Skip to main content
Erschienen in: Wireless Personal Communications 3/2015

01.08.2015

Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain

verfasst von: Amit Kumar Singh, Mayank Dave, Anand Mohan

Erschienen in: Wireless Personal Communications | Ausgabe 3/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents a secure multilevel watermarking scheme in which the encrypted text acts as a watermark. The algorithm is based on secure spread-spectrum technique for digital images in discrete wavelet transform (DWT) domain. Potential application of the proposed watermarking scheme is successfully demonstrated for embedding various medical watermarks in text format at different subband decomposition levels depending upon their performance requirements. In the embedding process, the cover CT Scan image is decomposed up to third level of DWT coefficients. Different text watermarks such as personal and medical record of the patient, diagnostic/image codes and doctor code/signature are embedded into the selective coefficients of the second and third level DWT for potential telemedicine applications. Selection of DWT coefficients for embedding is done by column wise thresholding of coefficients values. Also, encryption is applied to the ASCII representation of the text and the encoded text watermark is embedded. The algorithm correctly extracts the embedded watermarks without error and is robust against numerous known attacks without much degradation of the medical image quality of the watermarked image.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mostafa, S. A. K., El- sheimy, N., Tolba, A. S., Abdelkader, F. M., & Elhindy, H. M. (2010). Wavelet packets-based blind watermarking for medical image management. The Open Biomedical Engineering Journal, 4, 93–98.CrossRef Mostafa, S. A. K., El- sheimy, N., Tolba, A. S., Abdelkader, F. M., & Elhindy, H. M. (2010). Wavelet packets-based blind watermarking for medical image management. The Open Biomedical Engineering Journal, 4, 93–98.CrossRef
2.
Zurück zum Zitat Chao, H. M., Hsu, C. M., & Miaou, S. G. (2002). A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Transactions on Information Technology in Biomedicine, 6(1), 46–53.CrossRef Chao, H. M., Hsu, C. M., & Miaou, S. G. (2002). A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Transactions on Information Technology in Biomedicine, 6(1), 46–53.CrossRef
3.
Zurück zum Zitat Acharya, U. R., Anand, D., Bhat, P. S., & Niranjan, U. C. (2001). Compact storage of medical images with patient information. IEEE Transactions on Information Technology in Biomedicine, 5(4), 320–323.CrossRef Acharya, U. R., Anand, D., Bhat, P. S., & Niranjan, U. C. (2001). Compact storage of medical images with patient information. IEEE Transactions on Information Technology in Biomedicine, 5(4), 320–323.CrossRef
4.
Zurück zum Zitat Coatrieux, G., Lecornu, L., Roux, Ch., & Sankur, B. (2006). A review of image watermarking applications in healthcare. IEEE Engineering in Medicine and Biology Society, 1, 4691–4694. Coatrieux, G., Lecornu, L., Roux, Ch., & Sankur, B. (2006). A review of image watermarking applications in healthcare. IEEE Engineering in Medicine and Biology Society, 1, 4691–4694.
5.
Zurück zum Zitat Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2004). A medical image watermarking scheme based on wavelet transform. In Proceedings 25th Annual International Conference of IEEE-EMBS, San Francisco (pp. 1541–1544). Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2004). A medical image watermarking scheme based on wavelet transform. In Proceedings 25th Annual International Conference of IEEE-EMBS, San Francisco (pp. 1541–1544).
6.
Zurück zum Zitat Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2006). Secure and efficient health data management through multiple watermarking on medical images. Medical & Biological Engineering & Computing, 44, 619–631.CrossRef Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2006). Secure and efficient health data management through multiple watermarking on medical images. Medical & Biological Engineering & Computing, 44, 619–631.CrossRef
7.
Zurück zum Zitat Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2006). Multiple image watermarking applied to health information management. IEEE Transactions on Information Technology in Biomedicine, 10(4), 722–732.CrossRef Giakoumaki, A., Pavlopoulos, S., & Koutsouris, D. (2006). Multiple image watermarking applied to health information management. IEEE Transactions on Information Technology in Biomedicine, 10(4), 722–732.CrossRef
8.
Zurück zum Zitat Kumar, B., Singh, H. V., Singh, S. P., & Mohan, A. (2011). Secure spread-spectrum watermarking for telemedicine applications. Journal of Information Security, 2, 91–98.CrossRef Kumar, B., Singh, H. V., Singh, S. P., & Mohan, A. (2011). Secure spread-spectrum watermarking for telemedicine applications. Journal of Information Security, 2, 91–98.CrossRef
9.
Zurück zum Zitat Mohanty, S. P. (1999). Watermarking of digital images. In M.S. Thesis, Indian Institute of Science, India. Mohanty, S. P. (1999). Watermarking of digital images. In M.S. Thesis, Indian Institute of Science, India.
10.
Zurück zum Zitat Wolak, M. C. (2000). Digital watermarking. United States: Preliminary Proposal, Nova Southeastern University. Wolak, M. C. (2000). Digital watermarking. United States: Preliminary Proposal, Nova Southeastern University.
11.
Zurück zum Zitat Nikolaidis, N., & Pitas, I. (1999). Digital image watermarking: An overview. In IEEE International Conference on Multimedia Computing and Systems (Vol. 1, pp. 1–6). Nikolaidis, N., & Pitas, I. (1999). Digital image watermarking: An overview. In IEEE International Conference on Multimedia Computing and Systems (Vol. 1, pp. 1–6).
12.
Zurück zum Zitat Cox, I. J., & Miller, M. L. (2002). The first 50 years of electronic watermarking (EURASIP). Journal on Applied Signal Processing, 2, 126–132.CrossRef Cox, I. J., & Miller, M. L. (2002). The first 50 years of electronic watermarking (EURASIP). Journal on Applied Signal Processing, 2, 126–132.CrossRef
13.
Zurück zum Zitat Meerwald, P., & Uhl, A. (2001). A survey of wavelet-domain watermarking algorithms. In Proceedings of the SPIE Security and Watermarking of Multimedia Contents, San Jose (pp. 516–505). Meerwald, P., & Uhl, A. (2001). A survey of wavelet-domain watermarking algorithms. In Proceedings of the SPIE Security and Watermarking of Multimedia Contents, San Jose (pp. 516–505).
14.
Zurück zum Zitat Hajjara, S., Abdallah, M., & Hudaib, A. (2009). Digital image watermarking using localized biorthogonal wavelets. European Journal of Scientific Research, 26(4), 594–608. Hajjara, S., Abdallah, M., & Hudaib, A. (2009). Digital image watermarking using localized biorthogonal wavelets. European Journal of Scientific Research, 26(4), 594–608.
15.
Zurück zum Zitat Paquet, A. H., & Ward, R. K. (2002). Wavelet-based digital watermarking for image authentication. In Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, Winnipeg 2002 (Vol. 2, pp. 884–879). Paquet, A. H., & Ward, R. K. (2002). Wavelet-based digital watermarking for image authentication. In Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, Winnipeg 2002 (Vol. 2, pp. 884–879).
16.
Zurück zum Zitat Feng, J. B., Lin, I. C., Tsai, C. S., & Chu, Y. P. (2006). Reversible watermarking: Current and key issues. International Journal of Network Security, 2(3), 161–170. Feng, J. B., Lin, I. C., Tsai, C. S., & Chu, Y. P. (2006). Reversible watermarking: Current and key issues. International Journal of Network Security, 2(3), 161–170.
17.
Zurück zum Zitat Lee, S., Chang, C. D., & Kalker, T. (2007). Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Transaction on Information Forensics and Security, 2(3), 321–330.CrossRef Lee, S., Chang, C. D., & Kalker, T. (2007). Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Transaction on Information Forensics and Security, 2(3), 321–330.CrossRef
18.
Zurück zum Zitat Youngberry, K. (2004). Telemedicine research. Journal of Telemedicine and Telecare, 10(2), 121–123.CrossRef Youngberry, K. (2004). Telemedicine research. Journal of Telemedicine and Telecare, 10(2), 121–123.CrossRef
19.
Zurück zum Zitat Terry, M. (2009). Medical identity theft and telemedicine security. Telemedicine and e-Health, 15(10), 928–932.CrossRef Terry, M. (2009). Medical identity theft and telemedicine security. Telemedicine and e-Health, 15(10), 928–932.CrossRef
22.
Zurück zum Zitat Kumar, B., Anand, A., Singh, S. P., & Mohan, A. (2011). High capacity spread-spectrum watermarking for telemedicine applications. World Academy of Science, Engineering and Technology, 5, 62–66. Kumar, B., Anand, A., Singh, S. P., & Mohan, A. (2011). High capacity spread-spectrum watermarking for telemedicine applications. World Academy of Science, Engineering and Technology, 5, 62–66.
23.
Zurück zum Zitat Umaamaheshvari, A., & Thanushkodi, K. (2012). High performance and effective watermarking scheme for medical images. European Journal of Scientific Research, 67, 283–293. Umaamaheshvari, A., & Thanushkodi, K. (2012). High performance and effective watermarking scheme for medical images. European Journal of Scientific Research, 67, 283–293.
24.
Zurück zum Zitat Soliman, M. M., Hassanien, A. E., Ghali, N. I., & Onsi, H. M. (2012). An adaptive watermarking approach for medical imaging using swarm intelligence. International Journal of Smart Home, 6, 37–50. Soliman, M. M., Hassanien, A. E., Ghali, N. I., & Onsi, H. M. (2012). An adaptive watermarking approach for medical imaging using swarm intelligence. International Journal of Smart Home, 6, 37–50.
25.
Zurück zum Zitat Kannamma, A., Pavithra, K., & Subha Rani, S. (2012). Double watermarking of DICOM medical images using wavelet decomposition technique. European Journal of Scientific Research, 70, 46–55. Kannamma, A., Pavithra, K., & Subha Rani, S. (2012). Double watermarking of DICOM medical images using wavelet decomposition technique. European Journal of Scientific Research, 70, 46–55.
26.
Zurück zum Zitat Pal, K., Ghosh, G., & Bhattacharya, M. (2012). Biomedical image watermarking in wavelet domain for data integrity using bit majority algorithm and multiple copies of hidden information. American Journal of Biomedical Engineering, 2, 29–37.CrossRef Pal, K., Ghosh, G., & Bhattacharya, M. (2012). Biomedical image watermarking in wavelet domain for data integrity using bit majority algorithm and multiple copies of hidden information. American Journal of Biomedical Engineering, 2, 29–37.CrossRef
27.
Zurück zum Zitat Zhang, L., & Zhou, P.-P. (2010). Localized affine transform resistant watermarking in region-of-interest. Telecommunication Systems, 44, 205–220.CrossRef Zhang, L., & Zhou, P.-P. (2010). Localized affine transform resistant watermarking in region-of-interest. Telecommunication Systems, 44, 205–220.CrossRef
28.
Zurück zum Zitat Zain, J., & Clarke, M. (2005). Security in telemedicine: Issue in watermarking medical images. In International Conference: Science of Electronic, Technologies of Information and Telecommunications. Zain, J., & Clarke, M. (2005). Security in telemedicine: Issue in watermarking medical images. In International Conference: Science of Electronic, Technologies of Information and Telecommunications.
29.
Zurück zum Zitat Memon, N. A., & Gilani, S. A. M. (2008). NROI watermarking of medical images for content authentication. In Proceedings of 12th IEEE International Multitopic Conference, Karachi, Pakistan (pp. 106–110). Memon, N. A., & Gilani, S. A. M. (2008). NROI watermarking of medical images for content authentication. In Proceedings of 12th IEEE International Multitopic Conference, Karachi, Pakistan (pp. 106–110).
30.
Zurück zum Zitat Singh, A. K., Dave, M., & Mohan, A. (2014). Wavelet based image watermarking: Futuristic concepts in information security. Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 84(3), 345–359. doi:10.1007/s40010-014-0140-x. Singh, A. K., Dave, M., & Mohan, A. (2014). Wavelet based image watermarking: Futuristic concepts in information security. Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 84(3), 345–359. doi:10.​1007/​s40010-014-0140-x.
31.
Zurück zum Zitat Cox, I. J., Kilian, J., Thomson, L. F., & Talal, Shamoon. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.CrossRef Cox, I. J., Kilian, J., Thomson, L. F., & Talal, Shamoon. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.CrossRef
32.
Zurück zum Zitat Malvar, H. S., & Florencio, D. A. F. (2003). Improved spread spectrum: A new modilation technique for robust watermarking. IEEE Transactions on Signal Processing, 51(4), 898–905.MathSciNetCrossRef Malvar, H. S., & Florencio, D. A. F. (2003). Improved spread spectrum: A new modilation technique for robust watermarking. IEEE Transactions on Signal Processing, 51(4), 898–905.MathSciNetCrossRef
33.
Zurück zum Zitat Perez-Freire, L., & Perez-Gonzalez, F. (2009). Spread-spectrum watermarking security. IEEE Transactions on Information Forensics and Security, 4(1), 2–24.CrossRef Perez-Freire, L., & Perez-Gonzalez, F. (2009). Spread-spectrum watermarking security. IEEE Transactions on Information Forensics and Security, 4(1), 2–24.CrossRef
34.
Zurück zum Zitat Xuan, G., Yang, C., Zheng, Y., Shi, Y. Q., & Ni, Z. (2004). Reversible data hiding based on wavelet spread spectrum. In IEEE International workshop on multimedia signal processing (MMSP2004), Siena, Italy (pp. 211–214). Xuan, G., Yang, C., Zheng, Y., Shi, Y. Q., & Ni, Z. (2004). Reversible data hiding based on wavelet spread spectrum. In IEEE International workshop on multimedia signal processing (MMSP2004), Siena, Italy (pp. 211–214).
35.
Zurück zum Zitat Domingo-Ferrer, J., & Sebé, F. (2002). Invertible spread-spectrum watermarking for image authentication and multilevel access to precision-critical watermarked images. In Proceedings of the International Conference on Information Technology: Coding and Computing (pp. 1–6). Domingo-Ferrer, J., & Sebé, F. (2002). Invertible spread-spectrum watermarking for image authentication and multilevel access to precision-critical watermarked images. In Proceedings of the International Conference on Information Technology: Coding and Computing (pp. 1–6).
36.
Zurück zum Zitat Das, T. S., Mankar, V. H., & Sarkar, S. K. (2007). Spread spectrum based robust image watermark authentication. In International Conference, Madurai, India (pp. 673–676). Das, T. S., Mankar, V. H., & Sarkar, S. K. (2007). Spread spectrum based robust image watermark authentication. In International Conference, Madurai, India (pp. 673–676).
37.
Zurück zum Zitat Kumar, B., Kumar, S. B., & Chauhan, D. S. (2014). Wavelet based imperceptible medical image watermarking using spread-spectrum. In 37th International Conference on telecommunications and signal processing, Berlin Germany (pp. 660–664). Kumar, B., Kumar, S. B., & Chauhan, D. S. (2014). Wavelet based imperceptible medical image watermarking using spread-spectrum. In 37th International Conference on telecommunications and signal processing, Berlin Germany (pp. 660–664).
38.
Zurück zum Zitat Singh, A. K., Kumar, B., Dave, M., & Mohan, A. (2015). Robust and imperceptible spread-spectrum watermarking for telemedicine applications. Proceedings of the National Academy of Sciences, India, Section A: Physical Sciences,. doi:10.1007/s40010-014-0197-6. Singh, A. K., Kumar, B., Dave, M., & Mohan, A. (2015). Robust and imperceptible spread-spectrum watermarking for telemedicine applications. Proceedings of the National Academy of Sciences, India, Section A: Physical Sciences,. doi:10.​1007/​s40010-014-0197-6.
39.
Zurück zum Zitat Singh, A. K., Dave, M., & Mohan, A. (2013). A hybrid algorithm for image watermarking against signal processing attack. In S. Ramanna et al. (Eds.), Proceedings of 7th Multi-Disciplinary International Workshop in Artificial Intelligence, Krabi-Thailand, Lecture Notes in Computer Science (LNCS) (Vol. 8271, pp. 235–246). Singh, A. K., Dave, M., & Mohan, A. (2013). A hybrid algorithm for image watermarking against signal processing attack. In S. Ramanna et al. (Eds.), Proceedings of 7th Multi-Disciplinary International Workshop in Artificial Intelligence, Krabi-Thailand, Lecture Notes in Computer Science (LNCS) (Vol. 8271, pp. 235–246).
40.
Zurück zum Zitat Singh, A. K., Dave, M., & Mohan, A. (2013). Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain. National Academy Science Letters,. doi:10.1007/s40009-014-0241-8. Singh, A. K., Dave, M., & Mohan, A. (2013). Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain. National Academy Science Letters,. doi:10.​1007/​s40009-014-0241-8.
42.
Zurück zum Zitat Mangaiyarkarasi, P., & Arulselvi, S. (2013). Medical image watermarking based on DWT and ICA for copyright protection. In R. Malathi & J. Krishnan (Eds.), Recent Advancements in System Modelling Applications, Lecture Notes in Electrical Engineering (Vol. 188, pp. 21–33). Mangaiyarkarasi, P., & Arulselvi, S. (2013). Medical image watermarking based on DWT and ICA for copyright protection. In R. Malathi & J. Krishnan (Eds.), Recent Advancements in System Modelling Applications, Lecture Notes in Electrical Engineering (Vol. 188, pp. 21–33).
43.
Zurück zum Zitat Priya, S., Santhi, B., & Swaminathan, P. (2014). Study on medical image watermarking techniques. Journal of applied science, 14(14), 1638–1642.CrossRef Priya, S., Santhi, B., & Swaminathan, P. (2014). Study on medical image watermarking techniques. Journal of applied science, 14(14), 1638–1642.CrossRef
44.
Zurück zum Zitat Hajjaji, M. A., El-Bay, Bourennane, Abdelali, A. B., & Mtibaa, A. (2014). Combining Haar wavelet and Karhunen loeve transforms for medical images watermarking. BioMed Research International, 2014, 1–15.CrossRef Hajjaji, M. A., El-Bay, Bourennane, Abdelali, A. B., & Mtibaa, A. (2014). Combining Haar wavelet and Karhunen loeve transforms for medical images watermarking. BioMed Research International, 2014, 1–15.CrossRef
45.
Zurück zum Zitat Kannammal, A., & Subha Rani, S. (2014). Two level security for medical images using watermarking/encryption algorithms. International Journal of Imaging Systems and Technology, 24(1), 111–120. Kannammal, A., & Subha Rani, S. (2014). Two level security for medical images using watermarking/encryption algorithms. International Journal of Imaging Systems and Technology, 24(1), 111–120.
46.
47.
Zurück zum Zitat Wang, S., Zheng, D., & Zhao, J. (2014). Adaptive watermarking and tree structure based image quality estimation. IEEE Transactions on Multimedia, 16(2), 311–325.CrossRef Wang, S., Zheng, D., & Zhao, J. (2014). Adaptive watermarking and tree structure based image quality estimation. IEEE Transactions on Multimedia, 16(2), 311–325.CrossRef
48.
Zurück zum Zitat Gao, L., Gao, T., Sheng, G., & Zhang, S. (2014). Robust medical image watermarking scheme with rotation correction. In J. -S. Pan et al. (Eds.), Intelligent Data Analysis and Its Applications, Volume 2, Advances in Intelligent Systems and Computing (Vol. 298, pp. 283–292). Gao, L., Gao, T., Sheng, G., & Zhang, S. (2014). Robust medical image watermarking scheme with rotation correction. In J. -S. Pan et al. (Eds.), Intelligent Data Analysis and Its Applications, Volume 2, Advances in Intelligent Systems and Computing (Vol. 298, pp. 283–292).
49.
Zurück zum Zitat Yu, Y. C., & Hou, T. W. (2014). An efficient forward-secure group certificate digital signature scheme to enhance EMR authentication process. Medical & Biological Engineering & Computing, 52, 449–457.CrossRef Yu, Y. C., & Hou, T. W. (2014). An efficient forward-secure group certificate digital signature scheme to enhance EMR authentication process. Medical & Biological Engineering & Computing, 52, 449–457.CrossRef
50.
51.
Zurück zum Zitat Khademi April and Krishnan Sridhar. (2007). Shift-invariant discrete wavelet transform analysis for retinal image classification. Medical & Biological Engineering & Computing, 45, 1211–1222.CrossRef Khademi April and Krishnan Sridhar. (2007). Shift-invariant discrete wavelet transform analysis for retinal image classification. Medical & Biological Engineering & Computing, 45, 1211–1222.CrossRef
52.
Zurück zum Zitat Zaz, Y., & Fadil, L. E. (2010). Protecting EPR data using cryptography and digital watermarking. In International Conference on Models of Information and Communication Systems, Rabat, November 2010. Zaz, Y., & Fadil, L. E. (2010). Protecting EPR data using cryptography and digital watermarking. In International Conference on Models of Information and Communication Systems, Rabat, November 2010.
53.
Zurück zum Zitat Navas, K. A., Nithya, S., Rakhi, R., & Sasikumar, M. (2007). Lossless watermarking in JPEG2000 for EPR data hiding. In Proceedings of IEEE-EIT 2007, Chicago, USA (pp. 697–702). Navas, K. A., Nithya, S., Rakhi, R., & Sasikumar, M. (2007). Lossless watermarking in JPEG2000 for EPR data hiding. In Proceedings of IEEE-EIT 2007, Chicago, USA (pp. 697–702).
54.
Zurück zum Zitat Shivani Garg and Ranjit Singh. (2012). An efficient method for digital image watermarking based on PN sequences. International Journal on Computer Science and Engineering (IJCSE), 4(09), 1550–1561. Shivani Garg and Ranjit Singh. (2012). An efficient method for digital image watermarking based on PN sequences. International Journal on Computer Science and Engineering (IJCSE), 4(09), 1550–1561.
Metadaten
Titel
Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain
verfasst von
Amit Kumar Singh
Mayank Dave
Anand Mohan
Publikationsdatum
01.08.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2505-0

Weitere Artikel der Ausgabe 3/2015

Wireless Personal Communications 3/2015 Zur Ausgabe

Neuer Inhalt