Watermarking of Chest CT Scan Medical Images for Content Authentication Nisar A. Memon, S.A.M. Gilani,, and Asad Ali

Abstract— Medical image is usually comprised of region of interest (ROI) and region of non interest (RONI). ROI is the region that contains the important information from diagnosis point of view so it must be stored without any distortion. We have proposed a digital watermarking technique which avoids the distortion of image in ROI by embedding the watermark information in RONI. The watermark is comprised of patient information, hospital logo and message authentication code, computed using hash function. Earlier BCH encryption of watermark is performed to ensure inaccessibility of embedded data to the adversaries.

Keywords- BCH Encryption, Data authentication, Electronic Patient Record, Mecdical Images, Spatial domain watermarking

D

I. INTRODUCTION

UE to the development of latest technology in communications and computer networks, exchange of medical images between hospitals has become a usual practice now a days [1]. These medical images are exchanged for number of reasons. For example teleconferences among clinicians, interdisciplinary exchange between clinicians and radiologists for consultative purposes or to discuss diagnostic and therapeutic measures and for distant learning of medical personnel [2]. However these applications require more attention towards image protection (availability, confidentiality and reliability) [3]. To facilitate sharing and remote handling of medical images in a secure manner watermarking guarantee attractive properties [4,5]. It allows permanent association of image content with proofs of its reliability by modifying the image pixel values, independently of the image file format.

For protecting the digital images two categories of watermarking have been developed: Robust watermarking [6] and Fragile Watermarking [7,8]. Robust watermarks are those which are difficult to remove from the digital content. Withstand intentional or incidental distortions like Manuscript received February 11, 2009. This work was supported in part by the Quaid-e-Awam University of Engineering, Science and Technology, Sindh, Pakisan under the faculty development programme and Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, Pakistan. N. A. Memon is with the Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, NWFP Pakistan. (corresponding author: phone: 92-938-271858; fax: 92-938- 271865; e-mail: [email protected]). S. A. M. Gilani, is with the Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, NWFP Pakistan. (e-mail: [email protected]). A. Ali is with the National Engineering and Scientific Commission (NESCOM), Islamabad, Pakistan (e-mail: [email protected]).

compression, scaling, cropping, filtering, A/D or D/A conversion, etc. and therefore are used for copyright applications. Fragile watermarks are those that are easily destroyed by tampering or modifying the watermarked content hence the absence of watermark to the previously watermarked content points to the conclusion that data has been tampered with, and thus are used for data authentication applications. One can use the fragile watermarking for authentication of medical images. In this case, the robustness of watermark in the image is less concerned, while detection and localization of the slight changes of the images are more important [1]. In this paper we have extended our work [19] and have proposed a blind fragile watermarking scheme that does not require the original host image during the extraction of watermark. First the image has been segmented which separates the lung parenchyma from rest of CT scan image then three different types of watermarks are embedded in the host image by replacing the least significant bits (LSBs) of the cover segmented image. LSB is a simple non robust embedding technique with a high embedding capacity and small embedding distortions. The LSBs of image are generally considered as noise caused by the imaging device. So, these bits can be used for secret message embedding without greatly disturbing the image appearance [9]. The scheme serves for both the purposes of medical image authentication and hiding electronic patient record. The portions of an image that contains the significant information for diagnosis are called region of interest (ROI) and must be stored without distortion. Usually it is desirable to embed data outside of ROI to give better protection [10] without compromising with the diagnosis information.

II. LITERATURE REVIEW Different groups of authors have contributed number of medical image watermarking techniques. A technique of embedding electronic patient record (EPR) data in medical images is suggested by Acharya et al. [11]. EPR data consist of text file and graphs. Text file is the preliminary report about the patient from the radiology department of the hospital and graphs are ECG or EEG. It is an LSB technique implemented in spatial domain. The ASCII characters in EPR data are encrypted before interleaving in medical images to improve the security of the data. In an other technique proposed by Nayak et al. [12], the ASCII characters in EPR text are encrypted using Rijndael

978-1-4244-4609-4/09/$25.00 ©2009 IEEE

Authorized licensed use limited to: Design Engineering Centre. Downloaded on October 27, 2009 at 00:10 from IEEE Xplore. Restrictions apply.

algorithm before hiding it in image. Signal graphs (ECG, EEG, EMG etc.) are compressed using differential pulse code modulation (DPCM) technique before hiding. To enhance the robustness of the embedded information, the patient information is coded by Error Correcting Codes such as (7,4) Hamming, Bose-Chaudhuri-Hocquengham (BCH) and Reed Solomon (RS) code. The noisy scenario is simulated by adding salt and pepper noise to the embedded image. For different Signal to Noise Ratio (SNR) of the image, Bit Error Rate (BER) and Number of Characters Altered (NOCA) for text data and percentage distortion (PDST) for the signal graph are evaluated. Xuanwen et al. [13] utilizes compressed binary bit-plane to embed EPR data. Since there are 8 bitplanes for gray scale images with pixel values ranging from 0 to 255. So in order to obtain the sufficient embedding capacity, each binary bitplane is compressed losslessly and data is embedded into saved space. In reverse direction, the embedded data is extracted and the compressed image is decompressed. The original image is recovered because the compression was lossless. Rodriquez et al. [14] searches for the suitable pixels to embed information using the spiral scan starting from the centroid of the image. Then obtain a block with its center at the position of the selected pixel. If the bit to be embedded is 1, change the luminance value of the central pixel by adding the gray-scale level mean of the block with luminance of the block. If the bit to be embedded is 0, change the luminance value of the central pixel by subtracting the luminance of the block from the grayscale level mean of the block. In the extraction procedure, marked pixels are located using the spiral scan starting in the centroid of the image. If the luminance value of the central pixel is greater than the gray scale level mean of the block, then the embedded bit is identified as 1, otherwise as 0. All these algorithm has the limitations that the region of interest (ROI) which is diagnostically important area in medical images has not been implemented in data embedding methods. Some of the important requirements in medical field are to recover the EPR with zero BER, to have the cover image without any distortion. Another requirement is that the ROI should be protected [15].

III. PROPOSED SCHEME In the proposed scheme, during the embedding phase the watermark is constructed from three different watermarks (Section III-A). Later on the watermark is embedded in the LSBs of the region of non interest (Section III-B) of original image using proposed scheme. In the detection stage the embedded watermark is extracted. The extraction process is the reverse process of embedding process. After extracting the watermark, it is first divided into three watermarks, namely hospital logo, patient information and message authentication code. The extracted logo is compared with the logo already known to the detector for subjective authentication. For objective authentication the message authentication code is calculated as was done at the time of embedding and is compared with the extracted authentication code for verifying image integrity.

A.

Watermark generation In order to generate the watermark the following steps are implemented: •

Read the logo image.



Compute global threshold of logo image using Otsu's method.



Use this threshold to convert an intensity logo image into a binary image and then apply the BCH encoding [12,17] to encode it and call this vector as w1.



Read the text file containing the patient information, convert each character of text file into its corresponding ASCII code.



Convert each ASCII code into its corresponding binary code and form the vector. Apply the BCH encoding again to this vector and call it w2.



Set LSBs of all the pixels in the input image to zero and compute the Hash function of this image. The Hash function will give 32 characters string. Convert it into binary string in the same way as described for patient information and then apply the BCH encoding and call it w3.



Now concatenate all the watermarks w1, w2 and w3 and call it W, which is the resultant watermark to be embedded into the host image.

B.

Selection of RONI for embedding the watermark We have proposed to select the region of non interest (RONI) for embedding the watermark in order to assure the integrity of region of interest (ROI) and not to compromise with the diagnosis value of medical image. To achieve this, it is necessary first to separate the original image into ROI and RONI areas. Usually in radiological images the ROI is taken as a square in shape [10,18], which covers half of the total image area. For example in the images of size 512x512 pixels, square of size 256x256 pixels was taken which almost covers the entire ROI. But in some cases especially for radiological CT scan images of chest area, taking logical square for isolating the ROI eradicate some part of ROI as shown in Fig. 1. This is because of the lung parenchyma on lung CT, which is elliptical in shape by nature and taking the square as boundary for isolating ROI eradicates some part of ROI. In other technique proposed in [19], the logical ellipse has been drawn to cover the ROI. This technique though covers the entire lung parenchyma but it also takes the area (like some part of thorax area and some other part lying between the two lung parts) as shown in Fig 2. Thus this segmentation technique includes the image parts which are not of the interest for the doctor for diagnosis point of view thus can be used for embedding watermark information. To cope with this problem we have proposed an algorithm which completely separates the lung parenchyma from the CT scan image, thus increasing the capacity for embedding the data which is some times crucial in medical image watermarking. To segment the lung parenchyma instead of

Authorized licensed use limited to: Design Engineering Centre. Downloaded on October 27, 2009 at 00:10 from IEEE Xplore. Restrictions apply.

drawing logical square or ellipse not only separates the ROI efficiently but also increase the embedding capacity.

7.

Turn those pixels and neighbours whilte which are not tagged. The resultant image will now contain the isolated lung parenchyma.

The flow chart of Otsu algorithm used in step 3 above is shown in Fig. 3.

Fig. 1. Isolating ROI using square [18]

Fig. 2. Isolating ROI using ellipse [19]

1) Separation of Lung Parenchyma For isolating the lung parenchyma an optimal thresholding scheme have been proposed which selects the threshold based on the object and background pixel means. Once the threshold has been selected and applied, region growing and connectivity analysis are used to extract the exact cavity region with accuracy. The interested reader may refer [20] for complete procedure of isolating the lung parenchyma from CT scan image. The overall algorithm for segmentation of the lung parenchyma from the input CT scan image is described as under: 1. 2. 3. 4. 5.

6.

Read the input image. Draw the black bounday on the input image. Find the gray threshold of input image using the Otsu method and call it Tfinal Based on threshold Tfinal found from step 3, turn all pixels white which have the gray values greater than the threshold Find the location of seed pixel and its value for starting the region growing process by searching through all the boundaries leaving black boundary already drawn in step 2. Find the taged image by assigning 1 and 0 to the pixels as follows:

⎧1 I tag ( x, y ) = ⎨ ⎩0

if I ( x, y ) = 255⎫ ⎬ otherwise ⎭

(1)

Fig. 3. The flowchart of Otsu’s algorithm for finding the optimal threshold. [20]

2) Increasing the embedding capacity By isolating the lung parenchyma with the technique described in Section III-B(1) above, we have increased embedding capacity for watermark insertion. By taking the square for isolating the lung parenchyma from the input CT scan image as shown in Fig. 4(a) it was necessary to take at least square of size 192x192 pixels in order to cover the whole lung parenchyma [18]. Thus [(256 x 256) – (192 x 192)] = 28672 pixels were left for embedding. Similarly by taking the oval shape (ellipse) for isolating the lung parenchyma as shown in Fig. 4(b), [(256 x 256) - 33749] = 31787 pixels were left for embedding [19]. With the proposed technique we found [(256 x 256) – 17114] = 48422 pixels for embedding. Thus the proposed scheme has increased the embedding capacity of about 40.78% in case of [18] and 34.35% in case of [19]. The comparative results are shown through graph in Fig. 5. As our segmentation technique is adoptive, so the more embedding capacity can be achieved when images shown in Fig. 8(a) and Fig. 8(c) are used.

Authorized licensed use limited to: Design Engineering Centre. Downloaded on October 27, 2009 at 00:10 from IEEE Xplore. Restrictions apply.

4. 5.

Divide the extracted watermark into w1, w2 and w3. Apply BCH decoding to get back the original watermarks.

Embedding Capacity (pixels)

(a) (b) (c) Fig. 4. (a) ROI as in [18] (b) ROI as in [19] (c) ROI (proposed)

60000 50000 40000 30000 20000 10000 0 square [18]

Ellipse [19]

Segmentation (Proposed)

Image Size (256 x 256)

Fig. 5. The graph showing the comparison of different techniques in terms of embedding capacity Fig. 6. Block diagram of the embedding process IV. EXPERIMENTAL RESULTS

Embedding process The embedding process starts with the generation of watermark (section III-A). Then the host image is divided into region of interest and region of non interest (section IIIB). The watermark is then embedded in region of non interest. The process is described step by step as follows: 1. 2. 3. 4. 5. 6.

Generate the watermark. Separate the image into ROI and RONI. Scramble the pixels of RONI using the key. Embed the generated watermark in the scrambled pixels in LSBs of RONI. Re-scramble the pixels in RONI to take them back to original position. Combine ROI and RONI to get the watermarked image.

The block diagram of embedding process is shown in Fig. 6. Extraction process The extraction process is the inverse of embedding process. Since our scheme is blind so there is no need of original image to extract the embedded watermark. The extraction process has the following steps: 1. 2. 3.

Separate the watermarked image into ROI and RONI. Scramble the pixels of RONI using the same key used for embedding. Extract the LSBs from all the selected pixels.

IV.

EXPERIMENTAL RESULTS

This section describes the experimental results of proposed scheme. The experiments were carried out using the dataset of 11 patients received from AGA Khan University Karachi, Pakistan. Each patient’s dataset contained about 60 to 100 slices of CT Scan images with varying slice thicknesses. All the images are of 256x256 pixels and 8-bit gray level images. The start, middle and end of the lung CT slices of one patient are shown in Fig. 7. We start with the generation of watermark. First the gray level threshold of an intensity image, hospital logo as shown in Fig. 8 is calculated using Otsu’s method. This threshold is then used to convert the gray level logo into binary image. Next the text file containing patient data is read and converted into binary form using ASCII codes of each character present in the text file. Finally the LSBs of input image is set to 0 in order to get the message authentication code (MAC). We used hash function of MD5 type which gives the MAC of fixed length of 32 characters. This string is again encoded into binary form using the same method as used for patient data. After creating these three different watermarks, BCH encoding scheme is used to increase the robustness of embedded data [17]. Each watermark is split into parts of equal length which are incorporated into selected BCH code.

Authorized licensed use limited to: Design Engineering Centre. Downloaded on October 27, 2009 at 00:10 from IEEE Xplore. Restrictions apply.

Table-I shows the BCH encoding scheme used for encoding the embedded data. In general, a binary BCH code with parameters (n,k,l) represents a code word of length n, which includes k bits of watermark array and can correct l bit errors. For example BCH(63,16,11) comprises of code word of 63 bits, which includes 16 bits of watermark to be embedded and can correct 11 bits. So in order to encode the watermark shown as S.No 3 in Table-I, using the BCH(63,16,11) code, the watermark of 5888 bits was split into 368 equal parts each of length 16 and it results into total of 23184 code word bits that need to be embedded. We generated the watermarks of different sizes using varying lengths of logo, and patient information. However MAC length was remained fixed. The results are shown in Table-I. TABLE I.

S.No

WATERMARKS OF DIFFERENT SIZES WHICH WERE GENERATED AND EEMBEDDED

Logo Patient MAC Total (bits) Data (char) (bits) (char)

1.

16 x 16

48

32

896

2.

32 x 32

96

32

2048

3.

64 x 64

192

32

5888

BCH (n,k,l) (63,16,11)

Total PSNR (bits) (dB) 3528

63.98

(63,16,11)

8064

60.14

(63,16,11)

23184

55.60

Fig. 9(a) shows the region of interest and Fig. 9(b) shows the region of non interest after dividing the CT scan image of middle part of lung into two regions. Fig. 9(c) shows the scrambled coefficients of RONI. Fig. 10(a) shows the watermarked image and Fig. 10(b) shows the difference between the cover image and the watermarked image. The degradation introduced in watermarked image with respect to original one is determined by using PSNR and MSE metrics where PSNR is the Peak Signal to Noise ratio and MSE is mean square error as described in [14]. PSNR computes the peak signal to noise ratio in decibels between two images. This ratio is often used a quality measurement between the original and watermarked image. The higher the PSNR, the better the quality of watermarked image. The PSNR is given by: PSNR = 10 log10

R2 MSE

(2)

where R is the maximum fluctuation in the input image data type. For example, if image has double precision floating point data type then R is 1 and if input image has an 8 bit unsigned integer data type R is 255. In our case we used 8bit unsigned integer data type gray scale medical images so we used R = 255. The MSE represents the cumulative square error between the original and watermarked image. Lower the value of MSE lower the error. The MSE is given by the following formula

∑ [( I (m, n) − I 1

2

(m, n)]2

M ,N

MSE =

(3)

M xN

Where M and N are number of rows and number of columns in both the cover (I1) and watermarked image (I2). The degradation in terms of PSNR and MSE in the cover image and watermarked image for different images are shown in Table-II. For the images of size 256x256 we found 73.88% of pixels of total image pixels as RONI and embedded the watermarks of different strengths in it. The graph shown in Fig. 11 shows the degradation in visual quality of the watermarked image with respect to the original image by embedding watermarks of varying strengths in terms of PSNR and MSE. From the graph it can easily be observed that PSNR decreases with increase in the strength of watermark.

(a) Start of lung

(b) Middle of lung

(c) End of lung

Fig. 7. Images used in experiments

Fig. 8. Hospital logo (watermark)

(a) (b) (c) Fig. 9. (a) Region of Interest (b) Region of non interest (c) Pixels scrambled in the region of non interest

(a)

(b)

Fig. 10. (a) Watermarked Image (PSNR = 55.60 dB) (b) Difference between the original and watermarked Image

Authorized licensed use limited to: Design Engineering Centre. Downloaded on October 27, 2009 at 00:10 from IEEE Xplore. Restrictions apply.

TABLE II. IMPERCEPTIBILITY SHOWN IN COVER AND WATERMARKED IMAGES IN TERMS OF PSNR AND MSE

Image

Size

PSNR(dB)

MSE

Start of lung

256 x 256

55.50

0.1832

Middle of lung

256 x 256

55.49

0.1834

End of lung

256 x 256

55.46

0.1849

[5]

[6]

[7] [8] [9]

PSNR v/s Payload 70

66

[11] R. Achariya U., P. Subhanna Bhat, S. Kumar, L. Choo Min, “Transmission and storage of medical images with patient information,” Journal of Computers in Biology and Medicine, vol. 33, 2003, pp. 303-310

PSNR(dB)

64

62

60

[12] J. Nayak, P. Subbanna Bhat, M. Sathish Kuamr, R. Achariya U, “Reliable and Robust Transmission and Storage of Medical Images with Patient Information,” 2004 International Confernce on Signal Processing and Communication(SPCOM), 2004

58

56

54

4000

8000

12000

16000

20000

24000

28000

32000

36000 40000

44000

48000

Number of bits embedded

Fig. 11. Degradation in visual quality with embedded information

V. CONCLUSIONS We have proposed a blind fragile watermarking technique in spatial domain to preserve the history of medical image by embedding medical diagnosis. While embedding the data region of interest (ROI) of medical image has been avoided to ensure the integrity of ROI. The scheme allows the simultaneous storage and transmission of electronic patient record which can be extracted at the receiving end without the original image. Encryption of the embedded data is done to provide additional security. It also provide sufficient capacity for storing about 3K bytes of patient data for the images of size 256x256. The scheme can easily be used in ediagnosis applications. REFERENCES [1]

[2]

[3]

[4]

S. Boucherkha, M. Benmohamed, “A lossless watermarking Based Authentication System for Medical Images,” Proceedings of world academy of science, Engineering and Technology, vol. 1, January 2005

[10] K. A. Navas, S. Archana Thampy, M. Sasikumar, “EPR Hiding in Medical Images for Telemedicine,” Proceedings of World Academy of Science, Engineering and Technology vol. 28, April 2008

68

52 0

X. Q. Zhou, H. K. Huang, and S.L. Lou, “Autheticity and integrity of digital mamography images,” IEEE Transactions on Medical Imaging, vol. 20, no. 8, pp. 784-791, 2001 I. J. Cox, J. Kilian, T. Leighton, T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” Transactions on Image Processing, vol. 6 no. 12, pp. 1673-1687, 1997 S. Walton, “Information authentication for a slipppery new age,” Dr. Dobbs Journal, vol. 20, no. 4, 1995, pp. 18-26 P. Wong, “A public key watermark for image verification and authentication,” Proc. Of ICIP’98, 1998, pp. 425-429

P. Chang-Ri, W. Dong Min, P. Dong-Chul, H. Seung Soo, “Medical Image Authentication Using Hash Function and Integer Wavelet Transform,” IEEE 2008 Congress on Image and Signal Processing, Snaya, Hainan, China, May 27-30, 2008 pp.7-10 H. Munch, U. Engelmann, A. Schroeter, H.P. Meinzer, “Web-based distribution of radiological images from PACS to EPR,” International Congress Series Vol. 1256, 2003 pp. 873-879 G. Coatrieux, J. Montagner, H. Huang, Ch. Roux, “Mixed Reversible and RONI watermarking for Medical Image Reliability Protection,” 29th IEEE International Conference of EMBS, Cite Internationale, Lyon, France, August 23-26, 2007 G. Coatrieux, L. Lecornu, B. Sankur, Ch. Roux, “A Review of Image Watermarking Applications in Healthcare,” Porc. of IEEE-EMBC Conf. New York, USA, 2006, pp. 4691-4694

[13] L. Xuanwen, Q. Cheng, J. Tan, “A Lossless Data Embedding Scheme For Medical in Application of e- Diagnosis,” Proceedings of the 25th Annual International Conference of the IEEE EMBS Cancun, Mexico. September 17-21, 2003 [14] C.R. Rodriguez, F. Uribe Claudia, T. Blas Gershom De J, “Data Hiding Scheme for Medical Images”, IEEE 17thInternational Conference on Electronics, communications and computers (CONIELECOMP) 2007 [15] B. Smitha , K.A. Navas, “Spatial Domain-High capacity data hiding in ROI images”, Proc. Int. Conf on Signal processing, communication andnetworking IEEE-ICSCN-2007, Chennai, India, pp 528-533. 22-24 Feb 2007 [16] J.H.K. Wu, R.F. Chang, C. J. Chen, C.L. Wang,T.H.Ku, “Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique,” Journal of Digital Imaging, vol. 21, no.1, March-2008, pp. 59-76 [17] A. Giakoumaki, S. Pavlopoulos, D. Koutsouris, “Multiple Image Watermarking Applied to Health Information Management,” IEEE Transactions on Inforamtion Technology in Biomedicine vol. 10 no. 4, october 2006 [18] H. K. Lee, H.J. Kim, K.R. Kwon, J.K. Lee, “ROI Medical Image Watermarking Using DWT and Bit-plane,” IEEE 2005 Asia-Pacific Conference on Communications, Perth, Western Australia, 3-5 October, 2005 [19] N. A. Memon, S.A.M. Gilani,”NROI watermarking of Medical images for content authentication”, 12th IEEE International Multitopic Confernce (INMIC-2008), Karachi, Pakistan, December 23-24, 2008. [20] N. A. Memon, Anwar M. Mirza, S.A.M. Gilani, “Segmentation of Lungs from CT Scan Images for Early Diagnosis of Lung Cancer”, Proceedings of 2006 Enformatika, XIV International Conference, Vol. 14, pp. 228-233, August 25-27, 2006, Prague, Czech Republic.

Authorized licensed use limited to: Design Engineering Centre. Downloaded on October 27, 2009 at 00:10 from IEEE Xplore. Restrictions apply.

Watermarking of Chest CT Scan Medical Images for ...

Oct 27, 2009 - To facilitate sharing and remote handling of medical images in a secure ... 92-938-271858; fax: 92-938- 271865; e-mail: [email protected]).

1MB Sizes 0 Downloads 303 Views

Recommend Documents

CT scan - iScan Imaging Centre
Fastest tube rotation speed of 0.33 s with 64 slices per rotation. • High-matrix Multiplanar images ... and coronary calcium burden measurement. • Extremely fast ...

Evaluation of LSB Watermarking Scheme for Grayscale Images
The watermarked images are tested by adding 'salt and pepper' noise of 0.02 probability and 'gaussian noise' as shown in fig. 4(A) and fig. 4(B). Some data was lost. Even if watermark size was less than multiple copies of watermark were embedded and

Evaluation of LSB Watermarking Scheme for Grayscale Images
Jodhpur, Rajasthan, India ... transmitted over the internet, unauthorized parties may want to hack the data hidden over the image or change it. If the originality of ...

A CT Scan Technique for Quantitative Volumetric ...
May 26, 2006 - Reconstructive Surgery at the Medical College of Wisconsin, and the ... computer for analysis with image-processing software to determine the ...

SPARSE REPRESENTATION OF MEDICAL IMAGES ...
coefficients, enables a potentially significant reduction in storage re- quirements. ... applications have increased the amount of image data at an explo- sive rate. ..... included in the SparseLab package that is available online at http://.

Abdominal Multi-Organ Segmentation of CT Images ... - Springer Link
Graduate School of Information Science and Engineering, Ritsumeikan University,. 1-1-1, Nojihigashi, .... the segmented region boundaries Bs of the “stable” organs, we estimate b. ∗ by b. ∗. = argmin .... International Journal of Computer As-

CT Scan - July 14th 2015.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. CT Scan - July ...

CT Scan - July 14th 2015.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.

Visualization of Large Collections of Medical Images ...
Mar 20, 2009 - tems are not enough in order to provide good tools that help to phyisicians in the ..... 12th International Conference, pages 88 93,. July 2008. [8] I.T. Jolliffe. ... Network of Excellence DELOS on AUDIO-. VISUAL CONTENT AND ...

Visualization of Large Collection of Medical Images
of medical images and its performance is evaluated. ..... Intel Core 2 Duo Processor 1,6 x 2 GHz and 2 GB in RAM. .... Image and Video Libraries, 1998.

Visualization of Large Collections of Medical Images ...
Apr 19, 2009 - thanks to the development of Internet and to the easy of producing and publish- ing multimedia data. ... capacity for learning and identifying patterns, visualization is a good alterna- tive to deal with this kind of problems. However,

Globally Optimal Tumor Segmentation in PET-CT Images: A Graph ...
hence diseased areas (such as tumor, inflammation) in FDG-PET appear as high-uptake hot spots. ... or CT alone. We propose an efficient graph-based method to utilize the strength of each ..... in non-small-cell lung cancer correlates with pathology a

Multi-Organ Segmentation with Missing Organs in Abdominal CT Images
Children's National Medical Center, Washington DC. {miyukis ... current MOS solutions are not designed to handle such cases with irregular anatomy.

Multi-Organ Segmentation in Abdominal CT Images
(E-05): A center of excellence for an in silico medicine-oriented world wide open platform ... statistical shape model (SSM), which we call prediction- based PA ...

an anonymous watermarking scheme for content ... - CiteSeerX
Trusted Computing (TC) is a technology that has been developed to enhance the ..... 3G/GPRS. Broadcast. WLAN. Network. Technologies. Devices. Service and Content. Providers. User ? ... ual authentication for wireless devices. Cryptobytes,.

scan of flower.pdf
Whoops! There was a problem loading this page. Retrying... Page 3 of 8. скачать в конце поста. Апро установку драйверов читайтездесь или скачайте SAMSUNG_Mobile_USB_Driver_1_5_9_0. Вот

Read PDF Chest X-rays for Medical Students Full By ...
... pdf Chest X-rays for Medical Students ,best ebook reader for windows Chest ... for Medical Students ,top 10 ebook reader Chest X-rays for Medical Students .... Students ,epub mobile Chest X-rays for Medical Students ,amazon kindle for ...

an anonymous watermarking scheme for content ... - CiteSeerX
to anonymously purchase digital content, whilst enabling the content provider to blacklist the buyers that are distributing .... content that a buyer purchases, a passive ad- .... 2004) is a special type of signature scheme that can be used to ...

Scan Inter
Jul 11, 2017 - commercial operations in 4Q 17-1Q 18 (Figure 3), up 68% from the current capacity. ..... Telephone 852.2878.6888 Facsim ile 852.2878.6800.

Basic CT for New CT Technologists - USD 114
The book is designed for the new CT technologist. Everybody who cross-trains into CT will, at some point in time, find this information useful. While working at Georgetown University. Hospital, I had the pleasure of working with one such individual.