpit on films. The white shape shows up best on
a background of gray or black, which is fat on a mammogram.
The mammogram will be in the grayscale format where the color value is in
range 0(black) to 256(white) and it has been identified as most of the efficient
screening method that can help to detect breast cancer earlier. In the earlier presented
of mammogram which was around 1969, this medical image was used for the breast
imaging only, then because of new development of technology during that time,
mammogram started to become a standard practice for a screening device in 1976 (S.
Luigi, 2005).
By doing mammogram, it can show or detect the symptoms or changes in the
breast up to two years before a patient or physician can feel it. Health officials are
recommending women to undergo mammogram tests every year beginning at the age
of 40. Additionally, women should also do self examination of the breasts for lumps
every month for early diagnosis of breast cancer (Medindia.net, 2005). It has been
agreed by the medicalimagingnews.com website where it mentions that the medical
imaging is also contributes major benefits to women.
Figure 2.1: Mammogram Medical Image
13
As mention in the previous chapter, there are few angles of breast image will
be taken such as Mediolateral Oblique View (MLO), Cranio-Caudal View (CC),
Medio-Lateral View (ML) and Latero-Medial View (LM) (Imaginis.com, 2008).
However, based on a website of Breast Cancer Cases Molson Informatics Project,
McGill Faculty of Medicine, there are six steps in viewing and analysis the
mammogram images. The first step is to place the correct orientation of the image
and the best view is in symmetrical organs where the right and left breast will be
compared in view box like Figure 2.2. This is an important step, which it will help
the physician doing mistakes that probably will happen when analysis the
mammogram image. Viewing the mammogram approach in the symmetrical organs
also has been agreed by Daniel B. Kopans on his book which is entitled Breast
Imaging.
Figure 2.2: Symmetrical Organs (Molson Informatics Project, McGill Faculty of
Medicine Website)
2.3
Authentication of Medical Image
Dictionary of Computing (2004) defined the authentication is a process by
which subjects, normally users, establish their identity to a system. It is also one of
the elements in the security to validate the authorized user since nowadays
technologies have become more advance and also provided alternative in storage and
distributing the information in digital format (Y. I. Khamlichi et al., 2003; Mingyan
Lia et. al., 2005). Many areas implement authentication in the application or system
such as e-commence, education, health and etc. this is because technologies also
14
affect on privacy and security so there are possibilities to get attacks or threats from
the communication technologies. Additionally based on Chen C.C and Ka D.S
(2008), digital images are easy to transmit, modify and reproduce. Ju-YuanHsiao et
al.(2009) said, since the digital forms are easy to be transmitted and altered, this can
contribute to the problems for people to authenticate the digital data’s content and its
origin as well as how to protect it from prohibited use and modification.
According to the article of website National E-Health Transition Authority
(NEHTA), currently the Internet has been used in the health sector as a medium to
transfer sensitive and important document such as patient’s details or diagnosis to the
other hospitals. Therefore, all sensitive documents which have been transferred need
to be ensured the authenticity and validity. In addition, medical imaging which is for
diagnosing internal disease of patient also has been embedded with authentication
techniques.
Authentications of medical images are also explored by many researches and
there are many advantages have been found until now especially in copyright
protection. The originality of an image can also be verified by detecting the
manipulations of malicious and the implementations of these techniques help to
ensure the integrity and confidentiality of medical folders (Jinshen Wang et. al.
(2004); S.Boucherkha and M. Benmohamed, (2005); Veysel Aslantas, (2008)).
Moreover, many types of authentication image have been applied and various studied
have shown, authentication can be implemented and beneficial in many areas like
P.M.Huang, et al., (2004) used half toning technique to develop a novel blockedbased binary image authentication. Chiou-Ting Hsu and Ja-Ling Wu (1996) did an
image authentication technique by embedding each image with a signature to avoid
unauthorized copying. Rongrong Ni et al. (2008) used watermarking which is based
on a chaotic system to propose a pinpoint authentication watermarking.
15
2.4
Medical Image Watermarking
Based on the Anastasios Tefas et al. (2005), watermarking is defined as a
practice of unnoticeably altering a piece of data in order to embed information about
the data. Watermarking is one of the techniques that can hide and hold the secret of
watermark for digital right management and copyright protection of the digital
images, videos or audios. This also has been agreed by Elham Shahinfard and
Shohreh Kasaei, (2001), Husrev T. Sencar and Nasir Memon, (2006) where they
identify that the purpose of watermarking can resolve the security issues such as
copyright protection, copy protection, fingerprinting and authentication.
Watermarking can be categorized in two types such as invisible watermark
and visible watermark. According to online dictionary askoxford.com website,
invisible is unable to be seen, either by nature or by concealed and the definition of
visible is able to be seen or noticed. Based on the study that has done by Veysel
Aslantas (2008), invisible watermark are unnoticeable. It is embedded as randomly
or nonrandom on the unknown places in the host data. The watermarked data have to
look similar with the original data and no one should know about the embedding.
Usually for invisible watermark, it will be used for copyright purpose. Furthermore,
for visible watermarks it is actually easily to be detected like company logos that
place into or cover on some products and it can be recognized by their owner.
Moreover, the owner can also do anything to the watermarking image such as
embedding, removing or destroying the watermark anytime that they want.
Additionally, invisible watermark can be divided into three types which are semifragile, fragile and robust.
Thus, watermarking is preferred as a favourite technique in hiding
information by the researches to enhance the security and privacy in the hospitals and
also to manage the patients’ data since it still poses some issues regarding the image
efficiency when designing such system. There are many advantages that have been
recognized and many areas have implemented watermarking techniques. Below the
applications that have been listed by N. Liu, P. Amin et al. (2006).
16
a. Copyright protection.
b. Unauthorized modification
c. Fingerprinting.
d. Annotation and indexing
e. Copy control
f. Medical applications
g. Broadcast monitoring
h. Covert communications
Study on the medical image watermarking has been done in medical
application regarding copyright protection, patient management and etc. Moreover,
there are many advantages of watermarking that are already known by other people
and currently are acknowledged as one of the important feature in the health care
system. Veysel Aslantas (2008) also agreed that watermarking has many advantages
in medical environment. Additionally, in future medical applications, it will be
predicted to have the integration access with the generalized databases that contain
the personal medical information of each patient (Ng Lee Ping et. al., 2003; Marie
Babel a et al.,2008).
Furthermore, there are many types of watermarking such as Spatial Domain,
Wavelet Transform (DWT) and Cosine Transform (DCT) each of these techniques
have their own advantages and some reviews have done regarding watermarking
techniques. Below are types of watermarking by N. Liu, P. Amin et al. (2006).
i. Spatial Domain
a. Modification Least Significant Bit (LSB)
ii. Transform Domain
a. Wavelet Transform (DWT),
b. Cosine Transform (DCT)
c. Fractal transform and others.
iii. Feature Domain
a. Spatial Domain
b. Transform Domain
17
LSB technique or Least Significant Bit is a technique that derives from the
Spatial Domain (N. Liu, P. Amin et al., 2006). According to Y. I. Khamlichi et al.
(2003), LSB technique is fragile and well known method plus efficient for inserting
data with a high embedding capacity. Moreover, LSB bit plane for each pixel of the
image are generally considered as noise because of the imaging device that has been
used. Thus, this technique can be used to embed secret message and patient’s
information without disturbing greatly the appearance of the image.
Many studies have done regarding the image watermarking by using LSB
technique for example F. Caoa et al. P. (2002) using LSB technique in the
development of medical image security using digital envelope. Y. I. Khamlichi et al.
(2003) determined if the watermarked image has been tampered with or modified.
S.Boucherkha and M. Benmohamed. (2005) embed the watermarking using this
technique. Mohamed Kallelet al. (2007) developed an algorithm for embedding
multi-signatures using a multiple watermarked scheme to preserve the history of the
genuine image. D.C. Lou et al. (2009) also used LSB technique in their project to
develop information hiding techniques for protection of medical information and
copyright. Therefore, LSB technique can be accepted to be used as the watermarked
technique since based on the result of the experiments that has done by the
researches above shows the successful result and they achieved the objectives of
their research.
2.5
Medical Imaging Authentication Application by Using Watermarking
Technique
In this section, techniques of watermarking that have been used by the
researchers for medical images will be reviewed. Boucherkha.S and Benmohamed.M
(2005) used LSB techniques where three medical images of ultrasound in difference
sizes of 256x256, 400x268 and 512x512 were examined. All images are in BMP
format. The watermarking that has been embedded in all ultrasound is 32 ASCII
characters of patient information which is 128 bits of Media Access Control (MAC).
18
The patient’s information consists of first name, family’s name, age and sex. Three
processes that involve in this research are:
i. Embedding process.
ii. Extraction process.
iii. Verification process.
From the experiment, information that embeds in all the images was
unnoticeable and it is successfully decoded. The result shows the difference in PSNR
(Peak Signal to Noise Ratio) where:
i. Ultrasound 1= 39.72,
ii. Ultrasound 2= 52.27
iii. Ultrasound 3= 41.33
A. Giakoumaki et al. (2006) implemented 4 levels of discrete wavelet
transform (DWT) in this research. Based on this research, there are 20 types of
medical images of CT, MRI, MRA and PET of 512x512 pixels used to test the
proposed scheme. The paper proposed a wavelet-based multiple watermarking
schemes to address the critical health information management issues that related to
the origin and data authentication, protection of sensitive data, and image archiving
and retrieval. Three types of watermarking were used such as:
i. Signature watermark
Contain physician’s digital signature or identification code
ii. Index watermark
Contain keyword such as ICD-10 diagnosis code, image
acquisition characteristics and etc.
iii. Caption watermark
Contain patient’s personal and examination data such as
diagnosis report.
19
iv. Reference watermark
Compare the extracted reference watermarked bit with the
original embedded watermark.
Moreover, the processes of watermarking for this paper consist of two
processes of embedding and extracting. The locations to embed the text watermarks
are based on a random key and the ROI map. There are three types of watermarks
that have been used such as signature, index and caption. For the watermark, there
are 52 and 208 characters of keywords have been used whereby the length is 364 and
1456 bits. Furthermore for signature length is 128 bits. For the future work, A.
Giakoumaki et al.(2006), will involves exploiting the wavelet-analytic nature of the
algorithm to derive image inherent characteristics in order to accommodate content
based image querying. The results show in PSNR (dB) measurement and the
percentage of bit errors are shown below:
i. CT 46.47 ± 0.06
ii. MRI 46.37 ± 0.05
iii. MRA 45.96 ± 0.04
iv. PET 46.66 ± 0.20
From the paper of C.S.Woo, J.Du, and B.Pham, (2006), these researches have
employed the digital watermarking technique and proposed a multiple watermarking
method to store the medical images in a digital form and in a secure way in order to
avoid the data from being exposed to the unauthorized person. The proposed method
consists of:
i. Annotation part
a. Annotation watermark is embedded into the border pixels.
b. Watermark message is placed in the frame pattern.
c. After that, embed using linear addictive method into three high
band of DWT.
d. Inverse DWT is done to get back the marked of image border.
20
ii. Fragile part
a.
Fragile watermark is embedded into the central of region of
the original image using LSB technique.
b. Combine annotation watermark and fragile watermark and
then the marks are embedded to be a multiple watermarked
image.
iii. Watermark detection
a. Detection will do separately which is similar with embedding
process.
b. For Annotation watermark, the border of watermarked
decomposed into DWT sub bands. Then calculate the
correlation value using three high pass bands.
c. For fragile watermark, it is detected by using LSB detection
method where each of the pixels is read to form the tiled
binary watermark pattern.
Encrypted patient’s data can be embedded in an annotation while the
tampering can be detected using fragile watermark. The embedded patient’s data not
only saves storage space, it also offers privacy and security. Furthermore the medical
images in digital form must be stored in a secured environment to preserve the
patient privacy (Woo et. al, 2006). Three experiments on the X-ray image of the
chest, MR image of the skull and CT image of the brain have done, however the
disadvantages can be found where there are possible to destroy the annotation
watermark on purpose using malicious attack technology. To solve it, annotation
watermark in textured regions of the image can be used as watermark instead of
image borders.
Mohamed Kallelet al. (2007) developed an algorithm for embedding multisignatures using a multiple watermarking scheme. The purpose of this scheme is to
preserve the history of the genuine image of medical image. The result from the
experiment shows PSNR is 51.21dB and a technique that used in this scheme is LSB.
Overall, there are 4 processes in this scheme such as:
21
i. Embedding process
ii. Multi-watermarking
iii. Signature extraction of the preceding doctor
iv. Embedding signature by the following doctor
Y.Li, C.T.Li, and C.H.Wei, (2007) studied about the framework for
combating security issues in PACS for mammograms that involve the watermarking
method to hide the patient’s information into the mammogram without changing her
important details and the watermark can also extract the hidden information from the
stegano-mammogram without the availability of the original image and only the
authorized review can remove the watermark. Other than that, this scheme is
compatible with the mammogram transmission and storage on the Picture Archiving
And Communication Systems (PACS). Based on the experimental that has done the
evaluation of capacity, embedding distortion and content masking have been
evaluated. There are two processes in this scheme such as:
i. Forward process
a. Segmentation
b. Segment mammogram into breast and background part
ii. Information Hiding
a. Mammogram is partition into blocks which each is 8x8
pixels.
b. Breast area is called medical blocks whereby background
is marked as background blocks.
c. Contain algorithm of block pairing and algorithm of
information embedding.
iii. Content Masking
a. This section will execute the process of mask content for
mammogram.
22
iv. Backward process
a. Distribute private keys
b. Apply inverse computation of equation content masking
c. Extract patient information
G.Coatrieux et al. (2008) discussed on the combination of watermarking with
different identifiers ranging from DICOM standard UID to an Anonymous European
Patient Identifier in order to improve medical. The combination of codes for
authenticity of DICOM Image identifiers codes (UID) and Patient identifiers (Id)
were reviewed. Since there are only reviewed the scheme, no experiment has been
done. The purpose of this paper is to combine an anonymized pivot number identifier
with national patient identifiers to guarantee the privacy and interoperability of data.
Moreover, this method helps to provide a solution of the problems in identification
and lost in medical documents.
D.C. Lou et al. (2009) has done a comparison study with Tian’s difference
expansion method to develop the information hiding technique. Both researches are
using the LSB technique but the diverse between this research is J. Tian(2002) which
he did the experiment on Leena image. Moreover, from the experimental results that
have done by D.C. Lou et al. (2009), it shows that the scheme should be able to
embed the watermarking better than J. Tian(2002). Purpose of D.C. Lou et al. (2009)
study is to protect medical information and copyright and a multiple-layer data
hiding technique in spatial domain (LSB). The experiment is using three different
types and textures of medical images in the same sizes of 512 x 512 are being used.
The processes in this experiment involve:
i.
Reviewed the Tian’s embedding method.
ii.
After reviewing has been done, D.C. Lou et al. (2009)
proposed the multiple-layer embedding method that consists of
three processes such as:
a. Embedding process
•
Uses a transformation function to reduce the
value of the expansion difference.
23
b. Extraction process
•
Has reversible characteristic after extracting the
data
c. Performance analysis
•
Uses PSNR to measure the quality of picture.
From the result by using D.C. Lou et al. (2009) proposed technique, a
remarkable improvement in the visual quality of the embedded can be satisfied
whereby the experimental results show the proposed scheme gives higher embedding
capacity and the level image quality compared than Tian's difference expansion
method. According to this paper, D.C. Lou et al. are focusing to enhance the
expansion method of Tian. Types of medical images that have been used in the
experiment are CT scan and MRI. The results show the advantages of the research
are more on the quality not on the security purpose. Moreover, in this study, type and
size of information that want to be embedded are not identified. However, this
research shows that by using LSB water marking techniques, it successfully embeds
the watermark.
A.M et al. (2009) did about an assuring authenticity of digital mammogram
where 32 of the same size of 512x512 pixels of images mammogram have been used
for experiment where watermarks are embedded at all the 128x128 blocks. The
watermarking technique that used for this study is DCT and DWT and the processes
related in this development are:
i. A set of 32 images are selected for testing.
ii. The extracted process of a sub-image of 512x512 pixels will be
executed
iii. Applying the watermarks to all the 128x128 blocks within the
images.
iv. Watermarked version at values equivalent are generated to
embedding the strengths of 1, 2 and 3.
24
The measurement of the quality has been done by using Peak Signal to Noise
Ratio (PSNR) metric, Steerable Visual Difference Predictor (SVDP) Sum metric
where the results are shown below:
Table 2.1: Experiment Result A.M et al. (2009).
WM configuration
PSNR metric
SVDP Sum metric
DCT ES=1
64.92
7.10
DCT ES=2
52.88
13.21
DCT ES=3
39.81
20.26
DWT ES=1
69.69
5.07
DWT ES=2
57.65
13.20
DWT ES=3
44.59
17.21
25
Table 2.2: Literature Review Table
No
Year
Author
Medical Image
Watermarking
Watermarking
Technique
1
2005
Boucherkha.S and
Ultrasound1=
First name, family name,
Benmohamed.M
39.72,
age and sex.
A Lossless
Ultrasound2=
Watermarking Based
52.27
Authentication
Ultrasound3=
System for Medical
41.33
LSB
Images.
2
2006
A. Giakoumaki et al.
CT
a. Physician’s digital
Discrete
MRI
signature or
wavelet
MRA
identification code
transform
PET
b. Contain keyword such
(DWT)
as ICD-10 diagnosis
code, image acquisition
characteristics and etc.
c. Contain patient’s
personal and
examination data such
as diagnosis report.
d. Reference watermark
3
2006
C.S.Woo, J.Du, and
X-ray, MR and
B.Pham
CT
Patient’s data
DWT and
LSB
4
2007
Mohamed Kallelet al.
Medical images
Multiple signature
LSB
5
2007
Y.Li, C.T.Li, and
Mammogram
Patient’s information
Not identified
Medical
DICOM Image identifiers
Not identified
Document
codes (UID) and Patient
C.H.Wei
6
2008
G.Coatrieux et al.
identifiers (Id)
7
2009
D.C. Lou et al.
CT scan and
Information
LSB
Information
DCT and
MRI
8
2009
A.M et al.
Mammogram
DWT
26
2.6
Peak Signal to Noise Ratio (PSNR)
It is a very important to measure the quality of the image. Mean Squared
Error (MSE) and Peak Signal-To-Noise Ratio (PSNR) are usually has been used to
measure the image (Eric A. Silva, 2008). There are many types of measurement of
image quality as below. However, Peak Signal to Noise Ration or PSNR is one of the
most popular measurements that have been used in medical images watermarking to
compute the quality of the image (Eric A. Silva, 2008).
i. Peak Mean Square Error (PMSE)
ii. Maximum Difference (MD)
iii. Average Difference(AD)
iv. Image Fidelity (IF)
v. Structural Content (SC)
vi. Laplacian Mean Square Error
(LMSE)
vii. N. Cross-Correlation(NK)
viii. N. Absolute Error (NAE)
ix. Correlation Quality (CQ)
x. N. Mean Square Error (NMSE)
Based on the study that was done by the researches, PSNR has been
commonly used to measure the medical image watermarking, Mingyan Lia et
al.,(2005). C.S.Woo, J.Du and B.Pham. (2006), evaluating the X-ray image of the
chest, MR image of the skull and CT image of the brain by using PSNR. B.Planitz
and A. Maeder (2006) also used PSNR to measure the quality of MRI, CTI and
CXR. It is followed by A. Giakoumaki et al.(2006), Mohamed Kallelet al.(2007), K.
A. Navaset Al. (2008), Rongrong Ni et al.(2008) and D.C. Lou et al. P (2009) have
used PSNR to measure the medical images. Thus, PSNR will be used in this project
to measure the quality of mammogram. Below is the formula of MSE and PSNR.
MSE = 1
N
N
∑
(xl-xl’)2
l=1
Figure 2.3: MSE Formula
27
PSNR =10 log 10 L2 db
MSE
Figure 2.4: PSNR Formula
Below are the descriptions about the formula above:
i. x1 is the pixel of the cover image which is based on coordinate
ii. x1’ is the pixel of the stego-image which is based on coordinate
iii. N is the size of the cover image and stego-image.
2.7
Issues in Typical mammogram
Currently, the mammogram that has been taken by the patient will be done a
process of diagnosis where the result and the medical image usually will be
transmitted in the difference hospital departments or room by room in the hospital.
After that, the medical image will be located in the reading room or in the file room
and if the doctor or the patient wants to get the mammogram or medical images, the
staff will get it for the doctor(J. Marc Overhage et al., 2005). Thus, possibilities to
lose or mishandle the medical image and problem to search the mammogram in the
hospital can happen. In mammography procedure, the history of mammogram is
really important and patients are responsible to the previous mammogram to the
doctor or radiologist before doing another mammogram.
Some hospitals implement the medical images application efficiently but
most of the applications are costly. However, this type of application actually gives
few advantages in distributing and managing the medical images. Nevertheless, since
the technology in the digital firm can be manipulated, tampered and altered thus, this
also becomes the issues of authentication and copyright of the owner of medical
images. Figure 2.5 shows common radiography processes of medical images.
28
Modality
Kodak DR
Agfa
Archive
CT
DICOM
Image
Processor
Image
Processor
CR
MRF
TRF
Medical
Image
JPEG
Image
RMRS
JPEG
Reports
Figure 2.5: Radiograph Process for Medical Image.(J. Marc Overhage et al., 2005)
2.8
Summary
As a summary, based on the reviews that have been done LSB technique is
already accepted and easy to be implemented. According to Y. I. Khamlichi et al.
(2003) this technique is fragile and a well-known method and efficient for inserting
data with a high embedding capacity. LSB technique is also well accepted as
watermarking technique and it has been proven based on the experiments results that
have done by the researches. Moreover, based on A.M et al. (2009) and Y.Li, C.T.Li,
and C.H.Wei, (2007) experiment, they used mammogram watermarking but the
techniques for watermarking that has been used are DCT and DWT techniques.
Additionally, based on the Diagnostic and Interventional Radiology (2008) article,
the comparison with old mammograms is very important for breast cancer diagnosis.
Mainly watermarking basic process consists of embedding and extracting
processes. The measurement of quality image will be done after the extracting
process by using Mean Squared Error (MSE) and Peak Signal-To-Noise Ratio
(PSNR) (Eric A. Silva, 2008). There are many types of measurement of image
29
quality. However, Peak Signal to Noise Ration or PSNR is one of the most popular
measurements that have been used in medical images watermarking to compute the
quality of the image (Eric A. Silva, 2008).
Based on the Table 2.2 above, it shows that LSB watermarking of medical
images are implemented on different types of images. For this project, an
authentication of mammogram image by using watermarking technique has been
proposed to identify the best location on the mammogram to embed the patient’s
information without affecting the quality of the image and also to authenticate the
mammogram image by using LSB technique. The authentication of watermarked
mammogram can help to authenticate the patients and capable to prove that the
mammogram belongs to the correct person and is issued from the trusted source.
CHAPTER 3
RESEARCH METHODOLOGY
3.1
Introduction
In this chapter, the project overflow is explained which consists of project
methodology, identifying breast area, embedding and extracting processes. For the
project development, MATLAB software is used.
3.2
Project Methodology
Figure 3.1 illustrates the project methodology for this project. It consists of
four stages such as Literature Review, Embedding process, Extracting process and
Testing.
Analysis Literature Review is the first stage to identify problem statements,
objectives, scope and analysis on the watermarked technique and type of medical
image will be done. Moreover, based on the literature reviews and studied that has
done, the process to develop this algorithm has been discovered. In addition,
techniques and type of the medical image will be identified.
31
The second stage is the embedding process. Before embedding process
executes, breast area will be identified at the left or at the right side of mammogram.
This can be done by calculating and comparing the dark and bright pixels intensity
for each image. After that, the watermark will be inserted into the mammogram
image. The embedding will be in the background area in a sequential order (pixel by
pixel). As mention in the chapter 1, patient’s information will be embedded at the
best location where it will be an empty place or unused area on mammogram by
using key.
The third stage will be the extracting process where the algorithm will read
the watermark (patient’s information) in mammogram. Key that has been used to
watermark the mammogram will be used back to read the patient’s information.
Finally at testing phase, comparison will be done between the extract
watermarks with the original watermark. Mammogram watermarking will be
compared with the original mammogram and the quality of image is measured by
using PNSR.
32
START
1.
2.
Literature Review
Identify objectives, scope, problem statements
Identify watermarking technique, watermark and type of
medical image
1.
2.
Embedding Process
Identify the area to embed watermark
Insert patient’s information into mammogram by using
key
1.
1.
2.
Extraction Process
Extract (read) the patient’s information
Testing
Compare the extract watermarks with original
watermark.
Compare the watermarked mammogram with original
mammogram by using PSNR.
NO
Mammogram
Authenticate?
YES
END
Figure 3.1: Project Methodology: Best- Location Technique For Mammogram
Authentication By LSB Based Watermarking
33
3.3
Embedding Process
Figure 3.2 below, shows the flow of embedding process. Before this process
is preceded, breast area and bit planes will be identified. After that, the extracting of
bit plane will be done. Next, the patient’s information will be inserted into the
mammogram bit. Then the watermarking will be embedded into mammogram by
using the key. Finally, the watermarked mammogram is generated.
EMBEDDING PROCESS
Mammogram
Watermarking
(w)
• Patient‘s
Information
Identify Bit
Planes
Extracting 8th bit
plane
Bit
Embedding Process
• Replacing the bit
of watermark
objects within 8th
bit plane of the
host image
Key
Watermarked
Mammogram
Figure 3.2: Embedding Process: Best- Location Technique for Mammogram
Authentication by LSB Based Watermarking
34
3.4
Extracting Process
The extracting process as shown as Figure 3.3 below, is the reversible
procedure of embedding process where first of all, to extract the watermark (patient’s
information), bit planes have to be identified and then by using key, the extracting
process will be completed. After that, the testing process will take place to
authenticate the owner of mammogram. The quality of the mammogram will be
measured using PSNR.
EXTRACTING PROCESS
Watermarked
Mammogram
Key
Identify Bit
Planes
Extracting
Process
Watermarking
(w’)
• The extracted
Patient‘s
Information
Figure 3.3: Extracting Process: Best- Location Technique for Mammogram
Authentication By LSB Based Watermarking
35
3.5
Summary
To summarize, the project methodology that has been developed in this
chapter has been used as guidance during the project development. It also helps in
minimizing the difficulties in the project development. Next chapter is the Project
Design and Testing that will describe the project development process in detail.
CHAPTER 4
PROJECT DESIGN AND TESTING
4.1
Introduction
This chapter will discusses the project design and tests on the 25
mammogram images. An algorithm and a prototype have been developed to execute
the embedding and extracting processes. This algorithm consists of embedding and
extracting the information from mammogram images.
4.2
Project Design
Based on the project scope, the algorithms were developed to test the quality
and authenticate the watermarked mammogram image at extraction process. This
project development was implemented two processes of embedding and extracting
the information from mammogram images. According to the literature review,
embedding and extracting processes were identified as the important part for
watermarking techniques. In this project development, the breast area will be
identified first before the watermarked process is done, the purpose of this approach
is to avoid embedding at the breast area.
As mention before in the literature review chapter, viewing the mammogram
is in symmetrical organs is the better approach to avoid mistakes in diagnosis the
mammogram. The physician will view and read the mammogram in side by side
37
orientation before doing further analysis on the mammogram image. Thus, the
algorithm will check whether the breast area at the left side or at the right side of
mammogram image before watermarking process is done. This can be done by
calculating and comparing the dark and bright pixel. Moreover, since different
medical image will have different background color level, the background color of
each mammogram samples will be checked by using data cursor tool in MATLAB
software to get the suitable range for dark value. The development of algorithm and
the prototype has been done by using MATLAB software.
Figure 4.1 shows the basic watermarking design that implemented in this
project development where the inputs will be mammogram image and patient’s
information as watermarking. After that, both of the inputs will go through to the
embedding process. Then, it will be followed by the extracting process and the
output is a watermarked mammogram image.
Mammogram
Watermarking
Embedding
Process
Extracting
Process
Watermarked
Mammogram
Image
Figure 4.1: Basic Watermarking Design
Figure 4.2 shows the overview design that has been used to develop an
authentication of mammogram image by using watermarked technique. The input
will be the mammogram image and patient’s information. Identifying breast area will
be done before the embedding process. After that, extracting process will be
executed and finally, for the output will be a watermarked mammogram images.
38
Mammogram
Identify Breast
Area
Embedding
Process
Watermarked
Mammogram
Image
Extracting
Process
Patient’s
Information
Figure 4.2: Best- Location Technique for Mammogram Authentication by LSB
Based Watermarking Design
4.3
Activity Flow Diagram
Based on the Figure 4.3, shows that the Activity Flow Diagram for the
prototype. The description will be explained in the next title.
39
Start
Click Browse
Mammogram Button
Click Insert Patient‘s
Information Button
End
No
Click Embedding
Button
Success Embeds the
Watermark into
Mammogram?
Identify Breast
Location, Bit Planes
and Extract 8th bit
plane of Mammogram
Replace the Bit of
Watermark Objects
within 8th Bit Plane of
the Host Image
Yes
Watermarked
Mammogram
Embedded
End
No
Success Extract the
Watermark into
Mammogram?
Click Extracting
Button
Identify Bit Planes to
Extract Patient
Information from
Mammogram
Yes
Compare the
watermarked
mammogram with the
original mammogram
by using PSNR.
End
Figure 4.3: Activity Flow Diagram for the Prototype Design
40
4.3.1 Prototype Design
Below is Figure 4.4, that shows the prototype design that has been developed
by using MATLAB software. This prototype has 4 buttons to execute the below
module. The mammogram image will be displayed on the axes at the right screen.
Figure 4.4: Prototype Design
4.3.2 Browse Mammogram Module
This module is to browse the mammogram images in the bitmap format.
Browsing can be done by clicking on the ‘Browse Mammogram’ button. User can
select the mammogram image that wants to be watermarked in the directory. The
selected watermarked image will be displayed in the axes at right screen.
41
4.3.3 Insert Data Module
Type of watermark that will be used is in text format. The watermark will be
the patient’s information such as Patient’s Name, Patient’s ID, Age, MyKad (Identity
Card of Malaysia), Date, Physician’s Name and Diagnosis. The data can be inserted
by clicking on the button of ‘Insert Data’ as shown in the Figure 4.5 below. All
information must be inserted and will be saved in .txt format.
Figure 4.5: Patient Information
4.3.4 Watermarked Module
In this module, the embedding process will be continued after the
‘Watermarked’ button is clicked. At this phase, the patient’s information will be
embedded in the mammogram image. During the embedding process, the best
location of embedding watermark will be involved to differentiate the background of
mammogram with the breast area. Thus, the embedding of watermarking will be
done in the background area and type of watermark that will be implemented is
invisible watermark and from the literature review that has done, invisible watermark
is suitable for copyright purpose.
42
After the watermarked process completed, the watermarked image will be
displayed at the right screen and the message dialog will be displayed to show that
the watermarked process completed. Finally the watermarked image will be saved in
the directory that has been chosen by the user. Refer Figure 4.6 below.
Additionally, from the studies that have been done, watermarking is also
preferred to be chosen as a favourite technique in hiding information by the
researches. This is because it will help to enhance the security and privacy in the
hospitals and also to manage the patients’ data since issues regarding the image
efficiency still occurred. Furthermore, LSB is already well accepted as watermarking
technique and from the result of the experiments that has been successfully done by
the researches, this technique can be used to accomplish the watermarked process
and also be able to embed large information.
Figure 4.6: Watermarked
43
4.3.5 Extracting Module
The extracting process is a process that will read the watermarking that has
been embedded into watermarked mammogram. The patient’s information that has
been embedded in the mammogram image will be read back and displayed at the text
field Figure 4.7 below. Since PNSR is commonly used to measure the quality of
image. Thus, it will be used to measure the quality of the extracting mammogram.
After watermarked process accomplished, the PSNR value will be displayed to show
the image quality value after watermark.
Figure 4.7: Extract Data
4.4
Algorithm Flow Chart
Figure 4.8 is the flow chart of the algorithm for this prototype. Before
embedding the watermarking, the selected mammogram will be split into two parts,
A and B like Figure 4.9. The size of A and B will be identified based on the
mammogram image size. The reason to split the mammogram into two parts is for
the pixel comparison purpose in the next process.
44
Next step is to identify the location of breast area. This can be done by
calculating the black (dark) and white (bright) pixel at both parts. The dark pixel has
been set from 0 to 26. Based on the literature review, the background of
mammogram will be in the black and gray colors. Thus, Data Cursor Tool on the
MATLAB Software has been used to check the range of dark pixel of mammogram
samples since it is hard to differentiate because the intensity of color looks similar.
Part A
Part B
Figure 4.9: Categorize the Mammogram into Part A and Part B
Then, for A part of mammogram, bright and dark pixel are calculated. The
purpose to calculate the pixel color is to ensure whether the bright pixel is more than
the dark pixel or not. The same activity is done to the B part.
45
After that the amount of dark pixel at A is compared with the amount of dark
pixel at B. If the quantity of the dark pixel at A more than B, the breast area will be
at right side and the patient’s information will be embedded at the left side. However,
if the quantity of the black pixel at A is less than Right, breast area will be at the left
side and the patient’s information will be embedded at the right side.
As mention before, Least Significant Bit (LSB) watermarking is used in this
algorithm. After the selected image and the input patient’s information has been
changed into the binary format, there will be 8 bit plane for each pixel like shown as
Figure 4.10. The patient’s information will be hidden in the LSB image. The
insertion of LSB will be together with key to define the starting embedding location
at the background area. About 25 samples of images have been tested to embed the
same size patient’s information with the different LSB value and the result will be
discussed later.
LSB 1
LSB 2 LSB 3
LSB 4
LSB 5
LSB 6
LSB 7 LSB 8
Figure 4.10: LSB Bit Plane
Patient’s information will be embedded to the image based on the LSB
chosen. Below is the example for LSB 1. Mammogram image will be converted into
binary as shown in the Figure 4.11. ‘G’ will be represented as patient’s information,
which will convert into 01000111 as shown in the Figure 4.12. The character 'G' will
be across the following eight bytes of a mammogram file. These eight bits will be
inserted into the least significant bit of each of the eight image bytes as shown in
Figure 4.13. The same process will be applied to LSB 2, LSB 3, LSB 4, LSB 5, LSB
6, LSB 7 and LSB 8 respectively.
10010101
00001101
11001001
10010110
00001111
11001011
10011111
00010000
Figure 4.11: Bit Plane that Represent Images
46
0
1
0
0
0
1
1
1
Figure 4.12: ‘G’ in Binary
10010100
00001101
11001000
10010110
00001110
11001011
10011111
00010001
Figure 4.13: After Watermarked
After embedding process has done, the next activity will be the extracting
process where patient’s information will be read on the watermarked mammogram.
The watermarked mammogram has been inserted with the patient’s information at
the LSB of mammogram image. Thus, to read back the information from the
watermarked mammogram, the process when embedding the data will be turned
around where the same key will be used to find the starting location embedding at the
background area and extract the patient’s information in the watermarked
mammogram.
Finally, checking the quality of the watermarked mammogram, PSNR
formula has been used to measure the quality of mammogram. Please refer
Appendix A to see the PSNR result of 25 samples mammogram.
47
Separate the mammogram image into two parts:
A and B
Identify the pixel color whether it is dark or
bright pixel.
No
Consider as Bright pixel
Intensity less than 26?
Yes
Calculate bright and dark pixel
at B part. Compare pixel color
at both part
Consider as Dark pixel
Calculate bright and dark pixel at A part. Compare
pixel color at both parts
Black pixel at part A is
more than Black pixel at
B?
Yes
Breast Area at Right Side
No
Breast Area at Left Side
Embed patient’s information at
Right Side
Embed patient’s information at Left Side
Extract watermark
Test the quality of watermarked image by using
PSNR
Figure 4.8: Algorithm Flow Chart
48
4.5
Best- Location Technique Algorithm for Mammogram Authentication by
LSB Based Watermarking
Below is the algorithm that has been developed in this project:
1. Algorithm to Identify Breast Area.
i.
Calculate dark and bright pixel at A part:
a. Identify size of row and column for A part.
b. Calculate the pixel intensity for mammogram image that LESS than
26.
c. Calculate the pixel intensity for mammogram image that MORE than
26.
ii.
Calculate dark and bright pixel at B part:
a. Identify size of row and column for B part.
b. Calculate the pixel intensity for mammogram image that LESS than
26.
c. Calculate the pixel intensity for mammogram image that MORE than
26.
iii.
Comparing black pixel at A and B part:
a. If black pixel at A part MORE than B part, breast area at the right
side.
b. If black pixel at A part LESS than B, breast area at the left side.
2. Algorithm to Embedded Information.
i.
For breast area at the left side:
a. Information will be embedding at the right side when the pixel
intensity of pixel is less 30.
b. If information is less than value image bits, the embedding will stop.
c. All the information will be embedded into mammogram image by
replacing the binary of watermarked mammogram image based on
LSB and key.
49
ii.
For breast area at the left side:
a. Information will be embedded at the left side when pixel intensity of
pixel is less 30.
b. If information in less than value image bits, the embedding will stop.
c. All the information will be embedded into mammogram image by
replacing the binary of watermarked mammogram image based on
LSB and key.
3. Algorithm to Extract Information.
a. Information will extract the data by using key and compare the text
size and logo size of information between original image and
watermarked image.
4. Check quality of watermarked image by using PSNR.
a. Get mean squared error (MSE) value by using the MSE formula:
b. Get PSNR value by using PSNR formula
4.6
Summary
As a summary, best- location technique for mammogram authentication by
LSB based watermarking is developed using MATLAB software. According to the
studies about the current technology and issues in medical image authentication, it
shows that the further research is still needed. Thus, by identifying the best location
on the mammogram image it will help to embed the patient’s information without
affecting the quality of the image. Furthermore, by developing an authentication
technique on mammogram image, the patient’s information that embeds into the
mammogram background can extract patient information without distorting the
medical image.
CHAPTER 5
RESULTS AND DISCUSSION
5.1
Introduction
This chapter discusses about the results of an authentication of mammogram
image by using watermarked technique. There are 25 samples of mammogram
images are being used to test the algorithm for quality and authentication testing
purpose at the extraction process and the samples will be in grayscale format.
5.2
Results in Identifying Breast Area
This process identifies the breast area, by dividing the image into two parts
such as part A and B. After dividing the image into these two parts, the pixel
intensity of mammogram images is calculated to identify the breast area. The pixel
intensity that is less than 26 will be considered as dark pixel and 27 until 255 will be
consider as bright pixel.
After calculating dark and bright pixel between these two parts, the
comparison dark pixel between these parts is done to check which side has darker
pixel. If A part has darker pixel than B part, it means that the breast area is at the
right side and the embedding patient’s information is done at the background area
which is at the left side. This algorithm has been tested to the mammogram samples
and it can identify the breast area acceptably.
51
5.3
Results in Embedding Process
After breast area has been identified, embedding process is done, embedding
process uses Least Significant Bit (LSB) where the bit of patient’s information is
replaced in the LSB of mammogram image. Based on the algorithm, only LSB 1 and
2 shows a little distorted at the background images while only some images are
distorted when using LSB 3. For LSB 4 until LSB 8, there are no distorted images
identified at all. Refer Appendix B to see the watermarked images that used LSB 1
to LAB 8.
5.4
Results in Extracting Process
Extracting process is a process that can extract the patient’s information on
watermarked image. Based on the result, all information that has been embedded in
the samples of mammogram images can be read back without any interruption or
data lost. The text file size before embedding and after extraction is also in the same
size. This shows that the algorithm has successfully extracted the data and enables to
authenticate the mammogram image.
5.5
Results in PSNR Testing
PSNR is being used to test the quality of image. The samples of watermarked
mammogram images show the results are more than 45 dB. Please refer Appendix
A, for the summary of PSNR result. The PSNR has been tested to the watermarked
image of LSB 1 until LSB 8. Appendix B shows some of the watermarked
mammogram images with PSNR result. Table 5.1 and Table 5.2 show the result of a
watermarked mammogram image of LSB 1 until LSB 8.
52
Table 5.1: Result of A Watermarked Mammogram Image of LSB 1 until LSB 8
(Breast Area at Left side).
Data
Mammogram
1
Name: CIK FERESA BINTI MOHD FOOZY ID: ID001
MyKad: 840102067541
Age: 25
Date: 18/09/2009 , 11:01:48 AM
Physician Name: NORAITY BINTI NORDIN
Diagnosis: Highly suggestive of malignancy (cancer) means that
there are findings that look like and probably are cancer. Patient
requires biopsy.
Size character: 2044
LSB 1
49.9075
Dimension:
305 x 620
Mammogram
1
Dimension:
305 x 620
LSB 2
55.9281
53
Mammogram
1
LSB 3
61.9487
Dimension:
305 x 620
Mammogram
1
Dimension:
305 x 620
LSB 4
67.9693
54
Mammogram
1
LSB 5
79.8256
Dimension:
305 x 620
Mammogram
1
Dimension:
305 x 620
LSB 6
80.6174
55
Mammogram
1
LSB 7
89.6483
Dimension:
305 x 620
Mammogram
1
LSB 8
94.5295
Dimension:
305 x 620
Label:
Shows the distorted location on the mammogram.
56
Table 5.2: Result of A Watermarked Mammogram Image of LSB 1 until LSB 8
(Breast Area at Right Side).
Data
Mammogram
16
Name: CIK FERESA BINTI MOHD FOOZY ID: ID001
MyKad: 840102067541
Age: 25
Date: 18/09/2009 , 11:01:48 AM
Physician Name: NORAITY BINTI NORDIN
Diagnosis: Highly suggestive of malignancy (cancer) means that
there are findings that look like and probably are cancer. Patient
requires biopsy.
Size character: 2044
LSB 1
49.7793
Dimension:
306x600
Mammogram
LSB 2
16
55.7999
Dimension:
306x600
57
Mammogram
LSB 3
16
61.8205
Dimension:
306x600
Mammogram
LSB 4
16
67.8411
Dimension:
306x600
58
Mammogram
LSB 5
16
73.8617
Dimension:
306x600
Mammogram
LSB 6
16
82.0383
Dimension:
306x600
59
Mammogram
LSB 7
16
87.7592
Dimension:
306x600
Mammogram
LSB 8
16
94.0795
Dimension:
306x600
Label:
Shows the distorted location on the mammogram.
60
5.5.1 Results in Attacking the Watermarked of Mammogram Image
The advantage of using JPEG format, it will help in minimizing the disk
storage and the file image storage. This format will reduce the image size and quality
because of the compression. Thus, this intentional attack has been done to the
algorithm to check the quality of watermarked images after the attack. From the
experiments that have done, the quality of the image is still in a good condition and
the PSNR result shows it is more than 30dB (Refer Appendix A for the PSNR
result).
5.6
Summary
For the summary, the requirement of the project has been achieved where an
authentication technique of watermarked mammogram using the LSB technique has
been developed and the best location on the mammogram has been identified to
embed the patient’s information without affecting the quality of the image.
Moreover, PSNR result shows that, the quality of image is still in a good condition
after embedding the patient’s information and this process has been done at the
background area so the quality of breast area will not interrupt.
CHAPTER 6
CONCLUSION AND FUTURE WORK
6.1
Introduction
This chapter discusses about the contribution and the future work of this
project. There are 25 samples of mammogram images being used in Bitmap format
to test the algorithm for quality and authentication testing purpose at the extraction
process and the samples are in grayscale format.
6.2
Contribution of the Project
A prototype for this project has been developed where this algorithm has the
ability to embed more information on mammogram images by using LSB technique.
This algorithm is also able to identify the best location by calculating and comparing
the dark and bright pixel intensity in the mammogram images. This is to differentiate
the breast and background area of the mammogram images. Normally, embedded
images are considered as a good quality if the PSNR is more than 30dB. Seems, the
experiment shows the result of PSNR of this technique is more that 45dB, thus the
images are still in a good quality (refer Appendix B).
62
For the extraction process, all patient’s information can be read and this
shows that the mammogram images have been authenticated with the patient’s
information.
6.3
Future Work
For the future work of algorithm, artificial intelligent techniques are
suggested to enhance the algorithm. By implementing this technique, pixel intensity
in mammogram images can be checked precisely to differentiate the critical area and
the background area. Moreover, different attempts can be tested to study the
outcomes of the experiment.
6.4
Summary
LSB watermarking is a technique that available to embed large information,
thus by using this technique in the mammogram image, it can embed large patient’s
information. As mention in the previous chapter, this algorithm consists of two
processes such as embedding the patient’s information in text format where the best
location will be identified based on the pixel color intensity and another process is
extracting process. Based on the pixel color intensity, the area of breast location can
be identified at the left or at the right side of mammogram image. By identifying the
breast location, the patient’s information will not embed at the breast area and the
breast area will not distort.
63
Based on the result (refer Appendix B), it shows that by using LSB 1, LSB 2
and LSB 3 the mammogram images will distort the embedded area. However by
using LSB 4, LSB 5, LSB 6, LSB 7 and LSB 8, there is no distortion traced. For
extracting process, the algorithm will read the patient’s information that has
embedded on the watermarked mammogram images. Based on the result, the
algorithm can extract (read) the patient’s information.
The algorithm for an authentication of mammogram image was developed to
study the implementation of LSB watermarking technique on the mammogram
images and to test the quality of image and extract the patient’s information. A
prototype also has been developed to run the algorithm. Moreover, this algorithm
also has been tested with JPEG compression attack and the PSNR result of JPEG
compression is more than 30 dB (refer Appendix A).
64
References
A. Giakoumaki et al. P. (2006). Secure and Efficient Health Data Management
through Multiple Watermarking On Medical Images. Springer
Med.Bio.Eng.Comput. 44: 619-631.
Anastasios Tefas et al. (2005). Watermarking Techniques for Image Authentication
and Copyright Protection. Elsevier Academic Press.
A.W.T. Goh et. al. P. (2008). On the Security of Zhou et al.’s Authentication and
Integrity Scheme for Digital Mammography Images. Springerlink: Biomed
2008, Proceedings 21. 871–874.
BBC. (9th January 2009). Prisoners' medical details lost. BBC News.
http://news.bbc.co.uk/2/hi/uk_news/england/lancashire/7820338.stm
Bits per pixel - Image Processing with LEADTOOLS. Retrieved 2nd August 2009,
from
http://www.imaging-components.com/Imaging-Components/ImageProcessing/bits-per-pixel.shtm
B.Planitz and A. Maeder. P. (2006). Medical Image Watermarking: A Study on
Image Degradation. Brisbane: e-Health Research Centre, ICT CSIRO
Breast cancer cases Molson Informatics Project, McGill Faculty of Medicine website
Interactive Mammography Analysis Web Tutorial. Retrieved 2nd August 2009, from
http://sprojects.mmi.mcgill.ca/Mammography/index.htm
65
Chen C.C and Ka D.S. P. (2008).Dct-Based Zero Replacement Reversible Image
Watermarking Approach.
Chiou-Ting Hsu and Ja-Ling Wu. P.(1996). Hidden Signatures in Images. Taiwan:
National Taiwan University, Taipei.
C.S.Woo et al. P. (2006). Multiple Watermark Method for Privacy Control and
Tamper Detection in Medical Images. Australia: Information Security
Institute, Faculty of Information Technology, Queensland University of
Technology.
D.C. Lou et al. P (2009). Multiple Layer Data Hiding Scheme For Medical Images.
ScienceDirect Computer Standards & Interface. Page: 329-335.
Center of Medicare & Medicaid Services (CMS). P. 2005.Selecting a Development
Approach.
C. M. Kung, et al. P (2003). A Robust Watermarking and Image Authentication
Technique. IEEE. 400-404.
Daniel B. Kopans. P(2007) . Breast imaging. Lippincott Williams & Wilkins,
Philadephia USA.
Dennis A. Wixom (2003). Systems Analysis Design. Second Edition John Wiley &
Sons, Inc.
Diagnostic and Interventional Radiology. Basic Imaging : Mammography. Creighton
University Medical Center. Retrieved January 31, 2009, from
http://radiology.creighton.edu/mammo.htm
D.J Manning et al. P. (2005). Perception Research in Medical Imaging. British
Journal of Radiology. Page:683-685.
D.Neeta and K.Snehal. P. (2005). Implementation of LSB Steganography and Its
Evaluation for Various Bits. India: Computer Science Dept K.K.Wagh
Institute of Engineering Education & Research, Nashik. Page:173-178.
66
Elham Shahinfard and Shohreh Kasaei. P. (2001).Digital Image Watermarking using
Wavelet Transform.
Eric A. Silva. P. (2008).Quantifying Image Similarity Using Measure Of
Enhancement By Entropy. University of Texas at San Antonio.
F. Caoa et al. P. (2002). Medical image security in a HIPAA mandated PACS
Environment. Sciencdirect : Computerized Medical Imaging and Graphics 27
(2003). Page:185–196.
G.Coatrieux et al. P. (2002). Relevance of Watermarking in Medical Imaging. Paris:
ENTS,Department TSI.
G.Coatrieux et al. P. (2008).Watermarking Medical Images with Anonymous Patient
Identification to Verify Authenticity. Inserm U650, LaTIM; GET ENST
Bretagne, Dpt. ITI.
G.Muller. P. (2008).Medical Imaging Workstation: CAF Views. Embedded Systems
Institute. Page:8-16.
Husrev T. Sencar and Nasir Memon. P. (2006) Watermarking and Ownership
Problem: A Revisit. New York.
How Mammography is Performed: Imaging and Positioning. Retrieved 2nd August
2009, from
http://www.imaginis.com/breasthealth/mammography_imaging.asp
Jinshen Wang et. al. P. (2004).A Feature-Watermarking Scheme for JPEG Image
Authentication.Springer: Verlag Berlin Heidelberg. 212–222.
J. Marc Overhage et al. P. (2005).Integration of Radiographic Images with an
Electronic Medical Record.Indianapolis.
J. Nayak et al. P. (2008). Secure and Efficient Health Data Management through
Multiple Watermarking On Medical Images. Springer Science Business
Media.
67
Ju-YuanHsiao et al. P.(2009).Block-Based Reversible Data Embedding .
Sciencedirect: Signal Processing.Page: 556–569.
K. A. Navaset Al. P. (2008).EPR Hiding In Medical Images for Telemedicine.
Proceedings Of World Academy Of Science, Engineering And Technology
.Page: 307-6884.
Marie Babel a et al. P. (2008). Joint source–channel coding: Secured and
progressive transmission of compressed medical images on the Internet.
Sciencedirect: Computerized Medical Imaging and Graphics. Page: 258–269.
Medindia.com. Digital Mammogram For Detection Of Breast Cancer In Women
With Dense Breasts. The New England Journal of Medicine. Retrieved 16th
September 2005.
http://www.medindia.net/news/view_news_main.asp?str=2&x=4963
Mingyan Lia et. al. P. (2005). Protecting Patient Privacy Against Unauthorized
Release Of Medical Images In A Group Communication Environment.
Sciencedirect: Computerized Medical Imaging and Graphics 29 (2005). Page:
367–383.
Mohamed Kallelet al. P. (2007). A multiple Watermarking Scheme for Medical
Image in the Spatial Domain. GVIP Journal. Page: 37-42
M. R. M. Rizk et al. P. (2006). Adaptive Watermarking Techniques Based On MultiScale Morphological Image Segmentation. Egypt
N. Liu, P. Amin et al. P. (2006).Chapter 7: An Overview of Digital
Watermarking.Journal Of Innovative Computing, Information And Control.
N. L.Ping. P. (2003). A Study of Digital Watermarking on Medical Image. IFMBE
Proceedings.Page: 2264-2267.
Pam Stephan. P.(2007). What Are the Two Angles of View for a Routine
Mammogram?.Medical Review Board.
68
Rongrong Ni et al. P. (2008). Pinpoint Authentication Watermarking Based On A
Chaotic System. ScienceDirect: Forensic Science International . Page: 54–62.
S.Boucherkha and M. Benmohamed. P.(2005). A Lossless Watermarking Based
Authentication System for Medical Images. Proceedings of World Academy
of Science, Engineering and Technology. Page: 100-103.
S. Huliiv et al. P. (2004). A Variable Depth LSB Data Hiding Technique in Images.
IEEE: Proceedings of the Third International Conference on Machine
Learning and Cybernetics, Shanghai. Page: 3990-3994.
S. Luigi. P. (2005). Mammogram. Italy: Department of Dentistry and Surgery.
Section of General Surgery, Medical and Dentistry School, State University
at Bari.
Veysel Aslantas. P. (2008). An Optimal Robust Digital Image Watermarking Based
On SVD Using Differential. Sciencedirect: Computerized Medical Imaging
and Graphics. Page: 258–26
Woman to Woman: Dixie Mills. Mammograms — what’s best for you?. Retrieved
2nd August 2009, from
http://www.womentowomen.com/breasthealth/mammograms.aspx
Y.Li et al. P. (2007). Protection of Mammograms Using Blind Steganography and
Watermarking. United Kingdom: Department of Computer Science,
University of Warwick.
Y. I. Khamlichi et al. P(2003).Authentication System For Medical Watermarked
Content Based Image.
Zhou X Q, Huang H K, Lou S L (2001) Authenticity and Integrity of Digital
Mammography Images. IEEE Trans Med Imaging.
69
APPENDIX A
SUMMARY OF PSNR RESULT
70
LSB
Mammogram
LSB
1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Side of
Breast Area
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Right
Right
Right
Right
Left
Right
Right
Right
Right
Right
Right
Right
LSB
2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Right
Right
Right
Right
Left
Right
Right
PSNR(dB)
49.9075
50.5470
50.5121
49.6284
50.5539
51.3289
51.0522
49.5045
51.2420
50.4778
50.4941
50.4700
50.6665
50.8613
51.1359
49.7793
50.4602
49.9622
50.5470
50.0311
50.6665
51.2420
50.4778
50.6665
50.7580
PSNR(dB)
(JPEG Attack)
44.6367
43.8638
43.2719
42.0953
42.5077
41.7875
42.5839
43.1760
43.0104
44.1941
43.2633
44.0444
44.6917
44.7401
41.5258
44.0209
41.8908
34.1179
43.1418
42.9403
45.1666
42.7561
42.8833
44.7804
43.8241
55.9281
56.5676
56.5327
55.6490
56.5745
57.7635
57.0728
55.5251
57.2626
56.4984
56.5147
57.5551
56.6871
56.8819
57.1565
55.7999
55.4162
55.9828
56.5676
56.0517
45.0613
44.0966
43.4509
42.3064
42.6872
41.9468
42.7116
43.3724
43.1925
44.5080
43.4130
44.3175
45.0507
45.1007
41.7063
44.5040
42.2069
34.1568
43.4172
43.3074
71
21
22
23
24
25
Right
Right
Right
Right
Right
56.8802
57.2626
56.4984
56.6871
56.7786
45.6388
42.9593
43.1862
45.1921
44.2059
LSB
3
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Right
Right
Right
Right
Left
Right
Right
Right
Right
Right
Right
Right
61.9487
62.5882
62.5533
66.8359
62.5951
66.7944
68.9292
67.3815
63.2832
62.5190
64.1114
63.3409
62.7077
62.9025
64.7532
61.8205
61.4368
62.0034
68.4239
62.2653
62.7077
63.2832
62.5190
62.7077
62.7992
45.0746
44.1314
43.4813
42.3364
42.7111
41.9589
42.7515
43.4459
43.2099
44.5575
43.4580
44.3337
45.1150
45.1934
41.7605
44.5887
42.2879
34.1576
43.5032
43.3582
45.7656
43.0088
43.2430
45.3250
44.2770
LSB
4
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Right
Right
Right
67.9693
74.4445
68.5739
67.8832
74.4515
71.6755
69.1140
67.5663
69.3038
70.1157
71.0337
68.7248
69.1234
68.9231
71.6755
67.8411
45.0999
44.1347
43.4870
42.3348
42.7141
41.9603
42.7493
43.4435
43.2181
44.5633
43.4634
44.3457
45.1232
45.2157
41.7639
44.6142
72
17
18
19
20
21
22
23
24
25
Right
Left
Right
Right
Right
Right
Right
Right
Right
73.2932
68.0240
70.7648
68.0929
68.9214
75.1395
68.5396
68.7283
68.8198
42.3014
43.5018
43.5018
43.3775
45.7839
43.0238
43.2589
45.3418
44.2922
LSB
5
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Right
Right
Right
Right
Left
Right
Right
Right
Right
Right
Right
Right
79.8256
80.4651
77.0724
76.1886
80.4721
76.7944
80.9704
73.5869
81.1601
77.0381
77.0543
78.1696
79.3353
77.7691
78.8356
73.8617
73.4780
79.8804
76.4857
79.2798
75.5787
75.3244
80.3960
76.0617
79.4268
45.0999
44.1341
43.4870
42.3367
42.7139
41.9604
42.7515
43.4461
43.2187
44.5632
43.4634
44.3459
45.1232
45.2206
41.7647
44.6148
42.3014
34.1597
43.5037
43.3793
45.7862
43.0238
43.2608
45.3457
44.2939
LSB
6
1
2
3
4
5
6
7
8
9
10
11
12
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
80.6174
82.8060
82.1912
82.2092
84.2742
85.3137
81.5503
79.6075
81.9520
83.0587
83.0749
81.6375
45.0999
44.1341
43.4880
42.3367
42.7139
41.9603
42.7512
43.2187
43.2187
44.5632
43.4634
44.3468
73
13
14
15
16
17
18
19
20
21
22
23
24
25
Left
Right
Right
Right
Right
Left
Right
Right
Right
Right
Right
Right
Right
83.5950
82.2771
82.5517
82.0383
80.3284
80.0652
82.5063
80.5292
82.9255
84.1704
83.0587
83.5950
81.2561
45.1232
45.2208
41.7646
44.6151
42.3016
34.1597
43.5041
43.3797
45.7866
43.0238
43.2609
45.3460
44.2940
LSB
7
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Left
Right
Right
Right
Right
Left
Right
Right
Right
Right
Right
Right
Right
89.6483
88.8266
90.2530
87.0647
87.7420
89.4155
90.0013
86.9409
89.8434
88.4578
89.4431
87.9064
88.6465
88.2977
89.7373
87.7592
88.7226
91.9216
89.4960
87.7308
87.8547
88.1953
88.7574
90.4074
87.2767
45.0999
44.1340
43.4880
42.3368
42.7139
41.9603
42.7514
43.4461
43.2186
44.5632
43.4636
44.3468
45.1232
45.2208
41.7647
44.6152
42.3016
34.1597
43.5041
43.3794
45.7860
43.0239
43.2607
45.3460
44.2940
LSB
8
1
2
3
4
5
6
7
8
Left
Left
Left
Left
Left
Left
Left
Left
94.5295
94.5475
94.2324
93.9286
94.8541
94.3446
96.3998
93.8047
45.0999
44.1340
43.4880
42.3368
42.7139
41.9603
42.7514
43.4461
74
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Left
Left
Left
Left
Left
Right
Right
Right
Right
Left
Right
Right
Right
Right
Right
Right
Right
94.9623
93.9348
93.7028
95.0920
93.6405
94.8618
95.1365
94.0795
93.1159
97.9422
94.0040
93.7514
94.6671
95.8640
95.8254
98.6465
93.7319
43.2186
44.5632
43.4636
44.3468
45.1232
45.2208
41.7647
44.6152
42.3016
34.1597
43.5041
43.3794
45.7861
43.0239
43.2608
45.3460
44.2940
75
APPENDIX B
WATERMARKED IMAGES
76
Data
Mammogram 3
Dimension:
345x630
Mammogram 3
Dimension:
345x630
Name: CIK FERESA BINTI MOHD FOOZY ID: ID001
MyKad: 840102065174
Age: 25
Date: 18/09/2009 , 11:01:48 AM
Physician Name: NORAITY BINTI NORDIN
Diagnosis: Highly suggestive of malignancy (cancer) means
that there are findings that look like and probably are
cancer. Patient requires biopsy.
Size character: 2044
LSB 1
50.5121
LSB 2
56.5327
77
Mammogram 3
Dimension:
345x630
Mammogram 3
Dimension:
345x630
Mammogram 3
Dimension:
345x630
LSB 3
62.5533
LSB 4
68.5739
LSB 5
77.0724
78
Mammogram 3
Dimension:
345x630
Mammogram 3
Dimension:
345x630
Mammogram 3
Dimension:
345x630
Label:
LSB 6
82.1912
LSB 7
90.2530
LSB 8
94.2324
Shows the distorted location on the mammogram.
79
Data
Name: CIK FERESA BINTI MOHD FOOZY ID: ID001
MyKad: 840102067541
Age: 25
Date: 18/09/2009 , 11:01:48 AM
Physician Name: NORAITY BINTI NORDIN
Diagnosis: Highly suggestive of malignancy (cancer) means that
there are findings that look like and probably are cancer. Patient
requires biopsy.
Size character: 2044
LSB 1
Mammogram
4
49.6284
Dimension:
345x514
Mammogram
4
LSB 2
55.6490
Dimension:
345x514
80
Mammogram
4
LSB 3
66.8359
Dimension:
345x514
Mammogram
4
LSB 4
67.8832
Dimension:
345x514
Mammogram
4
LSB 5
76.1886
Dimension:
345x514
Watermark Mammogram Image
81
Mammogram
4
LSB 6
82.2092
Dimension:
345x514
Mammogram
4
LSB 7
87.0647
Dimension:
345x514
Mammogram
4
LSB 8
93.9286
Dimension:
345x514
Label:
Shows the distorted location on the mammogram.
82
Data
Name: CIK FERESA BINTI MOHD FOOZY ID: ID001
MyKad: 840102067541
Age: 25
Date: 18/09/2009 , 11:01:48 AM
Physician Name: NORAITY BINTI NORDIN
Diagnosis: Highly suggestive of malignancy (cancer) means that
there are findings that look like and probably are cancer. Patient
requires biopsy.
Size character: 2044
LSB 1
Mammogram
5
50.5539
Dimension:
350x627
Mammogram
5
LSB 2
56.5745
Dimension:
350x627
83
Mammogram
5
LSB 3
62.5951
Dimension:
350x627
Mammogram
5
LSB 4
74.4515
Dimension:
350x627
Mammogram
5
LSB 5
80.4721
Dimension:
350x627
84
Mammogram
5
LSB 6
84.2742
Dimension:
350x627
Mammogram
5
LSB 7
87.7420
Dimension:
350x627
Mammogram
5
LSB 8
94.8541
Dimension:
350x627
Label:
Shows the distorted location on the mammogram.
85
Data
Name: CIK FERESA BINTI MOHD FOOZY ID: ID001
MyKad: 840102067541
Age: 25
Date: 18/09/2009 , 11:01:48 AM
Physician Name: NORAITY BINTI NORDIN
Diagnosis: Highly suggestive of malignancy (cancer) means that
there are findings that look like and probably are cancer. Patient
requires biopsy.
Size character: 2044
LSB 1
Mammogram
7
51.0522
Dimension:
387x636
Mammogram
7
LSB 2
57.0728
Dimension:
387x636
86
Mammogram
7
LSB 3
68.9292
Dimension:
387x636
Mammogram
7
LSB 4
69.1140
Dimension:
387x636
Mammogram
7
LSB 5
80.9704
Dimension:
387x636
87
Mammogram
7
LSB 6
81.5503
Dimension:
387x636
Mammogram
7
LSB 7
90.0013
Dimension:
387x636
Mammogram
7
LSB 8
96.3998
Dimension:
387x636
Label:
Shows the distorted location on the mammogram.
88
Data
Name: CIK FERESA BINTI MOHD FOOZY ID: ID001
MyKad: 840102067541
Age: 25
Date: 18/09/2009 , 11:01:48 AM
Physician Name: NORAITY BINTI NORDIN
Diagnosis: Highly suggestive of malignancy (cancer) means that
there are findings that look like and probably are cancer. Patient
requires biopsy.
Size character: 2044
Mammogram 49.9622
18
Dimension:
383x500
Mammogram
18
Dimension:
383x500
55.9828
89
Mammogram
18
62.0034
Dimension:
383x500
Mammogram
18
68.0240
Dimension:
383x500
Mammogram
18
Dimension:
383x500
79.8804
90
Mammogram
18
80.0652
Dimension:
383x500
Mammogram
18
91.9216
Dimension:
383x500
Mammogram
18
97.9422
Dimension:
383x500
Label:
Shows the distorted location on the mammogram.
91
Data
Mammogram
19
Name: CIK FERESA BINTI MOHD FOOZY ID: ID001
MyKad: 840102067541
Age: 25
Date: 18/09/2009 , 11:01:48 AM
Physician Name: NORAITY BINTI NORDIN
Diagnosis: Highly suggestive of malignancy (cancer) means that
there are findings that look like and probably are cancer. Patient
requires biopsy.
Size character: 2044
LSB 1
50.5470
Dimension:
350x626
Mammogram
19
LSB 2
56.5676
Dimension:
350x626
92
Mammogram
19
LSB 3
68.4239
Dimension:
350x626
Mammogram
19
LSB 4
70.7648
Dimension:
350x626
Mammogram
19
LSB 5
76.4857
Dimension:
350x626
93
Mammogram
19
LSB 6
82.5063
Dimension:
350x626
Mammogram
19
LSB 7
89.4960
Dimension:
350x626
Mammogram
19
LSB 8
94.0040
Dimension:
350x626
Label:
Shows the distorted location on the mammogram.
94
Data
Mammogram
20
Name: CIK FERESA BINTI MOHD FOOZY ID: ID001
MyKad: 840102067541
Age: 25
Date: 18/09/2009 , 11:01:48 AM
Physician Name: NORAITY BINTI NORDIN
Diagnosis: Highly suggestive of malignancy (cancer) means that
there are findings that look like and probably are cancer. Patient
requires biopsy.
Size character: 2044
50.0311
Dimension:
320x608
Mammogram
20
Dimension:
320x608
56.0517
95
Mammogram
20
62.2653
Dimension:
320x608
Mammogram
20
68.0929
Dimension:
320x608
Mammogram
20
Dimension:
320x608
79.2798
96
Mammogram
20
80.5292
Dimension:
320x608
Mammogram
20
87.7308
Dimension:
320x608
Mammogram
20
93.7514
Dimension:
320x608
Label:
Shows the distorted location on the mammogram.
97
Data
Name: CIK FERESA BINTI MOHD FOOZY ID: ID001
MyKad: 840102067541
Age: 25
Date: 18/09/2009 , 11:01:48 AM
Physician Name: NORAITY BINTI NORDIN
Diagnosis: Highly suggestive of malignancy (cancer) means that
there are findings that look like and probably are cancer. Patient
requires biopsy.
Size character: 2044
LSB 1
Mammogram
25
50.7580
Dimension:
374x615
Mammogram
25
LSB 2
56.7786
Dimension:
374x615
98
Mammogram
25
LSB 3
62.7992
Dimension:
374x615
Mammogram
25
LSB 4
68.8198
Dimension:
374x615
Mammogram
25
LSB 5
79.4268
Dimension:
374x615
99
Mammogram
25
LSB 6
81.2561
Dimension:
374x615
Mammogram
25
LSB 7
.2767
Dimension:
374x615
Mammogram
25
LSB 8
93.7319
Dimension:
374x615
Label:
Shows the distorted location on the mammogram.
Download