Angelos Fylakis, Anja Keskinarkaus, Juha Partala, Simo Saarakkala, and Tapio Seppänen, “Reversible Data Hiding in FTIR Microspectroscopy Images with Tamper Indication and Payload Error Correction,” BioMed Research International, vol. 2017, Article ID 7584852, 15 pages, 2017. doi:10.1155/2017/7584852
Reversible Data Hiding in FTIR Microspectroscopy Images with Tamper Indication and Payload Error Correction
|Author:||Fylakis, Angelos1,2; Keskinarkaus, Anja1,2; Partala, Juha1,2;|
1Center for Machine Vision and Signal Analysis, University of Oulu, 90014 Oulu, Finland
2MRC Oulu, University of Oulu, 90014 Oulu, Finland
3Research Unit of Medical Imaging, Physics and Technology, University of Oulu, 90014 Oulu, Finland
4Department of Diagnostic Radiology, Oulu University Hospital, 90029 Oulu, Finland
|Online Access:||PDF Full Text (PDF, 3 MB)|
|Persistent link:|| http://urn.fi/urn:nbn:fi-fe201801302637
|Publish Date:|| 2018-01-30
Fourier transform infrared (FTIR) microspectroscopy images contain information from the whole infrared spectrum used for microspectroscopic analyses. In combination with the FTIR image, visible light images are used to depict the area from which the FTIR spectral image was sampled. These two images are traditionally acquired as separate files. This paper proposes a histogram shifting-based data hiding technique to embed visible light images in FTIR spectral images producing single entities. The primary objective is to improve data management efficiency. Secondary objectives are confidentiality, availability, and reliability. Since the integrity of biomedical data is vital, the proposedmethod applies reversible data hiding. After extraction of the embedded data, the FTIR image is reversed to its original state. Furthermore, the proposed method applies authentication tags generated with keyed Hash-Based Message Authentication Codes (HMAC) to detect tampered or corrupted areas of FTIR images. The experimental results show that the FTIR spectral images carrying the payload maintain good perceptual fidelity and the payload can be reliably recovered even after bit flipping or cropping attacks. It has been also shown that extraction successfully removes all modifications caused by the payload. Finally, authentication tags successfully indicated tampered FTIR image areas.
BioMed research international
|Type of Publication:||
A1 Journal article – refereed
|Field of Science:||
217 Medical engineering
This research was supported by Infotech Oulu and the Nokia Foundation.
Copyright © 2017 Angelos Fylakis et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.