scholarly journals A Watermarking Technique for Biomedical Images Using SMQT, Otsu, and Fuzzy C-Means

Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 975 ◽  
Author(s):  
Shaekh Hasan Shoron ◽  
Monamy Islam ◽  
Jia Uddin ◽  
Dongkoo Shon ◽  
Kichang Im ◽  
...  

Digital watermarking is a process of giving security from unauthorized use. To protect the data from any kind of misuse while transferring, digital watermarking is the most popular authentication technique. This paper proposes a novel digital watermarking scheme for biomedical images. In the model, initially, the biomedical image is preprocessed using improved successive mean quantization transform (SMQT) which uses the Otsu’s threshold value. In the next phase, the image is segmented using Otsu and Fuzzy c-means. Afterwards, the watermark is embedded in the image using discrete wavelet transform (DWT) and inverse DWT (IDWT). Finally, the watermark is extracted from the biomedical image by executing the inverse operation of the embedding process. Experimental results exhibit that the proposed digital watermarking scheme outperforms the typical models in terms of effectiveness and imperceptibility while maintaining robustness against different attacks by demonstrating a lower bit error rate (BER), a cross-correlation value closer to one, and higher values of structural similarity index measures (SSIM) and peak signal-to-noise ratio (PSNR).

Author(s):  
S. Thabasu Kannan ◽  
S. Azhagu Senthil

Now-a-days watermarking plays a pivotal role in most of the industries for providing security to their own as well as hired or leased data. This paper its main aim is to study the multiresolution watermarking algorithms and also choosing the effective and efficient one for improving the resistance in data compression. Computational savings from such a multiresolution watermarking framework is obvious. The multiresolutional property makes our watermarking scheme robust to image/video down sampling operation by a power of two in either space or time. There is no common framework for multiresolutional digital watermarking of both images and video. A multiresolution watermarking based on the wavelet transformation is selected in each frequency band of the Discrete Wavelet Transform (DWT) domain and therefore it can resist the destruction of image processing.   The rapid development of Internet introduces a new set of challenging problems regarding security. One of the most significant problems is to prevent unauthorized copying of digital production from distribution. Digital watermarking has provided a powerful way to claim intellectual protection. We proposed an idea for enhancing the robustness of extracted watermarks. Watermark can be treated as a transmitted signal, while the destruction from attackers is regarded as a noisy distortion in channel.  For the implementation, we have used minimum nine coordinate positions. The watermarking algorithms to be taken for this study are Corvi algorithm and Wang algorithm. In all graph, we have plotted X axis as peak signal to noise ratio (PSNR) and y axis as Correlation with original watermark. The threshold value ά is set to 5. The result is smaller than the threshold value then it is feasible, otherwise it is not.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5540
Author(s):  
Nayeem Hasan ◽  
Md Saiful Islam ◽  
Wenyu Chen ◽  
Muhammad Ashad Kabir ◽  
Saad Al-Ahmadi

This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with an auto extraction feature. The 2DWT has been selected based on the analysis of the trade-off between imperceptibility of the watermark and embedding capacity at various levels of decomposition. DCT operation is applied to the selected area to gather the image coefficients into a single vector using a zig-zig operation. We have utilized the same random bit sequence as the watermark and seed for the embedding zone coefficient. The quality of the reconstructed image was measured according to bit correction rate, peak signal-to-noise ratio (PSNR), and similarity index. Experimental results demonstrated that the proposed scheme is highly robust under different types of image-processing attacks. Several image attacks, e.g., JPEG compression, filtering, noise addition, cropping, sharpening, and bit-plane removal, were examined on watermarked images, and the results of our proposed method outstripped existing methods, especially in terms of the bit correction ratio (100%), which is a measure of bit restoration. The results were also highly satisfactory in terms of the quality of the reconstructed image, which demonstrated high imperceptibility in terms of peak signal-to-noise ratio (PSNR ≥ 40 dB) and structural similarity (SSIM ≥ 0.9) under different image attacks.


2015 ◽  
Vol 5 (1) ◽  
Author(s):  
R. Ganesh ◽  
S. Thabasu Kannan

Now-a-days watermarking plays a pivotal role in most of the industries for providing security to their own as well as hired or leased data. This paper its main aim is to study the multiresolution watermarking algorithms and also choosing the effective and efficient one for improving the resistance in data compression. Computational savings from such a multiresolution watermarking framework is obvious. The multiresolutional property makes our watermarking scheme robust to image/video down sampling operation by a power of two in either space or time. There is no common framework for multiresolutional digital watermarking of both images and video. A multiresolution watermarking based on the wavelet transformation is selected in each frequency band of the Discrete Wavelet Transform (DWT) domain and therefore it can resist the destruction of image processing. The rapid development of Internet introduces a new set of challenging problems regarding security. One of the most significant problems is to prevent unauthorized copying of digital production from distribution. Digital watermarking has provided a powerful way to claim intellectual protection. We proposed an idea for enhancing the robustness of extracted watermarks. Watermark can be treated as a transmitted signal, while the destruction from attackers is regarded as a noisy distortion in channel. For the implementation, we have used minimum nine coordinate positions. The watermarking algorithms to be taken for this study are Corvi algorithm and Wang algorithm. In all graph, we have plotted X axis as peak signal to noise ratio (PSNR) and y axis as Correlation with original watermark. The threshold value ? is set to 5. The result is smaller than the threshold value then it is feasible, otherwise it is not.


2021 ◽  
Vol 21 (1) ◽  
pp. 1-20
Author(s):  
A. K. Singh ◽  
S. Thakur ◽  
Alireza Jolfaei ◽  
Gautam Srivastava ◽  
MD. Elhoseny ◽  
...  

Recently, due to the increase in popularity of the Internet, the problem of digital data security over the Internet is increasing at a phenomenal rate. Watermarking is used for various notable applications to secure digital data from unauthorized individuals. To achieve this, in this article, we propose a joint encryption then-compression based watermarking technique for digital document security. This technique offers a tool for confidentiality, copyright protection, and strong compression performance of the system. The proposed method involves three major steps as follows: (1) embedding of multiple watermarks through non-sub-sampled contourlet transform, redundant discrete wavelet transform, and singular value decomposition; (2) encryption and compression via SHA-256 and Lempel Ziv Welch (LZW), respectively; and (3) extraction/recovery of multiple watermarks from the possibly distorted cover image. The performance estimations are carried out on various images at different attacks, and the efficiency of the system is determined in terms of peak signal-to-noise ratio (PSNR) and normalized correlation (NC), structural similarity index measure (SSIM), number of changing pixel rate (NPCR), unified averaged changed intensity (UACI), and compression ratio (CR). Furthermore, the comparative analysis of the proposed system with similar schemes indicates its superiority to them.


Author(s):  
Diptasree Debnath ◽  
Emlon Ghosh ◽  
Barnali Gupta Banik

Steganography is a widely-used technique for digital data hiding. Image steganography is the most popular among all other kinds of steganography. In this article, a novel key-based blind method for RGB image steganography where multiple images can be hidden simultaneously is described. The proposed method is based on Discrete Cosine Transformation (DCT) and Discrete Wavelet Transformation (DWT) which provides enhanced security as well as improve the quality of the stego. Here, the cover image has been taken as RGB although the method can be implemented on grayscale images as well. The fundamental concept of visual cryptography has been utilized here in order to increase the capacity to a great extent. To make the method more robust and imperceptible, pseudo-random number sequence and a correlation coefficient have been used for embedding and the extraction of the secrets, respectively. The robustness of the method is tested against steganalysis attacks such as crop, rotate, resize, noise addition, and histogram equalization. The method has been applied on multiple sets of images and the quality of the resultant images have been analyzed through various matrices namely ‘Peak Signal to Noise Ratio,' ‘Structural Similarity index,' ‘Structural Content,' and ‘Maximum Difference.' The results obtained are very promising and have been compared with existing methods to prove its efficiency.


Author(s):  
P. Robert ◽  
A. Celine Kavida

: Cervical cancer is the fourth most common cancer in women. In 2018, it was estimated that 570000 women were diagnosed with cervical cancer worldwide, and about 311000 women died from the disease. An efficient technique is essential for solving the complication in the diagnosis of cervical cancer images. In this research, a new method is developed for cervical cancer image segmentation. First, the RGB image is converted into an HSI color model. Then, the thresholding is applied to the saturation and intensity components to get binary images. These binary images are combined to get a new mask. Using the connected component concept, nucleus and cytoplasm are segmented accurately. For the performance evaluation, peak signal-to-noise ratio (PSNR), mean square error (MSE), structural similarity index (SSIM), image quality index (IQI), structural content (SC), normalized cross-correlation (NK), precision (PR), recall (RC), the average difference (AD), and image fidelity (IF) are taken. The proposed techniques’ highest PSNR values are 44.2341, 46.7953, 60.5925, and 61.4862, respectively. The proposed segmentation technique can attain a high PSNR (>40db) value at a threshold value equal to 0.1. Also proposed approach attains good precision, recall, and SSIM values. The lowest MSE values using proposed segmentation techniques are 0.0454, 0.0351, 0.0924, and 0.0271 individually. The AD, NK, SC, NAE, and LMSE values for the implemented approach are low, showing that the segmented image’s quality is very good. Thus, the proposed model performed better compared to other methods.


2018 ◽  
Vol 2018 ◽  
pp. 1-21 ◽  
Author(s):  
Barnali Gupta Banik ◽  
Samir Kumar Bandyopadhyay

Steganography is a popular technique of digital data security. Among all digital steganography methods, audio steganography is very delicate as human auditory system is highly sensitive to noise; hence small modification in audio can make significant audible impact. In this paper, a key based blind audio steganography method has been proposed which is built on discrete wavelet transform (DWT) as well as discrete cosine transform (DCT) and adheres to Kerckhoff’s principle. Here image has been used as secret message which is preprocessed using Arnold’s Transform. To make the system more robust and undetectable, a well-known problem of audio analysis has been explored here, known as Cocktail Party Problem, for wrapping stego audio. The robustness of the proposed method has been tested against Steganalysis attacks like noise addition, random cropping, resampling, requantization, pitch shifting, and mp3 compression. The quality of resultant stego audio and retrieved secret image has been measured by various metrics, namely, “peak signal-to-noise ratio”; “correlation coefficient”; “perceptual evaluation of audio quality”; “bit error rate”; and “structural similarity index.” The embedding capacity has also been evaluated and, as seen from the comparison result, the proposed method has outperformed other existing DCT-DWT based technique.


2013 ◽  
Vol 13 (01) ◽  
pp. 1350006 ◽  
Author(s):  
RAJANI GUPTA ◽  
PRASHANT BANSOD ◽  
R. S. GAMAD

The paper reveals the analysis of the compression quality of true color medical images of echocardiogram (ECHO), X-radiation (X-ray) and computed tomography (CT) and further a comparison of compressed biomedical images of various sizes using two lossy compression techniques, set partitioning in hierarchical trees (SPIHT) and discrete cosine transform (DCT) to the original image is carried out. The study also evaluates the results after analyzing various objective parameters associated with the image. The objective of this analysis is to exhibits the effect of compression ratio on absolute average difference (AAD), cross correlation (CC), image fidelity (IF), mean square error (MSE), peak signal to noise ratio (PSNR) and structural similarity index measurement (SSIM) of the compressed image by SPIHT and DCT compression techniques. The results signify that the quality of the compressed image depends on resolution of the underlying structure where CT is found to be better than other image modalities. The X-ray compression results are equivalent by both the techniques. The compression results for large size biomedical images by SPIHT signifies that ECHO having comparable results to CT and X-ray while their DCT results are substandard. The compression results for comparatively smaller images of ECHO are not as good as X-ray and CT by both the compression techniques. The quality measurement of the compressed image has been designed using MATLAB.


2020 ◽  
Vol 13 (4) ◽  
pp. 10-17
Author(s):  
Fadhil Kadhim Zaidan

In this work, a grayscale image steganography scheme is proposed using a discrete wavelet transform (DWT) and singular value decomposition (SVD). In this scheme, 2-level DWT is applied to a cover image to obtain the high frequency band HL2 which is utilized to embed a secret grayscale image based on the SVD technique. The robustness and the imperceptibility of the proposed steganography algorithm are controlled by a scaling factor for obtaining an acceptable trade-off between them. Peak signal to noise ratio (PSNR) and Structural Similarity Index Measure (SSIM) are used for assessing the efficiency of the proposed approach. Experimental results demonstrate that the proposed scheme still holds its validity under different known attacks such as noise addition, filtering, cropping and JPEG compression


2019 ◽  
Vol 8 (4) ◽  
pp. 2334-2341

This paper aims in presenting a thorough comparison of performance and usefulness of concept of spatial-scale domain based techniques in digital watermarking in order to sustain the ownership, security and true authentication. Spatial-scale based image watermarking techniques provides the information of 2-Dimensional (2-D) signal at different scales and levels, which is desirable for image watermarking. Further, these techniques emerged as a powerful and efficient tool to overcome the limitation of Fourier, spatial, as well as, purely frequency based techniques. The spatial-scale based watermarking techniques, namely, Contourlet Transform (CT), Non Sub-sampled Contourlet Transform (NSCT), Stationary Wavelet Transform (SWT) and Discrete Wavelet Transform (DWT) have been selected for watermarking process. Further, the comparison of performance of the selected watermarking techniques have been carried out in terms of different metrics, such as Peak Signal-to-Noise Ratio (PSNR), Root Mean Square Error (RMSE), Tamper Assessment Factor (TAF) and Mean Structural Similarity Index (MSSIM). Analysis of result shows that multi-directional and shift-invariant NSCT technique outperforms the SWT and DWT based image watermarking techniques in terms of authentication, better capture quality, and tampering resistance, subjective and objective evaluation.


Sign in / Sign up

Export Citation Format

Share Document