Download - Krest Technology

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Adaptive Lossless Medical Image Watermarking Algorithm Based
on DCT & DWT
This paper, presents a robust, secure and lossless digital image watermarking based on DWT and
DCT. The combined DWT-DCT algorithm embedded watermarks in original medical image. It
embeds watermark like patient's name, disease's name, hospital's name, and doctor's signature
into original medical image. This watermarking algorithm provides privacy of patient. Many
performance factors are considered to evaluate the performance parameters of the proposed
scheme. The performance evolution factors include PSNR, and measuring their correlation with
degradation of the whole image
1. INTRODUCTION
In the new era medical images are produced from a variety of imaging equipments, such as
Computed Tomography (CT), Magnetic Resonance Imaging (MRI), Positron Emission
Tomography (PET), Single Photon Emission Computed Tomography (SPECT), etc. CT can
clearly reflect the anatomical structure of bone tissues. SPECT can highlight the lesion of tissues
and organs to provide information about blood flow and temperature of body parts. PET
scanning can show blood flow, oxygen and glucose metabolism in the tissues of the brain. MRI
can clearly reflect the anatomical structure of soft tissues, organs and blood vessels. These
medical images can also be saved in a digital format
Electronic Patient Record (EPR) is one of the digital format of saving the personal details of
patient, details of diagnosis, hospital information along with the medical image for continual
monitoring. Telemedicine is the process by which electronic, visual and audio communications
are used to support practitioners at remote sites with diagnosis and consultation procedures, such
as remote clinical examinations and medical image transfers. Telemedicine is legally regulated
by laws and constraints regarding the access of data contained in Personal medical Files. The
transmit of medical transcriptions through online provides efficient clinical interpretation without
carrying the documents. The diagnosis needs confidentiality, availability, and reliability.
Confidentiality means that only the original users have access to the information. Availability,
guarantees access to medical information. Reliability is based on integrity that the information
has not been modified by unauthorized persons; and authentication intends that the information
belongs indeed to the correct patient
2. PROPOSED METHOD
3. SOFTWARE AND HARDWARE REQUIREMENTS

Operating system :
Windows XP/7.

Coding Language :
MATLAB

Tool
MATLAB R 2012
:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:

System
:
Pentium IV 2.4 GHz.

Hard Disk
:
40 GB.

Floppy Drive
:
1.44 Mb.

Monitor
:
15 VGA Colour.

Mouse
:
Logitech.

Ram
:
512 Mb.
4. CONCLUSION
A review of various watermarking embedding techniques have been done which
suits for medical images with higher embedding capacity and higher imperceptibility with which
it can withstand against attacks as well. Since no compromise can be made on the fidelity criteria
of the medical images appropriate transforms for medical image could be identified and
incorporated to bring an optimal embedding of diagnosed data in medical images. Analysis of
various detection algorithm also has been done for medical images which was optimized using
suitable genetic algorithm
REFERENCES
1. Potdar, V.M., Han, S., Chang, E.: A Survey of Digital Image Watermarking Techniques. In:
Proc. of the IEEE International Conference on Industrial Informatics, Perth, Australia, pp. 709–
716 (2005)
2. Chen, L.-W., Li, M.-F.: An effective blind watermark algorithm based on DCT. IEEE Trans.
on Intelligent Control and Automation, 6822–6825 (2008)
3. Zhang, B., Fan, L.-N., Song, B.-T.: A Watermark Embedding Algorithm Based on Low Bit
Planes Fusion of DCT Space. IEEE Trans. on Computer Science and Engineering (2), 349–353
(2009)
4. Tay, P., Havlicek, J.: Image Watermarking Using Wavelets. In: Proc. of the IEEE Midwest
Symposium on Circuits and Systems, Oklahoma, USA, pp. 258–261 (2002)
5. Pun, C.-M., Yuan, X.-C.: Geometric invariant digital image watermarking scheme based on
histogram in DWT domain. Journal of Multimedia 5(5), 434–442 (2010)CrossRef
6. Che, S.-B., Ma, B., Huang, Q.-B., Wu, X.-D.: Semi-fragile Image Watermarking Algorithm
Based on Double-Step. In: Information Engineering and Electronic Commerce, pp. 3–10 (2009)
7. Wang, Z.-X., Zhao, X.-Y.: Recoverable Semi-fragile Watermark for Image Authentication.
Journal of Image and Graphics 13(7), 1258–1264 (2008)
8. Hu, H.-P., Zhou, C.-L.: A semi-fragile digital watermarking approach to authenticate an
image. Huazhong Univ. of Sci. & Tech. (Nature Science Edition) 33(6), 4–7 (2005)
9. Huang, D.-R., Liu, J.-F., Huang, J.-W.: An Embedding Strategy and Algorithm for Image
Watermarking in DWT Domain. Journal of Software 13(7), 1290–1295 (2002)