IJMECS Vol. 6, No. 10, 8 Oct. 2014
Cover page and Table of Contents: PDF (size: 630KB)
Full Text (PDF, 630KB), PP.40-48
Views: 0 Downloads: 0
ROI (Region of Interest), RONI (Region of Non Interest), IWT (Integer Wavelet Transform), DWT (Discrete Wavelet Transform), IWT with AT (IWT with Arnold Transform), DWT with RST (DWT with RSA, Subtraction and Threshold).
Medical Image Watermarking has been considered as an appropriate method for enhancing the data security and content verification in medical science. For the purpose of achieving better security it is recommended to hide the data in the medical image itself that will improve the reliability of medical information system. In our paper, the work is divided in two main stages, first of all image is divided into two parts: Region of Interest that is defined as informational part of image and Region of Non Interest that is defined as non-informational part. In our work we have used Region of Non Interest to hide the data so that the informational part of the image kept safe. Watermark is encrypted by using RSA. A Discrete Wavelet Transform based approach is used for embedding the encrypted data in Region of Non Interest part of image for enhancing data security. The experimental result shows that watermark embedded by the proposed algorithm provides better security and can survive successfully under different attacks.
Neha Solanki, Sanjay K. Malik, "ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security", International Journal of Modern Education and Computer Science (IJMECS), vol.6, no.10, pp.40-48, 2014. DOI:10.5815/ijmecs.2014.10.06
[1]H. K. Lee, “ROI Medical Image Watermarking Using DWT and Bit-plane”, in proceedings of IEEE Asia-Pacific Conference on Communications, Perth, Western Australia, vol. 16, pp. 512-515, 2005.
[2]B. M. Planitz, “A Study of Block-based Medical Image Watermarking Using a Perceptual Similarity Metric”, in proceedings of IEEE Digital Imaging Computing Techniques and Applications (DICTA), vol. 13, pp.600-612, 2005.
[3]A. K. Navas, M. Sasikumar and S. Sreevidya“A Benchmark for Medical Image Watermarking”,in proceedings of International Conference on Image Processing, vol. 33, pp. 237-240, 2007 .
[4]N. A. Memon and S.A.M. Gilani, “Multiple Watermarking of Medical Images for Content Authentication and Recovery”, in proceedings of World Academy of Science, Engineering and Technology, vol. 38, pp. 347-350, 2009.
[5]S. C. Liew and J. Mohamad, “Reversible Medical Image Watermarking For Tamper Detection and Recovery”, Computerized Medical Imaging and Graphics, vol. 27, pp. 185-196, 2010.
[6]M. K. Kundu and S. Das, “Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding”, in proceedings of IEEE International Conference on Pattern Recognition, vol. 38, pp. 1457-1460, 2010.
[7]N. V. Dharwadkar and B. B. Amberker, “ Reversible Fragile Medical Image Watermarking with Zero Distortion”, in proceedings of IEEE International Conference on Computer & Communication Technology, vol. 21, pp. 248-254, 2010.
[8]B. W. T. Agung and F. P. Permana, “Medical Image Watermarking with Tamper Detection and Recovery Using Reversible Watermarking with LSB Modification and Run Length Encoding (RLE) Compression”, in proceedings of28th IEEE Annual International Conference, New York, USA, vol. 30 pp. 3270-3273, 2010.
[9]C. Dhong and L. Jingbing, “The Watermarking Medical Image Algorithm with Encryption by DCT and Logistic” in proceedings of9thWeb Information Systems and Applications Conference, vol. 6072, San Jose, CA, pp. 1-13, 2012.
[10]L. Yaoli and L. Jingbing, “The Medical Image Watermarking Algorithm Using DWT-DCT and Logistic”, in proceedings of9thIEEE Web Information Systems and Applications Conference, vol. 30, pp. 119-124, 2012.
[11]G. Prabakaran and R. Bhavani, “Multi Secure and Robustness for Medical Image Based Steganography Scheme”, in proceedings of IEEE International Conference on Circuits, Power and Computing Technologies, vol.28, pp. 947-951, 2013.
[12]Hongmei Liu, JunhuiRao, and Xinzhi Yao, “Feature Based Watermarking Scheme for Image Authentication”, IEEE, pp.229-232, 2008.
[13]J. Dittmann, “Content-fragile Watermarking for Image Authentication”, Proc. of SPIE, Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 175-184, 2001.
[14]Kil-Sang Yoo, Mi-Ae Kim, and Won-Hyung Lee “A Robust image watermarking technique for JPEG images using quadtrees”, Lecture Notes in Computer Science, Vol. 3332, pp. 34-41, 2004.
[15]Thai DuyHien Zensho Nakao, and Yen-Wei Chen, “Robust Multi-logo watermarking by RDWT and ICA”, Signal Processing, Elsevier, Vol. 86, pp. 2981-2993, 2006.