Open Access Open Access  Restricted Access Subscription or Fee Access

Analysis of Image Watermarking Techniques against Various Noise Attacks for Medical Images using Genetic Algorithm (GA)

Reddy V

Abstract


In this paper, we have presented a dual secure digital image watermarking algorithm based on discrete wavelet transforms (DWT), lifting wavelet transforms (LWT) and singular value decomposition (SVD) using genetic algorithm (GA) for medical images. The natural image is chosen as cover image and is decomposed up to three levels using discrete wavelet transform. The medical image is chosen as a watermark. The genetic algorithm is used to embed and extract the watermark. The encryption is proposed to be effected using RSA and AES encryption algorithms. A graphical user interface (GUI) which enables the user to have an ease of operation in loading the image, watermark it, encrypt it and also retrieve the original image whenever necessary is also designed and presented in this paper. Peak signal to noise ratio (PSNR) and normalized correlation coefficient (NC) are computed to measure the image quality of the proposed technique. Experimental results show that the proposed watermarking technique has good imperceptibility and robustness against to image processing attacks such as sharpening, smoothening, motion blur, salt and pepper noise, gaussian noise, speckle noise and poisson noise.

Cite this Article
Reddy and Siddaiah. Analysis of Image Watermarking Techniques against
Various Noise Attacks for Medical Images using Genetic Algorithm(GA).
Journal of Artificial Intelligence Research and Advances. 2015; 2(3):
36–44p.


Keywords


DWT, LWT, SVD, GA, RSA and AES

Full Text:

PDF

References


Coatrieux et al. Relevance of watermarking in medical imaging. Proceedings of IEEE EMBS International Conference on Information Technology Applications in Biomedicine. 2000; 250–255p.

Coatrieux et al. A review of image watermarking applications in healthcare. Proceedings of 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. 2006; 4691–4694p.

Chao et al. A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans. Inf. Technol. Biomed. 2002; 6(1): 46–53p.

Jennett et al. Telemedicine and security. Confidentiality, integrity, and availability: A Canadian perspective. Studies in Health Technology and Informatics. 1996; 29: 286–298p.

Coatrieux et al. Strict integrity control of biomedical images. Proc. SPIE Security and Watermarking of Multimedia Contents III. SPIE 2001; 43(14): 229–240p.

Al-Haj A. Combined DWT-DCT Digital Image Watermarking. Journal of Computer Science. 2007; 3(9): 740–746p.

Aymen et al. Performance Optimization of Discrete Wavelets Transform Based Image Watermarking Using Genetic Algorithms. Journal of Computer Science. 2008; 834–841p.

Nikolaidis A and Pitas I. Asymptotically optimal detection for additive watermarking in the DCT and DWT domains. IEEE Trans. Image Process. 2003; 12(5): 563–571p.

Lee et al. A line-based, memory efficient and programmable architecture for 2D DWT using lifting scheme. IEEE Int. Symposium on Circuits and Systems, Sydney, Australia, 2001; 330–333p.

Daubechies and Sweldens W. Factoring wavelet transforms into lifting schemes. The Journal of Fourier Analysis and Applications. 1998; (4): 247–269p.

Sweldens W. The lifting scheme: a custom-design construction of biorthogonal wavelets. Applied and Computational Harmonic Analysis. 1996; 3(15): 186–2000p.

Kahaner D, Moler C, Nash S et al. Numerical methods and software. Prentice-Hall, Inc., Upper Saddle River, NJ, 1989.

Chang C, Tsai P, Lin C et al. SVD-based digital image watermarking scheme. Pattern Recognition Letters. 15 Jul 2005; 26(10): 1577–1586p.

Aslantas V. A singular-value Decomposition-Based Image Watermarking Using Genetic Algorithm. International Journal of Electronics and Communications. 2007; 62: 386–393p.

Tsai et al. Image Watermarking Scheme Using Singular Value Decomposition and Micro-genetic Algorithm. In: Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing. 2008; 469–472p.

Rivest RL, Shamir A, Adleman L et al. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 1978; 21(2): 120–126p.

Stallings W. Cryptography and Network Security: Principles and Practice. 5th Edn, Prentice Hall, 2010.

Federal Information Processing Standards Publication 1997, Advanced Encryption Standard (AES), Nov 26, 2001.

Thede S. An Introduction to Genetic Algorithms. Journal of Computing Sciences in Colleges. Oct 2004; 20(1): 115–123p.

Goldberg DE. Genetic Algorithm in Search, Optimization and machine Learning. Addison-Weseley, 1989.

Srinivas M and Patnaik LM. Genetic Algorithm: A Survey. IEEE, 1994.

Kumsawat P, Attakitmongcol K and Srikaew A et al. A New Approach for Optimization in Image Watermarking by Using Genetic Algorithms. J. IEEE Transactions on Signal Processing. 2005;

, 4707–4719p.

Grefenstette JJ. Optimization of Control Parameters for Genetic Algorithms. IEEE Transactions on Systems, Man and Cybernetics. 1986; 16(1): 122–128p.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/