scholarly journals A Robust Image Encrypted Watermarking Technique for Neurodegenerative Disorder Diagnosis and Its Applications

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Chirag Sharma ◽  
Amandeep Bagga ◽  
Rajeev Sobti ◽  
Mohammad Shabaz ◽  
Rashid Amin

The use of Internet technology has led to the availability of different multimedia data in various formats. The unapproved customers misuse multimedia information by conveying them on various web objections to acquire cash deceptively without the first copyright holder’s intervention. Due to the rise in cases of COVID-19, lots of patient information are leaked without their knowledge, so an intelligent technique is required to protect the integrity of patient data by placing an invisible signal known as a watermark on the medical images. In this paper, a new method of watermarking is proposed on both standard and medical images. The paper addresses the use of digital rights management in medical field applications such as embedding the watermark in medical images related to neurodegenerative disorders, lung disorders, and heart issues. The various quality parameters are used to figure out the evaluation of the developed method. In addition, the testing of the watermarking scheme is done by applying various signal processing attacks.

Author(s):  
Ruchira Naskar ◽  
Rajat Subhra Chakraborty ◽  
Dev Kumar Das ◽  
Chandan Chakraborty

With the advent of telemedicine, Digital Rights Management of medical images has become a critical issue pertaining to security and privacy preservation in the medical industry. The technology of telemedicine makes patient diagnosis possible for physicians located at a remote site. This technology involves electronic transmission of medical images over the internet, thus raising the need for ensuring security and privacy of such information. Digital watermarking is a widely used technique for the authentication and protection of multimedia data such as images and video against various security and privacy threats. But such digital rights management practices as watermarking often lead to considerable distortion or information loss of the medical images. The medical images being highly sensitive and legally valuable assets of the medical industry, such information loss are often not tolerable. Most importantly, such information loss may lead to incorrect patient diagnosis or reduced accuracy of disease detection. In this chapter we investigate the impact of digital watermarking, and its effect on the accuracy of disease diagnosis, specifically diagnosis of malarial infection caused by Plasmodium vivax parasite. We have used a computer–aided, automatic diagnostic model for our work in this chapter. Our experimental results show that although general (lossy) digital watermarking reduces the diagnostic accuracy, it can be improved with the use of reversible (lossless) watermarking. In fact, the adverse effect(s) of watermarking on the diagnostic accuracy can be completely mitigated through the use of reversible watermarking.


Author(s):  
Nikos Nikolaidis

Intellectual property rights protection and management of multimedia data is essential for the deployment of e-commerce systems involving transactions on such data. Lately, replica detection or fingerprinting has emerged as a promising approach for the rights management of multimedia data. In this chapter, a review of 2 replica detection techniques is presented. The first technique utilizes color-based descriptors, an R-tree indexing structure, and Linear Discriminant Analysis (LDA) to achieve image replica detection. The second technique is a video fingerprinting method that utilizes information about the appearances of individuals in videos along with an efficient search and matching strategy.


Author(s):  
Eduardo Fernandez-Medina ◽  
Sabrina De Capitani di Vimercati ◽  
Ernesto Damiani ◽  
Mario Piattini ◽  
Pierangela Samarati

Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the pervasiveness of XML as a data interchange format has given origin to a number of standard formats for multimedia, such as SMIL for multimedia presentations, SVG for vector graphics, VoiceXML for dialog, and MPEG-21 and MPEG-7 for video. Innovative programming paradigms (such as the one of web services) rely on the availability of XML-based markup and metadata in the multimedia flow in order to customize and add value to multimedia content distributed via the Net. In such a context, a number of security issues around multimedia data management need to be addressed. First of all, it is important to identify the parties allowed to use the multimedia resources, the rights available to the parties, and the terms and conditions under which those rights may be executed: this is fulfilled by the Digital Rights Management (DRM) technology. Secondly, a new generation of security and privacy models and languages is needed, capable of expressing complex filtering conditions on a wide range of properties of multimedia data. In this chapter, we analyze the general problem of multimedia security. We summarize the most important XML-based formats for representing multimedia data, and we present languages for expressing access control policies. Finally, we introduce the most important concepts of the DRM technology.


2017 ◽  
Vol 54 ◽  
pp. 140-151 ◽  
Author(s):  
Xiyao Liu ◽  
Rongchang Zhao ◽  
Fangfang Li ◽  
Shenghui Liao ◽  
Yipeng Ding ◽  
...  

2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Shaohua Duan ◽  
Hanwen Wang ◽  
Yunpeng Liu ◽  
Li Huang ◽  
Xiaoyi Zhou

Watermarking technology is commonly used to solve various problems in digital rights management and multimedia security. If a watermarking scheme with multiple purposes applies single method, it will easily cause the destruction of the hidden messages in particular attacks. For the copyright protection and tamper detection of color images, this research proposed a robust-fragile watermarking scheme. The two different embedding schemes embed the watermark into the R layer and G layer after NSST (nonsubsampled shearlet transform) and DWT (discrete wavelet transform) transformation. The hash sequence generated by the R layer and the G layer is served as fragile watermarks and is embedded into the B layer by the LSB (least significant bit) method. Finally, an improved rotation correction is applied to better extract the watermark under the rotation attack. Experimental results show that the proposed method is more accurate than the existing ones in terms of rotation angle correction and can effectively resist general attacks such as noise, filtering, and JEPG compression. Moreover, the proposed fragile watermark can locate the tamper position when malicious tamper occurs. Except cropping attack, the true-positive rate (TPR) reaches 1 for all attacks.


Author(s):  
Ganesh C S Sundar

Multimedia data hiding techniques have developed a strong basis for steganography area with a growing number of applications like digital rights management, covert communications, hiding executables for access control, annotation etc. The advantage of steganography over cryptography alone is that messages do not attract attention to themselves, to messengers, or to recipients. An unhidden coded message, no matter how unbreakable it is, will arouse suspicion and may in itself be incriminating, as in some countries encryption is illegal.


2008 ◽  
pp. 1288-1320
Author(s):  
Eduardo Fernandez-Medina ◽  
Sabrina De Capitani di Vimercati ◽  
Ernesto Damiani ◽  
Mario Piattini ◽  
Perangela Samarati

Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the pervasiveness of XML as a data interchange format has given origin to a number of standard formats for multimedia, such as SMIL for multimedia presentations, SVG for vector graphics, VoiceXML for dialog, and MPEG-21 and MPEG-7 for video. Innovative programming paradigms (such as the one of web services) rely on the availability of XML-based markup and metadata in the multimedia flow in order to customize and add value to multimedia content distributed via the Net. In such a context, a number of security issues around multimedia data management need to be addressed. First of all, it is important to identify the parties allowed to use the multimedia resources, the rights available to the parties, and the terms and conditions under which those rights may be executed: this is fulfilled by the Digital Rights Management (DRM) technology. Secondly, a new generation of security and privacy models and languages is needed, capable of expressing complex filtering conditions on a wide range of properties of multimedia data. In this chapter, we analyze the general problem of multimedia security. We summarize the most important XML-based formats for representing multimedia data, and we present languages for expressing access control policies. Finally, we introduce the most important concepts of the DRM technology.


2017 ◽  
Vol 8 (1) ◽  
Author(s):  
I Gusti Bagus Astawa ◽  
I Ketut Agung Enriko

These days, the use of Internet technology can be found in almost every sector of human life. One of the advanced Internet technologies is Internet of Things (IoT), that is a technology where devices can communicate via Internet connectivity. It is used in many vital industries like automotive, electricity, home automation, and healthcare. This study aims to implement IoT technology for healthcare sector, i.e. in helping obesity people to pursue their weight-loss program (WLP). The result is a system which consists of a smart weight scale, a mobile application, and food menu recommendation database in order to help obesity people in their WLP program. A trial to some obesity patients is performed to collect data. Index Terms—Internet of things; overweight; weight loss program; food recommendation


Sign in / Sign up

Export Citation Format

Share Document