Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Shamia, D.a | Balasamy, K.b; * | Suganyadevi, S.c
Affiliations: [a] Department of ECE, VSB College of Engineering Technical Campus, Coimbatore | [b] Department of AI & DS, Bannari Amman Institute of Technology, Sathyamangalam, Erode | [c] Department of ECE, KPR Institute of Engineering and Technology, Coimbatore
Correspondence: [*] Corresponding author. K. Balasamy, Department of AI & DS, Bannari Amman Institute of Technology, Sathyamangalam. Erode. E-mail: [email protected].
Abstract: Security, secrecy, and authenticity problems have arisen as a result of the widespread sharing of medical images in social media. Copyright protection for online photo sharing is becoming a must. In this research, a cutting-edge method for embedding encrypted watermarks into medical images is proposed. The proposed method makes use of fuzzy-based ROI selection and wavelet-transformation to accomplish this. In the first step of the process, a fuzzy search is performed on the original picture to locate relevant places using the center region of interest (RoI) and the radial line along the final intensity. The suggested method takes a digital picture and divides it into 4×4 non-overlapping blocks, with the intent of selecting low information chunks for embedding in order to maximize invisibility. By changing the coefficients, a single watermark bit may be inserted into both the left and right singular SVD matrices. The absence of false positives means the suggested technique can successfully integrate a large amount of data. Watermarks are encrypted using a pseudorandom key before being embedded. Discrete wavelet transform saliency map, block mean method, and cosine functions are used to construct an adaptively-generated pseudo-random key from the cover picture. Images uploaded to social media platforms must have a high degree of invisibility and durability. These watermarking features, however, come with a price. The optimal scaling factor is used to strike a balance between the two in the proposed system. Furthermore, the suggested scheme’s higher performance is confirmed by comparison with the latest state-of-the-art systems.
Keywords: Watermarking, key component, wavelet transform, Fuzzy ROI, encryption
DOI: 10.3233/JIFS-222618
Journal: Journal of Intelligent & Fuzzy Systems, vol. 44, no. 5, pp. 7449-7457, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]