An Enhanced Digital Image Watermarking Scheme for Medical Images using Neural Network, DWT and RSA

Автор: Sujata Nagpal, Shashi Bhushan, Manish Mahajan

Журнал: International Journal of Modern Education and Computer Science (IJMECS) @ijmecs

Статья в выпуске: 4 vol.8, 2016 года.

Бесплатный доступ

Image watermarking is the process of the hiding the one image into other image for the copyright protection. The process of watermarking must be done in this way that the pixels of the original image must remain in its original HD form. A lot of work has been done in this context in previous years but some techniques have their own applications, drawbacks as well as advantages. So, this paper will utilize three techniques i.e. Discreet Wavelet Transform (DWT), Neural Network (NN) and RSA encryption for image watermarking. In the end the performance of the proposed technique will be measured on the basis of PSNR, MSE, BCR, BER and NCC in MATLAB R2010a environment.

Еще

Digital Image watermarking, DWT, Neural Network, Encryption, RSA

Короткий адрес: https://sciup.org/15014857

IDR: 15014857

Текст научной статьи An Enhanced Digital Image Watermarking Scheme for Medical Images using Neural Network, DWT and RSA

Published Online April 2016 in MECS DOI: 10.5815/ijmecs.2016.04.06

Digital form products like video, audio, text etc. are being transmitted in everyday of our lives [1, 2]. In the field of digital multimedia communication, some techniques has helped a lot for storing, editing and accessing of these products [3]. But, security during the transferring communication is very crucial. As lack of security leads to the loss in property rights. So to solve this problem, digital watermarking is very good [4]. Fig. 1 shows the progression of watermark embedding. Digital watermarking is the process of embedding an image with secret data for the communication. The embedded image can only be extracted by person who has authentication.

Fig.1. Watermark embedding process

There are two types of image watermarking, one is blind and the other one is non-blind. In blind image watermarking, there is no requirement of original content and it is also called as public image watermarking. In non-blind image watermarking, there is requirement of original content and it is also known as private image watermarking.

  • A.    Medical Images

The amount of digital images in the internet has been increasing day by day. The need of secure diagnosis in the medical field is very necessary. As these days transmission of images has become common, so security is needed at high rate.

Medical images are used to view tissues, organs or body parts of a person. These images are used for disease diagnosis and treatment of the disease. Medical images play a major role in the classification of diseases. These are also helpful in monitoring disease activity. Several machines are accessible today that can generate images of internal organs of a person. There are different types of imaging methods such as x-ray, ultrasound, MRI scans, CT scans, Nuclear medicine scans etc [16]. Electromagnetic waves are also called x-rays. X-rays are the common form of medical imaging. X-rays are passed through the body of a person to produce images of internal structure of body. X-rays are commonly used for checking swallowed objects, blood vessels, broken bones etc. Ultrasound is also known as medical sonography. Sound waves are used in this method to check internal organs. It is used in pregnancy or to check organs in abdomen and pelvis etc. MRI stands for Magnetic Resonance Imaging. Radio waves and magnetic field are used in this method so that organs and tissues of the body can viewed in much more detail. It is useful to check spinal injuries, abnormal tissues, blood vessels etc. CT scans are similar to X-rays but in this technique, multiple X-rays are projected from different angles to obtain a 3-D view of different organs. Medical images must be taken care of to confirm the identity as all diagnose depends on the obtained medical image. In order to fulfill the security and convenience issues of the patients watermarking is used in this field.

  • B.    Noise and Distortions

K = imnoise(O,'localvar',B) (1)

It adds zero-mean, Gaussian white noise of local variance B to the image O. B is an array of the same size as O. Rotation attack is the most common attack that has been found these days in an image. The obtained image is rotated through several angles like 90 degree, 180 degree and 360 degree [8].

In this paper, a new method is proposed in which encrypted watermark is embedded in the medical image by using DWT and Neural Network approach. Section II describes previous work done in this field. Section III describes the techniques used in proposed work. Section IV describes the stimulation model. Results and comparisons are presented in section V. Finally, section VI describes conclusion and future scope [17].

  • II.    Related Works

Digital watermarking is an outstanding field of research. A lot of researchers have proposed large number of algorithms in this field. The main purpose of all these algorithms is to provide imperceptibility and robustness against different attacks. Several types of watermarking techniques found in the academic literature are presented in this section.

Saxena, P. et al. [12] proposed a method for watermarking based on the usage of the SVD-DWT. The main advantage of this method is that it is robust to various types of attacks. In proposed work the watermark is embedded in high frequency band by SVD. Kaur, R. et al. [14] presented the new watermarking algorithm based on the usage of DWT-SVD techniques. In proposed work 4 sub-bands will be obtained using DWT and then watermarking will be done using Singular Value Decomposition method. From experiments it has been concluded that proposed method has better efficiency. Sridevi, T. et al. [15] proposed the watermarking method in which instead of taking an original image a reference image has been taken. Then with the help of fuzzy logic the image is watermarked in the reference image. Here use of fuzzy logic is done to embed the image and the use of SVD is done to enhance the embedding process after the application of DWT for the decomposition of an image into 4 levels. In the end results are performed using NCC and PSNR metrics.

Koley, S. et al. [16] proposed a new type of information hiding ability in biomedical images by using the combination of cryptography and digital watermarking to attain the improvement in confidential and authenticated data storage and secured transmission. They use patient’s name and doctor’s name as patient’s information and it is encrypted using cryptography and embedded in the patient image by using watermarking. Higher order bit LSB replacement technique is used for embedding the information and RSA is used for encryption. The private keys are also embedded in the cover image to have enhanced security and precise recovery of the concealed information. The outcome of the proposed methodology shows that the concealed information doesn‘t influence the cover image and it can be recovered efficiently even from several noisy images. The strength of the proposed embedding scheme is also supported by numerous image quality matrices. Solanki, N. et al. [17] proposed an algorithm in which work is divided in two main stages; initially image is divided into two parts: Region of Interest i.e. defined as informational piece of image and Region of Non Interest i.e. defined as non-informational piece. They have used Region of Non Interest to conceal the data so that the informational part of the image remains protected. RSA is used for encryption of watermark. A Discrete Wavelet Transform based approach is utilized for embedding the encrypted data in Region of Non Interest part of image for improving data security. The experimental result demonstrates that watermark embedded by the proposed algorithm gives better security and can survive successfully under different attacks.

Anita, et al. [18] presented a review on watermark coding and decoding technique for image security. DWT technique is utilized for coding as DWT have broad range of functionalities. Two images are used, one as a host image and second as a watermark image. Then the image is extracted to retrieve the watermark image. This all is done under DWT technique. They basically evaluate the DWT technique, its improvement, and its challenges and also result are analyzed on MATLAB tool by computing SSIM, PSNR and SSR values of extracted image. Sridhar, S. et al. [19] combine the features of watermarking, image encryption in addition to image steganography to give consistent and protected data transmission .The fundamentals of data hiding and encryption are enlightened. The initial step entails inserting the mandatory watermark on the image at the best possible bit plane. The next step is to utilize RSA hash to encrypt the image. The last step entails attaining a cover image and hiding the encrypted image inside this cover image. A set of metrics will be used for evaluation of the effectiveness of the digital watermarking. The list incorporates Mean Squared Error, Peak Signal to Noise Ratio and Feature Similarity.

Venkatram, N. et al. [20] proposed an algorithm for authentication of medical images. Medical images restrain extremely susceptible information. Watermarking medical images entail cautious amendments protecting the data in the images. RSA algorithm is used for encryption and decryption of patient image. Medical images like MRI, CT and Ultrasound scans of body parts of patients are used as a cover image. 2D DWT (Discrete Wavelet Transform) is used to watermark the encrypted patient image. The medical cover image and watermark image are transformed into wavelet domain and are diverse using two scaling factors alpha as well as beta. At last these watermarked medical images are passed on through the internet in conjunction with the secret key which will be used for decryption. On the receiving end the embedded encrypted watermark is extracted using 2D DWT and decryption key. The robustness of the projected watermarking techniques is tested with various attacks on the watermarked medical images. Peak-Signal-to-Noise ratios (PSNR) and Normalized cross correlation (NCC) coefficients are computed to access the eminence of the watermarked medical images and extracted patient images. The results are evaluated for three types of medical images with one patient image watermarks using single key by using four wavelets (haar, db, symlets, bior) on four diverse levels (1,2,3,4).

  • III.    Tecniques Used in Proposed Work

  • A.    Discrete Wavelet Transform (DWT)

The discrete wavelet transform is a valuable way designed for signal exploration as well as picture handling, chiefly in multi-resolution description. It can crumble signal into different components in the frequency sphere. It divides an image into 4 sub-bands i.e. HL, HH, LH and LL. One-dimensional discrete wavelet transform (1-D DWT) decomposes an input into two components (the average component and the detail component). The 2-dimensional (2-D) DWT distributes an input picture into four type of sub-bands, single average component (LL) and three detail components (LH, HL, HH) as shown in Fig. 3.

Fig.3. DWT second level decomposition

The utilization of wavelets is done mainly for the denoising of an image or to decompose the image into its constituent forms [11, 12]. Detailed has LL and LH. Image consists of pixels that are arranged in two dimensional matrix, each pixel represents the digital equivalent of image intensity. DWT transforms the spatial domain into frequency domain. Below equations shows the mathematical portion of a discrete signal:

g 1[ n 1] =

M 1

W 1 φ [ j 1 0 , k 1] φ 1 j 0, k [ n 1] + k 1

1              W 1 ψ [ j 1, k 1] ψ 1 j , k [ n 1]

M 1 j 1 = j 1 o k 1

h ere , g 1[ n 1], φ 1 j 1 o , k 1 [ n 1] and ψ 1 j 1, l 1 are discrete functions which are defined in [0, M-1], totally M1 points. For the reason that the sets {ϕ1 j1o,k1 [n1]} k1ƐC and {ψ1 j1,k1 [n1]} (j1,k1)ƐC1 2 ,j1≥k1o , are orthogonal to each other.

  • B.    RSA Algorithm

    RSA stands for Rivest, Shamir and Adelman. It turned out 1st for sale in 1978 among the 1st public key cryptographic programs. RSA can be used pertaining to key alternate along with digital signatures. Currently, RSA is generally utilized to encrypt your procedure key useful for secret key encryption (message integrity) or message's hash value (digital signature). It is the most widely used algorithm in the world for cryptography. It can be used for public key cryptography as well as digital signatures. In this, Party A send the message to party B without prior knowledge to party B then using decrypt key B can extract and read the message sent by party A.

Within cryptography, RSA is an algorithm pertaining to public key cryptography. The particular RSA algorithms entail the application of two keys. A public key which is often known by everyone, in addition to enable you to encrypt statement. A private key, acknowledged simply because of the receiver, in addition utilizing to decrypt communication. To produce a great RSA public/private key match, there are some principle measures:

Step 1: Opt for two prime numbers, p1 as well as q1. Commencing these numbers we can compute the modulus, n=p1*q1.

Step 2: Choice a third number, e, which is reasonably prime to (i.e., it doesn’t distribute uniformly into) the product (p1-1) (q1-1). The number e may be the public exponent.

Step 3: Compute an integer d through the quotient (ed-1)/ [(p 1 -1) (q 1 -1)]. The number d may be the private exponent.

Step 4: Compute an integer d through the quotient (ed-1)/ [(p 1 -1) (q 1 -1)]. The number d may be the private exponent.

Step 5: The public key may be the number pair (n, e). Although these kinds of valuations are generally widely acknowledged, it truly is computationally infeasible to discover d from n addition to e if p1 in addition to q1 are generally big enough.

To encrypt a communication message, M, while using the public key, build your cipher text, C, while using the equation:

C = Me mod n (3)

The receiver after that decrypts your cipher text while using private key using the equation:

M = Cd mod n (4)

  • C.    Neural Network

The Back Propagation neural network is artificial neural network based on error back propagation algorithm. The Back Propagation (BP) neural network model consists of an input layer, more or less hidden layers as well as an output layer. Each connection connecting neurons has a distinctive weighting value. In training the network, the nodes in the BP neural network obtain input information from exterior sources, and then go by to hidden layer which is an interior information processing layer and is answerable for the information conversion, and then the nodes in the output layer supply the required output information. After that, the back-propagation of error is transported by distinct the actual output with wanted output.

BP neural network consists of many neurons that are arranged in a form of three layers: input, hidden and output. The neurons are linked by weights W y In training the network with a given architecture, the back propagation approach, finds a single best set weight values by minimization of suitable error function. In a multi-layer feed forward neural network, the processing elements are arranged in layers and only the elements in adjacent layers are connected. It has a minimum of three layers of elements (i.e., input layer, the middle or hidden layer, and the output layer).

The name “back propagation” (BP) derives from the fact that computations are passed feed forward from the input layer to the output layer, resulting which computed errors are broadcasted back in other direction to change the weights to obtain a better performance. BP algorithm is an extension of the least mean square algorithm that can be used to train multi-layer networks.

Once the network weights and biases are preliminary, the linkage is prepared for training. The preparation process necessitates a group of instances for proper network behavior, such as network inputs p and destination outputs t. For the duration of training the weights as well as biases of the network are iteratively adjusted to minimize the network performance function. The number of hidden layer is always difficult to determine in ANN creation. It is generally agreed that one hidden layer is sufficient for most of purposes. In the present study, only 1 hidden layer will, thus, be used in the BP network for simplicity.

Neural network consists of various no. of neurons and their working is similar to the brain neuron structure. There are various types of neural networks but commonly used neural network is Back Propagation Neural network [14]. The normal Back propagation is the mainly applied to train Multilayer FNN.

  • IV.    Stimulation Model

The proposed idea will be implemented in MATLAB which is extensively utilized in all regions of applied mathematics, in education as well as research by universities, and in the industry. The flowchart for proposed work is shown in Fig. 4. The methodology of proposed work is given as:

Fig.4. Flowchart of proposed work

  • A.    Training Panel

Initially images are uploaded for Training. After that calculation of image bits has done. Now the lower and upper DWT values are calculated. Load DWT values for training and after that training is done using Neural

Network. Fig. 5 shows the Neural Network training process.

  • B.    Testing Panel

In testing panel, initially cover image is uploaded. After that watermark image is uploaded. Now implementation of RSA will be done to encrypt watermark. The encrypted watermark is embedded in cover image.

Fig.5. Neural Network training process

  • C.    Extraction Panel

In extraction panel, watermarked image is uploaded and neural network is applied to obtain extracted watermark. In the end parameter evaluation will be done using five metrics i.e. PSNR, MSE, BCR, BER and NCC.

  • V.    Results and Discussions

In this section, experimental results of the proposed algorithm are evaluated. The imperceptibility and robustness are evaluated by using different parameters and different attacks are applied to test the robustness of the proposed algorithm.

  • A.    Results

    The proposed scheme is implemented in MATLAB 7.10.0 (R2010a). The proposed scheme is tested on six gray scale and six colored medical images with size 512×512. A gray scale watermark of size 64×64 is used. The performance of the proposed scheme is evaluated on the basis of PSNR, MSE, NCC, BER and BCR. These parameters are used to check the quality of the watermarked image. Different attacks are applied on the watermarked image to check the robustness. Table 1 show the gray scale watermarked medical images and watermarked medical images with different attacks. Different parameters are evaluated for watermarked

image and watermarked image with different attacks to check the imperceptibility and robustness of the proposed algorithm. Similarly, table 2 shows the colored watermarked medical images and watermarked medical images with different attacks. Different parameters are evaluated for watermarked image and watermarked image with different attacks to check the imperceptibility and robustness of the proposed algorithm.

Table 1. Experimental results of gray scale medical images

WATERMARKED IMAGE

PARAMETERS

WATERMARKED IMAGE WITH ATTACKS

PARAMETERS

MSE =0.2899

** h -^—^ — *V*i A •

Q p

MSE =0.5687

"^ »ta—», ^----"t**^/.

PSNR =54.5382

PSNR =51.7634

BER =0.3298

BER =0.2663

BCR =4.6129

BCR =4.9221

NCC =0.9985

NCC =0.9941

Hi

MSE =0.4676

4?

Z

(ZI s 4?

MSE =0.6953

PSNR =52.9416

PSNR =50.4185

BER =0.5589

BER =0.5812

BCR =5.0266

BCR =5.1838

NCC =0.9955

MSE =0.4219

NCC =0.9964

MSE =0.5198

w^^l

PSNR =53.9430

PSNR =52.8832

BER =0.3827

BER =0.4453

BCR =5.0484

BCR =5.3625

NCC =0.9942

NCC =0.9940

MSE =0.5064

■ ^VsWlB' ■

(Z)

Z

MSE =0.6368

PSNR =51.8941

PSNR =50.5347

BER =0.6570

BER =0.6609

BCR =4.8782

BCR =5.3688

NCC =0.9901

NCC =0.9929

MSE =0.5301

. *?W V

/ ;           - ^. .:

0

MSE =0.6120

PSNR =52.6875

PSNR =51.3476

BER =0.6736

BER =0.4624

BCR =5.0112

BCR =5.0881

NCC =0.9969

NCC =0.9948

@^

M

MSE =0.5124

&?

у

MSE =0.5899

PSNR =52.1182

PSNR =51.4627

BER =0.5172

BER =0.5358

BCR =5.0486

BCR =5.0314

NCC =0.9914

NCC =0.9919

Table 2. Experimental results of colored medical images

WATERMARKED IMAGE

PARAMETERS

MSE =0.2885

PSNR =54.5670

BER =0.3298

BCR =4.6115

NCC =0.9915

MSE =0.5828

PSNR =51.6083

BER =0.5593

BCR =5.1417

NCC =0.9985

MSE =0.4642

PSNR =53.1430

BER =0.3829

BCR =5.0907

NCC =0.9973

WATERMARKED IMAGE WITH ATTACKS

PARAMETERS

MSE =0.6393

PSNR =51.0726

BER =0.2666

BCR =4.9927

NCC =0.9928

MSE =0.7084

PSNR =50.8047

BER =0.5842

BCR =5.2331

NCC =0.9958

MSE =0.5807

PSNR =50.9606

BER =0.5779

BCR =4.9292

NCC =0.9988

MSE =0.3047

PSNR =54.7452

BER =0.5290

BCR =4.7648

NCC =0.9955

MSE =0.5874

PSNR =51.4436

BER =0.5940

BCR =5.2307

NCC =0.9956

MSE =0.5831

PSNR =51.4919

BER =0.4292

BCR =5.4859

NCC =0.9926

MSE =0.5742

PSNR =52.0150

BER =0.6738

BCR =5.2506

NCC =0.9945

MSE =0.6667

PSNR =50.6501

BER =0.4588

BCR =5.1949

NCC =0.9937

MSE =0.7561

PSNR =49.9271

BER =0.6155

BCR =5.3961

NCC =0.9937

Without Noise

—■- With

Noise

Images

Fig.6. Graph of MSE values

Without

Noise

—•- With Noise

Images

Fig.7. Graph of PSNR values

Values of BER for different colored medical images are shown in Fig. 8. Imperceptibility of the proposed algorithm is evaluated on the basis of parameters of watermarked images and robustness of the proposed algorithm is evaluated on the basis of different attacks applied on these watermarked images. From the above graph, it can be observed that the values of BER for all images are between 0.2 and 0.7 and lesser value of BER gives enhanced results. This shows that the proposed scheme has good imperceptibility and robustness.

Values of BCR for different colored medical images are shown in Fig. 9. Different attacks are applied on the watermarked images to check the robustness of the proposed algorithm. This robustness ensures that the data can be transmitted securely despite various attacks they might be subjected to. The embedded watermark cannot be tampered easily by using different attacks. Imperceptibility is also important so that informational part of the image does not get distorted. From the above graph, it can be observed that the values of BCR for watermarked images and watermarked images with different attacks are between 4.6 and 5.6 and larger value of BCR gives improved results. This shows that the proposed scheme has good imperceptibility and robustness.

-■- With

Noise

Images

Without

Noise

Fig.10. Graph of NCC values

Values of NCC for different colored medical images are shown in Fig. 10. From the above graph, it can be observed that the values of NCC for all images are close to 1 and higher value of NCC gives enhanced results. This shows that the proposed scheme has good robustness.

  • B.    Comparison of Results

The comparison of existing scheme and proposed scheme is shown in table 3 [20]. The values of NCC for the proposed algorithm are higher than the existing method and higher value of NCC gives better results. These results demonstrate that the proposed scheme has more robustness.

Table 3. Comparison of results

Type of Attack

NCC (Existing Method)

NCC (Proposed Method)

Without Noise

0.9835

0.9985

Salt & Pepper Noise

0.6038

0.9959

Gaussian Noise

0.6061

0.9971

Rotation Attack

0.9653

0.9936

Fig. 11 shows the graph of NCC for existing and proposed method. It can be observed that the values of NCC for proposed method are higher than the existing method and values of NCC which are close to 1 gives better results. Therefore, the proposed algorithm gives enhanced results than the existing method.

Fig.11. Comparison of results

The comparison of existing scheme and proposed scheme is shown in table 4 [21]. Three medical images are used for testing and values of PSNR for all three images are higher than the existing method. These results demonstrate that the proposed scheme has more imperceptibility.

Table 4. Comparison of results

Type of Attack

PSNR (Existing Method)

PSNR (Proposed Method)

Image 1

42.48

56.96

Image 2

48.46

50.31

Image 3

42.52

50.85

Fig. 12 shows the graph of PSNR for existing and proposed method. It can be observed that the values of PSNR for proposed method are higher than the existing method. Therefore, proposed method gives enhanced results than the existing method because higher value of PSNR gives better results.

■PSNR (Exisitng)

■PSNR (Proposed)

Image 1

Image 2

Image 3

Fig.12. Comparison of results

The comparison of existing scheme and proposed scheme is shown in table 5 [21]. The values of PSNR for proposed method are higher than the existing method. These results demonstrate that the proposed scheme has more robustness and imperceptibility.

Table 5. Comparison of results

Type of Attack

PSNR (Existing Method)

PSNR (Proposed Method)

Without Noise

42.52

50.85

Salt & Pepper Noise

31.94

50.56

Gaussian Noise

30.03

50.34

Rotation Attack

35.87

50.32

Fig. 13 shows the graph of PSNR for existing and proposed method. It can be observed that the values of PSNR for proposed method gives enhanced results than the existing method because higher value of PSNR gives better results.

Fig.13. Comparison of results

  • VI.    Conclusion and Future Scope

In this paper, DWT is used to get low and high pass filter values. Then, training of images is done using Neural Network. RSA algorithm has been used for encryption of watermark to make it more secure. After that, embedding and extraction of watermark is done using Neural Network. Results are evaluated using five parameters such as PSNR, MSE, BCR, BER and NCC.

In future, hybridization of different techniques can be used to enhance results.

Acknowledgment

The authors wish thanks to all research experts of the Information Technology Department of CEC and Computer Science Department of CGC, Landran, Mohali, Punjab, India.

Список литературы An Enhanced Digital Image Watermarking Scheme for Medical Images using Neural Network, DWT and RSA

  • David J. Coumou, and Athimoottil Mathew, "A Fuzzy Logic Approach to Digital Image Watermarking", Rochester Institute of technology, Sept 2014.
  • G. Bhatnagar and R. Balasubramanian, "A New Robust Reference Watermarking Scheme Based on DWT-SVD", Computer Standards & Interfaces vol. 31, issue 5, Sept 2009, pp. 1002-1013, doi:10.1016/j.csi.2008.09.031.
  • J.L. Liu, D.C. Lou, M.C. Chang, H.K. Tso, "A Robust Watermarking Scheme Using Self-Reference Image", Computer standards and interfaces, vol. 28, issue 3, Jan 2006, pp. 356-367, doi:10.1016/j.csi.2005.07.001.
  • V. Gupta, A. Barve, "A Review on Image Watermarking and Its Techniques", International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), vol. 4, issue 1, January 2014, pp. 92-97.
  • M. Kaur and V. K. Attri, "A Survey on Digital Image Watermarking and Its Techniques" International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 8, no. 5, Sept 2015, pp. 145-150.
  • N. Divecha and N. N. Jani, "Implementation and Performance Analysis of DCT-DWT-SVD Based Watermarking Algorithms for Color Images", International Conference on Intelligent Systems and Signal Processing (ISSP), March 2013, pp.204-208, doi:10.1109/ISSP.2013.6526903.
  • Z. Yuefeng and L. Li, "Digital Image Watermarking Algorithms Based On Dual Transform Domain and Self-Recovery" International Journal On Smart Sensing And Intelligent Systems, vol. 8, no. 1, March 2015, pp. 199-219.
  • R. Verma and J. Ali, "A Comparative Study of Various Types of Image Noise and Efficient Noise Removal Techniques," International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), vol. 3, issue 10, October 2013.
  • B. Wang, J. Ding, Q. Wen, X. Liao and C. Liu, "An Image Watermarking Algorithm Based On DWT, DCT And SVD", IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC, Nov. 2009, pp.1034-1038, doi:10.1109/ICNIDC.2009.5360866.
  • C. C. Lai and C. C. Tsai, "Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition", IEEE Transactions on Instrumentation and Measurement, vol. 59, issue 11, Nov. 2010, pp. 3060 – 3063, doi:10.1109/TIM.2010.2066770.
  • Y. K. Jain and S. Tiwari, "An Enhanced Digital Watermarking for Color Image using Support Vector Machine" International Journal of Computer Science and Information Technologies (IJCSIT), vol. 2, no. 5, 2011, pp. 2233 – 2236.
  • P. Saxena, S. Garg and A. Srivastava, "DWT-SVD Semi-Blind Image Watermarking Using High Frequency Band", 2nd International Conference on Computer Science and Information Technology (ICCSIT), April 2012, pp. 28-29.
  • S. R. Anjum and P. Verma, "Performance Evaluation of DWT Based Image Watermarking Using Error Correcting Codes", International Journal of Advanced Computer Research, vol. 2, no. 4, Dec. 2012, pp.151-156.
  • R. Kaur, and S. Jindal, "Semi-Blind Image Watermarking Using High Frequency Band Based on DWT-SVD", 6th International Conference on Emerging Trends in Engineering and Technology (ICETET), Dec. 2013, pp.19-24, doi:10.1109/ICETET.2013.5.
  • T. Sridevi and S. S. Fatima, "Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD" International Journal of Computer Applications, vol. 74, no.13, July 2013, pp. 16-20.
  • S. Koley, K. Pal, G. Ghosh and M. Bhattacharya, "Secure Transmission and Recovery of Embedded Patient Information from Biomedical Images of Different Modalities through a Combination of Cryptography and Watermarking" International Journal of Image, Graphics and Signal Processing, March 2014, pp. 18-31, doi: 10.5815/ijigsp.2014.04.03.
  • N. Solanki and S. K. Malik, "ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security" International Journal of Modern Education and Computer Science, October 2014, pp. 40-48, doi:10.5815/ijmecs.2014.10.06.
  • Anita and Arachana, "Discrete Wavelet Transform Technique for Digital Image Watermarking: A Review" International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, issue 7, July 2015, pp. 495-498.
  • Sridhar, S., "A Comprehensive Approach to Image Watermarking, Encryption and Steganography" Canadian Center of Science and Education, vol. 8, no. 4, November 2015, pp. 32-39, doi: 10.5539/cis.v8n4p32.
  • N. Venkatram, L.S.S. Reddy, P.V.V. Kishore and CH. Shavya, "RSA-DWT Based Medical Image Watermarking for Telemedicine Applications" Journal of Theoretical and Applied Information Technology (JATIT), vol. 65, no. 3, July 2014, pp. 801-812.
  • B.L. Gunjal and S.N. Mali, "ROI Based Embedded Watermarking of Medical Images for Secured Communication in Telemedicine" International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 6, no.8, 2012, pp. 997-1002.
Еще
Статья научная