DWT-DFT and Logistic Map Based Watermarking Algorithm for Medical Image

Article Preview

Abstract:

When medical image transmitted and stored on the Internet, it is vulnerable to many kinds of attacks, thus, the security of the patients personal information is low. A robust watermarking algorithm has been proposed to increase the security of medical images. The scheme obtains the visual feature vectors of the medical image using DWT-DFT. At the same time, applying Logistic Map to encrypt the watermarking image, which can enhance its security. The experiment results show that the scheme has strong robustness against geometrical attacks.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

4124-4127

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. Kaur, O. Farooq, R. Singhal, B. S. Ahuja, Digital watermarking of ECG data for secure wireless communication, IEEE International Conference on Recent Trends in Information, Telecommunication and Computing, 2010: 140-144.

DOI: 10.1109/itc.2010.96

Google Scholar

[2] K. A Navas and M. Sasikumar, Survey of Medical Image Watermarking Algorithms, the 4th Sciences of Electronic, Technologies of Information and Telecommunications International Conference, Tunisia, 2007, 25-29.

Google Scholar

[3] Yubo ZHANG, Hongbo BI, Baoquan ZHU, et al, An Improved ICA-based Digital Watermarking, [J] Advances in Information Sciences and Service Sciences, 2012, 4(2): 167- 174.

Google Scholar

[4] A. A. T. Bui, C. Morioka, J. D. N. Dionisio, et al, open Source PACS: An Extensible Infrastructure for Medical Image Management, IEEE Transactions on Information Technology in Biomedicine, 2007, 11(1) : 94-109.

DOI: 10.1109/titb.2006.879595

Google Scholar

[5] Aijun Liu, Yu Yang, Xuedong Liang, Hao Yao. Improved Immune Genetic Algorithm Based on Hybrid Chaotic Maps and Its Application, JCIT, 2012, 7(1): 422-432.

DOI: 10.4156/jcit.vol7.issue1.50

Google Scholar