CFP last date
20 May 2024
Reseach Article

RONI Medical Image Watermarking using DWT and RSA

by Neha Solanki, Sanjay Kumar Malik, Sonam Chhikara
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 9
Year of Publication: 2014
Authors: Neha Solanki, Sanjay Kumar Malik, Sonam Chhikara
10.5120/16823-6581

Neha Solanki, Sanjay Kumar Malik, Sonam Chhikara . RONI Medical Image Watermarking using DWT and RSA. International Journal of Computer Applications. 96, 9 ( June 2014), 30-35. DOI=10.5120/16823-6581

@article{ 10.5120/16823-6581,
author = { Neha Solanki, Sanjay Kumar Malik, Sonam Chhikara },
title = { RONI Medical Image Watermarking using DWT and RSA },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 9 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 30-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number9/16823-6581/ },
doi = { 10.5120/16823-6581 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:21:18.518891+05:30
%A Neha Solanki
%A Sanjay Kumar Malik
%A Sonam Chhikara
%T RONI Medical Image Watermarking using DWT and RSA
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 9
%P 30-35
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, the proposed work is about to store the patient information in the medical image itself that can be a CT scan or the MRI image. Medical records are extremely sensitive patient information and require uncompromising security during both storage and transmission. In the traditional way, the patient information and patient test reports are kept in different tables or databases or locations. But, this kind of data management can have some human oriented errors such as transfer of wrong report to a patient. Errors can be prevented by hiding the data in scan report itself. It will improve the reliability of the medical information system. In our paper the work is divided in two main stages, first to identify the ROI and RONI of the image. Here, the ROI is defined in terms of information part of medical image and RONI is defined in terms of non-information part of the MRI image. It will avoid the user to destroy the valuable information from the image. Watermark is encrypted by using RSA. The second stage is about to hide the image in RONI. A DWT based approach is used to hide such information.

References
  1. H. K. Lee, "ROI Medical Image Watermarking Using DWT and Bit-plane", in proceedings of IEEE Asia-Pacific Conference on Communications, Perth, Western Australia, vol. 16, pp. 512-515, 2005.
  2. B. M. Planitz, "A Study of Block-based Medical Image Watermarking Using a Perceptual Similarity Metric", in proceedings of IEEE Digital Imaging Computing: Techniques and Applications (DICTA), vol. 13, pp. 600-612, 2005.
  3. A. K. Navas, M. Sasikumar and S. Sreevidya "A Benchmark for Medical Image Watermarking", in proceedings of International Conference on Image Processing, vol. 33, pp. 237-240, 2007 .
  4. N. A. Memon and S. A. M. Gilani, "Multiple Watermarking of Medical Images for Content Authentication and Recovery", in proceedings of World Academy of Science, Engineering and Technology, vol. 38, pp. 347-350, 2009.
  5. S. C. Liew and J. Mohamad, "Reversible Medical Image Watermarking For Tamper Detection and Recovery", Computerized Medical Imaging and Graphics, 2003, vol. 27, pp. l85-196, 2010.
  6. M. K. Kundu and S. Das, "Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding", in proceedings of IEEE International Conference on Pattern Recognition, vol. 38, pp. 1457-1460, 2010.
  7. N. V. Dharwadkar and B. B. Amberker, " Reversible Fragile Medical Image Watermarking with Zero Distortion", in proceedings of IEEE International Conference on Computer & Communication Technology, vol. 21, pp. 248-254, 2010.
  8. B. W. T. Agung and F. P. Permana, "Medical Image Watermarking with Tamper Detection and Recovery Using Reversible Watermarking with LSB Modification and Run Length Encoding (RLE) Compression", in proceedings of. 28th Annual International Conference of the IEEE, New York, USA, vol. 30 pp. 3270- 3273, 2010.
  9. C. Dhong and L. Jingbing , "The Watermarking Medical Image Algorithm with Encryption by DCT and Logistic" in proceedings of Ninth Web Information Systems and Applications Conference, vol. 6072, San Jose, CA, pp. 1-13, 2012.
  10. L. Yaoli and L. Jingbing "The Medical Image Watermarking Algorithm Using DWT-DCT and Logistic", in proceedings of IEEE Ninth Web Information Systems and Applications Conference, vol. 30, pp. 119-124, 2012.
  11. G. Prabakaran and R. Bhavani, "Multi Secure and Robustness for Medical Image Based Steganography Scheme", in proceedings of 2013 IEEE International Conference on Circuits, Power and Computing Technologies, vol. 28, pp. 947-951, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

ROI (Region of Interest) RONI (Region of Non Interest) IWT (Integer Wavelet Transform) DWT (Discrete Wavelet Transform) IWT with AT (IWT with Arnold Transform) DWT with RST (DWT with RSA Subtraction and Threshold).