scispace - formally typeset
Open AccessJournal ArticleDOI

Three Layer Authentications with a Spiral Block Mapping to Prove Authenticity in Medical Images

Reads0
Chats0
TLDR
A self-embedding watermark using a spiral block mapping for tamper detection and restoration of digital medical image has a potential to be manipulated by unauthorized persons due to advanced communication technology.
Abstract
—Digital medical image has a potential to be manipulated by unauthorized persons due to advanced communication technology. Verifying integrity and authenticity have become important issues on the medical image. This paper proposed a self-embedding watermark using a spiral block mapping for tamper detection and restoration. The block-based coding with the size of 3×3 was applied to perform self-embedding watermark with two authentication bits and seven recovery bits. The authentication bits are obtained from a set of condition between sub-block and block image, and the parity bits of each sub-block. The authentication bits and the recovery bits are embedded in the least significant bits using the proposed spiral block mapping. The recovery bits are embedded into different sub-blocks based on a spiral block mapping. The watermarked images were tested under various tampered images such as blurred image, unsharp-masking, copy-move, mosaic, noise, removal, and sharpening. The experimental results show that the scheme achieved a PSNR value of about 51.29 dB and a SSIM value of about 0.994 on the watermarked image. The scheme showed tamper localization with accuracy of 93.8%. In addition, the proposed scheme does not require external information to perform recovery bits. The proposed scheme was able to recover the tampered image with a PSNR value of 40.45 dB and a SSIM value of 0.994.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Sentiment Analysis of Covid-19 Vaccination using Support Vector Machine in Indonesia

TL;DR: This research aims to study the public response to the acceptance of the vaccination program using the Support Vector Machine (SVM), and the research result can be used to determine the direction of government policy.
Journal ArticleDOI

AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation

TL;DR: In this paper , an image watermarking technique for authentication and self-recovery called AuSR2 is presented. But, the authors only used two authentication bits and 16 recovery bits for each block.
Journal ArticleDOI

A Blind Robust Image Watermarking on Selected DCT Coefficients for Copyright Protection

TL;DR: A blind and robust image watermarking technique using Discrete Cosine Transform (DCT) for copyright protection on color images called BRIW-DCT, which can successfully recover the watermark image from the tampered image.
Journal ArticleDOI

Observation of Imbalance Tracer Study Data for Graduates Employability Prediction in Indonesia

TL;DR: In this article , the authors compared SMOTE, SMOTE-ENN, and SMOTETomek combined with SVM to detect the employability of graduates, with the highest accuracy and precision results produced by SMOTE SVM model by value of 0.96 and 0.89.
Proceedings ArticleDOI

Selection of Prospective Workers Using Profile Matching Algorithm on Crowdsourcing Platform

TL;DR: In this article , the authors tried to minimize the risks faced by requesters when using a crowdsourcing platform to complete their work, namely by increasing the match between the profile of workers and the jobs offered on the platform.
References
More filters
Journal ArticleDOI

Medical Video Coding Based on 2nd-Generation Wavelets: Performance Evaluation

TL;DR: Quality measurements indicate that in some cases the performance of the proposed coding competes with the well-established ones (H.264 or MPEG4 AVC and H.265or MPEG4 HEVC) and opens up new application prospects in the field of medical imaging.
Journal ArticleDOI

Digital Image Forgeries and Passive Image Authentication Techniques: A Survey

TL;DR: This survey attempts to provide an overview of various digital image forgeries and the state of art passive methods to authenticate digital images.
Journal ArticleDOI

An improved robust image watermarking by using different embedding strengths

TL;DR: The experimental results showed that the proposed scheme achieved a higher imperceptibility than the other existing schemes and produced a high watermark extracting resistance under various attacks.
Journal ArticleDOI

An Improved Image Watermarking by Modifying Selected DWT-DCT Coefficients

TL;DR: The adaptive scaling factor was generated based on the role of selected DWT-DCT coefficients against the average value of DWT, DCT coefficients of its image content to achieve embedded watermark resistance to several attacks in the watermarked image.
Journal ArticleDOI

Recent trends in image watermarking techniques for copyright protection: a survey

TL;DR: In this study, contemporary developments of digital image watermarking techniques are appraised so as to identify state-of-the-art practices and their limitations.
Related Papers (5)