100 research outputs found
Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
منصة الخدمات الطبية عبارة عن تطبيق متنقل يتم من خلاله تزويد المرضى بتشخيصات الأطباء بناءً على المعلومات المستقاة من الصور الطبية. يجب ألا يتم تبديل محتوى هذه النتائج التشخيصية بشكل غير قانوني أثناء النقل ويجب إعادته إلى المريض الصحيح. في هذه المقالة، نقدم حلاً لهذه المشكلات باستخدام علامة مائية عمياء وقابلة للانعكاس وهشة استنادًا إلى مصادقة صورة المضيف. في الخوارزمية المقترحة، يتم استخدام الإصدار الثنائي من ترميز بوس_شوهوري _هوكوينجهام (BCH) للتقرير الطبي للمريض (PMR) والصورة الطبية الثنائية للمريض (PMI) بعد استخدام الغامض الحصري أو (F-XoR) لإنتاج العلامة الفريدة للمريض باستخدام مخطط المشاركة السرية (SSS). يتم استخدامه لاحقًا كعلامة مائية ليتم تضمينها في مضيف (PMI) باستخدام خوارزمية تحليل القيمة المفرد (SVD) العمياء القائمة على العلامة المائية. وهو حل جديد اقترحناه أيضًا بتطبيق SVD على صورة العلامة المائية العمياء. تحافظ الخوارزمية الخاصة بنا على مصادقة محتوى (PMI) أثناء النقل وملكية (PMR) للمريض لنقل التشخيص المصاحب فيما بعد إلى المريض الصحيح عبر تطبيق التطبيب عن بعد المحمول. يستخدم تقييم الخوارزمية لدينا علامات مائية مسترجعة توضح النتائج الواعدة لمقاييس الأداء العالية مقارنتا مع نتائج الاعمال السابقة في مقاييس الكشف عن التزوير وإمكانية الاسترداد الذاتي، مع قيمة 30NB PSNR، قيمة NC هي 0.99.A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s unique mark is used later as a watermark to be embedded into host PMI using blind watermarking-based singular value decomposition (SVD) algorithm. This is a new solution that we also proposed to applying SVD into a blind watermarking image. Our algorithm preserves PMI content authentication during the transmission and PMR ownership to the patient for subsequently transmitting associated diagnosis to the correct patient via a mobile telemedicine application. The performance of experimental results is high compare to previous results, uses recovered watermarks demonstrating promising results in the tamper detection metrics and self-recovery capability, with 30db PSNR, NC value is 0.99
The Most Common Characteristics of Fragile Video Watermarking: A Review
The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
 
A blind recovery technique with integer wavelet transforms in image watermarking
The development of internet technology has simplified the sharing and modification of digital image information. The aim of this study is to propose a new blind recovery technique based on integer wavelets transform (BRIWT) by utilizing their image content. The LSB adjustment technique on the integer wavelet transform is used to embed recovery data into the two least significant bits (LSB) of the image content. Authentication bits are embedded into the current locations of the LSB of the image content, while the recovery information is embedded into different block locations based on the proposed block mapping. The embedded recovery data is securely placed at random locations within the two LSBs using a secret key. A three-layer embedding of authentication bits is used to validate the integrity of the image contents, achieving high precision and accuracy. Tamper localization accuracy is employed to identify recovery bits from the image content. This research also investigates the image inpainting method to enhance recovery from tampered images. The proposed image inpainting is performed by identifying non-tampered pixels in the surrounding tamper localization. The results demonstrate that the proposed scheme can produce highly watermarked images with imperceptibility, with an average SSIM value of 0.9978 and a PSNR value of 46.20 dB. The proposed scheme significantly improves the accuracy of tamper localization, with a precision of 0.9943 and an accuracy of 0.9971. The proposed recovery technique using integer wavelet transforms achieves high-quality blind recovery with an SSIM value of 0.9934 under a tampering rate of 10%. The findings of this study reveal that the proposed scheme improves the quality of blind recovery by 14.2 % under a tampering rate of 80 %
A novel multipurpose watermarking scheme capable of protecting and authenticating images with tamper detection and localisation abilities
Technologies that fall under the umbrella of Industry 4.0 can be classified into one of its four significant components: cyber-physical systems, the internet of things (IoT), on-demand availability of computer system resources, and cognitive computing. The success of this industrial revolution lies in how well these components can communicate with each other, and work together in finding the most optimised solution for an assigned task. It is achieved by sharing data collected from a network of sensors. This data is communicated via images, videos, and a variety of other signals, attracting unwanted attention of hackers. The protection of such data is therefore pivotal, as is maintaining its integrity. To this end, this paper proposes a novel image watermarking scheme with potential applications in Industry 4.0. The strategy presented is
multipurpose; one such purpose is authenticating the transmitted image, another is curtailing the illegal distribution of the image by providing copyright protection. To this end, two new watermarking methods are introduced, one of which is for embedding the robust watermark, and the other is related to the fragile watermark. The robust watermark's embedding is achieved in the frequency domain, wherein the frequency coefficients are selected using a novel mean-based coefficient selection procedure. Subsequently, the selected coefficients are manipulated in equal proportion to embed the robust watermark. The fragile watermark's embedding is achieved in the spatial domain, wherein self-generated fragile watermark(s) is embedded by directly altering the pixel bits of the host image. The effective combination of two domains results in a hybrid scheme and attains the vital balance between the watermarking requirements of imperceptibility, security and capacity. Moreover, in the case of tampering, the proposed scheme not only authenticates and provides copyright protection to images but can also detect tampering and localise the tampered regions. An extensive evaluation of the proposed scheme on typical images has proven its superiority over existing state-of-the-art methods
Fast Fragile Watermark Embedding and Iterative Mechanism With High Self-Restoration Performance
This paper presents a new algorithm to reduce significantly the computational cost of one of the best methods with self-recovery capabilities in the fragile watermarking literature. This is achieved by generating two sequences of reference bits associated to the 5 most significant bit-planes (MSBPs) of the image. The reference bits and some authentication bits are then allocated to the 3 least significant bit-planes (LSBPs) of the image. The receiver uses the authentication bits to localise altered pixel-blocks and then executes an iterative restoration mechanism to calculate the original value of the watermarked pixels. Experimental results demonstrate that the embedding method executes significantly faster compared to the state-of-the-art method while achieving a high restoration performance
- …