scholarly journals Application of Fractional Wave Packet Transform for Robust Watermarking of Mammograms

2015 ◽  
Vol 2015 ◽  
pp. 1-8
Author(s):  
Pushpa Mala Siddaraju ◽  
Devappa Jayadevappa ◽  
Kaliyamoorthy Ezhilarasan

Exchanging of medical data requires efficient authentication and protection of medical data that can be illegally modified. Watermarking plays an important role in protecting, sharing, and securing medical data. In this work, a robust nonblind medical image watermarking scheme is proposed. The process involves two steps: the embedding and the extraction phase. During the embedding phase, l-level FRWPT is performed on the host image and the watermark is embedded into the modified reference image. In the second phase, inverse FRWPT is performed on the watermarked image to extract the watermark from the watermarked image. The proposed scheme is tested on mammograms images and is subjected to common attacks like Gaussian filtering, median filtering, compression, sharpening, and contrast adjustments. Experimental results show that the proposed scheme is robust.

Author(s):  
Wenbing Wang ◽  
Shengli Liu ◽  
Liu Feng

Generic polar complex exponential transform (GPCET), as continuous orthogonal moment, has the advantages of computational simplicity, numerical stability, and resistance to geometric transforms, which make it suitable for watermarking. However, errors in kernel function discretization can degrade these advantages. To maximize the GPCET utilization in robust watermarking, this paper proposes a secondary grid-division (SGD)-based moment calculation method that divides each grid corresponding to one pixel into nonoverlapping subgrids and increases the number of sampling points. Using the accurate moment calculation method, a nonsubsampled contourlet transform (NSCT)–GPCET-based watermarking scheme with resistance to image processing and geometrical attacks is proposed. In this scheme, the accurate moment calculation can reduce the numerical error and geometrical error of the traditional methods, which is verified by an image reconstruction comparison. Additionally, NSCT and accurate GPCET are utilized to achieve watermark stability. Subsequent experiments test the proposed watermarking scheme for its invisibility and robustness, and verify that the robustness of the proposed scheme outperforms that of other schemes when its level of invisibility is significantly higher.


Cryptography ◽  
2020 ◽  
pp. 480-497
Author(s):  
Lin Gao ◽  
Tiegang Gao ◽  
Jie Zhao

This paper proposed a reversible medical image watermarking scheme using Redundant Discrete Wavelet Transform (RDWT) and sub-sample. To meet the highly demand of the perceptional quality, the proposed scheme embedding the watermark by modifying the RDWT coefficients. The sub-sample scheme is introduced to the proposed scheme for the enhancement of the embedding capacity. Moreover, to meet the need of security, a PWLCM based image encryption algorithm is introduced for encrypting the image after the watermark embedding. The experimental results suggests that the proposed scheme not only meet the highly demand of the perceptional quality, but also have better embedding capacity than former DWT based scheme. Also the encryption scheme could protect the image contents efficiently.


2010 ◽  
Vol 19 (02) ◽  
pp. 491-502 ◽  
Author(s):  
YONG-GANG FU ◽  
RUIMIN SHEN

In this paper, a novel image watermarking scheme based on a self-reference technique is proposed. The meaningful watermark is embedded into a gray-level image according to the relation between the constructed reference image and the original host. In order to be robust against Jpeg compression, the reference image should be robust under Jpeg compression. Firstly, the original image is transformed into DCT domain; and then most of the high frequency coefficients are omitted; after the quantization step and inverse DCT transform, we can obtain a robust reference. By considering the relation between the original image and its reference, we can embed the watermark into the host. The watermark extraction process is oblivious. Experimental results under several attacks show good robustness of the proposed scheme. Especially under cropping and Jpeg compression attacks, the watermark can be extracted with only few errors.


Author(s):  
Xin Zhong ◽  
Frank Y. Shih

In this paper, we present a robust multibit image watermarking scheme to undertake the common image-processing attacks as well as affine distortions. This scheme combines contrast modulation and effective synchronization for large payload and high robustness. We analyze the robustness, payload, and the lower bound of fidelity. Regarding watermark resynchronization under affine distortions, we develop a self-referencing rectification method to detect the distortion parameters for reconstruction by the center of mass in affine covariant regions. The effectiveness and advantages of the proposed scheme are confirmed by experimental results, which show the superior performance as comparing against several state-of-the-art watermarking methods.


2013 ◽  
Vol 798-799 ◽  
pp. 733-736
Author(s):  
Xiu Hu Tan

Transparency and robustness are two conflicting requirements demanded by digital image watermarking for copyright protection and many other purposes. In this paper, a robust and transparent watermarking scheme for color images is proposed. The color features for the human visual system are utilized to design the color watermarking algorithm. The basic idea is to embed the invisible watermark into the color image by brightness adjustment and feature component choice. And through analysis and constraint the conditions, we can obtain a high detection probability and security, a low false alarm probability. In the same time, because we use different matrix operation to embed (secret key) and extract (public key) a watermark, we are able to release all information for the public, except the secret key. Our method can extract the embedded watermark without reference image. The robustness of our method is demonstrated by various attacks through computer simulation.


2017 ◽  
Vol 20 (4) ◽  
pp. 1366-1379 ◽  
Author(s):  
Rohit Thanki ◽  
Surekha Borra ◽  
Vedvyas Dwivedi ◽  
Komal Borisagar

2018 ◽  
Vol 8 (9) ◽  
pp. 1857-1864
Author(s):  
V. Kavitha ◽  
C. Palanisamy ◽  
T. Sureshkumar

A hybrid watermarking technique using wavelet and Shearlet transform is proposed in this paper. The DWT variant Daub4 transform model is applied on the medical image to generate different frequency sub-bands. The HL and LH sub-bands which are resistant to compression attacks are chosen for second level of transformation, a DST variant 'Cone adaptive Shearlet transform' technique is used to calculate the Shearlet coefficients of the selected sub-bands. By using SVD on the Shearlet coefficients, the singular values of watermark image are embedded into the singular values of the host image. The proposed approach is examined using three medical images and a watermark image. The experimental results show that the proposed approach is robust against JPEG compression, Geometric and Noise attacks.


Sign in / Sign up

Export Citation Format

Share Document