Javascript must be enabled to continue!
Reversible and Fragile Watermarking for Medical Images
View through CrossRef
A novel reversible digital watermarking technique for medical images to achieve high level of secrecy, tamper detection, and blind recovery of the original image is proposed. The technique selects some of the pixels from the host image using chaotic key for embedding a chaotically generated watermark. The rest of the pixels are converted to residues by using the Residue Number System (RNS). The chaotically selected pixels are represented by the polynomial. A primitive polynomial of degree four is chosen that divides the message polynomial and consequently the remainder is obtained. The obtained remainder is XORed with the watermark and appended along with the message. The decoder receives the appended message and divides it by the same primitive polynomial and calculates the remainder. The authenticity of watermark is done based on the remainder that is valid, if it is zero and invalid otherwise. On the other hand, residue is divided with a primitive polynomial of degree 3 and the obtained remainder is appended with residue. The secrecy of proposed system is considerably high. It will be almost impossible for the intruder to find out which pixels are watermarked and which are just residue. Moreover, the proposed system also ensures high security due to four keys used in chaotic map. Effectiveness of the scheme is validated through MATLAB simulations and comparison with a similar technique.
Title: Reversible and Fragile Watermarking for Medical Images
Description:
A novel reversible digital watermarking technique for medical images to achieve high level of secrecy, tamper detection, and blind recovery of the original image is proposed.
The technique selects some of the pixels from the host image using chaotic key for embedding a chaotically generated watermark.
The rest of the pixels are converted to residues by using the Residue Number System (RNS).
The chaotically selected pixels are represented by the polynomial.
A primitive polynomial of degree four is chosen that divides the message polynomial and consequently the remainder is obtained.
The obtained remainder is XORed with the watermark and appended along with the message.
The decoder receives the appended message and divides it by the same primitive polynomial and calculates the remainder.
The authenticity of watermark is done based on the remainder that is valid, if it is zero and invalid otherwise.
On the other hand, residue is divided with a primitive polynomial of degree 3 and the obtained remainder is appended with residue.
The secrecy of proposed system is considerably high.
It will be almost impossible for the intruder to find out which pixels are watermarked and which are just residue.
Moreover, the proposed system also ensures high security due to four keys used in chaotic map.
Effectiveness of the scheme is validated through MATLAB simulations and comparison with a similar technique.
Related Results
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
The widespread utilization of mobile devices and the proliferation of video content, facilitated by communication networks, has unfortunately led to issues such as data piracy, ill...
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Abstract
In view of dual watermarking algorithm for dual two value image watermarking, the watermark information there is a gray image watermarking in the expression...
Digital Watermarking for Multimedia Transaction Tracking
Digital Watermarking for Multimedia Transaction Tracking
This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are su...
A Robust Digital Speech Watermarking Based on Least Significant Bit
A Robust Digital Speech Watermarking Based on Least Significant Bit
Watermarking is a technique to ensure the original information and to validate the digital content. Watermarking is required because of the rise in the utilization of the internet ...
Reversible Watermarking Authentication Algorithm For Color Images Based On Compressed Sensing
Reversible Watermarking Authentication Algorithm For Color Images Based On Compressed Sensing
Abstract
Aiming at the shortcomings of existing reversible watermarking for image authentication, such as poor ability of tamper detection and localization, and low ...
Robust Digital Image Watermarking in YCbCr Color Space using Hybrid Method
Robust Digital Image Watermarking in YCbCr Color Space using Hybrid Method
The image watermarking is widely used to provide the security. This paper provides the conceptual framework on image watermarking which is widely used for security purpose within t...
APLIKASI WATERMARKING DENGAN ALGORITMA AES UNTUK PEMBERIAN DATA HAK CIPTA PADA FILE AUDIO
APLIKASI WATERMARKING DENGAN ALGORITMA AES UNTUK PEMBERIAN DATA HAK CIPTA PADA FILE AUDIO
Watermarking audio files has recently become the attention focus. This is primarily due to faster data transmission rates on the Internet, which has allowed the often illegal pr...
Geometric Distortions Correction Using Image Moment in Image Watermarking
Geometric Distortions Correction Using Image Moment in Image Watermarking
This chapter presents a method for detecting and recovering geometrical attacks in digital watermarking by making use of geometric moments of the original images. Digital image wat...

