簡易檢索 / 詳目顯示

研究生: 白沛諺
Pai, Pei-Yan
論文名稱: 醫學影像之切割與隱藏技術之研究
The Study of Segmentation and Hiding Techniques for Medical Images
指導教授: 張真誠
Chang, Chin-Chen
口試委員:
學位類別: 博士
Doctor
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2011
畢業學年度: 99
語文別: 英文
論文頁數: 106
中文關鍵詞: 門檻植方法影像切割可逆影像隱藏技術有感興趣區域
外文關鍵詞: thresholding, image segmentation, reversible image hiding method, region of interest
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 影像切割技術能有效地切割出影像中有感興趣的物件,且常被應用於影像識別與醫學影像等應用中。Otsu 門檻植方法為最常被廣泛使用的影像切割方法之一。不幸地,當某一群組其資料量較大或者是標準差較大時,Otsu門檻植方法無法決定一適合地門檻植。本論文提出一個可適應性門檻值偵測法來解決Otsu門檻值的缺點。其方法考慮了群組的標準差、資料量、以及組距等因素來決定一合適的門檻植。
    子宮頸癌為婦女十大死亡癌症之一,為了有效提升子宮頸影像切割準確率,以及降低人力成本,本論文提出一子宮頸影像細胞核與細胞質輪廓偵測法。此方法首先利用可適應性門檻值偵測出子宮頸影像的細胞質輪廓,接著使用最大灰階顏色-梯度差異法描繪出子宮頸影像中細胞核的輪廓。
    透過網路傳送資料至他人或醫學影像資訊至護理專業人員、醫療供應商、以及醫療組織,已經變成一種普遍管道。然而,非法人士透過公開的網路頻道容易擷取、複製或者竄改資料。可逆影像隱藏技術是一種將秘密資訊藏入負載影像當中,藉以保護秘密資訊被非法攻擊者所擷取。此外,當秘密資訊被取出時,該技術可以將負載影像完全恢復。本論文提出一個植基於高頻的高容量可逆影像隱藏法。此方法,將秘密資訊隱藏至Harr小波轉換後的高頻頻帶係數值中。
    醫學影像中,有感興趣區域記綠醫學影像中重要的資訊,故必須無失真的將其儲存。因此,本論文提出一植基於有感興趣區域的影像隱藏技術。該方法,利用可適應性門檻值偵測法自動切割出影像中有感興趣區域。接下來,將祕密資訊利用不可逆影像隱藏技術藏入非有感興趣區域,和利用可逆影像隱藏技術藏入有感興趣區域以增加資訊隱藏量。


    Image segmentation can effectively segment the interested objects from the image, and it often was used in pattern reorganization and medical image processing etc. Otsu’s thresholding (OTM) method is one of widely used image segmentation methods. However, OTM cannot successfully give a proper threshold when the standard deviations or the numbers of data in different classes are quite different from each other. In this thesis, “adaptable threshold detector” (ATD) is proposed to overcome the drawbacks of OTM. The ATD minimizes “within-class standard deviation” (WCSD) as the criterion, which considers the standard deviation of group, the quantity of data, and the group interval within a group to be factors in deciding the optimal thresholds.
    The cervical cancer is one of women’s common diseases and its incidence and mortality rates are ranked prior top in the woman’s common diseases. In order to effectively improve the accuracy and reduce the cost of image segmentation, this thesis proposes a nucleus and cytoplasm contour detector for cervical smear image, which is called “nucleus and cytoplasm contour” (NCC) detector. First, the NCC detector adopts ATD to detect the contour of cytoplasm on a cervical smear image. After that, the NCC detector employs the maximal gray-level-gradient-difference method to extract the contour of nucleus from the extracted cytoplasm region.
    Transmitting data to people or medical image among health care professionals, providers, and organizations has become popular via the Internet. However, the illegal attackers or hackers can easily grab, duplicate, or revise the data on the Internet. The reversible image hiding method can embed the secret data into cover image for protecting the secret data that be stolen by the illegal attacker. However, reversible image hiding method can recover the original cover image without any distortion while extracting the secret data. In the thesis, a high payload frequency-based reversible image hiding method is proposed. In the proposed method, the secret data are embedded into the coefficients in a high-frequency band in frequency domain.
    In a medical image, “region of interest” (ROI) is a region which contains important information and must be stored without any distortion. This thesis hence proposes an ROI-based image hiding method. In this method, the ATD is applied to automatically segment ROI. Next, the secret data embeds in non-ROI by an irreversible image hiding method and in ROIs by a reversible image hiding method to increase embedding capacity.

    中文摘要 i Abstract ii List of Figures vii List of Tables xi Chapter 1 Introduction 1 1.1. Motivation and Objective 2 1.2. Organization 3 Chapter 2 Related Works 4 2.1. Otsu’s Thresholding Method 4 2.2. Genetic Algorithm 6 2.3. Gradient Vector Flow – Active Contour Model 6 2.4. Soble Operator 8 2.5. Haar discrete Wavelet Transformation 9 2.6. Arithmetic Coding 10 2.7. Adaptive Arithmetic Coding 12 2.8. Segmentation Evaluation Measures 13 Chapter 3 Adaptable Threshold Detector (ATD) 15 3.1. Preliminary 15 3.2. Adaptable Threshold Detector (ATD) 18 3.3. Genetic-Based Parameters Detector (GBPD) 21 3.4. Experiments and Analysis 24 3.5. Summary 43 Chapter 4 Nucleus and Cytoplast Contour Detector for Cervical Smear Images 44 4.1. Preliminary 44 4.2. Nucleus and Cytoplast Contour Detector (NCC detector) 48 4.2.1. Cytoplast Contour Detection Phase 48 4.2.2. Nucleus Contour Detection Phase 49 4.2.2.1. Gradient Calculation 50 4.2.2.2. Maximal Gray-Level-Gradient-Difference (MGLGD) Method 53 4.2.2.3. Contour Connection 56 4.3. Experiment Results and Analysis 56 4.4. Summary 61 Chapter 5 High Payload Frequency-Based Reversible Image Hiding (HPFRIH) Method 62 5.1. Preliminary 62 5.2. High Payload Frequency-Based Reversible Image Hiding (HPFRIH) Method 64 5.2.1. Embedding Phase 65 5.2.2. Recovering and Extracting Phase 70 5.3. Experiment Results and Analysis 71 5.4. Summary 79 Chapter 6 ROI-Based Medical Image Hiding Method 80 6.1. Preliminary 80 6.2. ROI-Based Image Hiding Method 81 6.2.1. ROI Segmentation Stage 82 6.2.2. Non-ROI Hiding Stage 85 6.2.3. ROI Hiding Stage 86 6.3. Secret Data Extracting 88 6.4. The Experimental Results and Analysis 90 6.5. Summary 96 Chapter 7 Conclusions and Future Works 98 Bibliography 101

    [1] Alattar, A. M, “Reversible watermarking using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, vol. 13, no. 8, pp. 1147-1156, 2004.
    [2] Agus, Z. A., and Akira, A., “Image segmentation by histogram thresholding using hierarchical cluster analysis,” Pattern Recognition Letters, vol. 27, no. 13, pp. 1515-1521, 2006.
    [3] Boykov, Y. and Funka-Lea, G., “Graph cuts and efficient n-d image segmentation,” International Journal of Computer Vision, vol. 70, no. 2, pp. 109-131, 2006.
    [4] Boykov, Y. and Jolly, M. P., “Interactive graph cuts for optimal boundary & region segmentation of object in N-D images,” Proceeding of international Conference on Computer Vision, vol. I, pp. 105-112, 2001.
    [5] Canny, J., “A computational approach to edge detection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 8, no. 6, pp. 679-698, 1986.
    [6] Chan, C. K. and Cheng, L. M., “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004.
    [7] Chan, T. F. and Vese, L. A., “Active contours without edges,” IEEE Transactions on Image Processing, vol. 10, no. 2, pp. 266-277, 2001.
    [8] Chan, Y. K., Chen, W. T., Yu, S. S., Ho, Y. A., Tsai, C. S., and Chu, Y. P., “A HDWT-based reversible data hiding method,” Journal of Systems and Software, vol. 82, no. 3, pp. 411-421, 2009.
    [9] Chang, C. C., Lin, C. C., Tseng, C. S., and Tai, W. L., “Reversible hiding in DCT-based compressed images,” Information Sciences, vol.77, no. 13, pp. 2768-2786, 2007.
    [10] Chang, C. C., and Lin, C. Y., “Reversible steganographic method using SMVQ approach based on declustering,” Information Sciences, vol. 11, no. 8, pp.1796-1805, 2007.
    [11] Chang, C. C., Wu, W. C., and Chen, Y. H., “Joint coding and embedding techniques for multimedia images,” Information Sciences, vol. 178, no. 18, pp. 3543-3556, 2008.
    [12] Chen, C. J., Chang, R. F., Moon, W. K., Chen D. R., and Wu H. K., “2-D ultrasound strain images for breast cancer diagnosis using nonrigid subregion registration,” Ultrasound in Medicine and Biology, vol. 32, no. 6, pp. 837-846, 2006.
    [13] Cheng, H. D., Chen, C. H., and Chiu, H. H., “Image segmentation using fuzzy homogeneity criterion,” Information Sciences, vol. 98, no. 1-4, pp. 237-262, 1997.
    [14] Cheng, H. D., and Chen, Y., “Fuzzy partition of two-dimensional histogram and its application to thresholding,” Pattern Recognition, vol. 32, no. 5, pp.825-843, 1999.
    [15] Davies, E., “Machine vision: theory, algorithms and practicalities,” Academic Press, 1990, Chapter 5.
    [16] Dubisson, M. P., and Jain A. K., “A modified Hausdorff distance for object matching,” In: Proceedings of ICPR’ 94, 12th International Conference on Pattern Recognition, pp. A-566-569, 1994.
    [17] Frable, W. J., “Needle aspiration biopsy of pulmonary tumors,” Seminars in Respiratory Medicine, vol. 4, no. 2, pp. 161-169, 1982.
    [18] Glasbey, C. A., “An analysis of histogram-based thresholding algorithms,” CVGIP: Graphical Models and Image Processing, vol. 55, no. 6, pp. 532-537, 1993.
    [19] Honsinger, C. W., Jones, P., Rabbani, M., and Stoffel, J. C., “Lossless recovery of an original image containing embedded data” U.S. Patent Application 627891, 2001.
    [20] Hou, Z., Hu, Q., and Nowinski, W. L., “On minimum variance thresholding,” Pattern Recognition Letters, vol. 27, no. 14, pp. 1732-1743, 2006.
    [21] Howard, P. G., and Vitter, J. S., “Arithmetic coding for data compression,” Proceedings of the IEEE, vol. 82, no.6, pp. 857-865, 1994.
    [22] http://www.mathworks.com/products/demos/shipping/images/ipexrice.html, July 2008.
    [23] Jiang, X., and Mojon, D., “Adaptive local thresholding by verification-based multithreshold probing with application to vessel detection in retinal images,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 1, pp. 131-137, 2003.
    [24] Kass, M., Witkin, A., and Terzopoulos, D., “Snakes: active contour models,” International Journal of Computer Vision, vol. 1, no. 4, pp. 321-331, 1998.
    [25] Lee, C. F., Chang, C. C., and Wang, K. H., “An improvement of EMD embedding method for large payloads by pixel segmentation strategy,” Image and Vision Computing, vol. 26, no. 12, pp. 1670-1676, 2008.
    [26] Lee, J. S., and Yang, M. C. K., “Threshold selection using estimates from truncated normal distribution,” IEEE Transactions on Systems, Man and Cybernetics, vol. 19, no. 2, pp. 422-429, 1989.
    [27] Lee, S. U., Chung, S. Y., and Park, R. H., “A comparative performance study of several global thresholding techniques for segmentation,” Computer Vision, Graphics and Image Processing, vol. 52, no. 2, pp.171-190, 1993.
    [28] Liao, P. S., Chen, T. S., and Chung, P. C., “A fast algorithm for multilevel thresholding,” Journal of Information Science and Engineering, vol. 17, no. 5, pp. 713-727, 2001.
    [29] Lin, C. C., Chen, S. C., and Hsueh, N. L. “Adaptive embedding techniques for VQ-compressed images,” Information Sciences, vol. 179, no. 1-2, pp. 140-149, 2009.
    [30] Lin, S., and Salari, E., “Image coding using wavelet transform and classified vector quantization,” IEE Proceedings- Vision, Image and Signal Processing, vol. 143, no. 5, pp. 285-291, 1996.
    [31] Lu, C. T., Kou, Y., and Zhao, J., and Chen, L., “Detecting and tracking regional outliers in meteorological data,” Information Sciences, vol. 177, no. 7, pp.1609-1632, 2007.
    [32] Lou, D. C., Hu, M. C., and Lin, J. L., “Multiple layer data hiding scheme for medical images,” Computer Standards & Interfaces, vol. 31, no. 2, pp. 329-335, 2009.
    [33] Man, K. F., Tang, K. S., and Kwong, S., Genetic algorithms: concepts and designs, Springer-Verlag, New York, 1999.
    [34] Mat-Isa, N. A., Mashor, M. Y., and Othman, N. H., “Seeded region growing features extraction algorithm: Its potential use in improving screening for cervical cancer,” International Journal of the Computer, The Internet and Management, vol. 13, no. 1, pp. 61-70, 2005.
    [35] Murthy, C. A., Pal, S. K., “Histogram thresholding by minimizing graylevel fuzziness,” Information Sciences, vol. 60, no. 1-2, pp. 107-135, 1992.
    [36] Ng, H. F., “Automatic thresholding for defect detection,” Pattern Recognition Letters, vol. 27, no. 14, pp. 1644-1649, 2006.
    [37] Ni, Z., Shi, Y.Q, Ansari, N., and Su, W., “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-361, 2006.
    [38] Otsu, N., “A threshold selection method from gray-level histograms,” IEEE Transactions on Systems, Man, and Cybernetics, vol. 9, no. 1, pp.62-66, 1979.
    [39] Qian, R. J., and Huang, T. S. “Optimal edge detection in two dimensional images,” IEEE Transactions on Image Processing, vol. 5, no. 7, pp. 1215-1220, 1996.
    [40] Sahoo, P. K., Soltani, S., Wong, A. K., and Chan, Y. C., “A survey of thresholding techniques,” Computer Vision, Graphics and Image Processing, vol. 41, no. 2, pp. 233-260, 1988.
    [41] Sanchis, J., Martínez, M., Blasco, X., “Integrated multiobjective optimization and a priori preferences using genetic algorithms,” Information Sciences, vol. 178, no. 4, pp. 931-951, 2008.
    [42] Sezgin, M., and Sanlur, B., “Survey over image thresholding techniques and quantitative performance evaluation,” Journal of Electronic Imaging, vol. 13, no. 1, pp. 146-165, 2004.
    [43] Thien, C. C. and Lin, J. C., “A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,” Pattern Recognition, vol. 36, no. 12, pp. 2875-2881, 2003.
    [44] Tian, J., “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896, 2003.
    [45] Vleeschouwer, C. D., Delaigle, J. F., and Macq, B., “Circular interpretation of bijective transformations in lossless watermarking for media asset management,” IEEE Transactions on Multimedia, vol. 5, no. 1, pp. 97-105, 2003.
    [46] Wakatani. A., “Digital watermaking for ROI medical images by using compresses signature image,” Proceedings of the 35th Hawaii International Conference on System Sciences, vol. 6, pp. 2043-2048, 2002.
    [47] Wallker, R. F., “Adaptive multi-scale texture analysis with application to automated cytology,” Dissertation, Department of Electrical and Computer Engineering, University of Queensland, 1997.
    [48] Wang, R. Z., Lin, C. F., and Lin, J. C., “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 34, no. 3, pp. 671-683, 2001.
    [49] Wang, Y., Ma, M. Q., Zhang, K., and Shih, F. Y., “A hierarchical refinement algorithm for fully automatic gridding in spotted DNA microarray image processing,” Information Sciences, vol. 177, no. 4, pp. 1123-1135, 2007.
    [50] Witten, I. H., Neal, R. M., and Cleary, J. G., “Arithmetic coding for data compression,” Communications of the ACM, vol. 30, no. 6, pp. 520-540, 1987.
    [51] Women’s Health Report FY 2005-2006, National cancer institute, 2007. <http://women.cancer.gov/planning/> (Feb., 2007).
    [52] Wu, H. S., J. Gil, and Barba, J., “Optimal segmentation of cell images,” IEE Proceedings Vision, Image & Signal Processing, vol. 145, no. 1, pp. 50-56, 1998.
    [53] Xu, C., and Prince, L., “Snakes, shapes, and gradient vector flow,” IEEE Transactions on Image Processing, vol. 7, no. 6, pp. 359-369, 1998.
    [54] Xuan, G., Zhu, J., Chen, J., Shi, Y. Q., Ni, Z., and Su, W., “Distortionless data hiding based on integer wavelet transform,” IEE Electronics Letters, vol. 38, no. 25, pp. 1646-1648, 2002.
    [55] Yang-Mao, S. F., Chan, Y. K., and Chu, Y. P., “Edge enhancement nucleus and cytoplast contour detector of cervical smear images,” IEEE Transactions on Systems, Man, and Cybernetics - Part B, vol. 38, no. 2, pp. 353-366, 2008.
    [56] Zhang, F., Pan, Z., Cao, K., Zheng, F., and Wu, F., “The upper and lower bounds of the information-hiding capacity of digital images,” Information Sciences, vol. 178, no. 14-15, pp. 2950-2959, 2008.
    [57] Zhang, Y. J., “A survey on evaluation methods for image segmentation,” Pattern Recognition, vol. 29, no. 8, pp. 1335-1346, 1996.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE