Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3341325.3341991acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm

Published: 01 July 2019 Publication History

Abstract

Watermarking is the technique to prove the security aspects of the material. One of the main aspects in any watermarking method is the imperceptibly and the fidelity of the watermarked data. The place chosen for watermark embedding affects directly in the imperceptibility and fidelity characteristics. Choosing optimal area of embedding is still worrying issue. Robust watermarking approach is helpful for proving the intellectual ownership property rights. Moreover, medical image is very sensitive for any slight modification. However, spatial domain provides less complexity, but unfortunately less robustness comparing to frequency domain. We present through this paper, a watermarking approach in the spatial domain. Our approach investigated Dijkstra algorithm in order to find the optimal path of embedding data, where the Mean aspects can play a vital role in the algorithm. Our approach provides less complexity with high robustness regarding to the relevant existing approaches operating in spatial domain. Moreover, the approach provides watermark integrity aspects and ability to detect any tamper happening for the embedded watermark and moreover the ability to recover the attacked watermark.

References

[1]
Laouamer, Lamri, and Omar Tayan. 2016. "An Efficient and Robust Hybrid Watermarking Scheme for Text-Images." IJ Network Security 18.6 (2016): 1152--1158.
[2]
Ghadi, Musab, Lamri Laouamer, Laurent Nana, and Anca Pascu. 2016. "Fuzzy rough set based image watermarking approach." In International Conference on Advanced Intelligent Systems and Informatics, pp. 234--245. Springer, Cham, 2016.
[3]
AlShaikh, Muath, Lamri Laouamer, Laurent Nana, and Anca Chrisitine Pascu. 2017. "Efficient and robust encryption and watermarking technique based on a new chaotic map approach." Multimedia Tools and Applications 76, no. 6 (2017): 8937--8950.
[4]
AlShaikh, Muath, Lamri Laouamer, Laurent Nana, and Anca Pascu. 2016. "A Novel CT Scan Images Watermarking Scheme in DWT Transform Coefficients." International Journal of Computer Science and Network Security (IJCSNS) 16, no. 1 (2016): 62.
[5]
Heidari, Shahrokh, and Mosayeb Naseri. 2016. "A novel LSB based quantum watermarking." International Journal of Theoretical Physics 55, no. 10 (2016): 4205--4218.
[6]
Laouamer, Lamri, Muath AlShaikh, Laurent Nana, and Anca Chrisitine Pascu. 2015. "Robust watermarking scheme and tamper detection based on threshold versus intensity." Journal of Innovation in Digital Ecosystems 2, no. 1-2 (2015): 1--12.
[7]
Singh, Amit Kumar, Mayank Dave, and Anand Mohan. 2016."Hybrid technique for robust and imperceptible multiple watermarking using medical images." Multimedia Tools and Applications 75, no. 14 (2016): 8381--8401.
[8]
AlShaikh, Muath, Laurent Nana, Lamri Laouamer, and Anca Christine. 2016."Formal Concept Analysis to Improve Robustness on Medical Image Watermarking Schemes in the Spatial Domain." International Journal of Computer Science and Information Security 14, no. 2 (2016): 261.
[9]
Laouamer, Lamri, Muath Alshaikh, Laurent Nana, and Anca Chrisitine Pascu. 2016. "Generating optimal informed and adaptive watermark image based on zero-suppressed binary decision diagrams for medical images." International Journal of Electronic Security and Digital Forensics 8, no. 3 (2016): 262--284.
[10]
Su, Qingtang, and Beijing Chen. 2018."Robust color image watermarking technique in the spatial domain." Soft Computing 22, no. 1 (2018): 91--106.
[11]
Rahman, Atta Ur, Kiran Sultan, Dhiaa Musleh, Nahier Aldhafferi, Abdullah Alqahtani, and Maqsood Mahmud. 2018. "Robust and Fragile Medical Image Watermarking: A Joint Venture of Coding and Chaos Theories." Journal of healthcare engineering 2018 (2018).
[12]
Hu, Hwai-Tsu, Shiow-Jyu Lin, and Ling-Yuan Hsu. 2017."Effective blind speech watermarking via adaptive mean modulation and package synchronization in DWT domain." EURASIP Journal on Audio, Speech, and Music Processing 2017, no. 1 (2017): 10.
[13]
Broumi, Said, Assia Bakal, Mohamed Talea, Florentin Smarandache, and Luige Vladareanu. 2016. "Applying Dijkstra algorithm for solving neutrosophic shortest path problem." In Advanced Mechatronic Systems (ICAMechS), 2016 International Conference on, pp. 412--416. IEEE, 2016.
[14]
Bamal, Roopam, and Singara Singh Kasana. 2018."Slantlet based hybrid watermarking technique for medical images." Multimedia Tools and Applications 77, no. 10 (2018): 12493--12518.
[15]
http://www.dicomlibrary.com/
[16]
F. Petitcolas, Watermarking Stirmark, http://w.petitcolas.net/fabien/watermarking/stirmark/, 2012.
[17]
A.Fabien, P. Petitcolas. 2000." Watermarking Schemes Evaluattion" IEEE Signal Processing, vol. 17, no. 5, pp. 58--64, September (2000).
[18]
H. Quan, and M. Ghanbari. 2008."Scope of validity of PSNR in image/video quality assessment." Electronics letters 44.13 (2008): 800--801.
[19]
B. Avants, C. Epstein, M. Grossman,& C. Gee. 2008."Symmetric diffeomorphic image registration with cross-correlation: evaluating automated labeling of elderly and neurodegenerative brain." Medical image analysis 12.1 (2008): 26--41.

Cited By

View all
  • (2024)Robust and Recovery Watermarking Approach Based on SVD and OTP EncryptionJournal of Signal Processing Systems10.1007/s11265-024-01919-696:6-7(385-399)Online publication date: 1-Jun-2024
  • (2024)An IoMT image crypto-system based on spatial watermarking and asymmetric encryptionMultimedia Tools and Applications10.1007/s11042-024-19632-8Online publication date: 25-Jun-2024
  • (2023)An Adaptive Image Watermarking based on Bellman-Ford AlgorithmProceedings of the 7th International Conference on Future Networks and Distributed Systems10.1145/3644713.3644762(357-365)Online publication date: 21-Dec-2023
  • Show More Cited By
  1. Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICFNDS '19: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems
    July 2019
    346 pages
    ISBN:9781450371636
    DOI:10.1145/3341325
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • CNAM: Conservatoire des Arts et Métiers

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 July 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Dijkstra
    2. Imperceptibility
    3. Robustness
    4. Wateramk Tamper Detection
    5. Watermark Recovery
    6. Watermarking

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICFNDS '19

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Robust and Recovery Watermarking Approach Based on SVD and OTP EncryptionJournal of Signal Processing Systems10.1007/s11265-024-01919-696:6-7(385-399)Online publication date: 1-Jun-2024
    • (2024)An IoMT image crypto-system based on spatial watermarking and asymmetric encryptionMultimedia Tools and Applications10.1007/s11042-024-19632-8Online publication date: 25-Jun-2024
    • (2023)An Adaptive Image Watermarking based on Bellman-Ford AlgorithmProceedings of the 7th International Conference on Future Networks and Distributed Systems10.1145/3644713.3644762(357-365)Online publication date: 21-Dec-2023
    • (2022)QR Steganography for Information Hiding of Patient RecordProceedings of the International Conference on Computer, Information Technology and Intelligent Computing (CITIC 2022)10.2991/978-94-6463-094-7_30(392-404)Online publication date: 25-Dec-2022
    • (2022)Multi-watermarking algorithm for medical image based on KAZE-DCTJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-021-03539-515:2(1735-1743)Online publication date: 23-Mar-2022
    • (2022)Robust watermarking based on modified Pigeon algorithm in DCT domainMultimedia Tools and Applications10.1007/s11042-022-13233-z82:2(3033-3053)Online publication date: 26-May-2022
    • (2022)A novel tamper detection watermarking approach for improving image integrityMultimedia Tools and Applications10.1007/s11042-021-11840-w82:7(10039-10060)Online publication date: 21-Jan-2022
    • (2022)Secure Sharing of Medical Images Using Watermarking TechniqueComputational Intelligence in Pattern Recognition10.1007/978-981-19-3089-8_56(592-604)Online publication date: 21-Jun-2022
    • (2020)A Salient Object Detection Technique Based on Color DivergenceProceedings of the 4th International Conference on Future Networks and Distributed Systems10.1145/3440749.3442593(1-6)Online publication date: 26-Nov-2020

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media