55 research outputs found

    Digital watermarking : applicability for developing trust in medical imaging workflows state of the art review

    Get PDF
    Medical images can be intentionally or unintentionally manipulated both within the secure medical system environment and outside, as images are viewed, extracted and transmitted. Many organisations have invested heavily in Picture Archiving and Communication Systems (PACS), which are intended to facilitate data security. However, it is common for images, and records, to be extracted from these for a wide range of accepted practices, such as external second opinion, transmission to another care provider, patient data request, etc. Therefore, confirming trust within medical imaging workflows has become essential. Digital watermarking has been recognised as a promising approach for ensuring the authenticity and integrity of medical images. Authenticity refers to the ability to identify the information origin and prove that the data relates to the right patient. Integrity means the capacity to ensure that the information has not been altered without authorisation. This paper presents a survey of medical images watermarking and offers an evident scene for concerned researchers by analysing the robustness and limitations of various existing approaches. This includes studying the security levels of medical images within PACS system, clarifying the requirements of medical images watermarking and defining the purposes of watermarking approaches when applied to medical images

    Very High Embedding Capacity Algorithm for Reversible Image Watermarking

    Get PDF
    Reversible image watermarking enables the embedding of copyright or useful information in a host image without any loss of information. Here a novel technique to improve the embedding capacity i.e. reversible watermarking using an adaptive prediction error expansion & pixel selection is proposed. This work is an improvement in conventional Prediction Error Expansion by adding two new techniques adaptive embedding & pixel selection. Instead of uniform embedding, here one or two bits of watermark are adaptively embed into the expandable pixels as per the regional complexity. Adaptive Prediction Error Expansion can obtain the embedded rate upto 1.3 bits per pixel as compared to the 1 BPP of conventional Prediction Error Expansion. Also an intermediate step of prediction error expansion is proposed to select relatively smooth pixels and ignore the rough ones. In other words, the rough pixels may remain unchanged, and only smooth pixels are expanded or shifted. Therefore compared with conventional Prediction Error Expansion, a more sharply distributed prediction error histogram is obtained i.e. , and a larger proportion of prediction-errors in the histogram are expanded to carry hidden data. So the amount of shifted pixels is diminished, which leads to a better image quality. With these improvements, this method performs better than conventional Prediction Error Expansion. It can embed larger payloads with less distortion (almost 30% greater than the conventional method). DOI: 10.17762/ijritcc2321-8169.150510

    Multilayer Reversible Data Hiding Via Histogram Shifting

    Get PDF
    Concealing messages from unauthorised people has been desired since written communication first began. With advancements in digital communication technology and the growth of computer power and storage, the difficulty of ensuring the privacy of individuals and the protection of copyright has become increasingly challenging. Steganography finds a role in attempting to address these growing concerns. Problems arise in the steganography method because of the trade-off between capacity and imperceptibility whereby increasing the embedding capacity increases the distortion in the stego object and it thus becomes suspect. Another problem is concerned with non-retrieval of the original cover object whereby misplacing data could be crucial for example in the case of medical images. Reversible data hiding technique based on histogram shifting addresses the problem of retrieving the original cover. Embedding the secret message by shifting the histogram between the pair of the peak and minimum points wastes the embedding capacity and does not control the distortion in the stego image for various secret messages sizes. In this research, a technique for reversible data hiding is proposed which enables the retrieval of both the hidden secret message and the original image at the receiver’s side. The proposed technique considers the size of the secret message and the distribution of the colour values within the cover image to determine the value of the optimal pair or set of container and carried colours within the best sub image instead of the pair of peak and minimum points. The experimental results show that the proposed technique increases the embedding capacity within the cover image and produces a stego image with a high peak signal-to-noise ratio value. In addition, the experimental results show that by using the proposed re-shifting and extraction formulas, the technique has the ability to extract the hidden data and retrieve the original images from the stego images. In comparison to the traditional histogram-shifting techniques, the proposed technique significantly improves the stego image quality and the embedding capacity. Thus, this research has contributed to two principles, namely improvements in capacity and quality

    Privacy-preserving information hiding and its applications

    Get PDF
    The phenomenal advances in cloud computing technology have raised concerns about data privacy. Aided by the modern cryptographic techniques such as homomorphic encryption, it has become possible to carry out computations in the encrypted domain and process data without compromising information privacy. In this thesis, we study various classes of privacy-preserving information hiding schemes and their real-world applications for cyber security, cloud computing, Internet of things, etc. Data breach is recognised as one of the most dreadful cyber security threats in which private data is copied, transmitted, viewed, stolen or used by unauthorised parties. Although encryption can obfuscate private information against unauthorised viewing, it may not stop data from illegitimate exportation. Privacy-preserving Information hiding can serve as a potential solution to this issue in such a manner that a permission code is embedded into the encrypted data and can be detected when transmissions occur. Digital watermarking is a technique that has been used for a wide range of intriguing applications such as data authentication and ownership identification. However, some of the algorithms are proprietary intellectual properties and thus the availability to the general public is rather limited. A possible solution is to outsource the task of watermarking to an authorised cloud service provider, that has legitimate right to execute the algorithms as well as high computational capacity. Privacypreserving Information hiding is well suited to this scenario since it is operated in the encrypted domain and hence prevents private data from being collected by the cloud. Internet of things is a promising technology to healthcare industry. A common framework consists of wearable equipments for monitoring the health status of an individual, a local gateway device for aggregating the data, and a cloud server for storing and analysing the data. However, there are risks that an adversary may attempt to eavesdrop the wireless communication, attack the gateway device or even access to the cloud server. Hence, it is desirable to produce and encrypt the data simultaneously and incorporate secret sharing schemes to realise access control. Privacy-preserving secret sharing is a novel research for fulfilling this function. In summary, this thesis presents novel schemes and algorithms, including: • two privacy-preserving reversible information hiding schemes based upon symmetric cryptography using arithmetic of quadratic residues and lexicographic permutations, respectively. • two privacy-preserving reversible information hiding schemes based upon asymmetric cryptography using multiplicative and additive privacy homomorphisms, respectively. • four predictive models for assisting the removal of distortions inflicted by information hiding based respectively upon projection theorem, image gradient, total variation denoising, and Bayesian inference. • three privacy-preserving secret sharing algorithms with different levels of generality

    Towards More Robust Commutative Watermarking-Encryption of Images

    Get PDF
    Histogram-based watermarking schemes are invariant against pixel permutations and can be combined with permutation-based ciphers. However, typical histogram-based watermarking schemes based on comparison of histogram bins are prone to de-synchronization attacks, where the whole histogram is shifted by a certain amount. In this paper we investigate the possibility of avoiding this kind of attacks by synchronizing the embedding and detection processes, using the mean of the histogram as a calibration point. The resulting watermarking scheme is resistant to three common types of shifts of the histogram, while the advantages of previous histogram-based schemes, especially commutativity of watermarking and permutation-based encryption, are preserved

    An Efficient Digital Image Watermarking Based on DCT and Advanced Image Data Embedding Method

    Get PDF
    Digital image enhancement and digital content or data image secure using DCT and advanced image data embedding method (AIDEM). AIDEM improved robustness based on particle shifting concept is reproduced secure image data and manipulated there’s a robust would like for a digital image copyright mechanism to be placed in secure image data. There’s a necessity for authentication of the content because of the owner. It’s become more accessible for malicious parties to create scalable copies of proprietary content with any compensation to the content owner. Advanced Watermarking is being viewed as a potential goal to the current downside. Astounding watermarking plans are arranged assaults on the watermarked picture are twisted and proposed to give insurance of proprietorship freedoms, information treating, and information uprightness. These methods guarantee unique information recuperation from watermarked information, while irreversible watermarking plans safeguard proprietorship freedoms. This attribute of reversible watermarking has arisen as an applicant answer for the assurance of proprietorship freedoms of information, unfortunate to alterations, for example, clinical information, genetic information, Visa, and financial balance information. These attacks are also intentional or unintentional. The attacks are classified as geometric attacks. This research presents a comprehensive and old method of these techniques that are developed and their effectiveness. Digital watermarking was developed to supply copyright protection and owners’ authentication. Digital image watermarking may be a methodology for embedding some information into digital image sequences, like text image, image data, during this research analysis on image watermarking and attacks on watermarking process time image data, classification of watermarking and applications. We aim to secure image data using advanced image data embedding method (AIDEM) improved robustness based particle shifting concept is reproduced secure image data. To develop compelling digital image watermarking methodology using mat lab tool and reliable and robust

    Recent Advances in Steganography

    Get PDF
    Steganography is the art and science of communicating which hides the existence of the communication. Steganographic technologies are an important part of the future of Internet security and privacy on open systems such as the Internet. This book's focus is on a relatively new field of study in Steganography and it takes a look at this technology by introducing the readers various concepts of Steganography and Steganalysis. The book has a brief history of steganography and it surveys steganalysis methods considering their modeling techniques. Some new steganography techniques for hiding secret data in images are presented. Furthermore, steganography in speeches is reviewed, and a new approach for hiding data in speeches is introduced

    Reversible Digital Watermarking In Digital Images with Recovery Scheme

    Get PDF
    Digital watermark is a signal that contains information that is inserted into a digital medium such as images, videos, audios and etc. Digital watermarking is the process of embedding a digital watermark into the digital medium. Watermarking is commonly applied for copyright protection, copy protection and authentication of the digital media. A reversible watermark can provide all this with some extra features which include removal of the watermark safely from the watermarked media to return back the original media. Current practise of watermarking is that the watermark was directly embedded into the digital image by altering the image pixel bit. However, the image pixels may not be able to restore to its original value when the watermark is removed from the image. Memory Watermarking technique is proposed where the watermarking process are conducted in the memory. The image and watermark are read as memory bytes and the watermark are drawn to the image in the memory without affecting the physical image file. The watermarked image in the memory is displayed to the users while the physical file of the original image and watermark remain separated. The watermark can be added and removed with the restored image pixels one hundred per cent (I 00%) matched the original image pixels. A simple recovery procedure was built in to restored the original image if found the image of the watermark file was tempered
    • …
    corecore