检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Mingshuai Sheng Jingbing Li Uzair Aslam Bhatti Jing Liu Mengxing Huang Yen-Wei Chen
机构地区:[1]School of Information and Communication Engineering,Hainan University,Haikou,570228,China [2]State Key Laboratory of Marine Resource Utilization in the South China Sea,Hainan University,Haikou,570228,China [3]School of Computer Science and Technology,Hainan University,Haikou,570228,China [4]Research Center for Healthcare Data Science,Zhejiang Lab,Hangzhou,311121,China [5]Graduate School of Information Science and Engineering,Ritsumeikan University,Kyoto,5258577,Japan
出 处:《Computers, Materials & Continua》2023年第4期293-309,共17页计算机、材料和连续体(英文)
基 金:supported in part by the Natural Science Foundation of China under Grants 62063004;the Key Research Project of Hainan Province under Grant ZDYF2021SHFZ093;the Hainan Provincial Natural Science Foundation of China under Grants 2019RC018 and 619QN246;the postdoctor research from Zhejiang Province under Grant ZJ2021028.
摘 要:Medical images are used as a diagnostic tool, so protecting theirconfidentiality has long been a topic of study. From this, we propose aResnet50-DCT-based zero watermarking algorithm for use with medicalimages. To begin, we use Resnet50, a pre-training network, to draw out thedeep features of medical images. Then the deep features are transformedby DCT transform and the perceptual hash function is used to generatethe feature vector. The original watermark is chaotic scrambled to get theencrypted watermark, and the watermark information is embedded into theoriginal medical image by XOR operation, and the logical key vector isobtained and saved at the same time. Similarly, the same feature extractionmethod is used to extract the deep features of the medical image to be testedand generate the feature vector. Later, the XOR operation is carried outbetween the feature vector and the logical key vector, and the encryptedwatermark is extracted and decrypted to get the restored watermark;thenormalized correlation coefficient (NC) of the original watermark and therestored watermark is calculated to determine the ownership and watermarkinformation of the medical image to be tested. After calculation, most ofthe NC values are greater than 0.50. The experimental results demonstratethe algorithm’s robustness, invisibility, and security, as well as its ability toaccurately extract watermark information. The algorithm also shows goodresistance to conventional attacks and geometric attacks.
关 键 词:Medical images deep residual network resnet50-DCT privacy protection ROBUSTNESS security
分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.166