4 research outputs found

    Video Steganography Techniques: A Survey

    Get PDF
    In digital world, information security is the major issue in digital communication on a network from the third party hackers. Steganography techniques play an important role in information security. These are the secure techniques, used for concealing existence of secret information in any digital cover object viz. image, audio, video files. In last several decades, significant researches have been done on video and image steganography techniques because data embedding and data extraction is very simple. However, many researchers also take the audio file as a cover object where robustness and undetectability of information is very difficult task. The main objective of steganography is hiding the existence of the embedded data in any digital cover object. Steganography technique must be robust against the various image-processing attacks. Nowadays, video files are more accepted because of large size and memory requirements. This paper intends to provide a survey on video techniques and provide the fundamental concept of the steganography and their uses

    A Color Image Watermarking Scheme Based On QR Factorization, Logistic and Lorentz Chaotic Maps

    Get PDF
    Most of the existing color image watermarking schemes use grayscale or binary image as watermark because color image watermark has more data than grayscale or binary watermark. Therefore, it is a challenging issue to design a color image-watermarking scheme. This paper proposes a novel color image watermarking scheme to embed color image watermark into color host image. In watermarking schemes, first divide the host and watermark image into non-overlapping blocks, apply the Discrete Cosine Transformation (DCT) on each blocks of both watermark, and host image. After that QR Factorization, apply on the each blocks of watermark. In this paper, Logistic and Lorentz chaotic maps are usedfor estimating the embedding strength and location. The experimental results reveal that this watermarking scheme is robust against different image processing attacks viz. cropping, contrast adjustment and coloring

    Secure watermarking scheme for color DICOM images in telemedicine applications

    Get PDF
    Teleradiology plays a vital role in the medical field, which permits transmitting medical and imaging data over a communication network. It ensures data reliability and provides convenient communication for clinical interpretation and diagnostic purposes. The transmission of this medical data over a network raises the problems of legal, ethical issues, privacy, and copyright authenticity. The copyright protection of medical images is a significant issue in the medical field. Watermarking schemes are used to address these issues. A gray-level or binary image is used as a watermark frequently in color image watermarking schemes. In this paper, the authors propose a novel non-blind medical image watermarking scheme based on 2-D Lifting Wavelet Transform (LWT), Multiresolution Singular Value Decomposition (MSVD), and LU factorization to improve the robustness and authenticity of medical images. In this scheme, multiple color watermarks are embedded into the colored DICOM (Digital Imaging and Communications in Medicine) images obtained from Color Doppler images (DICOM format), and the average results achieved by our proposed scheme is 46.84 db for Peak Signal-to-Noise Ratio (PSNR), 37.46 db for Signal-to-Noise Ratio (SNR), 0.99 for Quality of Image and 0.998 for Normalized Correlation for various image processing attacks. These results make our watermarking technique an ideal candidate for medical image watermarking
    corecore