Secure Spread Spectrum Based Multiple Watermarking Technique for Medical Images

2017 ◽  
pp. 125-157 ◽  
Author(s):  
Amit Kumar Singh ◽  
Basant Kumar ◽  
Ghanshyam Singh ◽  
Anand Mohan
2017 ◽  
pp. 95-124
Author(s):  
Amit Kumar Singh ◽  
Basant Kumar ◽  
Ghanshyam Singh ◽  
Anand Mohan

2016 ◽  
Vol 76 (3) ◽  
pp. 3557-3575 ◽  
Author(s):  
Siddharth Singh ◽  
Vivek Singh Rathore ◽  
Rajiv Singh

2015 ◽  
Vol 83 (3) ◽  
pp. 2133-2150 ◽  
Author(s):  
Amit Kumar Singh ◽  
Mayank Dave ◽  
Anand Mohan

Author(s):  
Peter Eze ◽  
Parampalli Udaya ◽  
Robin Evans ◽  
Dongxi Liu

Visible light photography diagnostic images are coloured ex vivo medical images popularly used in Dermatology and Endoscopy for diagnosis and monitoring. The need to protect the integrity of these images as well as associated patient data calls for techniques such as image steganography and watermarking. This research explores and compares the effect of watermarking on the YIQ and YCbCr colour transforms used in processing digital coloured images and video in recent times. Using a new spread spectrum watermarking algorithm, it was found that YIQ has better distortion performance than YCbCr in the order of 3dB while YCbCr had lower BER for accurate watermark retrieval and tamper detection in the order of 1.3 x 10-3.


2016 ◽  
Vol 92 (4) ◽  
pp. 1611-1624 ◽  
Author(s):  
Abhilasha Sharma ◽  
Amit Kumar Singh ◽  
Satya Prakash Ghrera

2013 ◽  
Vol 321-324 ◽  
pp. 1196-1199
Author(s):  
Xiao Pan Chen ◽  
Xiao Ke Zhu ◽  
Shan Shan Zheng

In order to improve the performance of muti-digital rights protection, a multiple watermarking algorithm based on Discrete Cosine Transform (DCT) and spread-spectrum technique is proposed. First, the host image is divided into subblock and each block is manipulated by DCT. Second, two watermarks are encrypted by Arnold scrambling. Third, the watermarks are modulated by by utilizing two kinds of strategies, and then are embedded in middle frequency coefficients of DCT domain. Experimental results show that the proposed algorithm is efficient to resist traditional signal processing attacks and has better security and robustness, higher capacity.


Sign in / Sign up

Export Citation Format

Share Document