Robust Multiple Watermarking Technique for Medical Applications using DWT, DCT and SVD
Journal Title: Transactions on Machine Learning and Artificial Intelligence - Year 2017, Vol 5, Issue 4
Abstract
The security of medical data plays an important role in preserving their integrity and confidentiality. This paper presents a robust multiple watermarking algorithm based on a combination of discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD). In this proposed method, we have inserted three watermark images (a patient image, a doctor image and a fingerprint of the patient) into a single cover medical image. In the insertion phase, the original image is decomposed into the third level of DWT, and then the DCT and SVD transforms are applied on the selected sub bands (HH1, HH2, and HH3). The first watermark goes through the same steps that the original image. Moreover, the second and the third watermarks are decomposed until the second level and the first level by DWT respectively and subsequently transformed by SVD. The singular values of the three watermarks are inserted into the singular values of the original image. The experimental results show that the proposed method gives better performance in terms of capacity, quality and robustness against various attacks compared to other reported techniques.
Authors and Affiliations
Imane Assini, Abdelmajid Badri, Khadija Safi, Aicha Sahel, Abdennaceur Baghdad
Integration of the ASR Toolkit Kaldi into a Domoticz Home Automation System
This paper presents the design and the implementation of an interface between Kaldi, automatic speech recognition toolkit, and a home automation system. This interface is based on Open Platform communication (OPC) protoc...
Bilingual Information Hiding System: A Formalized Approach
Steganography and cryptography are used to maintain privacy and security over communication channels. Due to their complexity and diversity, there is a need for their continuous improvements. In this paper, we consider s...
Identification of Objects by Machines using RFID Technology Identify Objetcs in Internet of Things
Embedded Systems and Internet of Things know recently a revolution in terms of innovation. With connectivity and networks, embedded systems are becoming more communicative, intelligent, and autonomous. They had the abili...
Stock Recommendations using Bio-Inspired Computations on Social Media
The tremendous growth of the social networks has paved way for social interactions of investing communities about a company�s stock performance. Investors are able to share their comments on stocks using social media pla...
Support Vector Machine Regression and Artificial Neural Network for Channel Estimation of LTE Downlink in High-Mobility Environments
In this paper we apply and assess the performance of support vector machine regression (SVR) and artificial neural network (ANN) channel estimation algorithms to the reference signal structure standardized for LTE Downli...