Joint Digital Water Marking for Medical Images for Improving Security
Kavitha K. Jand Priestly B. Shan1,2

1CSE Department, Research Scholar, Sathyabama University, Chennai, India.

2Eranad Knowledge City-Technical Campus, Manjeri, India.

Corresponding Author E-mail:

Abstract: Digital watermarking is one of the most efficient techniques to provide the highest secureness to the transmission of data like images or videos over the internet. Quite over the medical data which incorporates the EHR (Electronic Health Record) and medical images and conjointly the military data are crucial whose protection and privacy is extremely a lot of essential issues. To secure this data, the Digital watermarking plays a major role so that it will guarantee authentication, integrity, confidentiality and reliability. In the case of medical images, even a small change or modifications are strictly prohibited as it might lead to the incorrect diagnosis of the disease. Therefore, securing medical image is extremely essential. So as to provide high security for each patient’s data and also the various medical scanning images, we can employ the Digital Water Marking (DWM) technique. The DWM technique may be implemented in two ways: Spatial domain technique and Frequency domain technique. Although the spatial implementation is extremely straightforward and a very simple method, most of the implementations are done using frequency or transform/remodel domain strategies since it provides additional details and high effectiveness. The DWM may be implemented using numerous transform/remodel techniques like Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), also with the combination of these remodel techniques. Nowadays the work is also extended using a combination of transforming/remodel and spatial domain techniques. In this article the Digital Water Marking is being implemented by employing a combination of a transform technique DWT and a spatial domain technique SVD to provide security to the medical images and also the system efficiency is checked for numerous attacks.

Keywords: DCT; DWT; Encryption; IWT; SVD

[ HTML Full Text]

Back to TOC