scispace - formally typeset
Search or ask a question
Author

S.K. Thakur

Bio: S.K. Thakur is an academic researcher from Jaypee University of Information Technology. The author has contributed to research in topics: Digital watermarking & Encryption. The author has an hindex of 6, co-authored 12 publications receiving 265 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: Experimental results clearly indicated that the proposed technique is highly robust and sufficient secure for various forms of attacks without any significant distortions between watermarked and cover image.
Abstract: In this paper, we present a robust and secure watermarking approach using transform domain techniques for tele-health applications. The patient report/identity is embedding into the host medical image for the purpose of authentication, annotation and identification. For better confidentiality, we apply the chaos based encryption algorithm on watermarked image in a less complex manner. Experimental results clearly indicated that the proposed technique is highly robust and sufficient secure for various forms of attacks without any significant distortions between watermarked and cover image. Further, the performance evaluation of our method is found better to existing state-of-the-art watermarking techniques under consideration. Furthermore, quality analysis of the watermarked image is estimated by subjective measure which is beneficial in quality driven healthcare industry.

179 citations

Journal ArticleDOI
TL;DR: Experimental evaluation shows that using combination of NSCT, RDWT, SVD and chaotic encryption makes the approach robust, imperceptible, secure and suitable for medical applications.
Abstract: In this paper, a chaotic based secure medical image watermarking approach is proposed. The method is using non sub-sampled contourlet transform (NSCT), redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD) to provide significant improvement in imperceptibility and robustness. Further, security of the approach is ensured by applying 2-D logistic map based chaotic encryption on watermarked medical image. In our approach, the cover image is initially divided into sub-images and NSCT is applied on the sub-image having maximum entropy. Subsequently, RDWT is applied to NSCT image and the singular vector of the RDWT coefficient is calculated. Similar procedure is followed for both watermark images. The singular value of both watermarks is embedded into the singular matrix of the cover. Experimental evaluation shows when the approach is subjected to attacks, using combination of NSCT, RDWT, SVD and chaotic encryption it makes the approach robust, imperceptible, secure and suitable for medical applications.

76 citations

Journal ArticleDOI
TL;DR: In this article, the authors demonstrate and disseminate the integrated nutrient management (INM) technology in the irrigated ecosystem of Balh Valley in India to develop sustainable crop production systems under cash crops and vegetables following an appropriate technology transfer model.
Abstract: Balh Valley in the northwestern Himalayas in India is well known for cultivation of high-value cash crops and vegetables. The Indo-German Agricultural Project executed four decades ago in the valley has been the driving force for agrarian development in the valley, but crops are still grown under nutrient-starved conditions, giving low productivity compared to national averages. To demonstrate and disseminate the integrated nutrient management (INM) technology in the irrigated ecosystem of Balh Valley, efforts were funded by the Indian Farmers' Fertilizers Cooperative Limited (IFFCO) to develop sustainable crop production systems under cash crops and vegetables following an appropriate technology transfer model by Krishi Vigyan Kendra (KVK), Sundernagar, India. For effective technology transfer, field demonstrations, method demonstrations, farmers' training camps, field days, and numerous field conventions were organized in addition to extending soil testing, literature supply, promotional seed and fertil...

45 citations

Journal ArticleDOI
TL;DR: This paper discusses a lightweight encryption–based secure digital watermarking technique for medical applications that uses redundant discrete wavelet transform and singular value decomposition along with nonsubsampled contourlet transform (NSCT) to improve robustness and imperceptibility.
Abstract: This paper discusses a lightweight encryption–based secure digital watermarking technique for medical applications. The technique uses redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD) along with nonsubsampled contourlet transform (NSCT) to improve robustness and imperceptibility. The security of the proposed technique is further improved by incorporating a lightweight (low‐complexity) cryptographic mechanism that is applied after embedding multiple watermarks. The proposed scheme first partitions the host image into subcomponents and then calculates the entropy values for it. To the maximum entropy value, the NSCT is applied, followed by RDWT decomposition. Finally, SVD is applied to obtain a singular vector of RDWT‐decomposed components. The watermark images are also processed using the same procedure mentioned above. The method uses singular values to hide watermarks into a host image. The experimental outcome shows that the combined technique makes our proposed approach more robust and imperceptible, while it is evaluated for various wavelet filters and 10 different types of medical and five different types of nonmedical cover images. Furthermore, the strength of the cryptographic mechanism is tested using standard performance measures and confirms its effectiveness in security. Moreover, it is evident from the results that our method shows improvement in robustness in comparison to previously reported techniques under consideration.

26 citations

Journal ArticleDOI
TL;DR: In this article, a joint encryption then compression based watermarking technique for digital document security is proposed, which offers a tool for confidentiality, copyright protection, and strong compression performance of the system.
Abstract: Recently, due to the increase in popularity of the Internet, the problem of digital data security over the Internet is increasing at a phenomenal rate. Watermarking is used for various notable applications to secure digital data from unauthorized individuals. To achieve this, in this article, we propose a joint encryption then-compression based watermarking technique for digital document security. This technique offers a tool for confidentiality, copyright protection, and strong compression performance of the system. The proposed method involves three major steps as follows: (1) embedding of multiple watermarks through non-sub-sampled contourlet transform, redundant discrete wavelet transform, and singular value decomposition; (2) encryption and compression via SHA-256 and Lempel Ziv Welch (LZW), respectively; and (3) extraction/recovery of multiple watermarks from the possibly distorted cover image. The performance estimations are carried out on various images at different attacks, and the efficiency of the system is determined in terms of peak signal-to-noise ratio (PSNR) and normalized correlation (NC), structural similarity index measure (SSIM), number of changing pixel rate (NPCR), unified averaged changed intensity (UACI), and compression ratio (CR). Furthermore, the comparative analysis of the proposed system with similar schemes indicates its superiority to them.

23 citations


Cited by
More filters
Journal ArticleDOI

7,335 citations

Journal ArticleDOI
TL;DR: Experimental results demonstrate that the suggested watermarking technique archives high robustness against attacks in comparison to the other scheme for medical images, and verification its robustness for various attacks while maintaining imperceptibility, security and compression ratio.

160 citations

Journal ArticleDOI
TL;DR: The paper introduces elementary concepts of digital watermarking, characteristics and novel applications of watermark in detail, and various analysis and comparison of different notable water marking techniques are discussed in tabular format.
Abstract: Robustness, imperceptibility and embedding capacity are the preliminary requirements of any watermarking technique. However, research concluded that these requirements are difficult to achieve at same time. In this paper, we review various recent robust and imperceptible watermarking methods in spatial and transform domain. Further, the paper introduces elementary concepts of digital watermarking, characteristics and novel applications of watermark in detail. Furthermore, various analysis and comparison of different notable watermarking techniques are discussed in tabular format. We believe that our survey contribution will helpful for fledgling researchers to develop robust and imperceptible watermarking algorithms for various practical applications.

126 citations

Journal ArticleDOI
TL;DR: In this paper, the state-of-the-art on agricultural entrepreneurship through a systematic literature review and applying the co-words bibliometric technique is analyzed. And the results allowed to identify three main approaches: i) Entrepreneurial Skills and Behaviour, ii) entrepreneurial strategies, and iii) community and entrepreneurship activity.

113 citations

Journal ArticleDOI
TL;DR: Experimental results show that the proposed method is robust to the linear and nonlinear attacks and the transparency of the watermarked images has been protected.
Abstract: In this paper, a novel robust color image watermarking method based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) is proposed. In this method, RGB cover image is divided into red, green and blue components. DCT and DWT are applied to each color components. Grayscale watermark image is scrambled by using Arnold transform. DCT is performed to the scrambled watermark image. Transformed watermark image is then divided into equal smaller parts. DCT coefficients of each watermark parts are embedded into four DWT bands of the color components of the cover image. The robustness of the proposed color image watermarking has been demonstrated by applying various image processing operations such as rotating, resizing, filtering, jpeg compression, and noise adding to the watermarked images. Experimental results show that the proposed method is robust to the linear and nonlinear attacks and the transparency of the watermarked images has been protected.

98 citations