Page 52 - 2025S
P. 52

UEC Int’l Mini-Conference No.54                                                               45







            Algorithm 1 Pixel-to-Block (PTB) Transformation   Algorithm 2 Checksum Computation
            Require: Original image I of size m×n pixels      Require: 2×2 block B
            Ensure: Expanded image I exp of size 2m × 2n pix-  Ensure: 2-bit checksum C
                els                                            1: sum ← 0
             1: for i ← 1 to m do                              2: for each pixel p ∈ B except seed do
             2:    for j ← 1 to n do                           3:    sum ← sum+(p ≫ 2)     ▷ Discard 2 LSBs
             3:       p ← I(i, j)  ▷ Get original pixel value  4: end for
             4:       I exp (2i−1,2 j −1) ← p ▷ Top-left (seed  5: C[0] ← (sum ≫ 1)&1
                pixel)                                         6: C[1] ← sum&1
             5:       I exp (2i−1,2 j) ← p+δ 1  ▷ Top-right    7: return C
             6:       I exp (2i,2 j −1) ← p+δ 2 ▷ Bottom-left
             7:       I exp (2i,2 j) ← p+δ 3  ▷ Bottom-right    Although this scheme is fragile—as the water-
             8:    end for                                    mark may become corrupted under typical image
             9: end for                                       processing attacks such as JPEG compression, rota-

             10: return I exp                                 tion, Gaussian noise, or histogram equalization—we
                                                              demonstrate that robustness can be enhanced by
              The embedding process is performed over a pre-  increasing the proportion of the image bandwidth
            processed cover image obtained by applying a pixel-  used for watermark embedding. In scenarios where
            to-block (PTB) transformation, which expands each  the watermark occupies a significant portion of the
            pixel of the original medical image into a 2×2 block,  available space and no pseudorandom walk is ap-
            increasing the embedding capacity. Within these   plied, the extracted anomaly mask clearly highlights
            blocks, data bits are embedded into the least sig-  regions affected by tampering.
            nificant bits (LSBs) of all pixels except the top-  Moreover, due to the small size of the watermark
            left one, which is reserved to preserve structure. A  and the structured embedding strategy, even when
            lightweight checksum is also computed and embed-  foreign objects are overlaid or certain areas of the
            ded in the second LSB of the bottom row to allow  image are modified, the watermark remains partially
            integrity verification.                           recoverable. This residual visibility is especially ef-
                                                              fective for tampering localization, as it allows us to
            Embedding Capacity. The total hiding capacity     identify suspicious regions without compromising
            of the system is estimated using the dimensions of a  the integrity of the medical content.
            standard high-resolution DICOM image as follows:    Encryption and decryption are synchronized
                                                              through the chaotic map without requiring key ex-
                                                            change, and the full embedding-extraction process
                        7040×8560
            Capacity =              ×15 bits = 56,496,000 bits  maintains a high level of image fidelity. This is evi-
                            4
                                                      (4)     denced by the quantitative results obtained.
              This estimation assumes 15 usable LSBs per 2×2
            block, excluding the seed pixel.                  3.2.1  Robustness Evaluation

            Insertion Summary. The embedding process          Table 1 presents the recovery performance of the
            comprises the following steps:                    embedded data under various image modifications.
               • PTB transformation: Converts each pixel into
                a 2×2 block to increase capacity (Algorithm 1).  3.2.2  Performance and Clinical Evaluation

               • Data embedding: Bits are inserted into 15    In terms of computational and clinical feasibility, the
                LSBs of each block (excluding top-left seed).  proposed method shows strong performance:

               • Checksum insertion: A lightweight checksum     • Embedding time: 93.00 seconds on Apple M2
                is embedded in the second LSB of the bottom       chip (compared to 112 seconds for difference-
                row for later tamper detection.                   expansion schemes)
   47   48   49   50   51   52   53   54   55   56   57