Journal ArticleDOI
Chaotic based secure watermarking approach for medical images
Reads0
Chats0
TLDR
Experimental evaluation shows that using combination of NSCT, RDWT, SVD and chaotic encryption makes the approach robust, imperceptible, secure and suitable for medical applications.Abstract:
In this paper, a chaotic based secure medical image watermarking approach is proposed. The method is using non sub-sampled contourlet transform (NSCT), redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD) to provide significant improvement in imperceptibility and robustness. Further, security of the approach is ensured by applying 2-D logistic map based chaotic encryption on watermarked medical image. In our approach, the cover image is initially divided into sub-images and NSCT is applied on the sub-image having maximum entropy. Subsequently, RDWT is applied to NSCT image and the singular vector of the RDWT coefficient is calculated. Similar procedure is followed for both watermark images. The singular value of both watermarks is embedded into the singular matrix of the cover. Experimental evaluation shows when the approach is subjected to attacks, using combination of NSCT, RDWT, SVD and chaotic encryption it makes the approach robust, imperceptible, secure and suitable for medical applications.read more
Citations
More filters
Journal ArticleDOI
Survey of robust and imperceptible watermarking
TL;DR: The paper introduces elementary concepts of digital watermarking, characteristics and novel applications of watermark in detail, and various analysis and comparison of different notable water marking techniques are discussed in tabular format.
Journal ArticleDOI
A novel hybrid DCT and DWT based robust watermarking algorithm for color images
TL;DR: Experimental results show that the proposed method is robust to the linear and nonlinear attacks and the transparency of the watermarked images has been protected.
Journal ArticleDOI
Watermarking techniques for medical data authentication: a survey
Ashima Anand,Amit Singh +1 more
TL;DR: General concepts of watermarking, major characteristics, recent applications, concepts of embedding and recovery process of watermarks, and the summary of various techniques are highlighted in brief.
Journal ArticleDOI
An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD
TL;DR: Experimental result shows, significant enhancement in both imperceptibility and robustness with the average of 46.9496 db and more than 99% respectively, while image blocking makes the capacity independent from the size of the host image.
Journal ArticleDOI
Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique
TL;DR: From the analysis, it shows that the proposed wavelet-based secret image sharing scheme with encrypted shadow images using optimal Homomorphic Encryption (HE) technique provide greater security compared to other existing schemes.
References
More filters
Book
Information Hiding Techniques for Steganography and Digital Watermarking
TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
NPCR and UACI Randomness Tests for Image Encryption
TL;DR: The question of whether a given NPCR/UACI score is sufficiently high such that it is not discernible from ideally encrypted images is answered by comparing actual NPCR and UACI scores with corresponding critical values.
Journal ArticleDOI
A chaos-based symmetric image encryption scheme using a bit-level permutation
TL;DR: This work proposes an image cryptosystem employing the Arnold cat map for bit-level permutation and the logistic map for diffusion, demonstrating the superior security and high efficiency of this algorithm.
Journal ArticleDOI
Secure Medical Data Transmission Model for IoT-Based Healthcare Systems
Mohamed Elhoseny,Gustavo Ramirez-Gonzalez,Osama Abu-Elnasr,Shihab A. Shawkat,N. Arunkumar,Ahmed Farouk +5 more
TL;DR: The proposed hybrid security model for securing the diagnostic text data in medical images proved its ability to hide the confidential patient’s data into a transmitted cover image with high imperceptibility, capacity, and minimal deterioration in the received stego-image.
Journal ArticleDOI
A new robust reference watermarking scheme based on DWT-SVD
TL;DR: A new semi-blind reference watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) for copyright protection and authenticity and it is shown that the proposed scheme also stands with the ambiguity attack also.