Home Machine Learning-Based Robust Watermarking Technique for Medical Image Transmitted Over LTE Network
Article Open Access

Machine Learning-Based Robust Watermarking Technique for Medical Image Transmitted Over LTE Network

  • Ankur Rai EMAIL logo and Harsh Vikram Singh
Published/Copyright: June 7, 2017
Become an author with De Gruyter Brill

Abstract

This paper discusses a safe and secure watermarking technique using a machine learning algorithm. In this paper, the propagation of a watermarked image is simulated over the third-generation partnership project (3GPP)/long-term evolution (LTE) downlink physical layer. The watermark data are scrambled and a transform domain-based hybrid watermarking technique is used to embed this watermark into the transform coefficients of the host image and transmitted over the orthogonal frequency division multiplexing (OFDM) downlink physical layer. Support vector machine (SVM) is used as a classifier for the classification of non-region of interest (NROI) and region of interest (ROI) in a medical image. The result achieved in this experiment revealed that a 10−6 bit error rate (BER) value is realizable for a greater value of signal-to-noise ratio (SNR; i.e. more than 10.4 dB of SNR). The peak SNR (PSNR) of the received cover image is more than 35 dB, which is acceptable for clinical applications.

1 Introduction

In the early 1800s, people used naive methods for transferring information and messages from one place to another, but the transfer of these methods depended on the distance and length of the message. For example, special flags, smoke signs, or short messages and other visual signals were used for small-distance communication. However, to send a message over a long distance, using couriers was a more feasible basic choice. With the span of time, a new era of communication has taken place, where a long message (audio, video, or text) can be easily transmitted over a long distance with less latency [12]. Therefore, the demand for mobile Internet grew exponentially. As per the Opera web browser, the number of pages viewed has raised from about 23 billion in January 2010 to 177 billion pages in November 2013 [37].

Over the past years, the significant change in the usage of smartphones, tablets, netbooks, and laptops with wireless as well as broadband connections has added as many tens of millions of users [25]. These examples show the huge demand for higher transfer rate, better availability, and higher speed for mobile Internet connections. The researchers and the telecom industry have been working hard to come up with new ideas for network architecture at low cost as well as high-speed broadband connection for mobile access. The generation of wireless networks 1G, 2G, 2.5G, 3G, and Worldwide Interoperability for Microwave Access (WiMAX) like network infrastructure has been installed for several applications such as text, voice, and data transfer. This infrastructure is being used in several telemedicine applications. However, lower data rates and secure transmission are the main issues.

The third generation of mobile communication standards is announced by the Third-Generation Partnership Project (3GPP) as Long-Term Evolution (LTE). In mobile communication, LTE is the modern technology. It is considered as a 3.9G mobile network and is being standardized by 3GPP [3]. The title LTE is taken from the Evolved Universal Terrestrial Radio Access Network (E-UTRAN) [1, 2]. It is constituted on all IP frameworks, which is not limited by earlier design. In downlink, the data rate is enlarged to 100 Mbps for data transmission using orthogonal frequency division multiplexing (OFDM), whereas the uplink access is upgraded to 50 Mbps by means of the Single Carrier-Frequency Division Multiple Access (SC-FDMA) modulation scheme. The cellular network bandwidth is ascendable from 1.25 to 20 MHz and improved infrastructure is employed using LTE [4, 14]. Different bandwidth allocations and spectrum availability of different network operators to provide deferent services are accommodated by means of this technique. The LTE technique fully uses the given spectral bandwidth for high data rate and voice services than 3G network carriers.

The 3GPP LTE technology is used to create an unfailing communication for telemedicine applications between hospitals and other medical purposes. The data transmission through open-channel network requires much attention for data security, reliability, and integrity. The secure data ought to be protected by unauthorized access, modification, or deletion. All these requirements can be easily fulfilled by means of steganography. This stimulates learning the use of frequently explored clinical images in securing the patient’s essential data. Therefore, digital image watermarking can be so much helpful for such applications.

These recent advancements in new emerging technologies for the transmission of data through wired or wire communication has opened the gate for intruders. Nowadays, data acquisition, transmission, and exchange are become so simple tasks due to the Internet and the availability of printers, fax, and computers. This transmission of digital data through open-channel network creates opportunities for the third parties or intruders to access data without any permission.

In this paper, we have proposed a novel watermarking technique in addition to the transmission of watermarked image over a simulated OFDM-based LTE physical layer. In this watermarking technique, a machine learning-based algorithm is applied to the cover medical image for the classification of ROI and NROI. A small misclassification in the selection of ROI and NROI can cause big trouble in diagnosis. Considering the LTE/3GPP technology for telemedicine applications, the bit error rate (BER) and the peak signal-to-noise ratio (PSNR) of the received signal have been evaluated.

The result achieved in this experiment revealed that a 10−6 BER value is realizable for a greater value of SNR (i.e. more than 10.4 dB of SNR). The PSNR of the received cover image is more than 35 dB, which is acceptable for clinical applications. The heartening results of the proposed embedding method can have potential applications in telemedicine.

2 LTE: An Overview

In cellular technology, LTE emerges as a new technology toward fast data communication using the existing allocated frequency spectrum. It enhances all the services such as data rate, voice, and video communication for the end users.

The efficient transmission of data and control information between an enhanced base station (eNodeB) and mobile user equipment (UE) is enlarged by means of LTE [46]. Some new advanced technology and services have been added to the cellular communication such as OFDM, SC-FDMA, and multiple input multiple output (MIMO) [16]. In downlink, the data rate is enlarged using OFDM, whereas the uplink access is upgraded by means of the SC-FDMA modulation scheme in LTE [9]. In OFDMA, a quantified number of symbols are permitted to or from several users on a subcarrier-by-subcarrier basis. The three vital components of LTE network are E-UTRAN, UE, and Evolved Packet Core (EPC; Figure 1 and Table 1).

Table 1:

Technical Specification of the LTE Network.

BandwidthScalable bandwidth: 1.4, 3.0, 5.0, 10.0, 15.0, and 20.0 MHz
Multiple access technologyDL: OFDMA; UL: SC-FDMA
Peak data rateDL (two-channel MIMO): 100 Mb/s in 20 MHz channel; UL (one-channel Tx): 50 Mb/s in 20 MHz channel
Supported antenna configurationsDL: 4×2, 2×2, 1×2, 1×1; UL: 1×2, 1×1
Spectrum efficiency5 bits/s/Hz
MobilityAdjusted for low speeds (<14 km/h); best performance at speeds up to 130 km/h; preserve link at speeds up to 380 km/h
CoverageBest performance up to 4.8 km; minor deprivation 4.9–35 km; operation up to 110 km should not be precluded standard
Latency~10 ms
Peak downlink speed 64QAM (Mbps)100 (SISO), 172 (2×2 MIMO), 326 (4×4 MIMO)
Peak uplink speeds (Mbps)50 (QPSK), 57 (16QAM), 86 (64QAM)
Figure 1: System Interface.
Figure 1:

System Interface.

The EPC connects data packet to the external world via the Internet or by other means of networking. Uu, S1, and SGi are shown as the interfaces between the different parts of the system.

Intercarrier interference (ICI) and intersymbol interference (ISI) have no effects in OFDM. Higher data bit streams are divided into small parallel bit streams in OFDM and transmitted over a large number of parallel narrow-band subcarriers in spite of a single wide-band carrier [15, 20]. The orthogonality property of OFDM removes any sign of interference among the data streams. In addition, it is robust against narrow-band interference and multipath problem.

The OFDM-based modulation scheme has some demerits. It is sensitive to frequency errors and phase noise, as subcarriers are closely spaced. It is delicate to Doppler shift and causes interference between the subcarriers (ICI) [36]. Another demerit of OFDM is the high peak-to-average signals, which introduces SC-FDMA in uplink, recompensing the disadvantage of OFDM. The functional commonalities of SC-FDMA and OFDMA are shown in Figure 2.

Figure 2: Functional Commonality of SC-FDMA and OFDMA.
Figure 2:

Functional Commonality of SC-FDMA and OFDMA.

  1. Constellation mapper: Depending on channel conditions (BPSK, QPSK, or 16QAM), it changes the arriving bit stream into single carrier symbols.

  2. Serial/parallel converter: As an input to the FFT engine, it sets up time domain SC symbols into blocks.

  3. M-point DFT: It converts time domain serial convertor symbol blocks into M discrete tones.

  4. Subcarrier mapping: DFT output tones are mapped to the specified subcarriers for transmission. SC-FDMA systems either use localized tones or distributed spaced tones. Localized subcarrier mapping is used in LTE.

  5. N-point IDFT: The transmission took place by converting mapped subcarriers back into time domain.

  6. Cyclic prefix and pulse shaping: Cyclic prefix is attached to SC-FDMA symbols to deliver multipath immunity. As in the case of OFDM, pulse shaping is employed to prevent spectral regrowth.

  7. RFE: It converts digital signal to analog and upconverts to RF for transmission.

In the receiver side chain, the process is essentially reversed.

3 Proposed Watermarking Model

The watermarking process can be defined as the embedding of secret data into a carrier or host signal, which later can be extracted for verification as well as validation [17, 24, 44]. It is appropriate to several applications such as temper detection, copyright protection, content authentication, and broadcast monitoring. In addition, watermarking is also used for confidentiality, reliability, and availability of the data. Image watermarking has various advantages over medical images, such as it saves bandwidth requirement, acquires small storage space, and provides confidentiality and protection against unauthenticated access to the secured data [32, 41]. The patient’s secret data are generally kept in Digital Imaging Communications in Medicine (DICOM) standard file format for any future interrogation. This private information ought to be hold secure from any alteration or tampering [18, 19, 21].

There are basically three stages involved in the watermarking of medical images. The first stage can be described as the classification of NROI and ROI, the second stage is the watermark embedding in the host image, and the last stage is the extraction of watermark information. In the classification stage, support vector machine (SVM) can play an important role, which is nothing but a machine learning algorithm that is being used widely for classification problems [5]. On the contrary, the transform domain methods such as singular value decomposition (SVD), discrete cosine transform (DCT), and discrete wavelet transform (DWT) are robust against various attacks in the embedding and extraction process [30, 31]. However, the DWT suffers from three major drawbacks (i.e. poor directional information, shift sensitivity, and lack of phase information) [8], whereas false-positive problem and higher computational cost are the main drawbacks of the SVD-based image watermarking, in which a false watermark is spotted in a watermarked image that was not originally embedded. This false-positive problem is resolved using shuffled SVD (SSVD) [42, 43]. It improves the quality of the reassembled image by partitioning an image into a set of unit images. The permuted original image by SVD with the data-independent permutation defines the SSVD [33, 34].

DWT is an advanced technique commonly used in various applications such as compression, image processing, and watermarking. In digital image watermarking techniques, DWT has its own importance due to its favorable spatial localization and multiresolution properties. Its multiresolution property reveals several information of an image [27, 29, 35]. Wavelet function partitioned the data into distinct frequency components. Discontinuities and sharp spikes of a signal can be studied in DWT, which shows its advantage over traditional transform methods [11, 28].

SVD is one of the numerical techniques used for the diagonalization of input image [45]. This numerical technique has several applications. An image I can be represented as a M×N nonnegative matrix with scalar values. SVD decomposes the M×N matrix into a diagonal matrix S of singular values and two orthogonal matrices U and V of nonnegative matrix I. The decomposition of matrix can be mathematically expressed by the given expression [7]:

I=U*S*V

In the statistical learning theory, SVM is a new class of supervised machine learning methods, which can be used for regression or classification problems, butgenerally it is usedinclassification issues [26]. In this classification algorithm, each data item is plotted as a point in n-dimensional feature space of items with the value of a particular coordinate, and then a classification is performed to distinguish the two classes by finding the best hyperplane, as depicted in Figure 3.

Figure 3: Support Vector Classification.
Figure 3:

Support Vector Classification.

“Margin” defines the utmost breadth of two parallel lines to the hyperplane, which does not contain any data points within the parallel slabs. The data points nearby the separating hyperplane are named “support vectors”. Support vector points lie on the edge of the slab.+represents data points of category positive and – represents data points of category negative.

Medical images are more critical images, as they contain patient information for the diagnosis of the disease, which must not be distorted, while embedding the secret data into the image. This important part of the image is ROI and the other part of the image, which is not so much essential, is known as NROI. A small misclassification may cause big trouble in extracting essential information of the patient. In the statistical learning theory, SVM is a new class of machine learning method to overcome the overfitting weakness of the neural network [40]. SVM as a classifier plays an important role, which is being used widely for classification problems [5, 6, 38]. However, in medical image watermarking, SVM has not been used in transform domain for medical image classification of region so far.

In our proposed model, a double-layer security is introduced to ensure the robustness of embedded data. The embedded data are scrambled using a unique key and a transform domain-based hybrid watermarking technique is applied to embed the scrambled data into the coefficients of host image. This proposed scheme exploits the feature of spatiofrequency localization of DWT and intrinsic algebraic properties of SVD.

The soft computing technique has been applied in numerous watermarking models. However, in medical image watermarking, SVM has not been used so far. In our watermarking system, SVM is involved in the classification stage, whereas the hybrid watermarking technique (DWT-SVD) is applied in the remaining stages. The block diagram is given in Figure 4.

Figure 4: Flow Diagram of the Proposed Watermarking Model.
Figure 4:

Flow Diagram of the Proposed Watermarking Model.

The steps involved in embedding and extraction in the proposed watermarking model are discussed here.

  1. Watermark embedding

    1. The NROI of host image H is decomposed into four subbands using one-level DWT.

    2. The SVD is applied to LH and HL subbands.

    3. The watermark image W is decomposed into two parts and then scrambled.

      W=P1+P2

    4. SVD is applied to the modified singular values.

      Si+αWi=UWiSWiVWi

      To measure the robustness of the inserted watermark, a factor is used, which is known as scale factor (α).

    5. The modified DWT coefficients are obtained, i.e.

      H*i=UiSWiVi

    6. A watermarked image is achieved by performing one-level inverse DWT.

    7. Now this watermarked image is added to the ROI pixels of image H to produce the final watermarked image WD.

  2. Watermark Extraction

    1. The watermarked image WD is decomposed into four subbands using one-level DWT.

    2. The SVD is applied to LH2 and HL2 subbands of watermarked image, i.e.

      HW*i=U*iSW*iV*i

    3. Obtain E*i=UWiSW*iVWi

    4. Extraction of both scrambled part of watermark, i.e.

      Ew*i=(E*iSi)/α

    5. The obtained scramble part from Step 4 is descrambled using the same secret key and then combined to form the complete extracted watermark image, i.e.

      Ew*=Ew*1+Ew*2

4 Results and Discussion

The experiment is performed using Intel Core i5 3.40 GHz processor, 1 TB HDD, 4 GB DDR3 memory, and Microsoft Windows 10. The proposed watermarking model is experimented using a JPEG grayscale image of size 256×256. The host image and watermarked image are shown in Figure 5. The database used in this experiment is taken from the MATLAB Central library. The grayscale image of size 128×128 is used as a watermark.

In the experiment, a JPEG image of size 256×256 consists of 65,536 predictor data points. These data points are further classified into two regions generally known as training data and testing data, which are used for the SVM model. For the training purpose, there are 6553 or 10% data points of the total available data, whereas the remaining 5893 or 90% data points are used to cross-validate the trained classification model. The feature values used here for classification are the intensity values and pixel positions of the input image, which are selected by the appropriate threshold value, and the result is determined by the naked eye. The proposed watermarking model and SVM classification are well discussed in Ref. [22]. The performance of our proposed watermarking model is tested with the Ganic and Eskicioglu [10] and Ramly et al. [23] methods for imperceptibility and robustness [22].

The simulation of image transmission is performed over an OFDM-based downlink physical layer. QPSK modulation is used in physical layer. BER and PSNR are calculated using the different values of SNR in the simulation at the receiver end. The average values of PSNR and BER are calculated by five trials for every SNR value as shown in Table 2. The perceptual quality is compared between the original and received images at the receiver end in Figures 5A and 6. For different SNR values, a watermark is obtained in Figure 7. Figure 7 reveals that the true recovery of the watermark data is obtained at a minimum value of SNR (i.e. 10.2 dB). The result achieved in this experiment reveals that a 10−6 BER value is realizable for a greater value of SNR (i.e. more than 10.4 dB of SNR). The PSNR of the received cover image is more than 35 dB, which is acceptable for clinical applications [13].

Table 2:

BER and PSNR of the Received Host Image.

Sr. no.SNR (dB)BER (dB)PSNR (dB)
100.324020.52
22.00.424823.39
34.60.432724.15
45.00.214025.45
56.50.114030.68
67.00.043131.50
77.70.028432.87
88.00.021233.20
98.50.018438.19
109.00.017240.10
119.50.016342.52
1210.00.004845.35
1310.20.3201×10−352.74
1410.35.0113×10−453.19
1510.40.9110×10−654.78

Several attacks are performed on the watermarked image. SSIM [39] is used for measuring the similarity between two images. The SSIM is calculated to measure the robustness of the proposed model against various attacks, such as pepper and salt noise addition, Gaussian noise, and JPEG compression, as shown in Table 3.

Table 3:

SSIM Values of the Extracted Watermark for Different Attacks.

Sr. no.Attacks/noiseSSIM
1Salt and paper noise0.584
2Gaussian noise0.601
3JPEG attack (90%)0.487
4JPEG attack (75%)0.531
5JPEG attack (55%)0.498
6JPEG attack (45%)0.601
7Speckle noise0.611
8Histogram equalization0.588
9Median filtering0.583
10Crop (5%)0.614
11Average0.569

5 Conclusions

In the healthcare industry, medical images or information are transmitted from one place to another using wired or wireless medium. Therefore, the transmission of such information requires more security. The proposed model ensures the perceptibility and robustness of medical images against several image processing attacks. In this paper, a secured transmission of the watermarked image over a simulated LTE downlink physical layer is performed. The outcomes from this experiment reveal high-quality imperceptibility of the received image with PSNR value of 52.74 dB at SNR of 10.2 dB, which is more than the adequate value of 35 dB for visual clinical analysis. The heartening simulation outcomes can have possible applications in telemedicine.

However, the proposed model may have increased the computational complexity, which needs to be improved. In future works, it can be extended to the embedding of text and fragile watermark at different levels of transformation. Further improvement of the performance of the proposed model will be testified in the forthcoming communication.

Figure 5: (A) Host Image and (B) Watermarked Image.
Figure 5:

(A) Host Image and (B) Watermarked Image.

Figure 6: Extracted Watermarked Image.
Figure 6:

Extracted Watermarked Image.

Figure 7: Extracted Watermark at Different SNRs.
Figure 7:

Extracted Watermark at Different SNRs.

Bibliography

[1] 3GPP TS 23.402, UTRAN- and E-UTRAN-Based Systems, Architecture Enhancement for Non-3GPP Access (Release 8).Search in Google Scholar

[2] 3GPP TS 36.211, Evolved Universal Terrestrial Radio Access (EUTRA); Physical Channels and Modulations (Release 8).Search in Google Scholar

[3] 3GPP TS 36.300, Evolved Universal Terrestrial Radio Access (EUTRA); Overall Description (Release 8).Search in Google Scholar

[4] D. Astely, E. Dahlman, A. Furuskar, Y. Jading, M. Lindström and S. Parkvall, LTE: the evolution of mobile broadband, IEEE Commun. Mag.47 (2009), 44–51.10.1109/MCOM.2009.4907406Search in Google Scholar

[5] C. J. C. Burges, A tutorial on support vector machines for pattern recognition, Data Mining Knowl. Discov.2 (1998), 121–167.10.1023/A:1009715923555Search in Google Scholar

[6] X. B. Cao, Y. W. Xu, D. Chen and H. Qiao, Associated evolution of a support vector machine-based classifier for pedestrian detection, Inf. Sci.179 (2009), 1070–1077.10.1016/j.ins.2008.10.020Search in Google Scholar

[7] N. H. Divecha and N. N. Jani, Image watermarking algorithm using DCT, DWT and SVD, In: IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology, NCIPET-2012, 2012.Search in Google Scholar

[8] F. C. A. Fernandes, R. L. V. Spaendonck and C. S. Burrus, Shiftable, projection-based complex wavelet transforms, In: Acoustics, Speech, and Signal Processing (ICASSP) on IEEE International Conference, Orlando, FL, USA, 2002.10.1109/ICASSP.2002.1005977Search in Google Scholar

[9] A. Furuskar, T. Jonsson and M. Lundevall, The LTE Radio Interface: Key Characteristics and Performance: Personal, Indoor and Mobile Radio Communications, IEEE, Ericsson Research, Sweden, 2008.10.1109/PIMRC.2008.4699492Search in Google Scholar

[10] E. Ganic and A. M. Eskicioglu, Robust DWT-SVD domain image watermarking: embedding data in all frequencies, In: Proc. Workshop Multimedia Security, Magdeburg, Germany, 2004, 166–174.10.1145/1022431.1022461Search in Google Scholar

[11] A. Giakoumaki, S. Pavlopoulos and D. Koutsouris, A medical image watermarking scheme based on wavelet transform, In: Proc. 25th Annu. Int. Conf. IEEE-EMBS, Cancun, Mexico, 2003, pp. 856–859.Search in Google Scholar

[12] E. Kazi, R. Pillai, U. Qureshi and A. Faikh, Long term evolution. IOSR J. Electron. Commun. Eng.7 (2013), 36–42.10.9790/2834-0733642Search in Google Scholar

[13] B. Kumar, H. V. Singh, S. P. Singh and A. Mohan, Novel efficient and secure medical data transmission on WiMAX, Telemed. J E Health14 (2008), 1063–1069.10.1089/tmj.2008.0033Search in Google Scholar PubMed

[14] A. Larmo, M. Lindström, M. Meyer, G. Pelletier, J. Torsner and H. Wiemann, The LTE link-layer design, IEEE Commun. Mag.47 (2009), 52–59.10.1109/MCOM.2009.4907407Search in Google Scholar

[15] Y. S. Le, H. J. Kang and Y.-H. Kim, Copyright Authentication Enhancement of Digital Watermarking Based on Intelligent Human Visual System Scheme, Springer-Verlag, Berlin/Heidelberg, 2005, KES 2005, LNAI 3682, pp. 567–572.10.1007/11552451_77Search in Google Scholar

[16] J. Lee, J. Han and J. Zhang, MIMO technologies in 3GPP LTE and LTE-advanced, EURASIP J. Wireless Commun. Netw. (2009), 1–10.10.1155/2009/302092Search in Google Scholar

[17] T. C. Lin and C. M. Lin, Wavelet-based copyright-protection scheme for digital images based on local features, Inf. Sci.179 (2009), 3349–3358.10.1016/j.ins.2009.05.022Search in Google Scholar

[18] N. A. Memon, S. A. M. Gilani and A. Ali, Watermarking of chest CT scan medical images for content authentication, In: ICICT, 2009, pp. 175–180.10.1109/ICICT.2009.5268167Search in Google Scholar

[19] N. A. Memon, S. A. M. Gilani and S. Qayoom, Multiple watermarking of medical images for content authentication and recovery, In: IEEE: 13th International, INMIC, 2009, pp. 1–6, 14–1510.1109/INMIC.2009.5383112Search in Google Scholar

[20] M. Morelli, C.-C. J. Kuo and M.-O. Pun, Synchronization techniques for orthogonal frequency division multiple access (OFDMA): a tutorial review, In: Proc. IEEE, vol. 95, 2007, pp. 1394–1427.10.1109/JPROC.2007.897979Search in Google Scholar

[21] B. M. Planitz and A. J. Maeder, A study of block-based medical image watermarking using a perceptual similarity metric. In: Proceedings in DICTA, 2005.10.1109/DICTA.2005.7Search in Google Scholar

[22] A. Rai and H. V. Singh, SVM based robust watermarking for enhanced medical image security, Multimedia Tools. Appl. (2017), 1–14. DOI: 10.1007/s11042-016-4215-3.10.1007/s11042-016-4215-3Search in Google Scholar

[23] S. Ramly, S. A. Aljunid and H. S. Hussain, SVM-SS watermarking model for medical images, CCIS194 (2011), 372–386.10.1007/978-3-642-22603-8_34Search in Google Scholar

[24] J. J. K. O. Ruanaidh and T. Pun, Rotation, scale and translation invariant digital image watermarking, Signal Process.66 (1998), 303–317.10.1016/S0165-1684(98)00012-7Search in Google Scholar

[25] Transition to 4G: 3GPP Broadband Evolution to IMT-Advanced, Rysavy Research/3G Americas, September 2010.Search in Google Scholar

[26] M. Seetha, I. V. Murali Krishna and B. L. Deekshatulu, Comparison of advanced techniques of image classification, Map World Forum, 2007.Search in Google Scholar

[27] A. P. Singh and A. Mishra, Wavelet based watermarking on digital image, Indian J. Comput. Sci. Eng.1 (2011), 86–91.Search in Google Scholar

[28] H. V. Singh, S. P. Gangwar and R. Yadav, Emerging trends in transformed based image compression – a review, Int. J. Inf. Sci. Appl.2 (2010), 591–595.Search in Google Scholar

[29] H. V. Singh, S. P. Gangwar and R. Yadav, Study and analysis of wavelet based image compression techniques, Int. J. Eng. Sci. Technol.4 (2012), 1–7.Search in Google Scholar

[30] H. V. Singh, S. Yadav and A. Mohan, Intellectual property right protection of image data using DCT and spread spectrum-based watermarking, Int. J. Electron. Security Dig. Forens.5 (2013), 218–22810.1504/IJESDF.2013.058655Search in Google Scholar

[31] H. V. Singh, A. K. Singh, S. Yadav and A. Mohan, DCT based secure data hiding for intellectual property right protection, CSI Trans. ICT2 (2014), 163–168.10.1007/s40012-014-0052-6Search in Google Scholar

[32] A. K. Singh, B. Kumar, M. Dave and A. Mohan, Robust and imperceptible dual watermarking for telemedicine applications, Wireless Pers. Commun.80 (2014), 1415–1433.10.1007/s11277-014-2091-6Search in Google Scholar

[33] A. K. Singh, M. Dave and A. Mohan, Robust and secure multiple watermarking in wavelet domain, J. Med. Imaging Health Inform.5 (2015), 406–414.10.1166/jmihi.2015.1407Search in Google Scholar

[34] A. K. Singh, B. Kumar, M. Dave and A. Mohan, Multiple watermarking on medical images using selective discrete wavelet transform coefficients, J. Med. Imaging Health Inform.5 (2015), 607–614.10.1166/jmihi.2015.1432Search in Google Scholar

[35] A. K. Singh, M. Dave and A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain, Wireless Pers. Commun.83 (2015), 2133–2150.10.1007/s11277-015-2505-0Search in Google Scholar

[36] M. Speth, S. Fechtel, G. Fock and H. Meyr, Optimum receiver design for wireless broadband systems using OFDM. Part I, IEEE Trans. Commun.47 (1999), 1668–1677.10.1109/26.803501Search in Google Scholar

[37] State of the Mobile Web, Opera Tech Report, October 2013.Search in Google Scholar

[38] H. H. Tsai and D.W. Sun, Color image watermark extraction based on support vector machines, Inf. Sci.177 (2007), 550–569.10.1016/j.ins.2006.05.002Search in Google Scholar

[39] Z. Wang, A. C. Bovik, H. R. Sheikh and E. P. Simoncelli, Image quality assessment: from error visibility to structural similarity, IEEE Trans. Image Process.13 (2004), 600–612.10.1109/TIP.2003.819861Search in Google Scholar

[40] S. H. Yen and C. J. Wang, SVM based watermarking technique, Tamkang J. Sci. Eng.9 (2006), 141–150.Search in Google Scholar

[41] J. Zain and M. Clarke, Security in telemedicine: issues in watermarking medical images. In: 3rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, Tunisia, 2005.Search in Google Scholar

[42] A. Zear, A. K. Singh and P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine, Multimedia Tools Appl. (2016), DOI: 10.1007/s11042-016-3862-8.10.1007/s11042-016-3862-8Search in Google Scholar

[43] A. Zear, A. K. Singh and P. Kumar, Multiple watermarking for healthcare applications, J. Intell. Syst. 27 (2018), 5–18.10.1515/jisys-2016-0036Search in Google Scholar

[44] Y. Zhou and W. Jin, A robust digital image multi-watermarking scheme in the DWT domain, In: International Conference on Techniques and Informatics, (ICSAI 2012), 2012.10.1109/ICSAI.2012.6223407Search in Google Scholar

[45] Z. Zhou, B. Tang and X. Liu, A block SVD based image watermarking method, In: Proceedings of the 6th World Congress on Intelligent Control and Automation, Dalian, China, 2006.Search in Google Scholar

[46] J. Zyren and W. McCoy, White Paper on Overview of the 3GPP Long Term Evolution Physical Layer, Freescale Semiconductor, 2007.Search in Google Scholar

Received: 2017-02-28
Published Online: 2017-06-07
Published in Print: 2018-01-26

©2018 Walter de Gruyter GmbH, Berlin/Boston

This article is distributed under the terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Downloaded on 8.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jisys-2017-0068/html
Scroll to top button