scispace - formally typeset
Journal ArticleDOI

Chaotic based secure watermarking approach for medical images

Reads0
Chats0
TLDR
Experimental evaluation shows that using combination of NSCT, RDWT, SVD and chaotic encryption makes the approach robust, imperceptible, secure and suitable for medical applications.
Abstract
In this paper, a chaotic based secure medical image watermarking approach is proposed. The method is using non sub-sampled contourlet transform (NSCT), redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD) to provide significant improvement in imperceptibility and robustness. Further, security of the approach is ensured by applying 2-D logistic map based chaotic encryption on watermarked medical image. In our approach, the cover image is initially divided into sub-images and NSCT is applied on the sub-image having maximum entropy. Subsequently, RDWT is applied to NSCT image and the singular vector of the RDWT coefficient is calculated. Similar procedure is followed for both watermark images. The singular value of both watermarks is embedded into the singular matrix of the cover. Experimental evaluation shows when the approach is subjected to attacks, using combination of NSCT, RDWT, SVD and chaotic encryption it makes the approach robust, imperceptible, secure and suitable for medical applications.

read more

Citations
More filters
Journal ArticleDOI

Survey of robust and imperceptible watermarking

TL;DR: The paper introduces elementary concepts of digital watermarking, characteristics and novel applications of watermark in detail, and various analysis and comparison of different notable water marking techniques are discussed in tabular format.
Journal ArticleDOI

A novel hybrid DCT and DWT based robust watermarking algorithm for color images

TL;DR: Experimental results show that the proposed method is robust to the linear and nonlinear attacks and the transparency of the watermarked images has been protected.
Journal ArticleDOI

Watermarking techniques for medical data authentication: a survey

TL;DR: General concepts of watermarking, major characteristics, recent applications, concepts of embedding and recovery process of watermarks, and the summary of various techniques are highlighted in brief.
Journal ArticleDOI

An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD

TL;DR: Experimental result shows, significant enhancement in both imperceptibility and robustness with the average of 46.9496 db and more than 99% respectively, while image blocking makes the capacity independent from the size of the host image.
Journal ArticleDOI

Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique

TL;DR: From the analysis, it shows that the proposed wavelet-based secret image sharing scheme with encrypted shadow images using optimal Homomorphic Encryption (HE) technique provide greater security compared to other existing schemes.
References
More filters
Book

Information Hiding Techniques for Steganography and Digital Watermarking

TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.

NPCR and UACI Randomness Tests for Image Encryption

TL;DR: The question of whether a given NPCR/UACI score is sufficiently high such that it is not discernible from ideally encrypted images is answered by comparing actual NPCR and UACI scores with corresponding critical values.
Journal ArticleDOI

A chaos-based symmetric image encryption scheme using a bit-level permutation

TL;DR: This work proposes an image cryptosystem employing the Arnold cat map for bit-level permutation and the logistic map for diffusion, demonstrating the superior security and high efficiency of this algorithm.
Journal ArticleDOI

Secure Medical Data Transmission Model for IoT-Based Healthcare Systems

TL;DR: The proposed hybrid security model for securing the diagnostic text data in medical images proved its ability to hide the confidential patient’s data into a transmitted cover image with high imperceptibility, capacity, and minimal deterioration in the received stego-image.
Journal ArticleDOI

A new robust reference watermarking scheme based on DWT-SVD

TL;DR: A new semi-blind reference watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) for copyright protection and authenticity and it is shown that the proposed scheme also stands with the ambiguity attack also.
Related Papers (5)