IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A New Watermarking Approach Based on Combination of Reversible Watermarking a...CSCJournals
Image watermarking can be defined as a technique that allows insertion of imperceptible and indelible digital data into an image. In addition to its initial application which is the copyright, watermarking can be used in other fields, particularly in the medical field in order to contribute to secure images shared on the network for telemedicine applications. In this report we study some watermarking methods and the comparison result of their combination, the first one is based on the CDMA (Code Division Multiple Access) in DWT and spatial domain and its aim is to verify the image authenticity whereas the second one is the reversible watermarking (the least significant bits LSB and cryptography tools) and the reversible carte mapping RCM its objective is to check the integrity of the image and to keep the Confidentiality of the patient data. A new scheme of watermarking is the combination of the reversible watermarking method based on LSB and cryptography tools and the method of CDMA in spatial and DWT domain to verify the three security properties Integrity, Authenticity and confidentiality of medical data and patient information .In the end ,we made a comparison between these methods within the parameters of quality of medical images. Initially, an in-depth study on the characteristics of medical images would contribute to improve these methods to mitigate their limits and to optimize the results. Tests were done on IRM kind of medical images and the quality measurements have been done on the watermarked image to verify that this technique does not lead to a wrong diagnostic. The robustness of the watermarked images against attacks has been verified on the parameters of PSNR, SNR, MSE and MAE which the experimental result demonstrated that the proposed algorithm is good and robust in DWT than in spatial domain.
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
System to convert 2 d x-ray image into 3-d x-ray image in dentistryeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Embedding and Extraction Techniques for Medical Images-Issues and Challenges csandit
New technologies in multimedia and communication fields have introduced new ways to transfer and save the medical image data through open networks, which has introduced new risks of inappropriate use of medical information. Medical images are highly sensitive hence secured transmission and reception of data is needed with minimal distortion. Medical image security plays an important role in the field of Telemedicine. Telemedicine has numerous applications in teleconsulting, teleradiology, telediagnosis, telesurgery and remote medical
education. Our work is to analyze about the different embedding techniques that can be used for embedding the personal and diagnosed details of a person within the medical images
without any visual discrepancy. Also to survey about the blind extraction algorithm utilizing genetic algorithm for optimization of the key parameters.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
A New Watermarking Approach Based on Combination of Reversible Watermarking a...CSCJournals
Image watermarking can be defined as a technique that allows insertion of imperceptible and indelible digital data into an image. In addition to its initial application which is the copyright, watermarking can be used in other fields, particularly in the medical field in order to contribute to secure images shared on the network for telemedicine applications. In this report we study some watermarking methods and the comparison result of their combination, the first one is based on the CDMA (Code Division Multiple Access) in DWT and spatial domain and its aim is to verify the image authenticity whereas the second one is the reversible watermarking (the least significant bits LSB and cryptography tools) and the reversible carte mapping RCM its objective is to check the integrity of the image and to keep the Confidentiality of the patient data. A new scheme of watermarking is the combination of the reversible watermarking method based on LSB and cryptography tools and the method of CDMA in spatial and DWT domain to verify the three security properties Integrity, Authenticity and confidentiality of medical data and patient information .In the end ,we made a comparison between these methods within the parameters of quality of medical images. Initially, an in-depth study on the characteristics of medical images would contribute to improve these methods to mitigate their limits and to optimize the results. Tests were done on IRM kind of medical images and the quality measurements have been done on the watermarked image to verify that this technique does not lead to a wrong diagnostic. The robustness of the watermarked images against attacks has been verified on the parameters of PSNR, SNR, MSE and MAE which the experimental result demonstrated that the proposed algorithm is good and robust in DWT than in spatial domain.
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
System to convert 2 d x-ray image into 3-d x-ray image in dentistryeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Embedding and Extraction Techniques for Medical Images-Issues and Challenges csandit
New technologies in multimedia and communication fields have introduced new ways to transfer and save the medical image data through open networks, which has introduced new risks of inappropriate use of medical information. Medical images are highly sensitive hence secured transmission and reception of data is needed with minimal distortion. Medical image security plays an important role in the field of Telemedicine. Telemedicine has numerous applications in teleconsulting, teleradiology, telediagnosis, telesurgery and remote medical
education. Our work is to analyze about the different embedding techniques that can be used for embedding the personal and diagnosed details of a person within the medical images
without any visual discrepancy. Also to survey about the blind extraction algorithm utilizing genetic algorithm for optimization of the key parameters.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Eye sight determination on tablet based hand held device with image processin...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Abstract: A number of research papers has been produced about reversible watermarking. Reversible
watermarking is one of the important scheme of the watermarking schemes. Some security measures must be
there to protect the records from unauthorized user and destruction of information. Basic idea of digital
watermarking is to embed the data into the cover media to provide the security to data. The watermarking
techniques satisfying these requirements called as Reversible watermarking. Ownership of the original media
remains same but the best thing is original media is recovered from the watermarked media. This is the best and
main feature of reversible watermarking to extract the original image as it is without any distortion. This
feature is applicable in various areas such as medical as well as military images. If there is effect on the cover
then it would changes the meaning of this data. The aim of this paper is to represent the purpose of reversible
watermarking, some of the techniques related to reversible watermarking.
Keywords: Reversible watermarking, Security, copyright protection
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
Abstract
These days, in every field there is gigantic utilization of computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
Iris recognition is a method of biometric identification.
Biometric identification provides automatic recognition of an
individual based on the unique feature of physiological
characteristics or behavioral characteristic. Iris recognition is a
method of recognizing a person by analyzing the iris pattern.
This survey paper covers the different iris recognition techniques
and methods.
Abstract
Digital images can be changed easily nowadays through the use of sophisticated software to edit images such as (Adobe Photoshop®). You can look at some manipulated pictures along the lines of the original images without any suspicion that they are also modified. Accordingly, the use of such software to edit the image makes ratification a difficult task and the use of this image in the courts for proving may become impossible.In this paper, a new method has been proposed for water fragile signs depending on the method of Pixel-wise. The proposed method is based on the included secret watermark and check bits in the green layer to the image of the colorful cover with the size of 512x512. The process of including watermark deals with the green class as a chess board with 512 x 512 sizes to avoid the inclusion of sequential bits in the spatial areas of the image of the cover. The process of extracting and discriminating the manipulation of watermark is used to determine whether the manipulation of the image containing watermark was done by an opponent or not. Therefore, the use of the extracted watermark and matrix manipulation to check the image containing watermark sent. Depending on the experimental results, the proposed method provides high quality, low distortion in the images contained watermark PSNR depending on their values. Also, the ability to recognize manipulation in the picture containing watermark in cases such as adding objects to the image containing the watermark, and the application of JPEG compression on image containing watermark, and removing objects from the image containing watermark, repeating the object image containing watermark, and adding a text on image including watermark.
Keywords: Check-bits, Fragile watermarking, PSNR, Secret watermark, Watermarked-image.
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
The paradigm of embedding computing devices in our
surrounding environment has gained more interest
in recent days. Along with contemporary technology
comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of
compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed
for identification should be robust and dynamic. In
this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and retinal scanning algorithms have been discussed whi
ch promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the
security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed
systems, make it a good candidate to replace most of thesecurity systems around. By making use of the
distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person.
Identification of this person is possible by applying appropriate matching algorithm.In this paper,
Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical
analysis of different feature detection operators is performed, features extracted is encoded using Haar
wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on
the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of
the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and
False Reject Rate is 10%.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Droege Pupil Center Detection In Low Resolution ImagesKalle
In some situations, high quality eye tracking systems are not affordable. This generates the demand for inexpensive systems built upon non-specialized, off the shelf devices. Investigations show that algorithms developed for high resolution systems do not perform satisfactorily on such lowcost and low resolution systems. We investigate
algorithms specifically tailored to such low resolution input devices, based on combination of different strategies. An approach called gradient direction consensus is introduced and compared to image based correlation with adaptive templates as well as other known methods. The results are compared using synthetic input data with known ground truth.
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesIDES Editor
Face recognition is still an open problem. Many 2D
face recognition approaches came into light to achieve high
recognition rate. But these approaches are still challenged by
the changes in illuminations, expressions, pose, noise, etc. A
3D face recognition technique is proposed to overcome such
challenges and to enhance robustness to expression variations.
Here, we compare the person at different age groups with
higher recognition rate in comparison to 2D face recognition
techniques. We propose a two stage procedure of 3D face
recognition based on FLD (Fisher Linear Discriminant), SURF
operator and depth-image. First, FLD is used on depth-image
to perform recognition and then the SURF features of 2D
gray images to carry out the refined recognition. Finally, our
proposed work will increase the robustness in expression
variations.
This paper proposes an encryption-based image watermarking scheme for medical images using a
customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of
Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra
security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the
watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding,
an R-level discrete wavelet transform was applied to the host image.
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...IJERA Editor
Text fusion in images is an important technology for image processing. We have lots of important information related to the patient’s reports and need lots of space to store and the proper position and name which relates that image with that data. In our work we are going to find out the ROI (region of interest) for the particular image and will fuse the related document in the NROI (non-region of interest) of the image, till yet we have many techniques to fuse text data in the medical images one of form them is to fuse data at the boarders of the images and build the particular and pre-defined boarder space. We have propose an algorithm in which we first find out the area of interest and after that we find noisy pixels of the image to embed data in that noisy portions of the image. We use wavelets for smoothing images and segmentation process for extracting region of interest. Coordinates of the noisy pixels have been located and data has been embedded in those pixels .The used embedding technique embed data in least significant bits, hence does not degrade the quality of the image to unacceptable limits. Results show that it gives good PSNR and MSE values which are used for measuring quality effected performance.
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...sipij
Medical image security provides challenges and opportunities, watermarking and encryption of medical
images provides the necessary control over the flow of medical information. In this paper a dual security approach is employed .A medical image is considered as watermark and is watermarked inside a natural image. This approach is to wean way the potential attacker by disguising the medical image as a natural image. To further enhance the security the watermarked image is encrypted using encryption algorithms. In this paper a multi–objective optimization approach optimized using different metaheuristic approaches like Genetic Algorithm (GA), Differential Evolution ( DE) and Bacterial Foraging Optimization (BFOA) is proposed. Such optimization helps in preserving the structural integrity of the medical images, which is of utmost importance. The water marking is proposed to be implemented using both Lifted Wavelet
Transforms (LWT) and Singular Value Decomposition (SVD) technique. The encryption is done using RSA
and AES encryption algorithms. A Graphical User Interface (GUI) which enables the user to have ease of
operation in loading the image, watermark it, encrypt it and also retrieve the original image whenever necessary is also designed and presented in this paper.
Eye sight determination on tablet based hand held device with image processin...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Abstract: A number of research papers has been produced about reversible watermarking. Reversible
watermarking is one of the important scheme of the watermarking schemes. Some security measures must be
there to protect the records from unauthorized user and destruction of information. Basic idea of digital
watermarking is to embed the data into the cover media to provide the security to data. The watermarking
techniques satisfying these requirements called as Reversible watermarking. Ownership of the original media
remains same but the best thing is original media is recovered from the watermarked media. This is the best and
main feature of reversible watermarking to extract the original image as it is without any distortion. This
feature is applicable in various areas such as medical as well as military images. If there is effect on the cover
then it would changes the meaning of this data. The aim of this paper is to represent the purpose of reversible
watermarking, some of the techniques related to reversible watermarking.
Keywords: Reversible watermarking, Security, copyright protection
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
Abstract
These days, in every field there is gigantic utilization of computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
Iris recognition is a method of biometric identification.
Biometric identification provides automatic recognition of an
individual based on the unique feature of physiological
characteristics or behavioral characteristic. Iris recognition is a
method of recognizing a person by analyzing the iris pattern.
This survey paper covers the different iris recognition techniques
and methods.
Abstract
Digital images can be changed easily nowadays through the use of sophisticated software to edit images such as (Adobe Photoshop®). You can look at some manipulated pictures along the lines of the original images without any suspicion that they are also modified. Accordingly, the use of such software to edit the image makes ratification a difficult task and the use of this image in the courts for proving may become impossible.In this paper, a new method has been proposed for water fragile signs depending on the method of Pixel-wise. The proposed method is based on the included secret watermark and check bits in the green layer to the image of the colorful cover with the size of 512x512. The process of including watermark deals with the green class as a chess board with 512 x 512 sizes to avoid the inclusion of sequential bits in the spatial areas of the image of the cover. The process of extracting and discriminating the manipulation of watermark is used to determine whether the manipulation of the image containing watermark was done by an opponent or not. Therefore, the use of the extracted watermark and matrix manipulation to check the image containing watermark sent. Depending on the experimental results, the proposed method provides high quality, low distortion in the images contained watermark PSNR depending on their values. Also, the ability to recognize manipulation in the picture containing watermark in cases such as adding objects to the image containing the watermark, and the application of JPEG compression on image containing watermark, and removing objects from the image containing watermark, repeating the object image containing watermark, and adding a text on image including watermark.
Keywords: Check-bits, Fragile watermarking, PSNR, Secret watermark, Watermarked-image.
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
The paradigm of embedding computing devices in our
surrounding environment has gained more interest
in recent days. Along with contemporary technology
comes challenges, the most important being the
security and privacy aspect. Keeping the aspect of
compactness and memory constraints of pervasive
devices in mind, the biometric techniques proposed
for identification should be robust and dynamic. In
this
work, we propose an emerging scheme that is based on few exclusive human traits and characteristics termed as ocular biometrics, promising utmost security and reliability. Complex iris recognition and retinal scanning algorithms have been discussed whi
ch promises achievement of accurate results. The
performance and vast applications of these algorithms on pervasive computing devices is also addressed.
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the
security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed
systems, make it a good candidate to replace most of thesecurity systems around. By making use of the
distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person.
Identification of this person is possible by applying appropriate matching algorithm.In this paper,
Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical
analysis of different feature detection operators is performed, features extracted is encoded using Haar
wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on
the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of
the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and
False Reject Rate is 10%.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Droege Pupil Center Detection In Low Resolution ImagesKalle
In some situations, high quality eye tracking systems are not affordable. This generates the demand for inexpensive systems built upon non-specialized, off the shelf devices. Investigations show that algorithms developed for high resolution systems do not perform satisfactorily on such lowcost and low resolution systems. We investigate
algorithms specifically tailored to such low resolution input devices, based on combination of different strategies. An approach called gradient direction consensus is introduced and compared to image based correlation with adaptive templates as well as other known methods. The results are compared using synthetic input data with known ground truth.
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesIDES Editor
Face recognition is still an open problem. Many 2D
face recognition approaches came into light to achieve high
recognition rate. But these approaches are still challenged by
the changes in illuminations, expressions, pose, noise, etc. A
3D face recognition technique is proposed to overcome such
challenges and to enhance robustness to expression variations.
Here, we compare the person at different age groups with
higher recognition rate in comparison to 2D face recognition
techniques. We propose a two stage procedure of 3D face
recognition based on FLD (Fisher Linear Discriminant), SURF
operator and depth-image. First, FLD is used on depth-image
to perform recognition and then the SURF features of 2D
gray images to carry out the refined recognition. Finally, our
proposed work will increase the robustness in expression
variations.
This paper proposes an encryption-based image watermarking scheme for medical images using a
customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of
Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra
security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the
watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding,
an R-level discrete wavelet transform was applied to the host image.
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...IJERA Editor
Text fusion in images is an important technology for image processing. We have lots of important information related to the patient’s reports and need lots of space to store and the proper position and name which relates that image with that data. In our work we are going to find out the ROI (region of interest) for the particular image and will fuse the related document in the NROI (non-region of interest) of the image, till yet we have many techniques to fuse text data in the medical images one of form them is to fuse data at the boarders of the images and build the particular and pre-defined boarder space. We have propose an algorithm in which we first find out the area of interest and after that we find noisy pixels of the image to embed data in that noisy portions of the image. We use wavelets for smoothing images and segmentation process for extracting region of interest. Coordinates of the noisy pixels have been located and data has been embedded in those pixels .The used embedding technique embed data in least significant bits, hence does not degrade the quality of the image to unacceptable limits. Results show that it gives good PSNR and MSE values which are used for measuring quality effected performance.
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...sipij
Medical image security provides challenges and opportunities, watermarking and encryption of medical
images provides the necessary control over the flow of medical information. In this paper a dual security approach is employed .A medical image is considered as watermark and is watermarked inside a natural image. This approach is to wean way the potential attacker by disguising the medical image as a natural image. To further enhance the security the watermarked image is encrypted using encryption algorithms. In this paper a multi–objective optimization approach optimized using different metaheuristic approaches like Genetic Algorithm (GA), Differential Evolution ( DE) and Bacterial Foraging Optimization (BFOA) is proposed. Such optimization helps in preserving the structural integrity of the medical images, which is of utmost importance. The water marking is proposed to be implemented using both Lifted Wavelet
Transforms (LWT) and Singular Value Decomposition (SVD) technique. The encryption is done using RSA
and AES encryption algorithms. A Graphical User Interface (GUI) which enables the user to have ease of
operation in loading the image, watermark it, encrypt it and also retrieve the original image whenever necessary is also designed and presented in this paper.
A Survey on Features Combination for Image WatermarkingEditor IJMTER
As the internet users are increasing day by day it is easy to transfer digital data. By this new
problem of data piracy is increasing. For this different methods of watermarking are developed for
protecting the digital data like video, audio, image, etc. Out of these many researcher are working on
image watermarking field from last few decades. This paper focus on the image watermarking features
combination with various techniques which are broadly categorized into spatial and frequency domain.
Many features are studied with their different requirement and functionality. It has been observed that
most of the researcher combines many features for achieving the prior goal of the watermark that is to
embed watermark and extract from the carrier image in presence of different attack.
Design issues and challenges of reliable and secure transmission of medical i...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
Digital Watermarking is the process of embedding data called watermark or signature or label or tag into a multimedia object (image or audio or video) so that the watermark can be extracted for ownership verification or authentication. A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modification made to the pixel value is perceptually not noticed and it can be recovered only with an appropriate decoding mechanism. Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A review-on-digital-image-watermarking-techniquesEditor IJMTER
Due to the rapid expansion in internet technology copyright protection and data
authenticity are two major problems in handling digital multimedia. Watermarking is a very
important field for copyrights of various electronic documents and media. A variety of
techniques have been proposed for copyright protection of digital images which include
spatial domain and transform domain watermarking. This paper aims to provide some basic
concepts of digital image watermarking techniques and comparisons between them.
A Quick Glance over the Digital Watermarkingijsrd.com
Digital watermarking is a process for modifying physical or electronic media to embed a machine-readable code into the media. The media may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. Watermarking is the art of imperceptibly embedding a message into a work. More than 700 years ago in Fabriano (Italy), paper watermarks appeared in handmade paper, in order to identify its provenance, format, and quality. In this context, the watermark is a kind of invisible signature that allows identifying the creator or the owner of a document, and to detect possible copyright violations, and especially non-authorized copying [1]. More recently, different watermarking techniques and strategies have been proposed in order to solve a number of problems, ranging from the detection of content manipulations, to information hiding (steganography), to document usage tracing. In particular, the insertion of multiple watermarks to trace a document during its lifecycle is a very interesting and challenging application [1]. The main property of the proposed method is that it allows the insertion of multiple watermarks by different users, who sequentially come into play one after the other and do not need any extra information besides the public keys. This characteristic makes the present approach more attractive than previously available solutions.
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
This paper aims at developing a hybrid image watermarking algorithm which satisfies both
imperceptibility and robustness requirements. In order to achieve our objectives we have used
singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark.
Further to increase and control the strength of the watermark, we use a scale factor. An optimal
watermark embedding method is developed to achieve minimum watermarking distortion. A
secret embedding key is designed to securely embed the fragile watermarks so that the new
method is robust to counterfeiting, even when the malicious attackers are fully aware of the
watermark embedding algorithm. Experimental results are provided in terms of Peak signal to
noise ratio (PSNR), Normalized cross correlation (NCC) and gain factor to demonstrate the
effectiveness of the proposed algorithm. Image operations such as JPEG compression from
malicious image attacks and, thus, can be used for semi-fragile watermarking
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Et31962968
1. Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.962-968
Development Of A New Watermarking Algorithm For
Telemedicine Applications
Remya Elizabeth Philip1, Sumithra M.G.2,
PG Student1, Professor of ECE Department2
Bannari Amman Institute of Technology.
Abstract-
Watermarking algorithms are used for (RONI) watermarking which embeds the watermark
embedding watermark like patient’s history and information in RONI and keeping the region of
doctor’s signature in binary image format into interest (ROI) distortion free, and (2) by selecting
host’s medical image for telemedicine reversible watermarking method which recover the
applications. In this work the watermarking of original cover image by undoing the watermark
medical image is done in DCT and DWT domains embedding process at the receiving end after the
and the performance is evaluated based on PSNR image verification process is completed [3], [12].
and MSE. From the obtained results it is observed
that the watermarking in wavelet domain using Watermark attacks extracted watermark
Haar wavelet yields better result than in DCT
domain. Embedder Extractor
Channel
Host image Original image
Keywords: Watermark, DWT, DCT, PSNR, MSE
Fig. 1 A generic watermarking system model
I.INTRODUCTION
The Institution of Medicine defines In this generic watermarking model shown
telemedicine as the use of electronic information in Fig.1, there is a watermark embedder which
technologies to provide and support health care when embeds the information that is to be hidden (the
distance separates the participants. The most common watermark) in the original image (cover image) and
application today is in the transmission of high the watermarked image is sent through the channel
resolution X-rays, cardiology, orthopedics, where there is a large probability of attacks such as
dermatology and psychiatry. Telemedicine arose removal attack, geometric attacks, cryptographic
originally to serve rural populations or any people attacks, protocol attacks. At the receiver side there is
who are geographically isolated, where time and cost an extractor which extracts the watermark from the
of travel make access to the best medical care stego image.
difficult. Now it is increasingly being used in Digital image watermark techniques can
mainstream medicine, to allow doctors the world also be classified based on the type of information
over to share expensive recourses and valuable needed in the extraction process. Using this
experience. Hence, healthcare industry demands classification criterion, it can be classified into two
secure, robust and more information hiding categories; non-blind and blind watermarking. A non-
techniques promising strict secured authentication blind watermarking system requires the host image
and communication through internet or mobile and the watermarked image in order to detect and
phones. extract the watermark data, but on the other hand, a
Medical image watermarking requires extreme blind watermarking system requires nothing other
care when embedding additional data within the than the watermarked image itself to complete the
medical images because the additional information process. In dealing with watermarking of medical
must not affect the image quality as this may cause a images, some important constraints need to be
misdiagnosis [7]. This kind of a system requires a satisfied. When watermark is embedded in the host
high level of security, which can be ensured by using image, it generates distortion. This distortion is
digital watermarking techniques. This imposes three highly undesirable in medical applications, whereby,
mandatory characteristics: robustness, capacity and even a small distortion in the images such as MRI
imperceptibility. There are different methods that has and X-ray images might affect the decision of a
been using for medical image watermarking. The physician. For this reason, it is necessary not only to
watermark can directly be embedded in the LSB as extract the watermark but also to restore the original
described by Mohamed Ali et al [14], [7]. In some image completely. Reversible watermarking fulfills
applications it is often not allowed to alter the image this requirement. It can restore the exact state of the
contents even one bit of information. The original image. Whereas non reversible watermarking
requirement of imperceptibility can be satisfied by algorithms do not provide the exact reconstruction of
two methods (1) by selecting region of non interest the image
962 | P a g e
2. Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.962-968
III. METHODOLOGY
II. PROPERTIES OF MEDICAL IMAGE The various steps for embedding and
WATERMARKING extracting the watermark in DCT and DWT domain
Security of medical information, derived are given below
from strict ethics and governmental rules, gives rights
to the patient and duties to the health professionals. Steps for applying watermark
This imposes three compulsory characteristics: 1. Read the CT image(cover image)
robustness, imperceptibility, capacity. Robustness is 2. Read the signature (watermark)
defined as the ability of watermark to resist against 3. Fix the alpha value to 1 (alpha=1)
both lawful and illicit attacks. One of the stringent 4. Multiply the alpha value with the sign
requirements of the image watermarking is the 5. Take the transform for the
imperceptibility. Imperceptibility means that image(DCT/DWT)
watermark embedded in the image must be invisible 6. Add the watermark into the cover image
to the human eye. In watermarking of medical 7. Take the inverse transform to get the
images, all the information necessary for physician watermarked image
such as identification of patient, diagnosis report, 8. Calculate the MSE and PSNR between the
origin identification (who created the image) are original and watermarked image
embedded. This information is further increased 9. Increment the alpha value and repeat the
when the image is sent to other physician for second steps from 4 to 8
opinion. Therefore, capacity for embedding the Steps for extraction process
payload must be high. 1. Read the stego image (watermarked image)
Based on the domain in which the 2. Take the transform for the
watermark can be embedded, the watermarking image(DCT/DWT)
techniques are classified into 2 categories: spatial 3. Read the signature
domain techniques and transform domain techniques. 4. Divide the signature by the alpha value
The most clear cut way to hide the watermark within 5. Subtract the signature from the watermarked
the cover content is to directly embed it in the spatial image
domain. There is number of advantages for using 6. Take the inverse transform
spatial domain watermarking. One advantage is 7. Reconstructed image is obtained
temporal or spatial localization of the embedded data 8. Calculate the PSNR and MSE of the original
can automatically be achieved if the watermarked and recovered image and the original and
content undergoes some attacks and distortions are retrieved watermark
introduced in the watermarked content. Another
advantage of spatial domain watermarking is that, an IV. PERFORMANCE EVALUATION
exact control on the maximum difference between the PARAMETERS
original and watermarked content is possible which For evaluation of the watermarking
allows the design of near-lossless watermarking algorithm, many criteria‟s are used. The most
systems, as required by certain applications such as important among them are the quality of the image
protection of sensing or medical images. The oldest and the robustness of the watermarking scheme
and the most common used method in this category is against various attacks.
the insertion of watermark in the least significant bit Signal to noise ratio and peak signal to
of the pixel data [1], [14]. Since the modification of noise ratio
the pixel data takes place in the LSB it is not visually Among the most important distorting measures
perceptible. To obtain better imperceptibility as well in image processing is the Signal to Noise Ratio
as robustness, watermarking is done in frequency (SNR) and the Peak Signal to Noise Ratio
domain. The frequency domain watermarking (PSNR).The SNR and the PSNR are respectively
techniques are also called multiplicative defined by the following formulas:
watermarking techniques. Discrete Fourier Transform I 2 𝑖,𝑗
(DFT), Discrete Cosine Transform (DCT) [14], 𝑆𝑁𝑅 = 10 log10 𝑖,𝑗 2 (1)
𝑖,𝑗 𝐼 𝑖,𝑗 −𝐾 𝑖,𝑗
Discrete Wavelet Transform (DWT) [5] is the most 𝑀𝐴𝑋
popular transforms operating in the frequency 𝑃𝑆𝑁𝑅 = 20𝑙𝑜𝑔10 2
𝑀𝑆𝐸
domain etc then the transform domain coefficients MAX is the maximum pixel value in the image
are modified by the watermark, [1], [10]. The inverse where MSE is given by,
transform is finally applied in order to obtain the
watermarked image. Due to complicated calculations 1 m−1 n−1 2
MSE = mn i=0 j=0 I i, j − K i, j ( 3)
of forward and inverse transform the spatial domain
techniques are less prone to attacks.
where I (i, j) and K (i, j) are original and
watermarked image respectively.
963 | P a g e
3. Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.962-968
Table 1 PSNR comparison of original and
V.EXPERIMENTAL RESULTS watermarked image in different domains
A medical image (CT scan) 512×512 is Alpha Domains
taken as the test image; doctor‟s signature 60×100 DCT DCT DWT
and patient details 140×230 is taken as the (8bit) (16bit)
watermark. Various experiments are conducted to
1 80.15 81.161 250
develop an efficient watermarking algorithm. The
first experiment is conducted to select the domain of 2 67.728 67.759 121.283
watermarking. The watermark is first applied in the 3 60.157 60.102 117.234
DCT and DWT domain and the performance is 4 56.726 56.692 109.710
evaluated based on PSNR and MSE. It is found that 5 54.031 54.047 107.802
DWT performs better than DCT, so the next step
aims to find out which wavelet transform that can be Table 2 PSNR comparison of original and retrieved
used for the embedding purpose and also to find out signature in different domains
the level of decomposition, for that three sets of Domains
mother wavelets are considered „Haar‟, „db2‟ and Alpha
„db4‟. The result shows that Haar gives better DCT(8bit) DCT(16bit) DWT(8bit)
performance compared to the others. Fig.2 represents 1 19.685 250 250
the test image of size 512×512 and the watermarks. 2 39.120 250 250
Watermark 1 of size 60×100 is the doctor‟s signature,
3 57.550 250 250
and watermark 2 of size 140×230 is the patient detail.
Watermark1 is used up to the selection of wavelet 4 11.389 47.676 250
and for further analysis watermark 2 is used, these 5 7.870 38.252 250
are embedded in the binary image format.
As the alpha value increases the PSNR value
is getting reduced i.e. the quality of the image is
getting reduced. In the case of DWT it is seen that the
PSNR value is not that much reduced when the alpha
increases. Table 2 shows the PSNR value of the
retrieved signature. The performance of DCT (8bit) is
(a) (b) poor when compared to DCT (16bit) and DWT. The
original signature can be retrieved for all alpha values
changing from 1 to 5 in the case of DWT where the
PSNR is a high value of about 250 which does not
shows any significant difference from the original
image. In the case of DCT (16bit) signature can be
retrieved without error only when the alpha values
are 1, 2, and 3. For values alpha= 4 and alpha = 5 the
image quality is reduced.
(c)
Fig .2 (a) Test image (b) watermark 1(c) watermark 2
The results after applying the watermark in
DCT for different pixel resolutions are found out.
The PSNR values of DCT (8bit), DCT (16 bit) and
DWT (first level decomposition) are given in table 1,
(a) (b)
table 2, and table 3.Table 1 shows the PSNR
comparison of original and the watermarked image.
From the table it is seen that the performance of
DCT (16 bit) is better than DCT (8bit) and DWT
outperforms both DCT (8bit) and DCT (16bit) for
different alpha values, where alpha is the depth or
weighing factor for the watermark.
(c) (d)
Fig.3 Retrieved signatures after the removal of
watermark from DCT (8bit) domain for different
values of alpha (a) alpha=1(b) alpha=2 (c) alpha=3
(d) alpha =4
964 | P a g e
4. Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.962-968
Fig.3, fig.4 and fig. 5 show the retrieved fig.8 shows the MSE of DCT (8bit), DCT (16bit) and
watermark from DCT (8bit), DCT (16bit) and DWT DWT.
respectively for different values of alpha. It is clear
Table 3 PSNR comparison of original and retrieved
from the images that the watermark can be retrieved
image in different domains
perfectly in DWT domain than in DCT domain.
Alpha Domains
DCT(8bit) DCT(16bit) DWT
1 146.329 250 250
(a) (b) 2 130.793 137.193 130.074
3 121.683 125.624 127.968
(a) (b)
4 85.571 85.625 115.971
5 59.684 59.680 115.003
DCT (8 bit) DCT (16 bit) DWT
300
250
(c) (d)
Fig.4 Retrieved signatures after the removal of MSE 200
watermark from DCT (16bit) domain for different 150
values of alpha (a) alpha=1(b) alpha=2 (c) alpha=3 100
(d) alpha =4.
50
0
1 2 3 4 5
Alpha
Fig.6 MSE comparison of original and watermarked
(a) (b)
image for different domains
DCT (8bit) DCT (16 bit) DWT
0.5
(c) (d) 0.4
Fig.5 Retrieved signatures after the removal of
0.3
MSE
watermark from DWT domain for different values of
alpha (a) alpha=1(b) alpha=2 (c) alpha=3 (d) alpha = 0.2
4
0.1
For DCT (8bit) it is inferred from the fig.3
that, when the alpha = 3 the watermark can be 0
retrieved with PSNR value 57.55. In the case of DCT 1 2 3 4 5
(16 bit) shown in fig.4, it is seen that for alpha values Alpha
1, 2 and 3 the watermark is reconstructed with PSNR Fig.7 MSE comparisons of original signature and
values 250, that is the original watermark is perfectly retrieved signature for different domains
reconstructed. From fig.5 it is seen that the
watermark can be retrieved perfectly for all values of
alpha i.e.in this case the watermark is embedded in
the DWT domain. Table 3 shows the PSNR variation
of the original and reconstructed image. From the
table it is clear that the image quality is high for
DWT when compared to DCT. MSE is calculated for
watermarking in different domains, it is found that
the mean square error will be less for DWT as
compared to DCT (8bit), DCT (16bit) i.e. the fig.6 to
965 | P a g e
5. Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.962-968
DCT (8 bit) DCT (16 bit) DWT
180
Haar db2 db4
160 8
140
6
120
MSE
MSE
100 4
80
2
60
40 0
20 5 8 15
Alpha
0
Fig .9 MSE comparison of original and watermarked
1 2 3 4 5
image for different wavelets
Alpha
Fig .11 to fig.13 shows the retrieved
watermark for different wavelets, it is clear from the
Fig.8 MSE comparison of original and retrieved figure that the good quality watermark is obtained in
image for different domains the case of Haar wavelet, for db2 and db4 the image
is degraded. For all the alpha values Haar wavelet is
From the above results it is clear that DWT giving a good performance i.e. in all the cases the
performs much better than DCT (8bit) and DCT (16 original watermark can be retrieved properly with a
bit). So DWT is taken as the domain for very good PSNR value. In the selection of wavelet
watermarking for further experiments. only first level decomposition is considered and the
As a second step, the type of wavelet that is watermark is embedded in the low frequency
to be used has to be determined, for that three types component.
of wavelets are considered Haar, db2, db4. Out of
this Haar is found to give better performance than the
others while retrieving the original image and also Haar db2 db4
while retrieving the watermark. Table 4 and table 5 25
show the PSNR comparison of original vs.
watermarked image and original vs. retrieved image. 20
It is clear from the table that the quality of the
retrieved image will be high in the case of Haar 15
MSE
wavelet than that of db4 and db2. Fig.9 and fig.10
shows the MSE variation for the different wavelet 10
used. The MSE is high in the case of db2 when
compared to db 4 and haar wavelet. Haar wavelet is 5
having the least MSE.
0
Table 4 PSNR comparison of original and
5 8 15
watermarked image for different wavelets
Alpha
Wavelets
Alpha Haar db2 db4
Fig.10 MSE comparison of original and retrieved
5 107.802 99.625 101.484 image for different wavelet
8 96.238 90.115 91.838
15 84.591 78.85 79.45
Table 5 PSNR comparison of original and retrieved
image for different wavelets
Wavelets
(a) (b)
Alpha
Haar db2 db4
5 114.996 111.113 114.579
8 105.074 103.211 104.159
15 93.559 90.033 91.475
(c)
966 | P a g e
6. Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.962-968
Fig. 11 Retrieved signature with alpha = 5 for DWT level1 DWT level2
different wavelets (a) Haar (b) db2 (c) db4
400
300
200
MSE
100
(a) (b) 0
5 8 Alpha 15
Fig.14 MSE comparison of original and watermarked
image for different decomposition levels
(c) Alpha DWT DWT DWT
Fig. 12 Retrieved signature with alpha = 8 for level1 level2 level3
different wavelets (a) Haar (b) db2 (c) db4 5 78.3340 74.435 73.191
8 69.389 65.485 64.439
15 57.336 54.221 53.341
Table 6 PSNR comparison of original and
watermarked image for different decomposition
(a) (b) levels
DWT level1 DWT level2 DWT level3
50
40
(c) 30
MSE
Fig. 13 Retrieved signature with alpha = 15 for 20
different wavelets (a) Haar (b) db2 (c) db4 10
0
After selecting the wavelet, the 5 8 15
Alpha
watermarking is done for different decomposition
levels of DWT, here the watermark used is the
patient details as shown in fig .2 and it are found that Fig.15 MSE comparison of original and retrieved
level 3 decomposition gives better results when image for different decomposition levels
compared other levels. In the case of all other levels
the retrieved watermark quality is degraded. Table 7 PSNR comparison of original and retrieved
The watermark is retrieved perfectly when image for different decomposition levels
the alpha have some moderate values that is around
15. The comparison results of PSNR and MSE for Alpha DWT DWT DWT
alpha values 5, 8, 15 are shown in table 6 and 7 and level1 level2 level3
fig 14 and fig.15 respectively. From all these results 5 85.9218 87.603 96.773
we can conclude that DWT using haar wavelet with a 8 76.731 77.239 87.687
third level decomposition yields better result than 15 63.633 64.458 78.967
DCT domain.
VI.CONCLUSION
The various features of watermarking
algorithms are discussed in this paper. The
performance evaluation of embedding the watermark
in DCT and DWT domains is analyzed taking PSNR
and MSE as the evaluation parameters. It is found
that DWT using haar wavelet performs quite better
than DCT. Secondly the watermark embedding in
different decomposition levels is analyzed and found
967 | P a g e
7. Remya Elizabeth Philip, Sumithra M.G. / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.962-968
out that the third level decomposition gives better Sciences, Elsevier, Vol. 175, No. 3, pp. 200-
results, i.e. about 24% reduction in MSE is obtained 216, 2005.
for third level DWT as compared to first level and a [11] V. Fotopoulos, M. L. Stavrinou, A. N. Skodras,
decrease of 23% is obtained for third level compared "Medical Image Authentication and Self-
to second level decomposition. While increasing the Correction through an Adaptive Reversible
level of decomposition further the retrieved image Watermarking Technique", Proceedings of 8th
gets distorted. The future work has to be extended by IEEE International Conference on Bio-
evaluating the robustness of the watermarking Informatics and Bio-Engineering (BIBE-2008),
algorithm against different types of attacks such as pp. 1-5, October 2008.
geometric attacks, compression attacks and modify [12] H.-K. Lee, H.-J. Kim, K.-R. Kwon, J. K.
further. Lee,"ROI Medical Image Watermarking Using
DWT and Bit plane", Asia Pacific Conference
REFERENCES on Communications, Perth, Western Australia,
3-5, October 2005.
[1] I Cox , M Miller , J.Bloom ,J. Fridrich , [13] J. M. Zain, L.P Baldwin, M. Clarke “Reversible
T.Kalker,“Digital Watermarking and watermarking for authentication of DICOM
Steganography”, 2nd Ed. ISBN: 978- images” Proc. of the 26th Annual International
0123725851 Conference of the IEEE EMBS San Francisco,
[2] Y. Lim, C. Xu, D. D. Feng, "Web-based CA, USA, September 1-5, 2004
Image Authentication using Invisible Fragile [14] Mohamed Ali Hajjaji, Abdellatif, El-bey,”A
Watermark", Proceedings of the Pan-Syndney watermarking of Medical Image: Method Based
area workshop on Visual Information LSB”, Journal of Emerging Trends in
Processing, Vol. 11, pp. 31-34, Sydney Computing and Information Sciences, Vol.2,
Australia, 2001. NO.12, December 2011
[3] A. Wakatani, "Digital Watermarking for ROI
Medical Images by Using Compressed
Signature Image", Proceedings of the 35th
International Conference on System Sciences,
Vol 10 pp. 24-28 2002.
[4] B. M. Plantiz, A. J. Maeder, "A Study of Block-
Based Medical Image Watermarking Using a
Perceptual Similarity Metric", Proceedings of
the Digital Imaging Computing: Techniques
and Applications (DICTA 2005), 2005.
[5] A. Giakoumaki, S. Pavlopulos, D. Koutsouris,
"Multiple Image Watermarking Applied to
Health Information Management", IEEE
Transactions on Information Technology in
Bio-Medicine, Vol. 10, No. 4, October 2006.
[6] W. Gang, R. Ni, "A Fragile Watermarking
Scheme for Medical Images", Proceedings of
the 27th IEEE Annual Conference on
Engineering in Medicine and Biology Shangai
China September 2005.
[7] R. Raul et al., “Hiding scheme for medical
images”, Proc.17th International Conference on
Electronics, Communications and Computers,
,pp. 32-32 August 2007.
[8] C.R. Piao, D.M. Woo, D.C. Park, S.S. Han,
"Medical Image Authentication Using Hash
Functions and Integer Wavelet Transform",
2008 Congress on Image and Signal Processing,
(CISP-2008),
[9] Sanya, Hainan, China, the27th IEEE Annual
Conference on Engineering in Medicine and
Biology, Shanghai, China, pp.1-4, 2005.
[10] F.Y. Shih, Y.T. Wu, "Robust Watermarking
and Compression for Medical Images based on
Genetic Algorithms", Journal of Information
968 | P a g e