Authentication of Volume Data

نویسندگان

  • Mohan S. Kankanhalli
  • Ee-Chien Chang
  • Xin Guan
  • Zhiyong Huang
  • Yinghui Wu
چکیده

3D volume data is being increasingly used in many applications. The digital nature of the data allows easy creation, copying and distribution. However, it also allows ease of manipulation which can enable wilful or inadvertent misrepresentation of the content. For an application like medical imaging, this can have serious diagnostic and legal implications. Thus there is a strong need to establish the integrity of a particular volume data set. The traditional data authentication mechanisms like digital signatures or cryptographic methods are not very useful in this context due to their extreme fragility. What is required is a method that can detect the integrity for allowable content-preserving manipulations. In this work-in-progress report, we present a new technique for authenticating 3D volume data using a robust content-based digital signature. This signature is derived from the significant features of volume data so that if any of these features are altered significantly, the signature will not match the data set. The term content-based refers to the fact the important features of the data (whose integrity we are interested in certifying) should be somehow incorporated into the digital signature. The rationale being that if some important content feature is deleted/modified/added, then the digital signature should not match the doctored data set. The term robust refers to the fact that any manipulation which does not change the significant features should not affect the veracity of the signature. For such benign operations, the digital signature should indeed authenticate the data set. Common types of operations on volume data set are scaling, thresholding, cropping, cut-and-replace a sub-volume, filtering, addition/removal of noise and affine transformations. As long as these operations do not change the content features, they are considered benign. We use a novel wavelet-based foveation technique [1] to accurately and succinctly capture the significant content features. Moreover, the scheme allows a flexible threshold to be set which can determine the extent of the manipulations which can be considered benign. We will now provide an overall description of the method for generating the robust content-based digital signature and the method for authenticating a volume data-set using this digital signature. For the generation of the digital signature, the following steps are required: Partition of the voxel values by data analysis: First, all the voxel values are sorted in the non-descending order. Second, partition the sorted list using a threshold value. The threshold value is specified by the user in our current implementation. However, heuristics can be applied if the domain knowledge is known for the particular class of volume data. For many volume data sets, the density values of significant content components are distinguishable even though the voxels representing them are closely connected to each other. Sometimes, they may perhaps even have similar voxel values in which case domain knowledge could be utilized for distinguishing them. For example, human CT/MRI volumes can be partitioned by using the density values as well as anatomical knowledge. Segmentation: From the partition, we derive a set of voxel values that partition different parts. These voxel values are used to derive the same number of sets of the isosurfaces. One segment of voxels can be formed if they are bounded as a closed sub-volume by (1) one isosurface, (2) several isosurfaces, or (3) one or several isosurfaces with the one or several border planes of the volume. It can be efficiently derived using the scan conversion algorithm, an extension of the standard scanline algorithm used in the rasterization and hidden-surface elimination, to derive and accumulate the intervals bounded by the isosurfaces and border planes iteratively. Feature extraction: It is a process of selection of key voxels. A 3D Gaussian mask is applied on the volume several times as lowpass filtering. Due to the large size of volume data, we simulate the 3D Gaussian filtering as a windowed lowpass filtering dimension by dimension. In the highly blurred resulting volume, the key voxels are chosen to be local maximum voxels which are above a predefined threshold. The key voxels are then used as the input to the foveation procedure. Wavelet-based foveation: To make sure that important content throughout the foreground is captured, we apply the foveation technique which is basically a space-variant filtering technique. We believe it is very important to use this since it summarizes all the important content throughout the foreground with the key voxels as the foci. Thus all significant features are compactly captured. Additionally since it is a many-to-one mapping, it offers security. Thus, this information can be used as a key. The foveated volume is obtained from a uniform resolution volume through a space-variant smoothing process where the width of the smoothing function is small near the fovea but gradually increases towards the peripheral. The process of going from a uniform volume to a foveated volume is known as foveation. The foveation of a function V : R ! R is determined by a smoothing function g : R ! R, and a weight function w : R ! R 0.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

Authentication and quality control of some polyherbal oils used in Persian Traditional Medicine (PTM)

Background and objectives: Traditional polyherbal oils are still in use in Persian Traditional Medicine (PTM). Most of these formulations are prepared via traditional procedures such as maceration of herbs in oils or evaporating aqueous herbal extracts in boiling or heating oils as the vehicle. Thus, their quality control, standardization and authentication are real challenges ...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001