Application of Chaotic Neural Network and 3D DWT-DFT in Medical Volume Data Watermarking

Article Preview

Abstract:

This paper proposes a digital watermarking method for the protection of medical volume data based on chaotic neural network and 3D DWT-DFT. In order to improve the security of digital watermarking, it uses chaotic sequence for scrambling .The chaotic sequence is generated by chaotic neural network. It makes full use of multi-level decomposition characteristics of 3D DWT-DFT, embedding watermark in the transform domain. The experimental results show that the method can resist filtering and rotation attacks, which has good robustness.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1209-1212

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zhao J, Koch E, Luo Ch. In Business Today and Tomorrow. Communications of theACM. Vol. 41, No. 7, (1998), pp.67-72.

Google Scholar

[2] Memon N, Wong Pw. Protecting Digital Media Content. Communications of the ACM. Vol. 41, No. 7, (1998), pp.35-43.

DOI: 10.1145/278476.278485

Google Scholar

[3] Hong I, Kim I and Han S. A blind watermarking technique using wavelet transform. Proceedings of ISIE International Symposium on Industrial Electronic. Pusan, Korea, Vol. 3, (2001), p.1946- (1950).

DOI: 10.1109/isie.2001.932010

Google Scholar

[4] L Zhengjun, Z Haifa, Z Banghe, etal. Fractional Fourier Domain Digital Watermarking. Acta Photonica Sinica. Vol. 32, No. 3, (2003), pp.332-335.

Google Scholar

[5] Tefas A, Pitas L. Image authentication using chaotic mixing sys-tems. Proc of 2000 IEEE International Conference on Circuits and Systems: Symposium. Geneva, Vol. 1, (2003), pp.216-219.

DOI: 10.1109/iscas.2000.857066

Google Scholar

[6] Ding Ke, He Chen, and Wang Hong-xia. A chaotic fragile watermarking technique with precise localization. Acta Electronic Sinica. Vol. 32, No. 6, (2004), pp.1009-1012.

Google Scholar

[7] Ajin Zou, Yunong Zhang, An asynchronous encryption algorithm based on hermite chaotic neural networks. CAAI Transactions on Intelligent Systems. Vol. 4, No. 5, (2009), pp.458-462.

Google Scholar

[8] P Loo, N Kingsbury. Watermarking Using Complex Wavelets with Resistance to Geometric Distortion. Proc of 10th European Signal Processing Conf. (2000), pp.1677-1680.

Google Scholar