Page 53 - 2025S
P. 53

46                                                                UEC Int’l Mini-Conference No.54







            Table 1: Robustness under common image process-
            ing attacks

             Attack           Recovered  BER   Recognition
             No modification  100.00%   0.00%   Excellent
             Superimposed figure  96.22%  0.03%  Good
             JPEG (QF=50)      37.70%  62.30%    Poor
             Gaussian (σ = 0.01)  21.10%  50.35%  Poor
             Contrast adjusted  46.97%  53.03%   Poor
                                                              (a) Image with JPEG com- (b) Mark broken by com-
                                                              pression               pression
               • Localization accuracy: Within ±4 pixels of
                the tampered region.

               • PSNR: Infinite when extraction is perfect (no
                attacks).

               • SSIM: 0.998 when watermark occupies up to
                50% of capacity.

               • False positive rate: 1.2% in tamper localiza-  (c) Image with Gaussian (d) Mark broken by Gaus-
                tion.                                         noise                  sian noise











            (a) Original im-               (c) Extracted re-
            age                (b) Mask    gion
                                                              (e) Image with contrast ad- (f) Mark broken by contrast
            Figure 7: Watermark extraction stage without tam-  justment              adjustment
            pering (a–c).
                                                              Figure 9: System robustness under various attacks:
                                                              (a–b) JPEG compression, (c–d) Gaussian noise,
                                                              (e–f) Contrast adjustment.


                                                              the original image through a block-based approach,
                                                              LSB manipulation, and chaotic encryption.
            (a)   Tampered                                      Given a watermarked image I , the procedure fol-
                                                                                         ′
            image           (b) Tamper mask  (c) Recovered    lows:
            Figure 8: Tamper detection and recovery stage (d–f).
                                                               1. Block division: I is partitioned into non-
                                                                                   ′
                                                                  overlapping 4×4 pixel blocks
            3.3  Extraction stage                              2. Bit extraction: Each block is analyzed to re-
                                                                  trieve LSBs (excluding the seed pixel)
            The extraction process in the proposed scheme en-
            ables reversible recovery of hidden clinical informa-  3. Reconstruction: Extracted bits are decrypted
            tion (watermark) embedded in medical images with-     and reorganized to obtain the original water-
            out data loss. This method preserves the integrity of  mark
   48   49   50   51   52   53   54   55   56   57   58