Medical Image Security Using Watermarking In Back Propagation Neural Network
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 9
Abstract
In modern world, medical data became more sensitive where the need of privacy became most prominent. In order to provide the privacy and authentication to the medical data which includes the medical records of a patient digital water marking technique is chosen. The aim of the paper is to authenticate the medical data by digital watermarking technique using neural networks. The host data is processed through 4 level DWT then applied to a back propagation neural network where the secret image is embedded along with different noise attacks. The obtained image is processed through IDWT which is either stored or transmitted. At viewer or receiver side the reverse process is done to extract the secret image from the watermarked image. Compared to existing neural network algorithms back propagation algorithm yields better PSNR values.
Authors and Affiliations
A. N. S. Anusha, Dr. Y. Ratna Kumar
Dial a Ride Problem
Generally we have seen in metro cities transport problem, even we have multiple options like city buses, metro trains, cab facilities, taxies etc. Every day cab and taxi organizations getting thousands of requests, due...
Parameter Optimization of Gas Metal Arc Welding Using Taguchi Method
Gas metal arc welding (GMAW) is currently one of the most popular welding methods, especially in industrial environments. In order to meet the global competition and the survival of products in the market a new way of t...
slugExistence of solutions for neutral functional mixed-volterra integrodifferential evolution equations with nonlocal conditions
In this work, we study the existence of mild solutions for nonlinear neutral functional mixed-volterra integrodifferential evolution equations with nonlocal conditions in Banach spaces. The results are obtained by using...
Online Advertisement System with Real Time Security and Authentication for Dual Booking
Our system deals with a real-time security system for authorized users. Generally there is no need of secure authentication for advertisers but here we have added mail based One Time Password (OTP). It is designed based...
Cutting Parameters Effects On Cutting Force and Surface Roughness In Hard Turning Of AISI 52100 Steel With CBN Tool
In the present study, an attempt has been made to investigate the effect of cutting parameters (cutting speed, feed and depth of cut) on the performance characteristics (cutting force and surface roughness) in finish ha...