2015
DOI: 10.1007/s11042-015-2754-7
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid technique for robust and imperceptible multiple watermarking using medical images

Abstract: This paper presents a secure multiple watermarking method based on discrete wavelet transform (DWT), discrete cosine transforms (DCT) and singular value decomposition (SVD). For identity authentication purpose, the proposed method uses medical image as the image watermark, and the personal and medical record of the patient as the text watermark. In the embedding process, the cover medical image is decomposed up to second level of DWT coefficients. Low frequency band (LL) of the host medical image is transforme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
74
0
4

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 158 publications
(78 citation statements)
references
References 26 publications
0
74
0
4
Order By: Relevance
“…The choice of these three techniques it's focused on their properties, DWT allows a good location in the time and the frequency domain and it's better to identify appropriate data to human perception (HVS) [3], DCT has a good perceptual invisibility, an acceptable robustness, and a reasonable complexity [2,5]. And finally, the important properties of the SVD is that even if one applies a small variation in the singular values it does not affect the quality of the image [6] as well as the singular values of an image have a great stability.…”
Section: Used Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…The choice of these three techniques it's focused on their properties, DWT allows a good location in the time and the frequency domain and it's better to identify appropriate data to human perception (HVS) [3], DCT has a good perceptual invisibility, an acceptable robustness, and a reasonable complexity [2,5]. And finally, the important properties of the SVD is that even if one applies a small variation in the singular values it does not affect the quality of the image [6] as well as the singular values of an image have a great stability.…”
Section: Used Techniquesmentioning
confidence: 99%
“…The singular value decomposition (SVD) [6] of an image is represented by a matrix which can be factored into a product of two orthogonal matrices and a diagonal matrix.…”
Section: Singular Value Decomposition (Svd)mentioning
confidence: 99%
“…Telemedicine and image security require methods and techniques that ensure the secure communication of radiographic images in ePHI/R systems. The main advantages of using steganography and watermarking in telemedicine are [1]: (i) These methods require no extra space for storage of data. The ePHI/R is embedded inside the cover radiographic images, so ePHI/R requires no extra storage space in memory.…”
Section: Introductionmentioning
confidence: 99%
“…( 1) where N is the number of pixels in an image and is the probability of occurrence of a pixel in an image with value . For security analysis, the Kullback-Leibler divergence method is used and defined in Equation (2).…”
mentioning
confidence: 99%
“…Telemedicine and image security require methods and techniques that ensure the secure communication of radiographic images in ePHI/R systems. The main advantages of using steganography and watermarking in telemedicine are [1]: (i) These methods require no extra space for storage of data. The ePHI/R is embedded inside the cover radiographic images, so ePHI/R requires no Gunjaland Mali [37] presented an embedding algorithm that applies DWT on the RONI area of the radiographic image.…”
Section: Introductionmentioning
confidence: 99%