138 research outputs found

    Assessment of 3D mesh watermarking techniques

    Get PDF
    With the increasing usage of three-dimensional meshes in Computer-Aided Design (CAD), medical imaging, and entertainment fields like virtual reality, etc., the authentication problems and awareness of intellectual property protection have risen since the last decade. Numerous watermarking schemes have been suggested to protect ownership and prevent the threat of data piracy. This paper begins with the potential difficulties that arose when dealing with three-dimension entities in comparison to two-dimensional entities and also lists possible algorithms suggested hitherto and their comprehensive analysis. Attacks, also play a crucial role in deciding a watermarking algorithm so an attack based analysis is also presented to analyze resilience of watermarking algorithms under several attacks. In the end, some evaluation measures and potential solutions are brooded over to design robust and oblivious watermarking schemes in the future

    A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images

    Get PDF
    It is of great importance in telemedicine to protect authenticity and integrity of medical images. They are mainly addressed by two technologies, which are region of interest (ROI) lossless watermarking and reversible watermarking. However, the former causes biases on diagnosis by distorting region of none interest (RONI) and introduces security risks by segmenting image spatially for watermark embedding. The latter fails to provide reliable recovery function for the tampered areas when protecting image integrity. To address these issues, a novel robust reversible watermarking scheme is proposed in this paper. In our scheme, a reversible watermarking method is designed based on recursive dither modulation (RDM) to avoid biases on diagnosis. In addition, RDM is combined with Slantlet transform and singular value decomposition to provide a reliable solution for protecting image authenticity. Moreover, ROI and RONI are divided for watermark generation to design an effective recovery function under limited embedding capacity. Finally, watermarks are embedded into whole medical images to avoid the risks caused by segmenting image spatially. Experimental results demonstrate that our proposed lossless scheme not only has remarkable imperceptibility and sufficient robustness, but also provides reliable authentication, tamper detection, localization and recovery functions, which outperforms existing schemes for protecting medical image

    Secure-Medishare: A Comprehensive Secure Medical Data-Sharing System Using Blockchain, Watermarking, Steganography, And Optimized Hybrid Cryptography

    Get PDF
    Medical data plays a crucial role in healthcare, enabling accurate diagnosis, treatment planning, and research. However, the secure sharing of sensitive medical data and images remains a significant challenge. Existing techniques often fall short in terms of protecting data integrity, confidentiality, and authenticity. To address these limitations, this paper introduces Secure-Medishare, a novel secure medical data-sharing system that integrates blockchain technology, watermarking, steganography, and enhanced cryptography. The proposed Secure-Medishare system aims to provide robust security mechanisms for medical data sharing. Unlike centralized systems, which are susceptible to single points of failure and unauthorized access, Secure-Medishare utilizes blockchain technology to ensure decentralized and tamper-resistant storage and sharing of medical data. Secure-Medishare employs watermarking for data integrity and authentication and steganography for confidential transmission of metadata, ensuring authenticity, privacy, and confidentiality of medical data. Furthermore, an optimized hybrid cryptography technique is implemented to secure the transmission and storage of medical data, safeguarding confidentiality and privacy. Secure-Medishare offers several advantages over existing techniques. It provides enhanced security and privacy protection, efficient data sharing and retrieval, and improved trust among healthcare providers. The system ensures the integrity and authenticity of medical data, preventing unauthorized modifications or tampering. Additionally, the decentralized nature of blockchain technology reduces the risk of data breaches and single points of failure. Experimental results show that Secure-Medishare generates hashes quickly, taking only 65 milliseconds for 100 blocks. Optimized hybrid cryptography used in Secure-Medishare also outperforms other cryptography combinations, with encryption and decryption times of 5.635 seconds for 96-bit data. These findings highlight the efficiency and effectiveness of Secure-Medishare for secure medical data and image sharing. The experimental evaluation confirms that Secure-Medishare is a reliable and robust solution for secure medical data sharing in healthcare environments

    A Comprehensive Review on Digital Image Watermarking

    Full text link
    The advent of the Internet led to the easy availability of digital data like images, audio, and video. Easy access to multimedia gives rise to the issues such as content authentication, security, copyright protection, and ownership identification. Here, we discuss the concept of digital image watermarking with a focus on the technique used in image watermark embedding and extraction of the watermark. The detailed classification along with the basic characteristics, namely visual imperceptibility, robustness, capacity, security of digital watermarking is also presented in this work. Further, we have also discussed the recent application areas of digital watermarking such as healthcare, remote education, electronic voting systems, and the military. The robustness is evaluated by examining the effect of image processing attacks on the signed content and the watermark recoverability. The authors believe that the comprehensive survey presented in this paper will help the new researchers to gather knowledge in this domain. Further, the comparative analysis can enkindle ideas to improve upon the already mentioned techniques

    AN INVESTIGATION OF DIFFERENT VIDEO WATERMARKING TECHNIQUES

    Get PDF
    Watermarking is an advanced technology that identifies to solve the problem of illegal manipulation and distribution of digital data. It is the art of hiding the copyright information into host such that the embedded data is imperceptible. The covers in the forms of digital multimedia object, namely image, audio and video. The extensive literature collected related to the performance improvement of video watermarking techniques is critically reviewed and presented in this paper. Also, comprehensive review of the literature on the evolution of various video watermarking techniques to achieve robustness and to maintain the quality of watermarked video sequences
    • …
    corecore