Text fusion in images is an important technology for image processing. We have lots of important information related to the patient’s reports and need lots of space to store and the proper position and name which relates that image with that data. In our work we are going to find out the ROI (region of interest) for the particular image and will fuse the related document in the NROI (non-region of interest) of the image, till yet we have many techniques to fuse text data in the medical images one of form them is to fuse data at the boarders of the images and build the particular and pre-defined boarder space. We have propose an algorithm in which we first find out the area of interest and after that we find noisy pixels of the image to embed data in that noisy portions of the image. We use wavelets for smoothing images and segmentation process for extracting region of interest. Coordinates of the noisy pixels have been located and data has been embedded in those pixels .The used embedding technique embed data in least significant bits, hence does not degrade the quality of the image to unacceptable limits. Results show that it gives good PSNR and MSE values which are used for measuring quality effected performance.
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
For securing personal identifications and highly secure identification problems, biometric technologies will
provide higher security with improved accuracy. This has become an emerging technology in recent years due to
the transaction frauds, security breaches and personal identification etc. The beauty of biometric technology is it
provides a unique code for each person and it can’t be copied or forged by others. To overcome the draw backs
of finger print identification systems, here in this paper we proposed a palm print based personal identification
system, which is a most promising and emerging research area in biometric identification systems due to its
uniqueness, scalability, faster execution speed and large area for extracting the features. It provides higher
security over finger print biometric systems with its rich features like wrinkles, continuous ridges, principal
lines, minutiae points, and singular points. The main aim of proposed palm print identification system is to
implement a system with higher accuracy and increased speed in identifying the palm prints of several users.
Here, in this we presented a highly secured palm print identification system with extraction of region of interest
(ROI) with morphological operation there by applying un-decimated bi-orthogonal wavelet (UDBW) transform
to extract the low level features of registered palm prints to calculate its feature vectors (FV) then after the
comparison is done by measuring the distance between registered palm feature vector and testing palm print
feature vector. Simulation results show that the proposed biometric identification system provides more
accuracy and reliable recognition rate
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...ijcsa
Front end of data collection and loading into database manually may cause potential errors in data sets and a very time consuming process. Scanning of a data document in the form of an image and recognition of corresponding information in that image can be considered as a possible solution of this challenge. This paper presents an automated solution for the problem of data cleansing and recognition of user written data to transform into standard printed format with the help of artificial neural networks. Three different neural models namely direct, correlation based and hierarchical have been developed to handle this issue. In a very hostile input environment, the solution is developed to justify the proposed logic.
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
For securing personal identifications and highly secure identification problems, biometric technologies will
provide higher security with improved accuracy. This has become an emerging technology in recent years due to
the transaction frauds, security breaches and personal identification etc. The beauty of biometric technology is it
provides a unique code for each person and it can’t be copied or forged by others. To overcome the draw backs
of finger print identification systems, here in this paper we proposed a palm print based personal identification
system, which is a most promising and emerging research area in biometric identification systems due to its
uniqueness, scalability, faster execution speed and large area for extracting the features. It provides higher
security over finger print biometric systems with its rich features like wrinkles, continuous ridges, principal
lines, minutiae points, and singular points. The main aim of proposed palm print identification system is to
implement a system with higher accuracy and increased speed in identifying the palm prints of several users.
Here, in this we presented a highly secured palm print identification system with extraction of region of interest
(ROI) with morphological operation there by applying un-decimated bi-orthogonal wavelet (UDBW) transform
to extract the low level features of registered palm prints to calculate its feature vectors (FV) then after the
comparison is done by measuring the distance between registered palm feature vector and testing palm print
feature vector. Simulation results show that the proposed biometric identification system provides more
accuracy and reliable recognition rate
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
Front End Data Cleaning And Transformation In Standard Printed Form Using Neu...ijcsa
Front end of data collection and loading into database manually may cause potential errors in data sets and a very time consuming process. Scanning of a data document in the form of an image and recognition of corresponding information in that image can be considered as a possible solution of this challenge. This paper presents an automated solution for the problem of data cleansing and recognition of user written data to transform into standard printed format with the help of artificial neural networks. Three different neural models namely direct, correlation based and hierarchical have been developed to handle this issue. In a very hostile input environment, the solution is developed to justify the proposed logic.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...CSCJournals
The proposed method describes the current forensics and biometrics in a modern approach and implements the concept of IRIS along with brain and resolves the issues and increases the strength of Digital Forensics Community. It has enormous features in biometrics to enhance diverse security levels. A new method to identify individuals using IRIS Patterns with the brain wave signals (EEG) is proposed. Several different algorithms were proposed for detecting, verifying and extracting the deterministic patterns in a person’s IRIS from the Eye. The extracted EEG recordings form the person\'s brain has proved to be unique. Next we combine EEG signals into the IRIS patterns a biometric application which makes use of future multi modal combination architecture. The proposed forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for person identification. The result of each authentication test is compared with the user\'s pre-recorded measurements, using pattern recognition methods and signal-processing algorithms.
For the agriculture sector, detecting and identifying plant diseases at an early stage is extremely important and
still very challenging. Machine learning is an application of AI that helps us achieve this purpose effectively. It
uses a group of algorithms to analyze and interpret data, learn from it, and using it, smart decisions can be
made. For accomplishing this project, a dataset that contains a set of healthy & diseased plant leaf images are
used then using image processing we extract the features of the image. Then we model this dataset with
different machine learning algorithms like Random Forest, Support Vector Machine, Naïve Bayes etc. The aim is
to hold out a comparative study to spot which of those algorithm can predict diseases with the at most
accuracy. We compare factors like precision, accuracy, error rates as well as prediction time of different
machine learning algorithms. After all these comparison, valuable conclusions can be made for this project.
Biometric Identification and Authentication Providence using Fingerprint for ...IJECEIAES
The raise in the recent security incidents of cloud computing and its challenges is to secure the data. To solve this problem, the integration of mobile with cloud computing, Mobile biometric authentication in cloud computing is presented in this paper. To enhance the security, the biometric authentication is being used, since the Mobile cloud computing is popular among the mobile user. This paper examines how the mobile cloud computing (MCC) is used in security issue with finger biometric authentication model. Through this fingerprint biometric, the secret code is generated by entropy value. This enables the person to request for accessing the data in the desk computer. When the person requests the access to the authorized user through Bluetooth in mobile, the Authorized user sends the permit access through fingerprint secret code. Finally this fingerprint is verified with the database in the Desk computer. If it is matched, then the computer can be accessed by the requested person.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Real Time Implementation Of Face Recognition SystemIJERA Editor
This paper proposes face recognition method using PCA for real time implementation. Nowadays security is
gaining importance as it is becoming necessary for people to keep passwords in their mind and carry cards. Such
implementations however, are becoming less secure and practical, also is becoming more problematic thus
leading to an increasing interest in techniques related to biometrics systems. Face recognition system is amongst
important subjects in biometrics systems. This system is very useful for security in particular and has been
widely used and developed in many countries. This study aims to achieve face recognition successfully by
detecting human face in real time, based on Principal Component Analysis (PCA) algorithm.
Embedding and Extraction Techniques for Medical Images-Issues and Challenges csandit
New technologies in multimedia and communication fields have introduced new ways to transfer and save the medical image data through open networks, which has introduced new risks of inappropriate use of medical information. Medical images are highly sensitive hence secured transmission and reception of data is needed with minimal distortion. Medical image security plays an important role in the field of Telemedicine. Telemedicine has numerous applications in teleconsulting, teleradiology, telediagnosis, telesurgery and remote medical
education. Our work is to analyze about the different embedding techniques that can be used for embedding the personal and diagnosed details of a person within the medical images
without any visual discrepancy. Also to survey about the blind extraction algorithm utilizing genetic algorithm for optimization of the key parameters.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enhancement of Multi-Modal Biometric Authentication Based on IRIS and Brain N...CSCJournals
The proposed method describes the current forensics and biometrics in a modern approach and implements the concept of IRIS along with brain and resolves the issues and increases the strength of Digital Forensics Community. It has enormous features in biometrics to enhance diverse security levels. A new method to identify individuals using IRIS Patterns with the brain wave signals (EEG) is proposed. Several different algorithms were proposed for detecting, verifying and extracting the deterministic patterns in a person’s IRIS from the Eye. The extracted EEG recordings form the person\'s brain has proved to be unique. Next we combine EEG signals into the IRIS patterns a biometric application which makes use of future multi modal combination architecture. The proposed forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for person identification. The result of each authentication test is compared with the user\'s pre-recorded measurements, using pattern recognition methods and signal-processing algorithms.
For the agriculture sector, detecting and identifying plant diseases at an early stage is extremely important and
still very challenging. Machine learning is an application of AI that helps us achieve this purpose effectively. It
uses a group of algorithms to analyze and interpret data, learn from it, and using it, smart decisions can be
made. For accomplishing this project, a dataset that contains a set of healthy & diseased plant leaf images are
used then using image processing we extract the features of the image. Then we model this dataset with
different machine learning algorithms like Random Forest, Support Vector Machine, Naïve Bayes etc. The aim is
to hold out a comparative study to spot which of those algorithm can predict diseases with the at most
accuracy. We compare factors like precision, accuracy, error rates as well as prediction time of different
machine learning algorithms. After all these comparison, valuable conclusions can be made for this project.
Biometric Identification and Authentication Providence using Fingerprint for ...IJECEIAES
The raise in the recent security incidents of cloud computing and its challenges is to secure the data. To solve this problem, the integration of mobile with cloud computing, Mobile biometric authentication in cloud computing is presented in this paper. To enhance the security, the biometric authentication is being used, since the Mobile cloud computing is popular among the mobile user. This paper examines how the mobile cloud computing (MCC) is used in security issue with finger biometric authentication model. Through this fingerprint biometric, the secret code is generated by entropy value. This enables the person to request for accessing the data in the desk computer. When the person requests the access to the authorized user through Bluetooth in mobile, the Authorized user sends the permit access through fingerprint secret code. Finally this fingerprint is verified with the database in the Desk computer. If it is matched, then the computer can be accessed by the requested person.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Real Time Implementation Of Face Recognition SystemIJERA Editor
This paper proposes face recognition method using PCA for real time implementation. Nowadays security is
gaining importance as it is becoming necessary for people to keep passwords in their mind and carry cards. Such
implementations however, are becoming less secure and practical, also is becoming more problematic thus
leading to an increasing interest in techniques related to biometrics systems. Face recognition system is amongst
important subjects in biometrics systems. This system is very useful for security in particular and has been
widely used and developed in many countries. This study aims to achieve face recognition successfully by
detecting human face in real time, based on Principal Component Analysis (PCA) algorithm.
Embedding and Extraction Techniques for Medical Images-Issues and Challenges csandit
New technologies in multimedia and communication fields have introduced new ways to transfer and save the medical image data through open networks, which has introduced new risks of inappropriate use of medical information. Medical images are highly sensitive hence secured transmission and reception of data is needed with minimal distortion. Medical image security plays an important role in the field of Telemedicine. Telemedicine has numerous applications in teleconsulting, teleradiology, telediagnosis, telesurgery and remote medical
education. Our work is to analyze about the different embedding techniques that can be used for embedding the personal and diagnosed details of a person within the medical images
without any visual discrepancy. Also to survey about the blind extraction algorithm utilizing genetic algorithm for optimization of the key parameters.
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementIJERA Editor
In present world demand of high quality images, security of the information on internet is one of the most important issues of research. Data hiding is a method of hiding a useful information by embedding it on another image (cover image) to provide security and only the authorize person is able to extract the original information from the embedding data. This paper is a review which describes several different algorithms for Reversible Data Hiding (RDH). Previous literature has shown that histogram modification, histogram equalization (HE) and interpolation are the most common methods for data hiding. To improve security these methods are used in encrypted images. This paper is a comprehensive study of all the major reversible data hiding approaches implemented as found in the literature.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This paper proposes an encryption-based image watermarking scheme for medical images using a
customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of
Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra
security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the
watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding,
an R-level discrete wavelet transform was applied to the host image.
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
Designing low cost and high speed authentication
solution for digital images is always an attractive area of
research in image processing. In past few years because of
widespread use of internet and network technology, concept
of information distribution has been become habit rather than
exception in daily life. In same aspects challenges involved
with distribution of authenticate information has been
increased manifolds. In this paper a generalize image
authentication method has proposed by hybridization of color
histogram and associated first four statistical moments to
achieve the objectives of low cost and high speed. Proposed
method can apply for both gray and color images having any
size and any format. Solution generates a very small
authentication code with an ease means which is use to analyze
the characteristics of received image from tampering
perspective.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Similar to Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Reversible Watermarking Technique (20)
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Reversible Watermarking Technique
1. Arshpreet Kaur Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 8( Version 4), August 2014, pp.84-88
www.ijera.com 84 | P a g e
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Reversible Watermarking Technique Arshpreet Kaur*, Harvinder Singh Josan** *(Reseach Scholar, Department of Electronics and Communication, RIMT-IET, Mandi Gobindgarh, Punjab) **(Assistant Professor, Department of Electronics and Communication, RIMT-IET, Mandi Gobindgarh, Punjab) ABSTRACT Text fusion in images is an important technology for image processing. We have lots of important information related to the patient’s reports and need lots of space to store and the proper position and name which relates that image with that data. In our work we are going to find out the ROI (region of interest) for the particular image and will fuse the related document in the NROI (non-region of interest) of the image, till yet we have many techniques to fuse text data in the medical images one of form them is to fuse data at the boarders of the images and build the particular and pre-defined boarder space. We have propose an algorithm in which we first find out the area of interest and after that we find noisy pixels of the image to embed data in that noisy portions of the image. We use wavelets for smoothing images and segmentation process for extracting region of interest. Coordinates of the noisy pixels have been located and data has been embedded in those pixels .The used embedding technique embed data in least significant bits, hence does not degrade the quality of the image to unacceptable limits. Results show that it gives good PSNR and MSE values which are used for measuring quality effected performance.
Keywords - Data embedding, Data extraction, US/MRI images.
I. INTRODUCTION
Medical image knowledge digest consists of patient information like patient name, patient-ID , disease description, procedures with doctors information [3]. Medical image knowledge digest will be the watermark. This watermark is embedded into the image which has to be shared by using lossless watermarking technique. The data hiding scheme should have a large embedding capacity to carry more general information. The goals of this work are to protect the copyrights and can recover the embedded data. The scheme provided here for data embedding provides robustness, imperceptibility, high embedding capacity and readily retrieving capacity. Medical images can be given to the patient directly or send to the patient by online and also maintained as a soft and hard copy at the hospital for diagnosing and later in the future purposes. The problem arises here that is while sending or giving the data to the patient we have to find whether the data belongs to particular patients or not and also the privacy of the patient is a primary concern [1]. Hence authentication is required. If we consider medical images especially ultrasound and MRI, they are a confidential property of the patients or defense personals and need to be authenticated and transmitted without any vulnerable attack called tempering. However it’s not possible in this hacking area, so we need to provide some security especially in the region of interest to avoid manipulations which define the defected area of the patient. A number of
methods are emerging and watermarking is one of them. Some people take watermarking as steganography but there is a difference between the two. Watermarking is defined as the practice of imperceptibly altering a work to embed a message about that work. On the other hand, steganography is the practice of undetectable altering a work to embed a secret message [2]. Digital image watermarking has gained a great interest in the last twenty years among scholars who provide a number of methods. However, still we are far away from being fully or accurately successful. Therefore, more and more people are entering the field to make the watermarking idea useful and reliable for the digital world. Of these various watermarking methods, some beat others in terms of basic watermarking requirements like robustness, invisibility, processing, cost etc.
The whole system of watermarking comprises of an adder called Embedder, which embeds the mark and a detector as shown in the figure below. The Embedder’s output is typically transmitted or recorded. At the detector side, the embedded image is accessed as an input to the detector. If a payload is present, detector detects and extracts the encrypted data and payload. Watermarking, like cryptography, needs secret keys to identify legal owners. The key is used to embed the watermark, and at the same time to extract or detect it. The embedded signal can be exposed only with a right key. While a single bit of information indicating that a given document is
RESEARCH ARTICLE OPEN ACCESS
2. Arshpreet Kaur Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 8( Version 4), August 2014, pp.84-88
www.ijera.com 85 | P a g e
watermarked or not is sufficient sometimes, most applications demand extra information to be hidden in the original data. This information may consist of ownership identifiers, transaction dates, serial numbers, etc., that plays a key role when illegal providers are being tracked. Reversible digital watermarking [4], [9],[10] is the technique that embeds the watermark or secret data into an original image to form a stego-image. Although the stego-image has only slight difference from the original image, in some specific images like medical, Defense, and legislature images, even the little distortion on these images cannot be accepted. For instance, in case of medical images if region of Interest found distorted, it cannot provide the correct information about the affected area of a patient. So in these circumstances, the data hiding algorithm should be able to restore the original image from the stego- image. This is the so-called reversible, lossless data hiding technique. Obviously, many data hiding techniques have been proposed but most of them are not reversible, which means that the original cover image cannot be recovered with lossless from the stego-image.In this Semi reversible technique is used. In this paper, we propose a ROI-based watermarking scheme which is capable of hiding patient's data and verifying authenticity of ROI, in section 2, we review watermarking techniques proposed for medical images. In section 3, we present our proposed method including data embedding and extraction. In section 4, experimental results are provided to demonstrate the efficiency of the scheme. Finally, in section 5 we present our conclusion.
II. EVOLUTIONARY TECHNIQUES EMPLOYED
A general structure for the proposed work has to include many elements for hiding data in order to authenticate the medical image at various stages of the diagnosis process [5]. In order to achieve image authentication, fragile watermarking techniques with semi reversible are commonly used. Fragile authentication is more functional than the semi- fragile or robust techniques. The digital watermark must be fragile to any kind of distortion. For example, the image after lossy processing such as JPEG could be found to be authentic by robust image authentication, but it would fail fragile image authentication. For fragile, one bit error in the message leads to a totally different authenticator, however, for a “semi- fragile” image authentication, such an error does not necessarily alter the authenticator. Fragile image authentication is highly sensitive and dependent on the exact value of image pixels. Our proposed technique works in fragile environment in which we hide informatory data and authentication message in Non-region of interest of medical images. While hiding data into the image, Region of interest has been separated from NROI by using wavelets and clustering method and later increasing the brightness of the pixels of region of interest location, an embedding algorithm has been applied to hide data. Region of interest has been modified later according to the initial condition For hiding data,firstly we need Information to be embedded for authentication purposes. For this, two types of data is needed. First to authenticate the images and second is information regarding the patient and its diagnosis report. Secondly there is a need to use a technique to embed data into an image in order to keep ROI integrated. The third main issue is to handle embedding capacity as it can be increased depending upon the diagnosis report. And finally there is a need to consider Security and integrity of the host data and how to decrypt data at receiver end and verify authentication message. There are two processes for our presented work. The first one is embedding process in which data is embedded and the second one is extraction process in which data has been extracted. Both algorithms are explained below: The embedding process starts with the generation of watermark. Later on the watermark is embedded in NROI. The process is described step by step as follows:
1) Read Image into MATLAB environment and convert it into gray scale if it is in other scale.
2) Separate REGION OF INTEREST and NON REGION OF INTEREST using wavelets and segmentation techniques.
3) Evaluate Message authentication code from secret message
4) Read Diagnosis report.
5) Generate the watermark by combining data generated in step 3 and 4 and concatenate it in a single line.
6) Generate an array called TABLE in order to put the integer form of Concatenated character string data .
7) Scan the host image for a value which has been chosen one at a time in a sequence from TABLE and match for minimum difference match in non- region of interest.
8) Confirm its location in secret key array, if present look for another location. Otherwise put the values of that row and column number in the secret key array.
9) Update the encrypted image array according to this newly found pixel. And update the secret key.
10) When algorithm run for all the data, watermarked signal image will be produced, if it fails in the middle, try fewer payloads.Since proposed scheme is blind so there is no need of
3. Arshpreet Kaur Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 8( Version 4), August 2014, pp.84-88
www.ijera.com 86 | P a g e
original image to extract the embedded watermark.
The extraction process has the following steps:
1) Load the Watermarked image in mat lab environment along with the secret key generated at the time of encryption process
2) Extract the pixels by using the secret key in the sequence provided by secret key and put in an array.
3) Decrypt the extracted watermark and MAC by converting back to characters in string form.
4) Compute the MAC code separately fromthe secret message delivered separately and compare the extracted hash to the computed hash. If both are same, received image is authentic, otherwise declare it as unauthentic.
5) Save the decoded data in a txt. File.
III. RESULTS AND DISCUSSIONS
A medical image used can be of any defected organ of a human body depending upon type of diagnosis used. There are many different techniques available in the medical profession to look closely and efficiently at the effected part. Few of them easily available are x-ray, CT scan and MRI scan. Experimental results have been taken out for images from these techniques. . Resulted outputs at various steps of algorithm are described below for a single image which is brain tumour image of a patient.
Figure 1 : Test image taken from world wide web.
Figure 2: Marking of region of interest.
As we seen above few pixel levels have changed which results in variations b/w histograms of input image and output watermarked image. These changes cannot be seen by visual perception but can be understood from histogram bins and counts of pixels. Perceptual similarity between the original image and the watermarked image is defined by the fidelity of a watermarking system. The fidelity measure depends on the embedding process and the transmission of the marked signal. The best method to evaluate fidelity of a watermarking system is based on examining both original and watermarked version of the work by human subjects [8], but due to high volume of test sets such an evaluation method is impractical. The most common evaluation method used in all the literature is the peak signal-to-noise ratio (PSNR) defined between the host and watermarked signals. The PSNR (PEAK SIGNAL TO NOISE RATIO) of an image is a typical measure used for evaluating image quality by considering that the few noticeable distortions are uniform in all coefficients in a specific domain, such as spectral domain, frequency domain, or some transform domain. Since PSNR is more computable and can be used to provide a generic bound for the watermarking capacity. So, we use the PSNR to analyze the watermark embedding distortions on images. We need to calculate MEAN SQUARE ERROR (MSE) in order to calculate PSNR.
MSE measured the level of noise in encrypted image with comparison to original image and can be calculated by formula:
MSE=q2= 1 푁 푓 푗,푘 −푔(푗,푘 푘푗 2 (1) Where i and j is the no. of row and column in the image.
PSNR is used to test the change in the quality of image after applying various attacks. The mathematical formula is given by:
PSNR = 20 * log10 2푛−1 푀푆퐸 (2) Or PSNR= 20 * log10 (255 /MSE) (3) CF measures the similarity and difference between both image. It is given by: C.F. = N N i=1 j=1W i,j ∗W’ i,j N N i=1 j=1 푊2(i,j) (4) Where N×N is the size of watermark, W (i,j) and W’(i,j) represents the watermark and recovered watermark images respectively.
4. Arshpreet Kaur Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 8( Version 4), August 2014, pp.84-88
www.ijera.com 87 | P a g e
Tables and figures below describes PSNR and MSE data plots at different payloads. Table 1: MSE and PSNR values at different payloads for input image
Payload in bytes
MSE
PSNR in dB
Correlation factor
8000
0.0405
62.052
0.9984
9000
0.0889
58.641
0.9998
10000
0.1896
55.351
0.9952
11000
0.3257
53.002
0.9994
Figure 3 : Data payload vs PSNR plot graph
Figure 4: Data payload vs MSE plot graph
Figure 5: Histogram of input image
Figure 6: histogram of watermarked image It is hard to see the difference between original image and encrypted image. But by differencing corresponding pixels of both images we can find out the changes in corresponding locations. As seen from the difference images above we can see the embedded pixels and can easily see that the embedding happens only in non-region of interest. In the histograms above for the encrypted images, an eclipse has been marked around the intensity levels which have been modified.
IV. CONCLUSION
The technique proposed is fragile data hiding technique which preserves the record of medical image by embedding the medical diagnosis report and other data. While embedding the data, ROI of medical image is avoided to ensure the integrity of ROI. This is done by first applying the wavelets in order to enhance spatial information and to reduce noise and then by applying clustering. Hence resulted in separated ROI and NROI .The scheme allows the storing and transmission of electronic patient record along with image authentication codes which can be extracted at the receiving end without the original image. In future work will be carried out to locate the ROI regions for different types of images and
5. Arshpreet Kaur Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 8( Version 4), August 2014, pp.84-88
www.ijera.com 88 | P a g e
algorithm will be modified to increase PSNR values for better quality output. REFERENCES
[1.] Acharya.U.R., Bhat.P.S., Kumar.S., and Lim.M.C.,” Transmission and storage of medical images with patient information”, Computers in Biology and Medicine Vol 33 ,2003, pages 303–310.
[2.] Li.M., Poovendran.R., and Narayanan.S., “Protecting patient privacy against unauthorized release of medical images in a group communication situation”, Computerized Medical Imaging and Graphics, Vol 29 ,2005, pages 367–383.
[3.] G. Coatrieux, Clarale, Guillou, J. Cauvin, L. Iocamu and Ch, Roux: "Enhancing shared medical image fimctionalities with image knowledge digest and watermarking", presented in the IEEE EMBC conflnt. Tech- nol.Appl. Biomed. (IT AB 2006) Joannina, Greece.
[4.] Weng.S., Zhao.Y., Pan.J.S., and Ni.R., “A novel high capacity reversible watermarking scheme,” IEEE International Conference on Multimedia and Expo (ICME 07), vol. 3, 2007, Page(s): 723 – 730 .
[5.] Raul, C.R. and Claudia, U.F, “Data Hiding Scheme for Medical Images” 2007 IEEE Page(s): 32-36.
[6.] Huang .A.H.V.C., Fang. B.W.C.and Chen.S.C. “Privacy Protection and Authentication for Medical Images with Record-Based Watermarking” ,2009 IEEE ,Page(s): 190 – 193.
[7.] Sun.X. and Bo.S., “A Blind Digital Watermarking for Color Medical Images Based on PCA” 2010 IEEE Page(s): 421 – 427 .
[8.] Poonkuntran.S., R.S.Rajesh, “A Messy Watermarking for Medical Image Authentication” 2011 IEEE Page(s): 418 – 422.
[9.] Khoo.B.E and Qershi.O.M, “ROI-Based Tamper Detection And Recovery For Medical Image Using Reversible Watermarking Technique “, IEEE 2010, Pages- 151-155.
[10.] Sakai.H., Kuribayashi.M., and Morii.M., ”Adaptive reversible data hiding for JPEG images”, Proc. of International Symposium on Information Theory and its Applications, Auckland, New Zealand, Dec. 7-10, 2008, pages . 870-875.