SVD based Watermarking Method for Medical Image Security

Similar documents
DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

Robust Image Watermarking based on DCT-DWT- SVD Method

Speech Modulation for Image Watermarking

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

An Improved Performance of Watermarking In DWT Domain Using SVD

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Implementation of DCT DWT SVD based watermarking algorithms for copyright protection

IMAGE FUSION PARAMETER ESTIMATION AND COMPARISON BETWEEN SVD AND DWT TECHNIQUE

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Improved Qualitative Color Image Steganography Based on DWT

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Image Enhancement in Digital Image Watermarking Using Hybrid Image Transformation Techniques

DWT-SVD Based Digital Image Watermarking Using GA

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

A New Approach to Compressed Image Steganography Using Wavelet Transform

Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

A New Spatial q-log Domain for Image Watermarking

Comparative Analysis of Video Watermarking Scheme Using Different Wavelets & SVD

Digital Watermarking Using 2-DCT

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Robust Watermarking Algorithm For JPEG Images

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

DWT-SVD based Multiple Watermarking Techniques

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

Image Error Concealment Based on Watermarking

Volume 2, Issue 9, September 2014 ISSN

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Comparison of wavelet based watermarking techniques Using SVD

Video Watermarking Technique Based On Combined DCT and DWT Using PN Sequence Algorithm

An Invisible, Robust and Secure DWT-SVD Based Digital Image Watermarking Technique with Improved Noise Immunity

A Modified SVD-DCT Method for Enhancement of Low Contrast Satellite Images

A Robust Image Hiding Method Using Wavelet Technique *

An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE

Image Quality Assessment Techniques: An Overview

FRAGILE WATERMARKING USING SUBBAND CODING

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

ROBUST WATERMARKING OF REMOTE SENSING IMAGES WITHOUT THE LOSS OF SPATIAL INFORMATION

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

Performance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs

arxiv: v1 [cs.mm] 16 Mar 2017

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

DCT-Based Image Feature Extraction and Its Application in Image Self-Recovery and Image Watermarking

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

Image Contrast Enhancement in Wavelet Domain

An Optimal Gamma Correction Based Image Contrast Enhancement Using DWT-SVD

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Audio Watermarking using Colour Image Based on EMD and DCT

A CRT BASED ROBUST IMAGE WATERMARKING USING DISCRETE TCHEBICHEF TRANSFORM

A Nonoblivious Image Watermarking System Based on Singular Value Decomposition and Texture Segmentation

EMBEDDING WATERMARK IN VIDEO RECORDS

Image and Video Watermarking

QR-Code Image Steganography

HISTOGRAM BASED WATERMARKING USING ENTROPY TECHNIQUE IN DIGITAL IMAGES

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

IRIS BIOMETRIC WATERMARKING USING SINGULAR VALUE DECOMPOSITION AND WAVELET BASED TRANSFORM

A Novel Audio Watermarking Algorithm Based On Reduced Singular Value Decomposition

Research Article DCT-PCA Based Watermarking on E-governance Documents

Robust copyright protection scheme for digital images using the low-band characteristic

Attack Detection in Watermarked Images with PSNR and RGB Intensity

FINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

On domain selection for additive, blind image watermarking

Adaptive Quantization for Video Compression in Frequency Domain

Image Steganography Method Using Integer Wavelet Transform

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Reduction of Blocking artifacts in Compressed Medical Images

Moment-preserving Based Watermarking for Color Image Authentication and Recovery

Review on Digital Watermarking Images

Data Hiding in Video

PROBABILISTIC MEASURE OF COLOUR IMAGE PROCESSING FIDELITY

Transcription:

SVD based Watermarking Method for Medical Image Security Remya Elizabeth Philip PG Student Bannari Amman Institute of Technology Sumithra M.G Professor of ECE Department Bannari Amman Institute of technology ABSTRACT Most commonly watermarking is done for authentication purposes. Due to the widespread use of medical images for telemedicine applications the watermarking process gains more attention in the medical field i.e. for secure transmission of medical images from one hospital to another, for presenting the image as court evidence etc. This paper gives a comparative analysis on applying the watermark on the diagonal matrix of the SVD decomposed. The usefulness of SVD in watermarking applications and mathematical models are also given briefly. The performance is verified using PSNR, Pearson Correlation Coefficient and Image Quality Index. KEYWORDS: - Watermark, Singular Value Decomposition, PSNR, Pearson Correlation Coefficient, Image Quality Index. 1. INTRODUCTION The Institution of Medicine defines telemedicine as the use of electronic information technologies to provide and support health care when distance separates the participants. The most common application today is in the transmission of high resolution X-rays, CT scan and other medical images. Telemedicine arose originally to serve rural populations or any people who are geographically isolated, where time and cost of travel make access to the best medical care difficult. Now it is increasingly being used in conventional medicine, to permit doctors the world over to share exclusive recourses and valuable experience. Hence, healthcare industry demands secure, robust and more information hiding techniques promising strict secured authentication and communication through internet or mobile phones. So the security aspect of the data hiding is also an important parameter as far as medical field is concerned. Medical image watermarking requires extreme care when embedding supplementary data within the medical images because the supplementary information must not affect the image quality as this may cause an incorrect diagnosis [1]. This kind of a system requires a high level of security, which can be assured by using digital watermarking techniques. This imposes three obligatory features: robustness, capacity, imperceptibility and capacity [3]. There are several methods that has been using for medical image watermarking. The watermark can directly be embedded in the LSB as described by Mohamed Ali et al. In some applications it is often not allowed to alter the image contents even one bit of information. The requirement of imperceptibility can be fulfilled by two methods (a) by embedding the watermark in the region of non interest (RONI) and keeping the region of interest (ROI) distortion free, and (b) by selecting reversible watermarking method which retrieve the original cover image by undoing the watermark embedding process at the receiving end after the image authentication process is completed. In this paper the performance of embedding the watermark using usual SVD approach is enhanced by simply embedding the watermark in the post and pre diagonal elements, thereby reducing the complexity and still maintaining the quality of the original image. 2. IMPORTANT PARAMETERS IN WATERMARKING SYSTEMS Digital watermarking systems have a set of parameters. Tradeoff between them is necessary for the robustness and proper working of a watermarking system. The most important ones are listed here [4]: 2.1 Amount of information embedded: This important parameter is influenced by the specific application and straightaway influences the potency of the system. The more information introduced, the less robust the watermarking will be. This parameter also depends on the watermark intensity. 2.2 Watermark intensity: Also known as the power of the embedded watermark. To increase the robustness, one may increase this parameter, but at the cost of the deprivation of original image. In this paper alpha is used to represent the watermark intensity. As the alpha value increases the image quality decreases, but at the same time robustness increase. 2.3 Size of watermark: Similar to its intensity, the larger the size of watermark is, the robust the system will be. It should be noticed that watermark that is too small tend to have little value in real application. 2.4 Control information: Though it has nothing to do with the invisibility or robustness of the watermarking system, the control information, for example, the key used to reorganize the watermark before embedding it, plays an important role in system security. 3. PERFORMANCE VALIDATION PARAMETERS Basically the performance evaluation parameters can be classified into two types 1. Objective 2. Subjective Objective parameters are based on human visual system (HVS) they attempts to incorporate human perceptual quality measures e.g. image quality index (IQI), picture quality scale(pqs),mean optimum score etc, whereas subjective measures are based on some mathematical model for e.g. peak signal to 29

noise ratio, mean square error, Pearson Correlation Coefficient (PCC), robustness etc. 3.1 PEAK SIGNAL TO NOISE RATIO (PSNR) PSNR is one of the most important parameter for the evaluation of image quality. PSNR is given by the eqn.3.1, where, respectively; are the original and watermarked images is the maximum pixel value. 3.2 PEARSON CORRELATION COEFFICIENT Defined as the covariance of two variables divided by the product of their standard deviation [5], 3.3 UNIVERSAL IMAGE QUALITY INDEX (3.2) Let x = {x i i =1, 2.N} and y = {y i i=1, 2 N} be the original and watermarked images respectively, then the image quality index is given by [6], where, The active range of Q is [-1 1]. The value 1 is achieved if y i = x i for all values of i= 1, 2 N which is the best value. The value - 1 occurs when y i = - x i for all values of i =1, 2 N which is the lowest value. This quality index figures any distortion as a combination of three different distortions: loss of correlation, luminance and contrast. The equation (3.4), (3.5), (3.6), (3.7), (3.8) represents the mean and variance of the respective images. More information about this parameter is not included in this section; further information will be available from the reference paper [6]. 4. SINGULAR VALUE DECOMPOSITION AND PROPOSED METHODOLOGY One of the most important numerical techniques that are used for the diagonalization of the matrices is the singular value decomposition (SVD). It is an algorithm developed for a variety of applications. The main properties of SVD from the viewpoint of image processing applications are: (1) the singular values (SVs) of an image have very good stability, i.e., when a tiny perturbation is added to an image, its SVs do not change considerably; (2) SVs represent inherent algebraic image properties. In this section, we describe a watermark casting and revealing scheme based on the SVD. From the viewpoint of linear algebra we can observe that a digital image is an array of non-negative scalar entries which may be regarded as a matrix. Given the matrix I which represents an input image, singular value decomposition (SVD) can be used to decompose I into I = UDV T where U and V are orthogonal matrices and D is a singular, diagonal matrix [7]. In applications, SVD method has been applied for image compression, image hiding and image watermarking.chung et al. [8] presented an SVD and vector quantization-based image hiding algorithm for embedding the secret data into the D component of the SVD. Using a different way, Liu and Tan [9] presented a well-organized SVD-based algorithm to modify the coefficients in D component for embedding watermark into the cover image. Chang et al. [10] presented a block-based watermarking algorithm by partitioning the image into several blocks and changed the coefficients in U component for each block to achieve the watermarking effect. SVD can also used for watermarking by changing the singular values of the input image and replacing the singular values with the watermark. Mostly the watermark embedding process is done on the entire diagonal elements of the test image; here the embedding is done only on the pre diagonal or post diagonal elements. The results of both are verified using the parameters discussed in section 3. The steps for the watermark embedding and extraction process are given below. Step1 Take a medical image (CT scan) 512 512 Step2 Apply SVD to the test image so that the image is treated as the product of three matrices Step3 Apply the watermark (256 256) into the diagonal elements of the test image in such a way that the watermark is embedded on the first half diagonals i.e. pre diagonal elements and the post diagonal elements i.e. bottom half diagonals respectively. Step4 Use the U and V matrix of the original image to get the watermarked image. Step5 The reverse process is done for retrieval purpose. Step6 The performance of the retrieved image is verified using PSNR, Pearson Correlation Coefficient, and Image Quality Index. 30

PSNR in db International Journal of Computer Applications (0975 8887) 5. RESULTS AND DISCUSSIONS Here the medical image used is CT scan of size 512 512 and the watermark used is 256 256, any value below 256 256 can also be used as the watermark. The watermark used here is the hospital logo; this watermark is used for the authentication purposes. The original image and the watermark are given in the figure 1. table1. Figure 5 shows the extracted watermark after post embedding. The analysis shows that the watermark embedding in the post diagonal elements gives better results than that of embedding in the pre diagonal elements. The PSNR comparison of the pre embedded and post embedded watermarked image is given in the figure 2. (a) (b) (c) (a) (b) Figure 1 (a) CT scan (b) watermark (logo) 80 75 post pre (d) (e) (f) 70 65 60 55 (g) (h) 50 45 40 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 degree of watermark Figure 2 PSNR comparison of pre embedded and post embedded watermarked image Figure 3 shows the retrieved watermark for different values of alpha after pre - embedding is done, the alpha value is varied in the range of 0.01-0.13 such that as the alpha value increases the robustness increases but a large increase in the alpha value causes the original image quality to be get reduced. Therefore the alpha value cannot be increased beyond a particular limit. Figures 4, 6 shows the performance of both the post and pre embedding algorithm, figure 4 gives the variation of image quality index for different alpha values. Figure 6 shows the Pearson Correlation Coefficient, which is usually considered as the similarity measure between the original and retrieved watermark. Since the quality of the medical image is high even after the embedding of the watermark, there is no necessity of further finding the similarity measure. The PSNR comparison is also done for retrieved watermark in both the case that is after using pre embedding and post embedding algorithm, it is shown in the Figure 3 Retrieved watermark for different alpha values after pre embedding (a) alpha=0.01 (b) alpha=0.03 (c) alpha= 0.05 (d) alpha=0.07 (e) alpha=0.09 (f) alpha=0.1 (g) alpha=0.13 (h) watermarked image after pre embedding for alpha = 0.05 Table 1 PSNR comparison of retrieved watermark after pre embedding and post embedding Alpha 0.01 0.03 0.05 0.07 0.09 0.1 0.13 PSNR (pre) PSNR (post) 25.3 27.55 30.06 31.22 30.1 26.32 24.9 25.6 40.4 42.5 39.89 39.33 37.47 36.77 From the table1 it should be noted that the post embedding gives a better performance. As the pre embedding has a less PSNR value compared to the post embedding, for further analysis we can use the post padding of the watermark. 31

PCC International Journal of Computer Applications (0975 8887) 1.02 1 0.98 0.96 0.94 0.92 0.9 prepadding post padding 0.01 0.03 0.05 0.07 0.09 0.11 0.13 Alpha Figure 6 Pearson Correlation Coefficient (PCC) of extracted image against different alpha values Figure 4 Image Quality Index of extracted watermark for different values of alpha (a) (b) (c) (d) (e) (f) 6. CONCLUSION Nowadays watermarking methods are attaining great attention because of its advantages over encryption and steganography methods, here in this paper usual method of applying SVD for watermarking purpose is changed by simply applying the watermark in the post and pre diagonal elements so that the complexity of normal SVD can be reduced, still maintaining the image quality. Here from these results it is clear that the post application of the watermark gives a better result as compared to pre embedding method. Also it is found that the alpha value in the range 0.03-0.05 is giving a superior performance when compared to other values even though higher alpha values increases robustness of the watermark against attacks. Further the stability of the watermarking method can also be tested by applying different types of attacks. 7. REFERENCES [1] Basant Kumar, Harsh Vikram Singh, Surya Pal Singh, Anand Mohan, Secure Spread-Spectrum Watermarking for Telemedicine Applications Journal of Information Security,Vol.2,91-98, April 2011. [2] J.M.Acken, How watermarking adds value to digital content, Communications of the ACM, Vol.41, No.7, pp.74-77, 1998. (g) (h) Figure 5 Retrieved watermark for different alpha values after post embedding (a) alpha=0.01 (b) alpha=0.03 (c) alpha= 0.05 (d) alpha=0.07 (e) alpha=0.09 (f) alpha=0.1 (g) alpha=0.13 (h) watermarked image after post embedding for alpha = 0.05 [3] I Cox, M Miller, J.Bloom, J. Fridrich, T.Kalker, Digital Watermarking and Steganography 2 nd Ed. ISBN: 978-0123725851. [4] Chich-Chin Lia, Cheng-Chih Tsai, Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition IEEE Trans.Instrum. Meas., vol. 59, no. 11, pp. 3060-3063, Nov. 2010 [5] http://www.une.edu.au/webstat/unit_materials/c4_descriptiv e_statistics/pearsons_coeff.html [6] Zhou Wang, Alan C. Bovik A Universal Image Quality Index IEEE Signal Processing Letters, Vol. 9, No. 3, March 2002 32

[7] G. Bhatnagar and B. Raman, A new robust reference watermarking scheme based on DWT-SVD, Comput. Standards Interfaces, vol. 31, no. 5, pp. 1002 1013, Sep. 2009 [8] K.L. Chung, C.H. Shen, L.C. Chang, A novel SVD and VQbased image hiding scheme, Pattern Recogn. Lett. 22 1051 1058, 2001 [9] R. Liu and T. Tan, An SVD-based watermarking scheme for protecting rightful ownership, IEEE Trans. Multimedia, vol. 4, no. 1, pp. 121 128, Mar. 2002. [10] C.C. Chang, P. Tsai, C.C. Lin, SVD-based digital image watermarking scheme, Pattern Recogn. Lett. 26 1577 1586, 2005. [11] S.H.Low, N.F.Maxemchuk and A.M.Lapone, Document identification for copyright protection using centroid detection, IEEE Trans. on Communications, Vol.46, No.3, pp. 372-383, 1998. [12] Hui Huang, Gouenou Coatrieux, Limin Luo Blind Integrity Verification of Medical Images IEEE transactions on information technology in biomedicine, vol. 16, no. 6, November 2012. [13] Lingling An, Xinbo Gao, Dacheng Tao Robust Reversible Watermarking via Clustering and Enhanced Pixel-Wise Masking IEEE Transactions on Image Processing, vol. 21, no. 8, August 2012. [14] B.R.Macq and I. Pitas, Special issue on watermarking, Signal Processing, Vol.66, No.3, pp.281-282, 1998. [15] M.D.Swanson, M.Kobayashi and A.H.Tewfik, Multimedia data-embedding and watermarking technologies, Proceedings of the IEEE, Vol.86, No.6, pp.1064-1087, 1998. [16] Badran, E.F. Sharkas, M.A. Attallah, O.A. Multiple watermark embedding scheme in wavelet-spatial domains based on ROI of medical images National Radio Science Conference, 2009. NRSC 17-19 March 2009. [17] Rafael C. Gonzalez, Richard E.Woods, Steven L. Eddins, (2006), Digital Image Processing Using Mat lab, Prentice Hall. [18] J. Zhao, E. Koch and C. Luo, Digital watermarking in business today and tomorrow, Communications of ACM, Vol.41, No.7, pp.67-72, 1998. [19] W. Zeng, Digital watermarking and data hiding: technologies and applications, Proc. of ICISAS 98, Vol.3, pp.223-229, 1998 [20] Koushik Pal, G.Ghosh, M. Bhattacharya Biomedical Image Watermarking in Wavelet Domain for Data Integrity Using Bit Majority Algorithm and Multiple Copies of Hidden Information American Journal of Biomedical Engineering pp. 29-37,2012 33