Redirecting to original paper in 30 seconds...

Click below to go immediately or wait for automatic redirect

arxiv_cv 90% Match Research Paper Medical Imaging Professionals,Information Security Experts,Researchers in Digital Forensics,Software Developers for Medical Systems 2 days ago

A fragile zero-watermarking method based on dual quaternion matrix decomposition

computer-vision › medical-imaging
📄 Abstract

Abstract: Medical images play a crucial role in assisting diagnosis, remote consultation, and academic research. However, during the transmission and sharing process, they face serious risks of copyright ownership and content tampering. Therefore, protecting medical images is of great importance. As an effective means of image copyright protection, zero-watermarking technology focuses on constructing watermarks without modifying the original carrier by extracting its stable features, which provides an ideal approach for protecting medical images. This paper aims to propose a fragile zero-watermarking model based on dual quaternion matrix decomposition, which utilizes the operational relationship between the standard part and the dual part of dual quaternions to correlate the original carrier image with the watermark image, and generates zero-watermarking information based on the characteristics of dual quaternion matrix decomposition, ultimately achieving copyright protection and content tampering detection for medical images.
Authors (2)
Mingcui Zhang
Zhigang Jia
Submitted
October 31, 2025
arXiv Category
eess.IV
arXiv PDF

Key Contributions

This paper proposes a fragile zero-watermarking model based on dual quaternion matrix decomposition for medical images. It leverages the properties of dual quaternions to correlate the original image with the watermark without modifying the original image, enabling copyright protection and tamper detection.

Business Value

Enhances the security and trustworthiness of medical images, crucial for patient care, legal evidence, and research integrity, by protecting against unauthorized use and modification.