Open Access Open Access  Restricted Access Subscription or Fee Access

A Study on Digital Watermarking on Medical Images

K.J. Kavitha, Dr. B. Priestly Shan

Abstract


Development in the field of Internet allows medical images (MI) to be transferred over the anxious network. These MI must be prevented from copy right protection, protecting patient’s privacy and tamper detection. In this article, we focus on the study of significance, quality measures, security requirements, threats, characterization, limitations of current WM techniques and recommendations for suitable WM techniques for protecting MI.

Keywords


Copyright Protection, WM Techniques

Full Text:

PDF

References


. M. T. Naseem, I. M. Qureshi, and T. A. Cheema, “Invertible and Fragile Watermarking for Medical Images Using Residue Number,” vol. 2, no. 10, pp. 10643–10651, 2012.

. A. Umaamaheshvari and K. Thanuskodi, “Survey of Watermarking Algorithms For Medical Images,” vol. 3, pp. 401–410, 2012.

. S. Cheung, D. K. W. Chiu, and C. Ho, “The Use of Digital Watermarking for Intelligence Multimedia Document Distribution,” vol. 3, no. 3, pp. 103–118, 2008.

. R. Mishra, “Digital Security using Watermarking Techniques via Discrete Wavelet Transform,” vol. 476444, pp. 1–8, 2012.

. S. Bhattacharya, T. Chattopadhyay, and A. Pal, “A Survey on Different Video Watermarking Techniques and Comparative Analysis with Reference to H. 264 / AVC,” pp. 0–5, 2006.

. G. V Mane and G. G. Chiddarwar, “Review Paper on Video Watermarking Techniques,” vol. 3, no. 4, pp. 1–5, 2013.

. H. Shojanazeri, W. Azizun, W. Adnan, S. Mumtadzah, and S. Ahmad, “Video Watermarking Techniques for Copyright protection and Content Authentication,” vol. 5, pp. 652–660, 2013.

. C. Science and S. Engineering, “An Overview of Different Type of Data Hiding Scheme in Image using Steganographic Techniques,” vol. 4, no. 1, pp. 746–751, 2014.

. B. Mathur, “Study on high Performance and Effective Watermarking Scheme using Hybrid Transform (DCT-DWT),” pp. 170–176, 2013.

. S. Liew, S. Liew, and J. M. Zain, “Tamper Detection And Recovery With Run Length Encoding Compression,” pp. 799–803, 2010.

. B. Ram, “Wavelet Transform and Discrete Cosine Transform,” vol. 2, pp. 19–27, 2013.

. J. M. Zain, “DIGITAL WATERMARKING IN MEDICAL IMAGES A Thesis Submitted for the Degree of Doctor of Philosophy,” no. November, 2005.

. M. M. Abd-eldayem, “ORIGINAL ARTICLE A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine,” Egyptian Informatics Journal, vol. 14, no. 1, pp. 1–13, 2013.

. Adiwijaya, “Tamper Detection and Recovery of Medical Image Watermarking using Modified LSB and Huffman Compression” ISBN: 978-1-4673-5256-7/13/$31.00 ©2013 IEEE.

. Baiying Lei, “Robust Watermarking Scheme for Medical Image Using Optimization Method” 978-1-4799-0434-1/13/$31.00 ©2013 IEEE.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.