Medical Image Watermarking Techniques and Applications

This book presents medical image watermarking techniques and algorithms for telemedicine and other emerging applications. The authors have developed improved/novel watermarking techniques for telemedicine applications that offer higher robustness, better perceptual quality and increased embedding ca...

Full description

Saved in:
Bibliographic Details
Main Authors Singh, Amit Kumar, Kumar, Basant, Singh, Ghanshyam, Mohan, Anand
Format eBook
LanguageEnglish
Published Cham Springer Nature 2017
Springer International Publishing AG
Springer International Publishing
Springer
Edition1
SeriesMultimedia Systems and Applications
Subjects
Online AccessGet full text

Cover

Loading…
Table of Contents:
  • Intro -- Preface -- Special Acknowledgments -- Contents -- List of Abbreviations -- List of Figures -- List of Tables -- Chapter 1: Digital Image Watermarking: Concepts and Applications -- 1.1 Introduction -- 1.2 Importance and Necessity of Watermarking -- 1.3 Classifications of Digital Watermarks -- 1.4 Potential Characteristics of Digital Watermarks -- 1.5 Framework for Watermarking -- 1.6 Recent Applications of Digital Watermark -- 1.7 Essential Requirements for Medical Image Watermarking -- 1.8 Summary -- References -- Chapter 2: Medical Image Watermarking Techniques: A Technical Survey and Potential Challenges -- 2.1 Introduction -- 2.2 Review of Available Watermarking Techniques -- 2.2.1 Watermarking Techniques Using Error Correcting Codes -- 2.2.2 Multiple Watermarking Techniques -- 2.2.3 Hybrid Watermarking Techniques -- 2.2.4 Watermarking Using Machine Learning Techniques -- 2.2.5 Biometric Watermarking -- 2.2.6 Joint Compression and Watermarking -- 2.2.7 Others Perspectives -- 2.3 Potential Challenges and Discussion -- 2.4 Summary -- References -- Chapter 3: Analytical Study and Performance Evaluation of Medical Image Watermarking Techniques -- 3.1 Introduction -- 3.2 Spatial Domain Techniques -- 3.2.1 Least Substitution Bit (LSB) -- 3.2.2 Correlation-Based Technique -- 3.2.3 Spread-Spectrum Technique -- 3.2.4 Patchwork Technique -- 3.3 Transform Domain Techniques -- 3.3.1 Discrete Wavelet Transform (DWT) -- 3.3.2 Discrete Cosine Transform (DCT) -- 3.3.3 Singular Value Decomposition (SVD) -- 3.3.4 Discrete Fourier Transform (DFT) -- 3.4 Performance Measures -- 3.4.1 Mean Square Error (MSE) -- 3.4.2 Peak Signal-to-Noise Ratio (PSNR) -- 3.4.3 Weighted Peak Signal to Noise Ratio (WPSNR) -- 3.4.4 Universal Image Quality Index -- 3.4.5 Structural Similarity Index Measure (SSIM) -- 3.4.6 Normalized Correlation (NC)
  • 3.4.7 Bit Error Rate (BER) -- 3.5 Digital Watermarking Attacks and Benchmark Tools -- 3.5.1 Watermarking Attacks -- 3.5.2 Benchmark Tools for Image Watermarking -- 3.6 Summary -- References -- Chapter 4: Robust and Imperceptible Hybrid Watermarking Techniques for Medical Images -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Main Contribution of the Work -- 4.4 Proposed Method -- 4.4.1 Embedding Algorithm for Image Watermark -- 4.4.2 Extraction Algorithm for Image Watermark -- 4.4.3 Embedding Algorithm for Text Watermark -- 4.4.4 Extraction Algorithm for Text Watermark -- 4.5 Encryption and Decryption Process for Text Watermark -- 4.6 Experimental Results and Performance Analysis -- 4.6.1 Performance Evaluation of the Proposed Method Using Image Watermark -- 4.6.2 Performance Evaluation of the Proposed Method Using Multiple Watermarks -- 4.6.3 Performance Evaluation of the Improved Hybrid Algorithm Using Multiple Watermarks -- 4.7 Summary -- References -- Chapter 5: Robust and Secure Multiple Watermarking for Medical Images -- 5.1 Introduction -- 5.2 Related Works -- 5.3 Main Contribution of the Work -- 5.4 Proposed Method -- 5.4.1 Embedding Algorithm for Image Watermark -- 5.4.2 Extraction Algorithm for Image Watermark -- 5.4.3 Embedding Algorithm for Text Watermark -- 5.4.4 Extraction Algorithm for Text Watermark -- 5.5 Experimental Results and Performance Analysis -- 5.5.1 Performance Evaluation of the Proposed Method Using Encryption -- 5.6 Summary -- References -- Chapter 6: Secure Spread Spectrum Based Multiple Watermarking Technique for Medical Images -- 6.1 Introduction -- 6.2 Related Work -- 6.3 Main Contribution of the Work -- 6.4 Spread-Spectrum Watermark Design -- 6.5 Proposed Method -- 6.5.1 Message Embedding Algorithm -- 6.5.2 Message Extraction Algorithm -- 6.6 Experimental Results and Performance Analysis
  • Chapter 10: State-of-the-Art Techniques of Image Watermarking: New Trends and Future Challenges -- 10.1 Introduction -- 10.2 Image Watermarking: New Trends and Future Challenges -- 10.2.1 Watermarking for E-health -- 10.2.2 Watermarking Using Cryptography -- 10.2.3 3D Model/Graphics Watermarking -- 10.2.4 Watermarking for Mobile Devise -- 10.2.5 Watermarking in Cloud Computing Environments -- 10.2.6 Biometric Watermarking -- 10.2.7 Other Perspectives -- 10.3 Research Challenges in Existing State-of-the-Art Watermarking Techniques -- 10.4 Summary -- References
  • 6.6.1 Performance Evaluation of the Proposed Method for Text Watermarking Using BCH Code -- 6.6.2 Performance Evaluation of Proposed Method Using Multilevel Encrypted Text Watermarking -- 6.6.3 Performance Evaluation of the Proposed Method for Image and Text Watermarking Using Encryption and BCH Code Simultaneously -- 6.7 Summary -- References -- Chapter 7: Robust and Secure Multiple Watermarking Technique for Application in Tele-Ophthalmology -- 7.1 Introduction -- 7.2 Related Work -- 7.3 Main Contribution of Work -- 7.4 Proposed Method -- 7.5 Watermark Embedding Algorithms -- 7.5.1 Embedding Algorithm for Text Watermark -- 7.5.2 Embedding Algorithm for Image Watermark -- 7.6 Watermark Extraction Algorithm -- 7.6.1 Extraction Algorithm for Text Watermark -- 7.6.2 Extraction Algorithm for Image Watermark -- 7.7 Experimental Results and Performance Analysis -- 7.8 Summary -- References -- Chapter 8: Secure Multiple Watermarking Technique Using Neural Networks -- 8.1 Introduction -- 8.2 Related Work -- 8.3 Important Contribution of the Work -- 8.4 Proposed Algorithm -- 8.4.1 Embedding Algorithm for Image Watermark -- 8.4.2 Extraction Algorithm for Image Watermark -- 8.4.3 Embedding Algorithm for Text Watermark -- 8.4.4 Extraction Algorithm for Text Watermark -- 8.5 Experimental Results and Performance Analysis -- 8.6 Summary -- References -- Chapter 9: Securing Patient Data Through Multiple Watermarking and Selective Encryption -- 9.1 Introduction -- 9.2 Related Work -- 9.3 Important Contribution of the Work -- 9.4 The Proposed Framework -- 9.4.1 Algorithm 1: Image Watermark Embedding and Extraction Process -- 9.4.2 Algorithm 2: Text Watermark Embedding and Extraction Process -- 9.4.3 Algorithm 3: Watermarked Image Encryption and Decryption Process -- 9.5 Experimental Results and Performance Analysis -- 9.6 Summary and Future Directions -- References