Image Security Through Watermarking

被引:2
|
作者
Umaamaheshvari, A. [1 ]
Thanushkodi, K. [2 ]
机构
[1] Anna Univ, Sree Sakthi Engn Coll, Coimbatore 641104, Tamil Nadu, India
[2] Anna Univ, Akshaya Coll Engn & Technol, Coimbatore 641104, Tamil Nadu, India
关键词
Digital Watermarking; Hybrid Transform; Discrete Cosine Transform (DCT); Discrete Wavelet Transform (DWT); Daubechies 4 Wavelet Transform; Medical Images; WAVELET TRANSFORM;
D O I
10.1166/jmihi.2014.1237
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Telemedicine and healthcare infrastructure depends on Hospital Information Systems (HIS), Radiology Information Systems (RIS), Picture archiving and Communication Systems (PACS) as these provide new ways to store, access and distribute medical data. Equally, these developments have introduced new risks for unsuitable deployment of medical information flowing in open networks. Medical images need to be kept intact in any condition and prior to any operation as well need to be checked for integrity and verification. In recent times, frequency domain watermarking algorithms have gained immense importance due to their widespread use. The proposed watermarking scheme makes use of hybrid transform, which combines Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). In the proposed watermarking scheme, various types of attacks are given and checked for authenticity. The software used is Matlab 7.9 version. The effectiveness of the proposed watermarking scheme is demonstrated with the aid of experimental results.
引用
收藏
页码:277 / 284
页数:8
相关论文
共 50 条
  • [1] A novel watermarking for image security
    Zhang, J
    Xiong, F
    [J]. COMPUTER AND INFORMATION SCIENCES - ISCIS 2004, PROCEEDINGS, 2004, 3280 : 420 - 429
  • [2] Digital Audio Watermarking and Image Watermarking for Information Security
    Warkar, Rupali
    More, Priyanka
    Waghole, Dattatray
    [J]. 2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [3] On the Robustness and Security of Digital Image Watermarking
    Nyeem, Hussain
    Boles, Wageeh
    Boyd, Colin
    [J]. 2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 1136 - 1141
  • [4] Security in Telehealth Applications: Issues in Medical Image Watermarking Scheme through the Shearlet Transform
    Al-Azzawi, Nemir Ahmed
    [J]. INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICICT 2019), 2019, : 160 - 164
  • [5] Reversible Watermarking for the Security of Medical Image Databases
    Abbasi, Fatima
    Memon, Nisar Ahmed
    [J]. 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [6] Security analysis and improvement on a fragile image watermarking
    Sang, Jun
    Xiang, Hong
    Hu, Hai-Bo
    Fu, Li
    Cai, Bin
    [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2009, 31 (05): : 1204 - 1208
  • [7] Digital watermarking techniques for image security: a review
    A. Mohanarathinam
    S. Kamalraj
    G. K. D. Prasanna Venkatesan
    Renjith V. Ravi
    C. S. Manikandababu
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 3221 - 3229
  • [8] Security of fragile watermarking scheme for image authentication
    Liao, K-C
    Lee, W-B
    Liao, C-W
    [J]. IMAGING SCIENCE JOURNAL, 2006, 54 (03): : 129 - 133
  • [9] On the security of a fragile digital image watermarking scheme
    Sang, Jun
    Alam, Mohammad S.
    Zhu, Xiaohong
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON GRAPHICS AND VISUALIZATION IN ENGINEERING, 2007, : 53 - +
  • [10] Digital image watermarking in power system security
    Xie Ping
    Wang Xin
    Wang Ying
    Liu Jiehui
    [J]. PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 461 - 463