{"title":"Biomedical Image Watermarking in Wavelet Domain for Data Integrity Using Bit Majority Algorithm and Multiple Copies of Hidden Information","authors":"K. Pal, G. Ghosh, M. Bhattacharya","doi":"10.5923/J.AJBE.20120202.06","DOIUrl":null,"url":null,"abstract":"The current paper presents a novel and unique scheme for biomedical image watermarking in wavelet domain by hiding multiple copies of the same data in the cover image using bit replacement in the horizontal (HL) and vertical (LH) resolution approximation image components. The proposed scheme uses an approach for recovering the hidden information from the damaged copies due to unauthorized alteration of the data by applying an algorithm to find the closest twin of the embedded information by bit majority algorithm. Experimental results of the proposed watermarking technique show much enhancement in the visual and statistical invisibility of hidden information after data recovery that supports the improvement in performance.","PeriodicalId":7620,"journal":{"name":"American Journal of Biomedical Engineering","volume":"30 1","pages":"29-37"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"30","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"American Journal of Biomedical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5923/J.AJBE.20120202.06","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 30
Abstract
The current paper presents a novel and unique scheme for biomedical image watermarking in wavelet domain by hiding multiple copies of the same data in the cover image using bit replacement in the horizontal (HL) and vertical (LH) resolution approximation image components. The proposed scheme uses an approach for recovering the hidden information from the damaged copies due to unauthorized alteration of the data by applying an algorithm to find the closest twin of the embedded information by bit majority algorithm. Experimental results of the proposed watermarking technique show much enhancement in the visual and statistical invisibility of hidden information after data recovery that supports the improvement in performance.