A SECURE MEDICAL IMAGE WATERMARKING TECHNIQUE USING NO-REFERENCE QUALITY METRICES
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
In this paper, a secure medical image watermarking technique with No-Reference quality measurement method based on spread spectrum technique and discrete wavelet transform using ROI processing is proposed. In this method, the original image is divided into two separate sub-images called ROI and non-ROI. Region of interest (ROI) is the decision area in a medical image which is very important .This area may indicate a disease and must resulted in a right diagnosis. A spread spectrum embedding algorithm is used to embed a binary mark into DWT transform of non-ROI part of image.This method is useful when guaranteeing a certain level of quality is an important and vital concern. At the receiver side, ROI part with least degradation is extracted. Then the mark is extracted from non-ROI part and a measure of its degradation is used to estimate the quality of the original image. The performance of the proposed method is evaluated by calculating MSE and PSNR (of original and extracted mark) and measuring their correlation with degradation of the whole image. The applications of this work include compression and storage of images with an acceptable quality level, or compression and transmission over a network for telemedicine applications while preserving an appropriate quality level.
Authors and Affiliations
ShifaliGarg , , Seema
An ACO Approach to Solve a Variant of TSP
This study is an investigation on the application of Ant Colony Optimization to a variant of TSP. This paper presents an Ant Colony Optimization (ACO) approach to solve a randomly generated TSP problem known as RTS...
Xml Based Solution to MDA
We know that UML is widely used for the specification and modeling of software. Model driven approach uses unified modeling language as platform independent model and convert it into platform specific model by ad...
Model Based Test Case Generation From Natural Language Requirements And Inconsistency, Incompleteness Detection in Natural Language Using Model-Checking Approach
Natural language (NL) is any language that arises in an unpremeditated fashion as the result of the innate facility for language possessed by the human intellect. A natural language is typically used for communication, a...
Data Integrity and Security in Cloud
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. The important concerns that need to be addressed in cloud computing is to assure the customer of the integrity i.e. correc...
Guideline of Data Mining Technique in Healthcare Application
In today’s world, healthcare is the most important factor affecting human life. The management of health care database is the most challenging subject of this era. For this the data mining has been used intensively...