142 research outputs found

    Secure and Image Retrieval based on Multipurpose Watermarking for Mammography Images Database

    Full text link
    In the cancerology domain, we were brought to make periodic mammography images to monitor tumor patients. Oracle Database Management system (DBMS) is a solution to manage these images with patient's data recorder. Knowing the large size of medical images of mammograms, the Oracle DBMS saves these images outside the Oracle database using external LOBs. The link between these images and Oracle is done through the BFILE. At this level, two problems are raised: the first problem is that access to these images can become impossible because the link is likely to be broken. The second problem is security, the fact that the images are saved outside the Oracle database, they do not benefit from its powerful security. The protection of the integrity and confidentiality of data and patient images are a necessity defended by laws and they must be preserved against any unauthorized access, alteration or destruction. In this paper, we propose the method of reversible watermarking technique based on the difference expansion to resolve these two problems and explore its use in search and retrieval strategy of images.Comment: 28-3

    A novel multipurpose watermarking scheme capable of protecting and authenticating images with tamper detection and localisation abilities

    Get PDF
    Technologies that fall under the umbrella of Industry 4.0 can be classified into one of its four significant components: cyber-physical systems, the internet of things (IoT), on-demand availability of computer system resources, and cognitive computing. The success of this industrial revolution lies in how well these components can communicate with each other, and work together in finding the most optimised solution for an assigned task. It is achieved by sharing data collected from a network of sensors. This data is communicated via images, videos, and a variety of other signals, attracting unwanted attention of hackers. The protection of such data is therefore pivotal, as is maintaining its integrity. To this end, this paper proposes a novel image watermarking scheme with potential applications in Industry 4.0. The strategy presented is multipurpose; one such purpose is authenticating the transmitted image, another is curtailing the illegal distribution of the image by providing copyright protection. To this end, two new watermarking methods are introduced, one of which is for embedding the robust watermark, and the other is related to the fragile watermark. The robust watermark's embedding is achieved in the frequency domain, wherein the frequency coefficients are selected using a novel mean-based coefficient selection procedure. Subsequently, the selected coefficients are manipulated in equal proportion to embed the robust watermark. The fragile watermark's embedding is achieved in the spatial domain, wherein self-generated fragile watermark(s) is embedded by directly altering the pixel bits of the host image. The effective combination of two domains results in a hybrid scheme and attains the vital balance between the watermarking requirements of imperceptibility, security and capacity. Moreover, in the case of tampering, the proposed scheme not only authenticates and provides copyright protection to images but can also detect tampering and localise the tampered regions. An extensive evaluation of the proposed scheme on typical images has proven its superiority over existing state-of-the-art methods

    A HIGH SPEED VLSI ARCHITECTURE FOR DIGITAL SPEECH WATERMARKING WITH COMPRESSION

    Get PDF
    The need to provide a copy right protection on digital watermarking to multimedia data like speech, image or video is rapidly increasing with an intensification in the application in these areas. Digital watermarking has received a lot of attention in the past few years. A hardware system based solely on DSP processors are fast but may require more area, cost or power if the target application requires a large amount of parallel processing. An FPGA co-processor can provide as many as 550 parallel multiply and accumulate operations on a single device, but FPGAs excel at processing large amounts of data in parallel, as they are not optimized as processors for tasks such as periodic coefficient updates, decision- making control tasks. Combination of both the FPGA and DSP processor delivers an attractive solution for a wide range of applications. A hardware implementation of digital speech watermarking combined with speech compression, encryption on heterogeneous platform is made in this paper. It is observed that the proposed architecture is able to attain high speed while utilizing optimal resources in terms of area

    Digital Image Watermarking in Wavelet Domain

    Get PDF
    Internet allows individuals to share the information.  The shared information is like text, image, audio and video files.  This information sharing results in some problems such as copyright violation, unauthorized use of documents. Such problems can be solved by using a technique called as digital watermarking. This paper presents different aspects of watermarking and how it is useful for intellectual property protection on internet.DOI:http://dx.doi.org/10.11591/ijece.v3i1.174

    Study on high Performance and Effective Watermarking Scheme using Hybrid Transform (DCT-DWT)

    Get PDF
    Nowadays healthcare infrastructure depends on Hospital Information Systems (HIS), Radiology Information Systems (RIS),Picture archiving and Communication Systems (PACS) as these provide new ways to store, access and distribute medical data . It eliminates the security risk. Conversely, these developments have introduced new risks for unsuitable deployment of medical information flowing in open networks, provided the effortlessness with which digital content can be manipulated. It is renowned that the integrity and confidentiality of medical data is a serious topic for ethical and legal reasons. Medical images need to be kept intact in any condition and prior to any operation as well need to be checked for integrity and verification. Watermarking is a budding technology that is capable of assisting this aim. In recent times, frequency domain watermarking algorithms have gained immense importance due to their widespread use. Subsequently, the watermark embedding and extraction are performed in frequency domain using the presented scheme. The proposed watermarking scheme, the watermark extraction compared with the original image for calculating SSIM.The effectiveness of the proposed watermarking scheme is demonstrated with the aid of experimental results

    Optimizing Robustness and Invisibility in Digital Image Watermarking: A SVM-Based Multi-Level DWT and SVD Approach

    Get PDF
    This research introduces a new digital image watermarking approach that utilizes discrete wave transformation (DWT), Support vector machine, and singular value decomposition. The method improves robustness under various assault situations by using the SVM classifier during watermark extraction. Multi-level DWT splits the host picture into sub-bands when embedding, and the coefficients are used as input for SVM. After SVD, the scaling factor embeds the watermark. Comparing the proposed approach to existing research under various attacks, the experimental findings demonstrate that it strikes an equilibrium between robustness and invisibility for watermarks of varying sizes. Support Vector Machine is a contemporary category of machine learning techniques that is extensively employed for the purpose of solving classification problems
    • …
    corecore