Watermarking Medical Images with Anonymous Patient Identification to VerifyAuthentic
#1

[attachment=11981]
1.Introduction
 Information protection
 When dealing with information protection, we must distinguish between security and dependability.
 Security can be defined in terms of confidentiality, availability,integrity and authenticity .
 Dependability mostly concerns the computing system.
 It can be described as a composite of availability (of a service), reliability (continuity of service) and maintainability (ability to undergo modifications and repairs)
Watermark embedding algorithm
 Step 1: Generate an 8-bit watermark image w with the secret key shared with the detector
 Step 2: For each pixel i,
 Step 2.1: Calculate the Hamming code h(f(i), w(i)) and distance D(f(i), w(i))
 Step 2.2: Negate the LSB of f(i) if D(f(i), w(i)) = 0 or 8 (pre-processing).
 Step 3: Identify watermarkable pixels
 Step 4: For each watermarkable pixel i,
 Step 4.1: Calculate the secret dependence information s(i)
 Step 4.2: Negate the watermarkable bit of f(i) depending on the state of the pixel.
Watermark Detecting Algorithm
 Step 1: Generate an 8-bit watermark image w with the secret key shared with the embedder
 Step 2: Initialize the extracted watermark w′by letting w′ = w.
 Step 3: For each pixel i, calculate the Hamming code h(f′(i), w(i)) and
 distance D(f′(i), w(i))
 Step 4: Identify watermarkable pixels
 Step 5: For each watermarkable pixel i,
 Step 5.1: Calculate the secret dependence information s(i)
 Step 5.2: Extract watermark bit by setting w′j(i) = sj(i)
 Step 5.3: Recover original image pixel f(i) by negating the watermarkable bit of f′(i) if w′(i) = w(i).
 Two approaches are usually distinguished
 Spread-spectrum-like methods
 Quantization Index Modulation
Applications in healthcare
Watermarking: main approaches

 Methods for watermarking medical images
• Lossless/reversible watermarking
Once the embedded message has been interpreted, the watermark can be completely removed from the image, thus enabling the original image to be retrieved
• Region of non interest watermarking
An unimportant area of the image,the black background,
Illustration of the reversible watermarking method [6] used in a Magnetic Resonance Image of the Head (256x256 pixels, encoded on 12 bits),
(a) Original image,
(b) Reversible watermarked image
© Signal of difference
Interest in medical imaging
watermarking can improve data protection and content enrichment.
 Data hiding
Facilitate data management
Add value to enhance image content
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: anonymous communication systems, ppt on anonymous publicstion of data, abstract for patient medical information system using fingerprint, medical image watermarking, project freedom anonymous, anonymous ip address blocking, digital watermarking techniques in vehicles identification using wireless sensor networks,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DETECTION OF THE MALARIAL PARASITE INFECTED BLOOD IMAGES BY 3D-ANALYSIS project report tiger 2 2,387 26-09-2016, 10:55 AM
Last Post: ijasti
  Skin Tone based Secret Data hiding in Images seminar class 9 7,016 23-12-2015, 04:18 PM
Last Post: HelloGFS
  SEARCH IMAGES BY APPEARANCE seminar projects crazy 4 4,409 25-06-2015, 02:59 PM
Last Post: seminar report asees
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 25,821 08-06-2015, 03:26 PM
Last Post: seminar report asees
  Medical shop Management system seminar class 3 21,568 10-10-2013, 07:15 PM
Last Post: Guest
  Seminar on Nymble: Anonymous IP-Address Blocking computer girl 1 1,466 08-02-2013, 11:49 AM
Last Post: Guest
Photo Digital Watermarking Full Seminar Report Download computer science crazy 83 53,883 06-02-2013, 12:33 PM
Last Post: Guest
  Digital Image Watermarking project report helper 3 5,661 19-12-2012, 11:48 AM
Last Post: seminar details
  MICROCONTROLLER BASED POWER THEFT IDENTIFICATION (Download Full Seminar Report) Computer Science Clay 221 99,502 24-11-2012, 12:56 PM
Last Post: seminar details
  Radio Frequency Identification nit_cal 2 2,545 14-03-2012, 10:18 AM
Last Post: seminar paper

Forum Jump: