448 research outputs found

    Digital watermarking : applicability for developing trust in medical imaging workflows state of the art review

    Get PDF
    Medical images can be intentionally or unintentionally manipulated both within the secure medical system environment and outside, as images are viewed, extracted and transmitted. Many organisations have invested heavily in Picture Archiving and Communication Systems (PACS), which are intended to facilitate data security. However, it is common for images, and records, to be extracted from these for a wide range of accepted practices, such as external second opinion, transmission to another care provider, patient data request, etc. Therefore, confirming trust within medical imaging workflows has become essential. Digital watermarking has been recognised as a promising approach for ensuring the authenticity and integrity of medical images. Authenticity refers to the ability to identify the information origin and prove that the data relates to the right patient. Integrity means the capacity to ensure that the information has not been altered without authorisation. This paper presents a survey of medical images watermarking and offers an evident scene for concerned researchers by analysing the robustness and limitations of various existing approaches. This includes studying the security levels of medical images within PACS system, clarifying the requirements of medical images watermarking and defining the purposes of watermarking approaches when applied to medical images

    Implementations of HVS Models in Digital Image Watermarking

    Get PDF
    In the paper two possible implementations of Human Visual System (HVS) models in digital watermarking of still images are presented. The first method performs watermark embedding in transform domain of Discrete Cosine Transform (DCT) and the second method is based on Discrete Wavelet Transform (DWT). Both methods use HVS models to select perceptually significant transform coefficients and at the same time to determine the bounds of modification of selected coefficients in watermark embedding process. The HVS models in DCT and DWT domains consist of three parts which exploit various properties of human eye. The first part is the HVS model in DCT (DWT) domain based on three basic properties of human vision: frequency sensitivity, luminance sensitivity and masking effects. The second part is the HVS model based on Region of Interest (ROI). It is composed of contrast thresholds as a function of spatial frequency and eye\'s eccentricity. The third part is the HVS model based on noise visibility in an image and is described by so called Noise Visibility Function (NVF). Watermark detection is performed without use of original image and watermarks have a form of real number sequences with normal distribution zero mean and unit variance. The robustness of presented perceptual watermarking methods against various types of attacks is also briefly discussed

    Digital Audio Watermarking by Magnitude Modification of Frequency Components Using the CSPE Algorithm

    Get PDF
    In this paper we describe a process whereby the magnitude of either one or two frequency components of a signal is modified in order that it may be used to encode a hidden message within a signal in such a way as the casual observer would have no way of noticing the presence of a hidden message. Previous work has used filtering and signal addition to achieve the same goals. The current work improves on this by using a recent super-resolution component-identification technique to isolate the components to modify, limiting the impact on the quality of the signal

    Digital Audio Watermarking by Magnitude Modification of Frequency Components Using the CSPE Algorithm

    Get PDF
    In this paper we describe a process whereby the magnitude of either one or two frequency components of a signal is modified in order that it may be used to encode a hidden message within a signal in such a way as the casual observer would have no way of noticing the presence of a hidden message. Previous work has used filtering and signal addition to achieve the same goals. The current work improves on this by using a recent super-resolution component-identification technique to isolate the components to modify, limiting the impact on the quality of the signal

    An Invisible Logo Watermarking Using Arnold Transform

    Get PDF
    AbstractDigital watermarking is the process of hiding information into the digital content. The method of embedding a smaller logo image into the host image is called logo watermarking. The system proposes an invisible and secure watermarking. The key entered initially determine the location of embedding and thus classified the host image to white and black textured regions. The logo image is then transformed using Arnold transform. Discrete Wavelet Transform (DWT) technique is employed for embedding the transformed logo into the white textured regions. Watermark extraction is done by entering the same key which was already entered during embedding. The system is secure and the logo is imperceptible within the host image. Finally for analysis, PSNR value has been used as a metric for determining the quality of the recovered image
    corecore