Medical Image Watermarking Techniques and Applications
This book presents medical image watermarking techniques and algorithms for telemedicine and other emerging applications. The authors have developed improved/novel watermarking techniques for telemedicine applications that offer higher robustness, better perceptual quality and increased embedding ca...
Saved in:
Main Authors | , , , |
---|---|
Format | eBook |
Language | English |
Published |
Cham
Springer Nature
2017
Springer International Publishing AG Springer International Publishing Springer |
Edition | 1 |
Series | Multimedia Systems and Applications |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Table of Contents:
- Intro -- Preface -- Special Acknowledgments -- Contents -- List of Abbreviations -- List of Figures -- List of Tables -- Chapter 1: Digital Image Watermarking: Concepts and Applications -- 1.1 Introduction -- 1.2 Importance and Necessity of Watermarking -- 1.3 Classifications of Digital Watermarks -- 1.4 Potential Characteristics of Digital Watermarks -- 1.5 Framework for Watermarking -- 1.6 Recent Applications of Digital Watermark -- 1.7 Essential Requirements for Medical Image Watermarking -- 1.8 Summary -- References -- Chapter 2: Medical Image Watermarking Techniques: A Technical Survey and Potential Challenges -- 2.1 Introduction -- 2.2 Review of Available Watermarking Techniques -- 2.2.1 Watermarking Techniques Using Error Correcting Codes -- 2.2.2 Multiple Watermarking Techniques -- 2.2.3 Hybrid Watermarking Techniques -- 2.2.4 Watermarking Using Machine Learning Techniques -- 2.2.5 Biometric Watermarking -- 2.2.6 Joint Compression and Watermarking -- 2.2.7 Others Perspectives -- 2.3 Potential Challenges and Discussion -- 2.4 Summary -- References -- Chapter 3: Analytical Study and Performance Evaluation of Medical Image Watermarking Techniques -- 3.1 Introduction -- 3.2 Spatial Domain Techniques -- 3.2.1 Least Substitution Bit (LSB) -- 3.2.2 Correlation-Based Technique -- 3.2.3 Spread-Spectrum Technique -- 3.2.4 Patchwork Technique -- 3.3 Transform Domain Techniques -- 3.3.1 Discrete Wavelet Transform (DWT) -- 3.3.2 Discrete Cosine Transform (DCT) -- 3.3.3 Singular Value Decomposition (SVD) -- 3.3.4 Discrete Fourier Transform (DFT) -- 3.4 Performance Measures -- 3.4.1 Mean Square Error (MSE) -- 3.4.2 Peak Signal-to-Noise Ratio (PSNR) -- 3.4.3 Weighted Peak Signal to Noise Ratio (WPSNR) -- 3.4.4 Universal Image Quality Index -- 3.4.5 Structural Similarity Index Measure (SSIM) -- 3.4.6 Normalized Correlation (NC)
- 3.4.7 Bit Error Rate (BER) -- 3.5 Digital Watermarking Attacks and Benchmark Tools -- 3.5.1 Watermarking Attacks -- 3.5.2 Benchmark Tools for Image Watermarking -- 3.6 Summary -- References -- Chapter 4: Robust and Imperceptible Hybrid Watermarking Techniques for Medical Images -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Main Contribution of the Work -- 4.4 Proposed Method -- 4.4.1 Embedding Algorithm for Image Watermark -- 4.4.2 Extraction Algorithm for Image Watermark -- 4.4.3 Embedding Algorithm for Text Watermark -- 4.4.4 Extraction Algorithm for Text Watermark -- 4.5 Encryption and Decryption Process for Text Watermark -- 4.6 Experimental Results and Performance Analysis -- 4.6.1 Performance Evaluation of the Proposed Method Using Image Watermark -- 4.6.2 Performance Evaluation of the Proposed Method Using Multiple Watermarks -- 4.6.3 Performance Evaluation of the Improved Hybrid Algorithm Using Multiple Watermarks -- 4.7 Summary -- References -- Chapter 5: Robust and Secure Multiple Watermarking for Medical Images -- 5.1 Introduction -- 5.2 Related Works -- 5.3 Main Contribution of the Work -- 5.4 Proposed Method -- 5.4.1 Embedding Algorithm for Image Watermark -- 5.4.2 Extraction Algorithm for Image Watermark -- 5.4.3 Embedding Algorithm for Text Watermark -- 5.4.4 Extraction Algorithm for Text Watermark -- 5.5 Experimental Results and Performance Analysis -- 5.5.1 Performance Evaluation of the Proposed Method Using Encryption -- 5.6 Summary -- References -- Chapter 6: Secure Spread Spectrum Based Multiple Watermarking Technique for Medical Images -- 6.1 Introduction -- 6.2 Related Work -- 6.3 Main Contribution of the Work -- 6.4 Spread-Spectrum Watermark Design -- 6.5 Proposed Method -- 6.5.1 Message Embedding Algorithm -- 6.5.2 Message Extraction Algorithm -- 6.6 Experimental Results and Performance Analysis
- Chapter 10: State-of-the-Art Techniques of Image Watermarking: New Trends and Future Challenges -- 10.1 Introduction -- 10.2 Image Watermarking: New Trends and Future Challenges -- 10.2.1 Watermarking for E-health -- 10.2.2 Watermarking Using Cryptography -- 10.2.3 3D Model/Graphics Watermarking -- 10.2.4 Watermarking for Mobile Devise -- 10.2.5 Watermarking in Cloud Computing Environments -- 10.2.6 Biometric Watermarking -- 10.2.7 Other Perspectives -- 10.3 Research Challenges in Existing State-of-the-Art Watermarking Techniques -- 10.4 Summary -- References
- 6.6.1 Performance Evaluation of the Proposed Method for Text Watermarking Using BCH Code -- 6.6.2 Performance Evaluation of Proposed Method Using Multilevel Encrypted Text Watermarking -- 6.6.3 Performance Evaluation of the Proposed Method for Image and Text Watermarking Using Encryption and BCH Code Simultaneously -- 6.7 Summary -- References -- Chapter 7: Robust and Secure Multiple Watermarking Technique for Application in Tele-Ophthalmology -- 7.1 Introduction -- 7.2 Related Work -- 7.3 Main Contribution of Work -- 7.4 Proposed Method -- 7.5 Watermark Embedding Algorithms -- 7.5.1 Embedding Algorithm for Text Watermark -- 7.5.2 Embedding Algorithm for Image Watermark -- 7.6 Watermark Extraction Algorithm -- 7.6.1 Extraction Algorithm for Text Watermark -- 7.6.2 Extraction Algorithm for Image Watermark -- 7.7 Experimental Results and Performance Analysis -- 7.8 Summary -- References -- Chapter 8: Secure Multiple Watermarking Technique Using Neural Networks -- 8.1 Introduction -- 8.2 Related Work -- 8.3 Important Contribution of the Work -- 8.4 Proposed Algorithm -- 8.4.1 Embedding Algorithm for Image Watermark -- 8.4.2 Extraction Algorithm for Image Watermark -- 8.4.3 Embedding Algorithm for Text Watermark -- 8.4.4 Extraction Algorithm for Text Watermark -- 8.5 Experimental Results and Performance Analysis -- 8.6 Summary -- References -- Chapter 9: Securing Patient Data Through Multiple Watermarking and Selective Encryption -- 9.1 Introduction -- 9.2 Related Work -- 9.3 Important Contribution of the Work -- 9.4 The Proposed Framework -- 9.4.1 Algorithm 1: Image Watermark Embedding and Extraction Process -- 9.4.2 Algorithm 2: Text Watermark Embedding and Extraction Process -- 9.4.3 Algorithm 3: Watermarked Image Encryption and Decryption Process -- 9.5 Experimental Results and Performance Analysis -- 9.6 Summary and Future Directions -- References