138 research outputs found
Assessment of 3D mesh watermarking techniques
With the increasing usage of three-dimensional meshes in Computer-Aided Design (CAD), medical imaging, and entertainment fields like virtual reality, etc., the authentication problems and awareness of intellectual property protection have risen since the last decade. Numerous watermarking schemes have been suggested to protect ownership and prevent the threat of data piracy. This paper begins with the potential difficulties that arose when dealing with three-dimension entities in comparison to two-dimensional entities and also lists possible algorithms suggested hitherto and their comprehensive analysis. Attacks, also play a crucial role in deciding a watermarking algorithm so an attack based analysis is also presented to analyze resilience of watermarking algorithms under several attacks. In the end, some evaluation measures and potential solutions are brooded over to design robust and oblivious watermarking schemes in the future
A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images
It is of great importance in telemedicine to protect authenticity and
integrity of medical images. They are mainly addressed by two technologies, which
are region of interest (ROI) lossless watermarking and reversible watermarking.
However, the former causes biases on diagnosis by distorting region of none interest
(RONI) and introduces security risks by segmenting image spatially for watermark
embedding. The latter fails to provide reliable recovery function for the tampered
areas when protecting image integrity. To address these issues, a novel robust
reversible watermarking scheme is proposed in this paper. In our scheme, a reversible
watermarking method is designed based on recursive dither modulation (RDM) to
avoid biases on diagnosis. In addition, RDM is combined with Slantlet transform and
singular value decomposition to provide a reliable solution for protecting image
authenticity. Moreover, ROI and RONI are divided for watermark generation to
design an effective recovery function under limited embedding capacity. Finally,
watermarks are embedded into whole medical images to avoid the risks caused by
segmenting image spatially. Experimental results demonstrate that our proposed
lossless scheme not only has remarkable imperceptibility and sufficient robustness,
but also provides reliable authentication, tamper detection, localization and recovery
functions, which outperforms existing schemes for protecting medical image
Secure-Medishare: A Comprehensive Secure Medical Data-Sharing System Using Blockchain, Watermarking, Steganography, And Optimized Hybrid Cryptography
Medical data plays a crucial role in healthcare, enabling accurate diagnosis, treatment planning, and research. However, the secure sharing of sensitive medical data and images remains a significant challenge. Existing techniques often fall short in terms of protecting data integrity, confidentiality, and authenticity. To address these limitations, this paper introduces Secure-Medishare, a novel secure medical data-sharing system that integrates blockchain technology, watermarking, steganography, and enhanced cryptography. The proposed Secure-Medishare system aims to provide robust security mechanisms for medical data sharing. Unlike centralized systems, which are susceptible to single points of failure and unauthorized access, Secure-Medishare utilizes blockchain technology to ensure decentralized and tamper-resistant storage and sharing of medical data. Secure-Medishare employs watermarking for data integrity and authentication and steganography for confidential transmission of metadata, ensuring authenticity, privacy, and confidentiality of medical data. Furthermore, an optimized hybrid cryptography technique is implemented to secure the transmission and storage of medical data, safeguarding confidentiality and privacy. Secure-Medishare offers several advantages over existing techniques. It provides enhanced security and privacy protection, efficient data sharing and retrieval, and improved trust among healthcare providers. The system ensures the integrity and authenticity of medical data, preventing unauthorized modifications or tampering. Additionally, the decentralized nature of blockchain technology reduces the risk of data breaches and single points of failure. Experimental results show that Secure-Medishare generates hashes quickly, taking only 65 milliseconds for 100 blocks. Optimized hybrid cryptography used in Secure-Medishare also outperforms other cryptography combinations, with encryption and decryption times of 5.635 seconds for 96-bit data. These findings highlight the efficiency and effectiveness of Secure-Medishare for secure medical data and image sharing. The experimental evaluation confirms that Secure-Medishare is a reliable and robust solution for secure medical data sharing in healthcare environments
A Comprehensive Review on Digital Image Watermarking
The advent of the Internet led to the easy availability of digital data like
images, audio, and video. Easy access to multimedia gives rise to the issues
such as content authentication, security, copyright protection, and ownership
identification. Here, we discuss the concept of digital image watermarking with
a focus on the technique used in image watermark embedding and extraction of
the watermark. The detailed classification along with the basic
characteristics, namely visual imperceptibility, robustness, capacity, security
of digital watermarking is also presented in this work. Further, we have also
discussed the recent application areas of digital watermarking such as
healthcare, remote education, electronic voting systems, and the military. The
robustness is evaluated by examining the effect of image processing attacks on
the signed content and the watermark recoverability. The authors believe that
the comprehensive survey presented in this paper will help the new researchers
to gather knowledge in this domain. Further, the comparative analysis can
enkindle ideas to improve upon the already mentioned techniques
AN INVESTIGATION OF DIFFERENT VIDEOÂ WATERMARKING TECHNIQUES
Watermarking is an advanced technology that identifies to solve the problem of illegal manipulation and distribution of digital data. It is the art of hiding the copyright information into host such that the embedded data is imperceptible. The covers in the forms of digital multimedia object, namely image, audio and video. The extensive literature collected related to the performance improvement of video watermarking techniques is critically reviewed and presented in this paper. Also, comprehensive review of the literature on the evolution of various video watermarking techniques to achieve robustness and to maintain the quality of watermarked video sequences
- …