19 research outputs found

    Watermark Compression in Digital Medical Image Watermarking

    Get PDF
    Large size data not only require more storage space but also require more transmission time in communication environment. Mostly this obstacle exists in every type image communication process such as in satellite and distributed health facilities provision applications. Data compression causes reduction in storage space and communication time. Data compression is divided into two main categories, lossy and lossless. Although in lossy compression the compression ratio is higher than lossless but mostly important part of data is lost. During data lossless compression important data is not lost and only size reduction taking place. Teleradiology is a health promoting technology used to share medical images among different experts located apart from each other to analyze the image data for patient better treatment and surgical planning. Medical image data is very sensitive data and need its compression without any loss otherwise it will result in erroneous input into health recovery process. This paper focuses on Ultrasound medical image lossless compression using different techniques. PNG, GIF, JPG, JPEG2000 version j2c, JPEG2000 version jp2 in lossless mode techniques were used for this purpose as shown in table 1. The techniques were compared based on compression ratio, time taken during compression and PNG was found the best one. The selected technique is suggested to be used for digital watermarking of Ultrasound medical images. Our consideration is US images because US images are small in sizes as compared to images produced by other modalities and most of information is located in the central part of the image known as Region of Interest (ROI). The rest of the image other than ROI is known as Region of Non Interest (RONI). The main purpose of image compression is the removal of redundant data in such a way that it can be reversed to their original version for the desired operations [Vilas H. Gaidhane et al, 2011]

    Importance of Watermark Lossless Compression in Digital Medical Image Watermarking

    Get PDF
    Large size data requires more storage space, communication time, communication bandwidth and degrades host image quality when it is embedded into it as watermark. Lossless compression reduces data size better than lossless one but with permanent loss of important part of data. Data lossless compression reduces data size contrast to lossy one without any data loss. Medical image data is very sensitive and needs lossless compression otherwise it will result in erroneous input for the health recovery process. This paper focuses on Ultrasound medical image region of interest(ROI) lossless compression as watermark using different techniques; PNG, GIF, JPG, JPEG2000 and Lempel Ziv Welsh (LZW). LZW technique was found 86% better than other tabulated techniques. Compression ratio and more bytes reduction were the parameters considered for the selection of better compression technique. In this work LZW has been used successfully for watermark lossless compression to watermark medical images in teleradiology to ensure less payload encapsulation into images to preserve their perceptual and diagnostic qualities unchanged. On the other side in teleradiology the extracted lossless decompressed watermarks ensure the images authentication and their lossless recoveries in case of any tamper occurrences

    Analysis of File Carving Approaches : A Literature Review

    Get PDF
    Home Advances in Cyber Security Conference paper Analysis of File Carving Approaches: A Literature Review Nor Ika Shahirah Ramli, Syifak Izhar Hisham & Gran Badshah Conference paper First Online: 01 January 2022 1262 Accesses 2 Citations Part of the Communications in Computer and Information Science book series (CCIS,volume 1487) Abstract Digital forensics is a crucial process of identifying, conserving, retrieving, evaluating, and documenting digital evidence obtained on computers and other electronic devices. Data restoration and analysis on file systems is one of digital forensic science’s most fundamental practices. There is a lot of research being done in developing file carving approaches and different researches focused on different aspects. With the increasing numbers of literature that are covering this research area, there is a need to review this literature for further reference. A review is carried out reviewing different works of literature covering various aspects of carving approaches from multiple digital data sources including IEEE Xplore, Google Scholar, Web of Science, etc. This analysis is done to consider several perspectives which are the current research direction of the file carving approach, the classification for the file carving approaches, and also the challenges are to be highlighted. Based on the analysis, we are able to state the current state of the art of file carving. We classify the carving approach into five classifications which are general carving, carving by specific file type, carving by structure, carving by the file system, and carving by fragmentation. We are also able to highlight several of the challenges for file carving mentioned in the past research. This study will serve as a reference for scientists to evaluate different strategies and obstacles for carving so that they may choose the suitable carving approaches for their study and also future developments

    Statistical modeling for prediction of diabetes in Malaysians

    Get PDF
    Type II Diabetes Mellitus is one of the silent killer diseases worldwide. According to the World Health Organization, 347 million people are suffering from diabetes throughout the world. To overcome the sharp rise in the disease, various diagnostic or prediction models were developed through various techniques such as artificial intelligence, classification and clustering, pattern recognition and statistical methods. The study led to the related open issues of identifying the need of a relation between the major factors that lead to the development of diabetes. This is possible by investigating the links found between the independent and dependant variables in the dataset. This paper investigates the effect of binary logistic regression applied on a dataset. The results show that the most effective method was the enter method which gave a prediction accuracy of almost 93%

    Watermarking of single and multi frame ultrasound medical images

    Get PDF
    Digital communication of medical images may cause image manipulation for non-mandatory purposes. The originality of single and multi-frame medical images is strictly required to be used for patient health recovery. Watermarking is one of the latest security techniques, which can be used for protection of digital images. This dissertation has focused on watermarking of grayscale eight bits single and multi-frame ultrasound medical images. Watermarking of a medical image with heavy payload causes image degradation and directly affects patient diagnosis. Therefore, watermark must be lossless compressed to reduce its size without data loss. In the past Lempel-Ziv Welch (LZW) has been used for text, image pixel data lossless compression and in this research we extend this technique to binary watermark lossless compression to enhance the performance of region based watermarking techniques. In region based watermarking, an image is divided into region of interest (ROI) and region of non-interest (RONI). LZW compressed watermark based, a new region based watermarking scheme, tamper detection and recovery watermarking of medical images (TDARWMI) is developed. Produced results of the scheme are compared with those of other watermarking schemes and are found better in compression ratio, PSNR of watermarked and recovered images. In region based watermarking schemes, the tamper detection and recovery is restricted to ROI, while rest of the image remains under security threats. Possible wrong selection of ROI is another limitation of region based watermarking schemes. Non-proper selection of ROI may create problems during recovery at destination and can affect the required analysis. Therefore, another watermarking scheme, whole image authentication, tampers detection, localization and complete recovery (WIATDACR) is developed to provide security to a complete image. The LZW compressed watermark is embedded into image’s ROI and RONI parts randomly. At destination, watermark is extracted and used for image authentication, tampers detection, localization and lossless recovery. This scheme can locate tampers occurred at any part of image and can perform recovery without data loss. The signature based security technique of DICOM multi-frame images has deficiency in tamper detection and recovery. Multi-frame image authentication, tamper detection, localization and recovery (MFATDLAR) watermarking scheme is formulated to facilitate a DICOM image’s frame-wise authentication, tamper detection and lossless recovery. In this scheme the watermark of every frame is prepared, compressed and encapsulated into respective frame’s RONI part. At destination the extracted watermark is used for the frame’s authentication, tamper detection, localization and lossless recovery

    Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey

    Get PDF
    Energy efficiency of mobile devices is paramount after the tremendous advancement in technology while the explosion of smart mobile applications such as, YouTube, Facebook, Twitters and Google maps makes Smart Internet Devices (SIDs) the first choice of communication. On the other hand, multiple sensors and wireless interfaces drain battery swiftly, thus reducing the operational time of SIDs. Therefore, extending battery life problem has become of crucial research importance, at hardware and software levels, both alike. This paper firstly, makes contribution by reviewing different techniques at software level used to enhance battery life of SIDs in particular Smartphones. At the end, suggestions and opinions related to energy efficiency of SIDs are given, based on the comparative studies

    Mobile cloud computing & mobile's battery efficiency approaches: A review

    Get PDF
    Today, millions of users worldwide experience pervasive email and Web access through IPhones, Black Berries, Windows Mobile, and other mobile devices (Laptops, PDAs). After information at the fingertip, energy efficiency of these devices is paramount which makes the devices first choice of communication for the new generation. On the other hand, Mobile Devices, especially smartphones has limited resources such as, storage, network bandwidth, processor’s performance and battery life. Moreover multiple sensors and wireless interfaces drain battery swiftly, thus reducing the operational time. Therefore, extending battery life of these devices has become of crucial research importance at hardware and software levels, both alike. This paper provide an overview of the software side by summarizing the background, techniques of battery augmentation, and on-going research on computational offloading to remote servers (Cloud); sending heavy computation to remote servers and receiving the result back on mobile screen. At the end, summary of the previous research work on computational offloading discussed with a critical analysis. Moreover, suggestions and opinions related to energy efficiency of SIDs given, based on the comparative studies

    Tamper Localization and Recovery Medical Image Watermarking: A Review

    Get PDF
    Digital imaging technology development has improved the health care system, particularly improving digital medical imaging system used in the patient diagnoses, treatment and surgery. The remote access of digital medical images is also known as teleradiology, is an important unit of modern electronic health (eHealth) care system. Teleradiology is facing secrecy, fraud, misuses and security problems which encourage unauthorized users for copying, distributing and tampering images. Image tampering is one of the serious issues in hospital information system (HIS) based on online radiology information system (RIS) and picture archive and communication system (PACS). Medical decisions made on the basis of tampered images while diagnosing a patient can cause a non-recoverable loss. Watermarking technique is one of the best solutions to overcome this problem to locate and recover the tempered image in its original version before making any decision. This paper presents a survey of available important literature on digital image watermarking

    Watermarking of Ultrasound Medical Images in Teleradiology Using Compressed Watermark

    Get PDF
    The open accessibility of Internet-based medical images in teleradialogy face security threats due to the nonsecured communication media. This paper discusses the spatial domain watermarking of ultrasound medical images for content authentication, tamper detection, and lossless recovery. For this purpose, the image is divided into two main parts, the region of interest (ROI) and region of noninterest (RONI). The defined ROI and its hash value are combined as watermark, lossless compressed, and embedded into the RONI part of images at pixel’s least significant bits (LSBs). The watermark lossless compression and embedding at pixel’s LSBs preserve image diagnostic and perceptual qualities. Different lossless compression techniques including Lempel-Ziv-Welch (LZW) were tested for watermark compression. The performances of these techniques were compared based on more bit reduction and compression ratio. LZW was found better than others and used in tamper detection and recovery watermarking of medical images (TDARWMI) scheme development to be used for ROI authentication, tamper detection, localization, and lossless recovery. TDARWMI performance was compared and found to be better than other watermarking schemes

    Taxonomy of Computational Offloading in Mobile Devices

    Get PDF
    The ability of cloud computing to provide almost unlimited storage, backup and recovery, and quick deployment contributes to its widespread attention and implementation. Cloud computing has also become an attractive choice for mobile users as well. Due to limited features of mobile devices such as power scarcity and inability to cater computation intensive tasks, selected computation needs to be outsourced to the resourceful cloud servers. However, there are many challenges which need to be addressed in computation offloading for mobile cloud computing such as communication cost, connectivity maintenance and incurred latency. This paper presents taxonomy of the computation offloading approaches which aim to address the challenges. The taxonomy provides guidelines to identify research scopes in computation offloading for mobile cloud computing. We also outline directions and anticipated trends for future research
    corecore