Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Adaptive Lossless Medical Image Watermarking Algorithm Based on DCT & DWT This paper, presents a robust, secure and lossless digital image watermarking based on DWT and DCT. The combined DWT-DCT algorithm embedded watermarks in original medical image. It embeds watermark like patient's name, disease's name, hospital's name, and doctor's signature into original medical image. This watermarking algorithm provides privacy of patient. Many performance factors are considered to evaluate the performance parameters of the proposed scheme. The performance evolution factors include PSNR, and measuring their correlation with degradation of the whole image 1. INTRODUCTION In the new era medical images are produced from a variety of imaging equipments, such as Computed Tomography (CT), Magnetic Resonance Imaging (MRI), Positron Emission Tomography (PET), Single Photon Emission Computed Tomography (SPECT), etc. CT can clearly reflect the anatomical structure of bone tissues. SPECT can highlight the lesion of tissues and organs to provide information about blood flow and temperature of body parts. PET scanning can show blood flow, oxygen and glucose metabolism in the tissues of the brain. MRI can clearly reflect the anatomical structure of soft tissues, organs and blood vessels. These medical images can also be saved in a digital format Electronic Patient Record (EPR) is one of the digital format of saving the personal details of patient, details of diagnosis, hospital information along with the medical image for continual monitoring. Telemedicine is the process by which electronic, visual and audio communications are used to support practitioners at remote sites with diagnosis and consultation procedures, such as remote clinical examinations and medical image transfers. Telemedicine is legally regulated by laws and constraints regarding the access of data contained in Personal medical Files. The transmit of medical transcriptions through online provides efficient clinical interpretation without carrying the documents. The diagnosis needs confidentiality, availability, and reliability. Confidentiality means that only the original users have access to the information. Availability, guarantees access to medical information. Reliability is based on integrity that the information has not been modified by unauthorized persons; and authentication intends that the information belongs indeed to the correct patient 2. PROPOSED METHOD 3. SOFTWARE AND HARDWARE REQUIREMENTS Operating system : Windows XP/7. Coding Language : MATLAB Tool MATLAB R 2012 : SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Colour. Mouse : Logitech. Ram : 512 Mb. 4. CONCLUSION A review of various watermarking embedding techniques have been done which suits for medical images with higher embedding capacity and higher imperceptibility with which it can withstand against attacks as well. Since no compromise can be made on the fidelity criteria of the medical images appropriate transforms for medical image could be identified and incorporated to bring an optimal embedding of diagnosed data in medical images. Analysis of various detection algorithm also has been done for medical images which was optimized using suitable genetic algorithm REFERENCES 1. Potdar, V.M., Han, S., Chang, E.: A Survey of Digital Image Watermarking Techniques. In: Proc. of the IEEE International Conference on Industrial Informatics, Perth, Australia, pp. 709– 716 (2005) 2. Chen, L.-W., Li, M.-F.: An effective blind watermark algorithm based on DCT. IEEE Trans. on Intelligent Control and Automation, 6822–6825 (2008) 3. Zhang, B., Fan, L.-N., Song, B.-T.: A Watermark Embedding Algorithm Based on Low Bit Planes Fusion of DCT Space. IEEE Trans. on Computer Science and Engineering (2), 349–353 (2009) 4. Tay, P., Havlicek, J.: Image Watermarking Using Wavelets. In: Proc. of the IEEE Midwest Symposium on Circuits and Systems, Oklahoma, USA, pp. 258–261 (2002) 5. Pun, C.-M., Yuan, X.-C.: Geometric invariant digital image watermarking scheme based on histogram in DWT domain. Journal of Multimedia 5(5), 434–442 (2010)CrossRef 6. Che, S.-B., Ma, B., Huang, Q.-B., Wu, X.-D.: Semi-fragile Image Watermarking Algorithm Based on Double-Step. In: Information Engineering and Electronic Commerce, pp. 3–10 (2009) 7. Wang, Z.-X., Zhao, X.-Y.: Recoverable Semi-fragile Watermark for Image Authentication. Journal of Image and Graphics 13(7), 1258–1264 (2008) 8. Hu, H.-P., Zhou, C.-L.: A semi-fragile digital watermarking approach to authenticate an image. Huazhong Univ. of Sci. & Tech. (Nature Science Edition) 33(6), 4–7 (2005) 9. Huang, D.-R., Liu, J.-F., Huang, J.-W.: An Embedding Strategy and Algorithm for Image Watermarking in DWT Domain. Journal of Software 13(7), 1290–1295 (2002)