SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.962-968

          Development Of A New Watermarking Algorithm For
                      Telemedicine Applications
                         Remya Elizabeth Philip1, Sumithra M.G.2,
                                  PG Student1, Professor of ECE Department2
                                   Bannari Amman Institute of Technology.

Abstract-
         Watermarking algorithms are used for             (RONI) watermarking which embeds the watermark
embedding watermark like patient’s history and            information in RONI and keeping the region of
doctor’s signature in binary image format into            interest (ROI) distortion free, and (2) by selecting
host’s    medical    image    for   telemedicine          reversible watermarking method which recover the
applications. In this work the watermarking of            original cover image by undoing the watermark
medical image is done in DCT and DWT domains              embedding process at the receiving end after the
and the performance is evaluated based on PSNR            image verification process is completed [3], [12].
and MSE. From the obtained results it is observed
that the watermarking in wavelet domain using             Watermark            attacks            extracted watermark
Haar wavelet yields better result than in DCT
domain.                                                          Embedder                       Extractor
                                                                                Channel
                                                          Host image                                           Original image
Keywords: Watermark, DWT, DCT, PSNR, MSE
                                                                Fig. 1 A generic watermarking system model
               I.INTRODUCTION
          The Institution of Medicine defines                       In this generic watermarking model shown
telemedicine as the use of electronic information         in Fig.1, there is a watermark embedder which
technologies to provide and support health care when      embeds the information that is to be hidden (the
distance separates the participants. The most common      watermark) in the original image (cover image) and
application today is in the transmission of high          the watermarked image is sent through the channel
resolution     X-rays,     cardiology,     orthopedics,   where there is a large probability of attacks such as
dermatology and psychiatry. Telemedicine arose            removal attack, geometric attacks, cryptographic
originally to serve rural populations or any people       attacks, protocol attacks. At the receiver side there is
who are geographically isolated, where time and cost      an extractor which extracts the watermark from the
of travel make access to the best medical care            stego image.
difficult. Now it is increasingly being used in                     Digital image watermark techniques can
mainstream medicine, to allow doctors the world           also be classified based on the type of information
over to share expensive recourses and valuable            needed in the extraction process. Using this
experience. Hence, healthcare industry demands            classification criterion, it can be classified into two
secure, robust and more information hiding                categories; non-blind and blind watermarking. A non-
techniques promising strict secured authentication        blind watermarking system requires the host image
and communication through internet or mobile              and the watermarked image in order to detect and
phones.                                                   extract the watermark data, but on the other hand, a
     Medical image watermarking requires extreme          blind watermarking system requires nothing other
care when embedding additional data within the            than the watermarked image itself to complete the
medical images because the additional information         process. In dealing with watermarking of medical
must not affect the image quality as this may cause a     images, some important constraints need to be
misdiagnosis [7]. This kind of a system requires a        satisfied. When watermark is embedded in the host
high level of security, which can be ensured by using     image, it generates distortion. This distortion is
digital watermarking techniques. This imposes three       highly undesirable in medical applications, whereby,
mandatory characteristics: robustness, capacity and       even a small distortion in the images such as MRI
imperceptibility. There are different methods that has    and X-ray images might affect the decision of a
been using for medical image watermarking. The            physician. For this reason, it is necessary not only to
watermark can directly be embedded in the LSB as          extract the watermark but also to restore the original
described by Mohamed Ali et al [14], [7]. In some         image completely. Reversible watermarking fulfills
applications it is often not allowed to alter the image   this requirement. It can restore the exact state of the
contents even one bit of information. The                 original image. Whereas non reversible watermarking
requirement of imperceptibility can be satisfied by       algorithms do not provide the exact reconstruction of
two methods (1) by selecting region of non interest       the image



                                                                                                   962 | P a g e
Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.962-968

                                                                       III. METHODOLOGY
  II. PROPERTIES OF MEDICAL IMAGE                                    The various steps for embedding and
           WATERMARKING                                    extracting the watermark in DCT and DWT domain
         Security of medical information, derived          are given below
from strict ethics and governmental rules, gives rights
to the patient and duties to the health professionals.     Steps for applying watermark
This imposes three compulsory characteristics:                 1. Read the CT image(cover image)
robustness, imperceptibility, capacity. Robustness is          2. Read the signature (watermark)
defined as the ability of watermark to resist against          3. Fix the alpha value to 1 (alpha=1)
both lawful and illicit attacks. One of the stringent          4. Multiply the alpha value with the sign
requirements of the image watermarking is the                  5. Take         the      transform   for   the
imperceptibility.    Imperceptibility means that                    image(DCT/DWT)
watermark embedded in the image must be invisible              6. Add the watermark into the cover image
to the human eye. In watermarking of medical                   7. Take the inverse transform to get the
images, all the information necessary for physician                 watermarked image
such as identification of patient, diagnosis report,           8. Calculate the MSE and PSNR between the
origin identification (who created the image) are                   original and watermarked image
embedded. This information is further increased                9. Increment the alpha value and repeat the
when the image is sent to other physician for second                steps from 4 to 8
opinion. Therefore, capacity for embedding the             Steps for extraction process
payload must be high.                                          1. Read the stego image (watermarked image)
         Based on the domain in which the                      2. Take         the      transform   for   the
watermark can be embedded, the watermarking                         image(DCT/DWT)
techniques are classified into 2 categories: spatial           3. Read the signature
domain techniques and transform domain techniques.             4. Divide the signature by the alpha value
The most clear cut way to hide the watermark within            5. Subtract the signature from the watermarked
the cover content is to directly embed it in the spatial            image
domain. There is number of advantages for using                6. Take the inverse transform
spatial domain watermarking. One advantage is                  7. Reconstructed image is obtained
temporal or spatial localization of the embedded data          8. Calculate the PSNR and MSE of the original
can automatically be achieved if the watermarked                    and recovered image and the original and
content undergoes some attacks and distortions are                  retrieved watermark
introduced in the watermarked content. Another
advantage of spatial domain watermarking is that, an          IV. PERFORMANCE EVALUATION
exact control on the maximum difference between the                    PARAMETERS
original and watermarked content is possible which                  For evaluation of the watermarking
allows the design of near-lossless watermarking            algorithm, many criteria‟s are used. The most
systems, as required by certain applications such as       important among them are the quality of the image
protection of sensing or medical images. The oldest        and the robustness of the watermarking scheme
and the most common used method in this category is        against various attacks.
the insertion of watermark in the least significant bit          Signal to noise ratio and peak signal to
of the pixel data [1], [14]. Since the modification of              noise ratio
the pixel data takes place in the LSB it is not visually        Among the most important distorting measures
perceptible. To obtain better imperceptibility as well     in image processing is the Signal to Noise Ratio
as robustness, watermarking is done in frequency           (SNR) and the Peak Signal to Noise Ratio
domain. The frequency domain watermarking                  (PSNR).The SNR and the PSNR are respectively
techniques      are    also     called   multiplicative    defined by the following formulas:
watermarking techniques. Discrete Fourier Transform                                       I 2 𝑖,𝑗
(DFT), Discrete Cosine Transform (DCT) [14],               𝑆𝑁𝑅 = 10 log10     𝑖,𝑗                       2                 (1)
                                                                                     𝑖,𝑗 𝐼 𝑖,𝑗 −𝐾 𝑖,𝑗
Discrete Wavelet Transform (DWT) [5] is the most                              𝑀𝐴𝑋
popular transforms operating in the frequency              𝑃𝑆𝑁𝑅 = 20𝑙𝑜𝑔10                                                  2
                                                                              𝑀𝑆𝐸
domain etc then the transform domain coefficients          MAX is the maximum pixel value in the image
are modified by the watermark, [1], [10]. The inverse      where MSE is given by,
transform is finally applied in order to obtain the
watermarked image. Due to complicated calculations                 1   m−1   n−1                            2
                                                           MSE = mn    i=0   j=0    I i, j − K i, j                      ( 3)
of forward and inverse transform the spatial domain
techniques are less prone to attacks.
                                                           where I (i, j) and K (i, j) are original and
                                                           watermarked image respectively.



                                                                                                                963 | P a g e
Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.962-968

                                                             Table 1 PSNR comparison of original and
       V.EXPERIMENTAL RESULTS                                 watermarked image in different domains
          A medical image (CT scan) 512×512 is              Alpha                 Domains
taken as the test image; doctor‟s signature 60×100                           DCT       DCT           DWT
and patient details 140×230 is taken as the                                  (8bit)   (16bit)
watermark. Various experiments are conducted to
                                                                1            80.15    81.161          250
develop an efficient watermarking algorithm. The
first experiment is conducted to select the domain of           2           67.728    67.759        121.283
watermarking. The watermark is first applied in the             3           60.157    60.102        117.234
DCT and DWT domain and the performance is                       4           56.726    56.692        109.710
evaluated based on PSNR and MSE. It is found that               5           54.031    54.047        107.802
DWT performs better than DCT, so the next step
aims to find out which wavelet transform that can be      Table 2 PSNR comparison of original and retrieved
used for the embedding purpose and also to find out                 signature in different domains
the level of decomposition, for that three sets of                                  Domains
mother wavelets are considered „Haar‟, „db2‟ and          Alpha
„db4‟. The result shows that Haar gives better                     DCT(8bit)      DCT(16bit)     DWT(8bit)
performance compared to the others. Fig.2 represents        1             19.685       250               250
the test image of size 512×512 and the watermarks.          2             39.120       250               250
Watermark 1 of size 60×100 is the doctor‟s signature,
                                                            3             57.550       250               250
and watermark 2 of size 140×230 is the patient detail.
Watermark1 is used up to the selection of wavelet           4             11.389      47.676             250
and for further analysis watermark 2 is used, these         5              7.870      38.252             250
are embedded in the binary image format.
                                                                   As the alpha value increases the PSNR value
                                                         is getting reduced i.e. the quality of the image is
                                                         getting reduced. In the case of DWT it is seen that the
                                                         PSNR value is not that much reduced when the alpha
                                                         increases. Table 2 shows the PSNR value of the
                                                         retrieved signature. The performance of DCT (8bit) is
       (a)                        (b)                    poor when compared to DCT (16bit) and DWT. The
                                                         original signature can be retrieved for all alpha values
                                                         changing from 1 to 5 in the case of DWT where the
                                                         PSNR is a high value of about 250 which does not
                                                         shows any significant difference from the original
                                                         image. In the case of DCT (16bit) signature can be
                                                         retrieved without error only when the alpha values
                                                         are 1, 2, and 3. For values alpha= 4 and alpha = 5 the
                                                         image quality is reduced.
                    (c)
Fig .2 (a) Test image (b) watermark 1(c) watermark 2

         The results after applying the watermark in
DCT for different pixel resolutions are found out.
The PSNR values of DCT (8bit), DCT (16 bit) and
DWT (first level decomposition) are given in table 1,
                                                                     (a)                           (b)
table 2, and table 3.Table 1 shows the PSNR
comparison of original and the watermarked image.
From the table it is seen that the performance of
DCT (16 bit) is better than DCT (8bit) and DWT
outperforms both DCT (8bit) and DCT (16bit) for
different alpha values, where alpha is the depth or
weighing factor for the watermark.
                                                                    (c)                             (d)
                                                            Fig.3 Retrieved signatures after the removal of
                                                           watermark from DCT (8bit) domain for different
                                                          values of alpha (a) alpha=1(b) alpha=2 (c) alpha=3
                                                                              (d) alpha =4


                                                                                                 964 | P a g e
Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.962-968

         Fig.3, fig.4 and fig. 5 show the retrieved         fig.8 shows the MSE of DCT (8bit), DCT (16bit) and
watermark from DCT (8bit), DCT (16bit) and DWT              DWT.
respectively for different values of alpha. It is clear
                                                             Table 3 PSNR comparison of original and retrieved
from the images that the watermark can be retrieved
                                                                        image in different domains
perfectly in DWT domain than in DCT domain.
                                                              Alpha                   Domains

                                                                               DCT(8bit)           DCT(16bit)        DWT
                                                                   1           146.329             250               250
           (a)                                 (b)                 2           130.793             137.193           130.074
                                                                   3           121.683             125.624           127.968
               (a)                            (b)
                                                                   4           85.571              85.625            115.971
                                                                   5           59.684              59.680            115.003


                                                                       DCT (8 bit)               DCT (16 bit)         DWT
                                                                   300

                                                                   250
          (c)                                   (d)
   Fig.4 Retrieved signatures after the removal of           MSE   200

 watermark from DCT (16bit) domain for different                   150
 values of alpha (a) alpha=1(b) alpha=2 (c) alpha=3                100
                     (d) alpha =4.
                                                                       50

                                                                           0
                                                                                    1        2          3        4         5
                                                                                         Alpha

                                                            Fig.6 MSE comparison of original and watermarked
        (a)                              (b)
                                                                       image for different domains

                                                                           DCT (8bit)            DCT (16 bit)          DWT
                                                                   0.5

         (c)                            (d)                        0.4
   Fig.5 Retrieved signatures after the removal of
                                                                   0.3
                                                             MSE




watermark from DWT domain for different values of
alpha (a) alpha=1(b) alpha=2 (c) alpha=3 (d) alpha =               0.2
                         4
                                                                   0.1
          For DCT (8bit) it is inferred from the fig.3
that, when the alpha = 3 the watermark can be                          0
retrieved with PSNR value 57.55. In the case of DCT                             1        2          3        4         5
(16 bit) shown in fig.4, it is seen that for alpha values                            Alpha
1, 2 and 3 the watermark is reconstructed with PSNR           Fig.7 MSE comparisons of original signature and
values 250, that is the original watermark is perfectly           retrieved signature for different domains
reconstructed. From fig.5 it is seen that the
watermark can be retrieved perfectly for all values of
alpha i.e.in this case the watermark is embedded in
the DWT domain. Table 3 shows the PSNR variation
of the original and reconstructed image. From the
table it is clear that the image quality is high for
DWT when compared to DCT. MSE is calculated for
watermarking in different domains, it is found that
the mean square error will be less for DWT as
compared to DCT (8bit), DCT (16bit) i.e. the fig.6 to




                                                                                                                 965 | P a g e
Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and
                     Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 3, Issue 1, January -February 2013, pp.962-968

                DCT (8 bit)        DCT (16 bit)     DWT
          180
                                                                                     Haar       db2     db4
          160                                                     8
          140
                                                                  6
          120
    MSE




                                                            MSE
          100                                                     4
           80
                                                                  2
           60
           40                                                     0
           20                                                                    5          8          15
                                                                                   Alpha
            0
                                                            Fig .9 MSE comparison of original and watermarked
                    1         2        3      4        5
                                                                       image for different wavelets
                                   Alpha
                                                                     Fig .11 to fig.13 shows the retrieved
                                                            watermark for different wavelets, it is clear from the
     Fig.8 MSE comparison of original and retrieved         figure that the good quality watermark is obtained in
             image for different domains                    the case of Haar wavelet, for db2 and db4 the image
                                                            is degraded. For all the alpha values Haar wavelet is
         From the above results it is clear that DWT        giving a good performance i.e. in all the cases the
performs much better than DCT (8bit) and DCT (16            original watermark can be retrieved properly with a
bit). So DWT is taken as the domain for                     very good PSNR value. In the selection of wavelet
watermarking for further experiments.                       only first level decomposition is considered and the
         As a second step, the type of wavelet that is      watermark is embedded in the low frequency
to be used has to be determined, for that three types       component.
of wavelets are considered Haar, db2, db4. Out of
this Haar is found to give better performance than the
others while retrieving the original image and also                                  Haar       db2     db4
while retrieving the watermark. Table 4 and table 5                   25
show the PSNR comparison of original vs.
watermarked image and original vs. retrieved image.                   20
It is clear from the table that the quality of the
retrieved image will be high in the case of Haar                      15
                                                             MSE




wavelet than that of db4 and db2. Fig.9 and fig.10
shows the MSE variation for the different wavelet                     10
used. The MSE is high in the case of db2 when
compared to db 4 and haar wavelet. Haar wavelet is                     5
having the least MSE.
                                                                       0
          Table 4 PSNR comparison of original and
                                                                                      5          8          15
          watermarked image for different wavelets
                                                                                            Alpha
                                   Wavelets
Alpha              Haar           db2         db4
                                                              Fig.10 MSE comparison of original and retrieved
5               107.802           99.625      101.484                  image for different wavelet
8               96.238            90.115      91.838
15              84.591            78.85       79.45

Table 5 PSNR comparison of original and retrieved
          image for different wavelets
                        Wavelets
                                                                           (a)                        (b)
Alpha
           Haar           db2            db4
      5           114.996           111.113       114.579
      8           105.074           103.211       104.159
     15           93.559            90.033        91.475

                                                                                            (c)

                                                                                                      966 | P a g e
Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.962-968

Fig. 11 Retrieved signature with alpha = 5 for                                 DWT level1            DWT level2
different wavelets (a) Haar (b) db2 (c) db4
                                                                    400

                                                                    300

                                                                    200




                                                                  MSE
                                                                    100
          (a)                          (b)                               0

                                                                                 5        8 Alpha 15

                                                           Fig.14 MSE comparison of original and watermarked
                                                                 image for different decomposition levels
                         (c)                                   Alpha           DWT          DWT            DWT
   Fig. 12 Retrieved signature with alpha = 8 for                              level1       level2         level3
     different wavelets (a) Haar (b) db2 (c) db4               5               78.3340      74.435         73.191
                                                               8               69.389       65.485         64.439
                                                               15              57.336       54.221         53.341

                                                               Table 6 PSNR comparison of original and
                                                             watermarked image for different decomposition
    (a)                              (b)                                        levels


                                                                         DWT level1      DWT level2      DWT level3

                                                                    50
                                                                    40
                   (c)                                              30
                                                              MSE




  Fig. 13 Retrieved signature with alpha = 15 for                   20
     different wavelets (a) Haar (b) db2 (c) db4                    10
                                                                     0
          After     selecting    the    wavelet,     the                         5           8             15
                                                                                          Alpha
watermarking is done for different decomposition
levels of DWT, here the watermark used is the
patient details as shown in fig .2 and it are found that     Fig.15 MSE comparison of original and retrieved
level 3 decomposition gives better results when                  image for different decomposition levels
compared other levels. In the case of all other levels
the retrieved watermark quality is degraded.                Table 7 PSNR comparison of original and retrieved
          The watermark is retrieved perfectly when              image for different decomposition levels
the alpha have some moderate values that is around
15. The comparison results of PSNR and MSE for               Alpha           DWT         DWT            DWT
alpha values 5, 8, 15 are shown in table 6 and 7 and                         level1      level2         level3
fig 14 and fig.15 respectively. From all these results       5               85.9218     87.603         96.773
we can conclude that DWT using haar wavelet with a           8               76.731      77.239         87.687
third level decomposition yields better result than          15              63.633      64.458         78.967
DCT domain.
                                                                                VI.CONCLUSION
                                                                    The various features of watermarking
                                                           algorithms are discussed in this paper. The
                                                           performance evaluation of embedding the watermark
                                                           in DCT and DWT domains is analyzed taking PSNR
                                                           and MSE as the evaluation parameters. It is found
                                                           that DWT using haar wavelet performs quite better
                                                           than DCT. Secondly the watermark embedding in
                                                           different decomposition levels is analyzed and found


                                                                                                         967 | P a g e
Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.962-968

out that the third level decomposition gives better          Sciences, Elsevier, Vol. 175, No. 3, pp. 200-
results, i.e. about 24% reduction in MSE is obtained         216, 2005.
for third level DWT as compared to first level and a    [11] V. Fotopoulos, M. L. Stavrinou, A. N. Skodras,
decrease of 23% is obtained for third level compared         "Medical Image Authentication and Self-
to second level decomposition. While increasing the          Correction through an Adaptive Reversible
level of decomposition further the retrieved image           Watermarking Technique", Proceedings of 8th
gets distorted. The future work has to be extended by        IEEE International Conference on Bio-
evaluating the robustness of the watermarking                Informatics and Bio-Engineering (BIBE-2008),
algorithm against different types of attacks such as         pp. 1-5, October 2008.
geometric attacks, compression attacks and modify       [12] H.-K. Lee, H.-J. Kim, K.-R. Kwon, J. K.
further.                                                     Lee,"ROI Medical Image Watermarking Using
                                                             DWT and Bit plane", Asia Pacific Conference
                 REFERENCES                                  on Communications, Perth, Western Australia,
                                                             3-5, October 2005.
 [1] I Cox , M Miller , J.Bloom ,J. Fridrich ,          [13] J. M. Zain, L.P Baldwin, M. Clarke “Reversible
      T.Kalker,“Digital      Watermarking        and         watermarking for authentication of DICOM
      Steganography”, 2nd Ed. ISBN: 978-                     images” Proc. of the 26th Annual International
      0123725851                                             Conference of the IEEE EMBS San Francisco,
 [2] Y. Lim, C. Xu, D. D. Feng, "Web-based                   CA, USA, September 1-5, 2004
      Image Authentication using Invisible Fragile      [14] Mohamed Ali Hajjaji, Abdellatif, El-bey,”A
      Watermark", Proceedings of the Pan-Syndney             watermarking of Medical Image: Method Based
      area workshop on Visual Information                    LSB”, Journal of Emerging Trends in
      Processing, Vol. 11, pp. 31-34, Sydney                 Computing and Information Sciences, Vol.2,
      Australia, 2001.                                       NO.12, December 2011
 [3] A. Wakatani, "Digital Watermarking for ROI
      Medical Images by Using Compressed
      Signature Image", Proceedings of the 35th
      International Conference on System Sciences,
      Vol 10 pp. 24-28 2002.
 [4] B. M. Plantiz, A. J. Maeder, "A Study of Block-
      Based Medical Image Watermarking Using a
      Perceptual Similarity Metric", Proceedings of
      the Digital Imaging Computing: Techniques
      and Applications (DICTA 2005), 2005.
 [5] A. Giakoumaki, S. Pavlopulos, D. Koutsouris,
      "Multiple Image Watermarking Applied to
      Health Information Management", IEEE
      Transactions on Information Technology in
      Bio-Medicine, Vol. 10, No. 4, October 2006.
 [6] W. Gang, R. Ni, "A Fragile Watermarking
      Scheme for Medical Images", Proceedings of
      the 27th IEEE Annual Conference on
      Engineering in Medicine and Biology Shangai
      China September 2005.
 [7] R. Raul et al., “Hiding scheme for medical
      images”, Proc.17th International Conference on
      Electronics, Communications and Computers,
      ,pp. 32-32 August 2007.
 [8] C.R. Piao, D.M. Woo, D.C. Park, S.S. Han,
      "Medical Image Authentication Using Hash
      Functions and Integer Wavelet Transform",
      2008 Congress on Image and Signal Processing,
      (CISP-2008),
 [9] Sanya, Hainan, China, the27th IEEE Annual
      Conference on Engineering in Medicine and
      Biology, Shanghai, China, pp.1-4, 2005.
 [10] F.Y. Shih, Y.T. Wu, "Robust Watermarking
      and Compression for Medical Images based on
      Genetic Algorithms", Journal of Information


                                                                                            968 | P a g e

Weitere ähnliche Inhalte

Was ist angesagt?

Eye sight determination on tablet based hand held device with image processin...
Eye sight determination on tablet based hand held device with image processin...Eye sight determination on tablet based hand held device with image processin...
Eye sight determination on tablet based hand held device with image processin...eSAT Publishing House
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Survey on Reversible Watermarking
Survey on Reversible Watermarking Survey on Reversible Watermarking
Survey on Reversible Watermarking IOSR Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad Renas Rekany
 
4.Video Conferencing and Diagnosis
4.Video Conferencing and Diagnosis4.Video Conferencing and Diagnosis
4.Video Conferencing and DiagnosisVideoguy
 
IRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance SystemIRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance SystemIRJET Journal
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Droege Pupil Center Detection In Low Resolution Images
Droege Pupil Center Detection In Low Resolution ImagesDroege Pupil Center Detection In Low Resolution Images
Droege Pupil Center Detection In Low Resolution ImagesKalle
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...srinivasanece7
 
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesDepth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesIDES Editor
 
1412194747_414ijarse
1412194747_414ijarse1412194747_414ijarse
1412194747_414ijarseSnigdha rai
 
IRJET - Detection of Diabetic Retinopathy using Local Binary Pattern
IRJET - Detection of Diabetic Retinopathy using Local Binary PatternIRJET - Detection of Diabetic Retinopathy using Local Binary Pattern
IRJET - Detection of Diabetic Retinopathy using Local Binary PatternIRJET Journal
 

Was ist angesagt? (19)

Final_ppt1
Final_ppt1Final_ppt1
Final_ppt1
 
Eye sight determination on tablet based hand held device with image processin...
Eye sight determination on tablet based hand held device with image processin...Eye sight determination on tablet based hand held device with image processin...
Eye sight determination on tablet based hand held device with image processin...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
E0543135
E0543135E0543135
E0543135
 
Survey on Reversible Watermarking
Survey on Reversible Watermarking Survey on Reversible Watermarking
Survey on Reversible Watermarking
 
13 pradeep kumar_137-149
13 pradeep kumar_137-14913 pradeep kumar_137-149
13 pradeep kumar_137-149
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATIONA SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
 
4.Video Conferencing and Diagnosis
4.Video Conferencing and Diagnosis4.Video Conferencing and Diagnosis
4.Video Conferencing and Diagnosis
 
IRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance SystemIRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance System
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Droege Pupil Center Detection In Low Resolution Images
Droege Pupil Center Detection In Low Resolution ImagesDroege Pupil Center Detection In Low Resolution Images
Droege Pupil Center Detection In Low Resolution Images
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
 
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesDepth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
 
1412194747_414ijarse
1412194747_414ijarse1412194747_414ijarse
1412194747_414ijarse
 
IRJET - Detection of Diabetic Retinopathy using Local Binary Pattern
IRJET - Detection of Diabetic Retinopathy using Local Binary PatternIRJET - Detection of Diabetic Retinopathy using Local Binary Pattern
IRJET - Detection of Diabetic Retinopathy using Local Binary Pattern
 

Ähnlich wie Et31962968

ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEAIRCC Publishing Corporation
 
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...IJERA Editor
 
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...sipij
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
 
Review on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesReview on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesIRJET Journal
 
Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...eSAT Publishing House
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...prjpublications
 
A130104
A130104A130104
A130104irjes
 
A130104
A130104A130104
A130104irjes
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesEditor IJMTER
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarkingijsrd.com
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
 

Ähnlich wie Et31962968 (20)

ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
 
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
 
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
Review on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesReview on Quantum Watermarking Techniques
Review on Quantum Watermarking Techniques
 
Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 
I43014752
I43014752I43014752
I43014752
 
A130104
A130104A130104
A130104
 
A130104
A130104A130104
A130104
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniques
 
dwm
dwmdwm
dwm
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarking
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
50120130406010
5012013040601050120130406010
50120130406010
 
Medical
MedicalMedical
Medical
 

Kürzlich hochgeladen

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Et31962968

  • 1. Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.962-968 Development Of A New Watermarking Algorithm For Telemedicine Applications Remya Elizabeth Philip1, Sumithra M.G.2, PG Student1, Professor of ECE Department2 Bannari Amman Institute of Technology. Abstract- Watermarking algorithms are used for (RONI) watermarking which embeds the watermark embedding watermark like patient’s history and information in RONI and keeping the region of doctor’s signature in binary image format into interest (ROI) distortion free, and (2) by selecting host’s medical image for telemedicine reversible watermarking method which recover the applications. In this work the watermarking of original cover image by undoing the watermark medical image is done in DCT and DWT domains embedding process at the receiving end after the and the performance is evaluated based on PSNR image verification process is completed [3], [12]. and MSE. From the obtained results it is observed that the watermarking in wavelet domain using Watermark attacks extracted watermark Haar wavelet yields better result than in DCT domain. Embedder Extractor Channel Host image Original image Keywords: Watermark, DWT, DCT, PSNR, MSE Fig. 1 A generic watermarking system model I.INTRODUCTION The Institution of Medicine defines In this generic watermarking model shown telemedicine as the use of electronic information in Fig.1, there is a watermark embedder which technologies to provide and support health care when embeds the information that is to be hidden (the distance separates the participants. The most common watermark) in the original image (cover image) and application today is in the transmission of high the watermarked image is sent through the channel resolution X-rays, cardiology, orthopedics, where there is a large probability of attacks such as dermatology and psychiatry. Telemedicine arose removal attack, geometric attacks, cryptographic originally to serve rural populations or any people attacks, protocol attacks. At the receiver side there is who are geographically isolated, where time and cost an extractor which extracts the watermark from the of travel make access to the best medical care stego image. difficult. Now it is increasingly being used in Digital image watermark techniques can mainstream medicine, to allow doctors the world also be classified based on the type of information over to share expensive recourses and valuable needed in the extraction process. Using this experience. Hence, healthcare industry demands classification criterion, it can be classified into two secure, robust and more information hiding categories; non-blind and blind watermarking. A non- techniques promising strict secured authentication blind watermarking system requires the host image and communication through internet or mobile and the watermarked image in order to detect and phones. extract the watermark data, but on the other hand, a Medical image watermarking requires extreme blind watermarking system requires nothing other care when embedding additional data within the than the watermarked image itself to complete the medical images because the additional information process. In dealing with watermarking of medical must not affect the image quality as this may cause a images, some important constraints need to be misdiagnosis [7]. This kind of a system requires a satisfied. When watermark is embedded in the host high level of security, which can be ensured by using image, it generates distortion. This distortion is digital watermarking techniques. This imposes three highly undesirable in medical applications, whereby, mandatory characteristics: robustness, capacity and even a small distortion in the images such as MRI imperceptibility. There are different methods that has and X-ray images might affect the decision of a been using for medical image watermarking. The physician. For this reason, it is necessary not only to watermark can directly be embedded in the LSB as extract the watermark but also to restore the original described by Mohamed Ali et al [14], [7]. In some image completely. Reversible watermarking fulfills applications it is often not allowed to alter the image this requirement. It can restore the exact state of the contents even one bit of information. The original image. Whereas non reversible watermarking requirement of imperceptibility can be satisfied by algorithms do not provide the exact reconstruction of two methods (1) by selecting region of non interest the image 962 | P a g e
  • 2. Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.962-968 III. METHODOLOGY II. PROPERTIES OF MEDICAL IMAGE The various steps for embedding and WATERMARKING extracting the watermark in DCT and DWT domain Security of medical information, derived are given below from strict ethics and governmental rules, gives rights to the patient and duties to the health professionals. Steps for applying watermark This imposes three compulsory characteristics: 1. Read the CT image(cover image) robustness, imperceptibility, capacity. Robustness is 2. Read the signature (watermark) defined as the ability of watermark to resist against 3. Fix the alpha value to 1 (alpha=1) both lawful and illicit attacks. One of the stringent 4. Multiply the alpha value with the sign requirements of the image watermarking is the 5. Take the transform for the imperceptibility. Imperceptibility means that image(DCT/DWT) watermark embedded in the image must be invisible 6. Add the watermark into the cover image to the human eye. In watermarking of medical 7. Take the inverse transform to get the images, all the information necessary for physician watermarked image such as identification of patient, diagnosis report, 8. Calculate the MSE and PSNR between the origin identification (who created the image) are original and watermarked image embedded. This information is further increased 9. Increment the alpha value and repeat the when the image is sent to other physician for second steps from 4 to 8 opinion. Therefore, capacity for embedding the Steps for extraction process payload must be high. 1. Read the stego image (watermarked image) Based on the domain in which the 2. Take the transform for the watermark can be embedded, the watermarking image(DCT/DWT) techniques are classified into 2 categories: spatial 3. Read the signature domain techniques and transform domain techniques. 4. Divide the signature by the alpha value The most clear cut way to hide the watermark within 5. Subtract the signature from the watermarked the cover content is to directly embed it in the spatial image domain. There is number of advantages for using 6. Take the inverse transform spatial domain watermarking. One advantage is 7. Reconstructed image is obtained temporal or spatial localization of the embedded data 8. Calculate the PSNR and MSE of the original can automatically be achieved if the watermarked and recovered image and the original and content undergoes some attacks and distortions are retrieved watermark introduced in the watermarked content. Another advantage of spatial domain watermarking is that, an IV. PERFORMANCE EVALUATION exact control on the maximum difference between the PARAMETERS original and watermarked content is possible which For evaluation of the watermarking allows the design of near-lossless watermarking algorithm, many criteria‟s are used. The most systems, as required by certain applications such as important among them are the quality of the image protection of sensing or medical images. The oldest and the robustness of the watermarking scheme and the most common used method in this category is against various attacks. the insertion of watermark in the least significant bit  Signal to noise ratio and peak signal to of the pixel data [1], [14]. Since the modification of noise ratio the pixel data takes place in the LSB it is not visually Among the most important distorting measures perceptible. To obtain better imperceptibility as well in image processing is the Signal to Noise Ratio as robustness, watermarking is done in frequency (SNR) and the Peak Signal to Noise Ratio domain. The frequency domain watermarking (PSNR).The SNR and the PSNR are respectively techniques are also called multiplicative defined by the following formulas: watermarking techniques. Discrete Fourier Transform I 2 𝑖,𝑗 (DFT), Discrete Cosine Transform (DCT) [14], 𝑆𝑁𝑅 = 10 log10 𝑖,𝑗 2 (1) 𝑖,𝑗 𝐼 𝑖,𝑗 −𝐾 𝑖,𝑗 Discrete Wavelet Transform (DWT) [5] is the most 𝑀𝐴𝑋 popular transforms operating in the frequency 𝑃𝑆𝑁𝑅 = 20𝑙𝑜𝑔10 2 𝑀𝑆𝐸 domain etc then the transform domain coefficients MAX is the maximum pixel value in the image are modified by the watermark, [1], [10]. The inverse where MSE is given by, transform is finally applied in order to obtain the watermarked image. Due to complicated calculations 1 m−1 n−1 2 MSE = mn i=0 j=0 I i, j − K i, j ( 3) of forward and inverse transform the spatial domain techniques are less prone to attacks. where I (i, j) and K (i, j) are original and watermarked image respectively. 963 | P a g e
  • 3. Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.962-968 Table 1 PSNR comparison of original and V.EXPERIMENTAL RESULTS watermarked image in different domains A medical image (CT scan) 512×512 is Alpha Domains taken as the test image; doctor‟s signature 60×100 DCT DCT DWT and patient details 140×230 is taken as the (8bit) (16bit) watermark. Various experiments are conducted to 1 80.15 81.161 250 develop an efficient watermarking algorithm. The first experiment is conducted to select the domain of 2 67.728 67.759 121.283 watermarking. The watermark is first applied in the 3 60.157 60.102 117.234 DCT and DWT domain and the performance is 4 56.726 56.692 109.710 evaluated based on PSNR and MSE. It is found that 5 54.031 54.047 107.802 DWT performs better than DCT, so the next step aims to find out which wavelet transform that can be Table 2 PSNR comparison of original and retrieved used for the embedding purpose and also to find out signature in different domains the level of decomposition, for that three sets of Domains mother wavelets are considered „Haar‟, „db2‟ and Alpha „db4‟. The result shows that Haar gives better DCT(8bit) DCT(16bit) DWT(8bit) performance compared to the others. Fig.2 represents 1 19.685 250 250 the test image of size 512×512 and the watermarks. 2 39.120 250 250 Watermark 1 of size 60×100 is the doctor‟s signature, 3 57.550 250 250 and watermark 2 of size 140×230 is the patient detail. Watermark1 is used up to the selection of wavelet 4 11.389 47.676 250 and for further analysis watermark 2 is used, these 5 7.870 38.252 250 are embedded in the binary image format. As the alpha value increases the PSNR value is getting reduced i.e. the quality of the image is getting reduced. In the case of DWT it is seen that the PSNR value is not that much reduced when the alpha increases. Table 2 shows the PSNR value of the retrieved signature. The performance of DCT (8bit) is (a) (b) poor when compared to DCT (16bit) and DWT. The original signature can be retrieved for all alpha values changing from 1 to 5 in the case of DWT where the PSNR is a high value of about 250 which does not shows any significant difference from the original image. In the case of DCT (16bit) signature can be retrieved without error only when the alpha values are 1, 2, and 3. For values alpha= 4 and alpha = 5 the image quality is reduced. (c) Fig .2 (a) Test image (b) watermark 1(c) watermark 2 The results after applying the watermark in DCT for different pixel resolutions are found out. The PSNR values of DCT (8bit), DCT (16 bit) and DWT (first level decomposition) are given in table 1, (a) (b) table 2, and table 3.Table 1 shows the PSNR comparison of original and the watermarked image. From the table it is seen that the performance of DCT (16 bit) is better than DCT (8bit) and DWT outperforms both DCT (8bit) and DCT (16bit) for different alpha values, where alpha is the depth or weighing factor for the watermark. (c) (d) Fig.3 Retrieved signatures after the removal of watermark from DCT (8bit) domain for different values of alpha (a) alpha=1(b) alpha=2 (c) alpha=3 (d) alpha =4 964 | P a g e
  • 4. Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.962-968 Fig.3, fig.4 and fig. 5 show the retrieved fig.8 shows the MSE of DCT (8bit), DCT (16bit) and watermark from DCT (8bit), DCT (16bit) and DWT DWT. respectively for different values of alpha. It is clear Table 3 PSNR comparison of original and retrieved from the images that the watermark can be retrieved image in different domains perfectly in DWT domain than in DCT domain. Alpha Domains DCT(8bit) DCT(16bit) DWT 1 146.329 250 250 (a) (b) 2 130.793 137.193 130.074 3 121.683 125.624 127.968 (a) (b) 4 85.571 85.625 115.971 5 59.684 59.680 115.003 DCT (8 bit) DCT (16 bit) DWT 300 250 (c) (d) Fig.4 Retrieved signatures after the removal of MSE 200 watermark from DCT (16bit) domain for different 150 values of alpha (a) alpha=1(b) alpha=2 (c) alpha=3 100 (d) alpha =4. 50 0 1 2 3 4 5 Alpha Fig.6 MSE comparison of original and watermarked (a) (b) image for different domains DCT (8bit) DCT (16 bit) DWT 0.5 (c) (d) 0.4 Fig.5 Retrieved signatures after the removal of 0.3 MSE watermark from DWT domain for different values of alpha (a) alpha=1(b) alpha=2 (c) alpha=3 (d) alpha = 0.2 4 0.1 For DCT (8bit) it is inferred from the fig.3 that, when the alpha = 3 the watermark can be 0 retrieved with PSNR value 57.55. In the case of DCT 1 2 3 4 5 (16 bit) shown in fig.4, it is seen that for alpha values Alpha 1, 2 and 3 the watermark is reconstructed with PSNR Fig.7 MSE comparisons of original signature and values 250, that is the original watermark is perfectly retrieved signature for different domains reconstructed. From fig.5 it is seen that the watermark can be retrieved perfectly for all values of alpha i.e.in this case the watermark is embedded in the DWT domain. Table 3 shows the PSNR variation of the original and reconstructed image. From the table it is clear that the image quality is high for DWT when compared to DCT. MSE is calculated for watermarking in different domains, it is found that the mean square error will be less for DWT as compared to DCT (8bit), DCT (16bit) i.e. the fig.6 to 965 | P a g e
  • 5. Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.962-968 DCT (8 bit) DCT (16 bit) DWT 180 Haar db2 db4 160 8 140 6 120 MSE MSE 100 4 80 2 60 40 0 20 5 8 15 Alpha 0 Fig .9 MSE comparison of original and watermarked 1 2 3 4 5 image for different wavelets Alpha Fig .11 to fig.13 shows the retrieved watermark for different wavelets, it is clear from the Fig.8 MSE comparison of original and retrieved figure that the good quality watermark is obtained in image for different domains the case of Haar wavelet, for db2 and db4 the image is degraded. For all the alpha values Haar wavelet is From the above results it is clear that DWT giving a good performance i.e. in all the cases the performs much better than DCT (8bit) and DCT (16 original watermark can be retrieved properly with a bit). So DWT is taken as the domain for very good PSNR value. In the selection of wavelet watermarking for further experiments. only first level decomposition is considered and the As a second step, the type of wavelet that is watermark is embedded in the low frequency to be used has to be determined, for that three types component. of wavelets are considered Haar, db2, db4. Out of this Haar is found to give better performance than the others while retrieving the original image and also Haar db2 db4 while retrieving the watermark. Table 4 and table 5 25 show the PSNR comparison of original vs. watermarked image and original vs. retrieved image. 20 It is clear from the table that the quality of the retrieved image will be high in the case of Haar 15 MSE wavelet than that of db4 and db2. Fig.9 and fig.10 shows the MSE variation for the different wavelet 10 used. The MSE is high in the case of db2 when compared to db 4 and haar wavelet. Haar wavelet is 5 having the least MSE. 0 Table 4 PSNR comparison of original and 5 8 15 watermarked image for different wavelets Alpha Wavelets Alpha Haar db2 db4 Fig.10 MSE comparison of original and retrieved 5 107.802 99.625 101.484 image for different wavelet 8 96.238 90.115 91.838 15 84.591 78.85 79.45 Table 5 PSNR comparison of original and retrieved image for different wavelets Wavelets (a) (b) Alpha Haar db2 db4 5 114.996 111.113 114.579 8 105.074 103.211 104.159 15 93.559 90.033 91.475 (c) 966 | P a g e
  • 6. Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.962-968 Fig. 11 Retrieved signature with alpha = 5 for DWT level1 DWT level2 different wavelets (a) Haar (b) db2 (c) db4 400 300 200 MSE 100 (a) (b) 0 5 8 Alpha 15 Fig.14 MSE comparison of original and watermarked image for different decomposition levels (c) Alpha DWT DWT DWT Fig. 12 Retrieved signature with alpha = 8 for level1 level2 level3 different wavelets (a) Haar (b) db2 (c) db4 5 78.3340 74.435 73.191 8 69.389 65.485 64.439 15 57.336 54.221 53.341 Table 6 PSNR comparison of original and watermarked image for different decomposition (a) (b) levels DWT level1 DWT level2 DWT level3 50 40 (c) 30 MSE Fig. 13 Retrieved signature with alpha = 15 for 20 different wavelets (a) Haar (b) db2 (c) db4 10 0 After selecting the wavelet, the 5 8 15 Alpha watermarking is done for different decomposition levels of DWT, here the watermark used is the patient details as shown in fig .2 and it are found that Fig.15 MSE comparison of original and retrieved level 3 decomposition gives better results when image for different decomposition levels compared other levels. In the case of all other levels the retrieved watermark quality is degraded. Table 7 PSNR comparison of original and retrieved The watermark is retrieved perfectly when image for different decomposition levels the alpha have some moderate values that is around 15. The comparison results of PSNR and MSE for Alpha DWT DWT DWT alpha values 5, 8, 15 are shown in table 6 and 7 and level1 level2 level3 fig 14 and fig.15 respectively. From all these results 5 85.9218 87.603 96.773 we can conclude that DWT using haar wavelet with a 8 76.731 77.239 87.687 third level decomposition yields better result than 15 63.633 64.458 78.967 DCT domain. VI.CONCLUSION The various features of watermarking algorithms are discussed in this paper. The performance evaluation of embedding the watermark in DCT and DWT domains is analyzed taking PSNR and MSE as the evaluation parameters. It is found that DWT using haar wavelet performs quite better than DCT. Secondly the watermark embedding in different decomposition levels is analyzed and found 967 | P a g e
  • 7. Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.962-968 out that the third level decomposition gives better Sciences, Elsevier, Vol. 175, No. 3, pp. 200- results, i.e. about 24% reduction in MSE is obtained 216, 2005. for third level DWT as compared to first level and a [11] V. Fotopoulos, M. L. Stavrinou, A. N. Skodras, decrease of 23% is obtained for third level compared "Medical Image Authentication and Self- to second level decomposition. While increasing the Correction through an Adaptive Reversible level of decomposition further the retrieved image Watermarking Technique", Proceedings of 8th gets distorted. The future work has to be extended by IEEE International Conference on Bio- evaluating the robustness of the watermarking Informatics and Bio-Engineering (BIBE-2008), algorithm against different types of attacks such as pp. 1-5, October 2008. geometric attacks, compression attacks and modify [12] H.-K. Lee, H.-J. Kim, K.-R. Kwon, J. K. further. Lee,"ROI Medical Image Watermarking Using DWT and Bit plane", Asia Pacific Conference REFERENCES on Communications, Perth, Western Australia, 3-5, October 2005. [1] I Cox , M Miller , J.Bloom ,J. Fridrich , [13] J. M. Zain, L.P Baldwin, M. Clarke “Reversible T.Kalker,“Digital Watermarking and watermarking for authentication of DICOM Steganography”, 2nd Ed. ISBN: 978- images” Proc. of the 26th Annual International 0123725851 Conference of the IEEE EMBS San Francisco, [2] Y. Lim, C. Xu, D. D. Feng, "Web-based CA, USA, September 1-5, 2004 Image Authentication using Invisible Fragile [14] Mohamed Ali Hajjaji, Abdellatif, El-bey,”A Watermark", Proceedings of the Pan-Syndney watermarking of Medical Image: Method Based area workshop on Visual Information LSB”, Journal of Emerging Trends in Processing, Vol. 11, pp. 31-34, Sydney Computing and Information Sciences, Vol.2, Australia, 2001. NO.12, December 2011 [3] A. Wakatani, "Digital Watermarking for ROI Medical Images by Using Compressed Signature Image", Proceedings of the 35th International Conference on System Sciences, Vol 10 pp. 24-28 2002. [4] B. M. Plantiz, A. J. Maeder, "A Study of Block- Based Medical Image Watermarking Using a Perceptual Similarity Metric", Proceedings of the Digital Imaging Computing: Techniques and Applications (DICTA 2005), 2005. [5] A. Giakoumaki, S. Pavlopulos, D. Koutsouris, "Multiple Image Watermarking Applied to Health Information Management", IEEE Transactions on Information Technology in Bio-Medicine, Vol. 10, No. 4, October 2006. [6] W. Gang, R. Ni, "A Fragile Watermarking Scheme for Medical Images", Proceedings of the 27th IEEE Annual Conference on Engineering in Medicine and Biology Shangai China September 2005. [7] R. Raul et al., “Hiding scheme for medical images”, Proc.17th International Conference on Electronics, Communications and Computers, ,pp. 32-32 August 2007. [8] C.R. Piao, D.M. Woo, D.C. Park, S.S. Han, "Medical Image Authentication Using Hash Functions and Integer Wavelet Transform", 2008 Congress on Image and Signal Processing, (CISP-2008), [9] Sanya, Hainan, China, the27th IEEE Annual Conference on Engineering in Medicine and Biology, Shanghai, China, pp.1-4, 2005. [10] F.Y. Shih, Y.T. Wu, "Robust Watermarking and Compression for Medical Images based on Genetic Algorithms", Journal of Information 968 | P a g e