A REVIEW PAPER ON MEDICAL IMAGE WATERMARKING FOR COPYRIGHT PROTECTION BASED ON VISUAL CRYPTOGRAPHY USING GENETIC ALGORITHM
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 7
Abstract
A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography using Genetic Algorithm. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. In today’s scenario protection of digital data is utmost necessary in every part of life. More robust methods are being developed to protect the proprietary rights of the multimedia. In this paper, an invisible watermarking technique is proposed, to embed multiple binary watermarks into digital medical images based on the concept of Visual Cryptography (VC). The proposed scheme embeds the watermarks without modifying the original host image. Multiple watermarks can be embedded as shares in the same image. In addition, the size of the watermarks is not restricted to being smaller than that of the original host image. Experimental results prove that, the output of proposed watermarking technique gives good similarity ratio, peak signal to noise ration and correlation coefficient. To improve the visual quality of the extracted watermark we use Genetic Algorithm. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image. The Medical Image Watermarking is implemented using Image Processing Toolbox within Matlab Software. This work has been tested and found suitable for its purpose.
Authors and Affiliations
Ms. Satbirkaur
MANET-Evaluation of DSDV and AROD Routing Protocol
Mobile ad-hoc networks (MANETS) are formed by a collection of mobile nodes that have the ability to form a communication network without the help of any fixed infrastructure. MANET is a self organized and self co...
NEURAL NETWORK BASED OPTIMISATION OF HARMONICS ON AC - DC SIDES OF HVDC TRANSMISSION
This paper investigates possibility of using Neural network for optimisation of AC - DC Harmonics of HVDC Transmission. Dependableness and potency of power transmission has been at the forefront of analysis for a f...
MATHEMATICS ANXIETY AND THE ACADEMIC PERFORMANCE OF THE FRESHMEN COLLEGE STUDENTS OF THE NAVAL STATE UNIVERSITY
The main objective of this study was to determine the relationship between the level of Mathematics anxiety and the academic performance of the students at the Naval State University. The data were gathered th...
NUMERICAL INVESTIGATION OF TURBINE BLADE COOLING PASSAGE WITH V-SHAPE TRUNCATED AND CONTINEOUS RIBS
This paper focus on 3D CFD analysis of an turbine blade cooling passage/duct in which the desired domain subjected to critical load i.e. static as well as dynamic load which is due turbine blade is operated at high tempe...
A DESCRIPTIVE REVIEW OF DIFFERENT PENETRATION TESTING TOOLS AND METHODS
The penetration testing is to authenticate a recently discovered and approachable applications and networks, structure that are vulnerable to a certainty harm ,expose to danger and security risk which could reveal...