6,111 research outputs found
Using digital watermarking to enhance security in wireless medical image transmission
This is the published version of the article. Copyright 2010 Mary Ann Liebert Inc.During the last few years, wireless networks have been increasingly used both inside hospitals and in patients’ homes to transmit medical information. In general, wireless networks suffer from decreased security. However, digital watermarking can be used to secure medical information. In this study, we focused on combining wireless transmission and digital watermarking technologies to better secure the transmission of medical images within and outside the hospital. Methods: We utilized an integrated system comprising the wireless network and the digital watermarking module to conduct a series of tests. Results: The test results were evaluated by medical consultants. They concluded that the images suffered no visible quality degradation and maintained their diagnostic integrity. Discussion: The proposed integrated system presented reasonable stability, and its performance was comparable to that of a fixed network. This system can enhance security during the transmission of medical images through a wireless channel.The General Secretariat for Research and Technology of the Hellenic Ministry of Development and the British Council
A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB) and Inverse Bit
In this paper, we introduce a new digital watermarking algorithm using least
significant bit (LSB). LSB is used because of its little effect on the image.
This new algorithm is using LSB by inversing the binary values of the watermark
text and shifting the watermark according to the odd or even number of pixel
coordinates of image before embedding the watermark. The proposed algorithm is
flexible depending on the length of the watermark text. If the length of the
watermark text is more than ((MxN)/8)-2 the proposed algorithm will also embed
the extra of the watermark text in the second LSB. We compare our proposed
algorithm with the 1-LSB algorithm and Lee's algorithm using Peak
signal-to-noise ratio (PSNR). This new algorithm improved its quality of the
watermarked image. We also attack the watermarked image by using cropping and
adding noise and we got good results as well.Comment: 8 pages, 6 figures and 4 tables; Journal of Computing, Volume 3,
Issue 4, April 2011, ISSN 2151-961
Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure
In our previous researches, a new digital watermarking scheme based on
chaotic iterations has been introduced. This scheme was both stego-secure and
topologically secure. The stego-security is to face an attacker in the
"watermark only attack" category, whereas the topological security concerns
other categories of attacks. Its Lyapunov exponent is evaluated here, to
quantify the chaos generated by this scheme.
Keywords : Lyapunov exponent; Information hiding; Security; Chaotic
iterations; Digital Watermarking.Comment: 10 page
Robust Watermarking using Hidden Markov Models
Software piracy is the unauthorized copying or distribution of software. It is a growing problem that results in annual losses in the billions of dollars. Prevention is a difficult problem since digital documents are easy to copy and distribute. Watermarking is a possible defense against software piracy. A software watermark consists of information embedded in the software, which allows it to be identified. A watermark can act as a deterrent to unauthorized copying, since it can be used to provide evidence for legal action against those responsible for piracy.In this project, we present a novel software watermarking scheme that is inspired by the success of previous research focused on detecting metamorphic viruses. We use a trained hidden Markov model (HMM) to detect a specific copy of software. We give experimental results that show our scheme is robust. That is, we can identify the original software even after it has been extensively modified, as might occur as part of an attack on the watermarking scheme
- …