Comparison Performance Analysis of Multi-Wavelet Based Watermarking Techniques for Medical Images Using Genetic Algorithm (GA)
In this paper, the scaling factor of the watermark is the significant parameter that helps in improving the imperceptibility and robustness against attacks. The tradeoff between the imperceptibility and robustness is considered as an optimization problem and is solved by applying genetic algorithm (GA). The water marking is proposed to be implemented using a hybrid approach which encompasses discrete wavelet transforms (DWT), lifting wavelet transforms (LWT) and singular value decomposition (SVD) technique. The encryption is proposed to be effected using RSA and AES encryption algorithms. A graphical user interface (GUI) which enables the user to have ease of operation in loading the image, watermark it, encrypt it and also retrieve the original image whenever necessary is also designed and presented in this paper.
C.H. Venugopal Reddy is working as Professor in the department of ECE, Priyadarshini College of Engineering & Technology, Nellore,
affiliated to JNTU Anantapur, A.P. He has more than 13 years of teaching experience. He got his B. Tech (ECE) from K.S.R.M. Engg. College, Kadapa, A.P, affiliated to S.V. University, Tirupathi, A.P. M.E (Commn. Sys) from Dr. M.G.R Engg College, Chennai, T.N affiliated to Anna University, Chennai. He is presently pursuing PhD in the area of digital image water marking, Acharya Nagarjuna University, Guntur. He has a good no. of research publications in his credit. His research interests are in the areas of image processing, signal processing and communications.
Cite this Article
Venugopal Reddy CH, Siddaiah P. Comparison Performance Analysis of Multi-Wavelet Based Watermarking Techniques for Medical Images Using Genetic Algorithm (GA). Journal of Image Processing & Pattern Recognition Progress. 2016; 3(1): 15–23p.
Raúl RC, Feregrino-Uribe C, Gershom de J, et al. Data Hiding Scheme for Medical Images. 17th International Conference on Electronics, Communications and Computers (CONIELECOMP’07). 2007; 32.
Tachakra S, Wang XH, Istepanian RS, et al. Mobile e-Health: The Un-Wired Evaluation of Telemedicine. Telemed J e-Health. 2003; 9(3): 247–257p. 3. Coatrieux G, Maitre H, Sankur B, et al. Relevance of Watermarking in Medical Imaging. Conf. Information Technology Applications in Biomedicine, ITAB'00. 250–255p.
Diepgen TL, Eysenbach G. Digital Images in Dermatology and the Dermatology Online Atlas on the World Wide Web. Dermatol. Dec 1998; 25(12): 782–787p. 5. Lu CS, Liao HYM. Multipurpose Watermarking for Image Authentication and Protection. IEEE Trans Image Proc. 10(10): 1579–1592p.
Coatrieux G, Maitre H, Sankur B. Strict Integrity Control of Biomedical Images. Proc. SPIE Security and Watermarking of Multimedia Contents III, SPIE2001. 4314: 229–240p.
Kannammal A, Subha Rani S. Double Watermarking of DICOM Medical Images Using Wavelet Decomposition Technique. Eur J Sci Res. 2012; 1: 46–55p. 8. Bhatnagar G, Raman B. A New Robust Reference Watermarking Scheme Based on DWT-SVD. Comput Standards Interfaces. 2009; 31(5): 1002–1013p. 9. Vallabha VH. Multiresolution Watermark Based on Wavelet Transform for Digital Images. Cranes Software International Ltd.; 2003.
Chang WH, Lee YS, Peng WS, et al. A Line-Based, Memory Efficient and Programmable Architecture for 2D DWT Using Lifting Scheme. IEEE Int. Symposium on Circuits and Systems, Sydney, Australia. 2001; 330–333p.
Daubechies, Sweldens W. Factoring Wavelet Transforms into Lifting Schemes. J Fourier Anal Appl. 1998; 4: 247–269p.
Sweldens W. The Lifting Scheme: A Custom-Design Construction of Bi-Orthogonal Wavelets. Appl Comput Harmon Anal. 1996; 3(15): 186–2000p.
David Kahaner, Cleve Moler, Stephen Nash. Numerical Methods and Software. Upper Saddle River, NJ: Prentice-Hall, Inc.; 1989.
Chin-Chen Chang, Piyu Tsai, Chia-Chen Lin. SVD-Based Digital Image Watermarking Scheme. Pattern Recogn Lett. 15 Jul 2005; 26(10): 1577–1586p.
Andrews HC, Patterson CL. Singular Value Decomposition (SVD) Image Coding. IEEE Trans Commun. Apr 1976; 24(4): 425–432p.
Thambiraja E, Ramesh G, Umarani R. A Survey on Various Most Common Encryption Techniques. Int J Adv Res Comput Sci Softw Eng. 2012; 2: 226–233p.
Bouslimi D, Coatrieux G, Cozic M. A Joint Encryption/Watermarking Systems for Verifying the Reliability of Medical Images. IEEE Trans Inform Technol Biomed. 2012; 16.
Federal Information Processing Standards Publication 197. Advanced Encryption Standard (AES). Nov 26, 2001. 19. Thede S. An Introduction to Genetic Algorithms. Journal of Computing Sciences in Colleges (JCSC). Oct 2004; 20(1): 115–123p.
Kumsawat P, Attakitmongcol K, Srikaew A. A New Approach for Optimization in Image Watermarking by Using Genetic Algorithms. IEEE Trans Signal Process. 2005; 53: 4707–4719p.
Grefenstette John J. Optimization of Control Parameters for Genetic Algorithms. IEEE Trans Syst, Man Cybern. 1986; 16(1): 122–128p.
- There are currently no refbacks.
This site has been shifted to https://stmcomputers.stmjournals.com/