scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain

TL;DR: A secure multilevel watermarking scheme in which the encrypted text acts as a watermark based on secure spread-spectrum technique for digital images in discrete wavelet transform (DWT) domain is presented.
Abstract: This paper presents a secure multilevel watermarking scheme in which the encrypted text acts as a watermark. The algorithm is based on secure spread-spectrum technique for digital images in discrete wavelet transform (DWT) domain. Potential application of the proposed watermarking scheme is successfully demonstrated for embedding various medical watermarks in text format at different subband decomposition levels depending upon their performance requirements. In the embedding process, the cover CT Scan image is decomposed up to third level of DWT coefficients. Different text watermarks such as personal and medical record of the patient, diagnostic/image codes and doctor code/signature are embedded into the selective coefficients of the second and third level DWT for potential telemedicine applications. Selection of DWT coefficients for embedding is done by column wise thresholding of coefficients values. Also, encryption is applied to the ASCII representation of the text and the encoded text watermark is embedded. The algorithm correctly extracts the embedded watermarks without error and is robust against numerous known attacks without much degradation of the medical image quality of the watermarked image.
Citations
More filters
Journal ArticleDOI
TL;DR: The proposed algorithm for multiple watermarking based on discrete wavelet transforms, discrete cosine transform and singular value decomposition has been proposed for healthcare applications and has been found to be giving excellent performance for robustness, imperceptibility, capacity and security simultaneously.
Abstract: In this paper, an algorithm for multiple watermarking based on discrete wavelet transforms (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) has been proposed for healthcare applications. For identity authentication purpose, the proposed method uses three watermarks in the form of medical Lump image watermark, the doctor signature/identification code and diagnostic information of the patient as the text watermarks. In order to improve the robustness performance of the image watermark, Back Propagation Neural Network (BPNN) is applied to the extracted image watermark to reduce the noise effects on the watermarked image. The security of the image watermark is also enhanced by using Arnold transform before embedding into the cover. Further, the symptom and signature text watermarks are also encoded by lossless arithmetic compression technique and Hamming error correction code respectively. The compressed and encoded text watermark is then embedded into the cover image. Experimental results are obtained by varying the gain factor, different sizes of text watermarks and the different cover image modalities. The results are provided to illustrate that the proposed method is able to withstand a different of signal processing attacks and has been found to be giving excellent performance for robustness, imperceptibility, capacity and security simultaneously. The robustness performance of the method is also compared with other reported techniques. Finally, the visual quality of the watermarked image is evaluated by the subjective method also. This shows that the visual quality of the watermarked images is acceptable for diagnosis at different gain factors. Therefore the proposed method may find potential application in prevention of patient identity theft in healthcare applications.

227 citations

Journal ArticleDOI
TL;DR: Robustness of the scheme is better than existing scheme for similar set of medical images in terms of normalized correlation coefficient (NCC) and bit-error-rate (BER) and performance comparison of proposed scheme with existing schemes shows proposed scheme has better robustness against different types of attacks.
Abstract: In this paper, a blind image watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is proposed. In this scheme, DWT is applied on ROI (region of interest) of the medical image to get different frequency subbands of its wavelet decomposition. On the low frequency subband LL of the ROI, block-SVD is applied to get different singular matrices. A pair of elements with similar values is identified from the left singular value matrix of these selected blocks. The values of these pairs are modified using certain threshold to embed a bit of watermark content. Appropriate threshold is chosen to achieve the imperceptibility and robustness of medical image and watermark contents respectively. For authentication and identification of original medical image, one watermark image (logo) and other text watermark have been used. The watermark image provides authentication whereas the text data represents electronic patient record (EPR) for identification. At receiving end, blind recovery of both watermark contents is performed by a similar comparison scheme used during the embedding process. The proposed algorithm is applied on various groups of medical images like X-ray, CT scan and mammography. This scheme offers better visibility of watermarked image and recovery of watermark content due to DWT-SVD combination. Moreover, use of Hamming error correcting code (ECC) on EPR text bits reduces the BER and thus provides better recovery of EPR. The performance of proposed algorithm with EPR data coding by Hamming code is compared with the BCH error correcting code and it is found that later one perform better. A result analysis shows that imperceptibility of watermarked image is better as PSNR is above 43 dB and WPSNR is above 52 dB for all set of images. In addition, robustness of the scheme is better than existing scheme for similar set of medical images in terms of normalized correlation coefficient (NCC) and bit-error-rate (BER). An analysis is also carried out to verify the performance of the proposed scheme for different size of watermark contents (image and EPR data). It is observed from analysis that the proposed scheme is also appropriate for watermarking of color image. Using proposed scheme, watermark contents are extracted successfully under various noise attacks like JPEG compression, filtering, Gaussian noise, Salt and pepper noise, cropping, filtering and rotation. Performance comparison of proposed scheme with existing schemes shows proposed scheme has better robustness against different types of attacks. Moreover, the proposed scheme is also robust under set of benchmark attacks known as checkmark attacks.

157 citations

Journal ArticleDOI
TL;DR: The method has been extensively tested and analyzed against known attacks and is found to be giving superior performance for robustness, capacity and reduced storage and bandwidth requirements compared to reported techniques suggested by other authors.
Abstract: This paper presents a new robust hybrid multiple watermarking technique using fusion of discrete wavelet transforms (DWT), discrete cosine transforms (DCT), and singular value decomposition (SVD) instead of applying DWT, DCT and SVD individually or combination of DWT-SVD / DCT-SVD. For identity authentication purposes, multiple watermarks are embedded into the same medical image / multimedia objects simultaneously, which provides extra level of security with acceptable performance in terms of robustness and imperceptibility. In the embedding process, the cover image is decomposed into first level discrete wavelet transforms where the A (approximation/lower frequency sub-band) is transformed by DCT and SVD. The watermark image is also transformed by DWT, DCT and SVD. The S vector of watermark information is embedded in the S component of the cover image. The watermarked image is generated by inverse SVD on modified S vector and original U, V vectors followed by inverse DCT and inverse DWT. The watermark is extracted using an extraction algorithm. Furthermore, the text watermark is embedding at the second level of the D (diagonal sub-band) of the cover image. The security of the text watermark considered as EPR (Electronic Patient Record) data is enhanced by using encryption method before embedding into the cover. The results are obtained by varying the gain factor, size of the text watermark, and cover medical images. The method has been extensively tested and analyzed against known attacks and is found to be giving superior performance for robustness, capacity and reduced storage and bandwidth requirements compared to reported techniques suggested by other authors.

142 citations


Cites methods from "Multilevel Encrypted Text Watermark..."

  • ...EPR as text watermarks are broadly classified in the proposed method as follows [32]:...

    [...]

Journal ArticleDOI
TL;DR: The paper introduces elementary concepts of digital watermarking, characteristics and novel applications of watermark in detail, and various analysis and comparison of different notable water marking techniques are discussed in tabular format.
Abstract: Robustness, imperceptibility and embedding capacity are the preliminary requirements of any watermarking technique. However, research concluded that these requirements are difficult to achieve at same time. In this paper, we review various recent robust and imperceptible watermarking methods in spatial and transform domain. Further, the paper introduces elementary concepts of digital watermarking, characteristics and novel applications of watermark in detail. Furthermore, various analysis and comparison of different notable watermarking techniques are discussed in tabular format. We believe that our survey contribution will helpful for fledgling researchers to develop robust and imperceptible watermarking algorithms for various practical applications.

126 citations


Cites methods from "Multilevel Encrypted Text Watermark..."

  • ...Table 4 Analysis on Different Techniques Used for Image Watermarking Techniques Study IDs Discrete Cosine Transform (DCT) [79] [107] [105] [51] Singular Value Decomposition (SVD) [4] [65] [119] [105] [51] [69] [93] [114] [136] Discrete Wavelet Transform (DWT) [119] [102] [1] [105] [2] [51] [136] Discrete Contourlet Transform [73] Discrete Fourier Transform (DFT) [47] NSCT-RDWT-SVD-Chaotic [114] Lifting Wavelet Transform (LWT) [65] [69] Quantized Discrete Cosine Transforms [9] RDT Algorithm [60] Independent Component Analysis (ICA) [75] Reversed Watermarking [13] [37, 38] Watermarking Encoding and Decoding [47] [36] [43] [75] [85] [56] [20] [37] Additive watermarking [15] Vertice Scrambling [85] Patch Classification, Extended Gaussian Image [65] [56] QR Decomposition [65] [56] [69] Hybrid Techniques (DWT-SVD, DCT-SVD) (DWT-DCT-SVD) [99] [107] [134] [113] [137] Spread Spectrum [67] [8] [102] [74] Transportation Theory [67] QIM (Quantization Index Modulation) [7] [73] Z-notation [38] Adaptive logo texturization via ALT-MARK [3] Mexican Hat [11] Set Partitioning in Hierarchical Trees (SPIHT) [51] Decision Tree ID3 [79] [60] Genetic Algorithm [4] [118] [105] [37] Association Rules [94] [95] Vector Quantization [94] [95] Langrangian Support Vector Regression (LSVR) [65] [56] [69] Probabilistic Neural Network (PNN) [2] Back Propagation Neural Network (BPNN) [134] [105] Particle Swarm Optimization (PSO) [119] Support Vector Regression (SVR) [119] Graph theoretical clustering algorithm, Affine covariant regions, Indirect inverse normalization [29] Modulated Complex Lapped Transform (MCLT) [47] Native Bayes [60] Support Vector Machine [60] Image restoration algorithm [36] Digital watermarking, Threshold selection [77] Hologram techniques [19] Block Cipher Algorithm [7] Watermark embedding and extraction with Zigzag [58] Look -Up Table [8] Quadratic Programming (QP) [74] BCH Syndrome Code [62] Block based and hybrid pixel based digital watermarking [81] Watermarking procedure with Rhombus, histogram shift and Sorting Technique [88] Arnold Cat Map Encryption [107] Cuckoo search [1] Arnold Transform [134] [51] [93] Quaternion Hadamard transform and Schur Decomposition [59] Encryption [99] Noise Visibility Function [118] Multimedia Tools and Applications...

    [...]

  • ...A secure multilevel watermarking is provided through wavelet and spread spectrumin [102]....

    [...]

Journal ArticleDOI
TL;DR: A new multiple-image encryption (MIE) algorithm based on Deoxyribonucleic acid encoding and chaotic system is proposed in this paper and has excellent encryption effect and high security.
Abstract: Under the Internet platform, the digital images are widely applied in many fields at present. To protect the content of multiple images, a new multiple-image encryption (MIE) algorithm based on Deoxyribonucleic acid (DNA) encoding and chaotic system is proposed in this paper. Different from the traditional image encryption algorithms, the permutation and diffusion of the new algorithm is manipulated on the three-dimensional DNA matrix. Firstly, k plain images are combined into a big image which is then encoded with the DNA codes; secondly, the big image is scrambled by a chaotic sequence; thirdly, the big image is segmented into k images with the same size of the plain images, and they are diffused by a chaotic image encoded with the DNA codes; finally, k encrypted images are obtained after the DNA decoding. SHA-256 hash value of the plain images is employed to calculate the initial values and control parameters of the chaotic systems. Experimental results and algorithm analyses show that the new encryption algorithm has excellent encryption effect and high security.

85 citations

References
More filters
Journal ArticleDOI
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Abstract: This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression, filtering, digital-analog and analog-digital conversion, requantization, etc.), and common geometric transformations (such as cropping, scaling, translation, and rotation) provided that the original image is available and that it can be successfully registered against the transformed watermarked image. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems.

6,194 citations

Book
24 Oct 2001
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Abstract: Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.

2,849 citations

Journal ArticleDOI
TL;DR: The proposed ISS is as robust in practice as traditional SS, and achieves roughly the same noise robustness gain as quantization index modulation (QIM) but without the amplitude scale sensitivity of QIM.
Abstract: This paper introduces a new watermarking modulation technique, which we call improved spread spectrum (ISS). When compared with traditional spread spectrum (SS), the signal does not act as a noise source, leading to significant gains. In some examples, performance improvements over SS are 20 dB in signal-to-noise ratio (SNR) or ten or more orders of magnitude in the error probability. The proposed method achieves roughly the same noise robustness gain as quantization index modulation (QIM) but without the amplitude scale sensitivity of QIM. Our proposed ISS is as robust in practice as traditional SS.

499 citations

Journal ArticleDOI
TL;DR: The relationship between the tensile properties and chitosan concentration indicated that the ultimate tensile strength for the sponge increased with a higher concentration, and the in vitro bFGF release study showed that the higher the concentration of chitOSan solution became, the longer the releasing time of the bF GF from the ch itosan sponge was.
Abstract: Cells, growth factors, and scaffolds are the three main factors required to create a tissue-engineered construct. After the appearance of bovine spongiform encephalopathy (BSE), considerable attention has therefore been focused on nonbovine materials. In this study, we examined the properties of a chitosan porous scaffold. A porous chitosan sponge was prepared by the controlled freezing and lyophilization of different concentrations of chitosan solutions. The materials were examined by scanning electron microscopy, and the porosity, tensile strength, and basic fibroblast growth factor (bFGF) release profiles from chitosan sponge were examined in vitro. The morphology of the chitosan scaffolds presented a typical microporous structure, with the pore size ranging from 50 to 200 μm. The porosity of chitosan scaffolds with different concentrations was approximately 75–85%. A decreasing tendency for porosity was observed as the concentration of the chitosan increased. The relationship between the tensile properties and chitosan concentration indicated that the ultimate tensile strength for the sponge increased with a higher concentration. The in vitro bFGF release study showed that the higher the concentration of chitosan solution became, the longer the releasing time of the bFGF from the chitosan sponge was.

475 citations

Journal ArticleDOI
TL;DR: SIB and marginal osteophyte formation in vertebral bodies could coexist in a skeletal population of men by analyzing the degenerative changes in their whole vertebral column and comparing them with the controls.
Abstract: The aim of this study was to characterize the individuals with sacroiliac joint bridging (SIB) by analyzing the degenerative changes in their whole vertebral column and comparing them with the controls. A total of 291 modern Japanese male skeletons, with an average age at death of 60.8 years, were examined macroscopically. They were divided into two groups: individuals with SIB and those without bridging (Non-SIB). The degenerative changes in their whole vertebral column were evaluated, and marginal osteophyte scores (MOS) of the vertebral bodies and degenerative joint scores in zygapophyseal joints were calculated. SIB was recognized in 30 individuals from a total of 291 males (10.3%). The average of age at death in SIB group was significantly higher than that in Non-SIB group. The values of MOS in the thoracic spines, particularly in the anterior part of the vertebral bodies, were consecutively higher in SIB group than in Non-SIB group. Incidence of fused vertebral bodies intervertebral levels was obviously higher in SIB group than in Non-SIB group. SIB and marginal osteophyte formation in vertebral bodies could coexist in a skeletal population of men. Some systemic factors might act on these degenerative changes simultaneously both in sacroiliac joint and in vertebral column.

446 citations