Watermarking is one of the techniques used to protect multimedia data, and images in particular, from malicious attacks by inserting a signature into these images. However, traditional watermarking schemes encounter l...
详细信息
Watermarking is one of the techniques used to protect multimedia data, and images in particular, from malicious attacks by inserting a signature into these images. However, traditional watermarking schemes encounter limitations for sensitive images such as medical images. Indeed, the inserted mark often alters the image in an irreversible way and can hide subtle details. In order to overcome these limitations, we propose in this paper a watermarking approach for patient identification and watermark integrity verification. In this approach, the watermark consists of two parts, the first part contains the patient's information fingerprint, and the second part contains the patient's encrypted photography. For the integration process, a discrete wavelet transform is applied to divide the medical image into four sub-bands. The watermark bits are then integrated by modulating the obtained mid-frequency coefficients. This approach's capacity allows the integration of the patient's photography and fingerprint, but will also be sufficient for a possible error-correcting code addition. The coefficient modulation performed by the integration process allowed hiding the watermark in an imperceptible way. This allowed us to generate a watermarked image structurally similar to the original. Performed experiments on the test images allowed to evaluate the performance of this method and to assess its robustness against JPEG compression and noise addition. Nevertheless, these values are sometimes a little far from the ideal value of 1 for normalized correlation.
Data hiding technology hides secret information into the carrier, so that when the carrier is transmitted over network, it will not attract any malicious attention. Using data compression, it is possible to reduce the...
详细信息
Data hiding technology hides secret information into the carrier, so that when the carrier is transmitted over network, it will not attract any malicious attention. Using data compression, it is possible to reduce the data size into a small compressed code, which can effectively reduce the time when transmitting compressed code on the network. In this paper, the main objective is to effectively combine these two technologies. We designed a data hiding scheme based on two techniques which are turtle-shell information hiding scheme and absolute moment block truncation coding. The experimental results showed that the proposed scheme provided higher embedding capacity and better image quality than other hiding schemes which were based on absolute moment block truncation coding.
In this letter. a new scheme of designing multilevel BTC coding is proposed. The optimal quantization can obtain by selecting the quantization threshold with an exhaustive search. However, it requires an enormous amou...
详细信息
In this letter. a new scheme of designing multilevel BTC coding is proposed. The optimal quantization can obtain by selecting the quantization threshold with an exhaustive search. However, it requires an enormous amount of computation and is thus impractical while we take an exhaustive search for the multilevel BTC. A two-steps searching method is applied to reduce the computational complexity. Comparisons of results with various methods have verified that the proposed method approach to the optimal quantization with little computation complexity.
In this paper, we first improve Chen et al.’s ternary representation-based absolute moment block truncation coding (AMBTC), then we combine block features and AMBTC to design our novel block feature enhanced-AMBTC-ba...
详细信息
ISBN:
(纸本)9798400708534
In this paper, we first improve Chen et al.’s ternary representation-based absolute moment block truncation coding (AMBTC), then we combine block features and AMBTC to design our novel block feature enhanced-AMBTC-based data hiding scheme called BFI-AMBTC-based DH scheme. In our scheme, AMBTC blocks are classified into three types: complex, smooth, and flat according to the distribution of pixels in a block. For each block type, we propose different data hiding strategies according to their unique features. Experiments confirm that our hybrid data hiding strategies work well. The image quality of stego images with our hybrid data hiding strategies not only has been significantly improved but also is much closer to that offered by the conventional AMBTC compared with other existing AMBTC-based data hiding schemes. In addition, the hiding capacity achieved by our BFI-AMBTC-based DH scheme is confirmed almost two times Ou and Sun's scheme.
暂无评论