Medical Volume Data Zero-Watermarking Algorithm Using 3D-DCT and Chaotic Neural Network

Article Preview

Abstract:

This paper presented a new watermarking algorithm based on 3D-DCT and chaotic neural network in order to protect three-dimensional medical images. The algorithm adopts a wealth of information grayscale image as a watermark and three-dimensional medical image as the original carrier. It utilizes chaos neural network for scrambling and encryption of watermarking image. The embedded watermark has cryptographic security significance. Experimental results show that the algorithm is simple, which is a blind watermarking algorithm; the watermark extraction process does not require the original image. It is capable of resisting shear and filtering attacks.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1561-1564

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Lihua Zhang, Ping Chen. Application Study of digital watermarking method for information safety. Computer Simulation. Vol. 28, No. 10, (2011), pp.249-252.

Google Scholar

[2] Lu C S, Liao HY M. Multipurpose watermarking for image authentication and protection. IEEE Transactions on ImageProcessing. Vol. 10, No. 10, (2001), pp.1579-1592.

DOI: 10.1109/83.951542

Google Scholar

[3] G. Voyatzis, I. Pitas. The use of watermarks in the protection of digital multimedia products. Proceedings of the IEEE. Vol. 87, No. 7, (1999), pp.1197-1207.

DOI: 10.1109/5.771072

Google Scholar

[4] Christine. I, Podilchuk, Edward J. Delp. Digital watermarking Algorithms and applications. Signal Processing Magazine. Vol. 14, No. 4, (2001), pp.33-46.

DOI: 10.1109/79.939835

Google Scholar

[5] C.T. Hsu, J.L. Wu. Hidden digital watermarks in images. IEEE Trans1Image Processing. Vol. 8, No. 1, (1999), pp.58-68.

Google Scholar

[6] Ding Ke, He Chen, and Wang Hong-xia. A chaotic fragile watermarking technique with precise localization. Acta Electronic Sinica. Vol. 32, No. 6, (2004), pp.1009-1012.

Google Scholar

[7] Ajin Zou, Yunong Zhang, An asynchronous encryption algorithm based on hermite chaotic neural networks. CAAI Transactions on Intelligent Systems. Vol. 4, No. 5, (2009), pp.458-462.

Google Scholar